mirror of
https://git.FreeBSD.org/src.git
synced 2024-12-28 11:57:28 +00:00
s/sysctl -w/sysctl/
This commit is contained in:
parent
19d37d835c
commit
d4d2e898a1
Notes:
svn2git
2020-12-20 02:59:44 +00:00
svn path=/head/; revision=87646
@ -21,7 +21,7 @@ esac
|
||||
#
|
||||
case ${unaligned_print} in
|
||||
[Nn][Oo])
|
||||
sysctl -w machdep.unaligned_print=0
|
||||
sysctl machdep.unaligned_print=0
|
||||
;;
|
||||
esac
|
||||
|
||||
|
@ -10,7 +10,7 @@ echo -n 'Initial rc.ia64 initialization:'
|
||||
#
|
||||
case ${unaligned_print} in
|
||||
[Nn][Oo])
|
||||
sysctl -w machdep.unaligned_print=0
|
||||
sysctl machdep.unaligned_print=0
|
||||
;;
|
||||
esac
|
||||
|
||||
|
@ -366,7 +366,7 @@ network_pass1() {
|
||||
case ${firewall_logging} in
|
||||
[Yy][Ee][Ss] | '')
|
||||
echo 'Firewall logging=YES'
|
||||
sysctl -w net.inet.ip.fw.verbose=1 >/dev/null
|
||||
sysctl net.inet.ip.fw.verbose=1 >/dev/null
|
||||
;;
|
||||
*)
|
||||
;;
|
||||
@ -409,77 +409,77 @@ network_pass1() {
|
||||
;;
|
||||
*)
|
||||
echo -n ' tcp extensions=NO'
|
||||
sysctl -w net.inet.tcp.rfc1323=0 >/dev/null
|
||||
sysctl net.inet.tcp.rfc1323=0 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${icmp_bmcastecho} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' broadcast ping responses=YES'
|
||||
sysctl -w net.inet.icmp.bmcastecho=1 >/dev/null
|
||||
sysctl net.inet.icmp.bmcastecho=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${icmp_drop_redirect} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' ignore ICMP redirect=YES'
|
||||
sysctl -w net.inet.icmp.drop_redirect=1 >/dev/null
|
||||
sysctl net.inet.icmp.drop_redirect=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${icmp_log_redirect} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' log ICMP redirect=YES'
|
||||
sysctl -w net.inet.icmp.log_redirect=1 >/dev/null
|
||||
sysctl net.inet.icmp.log_redirect=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${gateway_enable} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' IP gateway=YES'
|
||||
sysctl -w net.inet.ip.forwarding=1 >/dev/null
|
||||
sysctl net.inet.ip.forwarding=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${forward_sourceroute} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' do source routing=YES'
|
||||
sysctl -w net.inet.ip.sourceroute=1 >/dev/null
|
||||
sysctl net.inet.ip.sourceroute=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${accept_sourceroute} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' accept source routing=YES'
|
||||
sysctl -w net.inet.ip.accept_sourceroute=1 >/dev/null
|
||||
sysctl net.inet.ip.accept_sourceroute=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${tcp_keepalive} in
|
||||
[Nn][Oo])
|
||||
echo -n ' TCP keepalive=NO'
|
||||
sysctl -w net.inet.tcp.always_keepalive=0 >/dev/null
|
||||
sysctl net.inet.tcp.always_keepalive=0 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${tcp_drop_synfin} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' drop SYN+FIN packets=YES'
|
||||
sysctl -w net.inet.tcp.drop_synfin=1 >/dev/null
|
||||
sysctl net.inet.tcp.drop_synfin=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${ipxgateway_enable} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' IPX gateway=YES'
|
||||
sysctl -w net.ipx.ipx.ipxforwarding=1 >/dev/null
|
||||
sysctl net.ipx.ipx.ipxforwarding=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${arpproxy_all} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' ARP proxyall=YES'
|
||||
sysctl -w net.link.ether.inet.proxyall=1 >/dev/null
|
||||
sysctl net.link.ether.inet.proxyall=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -488,7 +488,7 @@ network_pass1() {
|
||||
;;
|
||||
*)
|
||||
echo -n " ip_portrange_first=$ip_portrange_first"
|
||||
sysctl -w net.inet.ip.portrange.first=$ip_portrange_first >/dev/null
|
||||
sysctl net.inet.ip.portrange.first=$ip_portrange_first >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -497,7 +497,7 @@ network_pass1() {
|
||||
;;
|
||||
*)
|
||||
echo -n " ip_portrange_last=$ip_portrange_last"
|
||||
sysctl -w net.inet.ip.portrange.last=$ip_portrange_last >/dev/null
|
||||
sysctl net.inet.ip.portrange.last=$ip_portrange_last >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -672,7 +672,7 @@ network_pass3() {
|
||||
case ${nfs_reserved_port_only} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' NFS on reserved port only=YES'
|
||||
sysctl -w vfs.nfsrv.nfs_privport=1 > /dev/null
|
||||
sysctl vfs.nfsrv.nfs_privport=1 > /dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -716,10 +716,10 @@ network_pass3() {
|
||||
[Yy][Ee][Ss])
|
||||
if [ -n "${nfs_access_cache}" ]; then
|
||||
echo -n " NFS access cache time=${nfs_access_cache}"
|
||||
sysctl -w vfs.nfs.access_cache_timeout=${nfs_access_cache} >/dev/null
|
||||
sysctl vfs.nfs.access_cache_timeout=${nfs_access_cache} >/dev/null
|
||||
fi
|
||||
if [ -n "${nfs_bufpackets}" ]; then
|
||||
sysctl -w vfs.nfs.bufpackets=${nfs_bufpackets} > /dev/null
|
||||
sysctl vfs.nfs.bufpackets=${nfs_bufpackets} > /dev/null
|
||||
fi
|
||||
;;
|
||||
esac
|
||||
@ -838,8 +838,8 @@ network_pass4() {
|
||||
;;
|
||||
*)
|
||||
echo -n ' log_in_vain=YES'
|
||||
sysctl -w net.inet.tcp.log_in_vain=1 >/dev/null
|
||||
sysctl -w net.inet.udp.log_in_vain=1 >/dev/null
|
||||
sysctl net.inet.tcp.log_in_vain=1 >/dev/null
|
||||
sysctl net.inet.udp.log_in_vain=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
|
8
etc/rc
8
etc/rc
@ -117,7 +117,7 @@ case ${harvest_interrupt} in
|
||||
;;
|
||||
*)
|
||||
if [ -w /dev/random ]; then
|
||||
/sbin/sysctl -w kern.random.sys.harvest.interrupt=1 >/dev/null
|
||||
/sbin/sysctl kern.random.sys.harvest.interrupt=1 >/dev/null
|
||||
echo -n ' interrupts'
|
||||
fi
|
||||
;;
|
||||
@ -128,7 +128,7 @@ case ${harvest_ethernet} in
|
||||
;;
|
||||
*)
|
||||
if [ -w /dev/random ]; then
|
||||
/sbin/sysctl -w kern.random.sys.harvest.ethernet=1 >/dev/null
|
||||
/sbin/sysctl kern.random.sys.harvest.ethernet=1 >/dev/null
|
||||
echo -n ' ethernet'
|
||||
fi
|
||||
;;
|
||||
@ -139,7 +139,7 @@ case ${harvest_p_to_p} in
|
||||
;;
|
||||
*)
|
||||
if [ -w /dev/random ]; then
|
||||
/sbin/sysctl -w kern.random.sys.harvest.point_to_point=1 >/dev/null
|
||||
/sbin/sysctl kern.random.sys.harvest.point_to_point=1 >/dev/null
|
||||
echo -n ' point_to_point'
|
||||
fi
|
||||
;;
|
||||
@ -847,7 +847,7 @@ case ${kern_securelevel_enable} in
|
||||
[Yy][Ee][Ss])
|
||||
if [ "${kern_securelevel}" -ge 0 ]; then
|
||||
echo 'Raising kernel security level: '
|
||||
sysctl -w kern.securelevel=${kern_securelevel}
|
||||
sysctl kern.securelevel=${kern_securelevel}
|
||||
fi
|
||||
;;
|
||||
esac
|
||||
|
@ -366,7 +366,7 @@ network_pass1() {
|
||||
case ${firewall_logging} in
|
||||
[Yy][Ee][Ss] | '')
|
||||
echo 'Firewall logging=YES'
|
||||
sysctl -w net.inet.ip.fw.verbose=1 >/dev/null
|
||||
sysctl net.inet.ip.fw.verbose=1 >/dev/null
|
||||
;;
|
||||
*)
|
||||
;;
|
||||
@ -409,77 +409,77 @@ network_pass1() {
|
||||
;;
|
||||
*)
|
||||
echo -n ' tcp extensions=NO'
|
||||
sysctl -w net.inet.tcp.rfc1323=0 >/dev/null
|
||||
sysctl net.inet.tcp.rfc1323=0 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${icmp_bmcastecho} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' broadcast ping responses=YES'
|
||||
sysctl -w net.inet.icmp.bmcastecho=1 >/dev/null
|
||||
sysctl net.inet.icmp.bmcastecho=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${icmp_drop_redirect} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' ignore ICMP redirect=YES'
|
||||
sysctl -w net.inet.icmp.drop_redirect=1 >/dev/null
|
||||
sysctl net.inet.icmp.drop_redirect=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${icmp_log_redirect} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' log ICMP redirect=YES'
|
||||
sysctl -w net.inet.icmp.log_redirect=1 >/dev/null
|
||||
sysctl net.inet.icmp.log_redirect=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${gateway_enable} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' IP gateway=YES'
|
||||
sysctl -w net.inet.ip.forwarding=1 >/dev/null
|
||||
sysctl net.inet.ip.forwarding=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${forward_sourceroute} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' do source routing=YES'
|
||||
sysctl -w net.inet.ip.sourceroute=1 >/dev/null
|
||||
sysctl net.inet.ip.sourceroute=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${accept_sourceroute} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' accept source routing=YES'
|
||||
sysctl -w net.inet.ip.accept_sourceroute=1 >/dev/null
|
||||
sysctl net.inet.ip.accept_sourceroute=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${tcp_keepalive} in
|
||||
[Nn][Oo])
|
||||
echo -n ' TCP keepalive=NO'
|
||||
sysctl -w net.inet.tcp.always_keepalive=0 >/dev/null
|
||||
sysctl net.inet.tcp.always_keepalive=0 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${tcp_drop_synfin} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' drop SYN+FIN packets=YES'
|
||||
sysctl -w net.inet.tcp.drop_synfin=1 >/dev/null
|
||||
sysctl net.inet.tcp.drop_synfin=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${ipxgateway_enable} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' IPX gateway=YES'
|
||||
sysctl -w net.ipx.ipx.ipxforwarding=1 >/dev/null
|
||||
sysctl net.ipx.ipx.ipxforwarding=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${arpproxy_all} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' ARP proxyall=YES'
|
||||
sysctl -w net.link.ether.inet.proxyall=1 >/dev/null
|
||||
sysctl net.link.ether.inet.proxyall=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -488,7 +488,7 @@ network_pass1() {
|
||||
;;
|
||||
*)
|
||||
echo -n " ip_portrange_first=$ip_portrange_first"
|
||||
sysctl -w net.inet.ip.portrange.first=$ip_portrange_first >/dev/null
|
||||
sysctl net.inet.ip.portrange.first=$ip_portrange_first >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -497,7 +497,7 @@ network_pass1() {
|
||||
;;
|
||||
*)
|
||||
echo -n " ip_portrange_last=$ip_portrange_last"
|
||||
sysctl -w net.inet.ip.portrange.last=$ip_portrange_last >/dev/null
|
||||
sysctl net.inet.ip.portrange.last=$ip_portrange_last >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -672,7 +672,7 @@ network_pass3() {
|
||||
case ${nfs_reserved_port_only} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' NFS on reserved port only=YES'
|
||||
sysctl -w vfs.nfsrv.nfs_privport=1 > /dev/null
|
||||
sysctl vfs.nfsrv.nfs_privport=1 > /dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -716,10 +716,10 @@ network_pass3() {
|
||||
[Yy][Ee][Ss])
|
||||
if [ -n "${nfs_access_cache}" ]; then
|
||||
echo -n " NFS access cache time=${nfs_access_cache}"
|
||||
sysctl -w vfs.nfs.access_cache_timeout=${nfs_access_cache} >/dev/null
|
||||
sysctl vfs.nfs.access_cache_timeout=${nfs_access_cache} >/dev/null
|
||||
fi
|
||||
if [ -n "${nfs_bufpackets}" ]; then
|
||||
sysctl -w vfs.nfs.bufpackets=${nfs_bufpackets} > /dev/null
|
||||
sysctl vfs.nfs.bufpackets=${nfs_bufpackets} > /dev/null
|
||||
fi
|
||||
;;
|
||||
esac
|
||||
@ -838,8 +838,8 @@ network_pass4() {
|
||||
;;
|
||||
*)
|
||||
echo -n ' log_in_vain=YES'
|
||||
sysctl -w net.inet.tcp.log_in_vain=1 >/dev/null
|
||||
sysctl -w net.inet.udp.log_in_vain=1 >/dev/null
|
||||
sysctl net.inet.tcp.log_in_vain=1 >/dev/null
|
||||
sysctl net.inet.udp.log_in_vain=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
|
@ -119,8 +119,8 @@ network_start()
|
||||
#
|
||||
route add -inet6 ::0.0.0.0 -prefixlen 96 ::1 -reject
|
||||
|
||||
sysctl -w net.inet6.ip6.forwarding=0 >/dev/null
|
||||
sysctl -w net.inet6.ip6.accept_rtadv=0 >/dev/null
|
||||
sysctl net.inet6.ip6.forwarding=0 >/dev/null
|
||||
sysctl net.inet6.ip6.accept_rtadv=0 >/dev/null
|
||||
|
||||
# backward compatibility
|
||||
#
|
||||
@ -139,12 +139,12 @@ network_start()
|
||||
case $ip6mode in
|
||||
router)
|
||||
echo 'IPv6 mode: router'
|
||||
sysctl -w net.inet6.ip6.forwarding=1 >/dev/null
|
||||
sysctl net.inet6.ip6.forwarding=1 >/dev/null
|
||||
;;
|
||||
|
||||
autohost)
|
||||
echo 'IPv6 mode: autoconfigured host'
|
||||
sysctl -w net.inet6.ip6.accept_rtadv=1 >/dev/null
|
||||
sysctl net.inet6.ip6.accept_rtadv=1 >/dev/null
|
||||
;;
|
||||
|
||||
host)
|
||||
|
@ -366,7 +366,7 @@ network_pass1() {
|
||||
case ${firewall_logging} in
|
||||
[Yy][Ee][Ss] | '')
|
||||
echo 'Firewall logging=YES'
|
||||
sysctl -w net.inet.ip.fw.verbose=1 >/dev/null
|
||||
sysctl net.inet.ip.fw.verbose=1 >/dev/null
|
||||
;;
|
||||
*)
|
||||
;;
|
||||
@ -409,77 +409,77 @@ network_pass1() {
|
||||
;;
|
||||
*)
|
||||
echo -n ' tcp extensions=NO'
|
||||
sysctl -w net.inet.tcp.rfc1323=0 >/dev/null
|
||||
sysctl net.inet.tcp.rfc1323=0 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${icmp_bmcastecho} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' broadcast ping responses=YES'
|
||||
sysctl -w net.inet.icmp.bmcastecho=1 >/dev/null
|
||||
sysctl net.inet.icmp.bmcastecho=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${icmp_drop_redirect} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' ignore ICMP redirect=YES'
|
||||
sysctl -w net.inet.icmp.drop_redirect=1 >/dev/null
|
||||
sysctl net.inet.icmp.drop_redirect=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${icmp_log_redirect} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' log ICMP redirect=YES'
|
||||
sysctl -w net.inet.icmp.log_redirect=1 >/dev/null
|
||||
sysctl net.inet.icmp.log_redirect=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${gateway_enable} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' IP gateway=YES'
|
||||
sysctl -w net.inet.ip.forwarding=1 >/dev/null
|
||||
sysctl net.inet.ip.forwarding=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${forward_sourceroute} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' do source routing=YES'
|
||||
sysctl -w net.inet.ip.sourceroute=1 >/dev/null
|
||||
sysctl net.inet.ip.sourceroute=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${accept_sourceroute} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' accept source routing=YES'
|
||||
sysctl -w net.inet.ip.accept_sourceroute=1 >/dev/null
|
||||
sysctl net.inet.ip.accept_sourceroute=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${tcp_keepalive} in
|
||||
[Nn][Oo])
|
||||
echo -n ' TCP keepalive=NO'
|
||||
sysctl -w net.inet.tcp.always_keepalive=0 >/dev/null
|
||||
sysctl net.inet.tcp.always_keepalive=0 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${tcp_drop_synfin} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' drop SYN+FIN packets=YES'
|
||||
sysctl -w net.inet.tcp.drop_synfin=1 >/dev/null
|
||||
sysctl net.inet.tcp.drop_synfin=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${ipxgateway_enable} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' IPX gateway=YES'
|
||||
sysctl -w net.ipx.ipx.ipxforwarding=1 >/dev/null
|
||||
sysctl net.ipx.ipx.ipxforwarding=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${arpproxy_all} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' ARP proxyall=YES'
|
||||
sysctl -w net.link.ether.inet.proxyall=1 >/dev/null
|
||||
sysctl net.link.ether.inet.proxyall=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -488,7 +488,7 @@ network_pass1() {
|
||||
;;
|
||||
*)
|
||||
echo -n " ip_portrange_first=$ip_portrange_first"
|
||||
sysctl -w net.inet.ip.portrange.first=$ip_portrange_first >/dev/null
|
||||
sysctl net.inet.ip.portrange.first=$ip_portrange_first >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -497,7 +497,7 @@ network_pass1() {
|
||||
;;
|
||||
*)
|
||||
echo -n " ip_portrange_last=$ip_portrange_last"
|
||||
sysctl -w net.inet.ip.portrange.last=$ip_portrange_last >/dev/null
|
||||
sysctl net.inet.ip.portrange.last=$ip_portrange_last >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -672,7 +672,7 @@ network_pass3() {
|
||||
case ${nfs_reserved_port_only} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' NFS on reserved port only=YES'
|
||||
sysctl -w vfs.nfsrv.nfs_privport=1 > /dev/null
|
||||
sysctl vfs.nfsrv.nfs_privport=1 > /dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -716,10 +716,10 @@ network_pass3() {
|
||||
[Yy][Ee][Ss])
|
||||
if [ -n "${nfs_access_cache}" ]; then
|
||||
echo -n " NFS access cache time=${nfs_access_cache}"
|
||||
sysctl -w vfs.nfs.access_cache_timeout=${nfs_access_cache} >/dev/null
|
||||
sysctl vfs.nfs.access_cache_timeout=${nfs_access_cache} >/dev/null
|
||||
fi
|
||||
if [ -n "${nfs_bufpackets}" ]; then
|
||||
sysctl -w vfs.nfs.bufpackets=${nfs_bufpackets} > /dev/null
|
||||
sysctl vfs.nfs.bufpackets=${nfs_bufpackets} > /dev/null
|
||||
fi
|
||||
;;
|
||||
esac
|
||||
@ -838,8 +838,8 @@ network_pass4() {
|
||||
;;
|
||||
*)
|
||||
echo -n ' log_in_vain=YES'
|
||||
sysctl -w net.inet.tcp.log_in_vain=1 >/dev/null
|
||||
sysctl -w net.inet.udp.log_in_vain=1 >/dev/null
|
||||
sysctl net.inet.tcp.log_in_vain=1 >/dev/null
|
||||
sysctl net.inet.udp.log_in_vain=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
|
@ -366,7 +366,7 @@ network_pass1() {
|
||||
case ${firewall_logging} in
|
||||
[Yy][Ee][Ss] | '')
|
||||
echo 'Firewall logging=YES'
|
||||
sysctl -w net.inet.ip.fw.verbose=1 >/dev/null
|
||||
sysctl net.inet.ip.fw.verbose=1 >/dev/null
|
||||
;;
|
||||
*)
|
||||
;;
|
||||
@ -409,77 +409,77 @@ network_pass1() {
|
||||
;;
|
||||
*)
|
||||
echo -n ' tcp extensions=NO'
|
||||
sysctl -w net.inet.tcp.rfc1323=0 >/dev/null
|
||||
sysctl net.inet.tcp.rfc1323=0 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${icmp_bmcastecho} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' broadcast ping responses=YES'
|
||||
sysctl -w net.inet.icmp.bmcastecho=1 >/dev/null
|
||||
sysctl net.inet.icmp.bmcastecho=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${icmp_drop_redirect} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' ignore ICMP redirect=YES'
|
||||
sysctl -w net.inet.icmp.drop_redirect=1 >/dev/null
|
||||
sysctl net.inet.icmp.drop_redirect=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${icmp_log_redirect} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' log ICMP redirect=YES'
|
||||
sysctl -w net.inet.icmp.log_redirect=1 >/dev/null
|
||||
sysctl net.inet.icmp.log_redirect=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${gateway_enable} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' IP gateway=YES'
|
||||
sysctl -w net.inet.ip.forwarding=1 >/dev/null
|
||||
sysctl net.inet.ip.forwarding=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${forward_sourceroute} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' do source routing=YES'
|
||||
sysctl -w net.inet.ip.sourceroute=1 >/dev/null
|
||||
sysctl net.inet.ip.sourceroute=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${accept_sourceroute} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' accept source routing=YES'
|
||||
sysctl -w net.inet.ip.accept_sourceroute=1 >/dev/null
|
||||
sysctl net.inet.ip.accept_sourceroute=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${tcp_keepalive} in
|
||||
[Nn][Oo])
|
||||
echo -n ' TCP keepalive=NO'
|
||||
sysctl -w net.inet.tcp.always_keepalive=0 >/dev/null
|
||||
sysctl net.inet.tcp.always_keepalive=0 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${tcp_drop_synfin} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' drop SYN+FIN packets=YES'
|
||||
sysctl -w net.inet.tcp.drop_synfin=1 >/dev/null
|
||||
sysctl net.inet.tcp.drop_synfin=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${ipxgateway_enable} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' IPX gateway=YES'
|
||||
sysctl -w net.ipx.ipx.ipxforwarding=1 >/dev/null
|
||||
sysctl net.ipx.ipx.ipxforwarding=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${arpproxy_all} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' ARP proxyall=YES'
|
||||
sysctl -w net.link.ether.inet.proxyall=1 >/dev/null
|
||||
sysctl net.link.ether.inet.proxyall=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -488,7 +488,7 @@ network_pass1() {
|
||||
;;
|
||||
*)
|
||||
echo -n " ip_portrange_first=$ip_portrange_first"
|
||||
sysctl -w net.inet.ip.portrange.first=$ip_portrange_first >/dev/null
|
||||
sysctl net.inet.ip.portrange.first=$ip_portrange_first >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -497,7 +497,7 @@ network_pass1() {
|
||||
;;
|
||||
*)
|
||||
echo -n " ip_portrange_last=$ip_portrange_last"
|
||||
sysctl -w net.inet.ip.portrange.last=$ip_portrange_last >/dev/null
|
||||
sysctl net.inet.ip.portrange.last=$ip_portrange_last >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -672,7 +672,7 @@ network_pass3() {
|
||||
case ${nfs_reserved_port_only} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' NFS on reserved port only=YES'
|
||||
sysctl -w vfs.nfsrv.nfs_privport=1 > /dev/null
|
||||
sysctl vfs.nfsrv.nfs_privport=1 > /dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -716,10 +716,10 @@ network_pass3() {
|
||||
[Yy][Ee][Ss])
|
||||
if [ -n "${nfs_access_cache}" ]; then
|
||||
echo -n " NFS access cache time=${nfs_access_cache}"
|
||||
sysctl -w vfs.nfs.access_cache_timeout=${nfs_access_cache} >/dev/null
|
||||
sysctl vfs.nfs.access_cache_timeout=${nfs_access_cache} >/dev/null
|
||||
fi
|
||||
if [ -n "${nfs_bufpackets}" ]; then
|
||||
sysctl -w vfs.nfs.bufpackets=${nfs_bufpackets} > /dev/null
|
||||
sysctl vfs.nfs.bufpackets=${nfs_bufpackets} > /dev/null
|
||||
fi
|
||||
;;
|
||||
esac
|
||||
@ -838,8 +838,8 @@ network_pass4() {
|
||||
;;
|
||||
*)
|
||||
echo -n ' log_in_vain=YES'
|
||||
sysctl -w net.inet.tcp.log_in_vain=1 >/dev/null
|
||||
sysctl -w net.inet.udp.log_in_vain=1 >/dev/null
|
||||
sysctl net.inet.tcp.log_in_vain=1 >/dev/null
|
||||
sysctl net.inet.udp.log_in_vain=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
|
@ -366,7 +366,7 @@ network_pass1() {
|
||||
case ${firewall_logging} in
|
||||
[Yy][Ee][Ss] | '')
|
||||
echo 'Firewall logging=YES'
|
||||
sysctl -w net.inet.ip.fw.verbose=1 >/dev/null
|
||||
sysctl net.inet.ip.fw.verbose=1 >/dev/null
|
||||
;;
|
||||
*)
|
||||
;;
|
||||
@ -409,77 +409,77 @@ network_pass1() {
|
||||
;;
|
||||
*)
|
||||
echo -n ' tcp extensions=NO'
|
||||
sysctl -w net.inet.tcp.rfc1323=0 >/dev/null
|
||||
sysctl net.inet.tcp.rfc1323=0 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${icmp_bmcastecho} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' broadcast ping responses=YES'
|
||||
sysctl -w net.inet.icmp.bmcastecho=1 >/dev/null
|
||||
sysctl net.inet.icmp.bmcastecho=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${icmp_drop_redirect} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' ignore ICMP redirect=YES'
|
||||
sysctl -w net.inet.icmp.drop_redirect=1 >/dev/null
|
||||
sysctl net.inet.icmp.drop_redirect=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${icmp_log_redirect} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' log ICMP redirect=YES'
|
||||
sysctl -w net.inet.icmp.log_redirect=1 >/dev/null
|
||||
sysctl net.inet.icmp.log_redirect=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${gateway_enable} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' IP gateway=YES'
|
||||
sysctl -w net.inet.ip.forwarding=1 >/dev/null
|
||||
sysctl net.inet.ip.forwarding=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${forward_sourceroute} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' do source routing=YES'
|
||||
sysctl -w net.inet.ip.sourceroute=1 >/dev/null
|
||||
sysctl net.inet.ip.sourceroute=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${accept_sourceroute} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' accept source routing=YES'
|
||||
sysctl -w net.inet.ip.accept_sourceroute=1 >/dev/null
|
||||
sysctl net.inet.ip.accept_sourceroute=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${tcp_keepalive} in
|
||||
[Nn][Oo])
|
||||
echo -n ' TCP keepalive=NO'
|
||||
sysctl -w net.inet.tcp.always_keepalive=0 >/dev/null
|
||||
sysctl net.inet.tcp.always_keepalive=0 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${tcp_drop_synfin} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' drop SYN+FIN packets=YES'
|
||||
sysctl -w net.inet.tcp.drop_synfin=1 >/dev/null
|
||||
sysctl net.inet.tcp.drop_synfin=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${ipxgateway_enable} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' IPX gateway=YES'
|
||||
sysctl -w net.ipx.ipx.ipxforwarding=1 >/dev/null
|
||||
sysctl net.ipx.ipx.ipxforwarding=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${arpproxy_all} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' ARP proxyall=YES'
|
||||
sysctl -w net.link.ether.inet.proxyall=1 >/dev/null
|
||||
sysctl net.link.ether.inet.proxyall=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -488,7 +488,7 @@ network_pass1() {
|
||||
;;
|
||||
*)
|
||||
echo -n " ip_portrange_first=$ip_portrange_first"
|
||||
sysctl -w net.inet.ip.portrange.first=$ip_portrange_first >/dev/null
|
||||
sysctl net.inet.ip.portrange.first=$ip_portrange_first >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -497,7 +497,7 @@ network_pass1() {
|
||||
;;
|
||||
*)
|
||||
echo -n " ip_portrange_last=$ip_portrange_last"
|
||||
sysctl -w net.inet.ip.portrange.last=$ip_portrange_last >/dev/null
|
||||
sysctl net.inet.ip.portrange.last=$ip_portrange_last >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -672,7 +672,7 @@ network_pass3() {
|
||||
case ${nfs_reserved_port_only} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' NFS on reserved port only=YES'
|
||||
sysctl -w vfs.nfsrv.nfs_privport=1 > /dev/null
|
||||
sysctl vfs.nfsrv.nfs_privport=1 > /dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -716,10 +716,10 @@ network_pass3() {
|
||||
[Yy][Ee][Ss])
|
||||
if [ -n "${nfs_access_cache}" ]; then
|
||||
echo -n " NFS access cache time=${nfs_access_cache}"
|
||||
sysctl -w vfs.nfs.access_cache_timeout=${nfs_access_cache} >/dev/null
|
||||
sysctl vfs.nfs.access_cache_timeout=${nfs_access_cache} >/dev/null
|
||||
fi
|
||||
if [ -n "${nfs_bufpackets}" ]; then
|
||||
sysctl -w vfs.nfs.bufpackets=${nfs_bufpackets} > /dev/null
|
||||
sysctl vfs.nfs.bufpackets=${nfs_bufpackets} > /dev/null
|
||||
fi
|
||||
;;
|
||||
esac
|
||||
@ -838,8 +838,8 @@ network_pass4() {
|
||||
;;
|
||||
*)
|
||||
echo -n ' log_in_vain=YES'
|
||||
sysctl -w net.inet.tcp.log_in_vain=1 >/dev/null
|
||||
sysctl -w net.inet.udp.log_in_vain=1 >/dev/null
|
||||
sysctl net.inet.tcp.log_in_vain=1 >/dev/null
|
||||
sysctl net.inet.udp.log_in_vain=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
|
@ -109,7 +109,7 @@ network6_pass1() {
|
||||
case ${ipv6_firewall_logging} in
|
||||
[Yy][Ee][Ss] | '')
|
||||
echo 'IPv6 Firewall logging=YES'
|
||||
sysctl -w net.inet6.ip6.fw.verbose=1 >/dev/null
|
||||
sysctl net.inet6.ip6.fw.verbose=1 >/dev/null
|
||||
;;
|
||||
*)
|
||||
;;
|
||||
@ -139,8 +139,8 @@ network6_pass1() {
|
||||
case ${ipv6_gateway_enable} in
|
||||
[Yy][Ee][Ss])
|
||||
# act as a router
|
||||
sysctl -w net.inet6.ip6.forwarding=1
|
||||
sysctl -w net.inet6.ip6.accept_rtadv=0
|
||||
sysctl net.inet6.ip6.forwarding=1
|
||||
sysctl net.inet6.ip6.accept_rtadv=0
|
||||
|
||||
# wait for DAD
|
||||
for i in $ipv6_network_interfaces; do
|
||||
@ -151,8 +151,8 @@ network6_pass1() {
|
||||
;;
|
||||
*)
|
||||
# act as endhost - start with manual configuration
|
||||
sysctl -w net.inet6.ip6.forwarding=0
|
||||
sysctl -w net.inet6.ip6.accept_rtadv=0
|
||||
sysctl net.inet6.ip6.forwarding=0
|
||||
sysctl net.inet6.ip6.accept_rtadv=0
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -266,11 +266,11 @@ network6_pass1() {
|
||||
case ${ipv6_ipv4mapping} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' IPv4 mapped IPv6 address support=YES'
|
||||
sysctl -w net.inet6.ip6.v6only=0 >/dev/null
|
||||
sysctl net.inet6.ip6.v6only=0 >/dev/null
|
||||
;;
|
||||
'' | *)
|
||||
echo -n ' IPv4 mapped IPv6 address support=NO'
|
||||
sysctl -w net.inet6.ip6.v6only=1 >/dev/null
|
||||
sysctl net.inet6.ip6.v6only=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -340,7 +340,7 @@ network6_interface_setup() {
|
||||
# You can configure only single interface, as
|
||||
# specification assumes that autoconfigured host has
|
||||
# single interface only.
|
||||
sysctl -w net.inet6.ip6.accept_rtadv=1
|
||||
sysctl net.inet6.ip6.accept_rtadv=1
|
||||
set ${rtsol_interfaces}
|
||||
ifconfig $1 up
|
||||
rtsol $1
|
||||
@ -432,7 +432,7 @@ network6_faith_setup() {
|
||||
[Nn][Oo] | '')
|
||||
;;
|
||||
*)
|
||||
sysctl -w net.inet6.ip6.keepfaith=1
|
||||
sysctl net.inet6.ip6.keepfaith=1
|
||||
ifconfig faith0 up
|
||||
for prefix in ${ipv6_faith_prefix}; do
|
||||
prefixlen=`expr "${prefix}" : ".*/\(.*\)"`
|
||||
|
@ -366,7 +366,7 @@ network_pass1() {
|
||||
case ${firewall_logging} in
|
||||
[Yy][Ee][Ss] | '')
|
||||
echo 'Firewall logging=YES'
|
||||
sysctl -w net.inet.ip.fw.verbose=1 >/dev/null
|
||||
sysctl net.inet.ip.fw.verbose=1 >/dev/null
|
||||
;;
|
||||
*)
|
||||
;;
|
||||
@ -409,77 +409,77 @@ network_pass1() {
|
||||
;;
|
||||
*)
|
||||
echo -n ' tcp extensions=NO'
|
||||
sysctl -w net.inet.tcp.rfc1323=0 >/dev/null
|
||||
sysctl net.inet.tcp.rfc1323=0 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${icmp_bmcastecho} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' broadcast ping responses=YES'
|
||||
sysctl -w net.inet.icmp.bmcastecho=1 >/dev/null
|
||||
sysctl net.inet.icmp.bmcastecho=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${icmp_drop_redirect} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' ignore ICMP redirect=YES'
|
||||
sysctl -w net.inet.icmp.drop_redirect=1 >/dev/null
|
||||
sysctl net.inet.icmp.drop_redirect=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${icmp_log_redirect} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' log ICMP redirect=YES'
|
||||
sysctl -w net.inet.icmp.log_redirect=1 >/dev/null
|
||||
sysctl net.inet.icmp.log_redirect=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${gateway_enable} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' IP gateway=YES'
|
||||
sysctl -w net.inet.ip.forwarding=1 >/dev/null
|
||||
sysctl net.inet.ip.forwarding=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${forward_sourceroute} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' do source routing=YES'
|
||||
sysctl -w net.inet.ip.sourceroute=1 >/dev/null
|
||||
sysctl net.inet.ip.sourceroute=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${accept_sourceroute} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' accept source routing=YES'
|
||||
sysctl -w net.inet.ip.accept_sourceroute=1 >/dev/null
|
||||
sysctl net.inet.ip.accept_sourceroute=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${tcp_keepalive} in
|
||||
[Nn][Oo])
|
||||
echo -n ' TCP keepalive=NO'
|
||||
sysctl -w net.inet.tcp.always_keepalive=0 >/dev/null
|
||||
sysctl net.inet.tcp.always_keepalive=0 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${tcp_drop_synfin} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' drop SYN+FIN packets=YES'
|
||||
sysctl -w net.inet.tcp.drop_synfin=1 >/dev/null
|
||||
sysctl net.inet.tcp.drop_synfin=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${ipxgateway_enable} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' IPX gateway=YES'
|
||||
sysctl -w net.ipx.ipx.ipxforwarding=1 >/dev/null
|
||||
sysctl net.ipx.ipx.ipxforwarding=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${arpproxy_all} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' ARP proxyall=YES'
|
||||
sysctl -w net.link.ether.inet.proxyall=1 >/dev/null
|
||||
sysctl net.link.ether.inet.proxyall=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -488,7 +488,7 @@ network_pass1() {
|
||||
;;
|
||||
*)
|
||||
echo -n " ip_portrange_first=$ip_portrange_first"
|
||||
sysctl -w net.inet.ip.portrange.first=$ip_portrange_first >/dev/null
|
||||
sysctl net.inet.ip.portrange.first=$ip_portrange_first >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -497,7 +497,7 @@ network_pass1() {
|
||||
;;
|
||||
*)
|
||||
echo -n " ip_portrange_last=$ip_portrange_last"
|
||||
sysctl -w net.inet.ip.portrange.last=$ip_portrange_last >/dev/null
|
||||
sysctl net.inet.ip.portrange.last=$ip_portrange_last >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -672,7 +672,7 @@ network_pass3() {
|
||||
case ${nfs_reserved_port_only} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' NFS on reserved port only=YES'
|
||||
sysctl -w vfs.nfsrv.nfs_privport=1 > /dev/null
|
||||
sysctl vfs.nfsrv.nfs_privport=1 > /dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -716,10 +716,10 @@ network_pass3() {
|
||||
[Yy][Ee][Ss])
|
||||
if [ -n "${nfs_access_cache}" ]; then
|
||||
echo -n " NFS access cache time=${nfs_access_cache}"
|
||||
sysctl -w vfs.nfs.access_cache_timeout=${nfs_access_cache} >/dev/null
|
||||
sysctl vfs.nfs.access_cache_timeout=${nfs_access_cache} >/dev/null
|
||||
fi
|
||||
if [ -n "${nfs_bufpackets}" ]; then
|
||||
sysctl -w vfs.nfs.bufpackets=${nfs_bufpackets} > /dev/null
|
||||
sysctl vfs.nfs.bufpackets=${nfs_bufpackets} > /dev/null
|
||||
fi
|
||||
;;
|
||||
esac
|
||||
@ -838,8 +838,8 @@ network_pass4() {
|
||||
;;
|
||||
*)
|
||||
echo -n ' log_in_vain=YES'
|
||||
sysctl -w net.inet.tcp.log_in_vain=1 >/dev/null
|
||||
sysctl -w net.inet.udp.log_in_vain=1 >/dev/null
|
||||
sysctl net.inet.tcp.log_in_vain=1 >/dev/null
|
||||
sysctl net.inet.udp.log_in_vain=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
|
@ -19,12 +19,12 @@ securelevel_start()
|
||||
#
|
||||
if [ -n "$securelevel" ]; then
|
||||
echo -n "Setting securelevel: "
|
||||
sysctl -w kern.securelevel=$securelevel
|
||||
sysctl kern.securelevel=$securelevel
|
||||
else
|
||||
securelevel=`sysctl -n kern.securelevel`
|
||||
if [ x"$securelevel" = x0 ]; then
|
||||
echo -n "Setting securelevel: "
|
||||
sysctl -w kern.securelevel=1
|
||||
sysctl kern.securelevel=1
|
||||
fi
|
||||
fi
|
||||
}
|
||||
|
@ -366,7 +366,7 @@ network_pass1() {
|
||||
case ${firewall_logging} in
|
||||
[Yy][Ee][Ss] | '')
|
||||
echo 'Firewall logging=YES'
|
||||
sysctl -w net.inet.ip.fw.verbose=1 >/dev/null
|
||||
sysctl net.inet.ip.fw.verbose=1 >/dev/null
|
||||
;;
|
||||
*)
|
||||
;;
|
||||
@ -409,77 +409,77 @@ network_pass1() {
|
||||
;;
|
||||
*)
|
||||
echo -n ' tcp extensions=NO'
|
||||
sysctl -w net.inet.tcp.rfc1323=0 >/dev/null
|
||||
sysctl net.inet.tcp.rfc1323=0 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${icmp_bmcastecho} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' broadcast ping responses=YES'
|
||||
sysctl -w net.inet.icmp.bmcastecho=1 >/dev/null
|
||||
sysctl net.inet.icmp.bmcastecho=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${icmp_drop_redirect} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' ignore ICMP redirect=YES'
|
||||
sysctl -w net.inet.icmp.drop_redirect=1 >/dev/null
|
||||
sysctl net.inet.icmp.drop_redirect=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${icmp_log_redirect} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' log ICMP redirect=YES'
|
||||
sysctl -w net.inet.icmp.log_redirect=1 >/dev/null
|
||||
sysctl net.inet.icmp.log_redirect=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${gateway_enable} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' IP gateway=YES'
|
||||
sysctl -w net.inet.ip.forwarding=1 >/dev/null
|
||||
sysctl net.inet.ip.forwarding=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${forward_sourceroute} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' do source routing=YES'
|
||||
sysctl -w net.inet.ip.sourceroute=1 >/dev/null
|
||||
sysctl net.inet.ip.sourceroute=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${accept_sourceroute} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' accept source routing=YES'
|
||||
sysctl -w net.inet.ip.accept_sourceroute=1 >/dev/null
|
||||
sysctl net.inet.ip.accept_sourceroute=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${tcp_keepalive} in
|
||||
[Nn][Oo])
|
||||
echo -n ' TCP keepalive=NO'
|
||||
sysctl -w net.inet.tcp.always_keepalive=0 >/dev/null
|
||||
sysctl net.inet.tcp.always_keepalive=0 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${tcp_drop_synfin} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' drop SYN+FIN packets=YES'
|
||||
sysctl -w net.inet.tcp.drop_synfin=1 >/dev/null
|
||||
sysctl net.inet.tcp.drop_synfin=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${ipxgateway_enable} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' IPX gateway=YES'
|
||||
sysctl -w net.ipx.ipx.ipxforwarding=1 >/dev/null
|
||||
sysctl net.ipx.ipx.ipxforwarding=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
case ${arpproxy_all} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' ARP proxyall=YES'
|
||||
sysctl -w net.link.ether.inet.proxyall=1 >/dev/null
|
||||
sysctl net.link.ether.inet.proxyall=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -488,7 +488,7 @@ network_pass1() {
|
||||
;;
|
||||
*)
|
||||
echo -n " ip_portrange_first=$ip_portrange_first"
|
||||
sysctl -w net.inet.ip.portrange.first=$ip_portrange_first >/dev/null
|
||||
sysctl net.inet.ip.portrange.first=$ip_portrange_first >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -497,7 +497,7 @@ network_pass1() {
|
||||
;;
|
||||
*)
|
||||
echo -n " ip_portrange_last=$ip_portrange_last"
|
||||
sysctl -w net.inet.ip.portrange.last=$ip_portrange_last >/dev/null
|
||||
sysctl net.inet.ip.portrange.last=$ip_portrange_last >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -672,7 +672,7 @@ network_pass3() {
|
||||
case ${nfs_reserved_port_only} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' NFS on reserved port only=YES'
|
||||
sysctl -w vfs.nfsrv.nfs_privport=1 > /dev/null
|
||||
sysctl vfs.nfsrv.nfs_privport=1 > /dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -716,10 +716,10 @@ network_pass3() {
|
||||
[Yy][Ee][Ss])
|
||||
if [ -n "${nfs_access_cache}" ]; then
|
||||
echo -n " NFS access cache time=${nfs_access_cache}"
|
||||
sysctl -w vfs.nfs.access_cache_timeout=${nfs_access_cache} >/dev/null
|
||||
sysctl vfs.nfs.access_cache_timeout=${nfs_access_cache} >/dev/null
|
||||
fi
|
||||
if [ -n "${nfs_bufpackets}" ]; then
|
||||
sysctl -w vfs.nfs.bufpackets=${nfs_bufpackets} > /dev/null
|
||||
sysctl vfs.nfs.bufpackets=${nfs_bufpackets} > /dev/null
|
||||
fi
|
||||
;;
|
||||
esac
|
||||
@ -838,8 +838,8 @@ network_pass4() {
|
||||
;;
|
||||
*)
|
||||
echo -n ' log_in_vain=YES'
|
||||
sysctl -w net.inet.tcp.log_in_vain=1 >/dev/null
|
||||
sysctl -w net.inet.udp.log_in_vain=1 >/dev/null
|
||||
sysctl net.inet.tcp.log_in_vain=1 >/dev/null
|
||||
sysctl net.inet.udp.log_in_vain=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
|
@ -109,7 +109,7 @@ network6_pass1() {
|
||||
case ${ipv6_firewall_logging} in
|
||||
[Yy][Ee][Ss] | '')
|
||||
echo 'IPv6 Firewall logging=YES'
|
||||
sysctl -w net.inet6.ip6.fw.verbose=1 >/dev/null
|
||||
sysctl net.inet6.ip6.fw.verbose=1 >/dev/null
|
||||
;;
|
||||
*)
|
||||
;;
|
||||
@ -139,8 +139,8 @@ network6_pass1() {
|
||||
case ${ipv6_gateway_enable} in
|
||||
[Yy][Ee][Ss])
|
||||
# act as a router
|
||||
sysctl -w net.inet6.ip6.forwarding=1
|
||||
sysctl -w net.inet6.ip6.accept_rtadv=0
|
||||
sysctl net.inet6.ip6.forwarding=1
|
||||
sysctl net.inet6.ip6.accept_rtadv=0
|
||||
|
||||
# wait for DAD
|
||||
for i in $ipv6_network_interfaces; do
|
||||
@ -151,8 +151,8 @@ network6_pass1() {
|
||||
;;
|
||||
*)
|
||||
# act as endhost - start with manual configuration
|
||||
sysctl -w net.inet6.ip6.forwarding=0
|
||||
sysctl -w net.inet6.ip6.accept_rtadv=0
|
||||
sysctl net.inet6.ip6.forwarding=0
|
||||
sysctl net.inet6.ip6.accept_rtadv=0
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -266,11 +266,11 @@ network6_pass1() {
|
||||
case ${ipv6_ipv4mapping} in
|
||||
[Yy][Ee][Ss])
|
||||
echo -n ' IPv4 mapped IPv6 address support=YES'
|
||||
sysctl -w net.inet6.ip6.v6only=0 >/dev/null
|
||||
sysctl net.inet6.ip6.v6only=0 >/dev/null
|
||||
;;
|
||||
'' | *)
|
||||
echo -n ' IPv4 mapped IPv6 address support=NO'
|
||||
sysctl -w net.inet6.ip6.v6only=1 >/dev/null
|
||||
sysctl net.inet6.ip6.v6only=1 >/dev/null
|
||||
;;
|
||||
esac
|
||||
|
||||
@ -340,7 +340,7 @@ network6_interface_setup() {
|
||||
# You can configure only single interface, as
|
||||
# specification assumes that autoconfigured host has
|
||||
# single interface only.
|
||||
sysctl -w net.inet6.ip6.accept_rtadv=1
|
||||
sysctl net.inet6.ip6.accept_rtadv=1
|
||||
set ${rtsol_interfaces}
|
||||
ifconfig $1 up
|
||||
rtsol $1
|
||||
@ -432,7 +432,7 @@ network6_faith_setup() {
|
||||
[Nn][Oo] | '')
|
||||
;;
|
||||
*)
|
||||
sysctl -w net.inet6.ip6.keepfaith=1
|
||||
sysctl net.inet6.ip6.keepfaith=1
|
||||
ifconfig faith0 up
|
||||
for prefix in ${ipv6_faith_prefix}; do
|
||||
prefixlen=`expr "${prefix}" : ".*/\(.*\)"`
|
||||
|
Loading…
Reference in New Issue
Block a user