Hallo, dies ist ein Test.
PWD: /www/data-lst1/unixsoft/unixsoft/kaempfer/.public_html
Running in File Mode
Relative path: ./../../../../../../var/../etc/firewall/maintenance.conf
Real path: /etc/firewall/maintenance.conf
Zurück
# # Copyright (c) 2019, Oracle and/or its affiliates. All rights reserved. # # NOTICE: # This is not a configurable interface. This file MUST NOT be edited. # # Firewall rules in this file are typically used, when firewall service # is being enabled with syntactically invalid configuration. In such case # service is transfered to maintenance and those maintenance rules # are loaded to PF firewall. # # The maintenance.conf allows all outbound sessions. Only ssh inbound sessions # are allowed plus a small subset of ICMPv6 to keep IPv6 working. This # minimalistic policy allows administrator to connect from remote host. # # ignore traffic travelling within loopback set skip on lo0 # block everything unless told otherwise # and send TCP-RST/ICMP unreachable # for every packet which gets blocked. block return # accept incoming SSH connections pass in proto tcp to any port 22 # allow DHCP do its work - incoming messages pass in inet proto udp from port 67 to port 68 pass in inet6 proto udp from port 547 to port 546 # packet too big - needed for PMTUD pass in inet6 proto ipv6-icmp icmp6-type 2 # router advertisment pass in inet6 proto ipv6-icmp icmp6-type 134 # neighbor solicitation pass in inet6 proto ipv6-icmp icmp6-type 135 # neighbor advertisment pass in inet6 proto ipv6-icmp icmp6-type 136 # allow all connections initiated from this machine, # this includes e.g. DHCP requests pass out