<feed xmlns='http://www.w3.org/2005/Atom'>
<title>vyatta-cfg-firewall.git/scripts, branch jenner</title>
<subtitle>Configuration templates and scripts for the firewall subsystem. (mirror of https://github.com/vyos/vyatta-cfg-firewall.git)
</subtitle>
<id>https://git.amelek.net/vyos/vyatta-cfg-firewall.git/atom?h=jenner</id>
<link rel='self' href='https://git.amelek.net/vyos/vyatta-cfg-firewall.git/atom?h=jenner'/>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyatta-cfg-firewall.git/'/>
<updated>2009-07-31T23:01:30+00:00</updated>
<entry>
<title>Another attempt to fix 4760.</title>
<updated>2009-07-31T23:01:30+00:00</updated>
<author>
<name>Stig Thormodsrud</name>
<email>stig@vyatta.com</email>
</author>
<published>2009-07-31T23:01:30+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyatta-cfg-firewall.git/commit/?id=4dadce6ebca29e6f6d7120a44541fd99034417f2'/>
<id>urn:sha1:4dadce6ebca29e6f6d7120a44541fd99034417f2</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Fix 4683: Firewall Rule number maximum 1024 reached</title>
<updated>2009-07-10T23:50:03+00:00</updated>
<author>
<name>Stig Thormodsrud</name>
<email>stig@vyatta.com</email>
</author>
<published>2009-07-10T23:50:03+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyatta-cfg-firewall.git/commit/?id=90fb731c3a846e9a951c6fd1c5f73082e2bcf93a'/>
<id>urn:sha1:90fb731c3a846e9a951c6fd1c5f73082e2bcf93a</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Fix 4581: Firewall name issue causes failed commit</title>
<updated>2009-06-14T18:14:37+00:00</updated>
<author>
<name>Stig Thormodsrud</name>
<email>stig@vyatta.com</email>
</author>
<published>2009-06-14T18:14:37+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyatta-cfg-firewall.git/commit/?id=a4521d45fa8deb8b3431579d5b3bc2016592fbdc'/>
<id>urn:sha1:a4521d45fa8deb8b3431579d5b3bc2016592fbdc</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Change firewall default-policy to default-action.</title>
<updated>2009-06-03T01:47:41+00:00</updated>
<author>
<name>Stig Thormodsrud</name>
<email>stig@vyatta.com</email>
</author>
<published>2009-06-03T01:47:41+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyatta-cfg-firewall.git/commit/?id=c5795f63dea325bc4a1f9a1f02b6b0d510731ffb'/>
<id>urn:sha1:c5795f63dea325bc4a1f9a1f02b6b0d510731ffb</id>
<content type='text'>
</content>
</entry>
<entry>
<title>explicitly set conntrack table size to 16384 on system boot</title>
<updated>2009-05-27T20:59:04+00:00</updated>
<author>
<name>Mohit Mehta</name>
<email>mohit.mehta@vyatta.com</email>
</author>
<published>2009-05-27T20:59:04+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyatta-cfg-firewall.git/commit/?id=4e3586d818580ecc8b9721f3bb47f3efa6d67a5e'/>
<id>urn:sha1:4e3586d818580ecc8b9721f3bb47f3efa6d67a5e</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Add 'reject' as a configurable value for default-policy</title>
<updated>2009-05-11T23:54:02+00:00</updated>
<author>
<name>Mohit Mehta</name>
<email>mohit.mehta@vyatta.com</email>
</author>
<published>2009-05-11T23:54:02+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyatta-cfg-firewall.git/commit/?id=7820d87bcf833391f4b2dbbc90bee57dfa91f545'/>
<id>urn:sha1:7820d87bcf833391f4b2dbbc90bee57dfa91f545</id>
<content type='text'>
under name and ipv6-name rulesets
</content>
</entry>
<entry>
<title>Fix Bug 4388 firewall name shouldn't have been set after commit failed</title>
<updated>2009-05-09T00:14:04+00:00</updated>
<author>
<name>Mohit Mehta</name>
<email>mohit.mehta@vyatta.com</email>
</author>
<published>2009-05-09T00:14:04+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyatta-cfg-firewall.git/commit/?id=c690c60ff29d8ee2f3f62bc38d99c05f3300002f'/>
<id>urn:sha1:c690c60ff29d8ee2f3f62bc38d99c05f3300002f</id>
<content type='text'>
* undo chain setup and refcnt work if chain rule failed during chain creation
</content>
</entry>
<entry>
<title>Bugfix 4340:  Enable net.netfilter.nf_conntrack_tcp_be_liberal by default.</title>
<updated>2009-05-08T20:36:18+00:00</updated>
<author>
<name>Bob Gilligan</name>
<email>gilligan@vyatta.com</email>
</author>
<published>2009-05-08T20:36:18+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyatta-cfg-firewall.git/commit/?id=2cc639cacae969af4f36a7b587f86ac479ebe729'/>
<id>urn:sha1:2cc639cacae969af4f36a7b587f86ac479ebe729</id>
<content type='text'>
The parameter in question loosens the "acceptability" check on TCP
sequence and ACK numbers in the TCP conntrack module.  This allows connection
tracking to survive certain cases where packet loss would cause it to
loose sync with the TCP endpoints.
</content>
</entry>
<entry>
<title>* don't allow user to create a chain that exists in the system. This may be</title>
<updated>2009-05-05T18:34:06+00:00</updated>
<author>
<name>Mohit Mehta</name>
<email>mohit.mehta@vyatta.com</email>
</author>
<published>2009-05-05T18:34:06+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyatta-cfg-firewall.git/commit/?id=af9b647c46b09a8ad84b68264fd2bfb65c9dd98e'/>
<id>urn:sha1:af9b647c46b09a8ad84b68264fd2bfb65c9dd98e</id>
<content type='text'>
  either vyatta/user defined chains or system chains such as INPUT, OUTPUT etc.
* don't allow user to create chains with name starting from 'VZONE'. This is
  reserved for zone chains created by us.
</content>
</entry>
<entry>
<title>* setup table only for specific tree, not both filter and mangle</title>
<updated>2009-05-01T23:25:39+00:00</updated>
<author>
<name>Mohit Mehta</name>
<email>mohit.mehta@vyatta.com</email>
</author>
<published>2009-05-01T23:25:39+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyatta-cfg-firewall.git/commit/?id=7b34e9152366c6e60720bc065b4e3d1cd57b7fa6'/>
<id>urn:sha1:7b34e9152366c6e60720bc065b4e3d1cd57b7fa6</id>
<content type='text'>
  as we teardown table only for the tree that was in the CLI
* remove 'next' statement for removed for loop
* fix Bug 4244 - Committing firewall changes breaks WAN Load-balancing (WLB)
  we only delete chains that are configured under firewall and don't touch
  chains that might be owned by other features such as zone based firewall, WLB
* remove unused code, code cleanup
</content>
</entry>
</feed>
