summaryrefslogtreecommitdiff
path: root/scripts/firewall
diff options
context:
space:
mode:
authorStig Thormodsrud <stig@vyatta.com>2009-07-10 16:50:03 -0700
committerStig Thormodsrud <stig@vyatta.com>2009-07-31 16:56:49 -0700
commit8519768fc563db29e29d9e81ca3198b7e003bc61 (patch)
tree16341106a8b8dba37e0b76f4b47b828ec4019bf1 /scripts/firewall
parent75f12b85f8ba35e54bcd457d11e90c8b2ba89fa9 (diff)
downloadvyatta-cfg-firewall-8519768fc563db29e29d9e81ca3198b7e003bc61.tar.gz
vyatta-cfg-firewall-8519768fc563db29e29d9e81ca3198b7e003bc61.zip
Fix 4683: Firewall Rule number maximum 1024 reached
(cherry picked from commit 90fb731c3a846e9a951c6fd1c5f73082e2bcf93a)
Diffstat (limited to 'scripts/firewall')
-rwxr-xr-xscripts/firewall/vyatta-firewall.pl6
1 files changed, 4 insertions, 2 deletions
diff --git a/scripts/firewall/vyatta-firewall.pl b/scripts/firewall/vyatta-firewall.pl
index 209791d..a14ef19 100755
--- a/scripts/firewall/vyatta-firewall.pl
+++ b/scripts/firewall/vyatta-firewall.pl
@@ -24,6 +24,8 @@ my $syslog_flag = 0;
my $fw_stateful_file = '/var/run/vyatta_fw_stateful';
my $fw_tree_file = '/var/run/vyatta_fw_trees';
+my $max_rule = 10000;
+
my (@setup, @updateints, @updaterules);
my ($teardown, $teardown_ok);
@@ -705,7 +707,7 @@ sub set_default_policy {
$policy = 'drop' if ! defined $policy;
log_msg("set_default_policy($iptables_cmd, $table, $chain, $policy)\n");
my $target = $policy_hash{$policy};
- my $comment = "-m comment --comment \"$chain-1025 default-action $policy\"";
+ my $comment = "-m comment --comment \"$chain-$max_rule default-action $policy\"";
run_cmd("$iptables_cmd -t $table -A $chain $comment -j $target", 1, 1);
}
@@ -726,7 +728,7 @@ sub change_default_policy {
$policy = 'drop' if ! defined $policy;
log_msg("change_default_policy($iptables_cmd, $table, $chain, $policy)\n");
my $target = $policy_hash{$policy};
- my $comment = "-m comment --comment \"$chain-1025 default-action $policy\"";
+ my $comment = "-m comment --comment \"$chain-$max_rule default-action $policy\"";
my $default_rule = count_iptables_rules($table, $chain, $iptables_cmd);
run_cmd("$iptables_cmd -t $table -A $chain $comment -j $target", 1, 1);
run_cmd("$iptables_cmd -t $table -D $chain $default_rule", 1, 1);