565,8 → 565,6 |
$SED "s?^EXTIF=.*?EXTIF=\"$EXTIF\"?g" $DIR_DEST_BIN/alcasar-iptables.sh $DIR_DEST_BIN/alcasar-iptables-bypass.sh |
$SED "s?^INTIF=.*?INTIF=\"$INTIF\"?g" $DIR_DEST_BIN/alcasar-iptables.sh $DIR_DEST_BIN/alcasar-iptables-bypass.sh |
chmod o+r $DIR_DEST_BIN/alcasar-iptables.sh #lecture possible pour apache (interface php du filtrage réseau) |
# create the filter exception file and ip_bloqued file |
touch $DIR_DEST_ETC/alcasar-filter-exceptions |
# create the ip_blocked file with a first line (LAN between ALCASAR and the Internet GW) |
echo "#$PUBLIC_NETWORK/$PUBLIC_PREFIX LAN-ALCASAR-BOX" > $DIR_DEST_ETC/alcasar-ip-blocked |
# load conntrack ftp module |
949,7 → 947,7 |
After=network.target |
|
[Service] |
Type=oneshot |
Type=forking |
ExecStart=/usr/libexec/chilli start |
ExecStop=/usr/libexec/chilli stop |
ExecReload=/usr/libexec/chilli reload |
1073,8 → 1071,8 |
uamsecret $secretuam |
uamallowed $HOSTNAME,$HOSTNAME.$DOMAIN |
coaport 3799 |
#conup $DIR_DEST_BIN/alcasar-conup.sh |
#condown $DIR_DEST_BIN/alcasar-condown.sh |
conup $DIR_DEST_BIN/alcasar-conup.sh |
condown $DIR_DEST_BIN/alcasar-condown.sh |
include $DIR_DEST_ETC/alcasar-uamallowed |
include $DIR_DEST_ETC/alcasar-uamdomain |
#dhcpgateway |
1364,7 → 1362,7 |
server=$DNS1 |
server=$DNS2 |
EOF |
# 3rd dnsmasq listen on udp 55 ("dnsmasq with whitelis") |
# 3rd dnsmasq listen on udp 55 ("dnsmasq with whitelist") |
cat << EOF > /etc/dnsmasq-whitelist.conf |
# Configuration file for "dnsmasq with whitelist" |
# Inclusion de la whitelist <domains> de Toulouse dans la configuration |