Код: Выделить всё
rfw_name=127.0.0.1
firewall_path=/sbin/iptables
firewall_flush_cmd=/sbin/iptables -F
firewall_type=local
sudo_path=/usr/bin/sudo
log_level=10
core_host=127.0.0.1
core_port=11758
rfw_login=web
rfw_password=***
log_level=3
log_file_main=/netup/utm5/log/rfw-main.log
log_file_debug=/netup/utm5/log/rfw-debug.log
log_file_critical=/netup/utm5/log/rfw-critical.log
# uncomment this line if you want to start firewall rules one after another
dont_fork=yes
Код: Выделить всё
nobody 5976 1 0 14:01 ? 00:00:00 /netup/utm5/bin/utm5_rfw
Код: Выделить всё
?Debug : May 22 14:08:48 RFW URFA[plugin]: Got 'exec' command...
?Debug : May 22 14:08:48 FWCntl: Executing command </usr/bin/sudo>
?Debug : May 22 14:08:48 FWCntl: Waiting second child process ... second child pid <6898>
?Debug : May 22 14:08:48 FWCntl: Second child process <6898> exited with status <512>
?Debug : May 22 14:08:48 FWCntl: Executing FW rule: /sbin/iptables -A FORWARD -s 172.16.0.100/32 -j ACCEPT is done.
Код: Выделить всё
$ sudo /sbin/iptables -A FORWARD -s 172.16.0.100/32 -j ACCEPT
$ sudo iptables --list
Chain FORWARD (policy DROP)
target prot opt source destination
ACCEPT 0 -- 172.16.0.100 anywhere
$ id
uid=65534(nobody) gid=65534(nogroup) группы=65534(nogroup)