summaryrefslogtreecommitdiff
path: root/package/firewall/files/firewall.user
diff options
context:
space:
mode:
authorjow <jow@3c298f89-4303-0410-b956-a3cf2f4a3e73>2011-05-02 12:54:31 +0000
committerjow <jow@3c298f89-4303-0410-b956-a3cf2f4a3e73>2011-05-02 12:54:31 +0000
commit667c11ec829a7484032012fd6098b9fcb4bf02d6 (patch)
tree873baee5758beda5d26b4efb77009a9892f8689d /package/firewall/files/firewall.user
parentac6cfcb956860f0ce396bfd2029e367b541343e1 (diff)
[PATCH] firewall: provide examples of ssh port relocation on firewall and IPsec passthrough
Two examples of potentially useful configurations (commented out, of course): (a) map the ssh service running on the firewall to 22001 externally, without modifying the configuration of the daemon itself. this allows port 22 on the WAN side to then be port-forwarded to a LAN-based machine if desired, or if not, simply obscures the port from external attack. (b) allow IPsec/ESP and ISAKMP (UDP-based key exchange) to happen by default. useful for most modern VPN clients you might have on your WAN. Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com> git-svn-id: svn://svn.openwrt.org/openwrt/trunk@26805 3c298f89-4303-0410-b956-a3cf2f4a3e73
Diffstat (limited to 'package/firewall/files/firewall.user')
0 files changed, 0 insertions, 0 deletions