GithubHelp home page GithubHelp logo

sonertari / pffw Goto Github PK

View Code? Open in Web Editor NEW
61.0 6.0 9.0 4.29 MB

PF Firewall on OpenBSD

License: GNU General Public License v3.0

Shell 2.66% PHP 90.15% HTML 5.42% CSS 0.72% Perl 1.05%
packet-filter firewall openbsd web-ui android-ui windows-ui installation-iso pfre notifications pffw

pffw's People

Contributors

sonertari avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar

pffw's Issues

can't modify dns

system config network
when i change the Nameserver ip to 192.168.2.2
dns log will show :
dnsmasq
reading /etc/resolv.conf
using nameserver 192.168.2.1

dns will restore to 192.168.2.1

PPPOE server Feature

Hi
I been reading and trying to find it lot but my eyes been always been around this project if this could implement as pppoe server would be great alternative to winbox and mikrotik.

add some features

packet filter info states

Add kill function after each line of connection
we can use pfctl -k to kill some state

Of course, it is also possible to add a one-key block function to each connection

-K host | network
Kill all of the source tracking entries originating from the specified host
or network. A second -K host or -K network option may be specified, which
will kill all the source tracking entries from the first host/network to the
second.

-k host | network
Kill all of the state entries originating from the specified host or network.
A second -k host or -k network option may be specified, which will kill all
the state entries from the first host/network to the second. For example, to
kill all of the state entries originating from ``host'':

               # pfctl -k host

         To kill all of the state entries from ``host1'' to ``host2'':

               # pfctl -k host1 -k host2

         To kill all states originating from 192.168.1.0/24 to 172.16.0.0/16:

               # pfctl -k 192.168.1.0/24 -k 172.16.0.0/16

         A network prefix length of 0 can be used as a wildcard.  To kill all states
         with the target ``host2'':

               # pfctl -k 0.0.0.0/0 -k host2

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.