firewall: provide examples of ssh port relocation on firewall and IPsec passthrough...
authorJo-Philipp Wich <jow@openwrt.org>
Mon, 2 May 2011 12:54:31 +0000 (12:54 +0000)
committerJo-Philipp Wich <jow@openwrt.org>
Mon, 2 May 2011 12:54:31 +0000 (12:54 +0000)
commitad23dd94b6a2c913ec1fac64a34befc472b0c552
treee6738c2df81e1715318e027f74659915284a2ad1
parent8324bf036c736a49b0d27612ba08d9596556a7cf
firewall: provide examples of ssh port relocation on firewall and IPsec passthrough Two examples of potentially useful configurations (commented out, of course):

(a) map the ssh service running on the firewall to 22001 externally, without modifying the configuration of the daemon itself. this allows port 22 on the WAN side to then be port-forwarded to a
LAN-based machine if desired, or if not, simply obscures the port from external attack.

(b) allow IPsec/ESP and ISAKMP (UDP-based key exchange) to happen by default. useful for most modern VPN clients you might have on your WAN.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
SVN-Revision: 26805
package/firewall/files/firewall.config
package/firewall/files/lib/core_interface.sh