Searched refs:ip6tables (Results 1 – 12 of 12) sorted by relevance
16 if ip6tables-legacy --version >/dev/null 2>&1; then17 ip6tables='ip6tables-legacy'18 elif ip6tables --version >/dev/null 2>&1; then19 ip6tables='ip6tables'21 ip6tables=''30 if [ -z "$iptables$ip6tables$nft" ]; then67 [ -n "$ip6tables" ] && ip netns exec "$ns2" \68 "$ip6tables" -t raw -A PREROUTING -s fec0::/16 -m rpfilter107 [ -n "$ip6tables" ] && ip netns exec "$ns2" "$ip6tables" -t raw -Z122 ipt_zero_rule "$ip6tables" || die "ip6tables matched martian"[all …]
20 for t in iptables ip6tables; do96 ip6tables -V > /dev/null 2>&1110 tables=ip6tables302 ip netns exec "$ns1" ip6tables -F
140 if ! ip6tables -V &> /dev/null; then
75 ip6tables is a general, extensible packet identification framework.234 This option adds a `raw' table to ip6tables. This table is the very253 tristate "ip6tables NAT support"259 This enables the `nat' table in ip6tables. This allows masquerading,
109 ipt=ip6tables196 IPT=ip6tables
53 ip netns exec "${NETNS}" ip6tables -A INPUT -m conntrack --ctstate INVALID -j ACCEPT
71 local addr1 addr2 pid family="" ipt_cmd=ip6tables
164 ip netns exec "${RELAY}" ip6tables -t mangle -I PREROUTING \
3932 run_cmd ip6tables -A INPUT -p tcp --dport 12345 -j REJECT --reject-with tcp-reset3939 run_cmd ip6tables -F3940 run_cmd ip6tables -A INPUT -p tcp --dport 12345 -j REJECT --reject-with icmp6-port-unreachable3941 run_cmd ip6tables -A INPUT -p udp --dport 12345 -j REJECT --reject-with icmp6-port-unreachable3947 ip6tables -F4113 …run_cmd ip6tables -t nat -A POSTROUTING -p tcp -m tcp --dport ${port} -j SNAT --to-source ${NSA_LO…4127 …run_cmd ip6tables -t nat -D POSTROUTING -p tcp -m tcp --dport ${port} -j SNAT --to-source ${NSA_LO…
1869 ip6tables -t mangle -L OUTPUT &> /dev/null1968 $NS_EXEC ip6tables -t mangle -A OUTPUT -j MARK --set-mark 11975 $NS_EXEC ip6tables -t mangle -D OUTPUT -j MARK --set-mark 1
2636 bridge-nf-call-ip6tables - BOOLEAN2637 - 1 : pass bridged IPv6 traffic to ip6tables' chains.
429 controlled by iptables, ip6tables or nft.