# #
###############################################################################
-function policy_zone_add() {
+policy_zone_add() {
local zone=${1}
assert isset zone
done
}
-function policy_zone_masquerade4() {
+policy_zone_masquerade4() {
local zone=${1}
assert isset zone
-j MASQUERADE --random
}
-function policy_zone_allow_all() {
+policy_zone_allow_all() {
local zone=${1}
assert isset zone
iptables -A "${chain}" -m conntrack --ctstate NEW -j ACCEPT
}
-function policy_zone_deny_all() {
+policy_zone_deny_all() {
local zone=${1}
assert isset zone
iptables -A "${chain}" -j DROP
}
-function policy_drop_all() {
+policy_drop_all() {
# Nothing to do here, because that is the
# default policy of the INPUT/OUTPUT/FORWARD chain.
:
}
-function policy_import_all_rules() {
+policy_import_all_rules() {
# This will populate all chains with the rules
# for the given zone.
# -A ${chain}_RULES_INC
}
-function policy_load() {
+policy_load() {
local zone_from=${1}
assert isset zone_from