View | Details | Raw Unified | Return to bug 32822
Collapse All | Expand All

(-)550.ipfwlimit (+1 lines)
Lines 44-49 Link Here
44
case "$daily_status_security_ipfwlimit_enable" in
44
case "$daily_status_security_ipfwlimit_enable" in
45
    [Yy][Ee][Ss])
45
    [Yy][Ee][Ss])
46
	IPFW_LOG_LIMIT=`sysctl -n net.inet.ip.fw.verbose_limit 2> /dev/null`
46
	IPFW_LOG_LIMIT=`sysctl -n net.inet.ip.fw.verbose_limit 2> /dev/null`
47
	test -z "${IPFW_LOG_LIMIT}" && IPFW_LOG_LIMIT=0
47
	if [ $? -eq 0 -a "${IPFW_LOG_LIMIT}" -ne 0 ]; then
48
	if [ $? -eq 0 -a "${IPFW_LOG_LIMIT}" -ne 0 ]; then
48
	    ipfw -a l | grep " log " | perl -n -e \
49
	    ipfw -a l | grep " log " | perl -n -e \
49
		'/^\d+\s+(\d+)/; print if ($1 >= '$IPFW_LOG_LIMIT')' > ${TMP}
50
		'/^\d+\s+(\d+)/; print if ($1 >= '$IPFW_LOG_LIMIT')' > ${TMP}
(-)650.ip6fwlimit (+1 lines)
Lines 44-49 Link Here
44
case "$daily_status_security_ip6fwlimit_enable" in
44
case "$daily_status_security_ip6fwlimit_enable" in
45
    [Yy][Ee][Ss])
45
    [Yy][Ee][Ss])
46
	IP6FW_LOG_LIMIT=`sysctl -n net.inet6.ip6.fw.verbose_limit 2> /dev/null`
46
	IP6FW_LOG_LIMIT=`sysctl -n net.inet6.ip6.fw.verbose_limit 2> /dev/null`
47
	test -z "${IP6FW_LOG_LIMIT}" && IP6FW_LOG_LIMIT=0
47
	if [ $? -eq 0 -a "${IP6FW_LOG_LIMIT}" -ne 0 ]; then
48
	if [ $? -eq 0 -a "${IP6FW_LOG_LIMIT}" -ne 0 ]; then
48
	    ip6fw -a l | grep " log " | perl -n -e \
49
	    ip6fw -a l | grep " log " | perl -n -e \
49
		'/^\d+\s+(\d+)/; print if ($1 >= '$IP6FW_LOG_LIMIT')' > ${TMP}
50
		'/^\d+\s+(\d+)/; print if ($1 >= '$IP6FW_LOG_LIMIT')' > ${TMP}

Return to bug 32822