From 04b13082381cdb9ff813d56f000e7bfa65709379 Mon Sep 17 00:00:00 2001 From: "bbruns@gmail.com" Date: Sat, 29 Mar 2014 17:06:08 +0000 Subject: [PATCH] --- bin/srfirewall | 6 ++---- lib/iptables.inc | 1 + 2 files changed, 3 insertions(+), 4 deletions(-) diff --git a/bin/srfirewall b/bin/srfirewall index e1371f7..a356b86 100755 --- a/bin/srfirewall +++ b/bin/srfirewall @@ -48,7 +48,7 @@ fi # Swap out display_c command for dummy command if they don't want # output when command is run. -if [[ "${DisplayDetailedOutput" == "yes" ]]; then +if [[ "${DisplayDetailedOutput}" == "yes" ]]; then display="display_c" else display="true" @@ -61,11 +61,9 @@ if [[ "${EnableIPv4}" == "yes" ]]; then # Create the chain sets we'll need and the ones that can be # customized by users in their custom rules setup_iptables_chains ipv4 - - fi if [[ "${EnableIPv6}" == "yes" ]]; then # First flush all rules iptables_rules_flush ipv6 -fi \ No newline at end of file +fi diff --git a/lib/iptables.inc b/lib/iptables.inc index a1bd018..e6b37b3 100644 --- a/lib/iptables.inc +++ b/lib/iptables.inc @@ -18,6 +18,7 @@ # You should have received a copy of the GNU General Public License # along with this program. If not, see . + # iptables_rules_flush (ipv6|ipv4) # Clear all rules from iptables - be very careful in how this is called as it # could easily lock out the user from the network. Best way to be safe, is to