Lines Matching full:through
69 allows all packets through except for those matching a set of rules.
71 through.
76 particular port you want to let through.
119 to pass through all packets.
157 internal addresses access to the Internet through a NAT gateway running
180 reign on our internal network when operating services through
185 risk and force everything coming in via LAN0 to go through
200 # through the firewall.
202 # NOTE: heavily loaded services running through the firewall may require
250 # NOT have to run internal requests to exposed hosts through natd
253 # of course do not have to route internal<->internal traffic through
265 # Short cut the rules to avoid running high bandwidths through
266 # the entire rule set. Allow established tcp connections through,
270 # Allowing established tcp connections through creates a small
322 # We allow specific UDP services through: DNS lookups, ntalk, and ntp.
340 # through but do not actually run an identd server on any exposed
345 # Note that we do not allow tcp fragments through, and that we do
354 # It is important to allow certain ICMP types through, here is a list
356 # through.
375 # log any remaining fragments that get through. Might be useful,