# this file is not parsed, but simply sourced # the source interface (only these packets will be filtered) IF_SRC=eth1 # the server where all first packets get redirected to (on most # embedded systems it should be an IP address instead of a name) SPLASH_SERVER=192.168.1.1 # templates for the rules to manage forwarding rules (_IP_ will be substituted by the host's IP) RULE_ADD='$IPT -t nat -I $CHAIN_FORWARD_CHECK -s _IP_ -j $CHAIN_FORWARD_ACTION' RULE_DEL='$IPT -t nat -D $CHAIN_FORWARD_CHECK -s _IP_ -j $CHAIN_FORWARD_ACTION' # the iptables chain, that contains all forwarded ips CHAIN_FORWARD_CHECK=web_splash_forward_check CHAIN_FORWARD_ACTION=web_splash_forward_action CHAIN_REDIRECT=web_splash_redirect # the iptables action for bad packets (e.g. DROP or REJECT) REJECT_ACTION=DROP # the location of the iptables program IPT=/sbin/iptables [ ! -x "$IPT" ] && IPT=/usr/sbin/iptables