
| Current Path : /var/www/web-klick.de/dsh/ |
Linux ift1.ift-informatik.de 5.4.0-216-generic #236-Ubuntu SMP Fri Apr 11 19:53:21 UTC 2025 x86_64 |
| Current File : /var/www/web-klick.de/dsh/rc.local |
#!/bin/bash #!/bin/sh -e # # rc.local # # This script is executed at the end of each multiuser runlevel. # Make sure that the script will "exit 0" on success or any other # value on error. # # In order to enable or disable this script just change the execution # bits. # # By default this script does nothing. #sleep 2 #ifconfig wlan0 up #sleep 2 #iwconfig wlan0 essid <NETWORK> # <--- Uncomment when you use WLAN WEP0 #iwconfig wlan0 key 8AB348AB34 # <--- Uncomment when you use WLAN WEP0 #iwconfig wlan0 mode Managed # <--- Uncomment when you use WLAN WEP0 #wpa_supplicant -B -iwlan0 -c/etc/wpa_supplicant.conf -Dwext # <--- Uncomment when you use WLAN WPA # ifconfig eth0 192.168.153.93 chmod 777 /dev/fb0 iptables -P INPUT ACCEPT iptables -P OUTPUT ACCEPT iptables -P FORWARD ACCEPT iptables -t nat -P PREROUTING ACCEPT iptables -t nat -P OUTPUT ACCEPT iptables -t nat -P POSTROUTING ACCEPT iptables -t nat -A POSTROUTING -o wlan0 -j MASQUERADE iptables -t nat -A POSTROUTING -o wlan1 -j MASQUERADE iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE iptables -t nat -A POSTROUTING -o tap0 -j MASQUERADE iptables -t nat -A POSTROUTING -o tun0 -j MASQUERADE iptables -t nat -A POSTROUTING -o vmnet8 -j MASQUERADE iptables -t nat -A POSTROUTING -o vboxnet0 -j MASQUERADE iptables -t nat -A POSTROUTING -o enp5s0 -j MASQUERADE sysctl -w net.ipv4.ip_forward=1 sh /etc/blocked.sh sh /home/ift/restart.sh exit 0