From 4c014605b8b228d4046344da99d3865da60de253 Mon Sep 17 00:00:00 2001 From: Alex Dubois Date: Sun, 10 Feb 2013 13:09:58 +0000 Subject: [PATCH] QubesFirewall changed --- QubesFirewall.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/QubesFirewall.md b/QubesFirewall.md index 0e944bae..1a4cce91 100644 --- a/QubesFirewall.md +++ b/QubesFirewall.md @@ -115,11 +115,11 @@ Make this file executable: sudo chmod +x /rw/config/rc.local ``` -**2. Allow packets to be routed from the netVM to the appVM** +**2. Allow packets to be routed from the firewallVM to the appVM** In System Tools (Dom0) / Terminal, take note of the appVM (on which the service is exposed) IPAddress using the command ` qvm-ls -n ` -In FirewallVM Terminal, take note of the IPAddress for interface eth0 using the command {{{ ifconfig | grep -i cast }}} +In FirewallVM Terminal, take note of the IPAddress for interface eth0 using the command ` ifconfig | grep -i cast ` Still in FirewallVM terminal, code the appropriate natting firewall rule to intercept traffic on the inbound interface for the service and nat the destination IP address to the one of the AppVM for the traffic to be routed there: