Date: Thu, 30 Jun 2016 07:18:00 +0000 From: =?utf-8?Q?Abby=20|=20Kingfast=20SSD?= <abbywen1@126.com> To: <freebsd-users-jp@FreeBSD.org> Subject: [FreeBSD-users-jp 95829] =?utf-8?q?Save_your_cost_with_Kingfast_SSD?= Message-ID: <ff6f7e858a570f49a56fed27090bd6cf38c.20160630071752@mail67.atl11.rsgsv.net>
next in thread | raw e-mail | index | archive | help
View this email in your browser (http://us13.campaign-archive1.com/?u=ff6f7e858a570f49a56fed270&id=5b0bf11266&e=90bd6cf38c) ** A Letter From The Sales Manager ------------------------------------------------------------ Dear Friend, Good Day. This is Abby from Kingfast SSD, we are one of the leading and professional manufacturer of High-Tech SSD(Solid State Drive) products in China. We provide a wide range of SSD products with different interfaces/capacities to Consumer, enterprise and industrial customers. Our Advantage: KingFast provide 3 year warranty for ALL SSDs. KingFast built a longterm business with customers around the world. KingFast would like to join you to get win win. Please contact us if any interest for more information about product, data sheet and prices. Thank and Regards, Sincerely, Abby Wen Sales Manager, Kingfast SSD Manufacturer ============================================================ Copyright © 2016, Kingfast SSD Manufacturer, All rights reserved. Our mailing address is: abby@kfast.com.cn | abbyw@kfast.com.cn This email was sent to freebsd-users-jp@FreeBSD.org (mailto:freebsd-users-jp@FreeBSD.org) why did I get this? (http://kfast.us13.list-manage.com/about?u=ff6f7e858a570f49a56fed270&id=dbd878d97a&e=90bd6cf38c&c=5b0bf11266) unsubscribe from this list (http://kfast.us13.list-manage.com/unsubscribe?u=ff6f7e858a570f49a56fed270&id=dbd878d97a&e=90bd6cf38c&c=5b0bf11266) update subscription preferences (http://kfast.us13.list-manage.com/profile?u=ff6f7e858a570f49a56fed270&id=dbd878d97a&e=90bd6cf38c) Shenzhen New KingFast Storage Technology CO.,Ltd . #601,2rd building,Block A, Bao'an Internet industry park,Bao'An District . Shenzhen, 44 518000 . China Email Marketing Powered by MailChimp http://www.mailchimp.com/monkey-rewards/?utm_source=freemium_newsletter&utm_medium=email&utm_campaign=monkey_rewards&aid=ff6f7e858a570f49a56fed270&afl=1 From owner-freebsd-users-jp@freebsd.org Thu Jun 30 08:39:55 2016 Return-Path: <owner-freebsd-users-jp@freebsd.org> Delivered-To: freebsd-users-jp@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id F3AECB87851 for <freebsd-users-jp@mailman.ysv.freebsd.org>; Thu, 30 Jun 2016 08:39:55 +0000 (UTC) (envelope-from maruyama@ism.ac.jp) Received: from garbha.ism.ac.jp (garbha.ism.ac.jp [133.58.120.13]) by mx1.freebsd.org (Postfix) with ESMTP id 964022FE7 for <freebsd-users-jp@freebsd.org>; Thu, 30 Jun 2016 08:39:55 +0000 (UTC) (envelope-from maruyama@ism.ac.jp) Received: from indra.ism.ac.jp (garbha.ism.ac.jp [133.58.120.13]) by garbha.ism.ac.jp (8.15.2/8.15.2) with ESMTPS id u5U8dqdO054223 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits%6 verify=NO); Thu, 30 Jun 2016 17:39:52 +0900 (JST) (envelope-from maruyama@ism.ac.jp) Received: (from maruyama@localhost) by indra.ism.ac.jp (8.15.2/8.15.2/Submit) id u5U8dpjF016375; Thu, 30 Jun 2016 17:39:51 +0900 (JST) (envelope-from maruyama@ism.ac.jp) X-Authentication-Warning: indra.ism.ac.jp: maruyama set sender to maruyama@ism.ac.jp using -f From: maruyama@ism.ac.jp (=?iso-2022-jp?B?GyRCNF07M0Q+PjsbKEI=?=) To: Akihiro HIRANO <hirano@t.kanazawa-u.ac.jp> Cc: freebsd-users-jp@freebsd.org In-Reply-To: <54a8b85f-54a4-0761-3acb-5acbcaccc534@t.kanazawa-u.ac.jp> (message from Akihiro HIRANO on Thu, 30 Jun 2016 16:12:43 +0900) Organization: =?iso-2022-jp?B?GyRCRX03Vz90TX04JjVmPWobKEI=?Reply-To: maruyama@ism.ac.jp Date: Thu, 30 Jun 2016 17:39:51 +0900 Message-ID: <ydlk2h783zc.fsf@indra.ism.ac.jp> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-2022-jp Subject: [FreeBSD-users-jp 95830] Re: =?iso-2022-jp?b?aXBmdxskQiRIGyhCRE5T?X-BeenThere: freebsd-users-jp@freebsd.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: Discussion relevant to FreeBSD communities in Japan <freebsd-users-jp.freebsd.org> List-Unsubscribe: <https://lists.freebsd.org/mailman/options/freebsd-users-jp>, <mailto:freebsd-users-jp-request@freebsd.org?subject=unsubscribe> List-Archive: <http://lists.freebsd.org/pipermail/freebsd-users-jp/> List-Post: <mailto:freebsd-users-jp@freebsd.org> List-Help: <mailto:freebsd-users-jp-request@freebsd.org?subject=help> List-Subscribe: <https://lists.freebsd.org/mailman/listinfo/freebsd-users-jp>, <mailto:freebsd-users-jp-request@freebsd.org?subject=subscribe> X-List-Received-Date: Thu, 30 Jun 2016 08:39:56 -0000 $BJ?Ln(B $BMM(B $B4];3$G$9!#(B Thu, 30 Jun 2016 16:12:43 +0900 Akihiro HIRANO <hirano@t.kanazawa-u.ac.jp> writes: >$B!!;Y>c$,$J$1$l$P!"!V(Bipfw list$B!W$N7k2L$r<($7$FD:$/$N$,AaF;$@$H;W$$$^$9!#(B $B$O$$!#(B $B<B83(B1(PC-BSD10.3) /etc/ipfw.custom (PC-BSD$B$N=P2YCM!"Cf$O%3%a%s%H$@$1(B) /etc/ipfw.openports (PC-BSD$B$N=P2YCM!"(Budp 5353, tcp 22$B$@$1(B) /etc/ipfw.rules (PC-BSD$B$N=P2YCM!"$3$N%a!<%k$NKvHx$KF1Iu(B) # ipfw list 00020 allow ip from any to any via lo0 01000 check-state 01050 allow tcp from any to any established 01100 allow udp from any to any established 02000 allow ip from any to any out keep-state 02050 allow ip6 from any to any out keep-state 02100 allow ipv6-icmp from any to any keep-state 02150 allow icmp from any to any keep-state 10000 allow udp from any to any dst-port 5353 in keep-state 10001 allow tcp from any to any dst-port 22 in keep-state 64000 deny log ip from any to any 65535 allow ip from any to any $B$3$N>uBV$G$O(B dig @133.58.32.12 ism.ac.jp ns $B$O@5>o$K7k2L$rI=<(!#(B $B<B83(B2(PC-BSD10.3) /etc/ipfw.custom ipfw -q add 110 allow ip from 133.58.124.49 to any $B$@$1!#$3$3$K!!(B133.58.124.49 $B$O(B DNS$B%5!<%P!<(B 133.58.32.12 $B$K7R$,$k%$%s%?!<(B $B%U%'!<%9!#(B /etc/ipfw.openports (PC-BSD$B$N=P2YCM!"(Budp 5353, tcp 22$B$@$1(B) /etc/ipfw.rules (PC-BSD$B$N=P2YCM!"$3$N%a!<%k$NKvHx$KF1Iu(B) # ipfw list 00020 allow ip from any to any via lo0 00110 allow ip from 133.58.124.49 to any 01000 check-state 01050 allow tcp from any to any established 01100 allow udp from any to any established 02000 allow ip from any to any out keep-state 02050 allow ip6 from any to any out keep-state 02100 allow ipv6-icmp from any to any keep-state 02150 allow icmp from any to any keep-state 10000 allow udp from any to any dst-port 5353 in keep-state 10001 allow tcp from any to any dst-port 22 in keep-state 64000 deny log ip from any to any 65535 allow ip from any to any $B$3$N$H$-!"(B % dig @133.58.32.12 ism.ac.jp ns ; <<>> DiG 9.10.3-P4 <<>> @133.58.32.12 ism.ac.jp ns ; (1 server found) ;; global options: +cmd ;; connection timed out; no servers could be reached ---------------------------------------------------------------- /etc/ipfw.rules $B$N(BPC-BSD$B$N=P2YCM(B ---------------------------------------------------------------- #!/bin/sh # To re-apply rules, you can run "sh /etc/ipfw.rules" # Flush out the list before we begin. ipfw -q -f flush # Set rules command prefix cmd="ipfw -q add" # No restrictions on loopback #################################################################### $cmd 00020 allow all from any to any via lo0 #################################################################### # Check the state of packets #################################################################### $cmd 01000 check-state $cmd 01050 allow tcp from any to any established $cmd 01100 allow udp from any to any established #################################################################### # Allow all outgoing packets #################################################################### $cmd 02000 allow ip from any to any out keep-state $cmd 02050 allow ip6 from any to any out keep-state $cmd 02100 allow ipv6-icmp from any to any keep-state $cmd 02150 allow icmp from any to any keep-state #################################################################### # Allow specific ports IN now # Add items to /etc/ipfw.openports in the format # {tcp|udp} <portnum> #################################################################### nextnum000 if [ -e "/etc/ipfw.openports" ] ; then while read line do echo $line | grep -q "^#" if [ $? -eq 0 ] ; then continue ; fi proto="`echo $line | awk '{print $1}'`" port="`echo $line | awk '{print $2}'`" if [ -z "$proto" -o -z "$port" ] ; then continue ; fi $cmd $nextnum allow $proto from any to any $port in keep-state nextnum=`expr $nextnum + 1` done < /etc/ipfw.openports fi #################################################################### # Allow specific IPs incoming traffic now (Used for jails mainly) # Add items to /etc/ipfw.openip in the format # {ip4|ip6} <ip> #################################################################### nextnum 000 if [ -e "/etc/ipfw.openip" ] ; then while read line do echo $line | grep -q "^#" if [ $? -eq 0 ] ; then continue ; fi proto="`echo $line | awk '{print $1}'`" ip="`echo $line | awk '{print $2}'`" if [ -z "$proto" -o -z "$ip" ] ; then continue ; fi $cmd $nextnum allow $proto from any to $ip in keep-state nextnum=`expr $nextnum + 1` done < /etc/ipfw.openip fi #################################################################### # Deny all other incoming troublemakers #################################################################### $cmd 64000 deny log all from any to any #################################################################### # Check for user custom rules if [ -e "/etc/ipfw.custom" ] ; then sh /etc/ipfw.custom fi -------- $B4];3D>>;!wE}7W?tM}8&5f=j(B
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?ff6f7e858a570f49a56fed27090bd6cf38c.20160630071752>
