<?xml version="1.0"?>
<!DOCTYPE profile>
<profile xmlns="http://www.suse.com/1.0/yast2ns" xmlns:config="http://www.suse.com/1.0/configns">
<add-on t="map">
<add_on_products t="list">
<listentry t="map">
<media_url>http://192.168.12.254/suse15sp3</media_url>
<product>Basesystem-Module 15.3-0</product>
<product_dir>/Module-Basesystem</product_dir>
</listentry>
<listentry t="map">
<media_url>http://192.168.12.254/suse15sp3</media_url>
<product>Desktop-Applications-Module 15.3-0</product>
<product_dir>/Module-Desktop-Applications</product_dir>
</listentry>
<listentry t="map">
<media_url>http://192.168.12.254/suse15sp3</media_url>
<product>Python2-Module 15.3-0</product>
<product_dir>/Module-Python2</product_dir>
</listentry>
<listentry t="map">
<media_url>http://192.168.12.254/suse15sp3</media_url>
<product>SLEWE15-SP3 15.3-0</product>
<product_dir>/Product-WE</product_dir>
</listentry>
</add_on_products>
</add-on>
<bootloader t="map">
<global t="map">
<append>ip=dhcp</append>
<cpu_mitigations>auto</cpu_mitigations>
<gfxmode>auto</gfxmode>
<hiddenmenu>false</hiddenmenu>
<os_prober>true</os_prober>
<secure_boot>true</secure_boot>
<terminal>gfxterm</terminal>
<timeout t="integer">8</timeout>
<update_nvram>true</update_nvram>
<xen_kernel_append>vga=gfx-1024x768x16 crashkernel=269M\<4G</xen_kernel_append>
</global>
<loader_type>grub2-efi</loader_type>
</bootloader>
<firewall t="map">
<default_zone>public</default_zone>
<enable_firewall t="boolean">false</enable_firewall>
<log_denied_packets>off</log_denied_packets>
<start_firewall t="boolean">false</start_firewall>
<zones t="list">
<zone t="map">
<description>Unsolicited incoming network packets are rejected. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.</description>
<interfaces t="list"/>
<masquerade t="boolean">false</masquerade>
<name>block</name>
<ports t="list"/>
<protocols t="list"/>
<services t="list"/>
<short>Block</short>
<target>%%REJECT%%</target>
</zone>
<zone t="map">
<description>For computers in your demilitarized zone that are publicly-accessible with limited access to your internal network. Only selected incoming connections are accepted.</description>
<interfaces t="list"/>
<masquerade t="boolean">false</masquerade>
<name>dmz</name>
<ports t="list"/>
<protocols t="list"/>
<services t="list">
<service>ssh</service>
</services>
<short>DMZ</short>
<target>default</target>
</zone>
<zone t="map">
<description>All network connections are accepted.</description>
<interfaces t="list">
<interface>docker0</interface>
</interfaces>
<masquerade t="boolean">false</masquerade>
<name>docker</name>
<ports t="list"/>
<protocols t="list"/>
<services t="list"/>
<short>docker</short>
<target>ACCEPT</target>
</zone>
<zone t="map">
<description>Unsolicited incoming network packets are dropped. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.</description>
<interfaces t="list"/>
<masquerade t="boolean">false</masquerade>
<name>drop</name>
<ports t="list"/>
<protocols t="list"/>
<services t="list"/>
<short>Drop</short>
<target>DROP</target>
</zone>
<zone t="map">
<description>For use on external networks. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.</description>
<interfaces t="list"/>
<masquerade t="boolean">true</masquerade>
<name>external</name>
<ports t="list"/>
<protocols t="list"/>
<services t="list">
<service>ssh</service>
</services>
<short>External</short>
<target>default</target>
</zone>
<zone t="map">
<description>For use in home areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.</description>
<interfaces t="list"/>
<masquerade t="boolean">false</masquerade>
<name>home</name>
<ports t="list"/>
<protocols t="list"/>
<services t="list">
<service>dhcpv6-client</service>
<service>mdns</service>
<service>samba-client</service>
<service>ssh</service>
</services>
<short>Home</short>
<target>default</target>
</zone>
<zone t="map">
<description>For use on internal networks. You mostly trust the other computers on the networks to not harm your computer. Only selected incoming connections are accepted.</description>
<interfaces t="list"/>
<masquerade t="boolean">false</masquerade>
<name>internal</name>
<ports t="list"/>
<protocols t="list"/>
<services t="list">
<service>dhcpv6-client</service>
<service>mdns</service>
<service>samba-client</service>
<service>ssh</service>
</services>
<short>Internal</short>
<target>default</target>
</zone>
<zone t="map">
<description>For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.</description>
<interfaces t="list"/>
<masquerade t="boolean">false</masquerade>
<name>public</name>
<ports t="list"/>
<protocols t="list"/>
<services t="list">
<service>dhcpv6-client</service>
</services>
<short>Public</short>
<target>default</target>
</zone>
<zone t="map">
<description>All network connections are accepted.</description>
<interfaces t="list"/>
<masquerade t="boolean">false</masquerade>
<name>trusted</name>
<ports t="list"/>
<protocols t="list"/>
<services t="list"/>
<short>Trusted</short>
<target>ACCEPT</target>
</zone>
<zone t="map">
<description>For use in work areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.</description>
<interfaces t="list"/>
<masquerade t="boolean">false</masquerade>
<name>work</name>
<ports t="list"/>
<protocols t="list"/>
<services t="list">
<service>dhcpv6-client</service>
<service>ssh</service>
</services>
<short>Work</short>
<target>default</target>
</zone>
</zones>
</firewall>
<general t="map">
<ask-list t="list"/>
<mode t="map">
<confirm t="boolean">false</confirm>
</mode>
<proposals t="list"/>
<signature-handling t="map"/>
<storage t="map"/>
</general>
<groups t="list">
<group t="map">
<encrypted t="boolean">true</encrypted>
<gid>100</gid>
<group_password>x</group_password>
<groupname>users</groupname>
<userlist/>
</group>
<group t="map">
<encrypted t="boolean">true</encrypted>
<gid>492</gid>
<group_password>x</group_password>
<groupname>cdrom</groupname>
<userlist/>
</group>
<group t="map">
<encrypted t="boolean">true</encrypted>
<gid>469</gid>
<group_password>x</group_password>
<groupname>chrony</groupname>
<userlist/>
</group>
<group t="map">

CIAS
- 粉丝: 1361
最新资源
- 网络营销基本理论方法与策划.pptx
- 和规范简介和前置音频接口的连接.doc
- 数据仓库与数据挖掘基础第3章数据预处理.ppt
- 软件工程导论(第4版)电子教案第3章.ppt
- 系统集成项目管理工程师中级冲刺打印版.doc
- 基于单片机的数字万年历设计.doc
- 项目管理试题及答案2.pdf
- 企业人事管理系统数据库课程设计.doc
- 淘宝奕福茶业网店的网络营销策划书.doc
- 项目管理的基本要求.docx
- 高级项目管理师1-基础知识PPT课件.ppt
- 项目5-跨境网络营销推广与数据分析.ppt
- 电子商务专业人才培养调查报告.doc
- 如何做好工程项目管理工期进度.docx
- 项目管理师模拟题下午.doc
- 四电接口监理实施细则鲁南高铁.doc
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈



评论0