|
@@ -195,7 +195,8 @@ All of them are running fedora-32.
|
|
|
|
|
|
And assume the following rule added via qvm-firewall:
|
|
|
|
|
|
-```# qvm-firewall personal add action=forward forwardtype=external scrports=22-22 proto=tcp dstports=2222-2222 srchost=192.168.10.0/24
|
|
|
+```
|
|
|
+$ qvm-firewall personal add action=forward forwardtype=external scrports=22-22 proto=tcp dstports=2222-2222 srchost=192.168.10.0/24
|
|
|
```
|
|
|
|
|
|
First, a table for the forwarding rules is created:
|
|
@@ -302,7 +303,7 @@ Flags explanation as produced from the `qvm-ls` utility:
|
|
|
Currently developing on VMWare Workstation on Windows due to issues in virtualizing on linux on my home hardware.
|
|
|
QubesOS is virtualized behind NAT and can reach Windows Host via SSH.
|
|
|
|
|
|
-In order to the the code, I wrote some [helper scripts](https://git.lsd.cat/Qubes/tools).
|
|
|
+In order to test the code, I wrote some [helper scripts](https://git.lsd.cat/Qubes/tools).
|
|
|
The required setup involves:
|
|
|
* Clone the tools on the Windows Host
|
|
|
* Generate an SSH keypair on `sys-net`
|