comestics

This commit is contained in:
Giulio 2021-08-16 22:56:27 +02:00
parent 6d053cbe96
commit a70b65d39b

View File

@ -195,7 +195,8 @@ All of them are running fedora-32.
And assume the following rule added via qvm-firewall: And assume the following rule added via qvm-firewall:
```# qvm-firewall personal add action=forward forwardtype=external scrports=22-22 proto=tcp dstports=2222-2222 srchost=192.168.10.0/24 ```
$ qvm-firewall personal add action=forward forwardtype=external scrports=22-22 proto=tcp dstports=2222-2222 srchost=192.168.10.0/24
``` ```
First, a table for the forwarding rules is created: First, a table for the forwarding rules is created:
@ -302,7 +303,7 @@ Flags explanation as produced from the `qvm-ls` utility:
Currently developing on VMWare Workstation on Windows due to issues in virtualizing on linux on my home hardware. Currently developing on VMWare Workstation on Windows due to issues in virtualizing on linux on my home hardware.
QubesOS is virtualized behind NAT and can reach Windows Host via SSH. QubesOS is virtualized behind NAT and can reach Windows Host via SSH.
In order to the the code, I wrote some [helper scripts](https://git.lsd.cat/Qubes/tools). In order to test the code, I wrote some [helper scripts](https://git.lsd.cat/Qubes/tools).
The required setup involves: The required setup involves:
* Clone the tools on the Windows Host * Clone the tools on the Windows Host
* Generate an SSH keypair on `sys-net` * Generate an SSH keypair on `sys-net`