comestics
This commit is contained in:
parent
6d053cbe96
commit
a70b65d39b
@ -195,7 +195,8 @@ All of them are running fedora-32.
|
|||||||
|
|
||||||
And assume the following rule added via qvm-firewall:
|
And assume the following rule added via qvm-firewall:
|
||||||
|
|
||||||
```# qvm-firewall personal add action=forward forwardtype=external scrports=22-22 proto=tcp dstports=2222-2222 srchost=192.168.10.0/24
|
```
|
||||||
|
$ qvm-firewall personal add action=forward forwardtype=external scrports=22-22 proto=tcp dstports=2222-2222 srchost=192.168.10.0/24
|
||||||
```
|
```
|
||||||
|
|
||||||
First, a table for the forwarding rules is created:
|
First, a table for the forwarding rules is created:
|
||||||
@ -302,7 +303,7 @@ Flags explanation as produced from the `qvm-ls` utility:
|
|||||||
Currently developing on VMWare Workstation on Windows due to issues in virtualizing on linux on my home hardware.
|
Currently developing on VMWare Workstation on Windows due to issues in virtualizing on linux on my home hardware.
|
||||||
QubesOS is virtualized behind NAT and can reach Windows Host via SSH.
|
QubesOS is virtualized behind NAT and can reach Windows Host via SSH.
|
||||||
|
|
||||||
In order to the the code, I wrote some [helper scripts](https://git.lsd.cat/Qubes/tools).
|
In order to test the code, I wrote some [helper scripts](https://git.lsd.cat/Qubes/tools).
|
||||||
The required setup involves:
|
The required setup involves:
|
||||||
* Clone the tools on the Windows Host
|
* Clone the tools on the Windows Host
|
||||||
* Generate an SSH keypair on `sys-net`
|
* Generate an SSH keypair on `sys-net`
|
||||||
|
Loading…
Reference in New Issue
Block a user