comestics
This commit is contained in:
parent
6d053cbe96
commit
a70b65d39b
@ -195,7 +195,8 @@ All of them are running fedora-32.
|
||||
|
||||
And assume the following rule added via qvm-firewall:
|
||||
|
||||
```# qvm-firewall personal add action=forward forwardtype=external scrports=22-22 proto=tcp dstports=2222-2222 srchost=192.168.10.0/24
|
||||
```
|
||||
$ qvm-firewall personal add action=forward forwardtype=external scrports=22-22 proto=tcp dstports=2222-2222 srchost=192.168.10.0/24
|
||||
```
|
||||
|
||||
First, a table for the forwarding rules is created:
|
||||
@ -302,7 +303,7 @@ Flags explanation as produced from the `qvm-ls` utility:
|
||||
Currently developing on VMWare Workstation on Windows due to issues in virtualizing on linux on my home hardware.
|
||||
QubesOS is virtualized behind NAT and can reach Windows Host via SSH.
|
||||
|
||||
In order to the the code, I wrote some [helper scripts](https://git.lsd.cat/Qubes/tools).
|
||||
In order to test the code, I wrote some [helper scripts](https://git.lsd.cat/Qubes/tools).
|
||||
The required setup involves:
|
||||
* Clone the tools on the Windows Host
|
||||
* Generate an SSH keypair on `sys-net`
|
||||
|
Loading…
Reference in New Issue
Block a user