head	1.3;
access;
symbols
	RELEASE_7_1_0:1.1
	RELEASE_6_4_0:1.1
	RELEASE_5_EOL:1.1
	RELEASE_7_0_0:1.1
	RELEASE_6_3_0:1.1
	PRE_XORG_7:1.1
	RELEASE_4_EOL:1.1
	RELEASE_6_2_0:1.1
	RELEASE_6_1_0:1.1
	RELEASE_5_5_0:1.1;
locks; strict;
comment	@# @;


1.3
date	2008.12.11.19.44.22;	author beech;	state dead;
branches;
next	1.2;

1.2
date	2008.10.16.21.35.40;	author miwi;	state Exp;
branches;
next	1.1;

1.1
date	2005.09.03.18.51.19;	author sem;	state Exp;
branches;
next	;


desc
@@


1.3
log
@- Update to 1.02
- Change to PORTDOCS and remove pkg-plist

PR:		ports/129545
Submitted by:	SeaD <sead@@deep.perm.ru> (maintainer)
@
text
@sbin/ipguard
%%PORTDOCS%%%%DOCSDIR%%/COPYRIGHT
%%PORTDOCS%%%%DOCSDIR%%/NEWS
%%PORTDOCS%%%%DOCSDIR%%/README
%%PORTDOCS%%%%DOCSDIR%%/README.tcpdump
%%PORTDOCS%%%%DOCSDIR%%/README.log
%%PORTDOCS%%%%DOCSDIR%%/ethers.sample
%%PORTDOCS%%%%DOCSDIR%%/rfc826.txt
%%PORTDOCS%%@@dirrm %%DOCSDIR%%
@


1.2
log
@- File was rerolled to fix some spelling
- Add rc script
- Pass maintainership to submitter

PR:		127940
Submitted by:	SeaD <sead@@deep.perm.ru>
@
text
@@


1.1
log
@ipguard listens network for ARP packets. All permitted MAC/IP pairs
listed in 'ethers' file. If it recieves one with MAC/IP pair, which is
not listed in 'ethers' file, it will send ARP reply with configured
fake address. This will prevent not permitted host to work properly
in this ethernet segment. Especially Windows(TM) hosts.

PR:		ports/84627, ports/85671
Submitted by:	SeaD <sead@@mail.ru>
@
text
@d2 8
a9 1
etc/rc.d/ipguard.sh.sample
@

