about summary refs log tree commit diff stats
path: root/tools
diff options
context:
space:
mode:
Diffstat (limited to 'tools')
-rw-r--r--tools/conf/etc/dnsmasq.conf49
-rw-r--r--tools/conf/etc/iptables/iptables-br.sh95
-rw-r--r--tools/conf/etc/iptables/vlan.v4214
-rw-r--r--tools/index.html5
-rw-r--r--tools/lvm.html53
-rw-r--r--tools/postgresql.html11
-rw-r--r--tools/qemu.html105
-rw-r--r--tools/scripts/autoport.sh24
-rw-r--r--tools/scripts/external-ports.sh8
-rw-r--r--tools/storage.html17
10 files changed, 358 insertions, 223 deletions
diff --git a/tools/conf/etc/dnsmasq.conf b/tools/conf/etc/dnsmasq.conf
index f8f7201..b8da62e 100644
--- a/tools/conf/etc/dnsmasq.conf
+++ b/tools/conf/etc/dnsmasq.conf
@@ -33,7 +33,7 @@ proxy-dnssec
 # record somewhere between the root and the domain does not exist. 
 # The cost of setting this is that even queries in unsigned domains will need
 # one or more extra DNS queries to verify.
-#dnssec-check-unsigned
+dnssec-check-unsigned
 
 # Uncomment this to filter useless windows-originated DNS requests
 # which can trigger dial-on-demand links needlessly.
@@ -52,7 +52,7 @@ proxy-dnssec
 # to  be  up.  Uncommenting this forces dnsmasq to try each query
 # with  each  server  strictly  in  the  order  they   appear   in
 # /etc/resolv.conf
-#strict-order
+strict-order
 
 # If you don't want dnsmasq to read /etc/resolv.conf or any other
 # file, getting its servers from this file instead (see below), then
@@ -66,8 +66,10 @@ no-poll
 # Add other name servers here, with domain specs if they are for
 # non-public domains.
 #server=/localnet/192.168.0.1
-server=127.0.0.1#40
+#server=127.0.0.1#40
 #server=213.73.91.35
+#server=37.235.1.174
+server=84.200.69.80
 
 # Example of routing PTR queries to nameservers: this will send all
 # address->name queries for 192.168.3/24 to nameserver 10.1.2.3
@@ -75,7 +77,7 @@ server=127.0.0.1#40
 
 # Add local-only domains here, queries in these domains are answered
 # from /etc/hosts or DHCP only.
-local=/core/
+local=/c9/
 
 # Add domains which you want to force to an IP address here.
 # The example below send any host in double-click.net to a local
@@ -102,22 +104,27 @@ local=/core/
 # than the default, edit the following lines.
 #user=nobody
 #group=nobody
-
+# NOT READY FOR PRODUCTION
+user=root
+group=root
 # If you want dnsmasq to listen for DHCP and DNS requests only on
 # specified interfaces (and the loopback) give the name of the
 # interface (eg eth0) here.
 # Repeat the line for more than one interface.
 interface=lo
 interface=br0
+#interface=wlp7s0
 
 # Or you can specify which interface _not_ to listen on
-except-interface=wlp7s0
-except-interface=enp8s0
+#except-interface=wlp7s0
+#except-interface=enp8s0
 
 # Or which to listen on by address (remember to include 127.0.0.1 if
 # you use this.)
-listen-address=127.0.0.1
-#listen-address=10.0.0.1
+#listen-address=127.0.0.1
+#listen-address=10.0.0.254
+#listen-address=192.168.1.33
+
 # If you want dnsmasq to provide only DNS service on an interface,
 # configure it as shown above, and then use the following line to
 # disable DHCP and TFTP on it.
@@ -132,7 +139,7 @@ no-dhcp-interface=lo
 # want dnsmasq to really bind only the interfaces it is listening on,
 # uncomment this option. About the only time you may need this is when
 # running another nameserver on the same machine.
-bind-interfaces
+#bind-interfaces
 
 # If you don't want dnsmasq to read /etc/hosts, uncomment the
 # following line.
@@ -153,7 +160,8 @@ expand-hosts
 # 2) Sets the "domain" DHCP option thereby potentially setting the
 #    domain of all systems configured by DHCP
 # 3) Provides the domain part for "expand-hosts"
-domain=core
+domain=c9,10.0.0.0/8
+dhcp-option=15,c9
 
 # Set a different domain for a particular subnet
 #domain=wireless.thekelleys.org.uk,192.168.2.0/24
@@ -167,7 +175,7 @@ domain=core
 # repeat this for each network on which you want to supply DHCP
 # service.
 #dhcp-range=192.168.0.50,192.168.0.150,12h
-dhcp-range=br0,10.0.0.5,10.0.0.50,2h
+dhcp-range=10.0.0.100,10.0.0.200,255.0.0.0,2h
 
 # This is an example of a DHCP range where the netmask is given. This
 # is needed for networks we reach the dnsmasq DHCP server via a relay
@@ -239,7 +247,11 @@ dhcp-range=br0,10.0.0.5,10.0.0.50,2h
 # Always allocate the host with Ethernet address 11:22:33:44:55:66
 # The IP address 192.168.0.60
 #dhcp-host=11:22:33:44:55:66,192.168.0.60
+#dhcp-host=54:60:BE:EF:5C:72,10.0.0.2
 
+dhcp-host=50:67:f0:a1:bc:ab,cr1,10.0.0.1,infinite
+dhcp-host=00:14:BF:6E:61:21,cr2,10.0.0.2,infinite
+dhcp-host=54:60:BE:EF:5C:64,c14,10.0.0.4,infinite
 # Always set the name of the host with hardware address
 # 11:22:33:44:55:66 to be "fred"
 #dhcp-host=11:22:33:44:55:66,fred
@@ -339,9 +351,12 @@ dhcp-range=br0,10.0.0.5,10.0.0.50,2h
 # are some options which are recommended, they are detailed at the
 # end of this section.
 
+dhcp-option=1,255.0.0.0
+
 # Override the default route supplied by dnsmasq, which assumes the
 # router is the same machine as the one running dnsmasq.
-#dhcp-option=3,1.2.3.4
+#dhcp-option=3,10.0.0.1
+dhcp-option=3,10.0.0.1
 
 # Do the same thing, but using the option name
 #dhcp-option=option:router,1.2.3.4
@@ -352,6 +367,9 @@ dhcp-range=br0,10.0.0.5,10.0.0.50,2h
 # for all other option numbers.
 #dhcp-option=3
 
+# DNS
+dhcp-option=6,10.0.0.254,10.0.0.254
+
 # Set the NTP time server addresses to 192.168.0.4 and 10.10.0.5
 #dhcp-option=option:ntp-server,192.168.0.4,10.10.0.5
 
@@ -416,6 +434,7 @@ dhcp-range=br0,10.0.0.5,10.0.0.50,2h
 
 # Send RFC-3442 classless static routes (note the netmask encoding)
 #dhcp-option=121,192.168.1.0/24,1.2.3.4,10.0.0.0/8,5.6.7.8
+dhcp-option=33,10.0.0.1
 
 # Send vendor-class specific options encapsulated in DHCP option 43.
 # The meaning of the options is defined by the vendor-class so
@@ -567,7 +586,7 @@ dhcp-range=br0,10.0.0.5,10.0.0.50,2h
 #dhcp-script=/bin/echo
 
 # Set the cachesize here.
-cache-size=30000
+cache-size=60000
 
 # If you want to disable negative caching, uncomment this.
 no-negcache
@@ -666,7 +685,7 @@ local-ttl=60
 log-queries
 
 # Log lots of extra information about DHCP transactions.
-#log-dhcp
+log-dhcp
 
 # Include another lot of configuration options.
 #conf-file=/etc/dnsmasq.more.conf
diff --git a/tools/conf/etc/iptables/iptables-br.sh b/tools/conf/etc/iptables/iptables-br.sh
index 25a3331..96475f4 100644
--- a/tools/conf/etc/iptables/iptables-br.sh
+++ b/tools/conf/etc/iptables/iptables-br.sh
@@ -148,7 +148,8 @@ SPAMLIST="blockedip"
 SPAMDROPMSG="BLOCKED IP DROP"
 # public interface to network/internet
 #PUB_IF="wlp7s0"
-PUB_IF="br0"
+PUB_IF="enp8s0"
+BR_IF="br0"
 PUB_IP="10.0.0.254"
 NET_ADDR="10.0.0.0/8"
 GW="10.0.0.1"
@@ -186,6 +187,8 @@ echo "Starting ipv4 firewall tables..."
 # Unlimited on loopback
 $IPT -A INPUT -i lo -s 127.0.0.0/8 -d 127.0.0.0/8 -j ACCEPT
 $IPT -A OUTPUT -o lo -s 127.0.0.0/8 -d 127.0.0.0/8 -j ACCEPT
+$IPT -A INPUT -i lo -s ${PUB_IP} -d ${PUB_IP} -j ACCEPT
+$IPT -A OUTPUT -o lo -s ${PUB_IP} -d ${PUB_IP} -j ACCEPT
 
 #modprobe ip_conntrack
 #modprobe ip_conntrack_ftp
@@ -222,15 +225,21 @@ $IPT -A blocker -p tcp --tcp-flags ALL SYN,RST,ACK,FIN,URG -j DROP
 $IPT -A blocker -j RETURN
 
 ####### server input Chain  ######
+echo "server_in chain: Allow to VNC Server"
+$IPT -A server_in -p tcp --dport 5900 --sport 1024:65535 -m state --state NEW,ESTABLISHED -j ACCEPT
+echo "server_in chain: Allow to DataBase Server"
+$IPT -A server_in -p tcp --dport 5432 --sport 1024:65535 -m state --state NEW,ESTABLISHED -j ACCEPT
 echo "server_in chain: Allow to SSH server"
 $IPT -A server_in -p tcp --dport 2222 --sport 1024:65535 -m state --state NEW,ESTABLISHED -j ACCEPT
 echo "server_in chain: Allow input to HTTPS Server"
 $IPT -A server_in -p tcp --dport 443 --sport 1024:65535 -m state --state NEW,ESTABLISHED -j ACCEPT
-#echo "server_in chain: Allow input to HTTP Server"
-#$IPT -A server_in -p tcp --dport 80 --sport 1024:65535 -m state --state NEW,ESTABLISHED -j ACCEPT
+echo "server_in chain: Allow input to HTTP Server"
+$IPT -A server_in -p tcp --dport 80 --sport 1024:65535 -m state --state NEW,ESTABLISHED -j ACCEPT
 echo "server_in chain: Allow input to DNS Server"
 $IPT -A server_in -p udp --dport 53 --sport 1024:65535 -m state --state NEW,ESTABLISHED -j ACCEPT
 $IPT -A server_in -p tcp --dport 53 --sport 1024:65535  -m state --state NEW,ESTABLISHED -j ACCEPT
+echo "server_in chain: Allow output from GIT server"
+$IPT -A server_in -p tcp --dport 9418 --sport 1024:65535 -m state --state NEW,ESTABLISHED -j ACCEPT
 
 ## Return to caller
 $IPT -A server_in -j RETURN
@@ -239,12 +248,18 @@ $IPT -A server_in -j RETURN
 echo "server_out chain: Allow output from DNS server"
 $IPT -A server_out -p udp --sport 53 --dport 1024:65535 -m state --state RELATED,ESTABLISHED -j ACCEPT
 $IPT -A server_out -p tcp --sport 53 --dport 1024:65535 -m state --state RELATED,ESTABLISHED -j ACCEPT
+echo "server_out chain: Allow output from GIT server"
+$IPT -A server_out -p tcp --sport 9418 --dport 1024:65535 -m state --state RELATED,ESTABLISHED -j ACCEPT
 echo "server_out chain: Allow output from https server"
 $IPT -A server_out -p tcp --sport 443 --dport 1024:65535 -m state --state RELATED,ESTABLISHED -j ACCEPT
-#echo "server_out chain: Allow output from http server"
-#$IPT -A server_out -p tcp --sport 80 --dport 1024:65535 -m state --state RELATED,ESTABLISHED -j ACCEPT
+echo "server_out chain: Allow output from http server"
+$IPT -A server_out -p tcp --sport 80 --dport 1024:65535 -m state --state RELATED,ESTABLISHED -j ACCEPT
 echo "server_out chain: Allow output from SSH server"
 $IPT -A server_out -p tcp --sport 2222 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
+echo "server_out chain: Allow output from Data Base server"
+$IPT -A server_out -p tcp --sport 5432 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
+echo "FORWARD chain: Allow output from VNC server"
+$IPT -A server_out -p tcp --sport 5900 --dport 1024:65535 -m state --state RELATED,ESTABLISHED -j ACCEPT
 
 ## Return to caller
 $IPT -A server_out -j RETURN
@@ -260,16 +275,18 @@ echo "client_in chain: Allow input from POP3S server"
 $IPT -A client_in -p tcp --sport 995 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
 echo "client_in chain: Allow input from SMTPS server"
 $IPT -A client_in -p tcp --sport 465 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
-#echo "client_in chain: Allow input from HTTP Server"
-#$IPT -A client_in -p tcp --sport 80 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
+echo "client_in chain: Allow input from HTTP Server"
+$IPT -A client_in -p tcp --sport 80 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
 echo "client_in chain: Allow input from HTTPS server"
 $IPT -A client_in -p tcp --sport 443 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
 #$IPT -A client_in -p udp --sport 443 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
 echo "client_in chain: Allow input from DNS Server"
 $IPT -A client_in -p udp --sport 53 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
 echo "client_in chain: Allow input from SSH Server"
-$IPT -A client_in -p udp --sport 22 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
-$IPT -A client_in -p udp --sport 2222 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
+$IPT -A client_in -p tcp --sport 2222 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
+$IPT -A client_in -p tcp --sport 22 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
+echo "client_in chain: Allow input from GPG key Server"
+$IPT -A client_in -p tcp --sport 11371 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
 
 ## Return to caller
 $IPT -A client_in -j RETURN
@@ -287,14 +304,17 @@ echo "client_out chain: Allow output to SMTPS server"
 $IPT -A client_out -p tcp --dport 465 --sport 1024:65535 -m state --state NEW,ESTABLISHED -j ACCEPT
 echo "client_out chain: Allow output to HTTPS server"
 $IPT -A client_out -p tcp --dport 443 --sport 1024:65535 -m state --state NEW,ESTABLISHED -j ACCEPT
-#$IPT -A client_out -p udp --dport 443 --sport 1024:65535 -m state --state NEW,ESTABLISHED -j ACCEPT
-##echo "Allow to HTTP server"
-#$IPT -A client_out -p tcp --dport 80 --sport 1024:65535 -m state --state NEW,ESTABLISHED -j ACCEPT
+$IPT -A client_out -p udp --dport 443 --sport 1024:65535 -m state --state NEW,ESTABLISHED -j ACCEPT
+echo "Allow to HTTP server"
+$IPT -A client_out -p tcp --dport 80 --sport 1024:65535 -m state --state NEW,ESTABLISHED -j ACCEPT
 echo "client_out chain: Allow output to DNS server"
 $IPT -A client_out -p udp --dport 53 --sport 1024:65535 -m state --state NEW,ESTABLISHED -j ACCEPT
 echo "client_out chain: Allow output to SSH server"
-$IPT -A client_out -p tcp --dport 22 --sport 1024:65535 -m state --state NEW,ESTABLISHED -j ACCEPT
 $IPT -A client_out -p tcp --dport 2222 --sport 1024:65535 -m state --state NEW,ESTABLISHED -j ACCEPT
+$IPT -A client_out -p tcp --dport 22 --sport 1024:65535 -m state --state NEW,ESTABLISHED -j ACCEPT
+echo "client_out chain: Allow output to GPG key Server"
+$IPT -A client_out -p tcp --dport 11371 --sport 1024:65535 -m state --state NEW,ESTABLISHED -j ACCEPT
+
 
 ## Return to caller
 $IPT -A client_out -j RETURN
@@ -331,24 +351,27 @@ $IPT -A netconf_out -j RETURN
 
 ####### AP rules  ######
 $IPT -A FORWARD -j blocker
-#$IPT -A FORWARD -i ${PUB_IF} -o ${PUB_IF} -s ${NET_ADDR} -d ${NET_ADDR}  -j ACCEPT
-$IPT -A FORWARD -i ${PUB_IF} -o ${PUB_IF} -d ${NET_ADDR} -j netconf_in
-$IPT -A FORWARD -i ${PUB_IF} -o ${PUB_IF} -d ${NET_ADDR} -j netconf_out
-$IPT -A FORWARD -i ${PUB_IF} -o ${PUB_IF} -d ${NET_ADDR} -j client_in
-$IPT -A FORWARD -i ${PUB_IF} -o ${PUB_IF} -s ${NET_ADDR} -j client_out
-#$IPT -t nat -A POSTROUTING -o ${PUB_IF} -j SNAT --to ${PUB_IP}
+#$IPT -A FORWARD -i ${BR_IF} -o ${BR_IF} -s ${NET_ADDR} -d ${NET_ADDR}  -j ACCEPT
+$IPT -A FORWARD -i ${BR_IF} -o ${BR_IF} -d ${NET_ADDR} -j netconf_in
+$IPT -A FORWARD -i ${BR_IF} -o ${BR_IF} -d ${NET_ADDR} -j netconf_out
+$IPT -A FORWARD -i ${BR_IF} -o ${BR_IF} -d ${NET_ADDR} -j client_in
+$IPT -A FORWARD -i ${BR_IF} -o ${BR_IF} -s ${NET_ADDR} -j client_out
+#$IPT -A FORWARD -i ${BR_IF} -o ${BR_IF} -d ${NET_ADDR} -j server_in
+$IPT -A FORWARD -i ${BR_IF} -o ${BR_IF} -s ${NET_ADDR} -j server_out
+
+#$IPT -t nat -A POSTROUTING -o ${BR_IF} -j SNAT --to ${PUB_IP}
 
 ####### Input Chain ######
 $IPT -A INPUT -j blocker
-$IPT -A INPUT -i ${PUB_IF} -j server_in
-$IPT -A INPUT -i ${PUB_IF} -j client_in
-$IPT -A INPUT -i ${PUB_IF} -j netconf_in
+$IPT -A INPUT -i ${BR_IF} -s ${NET_ADDR} -d ${PUB_IP} -j server_in
+$IPT -A INPUT -i ${BR_IF} -d ${NET_ADDR} -j client_in
+$IPT -A INPUT -i ${BR_IF} -j netconf_in
 
 ####### Output Chain ######
 $IPT -A OUTPUT -j blocker
-$IPT -A OUTPUT -o ${PUB_IF} -j server_out
-$IPT -A OUTPUT -o ${PUB_IF} -j client_out
-$IPT -A OUTPUT -o ${PUB_IF} -j netconf_out
+$IPT -A OUTPUT -o ${BR_IF} -s ${PUB_IP} -d ${NET_ADDR} -j server_out
+$IPT -A OUTPUT -o ${BR_IF} -s ${NET_ADDR} -j client_out
+$IPT -A OUTPUT -o ${BR_IF} -j netconf_out
 
 
 ## log everything else and drop
@@ -357,25 +380,3 @@ $IPT -A OUTPUT -j LOG --log-level 7 --log-prefix "iptables: OUTPUT: "
 $IPT -A FORWARD -j LOG --log-level 7 --log-prefix "iptables: FORWARD: "
 
 exit 0
-
-#$IPT -A FORWARD -i ${PUB_IF} -o ${PRIV_IF} -s ${NET_ADDR} -j ACCEPT
-#$IPT -A FORWARD -i ${PRIV_IF} -o ${PUB_IF} -d ${NET_ADDR} -j ACCEPT
-#$IPT -A FORWARD -i ${PUB_IF} -o ${PUB_IF} -p udp --sport 68 --dport 67 -j ACCEPT
-#$IPT -A FORWARD -i ${PUB_IF} -o ${PUB_IF}  -p udp --sport 520 --dport 520 -j ACCEPT
-#
-## You Dirty bitch
-#$IPT -A FORWARD -i ${PUB_IF} -o ${PUB_IF} -s ${NET_ADDR} -d ${NET_ADDR}  -j ACCEPT
-
-## Unlimited on loopback
-#$IPT -A OUTPUT -o lo -s ${PUB_IP} -d ${PUB_IP} -j ACCEPT
-##$IPT -A OUTPUT -o lo -d ${PRIV_IP} -j ACCEPT
-#
-## Unlimited on local
-#$IPT -A OUTPUT -o ${PRIV_IF} -j ACCEPT
-#
-### less logs
-#
-
-#echo "Allow output DHCP protocol"
-#$IPT -A OUTPUT -o ${PUB_IF} -p udp --sport 68 --dport 67 -s ${NET_ADDR} -d ${NET_ADDR} -j ACCEPT
-
diff --git a/tools/conf/etc/iptables/vlan.v4 b/tools/conf/etc/iptables/vlan.v4
index 7954521..61da499 100644
--- a/tools/conf/etc/iptables/vlan.v4
+++ b/tools/conf/etc/iptables/vlan.v4
@@ -1,112 +1,136 @@
-# Generated by iptables-save v1.6.1 on Wed Mar 15 20:53:45 2017
+# Generated by iptables-save v1.6.2 on Tue Apr  3 02:25:27 2018
 *security
-:INPUT ACCEPT [85:6694]
+:INPUT ACCEPT [0:0]
 :FORWARD ACCEPT [0:0]
-:OUTPUT ACCEPT [3:179]
+:OUTPUT ACCEPT [0:0]
 COMMIT
-# Completed on Wed Mar 15 20:53:45 2017
-# Generated by iptables-save v1.6.1 on Wed Mar 15 20:53:45 2017
+# Completed on Tue Apr  3 02:25:27 2018
+# Generated by iptables-save v1.6.2 on Tue Apr  3 02:25:27 2018
 *raw
-:PREROUTING ACCEPT [97:7863]
-:OUTPUT ACCEPT [3:179]
+:PREROUTING ACCEPT [0:0]
+:OUTPUT ACCEPT [0:0]
 COMMIT
-# Completed on Wed Mar 15 20:53:45 2017
-# Generated by iptables-save v1.6.1 on Wed Mar 15 20:53:45 2017
+# Completed on Tue Apr  3 02:25:27 2018
+# Generated by iptables-save v1.6.2 on Tue Apr  3 02:25:27 2018
 *nat
-:PREROUTING ACCEPT [6:683]
-:INPUT ACCEPT [2:138]
-:OUTPUT ACCEPT [2:131]
-:POSTROUTING ACCEPT [2:131]
+:PREROUTING ACCEPT [0:0]
+:INPUT ACCEPT [0:0]
+:OUTPUT ACCEPT [0:0]
+:POSTROUTING ACCEPT [0:0]
 COMMIT
-# Completed on Wed Mar 15 20:53:45 2017
-# Generated by iptables-save v1.6.1 on Wed Mar 15 20:53:45 2017
+# Completed on Tue Apr  3 02:25:27 2018
+# Generated by iptables-save v1.6.2 on Tue Apr  3 02:25:27 2018
 *mangle
-:PREROUTING ACCEPT [8:624]
-:INPUT ACCEPT [8:624]
+:PREROUTING ACCEPT [0:0]
+:INPUT ACCEPT [0:0]
 :FORWARD ACCEPT [0:0]
 :OUTPUT ACCEPT [0:0]
 :POSTROUTING ACCEPT [0:0]
 COMMIT
-# Completed on Wed Mar 15 20:53:45 2017
-# Generated by iptables-save v1.6.1 on Wed Mar 15 20:53:45 2017
+# Completed on Tue Apr  3 02:25:27 2018
+# Generated by iptables-save v1.6.2 on Tue Apr  3 02:25:27 2018
 *filter
 :INPUT DROP [0:0]
 :FORWARD DROP [0:0]
 :OUTPUT DROP [0:0]
-:ACCEPTLOG - [0:0]
-:DROPLOG - [0:0]
-:REJECTLOG - [0:0]
-:RELATED_ICMP - [0:0]
-:SYN_FLOOD - [0:0]
--A INPUT -i lo -j ACCEPT
--A INPUT -p icmp -m limit --limit 1/sec --limit-burst 2 -j ACCEPT
--A INPUT -p icmp -m limit --limit 1/sec --limit-burst 2 -j LOG --log-prefix "PING-DROP:"
--A INPUT -p icmp -j DROP
--A INPUT -p icmp -f -j DROPLOG
--A INPUT -p icmp -m state --state ESTABLISHED -m limit --limit 3/sec --limit-burst 8 -j ACCEPT
--A INPUT -p icmp -m state --state RELATED -m limit --limit 3/sec --limit-burst 8 -j RELATED_ICMP
--A INPUT -p icmp -m icmp --icmp-type 8 -m limit --limit 3/sec --limit-burst 8 -j ACCEPT
--A INPUT -p icmp -j DROPLOG
--A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
--A INPUT -p tcp -m multiport --dports 135,137,138,139,445,1433,1434 -j DROP
--A INPUT -p udp -m multiport --dports 135,137,138,139,445,1433,1434 -j DROP
--A INPUT -m state --state INVALID -j DROP
--A INPUT -p tcp -m state --state NEW -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,SYN,RST,PSH,ACK,URG -j DROP
--A INPUT -p tcp -m state --state NEW -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -j DROP
--A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,PSH,URG -j DROP
--A INPUT -p tcp -m tcp --tcp-flags SYN,RST SYN,RST -j DROP
--A INPUT -p tcp -m tcp --tcp-flags FIN,SYN FIN,SYN -j DROP
--A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,PSH,URG -j DROPLOG
--A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,SYN,RST,PSH,ACK,URG -j DROPLOG
--A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -j DROPLOG
--A INPUT -p tcp -m tcp --tcp-flags SYN,RST SYN,RST -j DROPLOG
--A INPUT -p tcp -m tcp --tcp-flags FIN,SYN FIN,SYN -j DROPLOG
--A INPUT -p tcp -m tcp --tcp-flags FIN,ACK FIN -j DROPLOG
--A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,SYN,RST,ACK,URG -j DROPLOG
--A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -j SYN_FLOOD
--A INPUT -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -m state --state NEW -j DROPLOG
--A INPUT -f -j DROPLOG
--A INPUT -p tcp -m tcp --sport 1024:65535 --dport 443 -m state --state NEW,ESTABLISHED -j ACCEPT
--A INPUT -j DROPLOG
--A FORWARD -p icmp -f -j DROPLOG
--A FORWARD -p icmp -j DROPLOG
--A FORWARD -m state --state INVALID -j DROP
--A FORWARD -j REJECTLOG
--A OUTPUT -o lo -j ACCEPT
--A OUTPUT -p icmp -j ACCEPT
--A OUTPUT -p icmp -f -j DROPLOG
--A OUTPUT -p icmp -m state --state ESTABLISHED -m limit --limit 3/sec --limit-burst 8 -j ACCEPT
--A OUTPUT -p icmp -m state --state RELATED -m limit --limit 3/sec --limit-burst 8 -j RELATED_ICMP
--A OUTPUT -p icmp -m icmp --icmp-type 8 -m limit --limit 3/sec --limit-burst 8 -j ACCEPT
--A OUTPUT -p icmp -j DROPLOG
--A OUTPUT -m state --state NEW,RELATED,ESTABLISHED -j ACCEPT
--A OUTPUT -m state --state INVALID -j DROP
--A OUTPUT -p icmp -m icmp --icmp-type 8 -m state --state NEW,RELATED,ESTABLISHED -j ACCEPT
--A OUTPUT -p tcp -m tcp --sport 2222 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
--A OUTPUT -p udp -m udp --sport 1024:65535 --dport 53 -m state --state NEW,ESTABLISHED -j ACCEPT
--A OUTPUT -p tcp -m tcp --sport 1024:65535 --dport 6667 -m state --state NEW,ESTABLISHED -j ACCEPT
--A OUTPUT -p tcp -m tcp --sport 1024:65535 --dport 5222 -m state --state NEW,RELATED,ESTABLISHED -j ACCEPT
--A OUTPUT -p tcp -m tcp --sport 1024:65535 --dport 873 -m state --state NEW,ESTABLISHED -j ACCEPT
--A OUTPUT -p tcp -m tcp --sport 1024:65535 --dport 995 -m state --state NEW,ESTABLISHED -j ACCEPT
--A OUTPUT -p tcp -m tcp --sport 1024:65535 --dport 465 -m state --state NEW,ESTABLISHED -j ACCEPT
--A OUTPUT -p udp -m udp --sport 1024:65535 --dport 123 -m state --state NEW,ESTABLISHED -j ACCEPT
--A OUTPUT -p tcp -m tcp --sport 1024:65535 --dport 21 -m state --state NEW,ESTABLISHED -j ACCEPT
--A OUTPUT -p tcp -m tcp --sport 1024:65535 --dport 20 -m state --state NEW,ESTABLISHED -j ACCEPT
--A OUTPUT -p tcp -m tcp --sport 1024:65535 --dport 443 -m state --state NEW,RELATED,ESTABLISHED -j ACCEPT
--A OUTPUT -p tcp -m tcp --sport 1024:65535 --dport 80 -m state --state NEW,ESTABLISHED -j ACCEPT
--A OUTPUT -j DROPLOG
--A ACCEPTLOG -m limit --limit 3/sec --limit-burst 8 -j LOG --log-prefix "iptables: ACCEPT " --log-level 7 --log-tcp-sequence --log-tcp-options --log-ip-options
--A ACCEPTLOG -j ACCEPT
--A DROPLOG -m limit --limit 3/sec --limit-burst 8 -j LOG --log-prefix "iptables: DROP " --log-level 7 --log-tcp-sequence --log-tcp-options --log-ip-options
--A DROPLOG -j DROP
--A REJECTLOG -m limit --limit 3/sec --limit-burst 8 -j LOG --log-prefix "iptables: REJECT " --log-level 7 --log-tcp-sequence --log-tcp-options --log-ip-options
--A REJECTLOG -p tcp -j REJECT --reject-with tcp-reset
--A REJECTLOG -j REJECT --reject-with icmp-port-unreachable
--A RELATED_ICMP -p icmp -m icmp --icmp-type 3 -j ACCEPT
--A RELATED_ICMP -p icmp -m icmp --icmp-type 11 -j ACCEPT
--A RELATED_ICMP -p icmp -m icmp --icmp-type 12 -j ACCEPT
--A RELATED_ICMP -j DROPLOG
--A SYN_FLOOD -m limit --limit 2/sec --limit-burst 6 -j RETURN
--A SYN_FLOOD -j DROP
+:blocker - [0:0]
+:client_in - [0:0]
+:client_out - [0:0]
+:netconf_in - [0:0]
+:netconf_out - [0:0]
+:server_in - [0:0]
+:server_out - [0:0]
+-A INPUT -s 127.0.0.0/8 -d 127.0.0.0/8 -i lo -j ACCEPT
+-A INPUT -s 10.0.0.254/32 -d 10.0.0.254/32 -i lo -j ACCEPT
+-A INPUT -j blocker
+-A INPUT -s 10.0.0.0/8 -d 10.0.0.254/32 -i br0 -j server_in
+-A INPUT -d 10.0.0.0/8 -i br0 -j client_in
+-A INPUT -i br0 -j netconf_in
+-A INPUT -j LOG --log-prefix "iptables: INPUT: " --log-level 7
+-A FORWARD -j blocker
+-A FORWARD -d 10.0.0.0/8 -i br0 -o br0 -j netconf_in
+-A FORWARD -d 10.0.0.0/8 -i br0 -o br0 -j netconf_out
+-A FORWARD -d 10.0.0.0/8 -i br0 -o br0 -j client_in
+-A FORWARD -s 10.0.0.0/8 -i br0 -o br0 -j client_out
+-A FORWARD -s 10.0.0.0/8 -i br0 -o br0 -j server_out
+-A FORWARD -j LOG --log-prefix "iptables: FORWARD: " --log-level 7
+-A OUTPUT -s 127.0.0.0/8 -d 127.0.0.0/8 -o lo -j ACCEPT
+-A OUTPUT -s 10.0.0.254/32 -d 10.0.0.254/32 -o lo -j ACCEPT
+-A OUTPUT -j blocker
+-A OUTPUT -s 10.0.0.254/32 -d 10.0.0.0/8 -o br0 -j server_out
+-A OUTPUT -s 10.0.0.0/8 -o br0 -j client_out
+-A OUTPUT -o br0 -j netconf_out
+-A OUTPUT -j LOG --log-prefix "iptables: OUTPUT: " --log-level 7
+-A blocker -s 8.8.0.0/24 -j LOG --log-prefix "iptables: blocker google: " --log-level 7
+-A blocker -s 8.8.0.0/24 -j DROP
+-A blocker -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -m state --state NEW -m limit --limit 5/min --limit-burst 7 -j LOG --log-prefix "iptables: drop sync: " --log-level 7
+-A blocker -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -m state --state NEW -j DROP
+-A blocker -f -m limit --limit 5/min --limit-burst 7 -j LOG --log-prefix "iptables: drop frag: "
+-A blocker -f -j DROP
+-A blocker -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,PSH,URG -j DROP
+-A blocker -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,SYN,RST,PSH,ACK,URG -j DROP
+-A blocker -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -m limit --limit 5/min --limit-burst 7 -j LOG --log-prefix "iptables: drop null: "
+-A blocker -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -j DROP
+-A blocker -p tcp -m tcp --tcp-flags SYN,RST SYN,RST -m limit --limit 5/min --limit-burst 7 -j LOG --log-prefix "iptables: drop syn rst syn rs"
+-A blocker -p tcp -m tcp --tcp-flags SYN,RST SYN,RST -j DROP
+-A blocker -p tcp -m tcp --tcp-flags FIN,SYN FIN,SYN -m limit --limit 5/min --limit-burst 7 -j LOG --log-prefix "iptables: drop xmas: "
+-A blocker -p tcp -m tcp --tcp-flags FIN,SYN FIN,SYN -j DROP
+-A blocker -p tcp -m tcp --tcp-flags FIN,ACK FIN -m limit --limit 5/min --limit-burst 7 -j LOG --log-prefix "iptables: drop fin scan: "
+-A blocker -p tcp -m tcp --tcp-flags FIN,ACK FIN -j DROP
+-A blocker -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,SYN,RST,ACK,URG -j DROP
+-A blocker -j RETURN
+-A client_in -p tcp -m tcp --sport 6667 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
+-A client_in -p tcp -m tcp --sport 21 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
+-A client_in -p tcp -m tcp --sport 9418 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
+-A client_in -p tcp -m tcp --sport 995 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
+-A client_in -p tcp -m tcp --sport 465 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
+-A client_in -p tcp -m tcp --sport 80 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
+-A client_in -p tcp -m tcp --sport 443 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
+-A client_in -p udp -m udp --sport 53 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
+-A client_in -p tcp -m tcp --sport 2222 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
+-A client_in -p tcp -m tcp --sport 22 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
+-A client_in -p tcp -m tcp --sport 11371 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
+-A client_in -j RETURN
+-A client_out -p tcp -m tcp --sport 1024:65535 --dport 6667 -m state --state NEW,ESTABLISHED -j ACCEPT
+-A client_out -p tcp -m tcp --sport 1024:65535 --dport 21 -m state --state NEW,ESTABLISHED -j ACCEPT
+-A client_out -p tcp -m tcp --sport 1024:65535 --dport 9418 -m state --state NEW,ESTABLISHED -j ACCEPT
+-A client_out -p tcp -m tcp --sport 1024:65535 --dport 995 -m state --state NEW,ESTABLISHED -j ACCEPT
+-A client_out -p tcp -m tcp --sport 1024:65535 --dport 465 -m state --state NEW,ESTABLISHED -j ACCEPT
+-A client_out -p tcp -m tcp --sport 1024:65535 --dport 443 -m state --state NEW,ESTABLISHED -j ACCEPT
+-A client_out -p udp -m udp --sport 1024:65535 --dport 443 -m state --state NEW,ESTABLISHED -j ACCEPT
+-A client_out -p tcp -m tcp --sport 1024:65535 --dport 80 -m state --state NEW,ESTABLISHED -j ACCEPT
+-A client_out -p udp -m udp --sport 1024:65535 --dport 53 -m state --state NEW,ESTABLISHED -j ACCEPT
+-A client_out -p tcp -m tcp --sport 1024:65535 --dport 2222 -m state --state NEW,ESTABLISHED -j ACCEPT
+-A client_out -p tcp -m tcp --sport 1024:65535 --dport 22 -m state --state NEW,ESTABLISHED -j ACCEPT
+-A client_out -p tcp -m tcp --sport 1024:65535 --dport 11371 -m state --state NEW,ESTABLISHED -j ACCEPT
+-A client_out -j RETURN
+-A netconf_in -p udp -m udp --sport 68 --dport 67 -j ACCEPT
+-A netconf_in -s 10.0.0.0/8 -d 10.0.0.0/8 -p udp -m udp --sport 520 --dport 520 -j ACCEPT
+-A netconf_in -p icmp -j LOG --log-prefix "iptables: netconf_in ICMP: " --log-level 7
+-A netconf_in -p icmp -j ACCEPT
+-A netconf_in -j RETURN
+-A netconf_out -s 10.0.0.0/8 -d 10.0.0.0/8 -p udp -m udp --sport 67 --dport 68 -j ACCEPT
+-A netconf_out -s 10.0.0.0/8 -d 10.0.0.0/8 -p udp -m udp --sport 520 --dport 520 -j ACCEPT
+-A netconf_out -p icmp -j LOG --log-prefix "iptables: netconf_out ICMP: " --log-level 7
+-A netconf_out -p icmp -j ACCEPT
+-A netconf_out -j RETURN
+-A server_in -p tcp -m tcp --sport 1024:65535 --dport 5900 -m state --state NEW,ESTABLISHED -j ACCEPT
+-A server_in -p tcp -m tcp --sport 1024:65535 --dport 5432 -m state --state NEW,ESTABLISHED -j ACCEPT
+-A server_in -p tcp -m tcp --sport 1024:65535 --dport 2222 -m state --state NEW,ESTABLISHED -j ACCEPT
+-A server_in -p tcp -m tcp --sport 1024:65535 --dport 443 -m state --state NEW,ESTABLISHED -j ACCEPT
+-A server_in -p tcp -m tcp --sport 1024:65535 --dport 80 -m state --state NEW,ESTABLISHED -j ACCEPT
+-A server_in -p udp -m udp --sport 1024:65535 --dport 53 -m state --state NEW,ESTABLISHED -j ACCEPT
+-A server_in -p tcp -m tcp --sport 1024:65535 --dport 53 -m state --state NEW,ESTABLISHED -j ACCEPT
+-A server_in -p tcp -m tcp --sport 1024:65535 --dport 9418 -m state --state NEW,ESTABLISHED -j ACCEPT
+-A server_in -j RETURN
+-A server_out -p udp -m udp --sport 53 --dport 1024:65535 -m state --state RELATED,ESTABLISHED -j ACCEPT
+-A server_out -p tcp -m tcp --sport 53 --dport 1024:65535 -m state --state RELATED,ESTABLISHED -j ACCEPT
+-A server_out -p tcp -m tcp --sport 9418 --dport 1024:65535 -m state --state RELATED,ESTABLISHED -j ACCEPT
+-A server_out -p tcp -m tcp --sport 443 --dport 1024:65535 -m state --state RELATED,ESTABLISHED -j ACCEPT
+-A server_out -p tcp -m tcp --sport 80 --dport 1024:65535 -m state --state RELATED,ESTABLISHED -j ACCEPT
+-A server_out -p tcp -m tcp --sport 2222 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
+-A server_out -p tcp -m tcp --sport 5432 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
+-A server_out -p tcp -m tcp --sport 5900 --dport 1024:65535 -m state --state RELATED,ESTABLISHED -j ACCEPT
+-A server_out -j RETURN
 COMMIT
-# Completed on Wed Mar 15 20:53:45 2017
+# Completed on Tue Apr  3 02:25:27 2018
diff --git a/tools/index.html b/tools/index.html
index 2f84114..1c4eb00 100644
--- a/tools/index.html
+++ b/tools/index.html
@@ -78,8 +78,9 @@
             </li>
             <li><a href="storage.html">Storage</a>
                 <ul>
-                    <li><a href="storage.html#maint">1. Maintenance</a></li>
+                    <li><a href="storage.html#fsck">1. Maintenance</a></li>
                     <li><a href="storage.html#mv">2. Moving data</a></li>
+                    <li><a href="storage.html#resize">2. Resize</a></li>
                 </ul>
             </li>
             <li><a href="lvm.html">LVM</a>
@@ -88,7 +89,7 @@
                     <li><a href="lvm.html#pv">2. Create physical volume</a></li>
                     <li><a href="lvm.html#vg">3. Create volume group</a></li>
                     <li><a href="lvm.html#lv">4. Create logical volume</a></li>
-                    <li><a href="lvm.html#maint">5. Maintenance</a></li>
+                    <li><a href="lvm.html#fsck">5. Maintenance</a></li>
                 </ul>
             </li>
             <li><a href="syslog-ng.html">Syslog-ng</a>
diff --git a/tools/lvm.html b/tools/lvm.html
index 898a8d3..b6c7678 100644
--- a/tools/lvm.html
+++ b/tools/lvm.html
@@ -16,11 +16,6 @@
         <a href="https://wiki.archlinux.org/index.php/Software_RAID_and_LVM">Arch Wiki</a>
         article about Sofware RAID and LVM.</p>
 
-        <p>Basic idea behind RAID is to deal with independent disks
-        as an array of drives. Raid 0 uses two or more disks as one,
-        with performance gains without fault-tolerance. From raid 1
-        to 6 they offer diferent fault tolerance mechanisms.</p>
-
         <p>LVM or Logic Volume Manager bring one more layer, read
         <a href="http://www.tuxradar.com/content/lvm-made-easy">Lvm made easy</a>.
         Partitions under lvm are easy to be resized, moved and there is
@@ -28,6 +23,12 @@
         disk names exp; production, development, backups...</p>
 
 
+        <p>Basic idea behind RAID is to deal with independent disks
+        as an array of drives. Raid 0 uses two or more disks as one,
+        with performance gains without fault-tolerance. From raid 1
+        to 6 they offer diferent fault tolerance mechanisms.</p>
+
+
         <p>Until now "from install" there is only one partition,
         it is good idea to have a system with diferent partitions for each
         propos. If is a "fresh install";</p>
@@ -40,17 +41,19 @@
 
         <h2 id="lvmpart">1. LVM Partition</h2>
 
-        <p>Create a LVM partition, fdisk should
-        show something like this;</p>
+        <p>There is no need to create a partition with fdisk or parted
+        if all device will be used for lvm, just <a href="#pv">pvcreate</a>
+        against the device (pvcreate /dev/sda).</p>
+
+        <p>Create a LVM partition with parted;</p>
 
         <pre>
-        # parted /dev/sda
+        parted --script ${DEV} \
+                unit mib \
+                mkpart primary 1000 4000 \
+                set 1 lvm on
         </pre>
 
-        <p>I use defaults unless to define system partition last sector,
-        where in this example is size, +80G</p>
-
-
         <h2 id="pv">2. Create physical volume</h2>
 
         <pre>
@@ -125,7 +128,31 @@
         #
         </pre>
 
-        <h2 id="maint">5. Maintenance</h2>
+        <h2 id="fsck">5. Maintenance</h2>
+
+        <h3 id="resize">Resize</h3>
+
+        <p>First umount all lvm partitions;</p>
+
+        <pre>
+        # pvs
+        </pre>
+
+        <pre>
+        # pvresize /dev/sdb
+        </pre>
+
+        <pre>
+        # vgs
+        </pre>
+
+        <pre>
+        # lvresize --resizefs --size +25GB /dev/mapper/vg_system-lv_ports
+        </pre>
+
+        <pre>
+        # vgs
+        </pre>
 
         <h2 id="encrypt">7. Encryption</h2>
 
diff --git a/tools/postgresql.html b/tools/postgresql.html
index 0399ec6..155f30c 100644
--- a/tools/postgresql.html
+++ b/tools/postgresql.html
@@ -300,15 +300,18 @@
         db_flyspray=# create schema public;
         </pre>
 
-        <h3 id="backup">7.4. Backup</h3>
+        <h2 id="backup">8. Backup</h3>
 
+        <h3>8.1. Dump databases</h3>
 
-        <p>Backup Database</p>
+        <pre>
+        $ pg_dumpall -U postgres | gzip > cluster_dump.gz
+        </pre>
 
-        <h3 id="backup">7.5. Restore</h3>
+        <h3>8.2. Restore</h3>
 
         <pre>
-        $ psql db_flyspray &lt; database_dump
+        $ gzip -c cluster_dump.gz | psql -U postgres 
         </pre>
 
         <a href="index.html">Tools Index</a>
diff --git a/tools/qemu.html b/tools/qemu.html
index f79b955..e32d03f 100644
--- a/tools/qemu.html
+++ b/tools/qemu.html
@@ -46,12 +46,14 @@
         $ qemu-img create -f qcow2 crux-img.qcow2 2000M
         </pre>
 
+        <h3 id="mount">2.1. Mount images</h3>
+
         <p>Qemu disk images can be treated as regular disks using
         qemu disk network block device server;</p>
 
         <pre>
         $ sudo modprobe nbd
-        $ sudo qemu-nbd -c /dev/nbd0 /crux-img.qcow2
+        $ sudo qemu-nbd -c /dev/nbd0 crux-img.qcow2
         </pre>
 
         <p>Information about preparing
@@ -64,10 +66,10 @@
         parted --script ${DEV} \
                 mklabel gpt \
                 unit mib \
-                mkpart primary 1 3 \
+                mkpart primary 2 4 \
                 set 1 bios_grub on \
                 name 1 grub \
-                mkpart ESP fat32 3 59 \
+                mkpart ESP fat32 4 59 \
                 set 2 boot on \
                 name 2 efi \
                 mkpart primary ext4 103 200 \
@@ -122,7 +124,68 @@
         $ sudo qemu-nbd -d /dev/nbd0
         </pre>
 
-        <h2 id="net">2. Network</h2>
+        <h3 id="resize">2.2. Resize images</h3>
+
+        <p>Verify disk image information;</p>
+
+        <pre>
+        $ qemu-img info c1-storage.qcow2
+        </pre>
+
+        <pre>
+	image: c1-storage.qcow2
+	file format: qcow2
+	virtual size: 10G (10737418240 bytes)
+	disk size: 7.6G
+	cluster_size: 65536
+	Format specific information:
+	    compat: 1.1
+	    lazy refcounts: false
+	    refcount bits: 16
+	    corrupt: false
+	$
+	</pre>
+
+	<p>In this example is added 25G to the image;</p>
+
+	<pre>
+	$ qemu-img resize c1-storage.qcow2 +25G
+	</pre>
+
+        <p>Read <a href="lvm.html#resize">lvm resize</a> if image
+        is using lvm, or use resize2fs. If size is not provided to resize2fs,
+        by default it will grow file system to all partition;</p>
+
+        <pre>
+        $ sudo qemu-nbd -c /dev/nbd0 /srv/qemu/img/c1-server.qcow2
+        </pre>
+
+        <pre>
+        # kpartx -a -s -l -u /dev/nbd0
+        GPT:Primary header thinks Alt. header is not at the end of the disk.
+        GPT:Alternate GPT header not at the end of the disk.
+        GPT: Use GNU Parted to correct GPT errors.
+
+        # parted /dev/nbd0
+        GNU Parted 3.2
+        Using /dev/nbd0
+        Welcome to GNU Parted! Type 'help' to view a list of commands.
+        (parted) print
+        Warning: Not all of the space available to /dev/nbd0 appears to be used, you can
+        fix the GPT to use all of the space (an extra 16777216 blocks) or continue with
+        the current setting?
+        Fix/Ignore? Fix
+
+        (parted) resize 3 100%
+        (parted) quit
+        </pre>
+
+        <pre>
+        # resize2fs /dev/mapper/nbd0p3
+        # e2fsck /dev/mapper/nbd0p3
+        </pre>
+
+        <h2 id="net">3. Network</h2>
 
         <p>Network configuration;</p>
 
@@ -140,7 +203,7 @@
         KERNEL=="tun", GROUP="kvm", MODE="0660", OPTIONS+="static_node=net/tun"
         </pre>
 
-        <h3>2.1. Routing</h3>
+        <h3>3.1. Routing</h3>
 
         <p>Create interface with correct permissions set for kvm group.</p>
 
@@ -152,7 +215,7 @@
         # iptables -t nat -A POSTROUTING -s 10.0.0.0/24 -j MASQUERADE
         </pre>
 
-        <h3>2.2. Public Bridge</h3>
+        <h3>3.2. Public Bridge</h3>
 
         <p>Create <a href="network.html#bridge">bridge</a>, create new
         tap and add it to bridge;</p>
@@ -162,7 +225,7 @@
 
         ADDR=10.0.0.254
         NET=10.0.0.0
-        GW=192.168.1.254
+        GW=10.0.0.1
         MASK=24
 
         # one tap for each cpu core
@@ -213,7 +276,7 @@
         # End of file
         </pre>
 
-        <h2 id="guest">Guest System</h2>
+        <h2 id="guest">4. Guest System</h2>
 
         <p>See <a href="scripts/runvm/runvm.sh">scripts/runvm/runvm.sh</a>,
         as template. Example scripts;</p>
@@ -253,7 +316,7 @@
         <p>Set guests machines to run under the total resolution provided
         by  host system configure grub on the guest with gfxmode;</p>
 
-        <h3 id="guest">Guest Graphics</h3>
+        <h3 id="graphics">4.1. Guest Graphics</h3>
 
         <p>Get current resolution on host machine;</p>
 
@@ -275,7 +338,7 @@
         # update-grub
         </pre>
 
-        <h3 id="sound">Guest Sound</h3>
+        <h3 id="sound">4.2. Guest Sound</h3>
 
         <p>Check if DMAR is enable on kernel configuration,
         Intel and AMD uses different technology. To check on
@@ -298,11 +361,12 @@
         other="-soundhw hda -vga std -display sdl"
         </pre>
 
-        <h3 id="sound">Guest USB</h3>
+        <h3 id="usb">4.3. Guest USB</h3>
 
         <pre>
         # lsusb
         # ls /dev/v4l
+        # ls /dev/bus/usb
         </pre>
 
         <pre>
@@ -319,9 +383,26 @@
         mac="54:60:be:ef:5c:72"
         other="-soundhw hda -vga std -display sdl -usb -device usb-host,vendorid=0x13d3,productid=0x5652"
         </pre>
+
+        <h2 id="bootusb">5. Boot iso on usb</h2>
+
+        <pre>
+        # lsusb
+        # ls /dev/bus/usb
+        </pre>
+
+        <pre>
+        # chown root:kvm /dev/bus/usb/003/012
+        </pre>
+
+
+        <pre>
+        $ qemu-system-x86_64 -m 512 -enable-kvm -vnc :0 -usb  -device usb-host,hostbus=3,hostaddr=12
+        </pre>
+
         <a href="index.html">Tools Index</a>
         <p>This is part of the c9 Manual.
-        Copyright (C) 2016
+        Copyright (C) 2018
         c9 team.
         See the file <a href="../fdl-1.3-standalone.html">Gnu Free Documentation License</a>
         for copying conditions.</p>
diff --git a/tools/scripts/autoport.sh b/tools/scripts/autoport.sh
deleted file mode 100644
index 9965936..0000000
--- a/tools/scripts/autoport.sh
+++ /dev/null
@@ -1,24 +0,0 @@
-#!/bin/bash
-
-# Root Directory
-DIR=$(dirname "$PWD");
-
-DIR_CONF=$DIR"/conf"
-COL_DIR=$DIR"/c9-ports/"
-
-#rm ck4up.conf
-for port in ${COL_DIR}*/ ; do
-
-    echo "Checking port $port"
-    # (cd $port && git clean -f -d . )
-    # prtwash -p -s $port
-    prtverify -m clean-repo $port
-
-    #echo "${port}Pkgfile;"
-    #source  ${port}Pkgfile;
-
-    #echo "$name md5 ${source[0]} @TAR@" >> ck4up.conf
-done
-
-portspage --title=c9-ports . > index.html
-httpup-repgen $COL_DIR
diff --git a/tools/scripts/external-ports.sh b/tools/scripts/external-ports.sh
deleted file mode 100644
index 21f42cb..0000000
--- a/tools/scripts/external-ports.sh
+++ /dev/null
@@ -1,8 +0,0 @@
-#!/bin/sh
-
-prt-get printf "%i %p %n \n" | grep "yes /usr/ports" \
-    | grep -v "ports/contrib" \
-    | grep -v "ports/opt" \
-    | grep -v "ports/core" \
-    | grep -v "ports/xorg" \
-    | grep -v "ports/c9-ports"
diff --git a/tools/storage.html b/tools/storage.html
index 109c6fa..2fc95d4 100644
--- a/tools/storage.html
+++ b/tools/storage.html
@@ -9,7 +9,7 @@
 
         <h1>Storage</h1>
 
-        <h2 id="maint">1. Maintenance</h2>
+        <h2 id="fsck">1. Maintenance</h2>
 
         <p>SMART provides statistics of disk firmware, this system
         handle errors has their occur. Badblocks detect bad blocks
@@ -30,14 +30,14 @@
 
         <h2 id="mv">2. Moving data</h2>
 
-        <p>Temp partition with 20M-50M;</dd>
+        <p>Temp partition with 20M-50M;</p>
 
         <pre>
         (parted) mkpart primary ext4 4000MiB 4050MiB
         </pre>
 
         <p>Ports partition with 120G allows to host sources, package
-        backups and ports;</dd>
+        backups and ports;</p>
 
         <pre>
         (parted) mkpart primary ext4 192000MiB 312000MiB
@@ -78,6 +78,17 @@
 
         <p>Reboot in normal mode.</p>
 
+        <h2 id="resize">2. Resize filesystem</h2>
+
+        <p>If partition is using lvm read
+        <a href="lvm.html#resize">lvm resize</a>, if you are using qemu
+        images read <a href="qemu.html#resize">resize images</a></p>
+
+        <pre>
+        # resize2fs /dev/sda3
+        # e2fsck /dev/sda3
+        </pre>
+
         <a href="index.html">Tools Index</a>
         <p>
         This is part of the c9-doc Manual.