repo-backports-update
http://download.opensuse.org/update/leap/15.6/backports/
Update repository of openSUSE Backports
99
/
repo-non-oss
http://download.opensuse.org/distribution/leap/15.6/repo/non-oss/
Non-OSS Repository
99
/
repo-sle-update
http://download.opensuse.org/update/leap/15.6/sle/
Update repository with updates from SUSE Linux Enterprise 15
99
/
repo-update
http://download.opensuse.org/update/leap/15.6/oss
Main Update Repository
99
/
repo-update-non-oss
http://download.opensuse.org/update/leap/15.6/non-oss/
Update Repository (Non-Oss)
99
/
splash=silent preempt=full mitigations=auto quiet security=apparmor
auto
auto
false
true
false
gfxterm
8
false
true
vga=gfx-1024x768x16
false
public
true
off
true
Unsolicited incoming network packets are rejected. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.
false
block
Block
%%REJECT%%
For computers in your demilitarized zone that are publicly-accessible with limited access to your internal network. Only selected incoming connections are accepted.
false
dmz
ssh
DMZ
default
All network connections are accepted.
docker0
false
docker
docker
ACCEPT
Unsolicited incoming network packets are dropped. Incoming packets that are related to outgoing network connections are accepted. Outgoing network connections are allowed.
false
drop
Drop
DROP
For use on external networks. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.
true
external
ssh
External
default
For use in home areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.
false
home
dhcpv6-client
mdns
samba-client
ssh
Home
default
For use on internal networks. You mostly trust the other computers on the networks to not harm your computer. Only selected incoming connections are accepted.
false
internal
dhcpv6-client
mdns
samba-client
ssh
Internal
default
For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.
eth0
false
public
dhcpv6-client
ssh
Public
default
All network connections are accepted.
false
trusted
Trusted
ACCEPT
For use in work areas. You mostly trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.
false
work
dhcpv6-client
ssh
Work
default
false
100
users
493
utmp
65533
nogroup
71
ntadmin
488
input
491
cdrom
475
polkitd
1
bin
daemon
2
daemon
65534
nobody
36
kvm
59
maildrop
postfix
477
sshd
482
chrony
489
disk
492
audio
494
lock
15
shadow
485
tape
495
kmem
5
tty
480
systemd-network
484
video
499
messagebus
486
sgx
497
lp
487
render
0
root
42
trusted
479
systemd-timesync
481
systemd-journal
51
postfix
490
dialout
483
audit
498
mail
postfix
62
man
496
wheel
478
nscd
127.0.0.1
localhost
::1
localhost ipv6-localhost ipv6-loopback
fe00::0
ipv6-localnet
ff00::0
ipv6-mcastprefix
ff02::1
ipv6-allnodes
ff02::2
ipv6-allrouters
ff02::3
ipv6-allhosts
AUTO
true
localhost
auto
dhcp
eth0
auto
public
true
true
false
false
false
auto
systemd
${storage}
false
multi-user
YaST2-Firstboot
YaST2-Second-Stage
apparmor
auditd
klog
chronyd
cron
cups
firewalld
wickedd-auto4
wickedd-dhcp4
wickedd-dhcp6
wickedd-nanny
irqbalance
issue-generator
kbdsettings
lvm2-monitor
mcelog
wicked
nscd
postfix
purge-kernels
rsyslog
smartd
sshd
systemd-fsck-root
systemd-pstore
systemd-remount-fs
qemu-guest-agent
true
wicked
os-prober
openssh
openSUSE-release
lvm2
kexec-tools
grub2
glibc
firewalld
e2fsprogs
chrony
autoyast2
qemu-guest-agent
apparmor
base
documentation
enhanced_base
minimal_base
sw_management
yast2_basis
Leap
false
false
${vm_os_timezone}
100
/home
-1
/bin/bash
022
true
Build User
100
/home/${build_username}
false
99999
0
7
/bin/bash
1000
${build_password_encrypted}
${build_username}