diff --git a/circle/firewall/fw.py b/circle/firewall/fw.py
index 369c531..a1bbf38 100644
--- a/circle/firewall/fw.py
+++ b/circle/firewall/fw.py
@@ -156,10 +156,6 @@ class Firewall:
                       '-j ACCEPT')
 
     def postrun(self):
-        self.iptables('-A PUB_OUT -s 152.66.243.160/27 -p tcp --dport 25 '
-                      '-j LOG_ACC')
-        self.iptables('-A PUB_OUT -s 152.66.243.160/27 -p tcp --dport 445 '
-                      '-j LOG_ACC')
         self.iptables('-A PUB_OUT -p tcp --dport 25 -j LOG_DROP')
         self.iptables('-A PUB_OUT -p tcp --dport 445 -j LOG_DROP')
         self.iptables('-A PUB_OUT -p udp --dport 445 -j LOG_DROP')
@@ -206,15 +202,6 @@ class Firewall:
                                      (str(s_vlan.network4), d_vlan.interface,
                                       s_vlan.snat_ip))
 
-        # hard-wired rules
-        self.iptablesnat('-A POSTROUTING -s 10.5.0.0/16 -o vlan0003 -j SNAT '
-                         '--to-source 10.3.255.254')  # man elerheto legyen
-        self.iptablesnat('-A POSTROUTING -o vlan0008 -j SNAT '
-                         '--to-source 10.0.0.247')  # wolf network for printing
-        self.iptablesnat('-A POSTROUTING -s 10.3.0.0/16 -p udp --dport 53 '
-                         '-o vlan0002 -j SNAT ''--to-source %s' %
-                         self.pub.ipv4)  # kulonben nem megy a dns man-ban
-
         self.iptablesnat('COMMIT')
 
     def ipt_filter(self):
@@ -274,21 +261,6 @@ class Firewall:
         if not self.IPV6:
             self.ipt_nat()
 
-    def reload(self):
-        if self.IPV6:
-            process = subprocess.Popen(['/usr/bin/ssh', 'fw2',
-                                        '/usr/bin/sudo',
-                                        '/sbin/ip6tables-restore', '-c'],
-                                       shell=False, stdin=subprocess.PIPE)
-            process.communicate('\n'.join(self.RULES) + '\n')
-        else:
-            process = subprocess.Popen(['/usr/bin/ssh', 'fw2',
-                                        '/usr/bin/sudo',
-                                        '/sbin/iptables-restore', '-c'],
-                                       shell=False, stdin=subprocess.PIPE)
-            process.communicate('\n'.join(self.RULES) + '\n' +
-                                '\n'.join(self.RULES_NAT) + '\n')
-
     def get(self):
         if self.IPV6:
             return {'filter': self.RULES, }