2006-11-15 22:02:04 +01:00
|
|
|
<?xml version="1.0" encoding="UTF-8"?>
|
2008-10-08 01:23:07 +02:00
|
|
|
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.4//EN"
|
|
|
|
"http://www.oasis-open.org/docbook/xml/4.4/docbookx.dtd">
|
2006-11-15 22:02:04 +01:00
|
|
|
<refentry>
|
|
|
|
<refmeta>
|
|
|
|
<refentrytitle>shorewall-rules</refentrytitle>
|
|
|
|
|
|
|
|
<manvolnum>5</manvolnum>
|
2014-01-16 17:32:57 +01:00
|
|
|
|
|
|
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
2006-11-15 22:02:04 +01:00
|
|
|
</refmeta>
|
|
|
|
|
|
|
|
<refnamediv>
|
|
|
|
<refname>rules</refname>
|
|
|
|
|
|
|
|
<refpurpose>Shorewall rules file</refpurpose>
|
|
|
|
</refnamediv>
|
|
|
|
|
|
|
|
<refsynopsisdiv>
|
|
|
|
<cmdsynopsis>
|
|
|
|
<command>/etc/shorewall/rules</command>
|
|
|
|
</cmdsynopsis>
|
|
|
|
</refsynopsisdiv>
|
|
|
|
|
|
|
|
<refsect1>
|
|
|
|
<title>Description</title>
|
|
|
|
|
2007-02-16 18:29:06 +01:00
|
|
|
<para>Entries in this file govern connection establishment by defining
|
2013-05-03 18:19:45 +02:00
|
|
|
exceptions to the policies laid out in <ulink
|
2014-01-16 17:32:57 +01:00
|
|
|
url="/manpages/shorewall-policy.html">shorewall-policy</ulink>(5). By
|
|
|
|
default, subsequent requests and responses are automatically allowed using
|
2006-11-26 19:45:23 +01:00
|
|
|
connection tracking. For any particular (source,dest) pair of zones, the
|
|
|
|
rules are evaluated in the order in which they appear in this file and the
|
|
|
|
first terminating match is the one that determines the disposition of the
|
2009-02-12 16:53:44 +01:00
|
|
|
request. All rules are terminating except LOG and COUNT rules.</para>
|
2006-11-15 22:02:04 +01:00
|
|
|
|
|
|
|
<warning>
|
|
|
|
<para>If you masquerade or use SNAT from a local system to the internet,
|
|
|
|
you cannot use an ACCEPT rule to allow traffic from the internet to that
|
2006-11-26 18:34:48 +01:00
|
|
|
system. You <emphasis role="bold">must</emphasis> use a DNAT rule
|
|
|
|
instead.</para>
|
2006-11-15 22:02:04 +01:00
|
|
|
</warning>
|
|
|
|
|
|
|
|
<para>The rules file is divided into sections. Each section is introduced
|
2013-11-24 16:58:02 +01:00
|
|
|
by a "Section Header" which is a line beginning with [?]SECTION and
|
|
|
|
followed by the section name.</para>
|
|
|
|
|
|
|
|
<para>The optional "?" was added in Shorewalll 4.6.0 and is preferred.
|
|
|
|
Existing configurations may be converted to use this form using the
|
|
|
|
<command>shorewall update</command> command.</para>
|
2006-11-15 22:02:04 +01:00
|
|
|
|
|
|
|
<para>Sections are as follows and must appear in the order listed:</para>
|
|
|
|
|
|
|
|
<variablelist>
|
2011-08-16 00:32:24 +02:00
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis role="bold">ALL</emphasis></term>
|
|
|
|
|
|
|
|
<listitem>
|
2011-10-04 01:02:01 +02:00
|
|
|
<para>This section was added in Shorewall 4.4.23. Rules in this
|
2011-08-16 00:32:24 +02:00
|
|
|
section are applied, regardless of the connection tracking state of
|
|
|
|
the packet.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2006-11-15 22:02:04 +01:00
|
|
|
<varlistentry>
|
2006-11-16 00:32:14 +01:00
|
|
|
<term><emphasis role="bold">ESTABLISHED</emphasis></term>
|
2006-11-15 22:02:04 +01:00
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Packets in the ESTABLISHED state are processed by rules in
|
|
|
|
this section.</para>
|
|
|
|
|
|
|
|
<para>The only ACTIONs allowed in this section are ACCEPT, DROP,
|
|
|
|
REJECT, LOG and QUEUE</para>
|
|
|
|
|
|
|
|
<para>There is an implicit ACCEPT rule inserted at the end of this
|
|
|
|
section.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2006-11-16 00:32:14 +01:00
|
|
|
<term><emphasis role="bold">RELATED</emphasis></term>
|
2006-11-15 22:02:04 +01:00
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Packets in the RELATED state are processed by rules in this
|
|
|
|
section.</para>
|
|
|
|
|
|
|
|
<para>The only ACTIONs allowed in this section are ACCEPT, DROP,
|
|
|
|
REJECT, LOG and QUEUE</para>
|
|
|
|
|
2013-01-24 17:33:59 +01:00
|
|
|
<para>There is an implicit rule added at the end of this section
|
|
|
|
that invokes the RELATED_DISPOSITION (<ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5)).</para>
|
2013-01-24 17:33:59 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis role="bold">INVALID</emphasis></term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Added in Shorewall 4.5.13. Packets in the INVALID state are
|
|
|
|
processed by rules in this section.</para>
|
|
|
|
|
|
|
|
<para>The only Actions allowed in this section are ACCEPT, DROP,
|
|
|
|
REJECT, LOG and QUEUE.</para>
|
|
|
|
|
|
|
|
<para>There is an implicit rule added at the end of this section
|
|
|
|
that invokes the INVALID_DISPOSITION (<ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5)).</para>
|
2006-11-15 22:02:04 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2013-01-25 04:24:01 +01:00
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis role="bold">UNTRACKED</emphasis></term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Added in Shorewall 4.5.13. Packets in the UNTRACKED state are
|
|
|
|
processed by rules in this section.</para>
|
|
|
|
|
|
|
|
<para>The only Actions allowed in this section are ACCEPT, DROP,
|
|
|
|
REJECT, LOG and QUEUE.</para>
|
|
|
|
|
|
|
|
<para>There is an implicit rule added at the end of this section
|
|
|
|
that invokes the UNTRACKED_DISPOSITION (<ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5)).</para>
|
2013-01-25 04:24:01 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2006-11-15 22:02:04 +01:00
|
|
|
<varlistentry>
|
2006-11-16 00:32:14 +01:00
|
|
|
<term><emphasis role="bold">NEW</emphasis></term>
|
2006-11-15 22:02:04 +01:00
|
|
|
|
|
|
|
<listitem>
|
2009-02-19 20:28:08 +01:00
|
|
|
<para>Packets in the NEW, INVALID and UNTRACKED states are processed
|
|
|
|
by rules in this section.</para>
|
2006-11-15 22:02:04 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
</variablelist>
|
|
|
|
|
|
|
|
<note>
|
|
|
|
<para>If you are not familiar with Netfilter to the point where you are
|
|
|
|
comfortable with the differences between the various connection tracking
|
2007-02-16 21:56:24 +01:00
|
|
|
states, then it is suggested that you omit the <emphasis
|
2006-11-16 00:32:14 +01:00
|
|
|
role="bold">ESTABLISHED</emphasis> and <emphasis
|
2011-10-04 01:02:01 +02:00
|
|
|
role="bold">RELATED</emphasis> sections and place all of your
|
|
|
|
non-blacklisting rules in the NEW section (That's after the line that
|
|
|
|
reads SECTION NEW').</para>
|
2006-11-15 22:02:04 +01:00
|
|
|
</note>
|
|
|
|
|
|
|
|
<warning>
|
2007-01-14 23:34:51 +01:00
|
|
|
<para>If you specify FASTACCEPT=Yes in <ulink
|
2014-01-16 17:32:57 +01:00
|
|
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5) then the
|
|
|
|
<emphasis role="bold">ALL, ESTABLISHED</emphasis> and <emphasis
|
2006-11-16 00:32:14 +01:00
|
|
|
role="bold">RELATED</emphasis> sections must be empty.</para>
|
2011-12-06 02:45:09 +01:00
|
|
|
|
|
|
|
<para>An except is made if you are running Shorewall 4.4.27 or later and
|
2013-05-03 18:19:45 +02:00
|
|
|
you have specified a non-default value for RELATED_DISPOSITION or
|
2011-12-06 02:45:09 +01:00
|
|
|
RELATED_LOG_LEVEL. In that case, you may have rules in the RELATED
|
|
|
|
section of this file.</para>
|
2006-11-15 22:02:04 +01:00
|
|
|
</warning>
|
|
|
|
|
|
|
|
<para>You may omit any section that you don't need. If no Section Headers
|
2006-11-16 00:32:14 +01:00
|
|
|
appear in the file then all rules are assumed to be in the NEW
|
|
|
|
section.</para>
|
2006-11-15 22:02:04 +01:00
|
|
|
|
2007-10-22 18:00:33 +02:00
|
|
|
<para>When defining rules that rewrite the destination IP address and/or
|
|
|
|
port number (namely DNAT and REDIRECT rules), it is important to keep
|
|
|
|
straight which columns in the file specify the packet before rewriting and
|
|
|
|
which specify how the packet will look after rewriting.</para>
|
|
|
|
|
|
|
|
<itemizedlist>
|
|
|
|
<listitem>
|
|
|
|
<para>The DEST column specifies the final destination for the packet
|
|
|
|
after rewriting and can include the final IP address and/or port
|
|
|
|
number.</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>The remaining columns specify characteristics of the packet
|
|
|
|
before rewriting. In particular, the ORIGINAL DEST column gives the
|
|
|
|
original destination IP address of the packet and the DEST PORT(S)
|
|
|
|
column give the original destination port(s).</para>
|
|
|
|
</listitem>
|
|
|
|
</itemizedlist>
|
|
|
|
|
2011-10-02 20:45:55 +02:00
|
|
|
<para>The columns in the file are as follows (where the column name is
|
|
|
|
followed by a different name in parentheses, the different name is used in
|
|
|
|
the alternate specification syntax).</para>
|
2006-11-15 22:02:04 +01:00
|
|
|
|
|
|
|
<variablelist>
|
|
|
|
<varlistentry>
|
2010-07-17 01:41:07 +02:00
|
|
|
<term><emphasis role="bold">ACTION</emphasis> - <emphasis
|
|
|
|
role="bold"><replaceable>target</replaceable>[:</emphasis>{<emphasis>log-level</emphasis>|<emphasis
|
2006-11-23 16:53:07 +01:00
|
|
|
role="bold">none</emphasis>}[<emphasis role="bold"><emphasis
|
|
|
|
role="bold">!</emphasis></emphasis>][<emphasis
|
|
|
|
role="bold">:</emphasis><emphasis>tag</emphasis>]]</term>
|
2006-11-15 22:02:04 +01:00
|
|
|
|
|
|
|
<listitem>
|
2006-11-26 18:34:48 +01:00
|
|
|
<para>Specifies the action to be taken if the connection request
|
2010-07-17 01:41:07 +02:00
|
|
|
matches the rule. <replaceable>target</replaceable> must be one of
|
|
|
|
the following.</para>
|
2006-11-15 22:02:04 +01:00
|
|
|
|
|
|
|
<variablelist>
|
|
|
|
<varlistentry>
|
2006-11-16 00:32:14 +01:00
|
|
|
<term><emphasis role="bold">ACCEPT</emphasis></term>
|
2006-11-15 22:02:04 +01:00
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Allow the connection request.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2006-11-16 00:32:14 +01:00
|
|
|
<term><emphasis role="bold">ACCEPT+</emphasis></term>
|
2006-11-15 22:02:04 +01:00
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>like ACCEPT but also excludes the connection from any
|
2006-11-26 18:34:48 +01:00
|
|
|
subsequent matching <emphasis
|
|
|
|
role="bold">DNAT</emphasis>[<emphasis
|
2006-11-16 00:32:14 +01:00
|
|
|
role="bold">-</emphasis>] or <emphasis
|
|
|
|
role="bold">REDIRECT</emphasis>[<emphasis
|
2011-12-28 00:29:37 +01:00
|
|
|
role="bold">-</emphasis>] rules.</para>
|
2006-11-15 22:02:04 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2007-02-26 17:57:47 +01:00
|
|
|
<varlistentry>
|
2008-07-10 22:58:46 +02:00
|
|
|
<term><emphasis role="bold">ACCEPT!</emphasis></term>
|
2007-02-26 17:57:47 +01:00
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>like ACCEPT but exempts the rule from being suppressed
|
|
|
|
by OPTIMIZE=1 in <ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5).</para>
|
2007-02-26 17:57:47 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2012-11-19 17:19:12 +01:00
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis>action</emphasis></term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>The name of an <emphasis>action</emphasis> declared in
|
|
|
|
<ulink
|
2014-01-16 17:32:57 +01:00
|
|
|
url="/manpages/shorewall-actions.html">shorewall-actions</ulink>(5)
|
|
|
|
or in /usr/share/shorewall/actions.std.</para>
|
2012-11-19 17:19:12 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis
|
|
|
|
role="bold">ADD(<replaceable>ipset</replaceable>:<replaceable>flags</replaceable>)</emphasis></term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Added in Shorewall 4.4.12. Causes addresses and/or port
|
|
|
|
numbers to be added to the named
|
|
|
|
<replaceable>ipset</replaceable>. The
|
2013-05-03 18:19:45 +02:00
|
|
|
<replaceable>flags</replaceable> specify the address or tuple
|
2012-11-19 17:19:12 +01:00
|
|
|
to be added to the set and must match the type of ipset
|
|
|
|
involved. For example, for an iphash ipset, either the SOURCE
|
|
|
|
or DESTINATION address can be added using
|
|
|
|
<replaceable>flags</replaceable> <emphasis
|
|
|
|
role="bold">src</emphasis> or <emphasis
|
|
|
|
role="bold">dst</emphasis> respectively (see the -A command in
|
|
|
|
ipset (8)).</para>
|
|
|
|
|
|
|
|
<para>ADD is non-terminating. Even if a packet matches the
|
|
|
|
rule, it is passed on to the next rule.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2012-11-22 17:24:33 +01:00
|
|
|
<varlistentry>
|
|
|
|
<term>AUDIT[(accept|drop|reject)]</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Added in Shorewall 4.5.10. Audits the packet with the
|
|
|
|
specified type; if the type is omitted, then
|
|
|
|
<option>drop</option> is assumed. Require AUDIT_TARGET support
|
|
|
|
in the kernel and iptables.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2011-05-22 01:25:38 +02:00
|
|
|
<varlistentry>
|
|
|
|
<term>A_ACCEPT, A_ACCEPT+ and A_ACCEPT!</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Added in Shorewall 4.4.20. Audited versions of ACCEPT,
|
|
|
|
ACCEPT+ and ACCEPT! respectively. Require AUDIT_TARGET support
|
2011-12-28 00:29:37 +01:00
|
|
|
in the kernel and iptables.</para>
|
2011-05-22 01:25:38 +02:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2006-11-15 22:02:04 +01:00
|
|
|
<varlistentry>
|
2012-11-19 17:19:12 +01:00
|
|
|
<term>A_DROP and A_DROP!</term>
|
2006-11-15 22:02:04 +01:00
|
|
|
|
|
|
|
<listitem>
|
2012-11-19 17:19:12 +01:00
|
|
|
<para>Added in Shorewall 4.4.20. Audited versions of DROP and
|
|
|
|
DROP! respectively. Require AUDIT_TARGET support in the kernel
|
|
|
|
and iptables.</para>
|
2006-11-15 22:02:04 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2012-11-19 17:19:12 +01:00
|
|
|
<term>A_REJECT AND A_REJECT!</term>
|
2006-11-15 22:02:04 +01:00
|
|
|
|
|
|
|
<listitem>
|
2012-11-19 17:19:12 +01:00
|
|
|
<para>Added in Shorewall 4.4.20. Audited versions of REJECT
|
|
|
|
and REJECT! respectively. Require AUDIT_TARGET support in the
|
|
|
|
kernel and iptables.</para>
|
2006-11-15 22:02:04 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2007-02-26 17:57:47 +01:00
|
|
|
<varlistentry>
|
2012-12-23 00:47:03 +01:00
|
|
|
<term><emphasis role="bold">[?]COMMENT</emphasis></term>
|
2007-02-26 17:57:47 +01:00
|
|
|
|
|
|
|
<listitem>
|
2012-11-19 17:19:12 +01:00
|
|
|
<para>the rest of the line will be attached as a comment to
|
|
|
|
the Netfilter rule(s) generated by the following entries. The
|
|
|
|
comment will appear delimited by "/* ... */" in the output of
|
|
|
|
"shorewall show <chain>". To stop the comment from being
|
|
|
|
attached to further rules, simply include COMMENT on a line by
|
|
|
|
itself.</para>
|
2012-12-23 00:47:03 +01:00
|
|
|
|
|
|
|
<note>
|
|
|
|
<para>Beginning with Shorewall 4.5.11, ?COMMENT is a synonym
|
|
|
|
for COMMENT and is preferred.</para>
|
|
|
|
</note>
|
2007-02-26 17:57:47 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2011-05-22 01:25:38 +02:00
|
|
|
<varlistentry>
|
2012-11-19 17:19:12 +01:00
|
|
|
<term><emphasis role="bold">CONTINUE</emphasis></term>
|
2011-05-22 01:25:38 +02:00
|
|
|
|
|
|
|
<listitem>
|
2012-11-19 17:19:12 +01:00
|
|
|
<para>For experts only.</para>
|
|
|
|
|
|
|
|
<para>Do not process any of the following rules for this
|
|
|
|
(source zone,destination zone). If the source and/or
|
|
|
|
destination IP address falls into a zone defined later in
|
2014-01-16 17:32:57 +01:00
|
|
|
<ulink
|
|
|
|
url="/manpages/shorewall-zones.html">shorewall-zones</ulink>(5)
|
2012-11-19 17:19:12 +01:00
|
|
|
or in a parent zone of the source or destination zones, then
|
|
|
|
this connection request will be passed to the rules defined
|
|
|
|
for that (those) zone(s). See <ulink
|
2014-01-16 17:32:57 +01:00
|
|
|
url="/manpages/shorewall-nesting.html">shorewall-nesting</ulink>(5)
|
|
|
|
for additional information.</para>
|
2011-05-22 01:25:38 +02:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2006-11-15 22:02:04 +01:00
|
|
|
<varlistentry>
|
2012-11-19 17:19:12 +01:00
|
|
|
<term><emphasis role="bold">CONTINUE!</emphasis></term>
|
2006-11-15 22:02:04 +01:00
|
|
|
|
|
|
|
<listitem>
|
2012-11-19 17:19:12 +01:00
|
|
|
<para>like CONTINUE but exempts the rule from being suppressed
|
|
|
|
by OPTIMIZE=1 in <ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5).</para>
|
2006-11-15 22:02:04 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2007-02-26 17:57:47 +01:00
|
|
|
<varlistentry>
|
2012-11-19 17:19:12 +01:00
|
|
|
<term><emphasis role="bold">COUNT</emphasis></term>
|
2007-02-26 17:57:47 +01:00
|
|
|
|
|
|
|
<listitem>
|
2012-11-19 17:19:12 +01:00
|
|
|
<para>Simply increment the rule's packet and byte count and
|
|
|
|
pass the packet to the next rule.</para>
|
2007-02-26 17:57:47 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2011-05-22 01:25:38 +02:00
|
|
|
<varlistentry>
|
2012-11-19 17:19:12 +01:00
|
|
|
<term><emphasis
|
|
|
|
role="bold">DEL(<replaceable>ipset</replaceable>:<replaceable>flags</replaceable>)</emphasis></term>
|
2011-05-22 01:25:38 +02:00
|
|
|
|
|
|
|
<listitem>
|
2012-11-19 17:19:12 +01:00
|
|
|
<para>Added in Shorewall 4.4.12. Causes an entry to be deleted
|
|
|
|
from the named <replaceable>ipset</replaceable>. The
|
2013-05-03 18:19:45 +02:00
|
|
|
<replaceable>flags</replaceable> specify the address or tuple
|
2012-11-19 17:19:12 +01:00
|
|
|
to be deleted from the set and must match the type of ipset
|
|
|
|
involved. For example, for an iphash ipset, either the SOURCE
|
2013-05-03 18:19:45 +02:00
|
|
|
or DESTINATION address can be deleted using
|
2012-11-19 17:19:12 +01:00
|
|
|
<replaceable>flags</replaceable> <emphasis
|
|
|
|
role="bold">src</emphasis> or <emphasis
|
|
|
|
role="bold">dst</emphasis> respectively (see the -D command in
|
|
|
|
ipset (8)).</para>
|
|
|
|
|
|
|
|
<para>DEL is non-terminating. Even if a packet matches the
|
|
|
|
rule, it is passed on to the next rule.</para>
|
2011-05-22 01:25:38 +02:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2006-11-15 22:02:04 +01:00
|
|
|
<varlistentry>
|
2006-11-16 00:32:14 +01:00
|
|
|
<term><emphasis role="bold">DNAT</emphasis></term>
|
2006-11-15 22:02:04 +01:00
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Forward the request to another system (and optionally
|
|
|
|
another port).</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2006-11-16 00:32:14 +01:00
|
|
|
<term><emphasis role="bold">DNAT-</emphasis></term>
|
2006-11-15 22:02:04 +01:00
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Advanced users only.</para>
|
|
|
|
|
2006-11-16 00:32:14 +01:00
|
|
|
<para>Like <emphasis role="bold">DNAT</emphasis> but only
|
|
|
|
generates the <emphasis role="bold">DNAT</emphasis> iptables
|
|
|
|
rule and not the companion <emphasis
|
2011-12-28 00:29:37 +01:00
|
|
|
role="bold">ACCEPT</emphasis> rule.</para>
|
2006-11-15 22:02:04 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2012-11-19 17:19:12 +01:00
|
|
|
<term><emphasis role="bold">DROP</emphasis></term>
|
2006-11-15 22:02:04 +01:00
|
|
|
|
|
|
|
<listitem>
|
2012-11-19 17:19:12 +01:00
|
|
|
<para>Ignore the request.</para>
|
2006-11-15 22:02:04 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2012-11-19 17:19:12 +01:00
|
|
|
<term><emphasis role="bold">DROP!</emphasis></term>
|
2006-11-15 22:02:04 +01:00
|
|
|
|
|
|
|
<listitem>
|
2012-11-19 17:19:12 +01:00
|
|
|
<para>like DROP but exempts the rule from being suppressed by
|
|
|
|
OPTIMIZE=1 in <ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5).</para>
|
2006-11-15 22:02:04 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2007-02-26 17:57:47 +01:00
|
|
|
<varlistentry>
|
2012-11-19 17:19:12 +01:00
|
|
|
<term>HELPER</term>
|
2007-02-26 17:57:47 +01:00
|
|
|
|
|
|
|
<listitem>
|
2012-11-19 17:19:12 +01:00
|
|
|
<para>Added in Shorewall 4.5.7. This action requires that the
|
|
|
|
HELPER column contains the name of the Netfilter helper to be
|
|
|
|
associated with connections matching this connection. May only
|
|
|
|
be specified in the NEW section and is useful for being able
|
|
|
|
to specify a helper when the applicable policy is ACCEPT. No
|
|
|
|
destination zone should be specified in HELPER rules.</para>
|
2007-02-26 17:57:47 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2013-04-17 16:34:00 +02:00
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis
|
|
|
|
role="bold">INLINE</emphasis>[(<replaceable>action</replaceable>)]</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Added in Shorewall 4.5.16. This action allows you to
|
|
|
|
construct most of the rule yourself using iptables syntax. The
|
|
|
|
part that you specify must follow a semicolon (';') and is
|
|
|
|
completely free-form. If the target of the rule (the part
|
|
|
|
following 'j') is something that Shorewall supports in the
|
|
|
|
ACTION column, then you may enclose it in parentheses (e.g.,
|
|
|
|
INLINE(ACCEPT)). Otherwise, you can include it after the
|
|
|
|
semicolon. In this case, you must declare the target as a
|
|
|
|
builtin action in <ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/manpages/shorewall-actions.html">shorewall-actions</ulink>(5).</para>
|
2013-04-17 16:34:00 +02:00
|
|
|
|
|
|
|
<para>Some considerations when using INLINE:</para>
|
|
|
|
|
|
|
|
<itemizedlist>
|
|
|
|
<listitem>
|
|
|
|
<para>The <option>p</option>, <option>s</option>,
|
|
|
|
<option>d</option>, <option>i</option>,
|
|
|
|
<option>o</option>, <option>policy</option>, and state
|
|
|
|
match (<option>state</option> or <option>conntrack
|
|
|
|
--ctstate</option>) matches will always appear in the
|
|
|
|
front of the rule in that order.</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>When multiple matches are specified, the compiler
|
|
|
|
will keep them in the order in which they appear
|
|
|
|
(excluding the above listed ones), but they will not
|
|
|
|
necessarily be at the end of the generated rule. For
|
|
|
|
example, if addresses are specified in the SOURCE and/or
|
|
|
|
DEST columns, their generated matches will appear after
|
|
|
|
those specified using ';'.</para>
|
|
|
|
</listitem>
|
|
|
|
</itemizedlist>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2014-01-01 16:18:54 +01:00
|
|
|
<varlistentry>
|
2014-08-24 18:10:10 +02:00
|
|
|
<term>IPTABLES({<replaceable>iptables-target</replaceable>
|
2014-01-01 16:18:54 +01:00
|
|
|
[<replaceable>option</replaceable> ...])</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>This action allows you to specify an iptables target
|
|
|
|
with options (e.g., 'IPTABLES(MARK --set-xmark 0x01/0xff)'. If
|
2014-08-24 18:10:10 +02:00
|
|
|
the <replaceable>iptables-target</replaceable> is not one
|
|
|
|
recognized by Shorewall, the following error message will be
|
|
|
|
issued:</para>
|
2014-01-01 16:18:54 +01:00
|
|
|
|
2014-08-24 20:59:51 +02:00
|
|
|
<programlisting> ERROR: Unknown target (<replaceable>iptables-target</replaceable>)</programlisting>
|
2014-01-01 16:18:54 +01:00
|
|
|
|
|
|
|
<para>This error message may be eliminated by adding the
|
2014-08-24 18:10:10 +02:00
|
|
|
<replaceable>iptables-</replaceable><replaceable>target</replaceable>
|
|
|
|
as a builtin action in <ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/manpages/shorewall-actions.html">shorewall-actions</ulink>(5).</para>
|
2014-08-24 18:10:10 +02:00
|
|
|
|
|
|
|
<important>
|
|
|
|
<para>If you specify REJECT as the
|
|
|
|
<replaceable>iptables-target</replaceable>, the target of
|
|
|
|
the rule will be the iptables REJECT target and not
|
|
|
|
Shorewall's builtin 'reject' chain which is used when REJECT
|
|
|
|
(see below) is specified as the
|
|
|
|
<replaceable>target</replaceable> in the ACTION
|
|
|
|
column.</para>
|
|
|
|
</important>
|
2014-01-01 16:18:54 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2006-11-15 22:02:04 +01:00
|
|
|
<varlistentry>
|
2012-11-19 17:19:12 +01:00
|
|
|
<term><emphasis
|
|
|
|
role="bold">LOG:<replaceable>level</replaceable></emphasis></term>
|
2006-11-15 22:02:04 +01:00
|
|
|
|
|
|
|
<listitem>
|
2006-11-26 18:34:48 +01:00
|
|
|
<para>Simply log the packet and continue with the next
|
|
|
|
rule.</para>
|
2006-11-15 22:02:04 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2012-11-19 17:19:12 +01:00
|
|
|
<term><emphasis>macro</emphasis><emphasis
|
|
|
|
role="bold">[(<replaceable>macrotarget</replaceable>)]</emphasis></term>
|
2006-11-15 22:02:04 +01:00
|
|
|
|
|
|
|
<listitem>
|
2012-11-19 17:19:12 +01:00
|
|
|
<para>The name of a macro defined in a file named
|
|
|
|
macro.<emphasis>macro</emphasis>. If the macro accepts an
|
|
|
|
action parameter (Look at the macro source to see if it has
|
|
|
|
PARAM in the TARGET column) then the
|
|
|
|
<emphasis>macro</emphasis> name is followed by the
|
|
|
|
parenthesized <emphasis>macrotarget</emphasis> (<emphasis
|
|
|
|
role="bold">ACCEPT</emphasis>, <emphasis
|
|
|
|
role="bold">DROP</emphasis>, <emphasis
|
|
|
|
role="bold">REJECT</emphasis>, ...) to be substituted for the
|
|
|
|
parameter.</para>
|
2006-11-15 22:02:04 +01:00
|
|
|
|
2012-11-19 17:19:12 +01:00
|
|
|
<para>Example: FTP(ACCEPT).</para>
|
2007-02-26 17:57:47 +01:00
|
|
|
|
2012-11-19 17:19:12 +01:00
|
|
|
<para>The older syntax where the macro name and the target are
|
|
|
|
separated by a slash (e.g. FTP/ACCEPT) is still allowed but is
|
|
|
|
deprecated.</para>
|
2007-08-24 22:40:13 +02:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2011-05-20 16:47:35 +02:00
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis
|
|
|
|
role="bold">NFLOG</emphasis>[(<replaceable>nflog-parameters</replaceable>)]</term>
|
|
|
|
|
|
|
|
<listitem>
|
2012-11-19 17:19:12 +01:00
|
|
|
<para>Added in Shorewall 4.5.9.3. Queues matching packets to a
|
2013-05-03 18:19:45 +02:00
|
|
|
back end logging daemon via a netlink socket then continues to
|
2012-11-19 17:19:12 +01:00
|
|
|
the next rule. See <ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/shorewall.logging.html">http://www.shorewall.net/shorewall_logging.html</ulink>.</para>
|
2012-11-19 17:19:12 +01:00
|
|
|
|
2012-11-24 18:11:28 +01:00
|
|
|
<para>Similar to<emphasis role="bold">
|
|
|
|
LOG:NFLOG</emphasis>[(<replaceable>nflog-parameters</replaceable>)],
|
|
|
|
except that the log level is not changed when this ACTION is
|
|
|
|
used in an action or macro body and the invocation of that
|
|
|
|
action or macro specifies a log level.</para>
|
2011-05-20 16:47:35 +02:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2007-08-24 22:40:13 +02:00
|
|
|
<varlistentry>
|
2011-05-18 21:39:00 +02:00
|
|
|
<term><emphasis
|
2015-05-20 19:55:21 +02:00
|
|
|
role="bold">NFQUEUE</emphasis>[([<replaceable>queuenumber</replaceable>1[:<replaceable>queuenumber2</replaceable>][,bypass]]|bypass)]</term>
|
2007-08-24 22:40:13 +02:00
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Queues the packet to a user-space application using the
|
|
|
|
nfnetlink_queue mechanism. If a
|
2015-05-20 19:55:21 +02:00
|
|
|
<replaceable>queuenumber</replaceable>1 is not specified,
|
|
|
|
queue zero (0) is assumed. Beginning with Shorewall 4.6.10,
|
|
|
|
the keyword <emphasis role="bold">bypass</emphasis> can be
|
|
|
|
given. By default, if no userspace program is listening on an
|
|
|
|
NFQUEUE, then all packets that are to be queued are dropped.
|
|
|
|
When this option is used, the NFQUEUE rule is silently
|
|
|
|
bypassed instead. The packet will move on to the next rule.
|
|
|
|
Also beginning in Shorewall 4.6.10, a second queue number
|
|
|
|
(<replaceable>queuenumber2</replaceable>) may be specified.
|
|
|
|
This specifies a range of queues to use. Packets are then
|
|
|
|
balanced across the given queues. This is useful for multicore
|
|
|
|
systems: start multiple instances of the userspace program on
|
|
|
|
queues x, x+1, .. x+n and use "x:x+n". Packets belonging to
|
|
|
|
the same connection are put into the same nfqueue.</para>
|
2007-08-24 22:40:13 +02:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2015-05-20 19:55:21 +02:00
|
|
|
<term><emphasis role="bold"><emphasis
|
|
|
|
role="bold">NFQUEUE</emphasis>[([<replaceable>queuenumber1</replaceable>[,<replaceable>queuenumber2</replaceable>][,bypass]]|bypass)]</emphasis></term>
|
2007-08-24 22:40:13 +02:00
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>like NFQUEUE but exempts the rule from being suppressed
|
|
|
|
by OPTIMIZE=1 in <ulink
|
2015-05-20 19:55:21 +02:00
|
|
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5).</para>
|
2007-02-26 17:57:47 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2009-02-12 16:53:44 +01:00
|
|
|
<varlistentry>
|
2012-11-19 17:19:12 +01:00
|
|
|
<term><emphasis role="bold">NONAT</emphasis></term>
|
2009-02-12 16:53:44 +01:00
|
|
|
|
|
|
|
<listitem>
|
2012-11-19 17:19:12 +01:00
|
|
|
<para>Excludes the connection from any subsequent <emphasis
|
|
|
|
role="bold">DNAT</emphasis>[-] or <emphasis
|
|
|
|
role="bold">REDIRECT</emphasis>[-] rules but doesn't generate
|
|
|
|
a rule to accept the traffic.</para>
|
2009-02-12 16:53:44 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2006-11-15 22:02:04 +01:00
|
|
|
<varlistentry>
|
2012-11-19 17:19:12 +01:00
|
|
|
<term><emphasis role="bold">QUEUE</emphasis></term>
|
2006-11-15 22:02:04 +01:00
|
|
|
|
|
|
|
<listitem>
|
2012-11-19 17:19:12 +01:00
|
|
|
<para>Queue the packet to a user-space application such as
|
|
|
|
ftwall (http://p2pwall.sf.net). The application may reinsert
|
|
|
|
the packet for further processing.</para>
|
2006-11-15 22:02:04 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2012-11-19 17:19:12 +01:00
|
|
|
<term><emphasis role="bold">QUEUE!</emphasis></term>
|
2006-11-15 22:02:04 +01:00
|
|
|
|
|
|
|
<listitem>
|
2012-11-19 17:19:12 +01:00
|
|
|
<para>like QUEUE but exempts the rule from being suppressed by
|
|
|
|
OPTIMIZE=1 in <ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5).</para>
|
2006-11-15 22:02:04 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2012-11-19 17:19:12 +01:00
|
|
|
<term><emphasis role="bold">REJECT</emphasis></term>
|
2006-11-15 22:02:04 +01:00
|
|
|
|
|
|
|
<listitem>
|
2012-11-19 17:19:12 +01:00
|
|
|
<para>disallow the request and return an icmp-unreachable or
|
|
|
|
an RST packet.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2006-11-15 22:02:04 +01:00
|
|
|
|
2012-11-19 17:19:12 +01:00
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis role="bold">REJECT!</emphasis></term>
|
2007-12-08 22:55:44 +01:00
|
|
|
|
2012-11-19 17:19:12 +01:00
|
|
|
<listitem>
|
|
|
|
<para>like REJECT but exempts the rule from being suppressed
|
|
|
|
by OPTIMIZE=1 in <ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5).</para>
|
2006-11-15 22:02:04 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2010-07-17 01:41:07 +02:00
|
|
|
|
|
|
|
<varlistentry>
|
2012-11-19 17:19:12 +01:00
|
|
|
<term><emphasis role="bold">REDIRECT</emphasis></term>
|
2010-07-17 01:41:07 +02:00
|
|
|
|
|
|
|
<listitem>
|
2012-11-19 17:19:12 +01:00
|
|
|
<para>Redirect the request to a server running on the
|
|
|
|
firewall.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2010-07-21 00:42:11 +02:00
|
|
|
|
2012-11-19 17:19:12 +01:00
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis role="bold">REDIRECT-</emphasis></term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Advanced users only.</para>
|
|
|
|
|
|
|
|
<para>Like <emphasis role="bold">REDIRECT</emphasis> but only
|
|
|
|
generates the <emphasis role="bold">REDIRECT</emphasis>
|
|
|
|
iptables rule and not the companion <emphasis
|
|
|
|
role="bold">ACCEPT</emphasis> rule.</para>
|
2010-07-18 17:46:38 +02:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2015-01-01 18:14:00 +01:00
|
|
|
<varlistentry>
|
|
|
|
<term>TARPIT [(<emphasis role="bold">tarpit</emphasis> |
|
|
|
|
<emphasis role="bold">honeypot</emphasis> | <emphasis
|
|
|
|
role="bold">reset</emphasis>)]</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Added in Shorewall 4.6.6.</para>
|
|
|
|
|
2015-01-25 03:15:10 +01:00
|
|
|
<para>TARPIT captures and holds incoming TCP connections using
|
|
|
|
no local per-connection resources.</para>
|
2015-01-01 18:14:00 +01:00
|
|
|
|
|
|
|
<para>TARPIT only works with the PROTO column set to tcp (6),
|
|
|
|
and is totally application agnostic. This module will answer a
|
|
|
|
TCP request and play along like a listening server, but aside
|
|
|
|
from sending an ACK or RST, no data is sent. Incoming packets
|
|
|
|
are ignored and dropped. The attacker will terminate the
|
|
|
|
session eventually. This module allows the initial packets of
|
|
|
|
an attack to be captured by other software for inspection. In
|
|
|
|
most cases this is sufficient to determine the nature of the
|
|
|
|
attack.</para>
|
|
|
|
|
|
|
|
<para>This offers similar functionality to LaBrea
|
|
|
|
<http://www.hackbusters.net/LaBrea/> but does not
|
|
|
|
require dedicated hardware or IPs. Any TCP port that you would
|
|
|
|
normally DROP or REJECT can instead become a tarpit.</para>
|
|
|
|
|
|
|
|
<para>The target accepts a single optional parameter:</para>
|
|
|
|
|
|
|
|
<variablelist>
|
|
|
|
<varlistentry>
|
|
|
|
<term>tarpit</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>This mode is the default and completes a
|
|
|
|
connection with the attacker but limits the window size
|
|
|
|
to 0, thus keeping the attacker waiting long periods of
|
|
|
|
time. While he is maintaining state of the connection
|
|
|
|
and trying to continue every 60-240 seconds, we keep
|
|
|
|
none, so it is very lightweight. Attempts to close the
|
|
|
|
connection are ignored, forcing the remote side to time
|
|
|
|
out the connection in 12-24 minutes.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>honeypot</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>This mode completes a connection with the
|
|
|
|
attacker, but signals a normal window size, so that the
|
|
|
|
remote side will attempt to send data, often with some
|
|
|
|
very nasty exploit attempts. We can capture these
|
|
|
|
packets for decoding and further analysis. The module
|
|
|
|
does not send any data, so if the remote expects an
|
|
|
|
application level response, the game is up.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>reset</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>This mode is handy because we can send an inline
|
2015-01-25 03:15:10 +01:00
|
|
|
RST (reset). It has no other function.</para>
|
2015-01-01 18:14:00 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
</variablelist>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2010-07-18 17:46:38 +02:00
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis
|
2012-11-19 17:19:12 +01:00
|
|
|
role="bold">ULOG</emphasis>[(<replaceable>ulog-parameters</replaceable>)]</term>
|
2010-07-18 17:46:38 +02:00
|
|
|
|
|
|
|
<listitem>
|
2012-11-19 17:19:12 +01:00
|
|
|
<para>Added in Shorewall 4.5.10. Queues matching packets to a
|
2013-05-03 18:19:45 +02:00
|
|
|
back end logging daemon via a netlink socket then continues to
|
2012-11-19 17:19:12 +01:00
|
|
|
the next rule. See <ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/shorewall.logging.html">http://www.shorewall.net/shorewall_logging.html</ulink>.</para>
|
2010-07-21 00:42:11 +02:00
|
|
|
|
2012-11-24 18:11:28 +01:00
|
|
|
<para>Similar to<emphasis role="bold">
|
|
|
|
LOG:ULOG</emphasis>[(<replaceable>ulog-parameters</replaceable>)],
|
|
|
|
except that the log level is not changed when this ACTION is
|
|
|
|
used in an action or macro body and the invocation of that
|
|
|
|
action or macro specifies a log level.</para>
|
2012-08-13 22:23:38 +02:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2006-11-15 22:02:04 +01:00
|
|
|
</variablelist>
|
2010-03-30 17:08:57 +02:00
|
|
|
|
2010-07-17 01:41:07 +02:00
|
|
|
<para>The <replaceable>target</replaceable> may optionally be
|
2010-03-30 17:08:57 +02:00
|
|
|
followed by ":" and a syslog log level (e.g, REJECT:info or
|
2010-03-30 17:14:32 +02:00
|
|
|
Web(ACCEPT):debug). This causes the packet to be logged at the
|
|
|
|
specified level. Note that if the <emphasis
|
|
|
|
role="bold">ACTION</emphasis> involves destination network address
|
|
|
|
translation (DNAT, REDIRECT, etc.) then the packet is logged
|
|
|
|
<emphasis role="bold">before</emphasis> the destination address is
|
2010-03-30 17:08:57 +02:00
|
|
|
rewritten.</para>
|
|
|
|
|
|
|
|
<para>If the <emphasis role="bold">ACTION</emphasis> names an
|
|
|
|
<emphasis>action</emphasis> declared in <ulink
|
2014-01-16 17:32:57 +01:00
|
|
|
url="/manpages/shorewall-actions.html">shorewall-actions</ulink>(5)
|
|
|
|
or in /usr/share/shorewall/actions.std then:</para>
|
2010-03-30 17:08:57 +02:00
|
|
|
|
|
|
|
<itemizedlist>
|
|
|
|
<listitem>
|
|
|
|
<para>If the log level is followed by "!' then all rules in the
|
|
|
|
action are logged at the log level.</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>If the log level is not followed by "!" then only those
|
|
|
|
rules in the action that do not specify logging are logged at
|
|
|
|
the specified level.</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>The special log level <emphasis
|
|
|
|
role="bold">none!</emphasis> suppresses logging by the
|
|
|
|
action.</para>
|
|
|
|
</listitem>
|
|
|
|
</itemizedlist>
|
|
|
|
|
|
|
|
<para>You may also specify <emphasis role="bold">ULOG</emphasis> or
|
|
|
|
<emphasis role="bold">NFLOG</emphasis> (must be in upper case) as a
|
|
|
|
log level.This will log to the ULOG or NFLOG target for routing to a
|
|
|
|
separate log through use of ulogd (<ulink
|
|
|
|
url="http://www.netfilter.org/projects/ulogd/index.html">http://www.netfilter.org/projects/ulogd/index.html</ulink>).</para>
|
|
|
|
|
|
|
|
<para>Actions specifying logging may be followed by a log tag (a
|
|
|
|
string of alphanumeric characters) which is appended to the string
|
|
|
|
generated by the LOGPREFIX (in <ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5)).</para>
|
2010-03-30 17:08:57 +02:00
|
|
|
|
|
|
|
<para>Example: ACCEPT:info:ftp would include 'ftp ' at the end of
|
|
|
|
the log prefix generated by the LOGPREFIX setting.</para>
|
2006-11-15 22:02:04 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2006-11-16 00:32:14 +01:00
|
|
|
|
|
|
|
<varlistentry>
|
2008-07-10 15:33:54 +02:00
|
|
|
<term><emphasis role="bold">SOURCE</emphasis> -
|
2010-08-18 21:18:58 +02:00
|
|
|
{<emphasis>zone</emphasis>|<emphasis>zone-list</emphasis>[+]|{<emphasis
|
2009-07-16 02:50:55 +02:00
|
|
|
role="bold">all</emphasis>|<emphasis
|
|
|
|
role="bold">any</emphasis>}[<emphasis
|
2006-11-23 16:53:07 +01:00
|
|
|
role="bold">+</emphasis>][<emphasis
|
|
|
|
role="bold">-</emphasis>]}<emphasis
|
|
|
|
role="bold">[:</emphasis><emphasis>interface</emphasis>][<emphasis
|
2006-11-26 18:34:48 +01:00
|
|
|
role="bold">:</emphasis>{<emphasis>address-or-range</emphasis>[,<emphasis>address-or-range</emphasis>]...[<emphasis>exclusion</emphasis>]|<emphasis>exclusion</emphasis>|<emphasis
|
2012-05-18 00:26:16 +02:00
|
|
|
role="bold">+</emphasis><emphasis>ipset</emphasis>|<replaceable>^countrycode-list</replaceable>}</term>
|
2006-11-16 00:32:14 +01:00
|
|
|
|
|
|
|
<listitem>
|
2010-08-18 21:18:58 +02:00
|
|
|
<para>Source hosts to which the rule applies. May be a
|
|
|
|
<replaceable>zone</replaceable> declared in /etc/shorewall/zones,
|
|
|
|
<emphasis role="bold">$FW</emphasis> to indicate the firewall
|
|
|
|
itself, <emphasis role="bold">all</emphasis>, <emphasis
|
|
|
|
role="bold">all+</emphasis>, <emphasis role="bold">all-</emphasis>,
|
|
|
|
<emphasis role="bold">all+-</emphasis> or <emphasis
|
|
|
|
role="bold">none</emphasis>.</para>
|
|
|
|
|
|
|
|
<para>Beginning with Shorewall 4.4.13, you may use a
|
|
|
|
<replaceable>zone-list </replaceable>which consists of a
|
|
|
|
comma-separated list of zones declared in <ulink
|
2014-01-16 17:32:57 +01:00
|
|
|
url="/manpages/shorewall-zones.html">shorewall-zones</ulink> (5).
|
|
|
|
This <replaceable>zone-list</replaceable> may be optionally followed
|
|
|
|
by "+" to indicate that the rule is to apply to intra-zone traffic
|
|
|
|
as well as inter-zone traffic.</para>
|
2006-11-16 00:32:14 +01:00
|
|
|
|
|
|
|
<para>When <emphasis role="bold">none</emphasis> is used either in
|
|
|
|
the <emphasis role="bold">SOURCE</emphasis> or <emphasis
|
|
|
|
role="bold">DEST</emphasis> column, the rule is ignored.</para>
|
|
|
|
|
|
|
|
<para><emphasis role="bold">all</emphasis> means "All Zones",
|
|
|
|
including the firewall itself. <emphasis role="bold">all-</emphasis>
|
|
|
|
means "All Zones, except the firewall itself". When <emphasis
|
|
|
|
role="bold">all</emphasis>[<emphasis role="bold">-</emphasis>] is
|
|
|
|
used either in the <emphasis role="bold">SOURCE</emphasis> or
|
|
|
|
<emphasis role="bold">DEST</emphasis> column intra-zone traffic is
|
|
|
|
not affected. When <emphasis role="bold">all+</emphasis>[<emphasis
|
2010-08-19 01:10:58 +02:00
|
|
|
role="bold">-</emphasis>] is "used, intra-zone traffic is affected.
|
|
|
|
Beginning with Shorewall 4.4.13, exclusion is supported -- see see
|
|
|
|
<ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/manpages/shorewall-exclusion.html">shorewall-exclusion</ulink>(5).</para>
|
2006-11-16 00:32:14 +01:00
|
|
|
|
|
|
|
<para>Except when <emphasis role="bold">all</emphasis>[<emphasis
|
2010-08-18 21:18:58 +02:00
|
|
|
role="bold">+</emphasis>][<emphasis role="bold">-</emphasis>] or
|
|
|
|
<emphasis role="bold">any</emphasis>[<emphasis
|
2006-11-16 00:32:14 +01:00
|
|
|
role="bold">+</emphasis>][<emphasis role="bold">-</emphasis>] is
|
2006-11-26 19:45:23 +01:00
|
|
|
specified, clients may be further restricted to a list of networks
|
|
|
|
and/or hosts by appending ":" and a comma-separated list of network
|
|
|
|
and/or host addresses. Hosts may be specified by IP or MAC address;
|
|
|
|
mac addresses must begin with "~" and must use "-" as a
|
2006-11-16 00:32:14 +01:00
|
|
|
separator.</para>
|
|
|
|
|
2010-08-19 01:10:58 +02:00
|
|
|
<para>The above restriction on <emphasis
|
|
|
|
role="bold">all</emphasis>[<emphasis
|
|
|
|
role="bold">+</emphasis>][<emphasis role="bold">-</emphasis>] and
|
|
|
|
<emphasis role="bold">any</emphasis>[<emphasis
|
|
|
|
role="bold">+</emphasis>][<emphasis role="bold">-</emphasis>] is
|
2011-01-26 18:08:48 +01:00
|
|
|
removed in Shorewall-4.4.13.</para>
|
2010-08-19 01:10:58 +02:00
|
|
|
|
2009-07-16 02:50:55 +02:00
|
|
|
<para><emphasis role="bold">any</emphasis> is equivalent to
|
|
|
|
<emphasis role="bold">all</emphasis> when there are no nested zones.
|
|
|
|
When there are nested zones, <emphasis role="bold">any</emphasis>
|
2010-08-13 02:52:22 +02:00
|
|
|
only refers to top-level zones (those with no parent zones). Note
|
|
|
|
that <emphasis role="bold">any</emphasis> excludes all vserver
|
2015-01-25 03:15:10 +01:00
|
|
|
zones, since those zones are nested within the firewall zone.
|
|
|
|
Beginning with Shorewall 4.4.13, exclusion is supported with
|
|
|
|
<emphasis role="bold">any</emphasis> -- see see <ulink
|
|
|
|
url="/manpages/shorewall-exclusion.html">shorewall-exclusion</ulink>(5).</para>
|
2009-07-16 02:50:55 +02:00
|
|
|
|
2006-11-26 19:45:23 +01:00
|
|
|
<para>Hosts may also be specified as an IP address range using the
|
|
|
|
syntax
|
2006-11-16 00:32:14 +01:00
|
|
|
<emphasis>lowaddress</emphasis>-<emphasis>highaddress</emphasis>.
|
|
|
|
This requires that your kernel and iptables contain iprange match
|
2006-11-20 18:52:52 +01:00
|
|
|
support. If your kernel and iptables have ipset match support then
|
2006-11-16 00:32:14 +01:00
|
|
|
you may give the name of an ipset prefaced by "+". The ipset name
|
|
|
|
may be optionally followed by a number from 1 to 6 enclosed in
|
|
|
|
square brackets ([]) to indicate the number of levels of source
|
|
|
|
bindings to be matched.</para>
|
|
|
|
|
2011-01-26 18:08:48 +01:00
|
|
|
<para>Beginning with Shorewall 4.4.17, the primary IP address of a
|
2013-05-03 18:19:45 +02:00
|
|
|
firewall interface can be specified by an ampersand ('&')
|
|
|
|
followed by the logical name of the interface as found in the
|
2011-01-26 18:08:48 +01:00
|
|
|
INTERFACE column of <ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>
|
2011-01-26 18:08:48 +01:00
|
|
|
(5).</para>
|
|
|
|
|
2012-05-17 19:44:02 +02:00
|
|
|
<para>Beginning with Shorewall 4.5.4, A
|
|
|
|
<replaceable>countrycode-list</replaceable> may be specified. A
|
2012-05-21 16:03:53 +02:00
|
|
|
countrycode-list is a comma-separated list of up to 15 two-character
|
|
|
|
ISO-3661 country codes enclosed in square brackets ('[...]') and
|
|
|
|
preceded by a caret ('^'). When a single country code is given, the
|
|
|
|
square brackets may be omitted. A list of country codes supported by
|
2012-05-19 18:39:49 +02:00
|
|
|
Shorewall may be found at <ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/ISO-3661.html">http://www.shorewall.net/ISO-3661.html</ulink>.
|
2012-05-17 19:44:02 +02:00
|
|
|
Specifying a <replaceable>countrycode-list</replaceable> requires
|
|
|
|
<firstterm>GeoIP Match</firstterm> support in your iptables and
|
|
|
|
Kernel.</para>
|
|
|
|
|
2006-11-25 19:06:11 +01:00
|
|
|
<para>You may exclude certain hosts from the set already defined
|
2007-01-14 23:34:51 +01:00
|
|
|
through use of an <emphasis>exclusion</emphasis> (see <ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/manpages/shorewall-exclusion.html">shorewall-exclusion</ulink>(5)).</para>
|
2006-11-25 19:06:11 +01:00
|
|
|
|
2006-11-16 00:32:14 +01:00
|
|
|
<para>Examples:</para>
|
|
|
|
|
|
|
|
<variablelist>
|
|
|
|
<varlistentry>
|
2006-11-20 18:52:52 +01:00
|
|
|
<term>dmz:192.168.2.2</term>
|
2006-11-16 00:32:14 +01:00
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Host 192.168.2.2 in the DMZ</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>net:155.186.235.0/24</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Subnet 155.186.235.0/24 on the Internet</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>loc:192.168.1.1,192.168.1.2</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Hosts 192.168.1.1 and 192.168.1.2 in the local
|
|
|
|
zone.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>loc:~00-A0-C9-15-39-78</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Host in the local zone with MAC address
|
|
|
|
00:A0:C9:15:39:78.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>net:192.0.2.11-192.0.2.17</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Hosts 192.0.2.11-192.0.2.17 in the net zone.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2006-11-25 19:06:11 +01:00
|
|
|
|
2006-11-26 18:34:48 +01:00
|
|
|
<varlistentry>
|
|
|
|
<term>net:!192.0.2.11-192.0.2.17</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>All hosts in the net zone except for
|
|
|
|
192.0.2.11-192.0.2.17.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2006-11-25 19:06:11 +01:00
|
|
|
<varlistentry>
|
|
|
|
<term>net:155.186.235.0/24!155.186.235.16/28</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Subnet 155.186.235.0/24 on the Internet except for
|
|
|
|
155.186.235.16/28</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2011-01-26 18:08:48 +01:00
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>$FW:&eth0</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>The primary IP address of eth0 in the firewall zone
|
|
|
|
(Shorewall 4.4.17 and later).</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2006-11-16 00:32:14 +01:00
|
|
|
|
2015-01-25 03:15:10 +01:00
|
|
|
<varlistentry>
|
|
|
|
<term>loc,dmz</term>
|
2014-01-01 16:18:54 +01:00
|
|
|
|
2015-01-25 03:15:10 +01:00
|
|
|
<listitem>
|
|
|
|
<para>Both the <emphasis role="bold">loc</emphasis> and
|
|
|
|
<emphasis role="bold">dmz</emphasis> zones.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>all!dmz</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>All but the <emphasis role="bold">dmz</emphasis>
|
|
|
|
zone.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
</variablelist>
|
2014-01-01 16:18:54 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2006-11-16 00:32:14 +01:00
|
|
|
<varlistentry>
|
2008-07-10 15:33:54 +02:00
|
|
|
<term><emphasis role="bold">DEST</emphasis> -
|
2010-08-18 21:18:58 +02:00
|
|
|
{<emphasis>zone</emphasis>|<emphasis>zone-list</emphasis>[+]|{<emphasis
|
2009-07-16 02:50:55 +02:00
|
|
|
role="bold">all</emphasis>|<emphasis
|
|
|
|
role="bold">any</emphasis>}[<emphasis
|
2006-11-23 16:53:07 +01:00
|
|
|
role="bold">+</emphasis>][<emphasis
|
|
|
|
role="bold">-</emphasis>]}<emphasis
|
2006-11-26 19:45:23 +01:00
|
|
|
role="bold">[:{</emphasis><emphasis>interface</emphasis>|<emphasis>address-or-range</emphasis>[,<emphasis>address-or-range</emphasis>]...[<emphasis>exclusion</emphasis>]|<emphasis>exclusion</emphasis>|<emphasis
|
2012-05-18 00:26:16 +02:00
|
|
|
role="bold">+</emphasis><emphasis>ipset</emphasis>|<emphasis>^countrycode-list</emphasis>}][<option>:</option><replaceable>port</replaceable>[:<emphasis
|
2007-11-15 21:53:23 +01:00
|
|
|
role="bold">random</emphasis>]]</term>
|
2006-11-16 00:32:14 +01:00
|
|
|
|
|
|
|
<listitem>
|
2007-01-18 18:52:07 +01:00
|
|
|
<para>Location of Server. May be a zone declared in <ulink
|
2014-01-16 17:32:57 +01:00
|
|
|
url="/manpages/shorewall-zones.html">shorewall-zones</ulink>(5),
|
|
|
|
$<emphasis role="bold">FW</emphasis> to indicate the firewall
|
|
|
|
itself, <emphasis role="bold">all</emphasis>. <emphasis
|
|
|
|
role="bold">all+</emphasis> or <emphasis
|
|
|
|
role="bold">none</emphasis>.</para>
|
2006-11-16 00:32:14 +01:00
|
|
|
|
2010-08-18 21:18:58 +02:00
|
|
|
<para>Beginning with Shorewall 4.4.13, you may use a
|
|
|
|
<replaceable>zone-list </replaceable>which consists of a
|
|
|
|
comma-separated list of zones declared in <ulink
|
2014-01-16 17:32:57 +01:00
|
|
|
url="/manpages/shorewall-zones.html">shorewall-zones</ulink> (5).
|
|
|
|
This <replaceable>zone-list</replaceable> may be optionally followed
|
|
|
|
by "+" to indicate that the rule is to apply to intra-zone traffic
|
|
|
|
as well as inter-zone traffic.</para>
|
2010-08-18 21:18:58 +02:00
|
|
|
|
2012-05-17 19:44:02 +02:00
|
|
|
<para>Beginning with Shorewall 4.5.4, A
|
|
|
|
<replaceable>countrycode-list</replaceable> may be specified. A
|
2012-05-21 16:03:53 +02:00
|
|
|
countrycode-list is a comma-separated list of up to 15 two-character
|
|
|
|
ISO-3661 country codes enclosed in square brackets ('[...]') and
|
|
|
|
preceded by a caret ('^'). When a single country code is given, the
|
|
|
|
square brackets may be omitted. A list of country codes supported by
|
2012-05-19 18:39:49 +02:00
|
|
|
Shorewall may be found at <ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/ISO-3661.html">http://www.shorewall.net/ISO-3661.html</ulink>.
|
2012-05-17 19:44:02 +02:00
|
|
|
Specifying a <replaceable>countrycode-list</replaceable> requires
|
|
|
|
<firstterm>GeoIP Match</firstterm> support in your iptables and
|
|
|
|
Kernel.</para>
|
|
|
|
|
2006-11-16 00:32:14 +01:00
|
|
|
<para>When <emphasis role="bold">none</emphasis> is used either in
|
|
|
|
the <emphasis role="bold">SOURCE</emphasis> or <emphasis
|
|
|
|
role="bold">DEST</emphasis> column, the rule is ignored.</para>
|
|
|
|
|
2015-01-25 03:15:10 +01:00
|
|
|
<para><emphasis role="bold">all</emphasis> means "All Zones",
|
|
|
|
including the firewall itself. <emphasis role="bold">all-</emphasis>
|
|
|
|
means "All Zones, except the firewall itself". When <emphasis
|
|
|
|
role="bold">all</emphasis>[<emphasis role="bold">-</emphasis>] is
|
|
|
|
used either in the <emphasis role="bold">SOURCE</emphasis> or
|
|
|
|
<emphasis role="bold">DEST</emphasis> column intra-zone traffic is
|
|
|
|
not affected. When <emphasis role="bold">all+</emphasis>[<emphasis
|
|
|
|
role="bold">-</emphasis>] is "used, intra-zone traffic is affected.
|
|
|
|
Beginning with Shorewall 4.4.13, exclusion is supported -- see see
|
|
|
|
<ulink
|
|
|
|
url="/manpages6/shorewall6-exclusion.html">shorewall6-exclusion</ulink>(5).</para>
|
|
|
|
|
|
|
|
<para><emphasis role="bold">any</emphasis> is equivalent to
|
|
|
|
<emphasis role="bold">all</emphasis> when there are no nested zones.
|
|
|
|
When there are nested zones, <emphasis role="bold">any</emphasis>
|
|
|
|
only refers to top-level zones (those with no parent zones). Note
|
|
|
|
that <emphasis role="bold">any</emphasis> excludes all vserver
|
|
|
|
zones, since those zones are nested within the firewall zone.</para>
|
|
|
|
|
|
|
|
<para>Except when <emphasis role="bold">all</emphasis>[<emphasis
|
|
|
|
role="bold">+</emphasis>][<emphasis role="bold">-</emphasis>] or
|
|
|
|
<emphasis role="bold">any</emphasis>[<emphasis
|
|
|
|
role="bold">+</emphasis>][<emphasis role="bold">-</emphasis>] is
|
|
|
|
specified, clients may be further restricted to a list of networks
|
|
|
|
and/or hosts by appending ":" and a comma-separated list of network
|
|
|
|
and/or host addresses. Hosts may be specified by IP or MAC address;
|
|
|
|
mac addresses must begin with "~" and must use "-" as a
|
|
|
|
separator.</para>
|
|
|
|
|
2006-11-16 00:32:14 +01:00
|
|
|
<para>When <emphasis role="bold">all</emphasis> is used either in
|
|
|
|
the <emphasis role="bold">SOURCE</emphasis> or <emphasis
|
|
|
|
role="bold">DEST</emphasis> column intra-zone traffic is not
|
|
|
|
affected. When <emphasis role="bold">all+</emphasis> is used,
|
2010-08-19 01:10:58 +02:00
|
|
|
intra-zone traffic is affected. Beginning with Shorewall 4.4.13,
|
|
|
|
exclusion is supported -- see see <ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/manpages/shorewall-exclusion.html">shorewall-exclusion</ulink>(5).</para>
|
2006-11-16 00:32:14 +01:00
|
|
|
|
2009-07-16 02:50:55 +02:00
|
|
|
<para>The <replaceable>zone</replaceable> should be omitted in
|
|
|
|
DNAT-, REDIRECT- and NONAT rules.</para>
|
2008-01-13 19:47:06 +01:00
|
|
|
|
2007-06-07 17:12:39 +02:00
|
|
|
<para>If the DEST <replaceable>zone</replaceable> is a bport zone,
|
2007-09-10 16:45:15 +02:00
|
|
|
then either:<orderedlist numeration="loweralpha">
|
2007-06-07 17:17:31 +02:00
|
|
|
<listitem>
|
|
|
|
<para>the SOURCE must be <option>all[+][-]</option>, or</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>the SOURCE <replaceable>zone</replaceable> must be
|
|
|
|
another bport zone associated with the same bridge, or</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>the SOURCE <replaceable>zone</replaceable> must be an
|
|
|
|
ipv4 zone that is associated with only the same bridge.</para>
|
|
|
|
</listitem>
|
2007-09-10 16:45:15 +02:00
|
|
|
</orderedlist></para>
|
2006-11-16 00:32:14 +01:00
|
|
|
|
2015-01-25 03:15:10 +01:00
|
|
|
<para>Except when <emphasis
|
|
|
|
role="bold">{all|any}</emphasis>[<emphasis
|
2013-02-19 21:42:09 +01:00
|
|
|
role="bold">+]|[-</emphasis>] is specified, the server may be
|
|
|
|
further restricted to a particular network, host or interface by
|
|
|
|
appending ":" and the network, host or interface. See <emphasis
|
|
|
|
role="bold">SOURCE</emphasis> above.</para>
|
|
|
|
|
|
|
|
<para>You may exclude certain hosts from the set already defined
|
|
|
|
through use of an <emphasis>exclusion</emphasis> (see <ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/manpages/shorewall-exclusion.html">shorewall-exclusion</ulink>(5)).</para>
|
2013-02-19 21:42:09 +01:00
|
|
|
|
|
|
|
<para>Restriction: MAC addresses are not allowed (this is a
|
|
|
|
Netfilter restriction).</para>
|
|
|
|
|
|
|
|
<para>Like in the <emphasis role="bold">SOURCE</emphasis> column,
|
|
|
|
you may specify a range of IP addresses using the syntax
|
|
|
|
<emphasis>lowaddress</emphasis>-<emphasis>highaddress</emphasis>.
|
|
|
|
When the <emphasis role="bold">ACTION</emphasis> is <emphasis
|
|
|
|
role="bold">DNAT</emphasis> or <emphasis
|
|
|
|
role="bold">DNAT-</emphasis>, the connections will be assigned to
|
|
|
|
addresses in the range in a round-robin fashion.</para>
|
|
|
|
|
2014-11-02 15:50:40 +01:00
|
|
|
<para>If your kernel and iptables have ipset match support then you
|
2013-02-19 21:42:09 +01:00
|
|
|
may give the name of an ipset prefaced by "+". The ipset name may be
|
|
|
|
optionally followed by a number from 1 to 6 enclosed in square
|
|
|
|
brackets ([]) to indicate the number of levels of destination
|
|
|
|
bindings to be matched. Only one of the <emphasis
|
|
|
|
role="bold">SOURCE</emphasis> and <emphasis
|
|
|
|
role="bold">DEST</emphasis> columns may specify an ipset
|
|
|
|
name.</para>
|
|
|
|
|
|
|
|
<para>Beginning with Shorewall 4.4.17, the primary IP address of a
|
2013-05-03 18:19:45 +02:00
|
|
|
firewall interface can be specified by an ampersand ('&')
|
2013-02-19 21:42:09 +01:00
|
|
|
followed by the logical name of the interface as found in the
|
|
|
|
INTERFACE column of <ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>
|
2013-02-19 21:42:09 +01:00
|
|
|
(5).</para>
|
|
|
|
|
|
|
|
<para>The <replaceable>port</replaceable> that the server is
|
|
|
|
listening on may be included and separated from the server's IP
|
2013-05-03 18:19:45 +02:00
|
|
|
address by ":". If omitted, the firewall will not modify the
|
2013-02-19 21:42:09 +01:00
|
|
|
destination port. A destination port may only be included if the
|
|
|
|
<emphasis role="bold">ACTION</emphasis> is <emphasis
|
|
|
|
role="bold">DNAT</emphasis> or <emphasis
|
|
|
|
role="bold">REDIRECT</emphasis>.</para>
|
|
|
|
|
|
|
|
<variablelist>
|
|
|
|
<varlistentry>
|
|
|
|
<term>Example:</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para><emphasis role="bold">loc:192.168.1.3:3128</emphasis>
|
|
|
|
specifies a local server at IP address 192.168.1.3 and
|
|
|
|
listening on port 3128.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
</variablelist>
|
|
|
|
|
|
|
|
<para>The <emphasis>port</emphasis> may be specified as a service
|
|
|
|
name. You may specify a port range in the form
|
|
|
|
<emphasis>lowport-highport</emphasis> to cause connections to be
|
|
|
|
assigned to ports in the range in round-robin fashion. When a port
|
|
|
|
range is specified, <emphasis>lowport</emphasis> and
|
|
|
|
<emphasis>highport</emphasis> must be given as integers; service
|
|
|
|
names are not permitted. Additionally, the port range may be
|
|
|
|
optionally followed by <emphasis role="bold">:random</emphasis>
|
|
|
|
which causes assignment to ports in the list to be random.</para>
|
|
|
|
|
|
|
|
<para>If the <emphasis role="bold">ACTION</emphasis> is <emphasis
|
|
|
|
role="bold">REDIRECT</emphasis> or <emphasis
|
|
|
|
role="bold">REDIRECT-</emphasis>, this column needs only to contain
|
|
|
|
the port number on the firewall that the request should be
|
|
|
|
redirected to. That is equivalent to specifying
|
|
|
|
<option>$FW</option>::<replaceable>port</replaceable>.</para>
|
2006-11-16 00:32:14 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2011-10-02 20:45:55 +02:00
|
|
|
<term><emphasis role="bold">PROTO</emphasis>- {<emphasis
|
2006-11-23 16:53:07 +01:00
|
|
|
role="bold">-</emphasis>|<emphasis
|
|
|
|
role="bold">tcp:syn</emphasis>|<emphasis
|
|
|
|
role="bold">ipp2p</emphasis>|<emphasis
|
|
|
|
role="bold">ipp2p:udp</emphasis>|<emphasis
|
|
|
|
role="bold">ipp2p:all</emphasis>|<emphasis>protocol-number</emphasis>|<emphasis>protocol-name</emphasis>|<emphasis
|
|
|
|
role="bold">all}</emphasis></term>
|
2006-11-16 00:32:14 +01:00
|
|
|
|
|
|
|
<listitem>
|
2011-10-02 20:45:55 +02:00
|
|
|
<para>Optional Protocol - <emphasis role="bold">ipp2p</emphasis>*
|
|
|
|
requires ipp2p match support in your kernel and iptables. <emphasis
|
2006-11-16 00:32:14 +01:00
|
|
|
role="bold">tcp:syn</emphasis> implies <emphasis
|
|
|
|
role="bold">tcp</emphasis> plus the SYN flag must be set and the
|
|
|
|
RST,ACK and FIN flags must be reset.</para>
|
2011-04-03 18:56:30 +02:00
|
|
|
|
|
|
|
<para>Beginning with Shorewall 4.4.19, this column can contain a
|
|
|
|
comma-separated list of protocol-numbers and/or protocol
|
|
|
|
names.</para>
|
2006-11-16 00:32:14 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2011-10-02 20:45:55 +02:00
|
|
|
<term><emphasis role="bold">DEST PORT(S) (dport)</emphasis> -
|
2006-11-23 16:53:07 +01:00
|
|
|
{<emphasis
|
|
|
|
role="bold">-</emphasis>|<emphasis>port-name-number-or-range</emphasis>[<emphasis
|
2014-01-03 18:23:14 +01:00
|
|
|
role="bold">,</emphasis><emphasis>port-name-number-or-range</emphasis>]...|+<replaceable>ipset</replaceable>}</term>
|
2006-11-16 00:32:14 +01:00
|
|
|
|
|
|
|
<listitem>
|
2011-10-02 20:45:55 +02:00
|
|
|
<para>Optional destination Ports. A comma-separated list of Port
|
|
|
|
names (from services(5)), port numbers or port ranges; if the
|
|
|
|
protocol is <emphasis role="bold">icmp</emphasis>, this column is
|
|
|
|
interpreted as the destination icmp-type(s). ICMP types may be
|
2013-05-03 18:19:45 +02:00
|
|
|
specified as a numeric type, a numeric type and code separated by a
|
2011-10-02 20:45:55 +02:00
|
|
|
slash (e.g., 3/4), or a typename. See <ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/configuration_file_basics.htm#ICMP">http://www.shorewall.net/configuration_file_basics.htm#ICMP</ulink>.
|
2011-04-03 18:56:30 +02:00
|
|
|
Note that prior to Shorewall 4.4.19, only a single ICMP type may be
|
2013-05-03 18:19:45 +02:00
|
|
|
listed.</para>
|
2006-11-16 00:32:14 +01:00
|
|
|
|
|
|
|
<para>If the protocol is <emphasis role="bold">ipp2p</emphasis>,
|
|
|
|
this column is interpreted as an ipp2p option without the leading
|
|
|
|
"--" (example <emphasis role="bold">bit</emphasis> for bit-torrent).
|
|
|
|
If no port is given, <emphasis role="bold">ipp2p</emphasis> is
|
|
|
|
assumed.</para>
|
|
|
|
|
|
|
|
<para>A port range is expressed as
|
|
|
|
<emphasis>lowport</emphasis>:<emphasis>highport</emphasis>.</para>
|
|
|
|
|
|
|
|
<para>This column is ignored if <emphasis
|
|
|
|
role="bold">PROTO</emphasis> = <emphasis role="bold">all</emphasis>
|
|
|
|
but must be entered if any of the following columns are supplied. In
|
|
|
|
that case, it is suggested that this field contain a dash (<emphasis
|
|
|
|
role="bold">-</emphasis>).</para>
|
|
|
|
|
|
|
|
<para>If your kernel contains multi-port match support, then only a
|
|
|
|
single Netfilter rule will be generated if in this list and the
|
|
|
|
<emphasis role="bold">CLIENT PORT(S)</emphasis> list below:</para>
|
|
|
|
|
|
|
|
<para>1. There are 15 or less ports listed.</para>
|
|
|
|
|
|
|
|
<para>2. No port ranges are included or your kernel and iptables
|
2013-05-03 18:19:45 +02:00
|
|
|
contain extended multi-port match support.</para>
|
2014-01-03 18:23:14 +01:00
|
|
|
|
|
|
|
<para>Beginning with Shorewall 4.6.0, an
|
|
|
|
<replaceable>ipset</replaceable> name can be specified in this
|
|
|
|
column. This is intended to be used with
|
|
|
|
<firstterm>bitmap:port</firstterm> ipsets.</para>
|
2006-11-16 00:32:14 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2011-10-02 20:45:55 +02:00
|
|
|
<term><emphasis role="bold">SOURCE PORT(S)</emphasis> (sport) -
|
2006-11-23 16:53:07 +01:00
|
|
|
{<emphasis
|
|
|
|
role="bold">-</emphasis>|<emphasis>port-name-number-or-range</emphasis>[<emphasis
|
2014-01-03 18:23:14 +01:00
|
|
|
role="bold">,</emphasis><emphasis>port-name-number-or-range</emphasis>]...|+<replaceable>ipset</replaceable>}</term>
|
2006-11-16 00:32:14 +01:00
|
|
|
|
|
|
|
<listitem>
|
2011-10-02 20:45:55 +02:00
|
|
|
<para>Optional port(s) used by the client. If omitted, any source
|
|
|
|
port is acceptable. Specified as a comma- separated list of port
|
|
|
|
names, port numbers or port ranges.</para>
|
2006-11-16 00:32:14 +01:00
|
|
|
|
2013-03-04 18:56:10 +01:00
|
|
|
<para>Beginning with Shorewall 4.5.15, you may place '=' in this
|
|
|
|
column, provided that the DEST PORT(S) column is non-empty. This
|
|
|
|
causes the rule to match when either the source port or the
|
|
|
|
destination port in a packet matches one of the ports specified in
|
2013-05-03 18:19:45 +02:00
|
|
|
DEST PORTS(S). Use of '=' requires multi-port match in your iptables
|
2013-03-04 21:53:00 +01:00
|
|
|
and kernel.</para>
|
2013-03-04 18:56:10 +01:00
|
|
|
|
2006-11-16 00:32:14 +01:00
|
|
|
<warning>
|
2007-01-27 19:53:50 +01:00
|
|
|
<para>Unless you really understand IP, you should leave this
|
2006-11-16 00:32:14 +01:00
|
|
|
column empty or place a dash (<emphasis role="bold">-</emphasis>)
|
|
|
|
in the column. Most people who try to use this column get it
|
|
|
|
wrong.</para>
|
|
|
|
</warning>
|
|
|
|
|
2013-03-04 18:56:10 +01:00
|
|
|
<para>If you don't want to restrict client ports but need to specify
|
|
|
|
an <emphasis role="bold">ORIGINAL DEST</emphasis> in the next
|
|
|
|
column, then place "-" in this column.</para>
|
2006-11-16 00:32:14 +01:00
|
|
|
|
2013-03-04 18:56:10 +01:00
|
|
|
<para>If your kernel contains multi-port match support, then only a
|
|
|
|
single Netfilter rule will be generated if in this list and the
|
|
|
|
<emphasis role="bold">DEST PORT(S)</emphasis> list above:</para>
|
2006-11-16 00:32:14 +01:00
|
|
|
|
2013-03-04 18:56:10 +01:00
|
|
|
<para>1. There are 15 or less ports listed.</para>
|
2006-11-16 00:32:14 +01:00
|
|
|
|
2013-03-04 18:56:10 +01:00
|
|
|
<para>2. No port ranges are included or your kernel and iptables
|
2013-05-03 18:19:45 +02:00
|
|
|
contain extended multi-port match support.</para>
|
2014-01-03 18:23:14 +01:00
|
|
|
|
|
|
|
<para>Beginning with Shorewall 4.6.0, an
|
|
|
|
<replaceable>ipset</replaceable> name can be specified in this
|
|
|
|
column. This is intended to be used with
|
|
|
|
<firstterm>bitmap:port</firstterm> ipsets.</para>
|
2006-11-16 00:32:14 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2011-10-02 20:45:55 +02:00
|
|
|
<term><emphasis role="bold">ORIGINAL DEST</emphasis> (origdest) -
|
2006-11-23 16:53:07 +01:00
|
|
|
[<emphasis
|
2006-11-26 19:45:23 +01:00
|
|
|
role="bold">-</emphasis>|<emphasis>address</emphasis>[,<emphasis>address</emphasis>]...[<emphasis>exclusion</emphasis>]|<emphasis>exclusion</emphasis>]</term>
|
2006-11-16 00:32:14 +01:00
|
|
|
|
|
|
|
<listitem>
|
2011-10-02 20:45:55 +02:00
|
|
|
<para>Optional. If ACTION is <emphasis
|
|
|
|
role="bold">DNAT</emphasis>[<emphasis role="bold">-</emphasis>] or
|
|
|
|
<emphasis role="bold">REDIRECT</emphasis>[<emphasis
|
|
|
|
role="bold">-</emphasis>] then if this column is included and is
|
|
|
|
different from the IP address given in the <emphasis
|
|
|
|
role="bold">DEST</emphasis> column, then connections destined for
|
|
|
|
that address will be forwarded to the IP and port specified in the
|
|
|
|
<emphasis role="bold">DEST</emphasis> column.</para>
|
2006-11-16 00:32:14 +01:00
|
|
|
|
|
|
|
<para>A comma-separated list of addresses may also be used. This is
|
2006-11-26 19:45:23 +01:00
|
|
|
most useful with the <emphasis role="bold">REDIRECT</emphasis>
|
|
|
|
target where you want to redirect traffic destined for particular
|
|
|
|
set of hosts. Finally, if the list of addresses begins with "!"
|
|
|
|
(<emphasis>exclusion</emphasis>) then the rule will be followed only
|
|
|
|
if the original destination address in the connection request does
|
|
|
|
not match any of the addresses listed.</para>
|
2006-11-16 00:32:14 +01:00
|
|
|
|
2011-01-26 18:08:48 +01:00
|
|
|
<para>Beginning with Shorewall 4.4.17, the primary IP address of a
|
2013-05-03 18:19:45 +02:00
|
|
|
firewall interface can be specified by an ampersand ('&')
|
2011-01-26 18:08:48 +01:00
|
|
|
followed by the logical name of the interface as found in the
|
|
|
|
INTERFACE column of <ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>
|
2011-01-26 18:08:48 +01:00
|
|
|
(5).</para>
|
|
|
|
|
2006-11-16 00:32:14 +01:00
|
|
|
<para>For other actions, this column may be included and may contain
|
|
|
|
one or more addresses (host or network) separated by commas. Address
|
|
|
|
ranges are not allowed. When this column is supplied, rules are
|
|
|
|
generated that require that the original destination address matches
|
|
|
|
one of the listed addresses. This feature is most useful when you
|
|
|
|
want to generate a filter rule that corresponds to a <emphasis
|
|
|
|
role="bold">DNAT-</emphasis> or <emphasis
|
|
|
|
role="bold">REDIRECT-</emphasis> rule. In this usage, the list of
|
|
|
|
addresses should not begin with "!".</para>
|
|
|
|
|
2006-11-26 19:45:23 +01:00
|
|
|
<para>It is also possible to specify a set of addresses then exclude
|
|
|
|
part of those addresses. For example, <emphasis
|
|
|
|
role="bold">192.168.1.0/24!192.168.1.16/28</emphasis> specifies the
|
2007-01-27 19:53:50 +01:00
|
|
|
addresses 192.168.1.0-182.168.1.15 and 192.168.1.32-192.168.1.255.
|
|
|
|
See <ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/manpages/shorewall-exclusion.html">shorewall-exclusion</ulink>(5).</para>
|
2007-01-27 19:53:50 +01:00
|
|
|
|
|
|
|
<para>See <ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/PortKnocking.html">http://www.shorewall.net/PortKnocking.html</ulink>
|
2007-01-27 19:53:50 +01:00
|
|
|
for an example of using an entry in this column with a user-defined
|
|
|
|
action rule.</para>
|
2006-11-16 00:32:14 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2014-10-22 20:21:43 +02:00
|
|
|
<term><emphasis role="bold">RATE LIMIT</emphasis> (rate) -
|
|
|
|
<replaceable>limit</replaceable></term>
|
2006-11-16 00:32:14 +01:00
|
|
|
|
|
|
|
<listitem>
|
2014-10-22 20:21:43 +02:00
|
|
|
<para>where <replaceable>limit</replaceable> is one of:</para>
|
|
|
|
|
|
|
|
<simplelist>
|
|
|
|
<member>[<emphasis
|
|
|
|
role="bold">-</emphasis>|[{<emphasis>s</emphasis>|<emphasis
|
|
|
|
role="bold">d</emphasis>}:[[<replaceable>name</replaceable>]:]]]<emphasis>rate</emphasis><emphasis
|
|
|
|
role="bold">/</emphasis>{<emphasis
|
|
|
|
role="bold">sec</emphasis>|<emphasis
|
|
|
|
role="bold">min</emphasis>|<emphasis
|
|
|
|
role="bold">hour</emphasis>|<emphasis
|
|
|
|
role="bold">day</emphasis>}[:<emphasis>burst</emphasis>]</member>
|
|
|
|
|
|
|
|
<member>[<replaceable>name</replaceable>1]:<emphasis>rate1</emphasis><emphasis
|
|
|
|
role="bold">/</emphasis>{<emphasis
|
|
|
|
role="bold">sec</emphasis>|<emphasis
|
|
|
|
role="bold">min</emphasis>|<emphasis
|
|
|
|
role="bold">hour</emphasis>|<emphasis
|
|
|
|
role="bold">day</emphasis>}[:<emphasis>burst1</emphasis>],[<replaceable>name</replaceable>2]:<emphasis>rate2</emphasis><emphasis
|
|
|
|
role="bold">/</emphasis>{<emphasis
|
|
|
|
role="bold">sec</emphasis>|<emphasis
|
|
|
|
role="bold">min</emphasis>|<emphasis
|
|
|
|
role="bold">hour</emphasis>|<emphasis
|
|
|
|
role="bold">day</emphasis>}[:<emphasis>burst2</emphasis>]</member>
|
|
|
|
</simplelist>
|
|
|
|
|
2011-10-02 20:45:55 +02:00
|
|
|
<para>You may optionally rate-limit the rule by placing a value in
|
|
|
|
this column:</para>
|
2006-11-16 00:32:14 +01:00
|
|
|
|
2014-10-22 20:21:43 +02:00
|
|
|
<para><emphasis>rate*</emphasis> is the number of connections per
|
2006-11-23 16:53:07 +01:00
|
|
|
interval (<emphasis role="bold">sec</emphasis> or <emphasis
|
2014-10-22 20:21:43 +02:00
|
|
|
role="bold">min</emphasis>) and <emphasis>burst</emphasis>* is the
|
2006-11-23 16:53:07 +01:00
|
|
|
largest burst permitted. If no <emphasis>burst</emphasis> is given,
|
2013-05-03 18:19:45 +02:00
|
|
|
a value of 5 is assumed. There may be no no white-space embedded in
|
2006-11-23 16:53:07 +01:00
|
|
|
the specification.</para>
|
2006-11-16 00:32:14 +01:00
|
|
|
|
2006-11-26 23:11:22 +01:00
|
|
|
<para>Example: <emphasis role="bold">10/sec:20</emphasis></para>
|
2009-04-07 19:35:06 +02:00
|
|
|
|
|
|
|
<para>When <option>s:</option> or <option>d:</option> is specified,
|
|
|
|
the rate applies per source IP address or per destination IP address
|
2014-10-22 20:21:43 +02:00
|
|
|
respectively. The <replaceable>name</replaceable>s may be chosen by
|
|
|
|
the user and specifiy a hash table to be used to count matching
|
2010-07-13 16:37:14 +02:00
|
|
|
connections. If not given, the name <emphasis
|
2010-02-18 16:12:36 +01:00
|
|
|
role="bold">shorewallN</emphasis> (where N is a unique integer) is
|
2014-10-22 20:21:43 +02:00
|
|
|
assumed. Where more than one rule or POLICY specifies the same name,
|
|
|
|
the connections counts for the rules are aggregated and the
|
|
|
|
individual rates apply to the aggregated count.</para>
|
|
|
|
|
|
|
|
<para>Beginning with Shorewall 4.6.5, two<replaceable>
|
|
|
|
limit</replaceable>s may be specified, separated by a comma. In this
|
|
|
|
case, the first limit (<replaceable>name1</replaceable>,
|
|
|
|
<replaceable>rate1</replaceable>, burst1) specifies the per-source
|
|
|
|
IP limit and the second limit specifies the per-destination IP
|
|
|
|
limit.</para>
|
|
|
|
|
|
|
|
<para>Example: <emphasis
|
|
|
|
role="bold">client:10/sec:20,:60/sec:100</emphasis></para>
|
|
|
|
|
|
|
|
<para>In this example, the 'client' hash table will be used to
|
|
|
|
enforce the per-source limit and the compiler will pick a unique
|
|
|
|
name for the hash table that tracks the per-destination
|
|
|
|
limit.</para>
|
2006-11-16 00:32:14 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2011-10-02 20:45:55 +02:00
|
|
|
<term><emphasis role="bold">USER/GROUP</emphasis> (user) - [<emphasis
|
2006-11-23 16:53:07 +01:00
|
|
|
role="bold">!</emphasis>][<emphasis>user-name-or-number</emphasis>][<emphasis
|
2012-09-09 17:18:25 +02:00
|
|
|
role="bold">:</emphasis><emphasis>group-name-or-number</emphasis>][,...]</term>
|
2006-11-16 00:32:14 +01:00
|
|
|
|
|
|
|
<listitem>
|
2011-10-02 20:45:55 +02:00
|
|
|
<para>This optional column may only be non-empty if the SOURCE is
|
|
|
|
the firewall itself.</para>
|
2006-11-16 00:32:14 +01:00
|
|
|
|
|
|
|
<para>When this column is non-empty, the rule applies only if the
|
|
|
|
program generating the output is running under the effective
|
|
|
|
<emphasis>user</emphasis> and/or <emphasis>group</emphasis>
|
|
|
|
specified (or is NOT running under that id if "!" is given).</para>
|
|
|
|
|
2012-09-09 17:18:25 +02:00
|
|
|
<para>Beginning with Shorewall 4.5.8, multiple user or group
|
|
|
|
names/ids separated by commas may be specified.</para>
|
|
|
|
|
2006-11-16 00:32:14 +01:00
|
|
|
<para>Examples:</para>
|
|
|
|
|
|
|
|
<variablelist>
|
|
|
|
<varlistentry>
|
|
|
|
<term>joe</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>program must be run by joe</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>:kids</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>program must be run by a member of the 'kids'
|
|
|
|
group</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>!:kids</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>program must not be run by a member of the 'kids'
|
|
|
|
group</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2012-06-19 23:05:38 +02:00
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>2001-2099</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>UIDs 2001 through 2099 (Shorewall 4.5.6 and
|
|
|
|
later)</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2007-05-08 21:05:25 +02:00
|
|
|
</variablelist>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2008-07-10 15:33:54 +02:00
|
|
|
<term><emphasis role="bold">MARK</emphasis> - [<emphasis
|
2007-05-08 21:05:25 +02:00
|
|
|
role="bold">!</emphasis>]<emphasis>value</emphasis>[/<emphasis>mask</emphasis>][<emphasis
|
|
|
|
role="bold">:C</emphasis>]</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Defines a test on the existing packet or connection mark. The
|
|
|
|
rule will match only if the test returns true.</para>
|
|
|
|
|
|
|
|
<para>If you don't want to define a test but need to specify
|
|
|
|
anything in the following columns, place a "-" in this field.</para>
|
|
|
|
|
|
|
|
<variablelist>
|
|
|
|
<varlistentry>
|
|
|
|
<term>!</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Inverts the test (not equal)</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis>value</emphasis></term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Value of the packet or connection mark.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis>mask</emphasis></term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>A mask to be applied to the mark before testing.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis role="bold">:C</emphasis></term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Designates a connection mark. If omitted, the packet
|
2009-07-16 02:50:55 +02:00
|
|
|
mark's value is tested.</para>
|
2007-05-08 21:05:25 +02:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2006-11-16 00:32:14 +01:00
|
|
|
</variablelist>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2008-10-08 01:23:07 +02:00
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis role="bold">CONNLIMIT</emphasis> - [<emphasis
|
|
|
|
role="bold">!</emphasis>]<emphasis>limit</emphasis>[:<emphasis>mask</emphasis>]</term>
|
|
|
|
|
|
|
|
<listitem>
|
2009-06-02 17:21:52 +02:00
|
|
|
<para>May be used to limit the number of simultaneous connections
|
|
|
|
from each individual host to <replaceable>limit</replaceable>
|
|
|
|
connections. Requires connlimit match in your kernel and iptables.
|
|
|
|
While the limit is only checked on rules specifying CONNLIMIT, the
|
|
|
|
number of current connections is calculated over all current
|
|
|
|
connections from the SOURCE host. By default, the limit is applied
|
|
|
|
to each host but can be made to apply to networks of hosts by
|
|
|
|
specifying a <replaceable>mask</replaceable>. The
|
|
|
|
<replaceable>mask</replaceable> specifies the width of a VLSM mask
|
|
|
|
to be applied to the source address; the number of current
|
|
|
|
connections is then taken over all hosts in the subnet
|
2008-10-08 01:23:07 +02:00
|
|
|
<replaceable>source-address</replaceable>/<replaceable>mask</replaceable>.
|
|
|
|
When<option> !</option> is specified, the rule matches when the
|
|
|
|
number of connection exceeds the
|
|
|
|
<replaceable>limit</replaceable>.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2008-10-14 21:37:35 +02:00
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis role="bold">TIME</emphasis> -
|
2013-05-03 18:19:45 +02:00
|
|
|
<emphasis>timeelement</emphasis>[&<emphasis>timeelement</emphasis>...]</term>
|
2008-10-14 21:37:35 +02:00
|
|
|
|
|
|
|
<listitem>
|
2009-06-02 17:21:52 +02:00
|
|
|
<para>May be used to limit the rule to a particular time period each
|
|
|
|
day, to particular days of the week or month, or to a range defined
|
|
|
|
by dates and times. Requires time match support in your kernel and
|
|
|
|
iptables.</para>
|
2008-10-14 21:37:35 +02:00
|
|
|
|
|
|
|
<para><replaceable>timeelement</replaceable> may be:</para>
|
|
|
|
|
|
|
|
<variablelist>
|
|
|
|
<varlistentry>
|
|
|
|
<term>timestart=<replaceable>hh</replaceable>:<replaceable>mm</replaceable>[:<replaceable>ss</replaceable>]</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Defines the starting time of day.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>timestop=<replaceable>hh</replaceable>:<replaceable>mm</replaceable>[:<replaceable>ss</replaceable>]</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Defines the ending time of day.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>utc</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Times are expressed in Greenwich Mean Time.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>localtz</term>
|
|
|
|
|
|
|
|
<listitem>
|
2012-03-19 23:57:38 +01:00
|
|
|
<para>Deprecated by the Netfilter team in favor of <emphasis
|
|
|
|
role="bold">kerneltz</emphasis>. Times are expressed in Local
|
|
|
|
Civil Time (default).</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>kerneltz</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Added in Shorewall 4.5.2. Times are expressed in Local
|
|
|
|
Kernel Time (requires iptables 1.4.12 or later).</para>
|
2008-10-14 21:37:35 +02:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>weekdays=ddd[,ddd]...</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>where <replaceable>ddd</replaceable> is one of
|
|
|
|
<option>Mon</option>, <option>Tue</option>,
|
|
|
|
<option>Wed</option>, <option>Thu</option>,
|
|
|
|
<option>Fri</option>, <option>Sat</option> or
|
|
|
|
<option>Sun</option></para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>monthdays=dd[,dd],...</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>where <replaceable>dd</replaceable> is an ordinal day of
|
|
|
|
the month</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>datestart=<replaceable>yyyy</replaceable>[-<replaceable>mm</replaceable>[-<replaceable>dd</replaceable>[<option>T</option><replaceable>hh</replaceable>[:<replaceable>mm</replaceable>[:<replaceable>ss</replaceable>]]]]]</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Defines the starting date and time.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>datestop=<replaceable>yyyy</replaceable>[-<replaceable>mm</replaceable>[-<replaceable>dd</replaceable>[<option>T</option><replaceable>hh</replaceable>[:<replaceable>mm</replaceable>[:<replaceable>ss</replaceable>]]]]]</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Defines the ending date and time.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
</variablelist>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2011-09-22 00:20:50 +02:00
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis role="bold">HEADERS</emphasis></term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Added in Shorewall 4.4.15. Not used in IPv4 configurations. If
|
|
|
|
you with to supply a value for one of the later columns, enter '-'
|
|
|
|
in this column.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2011-09-23 21:33:55 +02:00
|
|
|
<term><emphasis role="bold">SWITCH -
|
2012-11-28 01:17:43 +01:00
|
|
|
[!]<replaceable>switch-name</replaceable>[={0|1}]</emphasis></term>
|
2011-09-22 00:20:50 +02:00
|
|
|
|
|
|
|
<listitem>
|
2011-09-24 16:34:58 +02:00
|
|
|
<para>Added in Shorewall 4.4.24 and allows enabling and disabling
|
|
|
|
the rule without requiring <command>shorewall
|
|
|
|
restart</command>.</para>
|
|
|
|
|
|
|
|
<para>The rule is enabled if the value stored in
|
2011-09-23 21:33:55 +02:00
|
|
|
<filename>/proc/net/nf_condition/<replaceable>switch-name</replaceable></filename>
|
2011-09-24 16:34:58 +02:00
|
|
|
is 1. The rule is disabled if that file contains 0 (the default). If
|
|
|
|
'!' is supplied, the test is inverted such that the rule is enabled
|
2012-11-29 16:17:13 +01:00
|
|
|
if the file contains 0.</para>
|
|
|
|
|
2012-11-29 17:05:49 +01:00
|
|
|
<para>Within the <replaceable>switch-name</replaceable>, '@0' and
|
|
|
|
'@{0}' are replaced by the name of the chain to which the rule is a
|
|
|
|
added. The <replaceable>switch-name</replaceable> (after '@...'
|
|
|
|
expansion) must begin with a letter and be composed of letters,
|
|
|
|
decimal digits, underscores or hyphens. Switch names must be 30
|
|
|
|
characters or less in length.</para>
|
2011-09-23 21:33:55 +02:00
|
|
|
|
2011-09-24 16:34:58 +02:00
|
|
|
<para>Switches are normally <emphasis role="bold">off</emphasis>. To
|
|
|
|
turn a switch <emphasis role="bold">on</emphasis>:</para>
|
2011-09-23 21:33:55 +02:00
|
|
|
|
|
|
|
<simplelist>
|
|
|
|
<member><command>echo 1 >
|
|
|
|
/proc/net/nf_condition/<replaceable>switch-name</replaceable></command></member>
|
|
|
|
</simplelist>
|
|
|
|
|
2011-09-24 16:34:58 +02:00
|
|
|
<para>To turn it <emphasis role="bold">off</emphasis> again:</para>
|
2011-09-23 21:33:55 +02:00
|
|
|
|
|
|
|
<simplelist>
|
|
|
|
<member><command>echo 0 >
|
|
|
|
/proc/net/nf_condition/<replaceable>switch-name</replaceable></command></member>
|
|
|
|
</simplelist>
|
|
|
|
|
2011-09-24 16:34:58 +02:00
|
|
|
<para>Switch settings are retained over <command>shorewall
|
|
|
|
restart</command>.</para>
|
2012-11-28 01:17:43 +01:00
|
|
|
|
2013-05-03 18:19:45 +02:00
|
|
|
<para>Beginning with Shorewall 4.5.10, when the
|
2012-11-28 01:17:43 +01:00
|
|
|
<replaceable>switch-name</replaceable> is followed by
|
|
|
|
<option>=0</option> or <option>=1</option>, then the switch is
|
2012-11-29 17:05:49 +01:00
|
|
|
initialized to off or on respectively by the
|
|
|
|
<command>start</command> command. Other commands do not affect the
|
|
|
|
switch setting.</para>
|
2011-09-22 00:20:50 +02:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2012-08-13 17:16:36 +02:00
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis role="bold">HELPER</emphasis> - [helper]</term>
|
|
|
|
|
|
|
|
<listitem>
|
2012-08-14 00:44:19 +02:00
|
|
|
<para>Added in Shorewall 4.5.7.</para>
|
|
|
|
|
|
|
|
<para>In the NEW section, causes the named conntrack
|
2012-08-13 17:16:36 +02:00
|
|
|
<replaceable>helper</replaceable> to be associated with this
|
2012-08-14 00:44:19 +02:00
|
|
|
connection; the contents of this column are ignored unless ACTION is
|
|
|
|
ACCEPT*, DNAT* or REDIRECT*.</para>
|
|
|
|
|
|
|
|
<para>In the RELATED section, will only match if the related
|
|
|
|
connection has the named <replaceable>helper</replaceable>
|
|
|
|
associated with it.</para>
|
|
|
|
|
|
|
|
<para>The <replaceable>helper</replaceable> may be one of:</para>
|
2012-08-13 17:16:36 +02:00
|
|
|
|
|
|
|
<simplelist>
|
|
|
|
<member><option>amanda</option></member>
|
|
|
|
|
|
|
|
<member><option>ftp</option></member>
|
|
|
|
|
|
|
|
<member><option>irc</option></member>
|
|
|
|
|
|
|
|
<member><option>netbios-ns</option></member>
|
|
|
|
|
|
|
|
<member><option>pptp</option></member>
|
|
|
|
|
|
|
|
<member><option>Q.931</option></member>
|
|
|
|
|
|
|
|
<member><option>RAS</option></member>
|
|
|
|
|
|
|
|
<member><option>sane</option></member>
|
|
|
|
|
|
|
|
<member><option>sip</option></member>
|
|
|
|
|
|
|
|
<member><option>snmp</option></member>
|
|
|
|
|
|
|
|
<member><option>tftp</option></member>
|
|
|
|
</simplelist>
|
|
|
|
|
|
|
|
<para>If the HELPERS option is specified in <ulink
|
2014-01-16 17:32:57 +01:00
|
|
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5), then
|
|
|
|
any module specified in this column must be listed in the HELPERS
|
2012-08-13 17:16:36 +02:00
|
|
|
setting.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2006-11-15 22:02:04 +01:00
|
|
|
</variablelist>
|
|
|
|
</refsect1>
|
|
|
|
|
2007-05-02 18:12:26 +02:00
|
|
|
<refsect1>
|
2009-07-16 02:50:55 +02:00
|
|
|
<title>Examples</title>
|
2006-11-15 22:02:04 +01:00
|
|
|
|
2006-11-16 00:32:14 +01:00
|
|
|
<variablelist>
|
|
|
|
<varlistentry>
|
|
|
|
<term>Example 1:</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Accept SMTP requests from the DMZ to the internet</para>
|
|
|
|
|
|
|
|
<programlisting> #ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL
|
|
|
|
# PORT PORT(S) DEST
|
|
|
|
ACCEPT dmz net tcp smtp</programlisting>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>Example 2:</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Forward all ssh and http connection requests from the internet
|
|
|
|
to local system 192.168.1.3</para>
|
|
|
|
|
|
|
|
<programlisting> #ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL
|
|
|
|
# PORT PORT(S) DEST
|
|
|
|
DNAT net loc:192.168.1.3 tcp ssh,http</programlisting>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>Example 3:</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Forward all http connection requests from the internet to
|
|
|
|
local system 192.168.1.3 with a limit of 3 per second and a maximum
|
|
|
|
burst of 10<programlisting> #ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL RATE
|
|
|
|
# PORT PORT(S) DEST LIMIT
|
|
|
|
DNAT net loc:192.168.1.3 tcp http - - 3/sec:10</programlisting></para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>Example 4:</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Redirect all locally-originating www connection requests to
|
|
|
|
port 3128 on the firewall (Squid running on the firewall system)
|
|
|
|
except when the destination address is 192.168.2.2</para>
|
|
|
|
|
|
|
|
<programlisting> #ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL
|
|
|
|
# PORT PORT(S) DEST
|
|
|
|
REDIRECT loc 3128 tcp www - !192.168.2.2</programlisting>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>Example 5:</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>All http requests from the internet to address 130.252.100.69
|
|
|
|
are to be forwarded to 192.168.1.3</para>
|
|
|
|
|
|
|
|
<programlisting> #ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL
|
|
|
|
# PORT PORT(S) DEST
|
|
|
|
DNAT net loc:192.168.1.3 tcp 80 - 130.252.100.69</programlisting>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>Example 6:</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>You want to accept SSH connections to your firewall only from
|
|
|
|
internet IP addresses 130.252.100.69 and 130.252.100.70</para>
|
|
|
|
|
|
|
|
<programlisting> #ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL
|
|
|
|
# PORT PORT(S) DEST
|
|
|
|
ACCEPT net:130.252.100.69,130.252.100.70 $FW \
|
|
|
|
tcp 22</programlisting>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>Example 7:</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>You wish to accept connections from the internet to your
|
|
|
|
firewall on port 2222 and you want to forward them to local system
|
|
|
|
192.168.1.3, port 22</para>
|
|
|
|
|
|
|
|
<programlisting> #ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL
|
|
|
|
# PORT PORT(S) DEST
|
2007-05-30 12:21:38 +02:00
|
|
|
DNAT net loc:192.168.1.3:22 tcp 2222</programlisting>
|
2006-11-16 00:32:14 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2007-11-15 22:12:13 +01:00
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>Example 8:</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>You want to redirect connection requests to port 80 randomly
|
|
|
|
to the port range 81-90.</para>
|
|
|
|
|
|
|
|
<programlisting> #ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL
|
2010-07-17 01:41:07 +02:00
|
|
|
# PORT PORT(S) DEST
|
2007-11-15 22:12:13 +01:00
|
|
|
REDIRECT net $FW::81-90:random tcp www</programlisting>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2008-01-11 23:38:39 +01:00
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>Example 9:</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Shorewall does not impose as much structure on the Netfilter
|
|
|
|
rules in the 'nat' table as it does on those in the filter table. As
|
2008-01-12 02:47:58 +01:00
|
|
|
a consequence, when using Shorewall versions before 4.1.4, care must
|
|
|
|
be exercised when using DNAT and REDIRECT rules with zones defined
|
|
|
|
with wildcard interfaces (those ending with '+'. Here is an
|
|
|
|
example:</para>
|
2008-01-11 23:38:39 +01:00
|
|
|
|
|
|
|
<para><ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/manpages/shorewall-zones.html">shorewall-zones</ulink>(5):<programlisting> #ZONE TYPE OPTIONS
|
2008-01-11 23:38:39 +01:00
|
|
|
fw firewall
|
|
|
|
net ipv4
|
|
|
|
dmz ipv4
|
|
|
|
loc ipv4</programlisting></para>
|
|
|
|
|
|
|
|
<para><ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5):<programlisting> #ZONE INTERFACE BROADCAST OPTIONS
|
2008-01-11 23:38:39 +01:00
|
|
|
net ppp0
|
|
|
|
loc eth1 detect
|
|
|
|
dmz eth2 detect
|
|
|
|
- ppp+ # Addresses are assigned from 192.168.3.0/24</programlisting></para>
|
|
|
|
|
|
|
|
<para><ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/manpages/shorewall-hosts.html">shorewall-host</ulink>(5):<programlisting> #ZONE HOST(S) OPTIONS
|
2008-01-11 23:38:39 +01:00
|
|
|
loc ppp+:192.168.3.0/24</programlisting></para>
|
|
|
|
|
|
|
|
<para>rules:</para>
|
|
|
|
|
|
|
|
<programlisting> #ACTION SOURCE DEST PROTO DEST
|
|
|
|
# PORT(S)
|
|
|
|
REDIRECT loc 3128 tcp 80 </programlisting>
|
|
|
|
|
|
|
|
<simpara>Note that it would have been tempting to simply define the
|
|
|
|
loc zone entirely in shorewall-interfaces(8):</simpara>
|
|
|
|
|
|
|
|
<para><programlisting> #******************* INCORRECT *****************
|
|
|
|
#ZONE INTERFACE BROADCAST OPTIONS
|
|
|
|
net ppp0
|
|
|
|
loc eth1 detect
|
|
|
|
loc ppp+
|
|
|
|
dmz eth2</programlisting></para>
|
|
|
|
|
|
|
|
<para>This would have made it impossible to run a
|
|
|
|
internet-accessible web server in the DMZ because all traffic
|
|
|
|
entering ppp+ interfaces would have been redirected to port 3128 on
|
|
|
|
the firewall and there would have been no net->fw ACCEPT rule for
|
|
|
|
that traffic.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2010-07-21 00:42:11 +02:00
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>Example 10:</term>
|
|
|
|
|
|
|
|
<listitem>
|
2013-05-03 18:19:45 +02:00
|
|
|
<para>Add the tuple (source IP, dest port, dest IP) of an incoming
|
2010-07-21 00:42:11 +02:00
|
|
|
SSH connection to the ipset S:</para>
|
|
|
|
|
2011-02-03 22:26:41 +01:00
|
|
|
<programlisting> #ACTION SOURCE DEST PROTO DEST
|
2012-05-17 19:44:02 +02:00
|
|
|
# PORT(S)
|
2011-02-03 22:26:41 +01:00
|
|
|
ADD(+S:dst,src,dst) net fw tcp 22</programlisting>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>Example 11:</term>
|
|
|
|
|
|
|
|
<listitem>
|
2011-02-03 22:28:50 +01:00
|
|
|
<para>You wish to limit SSH connections from remote systems to 1/min
|
|
|
|
with a burst of three (to allow for limited retry):</para>
|
2011-02-03 22:26:41 +01:00
|
|
|
|
|
|
|
<programlisting> #ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL RATE
|
|
|
|
# PORT(S) PORT(S) DEST LIMIT
|
|
|
|
SSH(ACCEPT) net all - - - - s:1/min:3</programlisting>
|
2010-07-21 00:42:11 +02:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2011-09-22 00:20:50 +02:00
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>Example 12:</term>
|
|
|
|
|
|
|
|
<listitem>
|
2011-09-23 21:33:55 +02:00
|
|
|
<para>Forward port 80 to dmz host $BACKUP if switch 'primary_down'
|
|
|
|
is on.</para>
|
2011-09-22 00:20:50 +02:00
|
|
|
|
2011-09-23 21:33:55 +02:00
|
|
|
<programlisting> #ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL RATE USER/ MARK CONNLIMIT TIME HEADERS SWITCH
|
2011-09-22 00:20:50 +02:00
|
|
|
# PORT(S) PORT(S) DEST LIMIT GROUP
|
|
|
|
DNAT net dmz:$BACKUP tcp 80 - - - - - - - - primary_down</programlisting>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2012-05-17 19:44:02 +02:00
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>Example 13:</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Drop all email from the <emphasis>Anonymous Proxy</emphasis>
|
|
|
|
and <emphasis>Satellite Provider</emphasis> address ranges:</para>
|
|
|
|
|
|
|
|
<programlisting> #ACTION SOURCE DEST PROTO DEST
|
|
|
|
# PORT(S)
|
2012-07-30 16:23:40 +02:00
|
|
|
DROP net:^A1,A2 fw tcp 25</programlisting>
|
2012-05-17 19:44:02 +02:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2013-04-17 16:34:00 +02:00
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>Example 14:</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>You want to generate your own rule involving iptables targets
|
|
|
|
and matches not supported by Shorewall.</para>
|
|
|
|
|
|
|
|
<programlisting> #ACTION SOURCE DEST PROTO DEST
|
|
|
|
# PORT(S)
|
|
|
|
INLINE $FW net ; -p 6 -m mickey-mouse --name test -m set --match-set set1 src -m mickey-mouse --name test2 -j SECCTX --name test3</programlisting>
|
|
|
|
|
|
|
|
<para>The above will generate the following iptables-restore
|
|
|
|
input:</para>
|
|
|
|
|
|
|
|
<programlisting> -A fw2net -p 6 -m mickey-mouse --name test -m set --match-set set1 src -m mickey-mouse --name test2 -j SECCTX --name test3</programlisting>
|
|
|
|
|
|
|
|
<para>Note that SECCTX must be defined as a builtin action in <ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/manpages/shorewall-actions.html">shorewall-actions</ulink>(5):</para>
|
2013-04-17 16:34:00 +02:00
|
|
|
|
|
|
|
<programlisting> #ACTION OPTIONS
|
|
|
|
SECCTX builtin</programlisting>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2006-11-16 00:32:14 +01:00
|
|
|
</variablelist>
|
2006-11-15 22:02:04 +01:00
|
|
|
</refsect1>
|
|
|
|
|
|
|
|
<refsect1>
|
|
|
|
<title>FILES</title>
|
|
|
|
|
2006-11-16 00:32:14 +01:00
|
|
|
<para>/etc/shorewall/rules</para>
|
2006-11-15 22:02:04 +01:00
|
|
|
</refsect1>
|
|
|
|
|
|
|
|
<refsect1>
|
|
|
|
<title>See ALSO</title>
|
|
|
|
|
2010-07-21 00:42:11 +02:00
|
|
|
<para><ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/ipsets.html">http://www.shorewall.net/ipsets.html</ulink></para>
|
2010-07-21 00:42:11 +02:00
|
|
|
|
2011-09-26 19:16:52 +02:00
|
|
|
<para><ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/configuration_file_basics.htm#Pairs">http://www.shorewall.net/configuration_file_basics.htm#Pairs</ulink></para>
|
2012-05-24 22:54:59 +02:00
|
|
|
|
|
|
|
<para><ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/shorewall_logging.html">http://www.shorewall.net/shorewall_logging.html</ulink></para>
|
2011-09-26 19:16:52 +02:00
|
|
|
|
2006-11-15 22:02:04 +01:00
|
|
|
<para>shorewall(8), shorewall-accounting(5), shorewall-actions(5),
|
2013-05-03 18:19:45 +02:00
|
|
|
shorewall-blacklist(5), shorewall-blrules(5), shorewall-hosts(5),
|
2011-12-28 00:29:37 +01:00
|
|
|
shorewall_interfaces(5), shorewall-ipsets(5), shorewall-maclist(5),
|
|
|
|
shorewall-masq(5), shorewall-nat(5), shorewall-netmap(5),
|
|
|
|
shorewall-params(5), shorewall-policy(5), shorewall-providers(5),
|
2012-03-19 23:57:38 +01:00
|
|
|
shorewall-proxyarp(5), shorewall-rtrules(5), shorewall-routestopped(5),
|
|
|
|
shorewall.conf(5), shorewall-secmarks(5), shorewall-tcclasses(5),
|
2013-12-29 00:35:08 +01:00
|
|
|
shorewall-tcdevices(5), shorewall-mangle(5), shorewall-tos(5),
|
2012-03-19 23:57:38 +01:00
|
|
|
shorewall-tunnels(5), shorewall-zones(5)</para>
|
2006-11-15 22:02:04 +01:00
|
|
|
</refsect1>
|
2008-10-08 01:23:07 +02:00
|
|
|
</refentry>
|