2006-11-16 01:16:15 +01:00
|
|
|
<?xml version="1.0" encoding="UTF-8"?>
|
2008-12-31 19:08:36 +01:00
|
|
|
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.4//EN"
|
|
|
|
"http://www.oasis-open.org/docbook/xml/4.4/docbookx.dtd">
|
2006-11-16 01:16:15 +01:00
|
|
|
<refentry>
|
|
|
|
<refmeta>
|
|
|
|
<refentrytitle>shorewall-accounting</refentrytitle>
|
|
|
|
|
|
|
|
<manvolnum>5</manvolnum>
|
2014-01-16 17:32:57 +01:00
|
|
|
|
|
|
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
2006-11-16 01:16:15 +01:00
|
|
|
</refmeta>
|
|
|
|
|
|
|
|
<refnamediv>
|
|
|
|
<refname>accounting</refname>
|
|
|
|
|
|
|
|
<refpurpose>Shorewall Accounting file</refpurpose>
|
|
|
|
</refnamediv>
|
|
|
|
|
|
|
|
<refsynopsisdiv>
|
|
|
|
<cmdsynopsis>
|
2017-06-17 00:01:41 +02:00
|
|
|
<command>/etc/shorewall[6]/accounting</command>
|
2006-11-16 01:16:15 +01:00
|
|
|
</cmdsynopsis>
|
|
|
|
</refsynopsisdiv>
|
|
|
|
|
|
|
|
<refsect1>
|
|
|
|
<title>Description</title>
|
|
|
|
|
|
|
|
<para>Accounting rules exist simply to count packets and bytes in
|
|
|
|
categories that you define in this file. You may display these rules and
|
|
|
|
their packet and byte counters using the <command>shorewall show
|
2006-11-22 04:51:39 +01:00
|
|
|
accounting</command> command.</para>
|
2006-11-16 01:16:15 +01:00
|
|
|
|
2011-05-18 03:35:28 +02:00
|
|
|
<para>Beginning with Shorewall 4.4.18, the accounting structure can be
|
|
|
|
created with three root chains:</para>
|
|
|
|
|
|
|
|
<itemizedlist>
|
|
|
|
<listitem>
|
|
|
|
<para><emphasis role="bold">accountin</emphasis>: Rules that are valid
|
|
|
|
in the <emphasis role="bold">INPUT</emphasis> chain (may not specify
|
|
|
|
an output interface).</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para><emphasis role="bold">accountout</emphasis>: Rules that are
|
|
|
|
valid in the OUTPUT chain (may not specify an input interface or a MAC
|
|
|
|
address).</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para><emphasis role="bold">accounting</emphasis>: Other rules.</para>
|
|
|
|
</listitem>
|
|
|
|
</itemizedlist>
|
|
|
|
|
|
|
|
<para>The new structure is enabled by sectioning the accounting file in a
|
2014-01-12 22:40:03 +01:00
|
|
|
manner similar to the <ulink url="/manpages/shorewall-rules.html">rules
|
2011-05-18 03:35:28 +02:00
|
|
|
file</ulink>. The sections are <emphasis role="bold">INPUT</emphasis>,
|
|
|
|
<emphasis role="bold">OUTPUT</emphasis> and <emphasis
|
|
|
|
role="bold">FORWARD</emphasis> and must appear in that order (although any
|
|
|
|
of them may be omitted). The first non-commentary record in the accounting
|
|
|
|
file must be a section header when sectioning is used.</para>
|
|
|
|
|
2012-04-10 01:47:56 +02:00
|
|
|
<warning>
|
|
|
|
<para>If sections are not used, the Shorewall rules compiler cannot
|
|
|
|
detect certain violations of netfilter restrictions. These violations
|
|
|
|
can result in run-time errors such as the following:</para>
|
|
|
|
|
|
|
|
<blockquote>
|
|
|
|
<para><emphasis role="bold">iptables-restore v1.4.13: Can't use -o
|
|
|
|
with INPUT</emphasis></para>
|
|
|
|
</blockquote>
|
|
|
|
</warning>
|
|
|
|
|
2011-05-18 03:35:28 +02:00
|
|
|
<para>Beginning with Shorewall 4.4.20, the ACCOUNTING_TABLE setting was
|
|
|
|
added to shorewall.conf and shorewall6.conf. That setting determines the
|
|
|
|
Netfilter table (filter or mangle) where the accounting rules are added.
|
|
|
|
When ACCOUNTING_TABLE=mangle is specified, the available sections are
|
|
|
|
<emphasis role="bold">PREROUTING</emphasis>, <emphasis
|
|
|
|
role="bold">INPUT</emphasis>, <emphasis role="bold">OUTPUT</emphasis>,
|
|
|
|
<emphasis role="bold">FORWARD</emphasis> and <emphasis
|
|
|
|
role="bold">POSTROUTING</emphasis>.</para>
|
|
|
|
|
|
|
|
<para>Section headers have the form:</para>
|
|
|
|
|
2015-08-22 17:00:38 +02:00
|
|
|
<para><option>?SECTION</option>
|
2011-05-18 03:35:28 +02:00
|
|
|
<replaceable>section-name</replaceable></para>
|
|
|
|
|
|
|
|
<para>When sections are enabled:</para>
|
|
|
|
|
|
|
|
<itemizedlist>
|
|
|
|
<listitem>
|
2012-03-14 22:50:25 +01:00
|
|
|
<para>A jump to a user-defined accounting chain must appear before
|
|
|
|
entries that add rules to that chain. This eliminates loops and
|
|
|
|
unreferenced chains.</para>
|
2011-05-18 03:35:28 +02:00
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>An output interface may not be specified in the <emphasis
|
|
|
|
role="bold">PREROUTING</emphasis> and <emphasis
|
|
|
|
role="bold">INPUT</emphasis> sections.</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>In the <emphasis role="bold">OUTPUT</emphasis> and <emphasis
|
|
|
|
role="bold">POSTROUTING</emphasis> sections:</para>
|
|
|
|
|
|
|
|
<itemizedlist>
|
|
|
|
<listitem>
|
|
|
|
<para>An input interface may not be specified</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Jumps to a chain defined in the <emphasis
|
|
|
|
role="bold">INPUT</emphasis> or <emphasis
|
|
|
|
role="bold">PREROUTING</emphasis> sections that specifies an input
|
|
|
|
interface are prohibited</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>MAC addresses may not be used</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Jump to a chain defined in the <emphasis
|
|
|
|
role="bold">INPUT</emphasis> or <emphasis
|
|
|
|
role="bold">PREROUTING</emphasis> section that specifies a MAC
|
|
|
|
address are prohibited.</para>
|
|
|
|
</listitem>
|
|
|
|
</itemizedlist>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>The default value of the CHAIN column is:</para>
|
|
|
|
|
|
|
|
<itemizedlist>
|
|
|
|
<listitem>
|
|
|
|
<para><emphasis role="bold">accountin</emphasis> in the <emphasis
|
|
|
|
role="bold">INPUT</emphasis> section</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
2013-05-03 18:19:45 +02:00
|
|
|
<para><emphasis role="bold">accountout</emphasis> in the <emphasis
|
2011-05-18 03:35:28 +02:00
|
|
|
role="bold">OUTPUT</emphasis> section</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para><emphasis role="bold">accountfwd</emphasis> in the <emphasis
|
|
|
|
role="bold">FORWARD</emphasis> section</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para><emphasis role="bold">accountpre</emphasis> in the <emphasis
|
|
|
|
role="bold">PREROUTING</emphasis> section</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para><emphasis role="bold">accountpost</emphasis> in the
|
|
|
|
<emphasis role="bold">POSTROUTING</emphasis> section</para>
|
|
|
|
</listitem>
|
|
|
|
</itemizedlist>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Traffic addressed to the firewall goes through the rules defined
|
|
|
|
in the INPUT section.</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Traffic originating on the firewall goes through the rules
|
|
|
|
defined in the OUTPUT section.</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Traffic being forwarded through the firewall goes through the
|
|
|
|
rules from the FORWARD sections.</para>
|
|
|
|
</listitem>
|
|
|
|
</itemizedlist>
|
|
|
|
|
2011-10-02 20:45:55 +02:00
|
|
|
<para>The columns in the file are as follows (where the column name is
|
|
|
|
followed by a different name in parentheses, the different name is used in
|
|
|
|
the alternate specification syntax):</para>
|
2006-11-16 01:16:15 +01:00
|
|
|
|
|
|
|
<variablelist>
|
|
|
|
<varlistentry>
|
2008-07-10 15:33:54 +02:00
|
|
|
<term><emphasis role="bold">ACTION</emphasis> - {<emphasis
|
2006-11-22 19:16:45 +01:00
|
|
|
role="bold">COUNT</emphasis>|<emphasis
|
|
|
|
role="bold">DONE</emphasis>|<emphasis>chain</emphasis>[:<emphasis
|
2012-12-23 00:47:03 +01:00
|
|
|
role="bold">{COUNT</emphasis>|JUMP}]|ACCOUNT(<replaceable>table</replaceable>,<replaceable>network</replaceable>)|[?]COMMENT
|
2010-09-07 05:37:34 +02:00
|
|
|
<emphasis>comment</emphasis>}</term>
|
2006-11-16 01:16:15 +01:00
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>What to do when a matching packet is found.</para>
|
|
|
|
|
|
|
|
<variablelist>
|
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis role="bold">COUNT</emphasis></term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Simply count the match and continue with the next
|
|
|
|
rule</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis role="bold">DONE</emphasis></term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Count the match and don't attempt to match any other
|
|
|
|
accounting rules in the chain specified in the <emphasis
|
|
|
|
role="bold">CHAIN</emphasis> column.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2006-11-22 19:16:45 +01:00
|
|
|
<term><emphasis>chain</emphasis>[<emphasis
|
|
|
|
role="bold">:</emphasis><emphasis
|
|
|
|
role="bold">COUNT</emphasis>]</term>
|
2006-11-16 01:16:15 +01:00
|
|
|
|
|
|
|
<listitem>
|
2007-11-01 17:02:17 +01:00
|
|
|
<para>Where <emphasis>chain</emphasis> is the name of a chain;
|
2013-07-22 16:54:45 +02:00
|
|
|
shorewall will create the chain automatically if it doesn't
|
2013-04-21 02:11:46 +02:00
|
|
|
already exist. If a second chain is mentioned in the CHAIN
|
2013-07-22 16:54:45 +02:00
|
|
|
column, then a jump from this second chain to
|
2013-04-21 02:11:46 +02:00
|
|
|
<replaceable>chain</replaceable> is created. If no chain is
|
|
|
|
named in the CHAIN column, then a jump from the default chain
|
|
|
|
to <replaceable>chain</replaceable> is created. If <emphasis
|
2006-11-16 01:16:15 +01:00
|
|
|
role="bold">:COUNT</emphasis> is included, a counting rule
|
2007-11-01 17:02:17 +01:00
|
|
|
matching this entry will be added to
|
2011-01-31 16:07:10 +01:00
|
|
|
<emphasis>chain</emphasis>. The <emphasis>chain</emphasis> may
|
2011-02-01 21:58:05 +01:00
|
|
|
not exceed 29 characters in length and may be composed of
|
|
|
|
letters, digits, dash ('-') and underscore ('_').</para>
|
2006-11-16 01:16:15 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2009-03-20 17:47:27 +01:00
|
|
|
|
2010-09-15 18:49:37 +02:00
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis>chain</emphasis>:JUMP</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Like the previous option without the <emphasis
|
|
|
|
role="bold">:COUNT</emphasis> part.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2011-01-30 17:33:06 +01:00
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis
|
|
|
|
role="bold">ACCOUNT(</emphasis><replaceable>table</replaceable>,<replaceable>network</replaceable><emphasis
|
|
|
|
role="bold">)</emphasis></term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>This action implements per-IP accounting and was added
|
2011-01-30 22:51:55 +01:00
|
|
|
in Shorewall 4.4.17. Requires the <emphasis>ACCOUNT
|
2011-01-30 17:33:06 +01:00
|
|
|
Target</emphasis> capability in your iptables and kernel (see
|
|
|
|
the output of <command>shorewall show
|
|
|
|
capabilities</command>).</para>
|
|
|
|
|
2011-02-01 21:20:57 +01:00
|
|
|
<variablelist>
|
|
|
|
<varlistentry>
|
|
|
|
<term><replaceable>table</replaceable></term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>is the name of an accounting table (you choose the
|
|
|
|
name). All rules specifying the same name will have
|
|
|
|
their per-IP counters accumulated in the same
|
|
|
|
table.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><replaceable>network</replaceable></term>
|
|
|
|
|
|
|
|
<listitem>
|
2013-05-03 18:19:45 +02:00
|
|
|
<para>is an IPv4 <emphasis
|
|
|
|
role="bold">network</emphasis> in CIDR notation (e.g.,
|
2011-02-01 21:20:57 +01:00
|
|
|
192.168.1.0/24). The network can be as large as a /8
|
|
|
|
(class A).</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
</variablelist>
|
2011-01-30 17:33:06 +01:00
|
|
|
|
2011-01-30 18:39:14 +01:00
|
|
|
<para>One nice feature of per-IP accounting is that the
|
|
|
|
counters survive <command>shorewall restart</command>. This
|
|
|
|
has a downside, however. If you change the network associated
|
|
|
|
with an accounting table, then you must <command>shorewall
|
|
|
|
stop; shorewall start</command> to have a successful restart
|
|
|
|
(counters will be cleared).</para>
|
|
|
|
|
2011-01-30 17:33:06 +01:00
|
|
|
<para>The counters in a <replaceable>table</replaceable> are
|
2011-01-30 19:46:35 +01:00
|
|
|
printed using the <command>iptaccount</command> utility. For a
|
|
|
|
command synopsis, type:</para>
|
|
|
|
|
2011-02-01 23:15:42 +01:00
|
|
|
<para><command>iptaccount --help</command></para>
|
2011-01-30 19:46:35 +01:00
|
|
|
|
|
|
|
<para>As of February 2011, the ACCOUNT Target capability and
|
|
|
|
the iptaccount utility are only available when <ulink
|
2011-01-30 17:33:06 +01:00
|
|
|
url="http://xtables-addons.sourceforge.net/">xtables-addons</ulink>
|
|
|
|
is installed. See <ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/Accounting.html#perIP">http://www.shorewall.net/Accounting.html#perIP</ulink>
|
2011-01-30 17:33:06 +01:00
|
|
|
for additional information.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2013-04-20 17:02:02 +02:00
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis role="bold">INLINE</emphasis></term>
|
|
|
|
|
|
|
|
<listitem>
|
2013-05-03 18:19:45 +02:00
|
|
|
<para>Added in Shorewall 4.5.16. Allows free form iptables
|
2013-04-20 17:02:02 +02:00
|
|
|
matches to be specified following a ';'. In the generated
|
2013-07-22 16:54:45 +02:00
|
|
|
iptables rule(s), the free form matches will follow any
|
|
|
|
matches that are generated by the column contents.</para>
|
2013-04-20 17:02:02 +02:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2011-05-17 22:42:13 +02:00
|
|
|
<varlistentry>
|
2012-07-28 20:21:16 +02:00
|
|
|
<term><emphasis
|
2013-04-23 15:55:30 +02:00
|
|
|
role="bold">NFACCT</emphasis>({<replaceable>object</replaceable>[!]}[,...])</term>
|
2012-07-28 20:21:16 +02:00
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Added in Shorewall 4.5.7. Provides a form of accounting
|
|
|
|
that survives <command>shorewall stop/shorewall</command>
|
|
|
|
start and <command>shorewall restart</command>. Requires the
|
|
|
|
NFaccnt Match capability in your kernel and iptables.
|
|
|
|
<replaceable>object</replaceable> names an nfacct object (see
|
|
|
|
man nfaccnt(8)). Multiple rules can specify the same
|
|
|
|
<replaceable>object</replaceable>; all packets that match any
|
|
|
|
of the rules increment the packet and bytes count of the
|
|
|
|
object.</para>
|
2013-04-19 15:38:02 +02:00
|
|
|
|
|
|
|
<para>Prior to Shorewall 4.5.16, only one
|
|
|
|
<replaceable>object</replaceable> could be specified.
|
|
|
|
Beginning with Shorewall 4.5.16, an arbitrary number of
|
|
|
|
objects may be given.</para>
|
2013-04-20 17:02:02 +02:00
|
|
|
|
2013-04-23 15:55:30 +02:00
|
|
|
<para>With Shorewall 4.5.16 or later, an nfacct
|
|
|
|
<replaceable>object</replaceable> in the list may optionally
|
|
|
|
be followed by <emphasis role="bold">!</emphasis> to indicate
|
|
|
|
that the nfacct <replaceable>object</replaceable> will be
|
|
|
|
incremented unconditionally for each packet. When <emphasis
|
|
|
|
role="bold">!</emphasis> is omitted, the
|
|
|
|
<replaceable>object</replaceable> will be incremented only if
|
|
|
|
all of the matches in the rule succeed.</para>
|
2012-07-28 20:21:16 +02:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis role="bold">NFLOG</emphasis>[(nflog-parameters)]
|
|
|
|
- Added in Shorewall-4.4.20.</term>
|
2011-05-17 22:42:13 +02:00
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Causes each matching packet to be sent via the currently
|
2013-05-03 18:19:45 +02:00
|
|
|
loaded logging back-end (usually nfnetlink_log) where it is
|
2011-05-17 22:42:13 +02:00
|
|
|
available to accounting daemons through a netlink
|
|
|
|
socket.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2009-03-20 17:47:27 +01:00
|
|
|
<varlistentry>
|
2015-08-22 17:00:38 +02:00
|
|
|
<term><emphasis role="bold">?COMMENT</emphasis></term>
|
2009-03-20 17:47:27 +01:00
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>The remainder of the line is treated as a comment which
|
|
|
|
is attached to subsequent rules until another COMMENT line is
|
|
|
|
found or until the end of the file is reached. To stop adding
|
|
|
|
comments to rules, use a line with only the word
|
2015-08-22 17:00:38 +02:00
|
|
|
?COMMENT.</para>
|
2009-03-20 17:47:27 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2006-11-16 01:16:15 +01:00
|
|
|
</variablelist>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2008-07-10 15:33:54 +02:00
|
|
|
<term><emphasis role="bold">CHAIN</emphasis> - {<emphasis
|
2006-11-22 19:16:45 +01:00
|
|
|
role="bold">-</emphasis>|<emphasis>chain</emphasis>}</term>
|
2006-11-16 01:16:15 +01:00
|
|
|
|
|
|
|
<listitem>
|
2006-11-22 19:16:45 +01:00
|
|
|
<para>The name of a <emphasis>chain</emphasis>. If specified as
|
|
|
|
<emphasis role="bold">-</emphasis> the <emphasis
|
2013-02-03 17:00:24 +01:00
|
|
|
role="bold">accounting</emphasis> chain is assumed when the file is
|
|
|
|
un-sectioned. When the file is sectioned, the default is one of
|
|
|
|
accountin, accountout, etc. depending on the section. This is the
|
2006-11-22 19:16:45 +01:00
|
|
|
chain where the accounting rule is added. The
|
|
|
|
<emphasis>chain</emphasis> will be created if it doesn't already
|
2011-01-31 16:07:10 +01:00
|
|
|
exist. The <emphasis>chain</emphasis> may not exceed 29 characters
|
|
|
|
in length.</para>
|
2006-11-16 01:16:15 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2008-07-10 15:33:54 +02:00
|
|
|
<term><emphasis role="bold">SOURCE</emphasis> - {<emphasis
|
2006-11-22 19:16:45 +01:00
|
|
|
role="bold">-</emphasis>|<emphasis
|
|
|
|
role="bold">any</emphasis>|<emphasis
|
2006-11-25 19:06:11 +01:00
|
|
|
role="bold">all</emphasis>|<emphasis>interface</emphasis>|<emphasis>interface</emphasis><emphasis
|
2006-11-22 19:16:45 +01:00
|
|
|
role="bold">:</emphasis><emphasis>address</emphasis>|<emphasis>address</emphasis>}</term>
|
2006-11-16 01:16:15 +01:00
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Packet Source.</para>
|
|
|
|
|
2007-01-16 22:22:28 +01:00
|
|
|
<para>The name of an <replaceable>interface</replaceable>, an
|
|
|
|
<replaceable>address</replaceable> (host or net) or an
|
|
|
|
<replaceable>interface</replaceable> name followed by ":" and a host
|
2013-02-03 17:00:24 +01:00
|
|
|
or net <replaceable>address</replaceable>. An ipset name is also
|
|
|
|
accepted as an <replaceable>address</replaceable>.</para>
|
2006-11-16 01:16:15 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2015-12-04 23:53:26 +01:00
|
|
|
<term><emphasis role="bold">DEST</emphasis> - {<emphasis
|
2006-11-22 19:16:45 +01:00
|
|
|
role="bold">-</emphasis>|<emphasis
|
|
|
|
role="bold">any</emphasis>|<emphasis
|
|
|
|
role="bold">all</emphasis>|<emphasis>interface</emphasis>|<emphasis>interface</emphasis><emphasis
|
|
|
|
role="bold">:</emphasis><emphasis>address</emphasis>|<emphasis>address</emphasis>}</term>
|
2006-11-16 01:16:15 +01:00
|
|
|
|
|
|
|
<listitem>
|
2015-12-04 23:53:26 +01:00
|
|
|
<para>This column was formerly named DESTINATION.</para>
|
|
|
|
|
2006-11-16 01:16:15 +01:00
|
|
|
<para>Packet Destination.</para>
|
|
|
|
|
|
|
|
<para>Format same as <emphasis role="bold">SOURCE</emphasis>
|
|
|
|
column.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2015-12-04 23:53:26 +01:00
|
|
|
<term><emphasis role="bold">PROTO</emphasis> - {<emphasis
|
2006-11-22 19:16:45 +01:00
|
|
|
role="bold">-</emphasis>|<emphasis
|
2013-01-08 01:06:54 +01:00
|
|
|
role="bold">{any</emphasis>|<emphasis
|
2006-11-22 19:16:45 +01:00
|
|
|
role="bold">all</emphasis>|<emphasis>protocol-name</emphasis>|<emphasis>protocol-number</emphasis>|<emphasis
|
|
|
|
role="bold">ipp2p</emphasis>[<emphasis
|
|
|
|
role="bold">:</emphasis>{<emphasis
|
|
|
|
role="bold">udp</emphasis>|<emphasis
|
2013-01-08 01:06:54 +01:00
|
|
|
role="bold">all</emphasis>}]}[,...]}</term>
|
2006-11-16 01:16:15 +01:00
|
|
|
|
|
|
|
<listitem>
|
2015-12-04 23:53:26 +01:00
|
|
|
<para>This column was formerly named PROTOCOL</para>
|
|
|
|
|
2006-11-22 19:16:45 +01:00
|
|
|
<para>A <emphasis>protocol-name</emphasis> (from protocols(5)), a
|
|
|
|
<emphasis>protocol-number</emphasis>, <emphasis
|
|
|
|
role="bold">ipp2p</emphasis>, <emphasis
|
2006-11-16 01:16:15 +01:00
|
|
|
role="bold">ipp2p:udp</emphasis> or <emphasis
|
|
|
|
role="bold">ipp2p:all</emphasis></para>
|
2013-01-08 01:06:54 +01:00
|
|
|
|
|
|
|
<para>Beginning with Shorewall 4.5.12, this column can accept a
|
|
|
|
comma-separated list of protocols.</para>
|
2006-11-16 01:16:15 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2015-12-04 23:53:26 +01:00
|
|
|
<term><emphasis role="bold">DPORT</emphasis> - {<emphasis
|
|
|
|
role="bold">-</emphasis>|<emphasis
|
2006-11-22 19:16:45 +01:00
|
|
|
role="bold">any</emphasis>|<emphasis
|
|
|
|
role="bold">all</emphasis>|<emphasis>ipp2p-option</emphasis>|<emphasis>port-name-or-number</emphasis>[,<emphasis>port-name-or-number</emphasis>]...}</term>
|
2006-11-16 01:16:15 +01:00
|
|
|
|
|
|
|
<listitem>
|
2007-01-16 22:22:28 +01:00
|
|
|
<para>Destination Port number. Service name from services(5) or
|
|
|
|
<emphasis>port number</emphasis>. May only be specified if the
|
2010-03-16 17:42:50 +01:00
|
|
|
protocol is TCP (6), UDP (17), DCCP (33), SCTP (132) or UDPLITE
|
|
|
|
(136).</para>
|
2006-11-16 01:16:15 +01:00
|
|
|
|
2006-11-22 19:16:45 +01:00
|
|
|
<para>You may place a comma-separated list of port names or numbers
|
2013-05-03 18:19:45 +02:00
|
|
|
in this column if your kernel and iptables include multi-port match
|
2006-11-16 01:16:15 +01:00
|
|
|
support.</para>
|
2007-01-16 22:22:28 +01:00
|
|
|
|
|
|
|
<para>If the PROTOCOL is <emphasis role="bold">ipp2p</emphasis> then
|
|
|
|
this column must contain an <emphasis>ipp2p-option</emphasis>
|
|
|
|
("iptables -m ipp2p --help") without the leading "--". If no option
|
|
|
|
is given in this column, <emphasis role="bold">ipp2p</emphasis> is
|
|
|
|
assumed.</para>
|
2015-12-04 23:53:26 +01:00
|
|
|
|
|
|
|
<para>This column was formerly named DEST PORT(S).</para>
|
2006-11-16 01:16:15 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2015-12-04 23:53:26 +01:00
|
|
|
<term><emphasis role="bold">SPORT</emphasis> - {<emphasis
|
|
|
|
role="bold">-</emphasis>|<emphasis
|
2006-11-22 19:16:45 +01:00
|
|
|
role="bold">any</emphasis>|<emphasis
|
|
|
|
role="bold">all</emphasis>|<emphasis>port-name-or-number</emphasis>[,<emphasis>port-name-or-number</emphasis>]...}</term>
|
2006-11-16 01:16:15 +01:00
|
|
|
|
|
|
|
<listitem>
|
2007-01-16 22:22:28 +01:00
|
|
|
<para>Service name from services(5) or <emphasis>port
|
2010-03-16 17:42:50 +01:00
|
|
|
number</emphasis>. May only be specified if the protocol is TCP (6),
|
|
|
|
UDP (17), DCCP (33), SCTP (132) or UDPLITE (136).</para>
|
2006-11-16 01:16:15 +01:00
|
|
|
|
|
|
|
<para>You may place a comma-separated list of port numbers in this
|
2013-05-03 18:19:45 +02:00
|
|
|
column if your kernel and iptables include multi-port match
|
2006-11-16 01:16:15 +01:00
|
|
|
support.</para>
|
2013-03-04 18:56:10 +01:00
|
|
|
|
|
|
|
<para>Beginning with Shorewall 4.5.15, you may place '=' in this
|
|
|
|
column, provided that the DEST PORT(S) column is non-empty. This
|
|
|
|
causes the rule to match when either the source port or the
|
|
|
|
destination port in a packet matches one of the ports specified in
|
2015-12-04 23:53:26 +01:00
|
|
|
DPORT. Use of '=' requires multi-port match in your iptables and
|
|
|
|
kernel.</para>
|
|
|
|
|
|
|
|
<para>This column was formerly labelled SOURCE PORT(S).</para>
|
2006-11-16 01:16:15 +01:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2015-12-04 23:53:26 +01:00
|
|
|
<term><emphasis role="bold">USER</emphasis> - [<emphasis
|
2006-11-22 19:16:45 +01:00
|
|
|
role="bold">!</emphasis>][<emphasis>user-name-or-number</emphasis>][<emphasis
|
|
|
|
role="bold">:</emphasis><emphasis>group-name-or-number</emphasis>][<emphasis
|
|
|
|
role="bold">+</emphasis><emphasis>program-name</emphasis>]</term>
|
2006-11-16 01:16:15 +01:00
|
|
|
|
|
|
|
<listitem>
|
2015-12-04 23:53:26 +01:00
|
|
|
<para>This column was formerly named USER/GROUP and may only be
|
|
|
|
non-empty if the <emphasis role="bold">CHAIN</emphasis> is <emphasis
|
2006-11-25 19:06:11 +01:00
|
|
|
role="bold">OUTPUT</emphasis>.</para>
|
2006-11-16 01:16:15 +01:00
|
|
|
|
|
|
|
<para>When this column is non-empty, the rule applies only if the
|
|
|
|
program generating the output is running under the effective
|
|
|
|
<emphasis>user</emphasis> and/or <emphasis>group</emphasis>
|
|
|
|
specified (or is NOT running under that id if "!" is given).</para>
|
|
|
|
|
|
|
|
<para>Examples:</para>
|
|
|
|
|
|
|
|
<variablelist>
|
|
|
|
<varlistentry>
|
|
|
|
<term>joe</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>program must be run by joe</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>:kids</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>program must be run by a member of the 'kids'
|
|
|
|
group</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>!:kids</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>program must not be run by a member of the 'kids'
|
|
|
|
group</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term>+upnpd</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>#program named upnpd</para>
|
|
|
|
|
|
|
|
<important>
|
|
|
|
<para>The ability to specify a program name was removed from
|
|
|
|
Netfilter in kernel version 2.6.14.</para>
|
|
|
|
</important>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
</variablelist>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2007-05-08 21:05:25 +02:00
|
|
|
|
|
|
|
<varlistentry>
|
2008-07-10 15:33:54 +02:00
|
|
|
<term><emphasis role="bold">MARK</emphasis> - [<emphasis
|
2007-05-08 21:05:25 +02:00
|
|
|
role="bold">!</emphasis>]<emphasis>value</emphasis>[/<emphasis>mask</emphasis>][<emphasis
|
|
|
|
role="bold">:C</emphasis>]</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Defines a test on the existing packet or connection mark. The
|
|
|
|
rule will match only if the test returns true.</para>
|
|
|
|
|
|
|
|
<para>If you don't want to define a test but need to specify
|
|
|
|
anything in the following columns, place a "-" in this field.</para>
|
|
|
|
|
|
|
|
<variablelist>
|
|
|
|
<varlistentry>
|
|
|
|
<term>!</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Inverts the test (not equal)</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis>value</emphasis></term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Value of the packet or connection mark.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis>mask</emphasis></term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>A mask to be applied to the mark before testing.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis role="bold">:C</emphasis></term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Designates a connection mark. If omitted, the packet
|
2009-07-16 02:50:55 +02:00
|
|
|
mark's value is tested.</para>
|
2007-05-08 21:05:25 +02:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
</variablelist>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2010-08-20 15:53:31 +02:00
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis role="bold">IPSEC - <emphasis>option-list</emphasis>
|
2012-05-30 23:37:29 +02:00
|
|
|
(Optional - Added in Shorewall 4.4.13 but broken until 4.5.4.1
|
|
|
|
)</emphasis></term>
|
2010-08-20 15:53:31 +02:00
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>The option-list consists of a comma-separated list of options
|
|
|
|
from the following list. Only packets that will be encrypted or have
|
2013-05-03 18:19:45 +02:00
|
|
|
been decrypted via an SA that matches these options will have their
|
2010-08-20 15:53:31 +02:00
|
|
|
source address changed.</para>
|
|
|
|
|
|
|
|
<variablelist>
|
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis
|
|
|
|
role="bold">reqid=</emphasis><emphasis>number</emphasis></term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>where <emphasis>number</emphasis> is specified using
|
|
|
|
setkey(8) using the 'unique:<emphasis>number</emphasis> option
|
|
|
|
for the SPD level.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis role="bold">spi=</emphasis><number></term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>where <emphasis>number</emphasis> is the SPI of the SA
|
|
|
|
used to encrypt/decrypt packets.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis role="bold">proto=</emphasis><emphasis
|
|
|
|
role="bold">ah</emphasis>|<emphasis
|
|
|
|
role="bold">esp</emphasis>|<emphasis
|
|
|
|
role="bold">ipcomp</emphasis></term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>IPSEC Encapsulation Protocol</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis
|
|
|
|
role="bold">mss=</emphasis><emphasis>number</emphasis></term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>sets the MSS field in TCP packets</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis role="bold">mode=</emphasis><emphasis
|
|
|
|
role="bold">transport</emphasis>|<emphasis
|
|
|
|
role="bold">tunnel</emphasis></term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>IPSEC mode</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis
|
|
|
|
role="bold">tunnel-src=</emphasis><emphasis>address</emphasis>[/<emphasis>mask</emphasis>]</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>only available with mode=tunnel</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis
|
|
|
|
role="bold">tunnel-dst=</emphasis><emphasis>address</emphasis>[/<emphasis>mask</emphasis>]</term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>only available with mode=tunnel</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis role="bold">strict</emphasis></term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Means that packets must match all rules.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis role="bold">next</emphasis></term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>Separates rules; can only be used with strict</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis role="bold">yes</emphasis> or <emphasis
|
|
|
|
role="bold">ipsec</emphasis></term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>When used by itself, causes all traffic that will be
|
2013-07-22 16:54:45 +02:00
|
|
|
encrypted/encapsulated or has been decrypted/un-encapsulated
|
|
|
|
to match the rule.</para>
|
2010-08-20 15:53:31 +02:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis role="bold">no</emphasis> or <emphasis
|
|
|
|
role="bold">none</emphasis></term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>When used by itself, causes all traffic that will not be
|
2013-07-22 16:54:45 +02:00
|
|
|
encrypted/encapsulated or has been decrypted/un-encapsulated
|
|
|
|
to match the rule.</para>
|
2010-08-20 15:53:31 +02:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2012-05-30 23:37:29 +02:00
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis role="bold">in</emphasis></term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>May only be used in the FORWARD section and must be the
|
|
|
|
first or the only item the list. Indicates that matching
|
|
|
|
packets have been decrypted in input.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><emphasis role="bold">out</emphasis></term>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>May only be used in the FORWARD section and must be the
|
|
|
|
first or the only item in the list. Indicates that matching
|
|
|
|
packets will be encrypted on output.</para>
|
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2010-08-20 15:53:31 +02:00
|
|
|
</variablelist>
|
|
|
|
|
2012-05-30 23:37:29 +02:00
|
|
|
<para>If this column is non-empty and sections are not used,
|
|
|
|
then:</para>
|
2010-08-20 15:53:31 +02:00
|
|
|
|
|
|
|
<itemizedlist>
|
|
|
|
<listitem>
|
2012-05-30 23:09:41 +02:00
|
|
|
<para>A chain NAME appearing in the ACTION column must be a
|
2010-08-23 01:40:04 +02:00
|
|
|
chain branched either directly or indirectly from the <emphasis
|
2012-05-30 23:09:41 +02:00
|
|
|
role="bold">accipsecin</emphasis> or <emphasis
|
|
|
|
role="bold">accipsecout</emphasis> chain.</para>
|
2010-08-20 15:53:31 +02:00
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>The CHAIN column must contain either <emphasis
|
2012-05-30 23:09:41 +02:00
|
|
|
role="bold">accipsecin</emphasis> or <emphasis
|
|
|
|
role="bold">accipsecout</emphasis> or a chain branched either
|
2010-08-23 01:40:04 +02:00
|
|
|
directly or indirectly from those chains.</para>
|
2010-08-20 15:53:31 +02:00
|
|
|
</listitem>
|
|
|
|
|
2012-05-30 23:37:29 +02:00
|
|
|
<listitem>
|
|
|
|
<para>These rules will NOT appear in the <emphasis
|
|
|
|
role="bold">accounting</emphasis> chain.</para>
|
|
|
|
</listitem>
|
|
|
|
</itemizedlist>
|
2010-08-20 15:53:31 +02:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
2006-11-16 01:16:15 +01:00
|
|
|
</variablelist>
|
|
|
|
|
|
|
|
<para>In all of the above columns except <emphasis
|
|
|
|
role="bold">ACTION</emphasis> and <emphasis role="bold">CHAIN</emphasis>,
|
|
|
|
the values <emphasis role="bold">-</emphasis>, <emphasis
|
|
|
|
role="bold">any</emphasis> and <emphasis role="bold">all</emphasis> may be
|
2013-05-03 18:19:45 +02:00
|
|
|
used as wildcard'gs. Omitted trailing columns are also treated as
|
|
|
|
wildcard'g.</para>
|
2006-11-16 01:16:15 +01:00
|
|
|
</refsect1>
|
|
|
|
|
|
|
|
<refsect1>
|
|
|
|
<title>FILES</title>
|
|
|
|
|
|
|
|
<para>/etc/shorewall/accounting</para>
|
2017-06-17 00:01:41 +02:00
|
|
|
|
|
|
|
<para>/etc/shorewall6/accounting</para>
|
2006-11-16 01:16:15 +01:00
|
|
|
</refsect1>
|
|
|
|
|
|
|
|
<refsect1>
|
|
|
|
<title>See ALSO</title>
|
|
|
|
|
2006-11-22 04:51:39 +01:00
|
|
|
<para><ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/Accounting.html">http://www.shorewall.net/Accounting.html
|
2006-11-22 04:51:39 +01:00
|
|
|
</ulink></para>
|
|
|
|
|
2011-05-17 22:42:13 +02:00
|
|
|
<para><ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/shorewall_logging.html">http://www.shorewall.net/shorewall_logging.html</ulink></para>
|
2011-05-17 22:42:13 +02:00
|
|
|
|
2011-09-26 19:16:52 +02:00
|
|
|
<para><ulink
|
2014-01-12 22:40:03 +01:00
|
|
|
url="/configuration_file_basics.htm#Pairs">http://www.shorewall.net/configuration_file_basics.htm#Pairs</ulink></para>
|
2011-09-26 19:16:52 +02:00
|
|
|
|
2006-11-16 01:16:15 +01:00
|
|
|
<para>shorewall(8), shorewall-actions(5), shorewall-blacklist(5),
|
2011-01-26 18:08:48 +01:00
|
|
|
shorewall-hosts(5), shorewall_interfaces(5), shorewall-ipsets(5),
|
|
|
|
shorewall-maclist(5), shorewall-masq(5), shorewall-nat(5),
|
|
|
|
shorewall-netmap(5), shorewall-params(5), shorewall-policy(5),
|
2012-01-09 16:19:10 +01:00
|
|
|
shorewall-providers(5), shorewall-proxyarp(5), shorewall-rtrules(5),
|
2010-09-15 18:49:37 +02:00
|
|
|
shorewall-routestopped(5), shorewall-rules(5), shorewall.conf(5),
|
|
|
|
shorewall-secmarks(5), shorewall-tcclasses(5), shorewall-tcdevices(5),
|
2013-12-29 00:35:08 +01:00
|
|
|
shorewall-mangle(5), shorewall-tos(5), shorewall-tunnels(5),
|
2010-09-15 18:49:37 +02:00
|
|
|
shorewall-zones(5)</para>
|
2006-11-16 01:16:15 +01:00
|
|
|
</refsect1>
|
2008-07-04 16:16:40 +02:00
|
|
|
</refentry>
|