diff --git a/docs/6to4.xml b/docs/6to4.xml index 94a692e58..2089b6f0e 100644 --- a/docs/6to4.xml +++ b/docs/6to4.xml @@ -493,7 +493,6 @@ all all REJECT info ?SECTION INVALID ?SECTION UNTRACKED ?SECTION NEW -# PORT PORT(S) DEST LIMIT GROUP # # Accept DNS connections from the firewall to the network # diff --git a/docs/FTP.xml b/docs/FTP.xml index 8cd8ae9b9..d32f91922 100644 --- a/docs/FTP.xml +++ b/docs/FTP.xml @@ -535,10 +535,10 @@ DNAT ACTION = specific IP address to be forwarded to your server. Note that you do NOT need a rule - with 20 (ftp-data) in the DEST PORT(S) column. If you post your rules on - the mailing list and they show 20 in the DEST PORT(S) column, we will know - that you haven't read this article and will either ignore your post or - tell you to RTFM. + with 20 (ftp-data) in the DPORT column. If you post your rules on the + mailing list and they show 20 in the DPORT column, we will know that you + haven't read this article and will either ignore your post or tell you to + RTFM. Shorewall includes an FTP macro that simplifies creation of FTP rules. The macro source is in diff --git a/docs/ManualChains.xml b/docs/ManualChains.xml index 087322e5f..d914d52d3 100644 --- a/docs/ManualChains.xml +++ b/docs/ManualChains.xml @@ -195,16 +195,14 @@ sub Knock { The rule from the Port Knocking article: - #ACTION SOURCE DEST PROTO DEST PORT(S) + #ACTION SOURCE DEST PROTO DPORT SSHKnock net $FW tcp 22,1599,1600,1601 - becomes:PERL Knock 'net', '$FW', {target => 22, knocker => 1600, trap => [1599, 1601]};Similarly#ACTION SOURCE DEST PROTO DEST PORT(S) SOURCE ORIGINAL -# PORT(S) DEST + becomes:PERL Knock 'net', '$FW', {target => 22, knocker => 1600, trap => [1599, 1601]};Similarly#ACTION SOURCE DEST PROTO DPORT SPORT ORIGDEST DNAT- net 192.168.1.5 tcp 22 - 206.124.146.178 SSHKnock net $FW tcp 1599,1600,1601 -SSHKnock net loc:192.168.1.5 tcp 22 - 206.124.146.178becomes:#ACTION SOURCE DEST PROTO DEST PORT(S) SOURCE ORIGINAL -# PORT(S) DEST +SSHKnock net loc:192.168.1.5 tcp 22 - 206.124.146.178becomes:#ACTION SOURCE DEST PROTO DPORT SPORT ORIGDEST DNAT- net 192.168.1.5 tcp 22 - 206.124.146.178 PERL Knock 'net', '$FW', {name => 'SSH', knocker => 1600, trap => [1599, 1601]}; diff --git a/docs/MyNetwork.xml b/docs/MyNetwork.xml index be2007a39..596a5518c 100644 --- a/docs/MyNetwork.xml +++ b/docs/MyNetwork.xml @@ -494,8 +494,7 @@ tarpit inline # Wrapper for TARPIT
/etc/shorewall/action.Mirrors - #TARGET SOURCE DEST PROTO DEST SOURCE ORIGINAL RATE -# PORT PORT(S) DEST LIMIT + #TARGET SOURCE DEST PROTO DPORT SPORT ORIGDEST RATE ?COMMENT Accept traffic from Mirrors ?FORMAT 2 DEFAULTS - @@ -508,8 +507,7 @@ $1 $MIRRORS
/etc/shorewall/action.tarpit - #ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL RATE USER/ MARK CONNLIMIT TIME HEADERS SWITCH HELPER -# PORT PORT(S) DEST LIMIT GROUP + #ACTION SOURCE DEST PROTO DPORT SPORT ORIGDEST RATE USER MARK CONNLIMIT TIME HEADERS SWITCH HELPER $LOG { rate=s:1/min } TARPIT @@ -520,7 +518,8 @@ TARPIT
/etc/shorewall/zones - fw firewall + #ZONE TYPE +fw firewall loc ip #Local Zone net ipv4 #Internet dmz ipv4 #LXC Containers @@ -816,8 +815,7 @@ br0 - ComcastB 11000
/etc/shorewall/stoppedrules - #TARGET HOST(S) DEST PROTO DEST SOURCE -# PORT(S) PORT(S) + #TARGET HOST(S) DEST PROTO DPORT SPORT ACCEPT INT_IF:172.20.1.0/24 $FW NOTRACK COMB_IF - 41 NOTRACK $FW COMB_IF 41 diff --git a/docs/PacketMarking.xml b/docs/PacketMarking.xml index ead31475b..95d987833 100644 --- a/docs/PacketMarking.xml +++ b/docs/PacketMarking.xml @@ -178,8 +178,8 @@ tcp 6 19 TIME_WAIT src=206.124.146.176 dst=192.136.34.98 sport=58597 dport= Rules are conditionally executed based on whether the current - packet matches the contents of the SOURCE, DEST, PROTO, PORT(S), - CLIENT PORT(S_, USER, TEST, LENGTH and TOS columns. + packet matches the contents of the SOURCE, DEST, PROTO, DPORT, SPORT, + USER, TEST, LENGTH and TOS columns. diff --git a/docs/Shorewall-5.xml b/docs/Shorewall-5.xml index 5b27dc171..0af75100c 100644 --- a/docs/Shorewall-5.xml +++ b/docs/Shorewall-5.xml @@ -240,15 +240,15 @@ - DEST PORT(S) + DPORT - SOURCE PORT(S) + SPORT - ORIGINAL DEST + ORIGDEST @@ -284,8 +284,9 @@ - Notice that the first five columns of both sets are the - same. + Notice that the first five columns of both sets are the same + (although the port-valued column names have changed, the contents are + the same). In Shorewall 5, support for format-1 macros and actions has been dropped and all macros and actions will be processed as if ?FORMAT 2 diff --git a/docs/Shorewall_Squid_Usage.xml b/docs/Shorewall_Squid_Usage.xml index 301e75aa6..7de871243 100644 --- a/docs/Shorewall_Squid_Usage.xml +++ b/docs/Shorewall_Squid_Usage.xml @@ -314,8 +314,7 @@ MARK(202):P eth1 0.0.0.0/0 tcp 80 Corresponding /etc/shorewall/tcrules entries are: - #MARK SOURCE DEST PROTO DEST -# PORT(S) + #MARK SOURCE DEST PROTO DPORT 202:P eth1 0.0.0.0/0 tcp 80 diff --git a/docs/Shorewall_and_Aliased_Interfaces.xml b/docs/Shorewall_and_Aliased_Interfaces.xml index 92acab9bb..5d063596b 100644 --- a/docs/Shorewall_and_Aliased_Interfaces.xml +++ b/docs/Shorewall_and_Aliased_Interfaces.xml @@ -166,7 +166,7 @@ iface eth0 inet static allow SSH from net to eth0:0 above - /etc/shorewall/rules#ACTION SOURCE DEST PROTO DEST PORT(S) + /etc/shorewall/rules#ACTION SOURCE DEST PROTO DPORT ACCEPT net $FW:206.124.146.178 tcp 22
diff --git a/docs/XenMyWay-Routed.xml b/docs/XenMyWay-Routed.xml index 9dd672580..44ce5330e 100644 --- a/docs/XenMyWay-Routed.xml +++ b/docs/XenMyWay-Routed.xml @@ -637,8 +637,7 @@ Mirrors # Accept traffic from Shorewall Mirrors
/etc/shorewall/action.Mirrors: - #TARGET SOURCE DEST PROTO DEST SOURCE ORIGINAL RATE -# PORT PORT(S) DEST LIMIT + #TARGET SOURCE DEST PROTO DPORT SPORT ORIGDEST RATE ACCEPT $MIRRORS /etc/shorewall/rules: diff --git a/docs/XenMyWay.xml b/docs/XenMyWay.xml index f704f00dd..428b240d0 100644 --- a/docs/XenMyWay.xml +++ b/docs/XenMyWay.xml @@ -631,10 +631,9 @@ ACCEPT $MIRRORS /etc/shorewall/rules: - SECTION NEW + ?SECTION NEW ############################################################################################################################################################################### -#ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL RATE USER/ -# PORT PORT(S) DEST LIMIT GROUP +#ACTION SOURCE DEST PROTO DPORT SPORT ORIGDEST RATE USER ############################################################################################################################################################################### REJECT:$LOG loc net tcp 25 REJECT:$LOG loc net udp 1025:1031 diff --git a/docs/bridge-Shorewall-perl.xml b/docs/bridge-Shorewall-perl.xml index fc2440045..903ea0174 100644 --- a/docs/bridge-Shorewall-perl.xml +++ b/docs/bridge-Shorewall-perl.xml @@ -941,15 +941,13 @@ ACCEPT col zone2 tcp 22 - - - or more compactly: - #ACTION SOURCE DEST PROTO DEST -# PORT(S) + #ACTION SOURCE DEST PROTO DPORT ACCEPT col zone2 tcp 22 ; mark=net Similarly, rules allowing traffic from the firewall to zone3: - #ACTION SOURCE DEST PROTO DEST -# PORT(S) + #ACTION SOURCE DEST PROTO DPORT ACCEPT col zone3 tcp 22 ; mark=fw diff --git a/docs/configuration_file_basics.xml b/docs/configuration_file_basics.xml index d58f93895..e130233a9 100644 --- a/docs/configuration_file_basics.xml +++ b/docs/configuration_file_basics.xml @@ -2313,8 +2313,7 @@ gmail-pop.l.google.com. 300 IN A 209.85.2 So this rule may work for five minutes then suddently stop working: - #ACTION SOURCE DEST PROTO DEST -# PORT(S) + #ACTION SOURCE DEST PROTO DPORT POP(ACCEPT) loc net:pop.gmail.com If your firewall rules include DNS names then: diff --git a/docs/netmap.xml b/docs/netmap.xml index 3b1dea834..b5efdd8e6 100644 --- a/docs/netmap.xml +++ b/docs/netmap.xml @@ -54,7 +54,7 @@ Shorewall NETMAP support is designed to supply a solution. The basic situation is as shown in the following diagram. + fileref="images/netmap.png"/>
While the link between the two firewalls is shown here as a VPN, it could be any type of interconnection that allows routing of - DEST PORT(S) (Optional - Added in - Shorewall 4.4.23.2) - + DPORT (Optional - Added in Shorewall + 4.4.23.2) - port-number-or-name-list @@ -190,8 +190,8 @@ - DEST PORT(S) (Optional - Added in - Shorewall 4.4.23.2) - + SPORT (Optional - Added in Shorewall + 4.4.23.2) - port-number-or-name-list @@ -314,7 +314,7 @@ SNAT 192.168.1.0/24 vpn 10.10.10.0/24 #RULE 2B192.168.1.27 - + @@ -350,7 +350,7 @@ SNAT 192.168.1.0/24 vpn 10.10.10.0/24 #RULE 2B192.168.1.4 - + @@ -413,7 +413,7 @@ DNAT:T 10.10.10.0/24 vpn 192.168.1.0/24
IPv6 Netmap has been verified at shorewall.net using the configuration shown below.
- + IPv6 support is supplied from Hurricane Electric; the IPv6 address block is 2001:470:b:227::/64. diff --git a/docs/ping.xml b/docs/ping.xml index a5c381987..9ab8d5cfb 100644 --- a/docs/ping.xml +++ b/docs/ping.xml @@ -79,7 +79,7 @@ Ping(ACCEPT) loc $FW With that rule in place, if you want to ignore ping from z1 to z2 then you need a rule of the form: - #ACTION SOURCE DEST PROTO DEST PORT(S) + #ACTION SOURCE DEST PROTO DPORT Ping(DROP) z1 z2 @@ -88,7 +88,7 @@ Ping(DROP) z1 z2 To drop ping from the Internet, you would need this rule in /etc/shorewall/rules: - #ACTION SOURCE DEST PROTO DEST PORT(S) + #ACTION SOURCE DEST PROTO DPORT Ping(DROP) net $FW diff --git a/docs/shorewall_setup_guide.xml b/docs/shorewall_setup_guide.xml index 9b9e4c1af..ebc68cac0 100644 --- a/docs/shorewall_setup_guide.xml +++ b/docs/shorewall_setup_guide.xml @@ -1712,8 +1712,8 @@ ACCEPT net loc:192.168.201.4 tcp www rules. - Since the SOURCE PORT(S) and ORIG. DEST. Columns aren't used in - this section, they won't be shown + Since the SPORT and ORIGDEST. Columns aren't used in this + section, they won't be shown You probably want to allow ping between your zones: diff --git a/docs/simple_traffic_shaping.xml b/docs/simple_traffic_shaping.xml index f99814983..81e187999 100644 --- a/docs/simple_traffic_shaping.xml +++ b/docs/simple_traffic_shaping.xml @@ -194,7 +194,7 @@ eth0 External band 2. - When an INTERFACE is specified, the PROTO, PORT(S) and ADDRESS + When an INTERFACE is specified, the PROTO, DPORT and ADDRESS column must contain '-'. @@ -203,14 +203,14 @@ eth0 External Assign traffic from a particular IP address to a specific priority band: - #BAND PROTO PORT(S) ADDRESS INTERFACE HELPER + #BAND PROTO DPORT ADDRESS INTERFACE HELPER 1 - - 192.168.1.44 In this example, traffic from 192.168.1.44 will be assigned to priority band 1. - When an ADDRESS is specified, the PROTO, PORT(S) and INTERFACE + When an ADDRESS is specified, the PROTO, DPORT and INTERFACE columns must be empty. @@ -219,7 +219,7 @@ eth0 External Assign traffic to/from a particular application to a specific priority band: - #BAND PROTO PORT(S) ADDRESS INTERFACE HELPER + #BAND PROTO DPORT ADDRESS INTERFACE HELPER 1 udp 1194 In that example, OpenVPN traffic is assigned to priority band @@ -230,7 +230,7 @@ eth0 External Assign traffic that uses a particular Netfilter helper to a particular priority band: - #BAND PROTO PORT(S) ADDRESS INTERFACE HELPER + #BAND PROTO DPORT ADDRESS INTERFACE HELPER 1 - - - - sip In this example, SIP and associated RTP traffic will be assigned @@ -322,7 +322,7 @@ tun0 Internal eth0 External 50mbit:200kb 6.0mbit:100kb:200ms:100mbit:1516 etc/shorewall/tcpri: - #BAND PROTO PORT(S) ADDRESS INTERFACE HELPER + #BAND PROTO DPORT ADDRESS INTERFACE HELPER COMMENT All DMZ traffic in band 3 by default 3 - - 70.90.191.124/31 COMMENT Bit Torrent is in band 3 @@ -335,7 +335,7 @@ COMMENT And place echo requests in band 1 to avoid false line-down reports etc/shorewall6/tcpri: - #BAND PROTO PORT(S) ADDRESS INTERFACE HELPER + #BAND PROTO DPORT ADDRESS INTERFACE HELPER COMMENT All DMZ traffic in band 3 by default 3 - - 2001:470:b:227::40/124 COMMENT But give a boost to DNS queries