diff --git a/docs/IPP2P.xml b/docs/IPP2P.xml index dd4c243ae..db4be5e45 100644 --- a/docs/IPP2P.xml +++ b/docs/IPP2P.xml @@ -50,11 +50,11 @@ Shorewall versions 2.2.0 and later include support for the ipp2p match facility. This is a departure from my usual policy in that the ipp2p - match facility is included in Patch-O-Matic-ENG and is unlikely to ever be - included in the kernel.org source tree. Questions about how to install the - patch or how to build your kernel and/or iptables should not be posted on - the Shorewall mailing lists but should rather be referred to the Netfilter - Mailing List. + match facility is included in xtables-addons and is unlikely to ever be + included in the kernel.org source tree. Questions about how to install + xtables-addons or how to build your kernel and/or iptables should not be + posted on the Shorewall mailing lists but should rather be referred to the + Netfilter Mailing List.
@@ -71,15 +71,16 @@ url="Accounting.html">/etc/shorewall/accounting /etc/shorewall/rules (Recommend - that you place the rules in the ESTABLISHED section of that - file). + url="Shorewall_and_Routing.html">/etc/shorewall/rules (Note + Recommend. But if you insist, then you should place the rules in the + ESTABLISHED section of that file). When the PROTO or PROTOCOL column contains "ipp2p" then the DEST PORT(S) or PORT(S) column may contain a recognized ipp2p option - (Shorewall-perl 4.2.5 and later accepts a list of options); for a list of - the options and their meaning, at a root prompt type: + (Shorewall-perl 4.2.5 and later accepts a comma-separated list of + options); for a list of the options and their meaning, at a root prompt + type: iptables -m ipp2p --help @@ -90,8 +91,8 @@ Shorewall-shell and Shorewall-perl up through 4.2.4 will assume - "ipp2p". Note that the xtables version of IPP2P no longer supports - that option. + "ipp2p". Note that the xtables-addons version of IPP2P no longer + supports that option. @@ -190,25 +191,7 @@ tcp 6 269712 ESTABLISHED src=192.168.3.8 dst=206.124.146.177 sport=50584 dp Rule 05# classifies the packet to traffic shaping class 1:12 if - it is going out of eth0 and has mark value 1 - There are two ways that Netfilter/iptables can classify - traffic. It can be classified directly (which is what this example - does) by specifying a classid of the form - <number>:<number> in the MARK column. That is the - preferred method. A classid is specified when a traffic shaping - class is defined. tc4shorewall assigns a classid of <device - number>:1<mark value>. The first device in - /etc/shorewall/tcdevices is device number 1, - the second is device number 2, and so on. For the first device, - mark value 1 is classid 1:11, mark value 22 is classid 1:122, - etc.. They may also be classified using an fwmark - classifier which causes the traffic shaping code to - classify the traffic based in the packet mark value. That is done - by the traffic shaping solution using the tc filter - add command. The built-in tc4shorewall shaper uses this - command so if you are using the built-in traffic shaping solution, - you may use either method. - . + it is going out of eth0 and has mark value 1.