diff --git a/Shorewall-docs/whitelisting_under_shorewall.xml b/Shorewall-docs/whitelisting_under_shorewall.xml index 4b042778e..737718047 100644 --- a/Shorewall-docs/whitelisting_under_shorewall.xml +++ b/Shorewall-docs/whitelisting_under_shorewall.xml @@ -63,8 +63,8 @@ The basic approach will be that we will place the operations staff's class C in its own zone called ops. Here are the appropriate configuration files: -
- Zone File + + Zone File @@ -111,10 +111,10 @@ file -- since ops is a sub-zone of loc, we list it BEFORE loc. -
+ -
- Interfaces File + + Interfaces File @@ -164,10 +164,10 @@ Because eth2 interfaces to two zones (ops and loc), we don't specify a zone for it here. -
+ -
- Hosts File + + Hosts File @@ -202,10 +202,10 @@ Here we define the ops and loc zones. When Shorewall is stopped, only the hosts in the ops zone will be allowed to access the firewall and the DMZ. I use 0.0.0.0/0 to define the loc zone rather than 10.10.0.0/16 so that the limited broadcast address (255.255.255.255) falls into that zone. If I used 10.10.0.0/16 then I would have to have a separate entry for that special address. -
+ -
- Policy File + + Policy File @@ -309,10 +309,10 @@ Two entries for ops (in bold) have been added to the standard 3-zone policy file. -
+ -
- Rules File + + Rules File @@ -363,10 +363,10 @@ This is the rule that transparently redirects web traffic to the transparent proxy running on the firewall. The SOURCE column explicitly excludes the ops zone from the rule. -
+ -
- Routestopped File + + Routestopped File @@ -393,14 +393,5 @@ -
- - - - December 22, 2003 - PAS - Initial conversion to DocBook XML from HTML. - - - +