mirror of
https://gitlab.com/shorewall/code.git
synced 2025-01-03 03:59:16 +01:00
Tweak the FAQ
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@8523 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
parent
4bacec9666
commit
1d370ef12c
28
docs/FAQ.xml
28
docs/FAQ.xml
@ -853,7 +853,7 @@ to debug/develop the newnat interface.</programlisting></para>
|
|||||||
|
|
||||||
<para><emphasis role="bold">Answer:</emphasis> The default Shorewall
|
<para><emphasis role="bold">Answer:</emphasis> The default Shorewall
|
||||||
setup invokes the <emphasis role="bold">Drop</emphasis> action prior to
|
setup invokes the <emphasis role="bold">Drop</emphasis> action prior to
|
||||||
enforcing a DROP policy and the default policy to all zone from the
|
enforcing a DROP policy and the default policy to all zones from the
|
||||||
internet is DROP. The Drop action is defined in
|
internet is DROP. The Drop action is defined in
|
||||||
<filename>/usr/share/shorewall/action.Drop</filename> which in turn
|
<filename>/usr/share/shorewall/action.Drop</filename> which in turn
|
||||||
invokes the <emphasis role="bold">Auth</emphasis> macro (defined in
|
invokes the <emphasis role="bold">Auth</emphasis> macro (defined in
|
||||||
@ -1017,9 +1017,12 @@ to debug/develop the newnat interface.</programlisting></para>
|
|||||||
|
|
||||||
<para>This kernel change, while necessary, means that Shorewall zones
|
<para>This kernel change, while necessary, means that Shorewall zones
|
||||||
may no longer be defined in terms of bridge ports. See <ulink
|
may no longer be defined in terms of bridge ports. See <ulink
|
||||||
url="bridge-Shorewall-perl.html">the new bridging documentation</ulink>
|
url="bridge-Shorewall-perl.html">the new Shorewall-shell bridging
|
||||||
for information about configuring a bridge/firewall under kernel 2.6.20
|
documentation</ulink> for information about configuring a
|
||||||
and later.<note>
|
bridge/firewall under kernel 2.6.20 and later with Shoreawall shell or
|
||||||
|
the<ulink url="bridge-Shorewall-perl.html"> Shorewall-perl bridging
|
||||||
|
documentation</ulink> if you use Shorewall-perl
|
||||||
|
(highly-recommended).<note>
|
||||||
<para>Following the instructions in the new bridging documentation
|
<para>Following the instructions in the new bridging documentation
|
||||||
will not prevent the above message from being issued.</para>
|
will not prevent the above message from being issued.</para>
|
||||||
</note></para>
|
</note></para>
|
||||||
@ -1375,7 +1378,8 @@ DROP net fw udp 10619</programlisting>
|
|||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
<varlistentry>
|
<varlistentry>
|
||||||
<term><emphasis>interface</emphasis>_mac</term>
|
<term><emphasis>interface</emphasis>_mac or
|
||||||
|
<emphasis>interface</emphasis>_rec</term>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>The packet is being logged under the <emphasis
|
<para>The packet is being logged under the <emphasis
|
||||||
@ -1409,10 +1413,12 @@ DROP net fw udp 10619</programlisting>
|
|||||||
role="bold">routeback</emphasis> option on that interface in
|
role="bold">routeback</emphasis> option on that interface in
|
||||||
<filename> <ulink
|
<filename> <ulink
|
||||||
url="manpages/shorewall-interfaces.html">/etc/shorewall/interfaces</ulink>
|
url="manpages/shorewall-interfaces.html">/etc/shorewall/interfaces</ulink>
|
||||||
</filename> or you need the <emphasis
|
, </filename>you need the <emphasis
|
||||||
role="bold">routeback</emphasis> option in the relevant entry in
|
role="bold">routeback</emphasis> option in the relevant entry in
|
||||||
<filename> <ulink
|
<filename> <ulink
|
||||||
url="manpages/shorewall-hosts.html">/etc/shorewall/hosts</ulink>.</filename></para>
|
url="manpages/shorewall-hosts.html">/etc/shorewall/hosts</ulink>
|
||||||
|
or you've done something silly like define a default route out of
|
||||||
|
an internal interface.</filename></para>
|
||||||
|
|
||||||
<para>In Shorewall 3.3.3 and later versions with OPTIMIZE=1 in
|
<para>In Shorewall 3.3.3 and later versions with OPTIMIZE=1 in
|
||||||
<ulink url="manpages/shorewall.conf.html">shorewall.conf</ulink>,
|
<ulink url="manpages/shorewall.conf.html">shorewall.conf</ulink>,
|
||||||
@ -1496,7 +1502,9 @@ DROP net fw udp 10619</programlisting>
|
|||||||
<para>When a DNAT rule is logged, there will never be an OUT=
|
<para>When a DNAT rule is logged, there will never be an OUT=
|
||||||
shown because the packet is being logged before it is routed.
|
shown because the packet is being logged before it is routed.
|
||||||
Also, DNAT logging will show the <emphasis>original</emphasis>
|
Also, DNAT logging will show the <emphasis>original</emphasis>
|
||||||
destination IP address and destination port number.</para>
|
destination IP address and destination port number. When a
|
||||||
|
REDIRECT rule is logged, the message will also show the
|
||||||
|
original destination IP address and port number.</para>
|
||||||
</note>
|
</note>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -2401,8 +2409,8 @@ eth0 eth1 # eth1 = interface to local netwo
|
|||||||
<title>(FAQ 72) Can I switch to using Shorewall-perl without changing my
|
<title>(FAQ 72) Can I switch to using Shorewall-perl without changing my
|
||||||
Shorewall configuration?</title>
|
Shorewall configuration?</title>
|
||||||
|
|
||||||
<para><emphasis role="bold">Answer</emphasis>: Probably not. See the
|
<para><emphasis role="bold">Answer</emphasis>: Maybe yes, maybe no. See
|
||||||
<ulink url="???">Shorewall Perl article</ulink> for a list of the
|
the <ulink url="???">Shorewall Perl article</ulink> for a list of the
|
||||||
incompatibilities between Shorewall-shell and Shorewall-perl.</para>
|
incompatibilities between Shorewall-shell and Shorewall-perl.</para>
|
||||||
</section>
|
</section>
|
||||||
</section>
|
</section>
|
||||||
|
@ -68,6 +68,26 @@
|
|||||||
a much more efficient way to install a ruleset than running the
|
a much more efficient way to install a ruleset than running the
|
||||||
iptables utility once for each rule in the ruleset.</para>
|
iptables utility once for each rule in the ruleset.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
|
<listitem>
|
||||||
|
<para>ifconfig - An obsolete program included in the net-utils
|
||||||
|
package. ifconfig was used to configure network interfaces.</para>
|
||||||
|
</listitem>
|
||||||
|
|
||||||
|
<listitem>
|
||||||
|
<para>route - An obsolete program included in the net-utils package.
|
||||||
|
route was used to configure routing.</para>
|
||||||
|
</listitem>
|
||||||
|
|
||||||
|
<listitem>
|
||||||
|
<para>ip - A program included in the iproute2 package. ip replaces
|
||||||
|
ifconfig and route in modern Linux systems.</para>
|
||||||
|
</listitem>
|
||||||
|
|
||||||
|
<listitem>
|
||||||
|
<para>tc - A program included in the iproute2 package. tc is used to
|
||||||
|
configure QOS/Traffic Shaping on Linux systems.</para>
|
||||||
|
</listitem>
|
||||||
</itemizedlist>
|
</itemizedlist>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
@ -78,16 +98,17 @@
|
|||||||
<quote>Shorewall</quote>, is high-level tool for configuring Netfilter.
|
<quote>Shorewall</quote>, is high-level tool for configuring Netfilter.
|
||||||
You describe your firewall/gateway requirements using entries in a set
|
You describe your firewall/gateway requirements using entries in a set
|
||||||
of configuration files. Shorewall reads those configuration files and
|
of configuration files. Shorewall reads those configuration files and
|
||||||
with the help of the iptables and iptables-restore utilities, Shorewall
|
with the help of the iptables, iptables-restore, ip and tc utilities,
|
||||||
configures Netfilter to match your requirements. Shorewall can be used
|
Shorewall configures Netfilter and the Linux networking subsystem to
|
||||||
on a dedicated firewall system, a multi-function gateway/router/server
|
match your requirements. Shorewall can be used on a dedicated firewall
|
||||||
or on a standalone GNU/Linux system. Shorewall does not use Netfilter's
|
system, a multi-function gateway/router/server or on a standalone
|
||||||
ipchains compatibility mode and can thus take advantage of Netfilter's
|
GNU/Linux system. Shorewall does not use Netfilter's ipchains
|
||||||
connection state tracking capabilities.</para>
|
compatibility mode and can thus take advantage of Netfilter's connection
|
||||||
|
state tracking capabilities.</para>
|
||||||
|
|
||||||
<para>Shorewall is not a daemon. Once Shorewall has configured
|
<para>Shorewall is not a daemon. Once Shorewall has configured the Linux
|
||||||
Netfilter, its job is complete and there is no <quote>Shorewall
|
networking subsystem, its job is complete and there is no
|
||||||
process</quote> left running in your system. The <ulink
|
<quote>Shorewall process</quote> left running in your system. The <ulink
|
||||||
url="starting_and_stopping_shorewall.htm">/sbin/shorewall program can be
|
url="starting_and_stopping_shorewall.htm">/sbin/shorewall program can be
|
||||||
used at any time to monitor the Netfilter firewall</ulink>.</para>
|
used at any time to monitor the Netfilter firewall</ulink>.</para>
|
||||||
|
|
||||||
@ -166,12 +187,13 @@ net eth0 detect dhcp,routefilter,norfc1918
|
|||||||
loc eth1 detect
|
loc eth1 detect
|
||||||
dmz eth2 detect</programlisting>
|
dmz eth2 detect</programlisting>
|
||||||
|
|
||||||
<para>The above file defines the net zone as all IPv4 hosts interfacing to
|
<para>The above file defines the <emphasis>net</emphasis> zone as all IPv4
|
||||||
the firewall through eth0, the loc zone as all IPv4 hosts interfacing
|
hosts interfacing to the firewall through eth0, the
|
||||||
through eth1 and the dmz as all IPv4 hosts interfacing through eth2. It is
|
<emphasis>loc</emphasis> zone as all IPv4 hosts interfacing through eth1
|
||||||
important to note that the composition of a zone is defined in terms of a
|
and the <emphasis>dmz</emphasis> as all IPv4 hosts interfacing through
|
||||||
combination of addresses <emphasis role="bold">and</emphasis> interfaces.
|
eth2. It is important to note that the composition of a zone is defined in
|
||||||
When using the <ulink
|
terms of a combination of addresses <emphasis role="bold">and</emphasis>
|
||||||
|
interfaces. When using the <ulink
|
||||||
url="manpages/shorewall-interfaces.html"><filename>/etc/shorewall/interfaces</filename></ulink>
|
url="manpages/shorewall-interfaces.html"><filename>/etc/shorewall/interfaces</filename></ulink>
|
||||||
file to define a zone, all addresses are included; when you want to define
|
file to define a zone, all addresses are included; when you want to define
|
||||||
a zone that contains a limited subset of the IPv4 address space, you use
|
a zone that contains a limited subset of the IPv4 address space, you use
|
||||||
@ -204,8 +226,8 @@ dmz eth2 detect</programlisting>
|
|||||||
</itemizedlist>
|
</itemizedlist>
|
||||||
|
|
||||||
<para>Connection request logging may be specified as part of a
|
<para>Connection request logging may be specified as part of a
|
||||||
policy and it is conventional to log DROP and REJECT
|
policy and it is conventional (and highly recommended) to log DROP
|
||||||
policies.</para>
|
and REJECT policies.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
@ -217,11 +239,11 @@ dmz eth2 detect</programlisting>
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>You only need concern yourself with connection requests. You
|
<para>You only need concern yourself with connection requests. You
|
||||||
don't need to define rules for how traffic that is part of an
|
don't need to define rules for handling traffic that is part of an
|
||||||
established connection is handled and in most cases you don't have
|
established connection is and in most cases you don't have to worry
|
||||||
to worry about how related connections are handled (ICMP error
|
about how related connections are handled (ICMP error packets and
|
||||||
packets and <ulink url="FTP.html">related TCP connection requests
|
<ulink url="FTP.html">related TCP connection requests such as used
|
||||||
such as used by FTP</ulink>).</para>
|
by FTP</ulink>).</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</itemizedlist>For each connection request entering the firewall, the
|
</itemizedlist>For each connection request entering the firewall, the
|
||||||
request is first checked against the <filename
|
request is first checked against the <filename
|
||||||
@ -258,7 +280,7 @@ $FW net ACCEPT</programlisting> The above policy will:
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Drop (ignore) all connection requests from the internet to
|
<para>Drop (ignore) all connection requests from the internet to
|
||||||
your firewall or local network; these ignored connection requests
|
your firewall or local networks; these ignored connection requests
|
||||||
will be logged using the <emphasis>info</emphasis> syslog priority
|
will be logged using the <emphasis>info</emphasis> syslog priority
|
||||||
(log level).</para>
|
(log level).</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
@ -337,9 +359,9 @@ ACCEPT net $FW tcp 22</programlisting>
|
|||||||
|
|
||||||
<orderedlist>
|
<orderedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para><emphasis role="bold">Shorewall</emphasis>. This package must be
|
<para><emphasis role="bold">Shorewall-common</emphasis>. This package
|
||||||
installed on at least one system in your network. That system must
|
must be installed on at least one system in your network. That system
|
||||||
also have Shorewall-shell and/or Shorewall-perl installed.</para>
|
must also have Shorewall-shell and/or Shorewall-perl installed.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
|
Loading…
Reference in New Issue
Block a user