mirror of
https://gitlab.com/shorewall/code.git
synced 2025-01-05 04:58:49 +01:00
Add a qualification to FAQ 30
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@4586 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
parent
c43dd1977b
commit
1dd638513a
@ -74,8 +74,8 @@
|
|||||||
class="directory">/usr/share/shorewall</filename>. Each
|
class="directory">/usr/share/shorewall</filename>. Each
|
||||||
<filename>action.*</filename> file has a comment at the beginning of
|
<filename>action.*</filename> file has a comment at the beginning of
|
||||||
the file that describes what the action does. As an example, here is
|
the file that describes what the action does. As an example, here is
|
||||||
the definition of the <firstterm>AllowSMB</firstterm> standard
|
the definition of the <firstterm>AllowSMB</firstterm> standard action
|
||||||
action.</para>
|
from Shorewall version 2.2.</para>
|
||||||
|
|
||||||
<programlisting>#
|
<programlisting>#
|
||||||
# Shorewall 2.2 /usr/share/shorewall/action.AllowSMB
|
# Shorewall 2.2 /usr/share/shorewall/action.AllowSMB
|
||||||
@ -96,6 +96,10 @@ ACCEPT - - tcp 135,139,445
|
|||||||
the definition in /usr/share/shorewall. Rather, copy the file to
|
the definition in /usr/share/shorewall. Rather, copy the file to
|
||||||
<filename class="directory">/etc/shorewall</filename> (or somewhere
|
<filename class="directory">/etc/shorewall</filename> (or somewhere
|
||||||
else on your CONFIG_PATH) and modify the copy.</para>
|
else on your CONFIG_PATH) and modify the copy.</para>
|
||||||
|
|
||||||
|
<para>Standard Actions have been largely replaced by <ulink
|
||||||
|
url="Macros.html">macros</ulink> in Shorewall 3.0 and later major
|
||||||
|
versions.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
|
@ -3699,6 +3699,35 @@ LOGBURST=5</programlisting>
|
|||||||
<section id="TOS" xreflabel="/etc/shorewall/tos">
|
<section id="TOS" xreflabel="/etc/shorewall/tos">
|
||||||
<title>/etc/shorewall/tos Configuration</title>
|
<title>/etc/shorewall/tos Configuration</title>
|
||||||
|
|
||||||
|
<warning>
|
||||||
|
<para>This Shorewall feature is somewhat broken -- while it shouldn't
|
||||||
|
hurt anything to use it, it may not do what you want either.</para>
|
||||||
|
|
||||||
|
<para>In versions of Shorewall prior to 3.2.4, it is only safe to
|
||||||
|
specify "all" in the SOURCE and DEST columns. In 3.2.4 and later
|
||||||
|
versions:</para>
|
||||||
|
|
||||||
|
<itemizedlist>
|
||||||
|
<listitem>
|
||||||
|
<para>It continues to work fine if you specify "all" in both the
|
||||||
|
SOURCE and DEST columns.</para>
|
||||||
|
</listitem>
|
||||||
|
|
||||||
|
<listitem>
|
||||||
|
<para>It mostly works when you specify zone names in either column
|
||||||
|
(provided that you have Mangle table FORWARD chain support in your
|
||||||
|
kernel) but it doesn't work with dynamic zones and it doesn't work
|
||||||
|
with IPSEC zones.</para>
|
||||||
|
</listitem>
|
||||||
|
|
||||||
|
<listitem>
|
||||||
|
<para>If you specify a zone name together with an address in the
|
||||||
|
SOURCE or DEST column, the generated rule ignores the zone name and
|
||||||
|
simply matches on the source or destination address.</para>
|
||||||
|
</listitem>
|
||||||
|
</itemizedlist>
|
||||||
|
</warning>
|
||||||
|
|
||||||
<para>The <filename>/etc/shorewall/tos</filename> file allows you to set
|
<para>The <filename>/etc/shorewall/tos</filename> file allows you to set
|
||||||
the Type of Service field in packet headers based on packet source, packet
|
the Type of Service field in packet headers based on packet source, packet
|
||||||
destination, protocol, source port and destination port. In order for this
|
destination, protocol, source port and destination port. In order for this
|
||||||
@ -3728,9 +3757,8 @@ LOGBURST=5</programlisting>
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>The destination zone. May be qualified by following the zone
|
<para>The destination zone. May be qualified by following the zone
|
||||||
name with a colon (<quote>:</quote>) and either an IP address or an
|
name with a colon (<quote>:</quote>) and either an IP address or an
|
||||||
IP subnet. Because packets are marked prior to routing, you may not
|
IP subnet. This column may also contain <quote>all</quote> to
|
||||||
specify the name of an interface. This column may also contain
|
indicate any destination.</para>
|
||||||
<quote>all</quote> to indicate any destination.</para>
|
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
|
@ -342,9 +342,11 @@ DNAT net fw:192.168.1.1:22 tcp 4104</programlisting>
|
|||||||
to go the opposite direction from SNAT/MASQUERADE. So if you masquerade
|
to go the opposite direction from SNAT/MASQUERADE. So if you masquerade
|
||||||
or use SNAT from your local network to the internet then you will need
|
or use SNAT from your local network to the internet then you will need
|
||||||
to use DNAT rules to allow connections from the internet to your local
|
to use DNAT rules to allow connections from the internet to your local
|
||||||
network. In all other cases, you use ACCEPT unless you need to hijack
|
network. You also want to use DNAT rules when you intentionally want to
|
||||||
connections as they go through your firewall and handle them on the
|
rewrite the destination IP address or port number. In all other cases,
|
||||||
firewall box itself; in that case, you use a REDIRECT rule.</para>
|
you use ACCEPT unless you need to hijack connections as they go through
|
||||||
|
your firewall and handle them on the firewall box itself; in that case,
|
||||||
|
you use a REDIRECT rule.</para>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
<section>
|
<section>
|
||||||
|
Loading…
Reference in New Issue
Block a user