fixed single quotes

git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@958 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
mhnoyes 2003-12-25 17:53:31 +00:00
parent 4601611b73
commit 24d61f30db

View File

@ -520,8 +520,8 @@
<para>(Added in version 1.4.7) - This option causes <para>(Added in version 1.4.7) - This option causes
/proc/sys/net/ipv4/conf/&#60;interface&#62;/arp_filter to be /proc/sys/net/ipv4/conf/&#60;interface&#62;/arp_filter to be
set with the result that this interface will only answer ARP set with the result that this interface will only answer ARP
&#39;who-has&#39; requests from hosts that are routed out of <quote>who-has</quote> requests from hosts that are routed out
that interface. Setting this option facilitates testing of of that interface. Setting this option facilitates testing of
your firewall where multiple firewall interfaces are connected your firewall where multiple firewall interfaces are connected
to the same HUB/Switch (all interface connected to the single to the same HUB/Switch (all interface connected to the single
HUB/Switch should have this option specified). Note that using HUB/Switch should have this option specified). Note that using
@ -643,8 +643,8 @@
<listitem> <listitem>
<para>Packets from this interface that are selected by the <para>Packets from this interface that are selected by the
&#39;unclean&#39; match target in iptables will be optionally <quote>unclean</quote> match target in iptables will be
logged and then dropped.</para> optionally logged and then dropped.</para>
<warning> <warning>
<para>This feature requires that UNCLEAN match support be <para>This feature requires that UNCLEAN match support be
@ -681,7 +681,7 @@
<listitem> <listitem>
<para>This option works like <emphasis role="bold">dropunclean</emphasis> <para>This option works like <emphasis role="bold">dropunclean</emphasis>
with the exception that packets selected by the with the exception that packets selected by the
&#39;unclean&#39; match target in iptables are logged <quote>unclean</quote> match target in iptables are logged
<emphasis>but not dropped</emphasis>. The level at which the <emphasis>but not dropped</emphasis>. The level at which the
packets are logged is determined by the setting of LOGUNCLEAN packets are logged is determined by the setting of LOGUNCLEAN
and if LOGUNCLEAN has not been set, <quote>info</quote> is and if LOGUNCLEAN has not been set, <quote>info</quote> is
@ -1014,8 +1014,8 @@
</tgroup> </tgroup>
</informaltable> </informaltable>
<para>The &#39;-&#39; in the ZONE column for eth1 tells Shorewall that <para>The <quote>-</quote> in the ZONE column for eth1 tells Shorewall
eth1 interfaces to multiple zones.</para> that eth1 interfaces to multiple zones.</para>
<informaltable> <informaltable>
<tgroup cols="3"> <tgroup cols="3">
@ -1475,7 +1475,7 @@
<orderedlist> <orderedlist>
<listitem> <listitem>
<para>Multiple &#39;net&#39; interfaces to different ISPs. You <para>Multiple <quote>net</quote> interfaces to different ISPs. You
don&#39;t want to route traffic from one ISP to the other through don&#39;t want to route traffic from one ISP to the other through
your firewall.</para> your firewall.</para>
</listitem> </listitem>
@ -1922,10 +1922,11 @@
<para>The first rule allows Sam SSH access to the firewall. The second <para>The first rule allows Sam SSH access to the firewall. The second
rule says that any clients from the net zone with the exception of those rule says that any clients from the net zone with the exception of those
in the &#39;sam&#39; zone should have their connection port forwarded to in the <quote>sam</quote> zone should have their connection port
192.168.1.3. If you need to exclude more than one zone in this way, you forwarded to 192.168.1.3. If you need to exclude more than one zone in
can list the zones separated by commas (e.g., net!sam,joe,fred). This this way, you can list the zones separated by commas (e.g.,
technique also may be used when the ACTION is REDIRECT.</para> net!sam,joe,fred). This technique also may be used when the ACTION is
REDIRECT.</para>
</section> </section>
</section> </section>
@ -1979,11 +1980,11 @@
<orderedlist> <orderedlist>
<listitem> <listitem>
<para>a header-rewriting rule in the Netfilter <para>a header-rewriting rule in the Netfilter
&#39;nat&#39; table</para> <quote>nat</quote> table</para>
</listitem> </listitem>
<listitem> <listitem>
<para>an ACCEPT rule in the Netfilter &#39;filter&#39; <para>an ACCEPT rule in the Netfilter <quote>filter</quote>
table. DNAT- works like DNAT but only generates the table. DNAT- works like DNAT but only generates the
header-rewriting rule.</para> header-rewriting rule.</para>
</listitem> </listitem>
@ -2010,11 +2011,11 @@
<orderedlist> <orderedlist>
<listitem> <listitem>
<para>a header-rewriting rule in the Netfilter <para>a header-rewriting rule in the Netfilter
&#39;nat&#39; table</para> <quote>nat</quote> table</para>
</listitem> </listitem>
<listitem> <listitem>
<para>an ACCEPT rule in the Netfilter &#39;filter&#39; <para>an ACCEPT rule in the Netfilter <quote>filter</quote>
table. REDIRECT- works like REDIRECT but only generates table. REDIRECT- works like REDIRECT but only generates
the header-rewriting rule.</para> the header-rewriting rule.</para>
</listitem> </listitem>
@ -2123,7 +2124,7 @@
comma-separated list of those sub-zones to be excluded. There is an comma-separated list of those sub-zones to be excluded. There is an
<link linkend="Exclude">example</link> above.</para> <link linkend="Exclude">example</link> above.</para>
<para>If the source is not &#39;all&#39; then the source may be <para>If the source is not <quote>all</quote> then the source may be
further restricted by adding a colon (<quote>:</quote>) followed by further restricted by adding a colon (<quote>:</quote>) followed by
a comma-separated list of qualifiers. Qualifiers are may include:</para> a comma-separated list of qualifiers. Qualifiers are may include:</para>
@ -2784,10 +2785,10 @@
</tgroup> </tgroup>
</informaltable> </informaltable>
<para><note><para>When &#39;all&#39; is used as a source or destination, <para><note><para>When <quote>all</quote> is used as a source or
intra-zone traffic is not affected. In this example, if there were two destination, intra-zone traffic is not affected. In this example, if
DMZ interfaces then the above rule would NOT enable SMTP traffic between there were two DMZ interfaces then the above rule would NOT enable SMTP
hosts on these interfaces.</para></note></para> traffic between hosts on these interfaces.</para></note></para>
</example> </example>
<example> <example>
@ -3011,8 +3012,8 @@
<para>The /etc/shorewall/common file is expected to contain iptables <para>The /etc/shorewall/common file is expected to contain iptables
commands; rather than running iptables directly, you should run it commands; rather than running iptables directly, you should run it
indirectly using the Shorewall function &#39;run_iptables&#39;. That way, indirectly using the Shorewall function <quote>run_iptables</quote>. That
if iptables encounters an error, the firewall will be safely stopped.</para> way, if iptables encounters an error, the firewall will be safely stopped.</para>
</section> </section>
<section id="Masq" xreflabel="/etc/shorewall/masq"> <section id="Masq" xreflabel="/etc/shorewall/masq">
@ -3055,7 +3056,7 @@
an interface name. In the latter instance, the interface must be an interface name. In the latter instance, the interface must be
configured and started before Shorewall is started as Shorewall will configured and started before Shorewall is started as Shorewall will
determine the subnet based on information obtained from the determine the subnet based on information obtained from the
&#39;ip&#39; utility.</para> <quote>ip</quote> utility.</para>
<caution> <caution>
<para>When using Shorewall 1.3.13 or earlier, when an interface <para>When using Shorewall 1.3.13 or earlier, when an interface
@ -3576,14 +3577,14 @@
<listitem> <listitem>
<para>(Added at version 1.4.4) - The value of this variable generate <para>(Added at version 1.4.4) - The value of this variable generate
the --log-prefix setting for Shorewall logging rules. It contains a the --log-prefix setting for Shorewall logging rules. It contains a
&#39;printf&#39; formatting template which accepts three arguments <quote>printf</quote> formatting template which accepts three
(the chain name, logging rule number (optional) and the arguments (the chain name, logging rule number (optional) and the
disposition). To use LOGFORMAT with <ulink disposition). To use LOGFORMAT with <ulink
url="http://www.fireparse.com">fireparse</ulink>, set it as:</para> url="http://www.fireparse.com">fireparse</ulink>, set it as:</para>
<programlisting>LOGFORMAT=&#34;fp=%s:%d a=%s &#34;</programlisting> <programlisting>LOGFORMAT=&#34;fp=%s:%d a=%s &#34;</programlisting>
<para>If the LOGFORMAT value contains the substring &#39;%d&#39; <para>If the LOGFORMAT value contains the substring <quote>%d</quote>
then the logging rule number is calculated and formatted in that then the logging rule number is calculated and formatted in that
position; if that substring is not included then the rule number is position; if that substring is not included then the rule number is
not included. If not supplied or supplied as empty not included. If not supplied or supplied as empty
@ -3592,12 +3593,12 @@
<caution> <caution>
<para>/sbin/shorewall uses the leading part of the LOGFORMAT <para>/sbin/shorewall uses the leading part of the LOGFORMAT
string (up to but not including the first &#39;%&#39;) to find log string (up to but not including the first <quote>%</quote>) to
messages in the &#39;show log&#39;, &#39;status&#39; and find log messages in the <quote>show log</quote>, <quote>status</quote>
&#39;hits&#39; commands. This part should not be omitted (the and <quote>hits</quote> commands. This part should not be omitted
LOGFORMAT should not begin with <quote>%</quote>) and the leading (the LOGFORMAT should not begin with <quote>%</quote>) and the
part should be sufficiently unique for /sbin/shorewall to identify leading part should be sufficiently unique for /sbin/shorewall to
Shorewall messages.</para> identify Shorewall messages.</para>
</caution> </caution>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -3607,15 +3608,15 @@
<listitem> <listitem>
<para>(Added at version 1.3.13) - If this option is set to <para>(Added at version 1.3.13) - If this option is set to
&#39;No&#39; then Shorewall won&#39;t clear the current traffic <quote>No</quote> then Shorewall won&#39;t clear the current traffic
control rules during [re]start. This setting is intended for use by control rules during [re]start. This setting is intended for use by
people that prefer to configure traffic shaping when the network people that prefer to configure traffic shaping when the network
interfaces come up rather than when the firewall is started. If that interfaces come up rather than when the firewall is started. If that
is what you want to do, set TC_ENABLED=Yes and CLEAR_TC=No and do is what you want to do, set TC_ENABLED=Yes and CLEAR_TC=No and do
not supply an /etc/shorewall/tcstart file. That way, your traffic not supply an /etc/shorewall/tcstart file. That way, your traffic
shaping rules can still use the &#39;fwmark&#39; classifier based on shaping rules can still use the <quote>fwmark</quote> classifier
packet marking defined in /etc/shorewall/tcrules. If not specified, based on packet marking defined in /etc/shorewall/tcrules. If not
CLEAR_TC=Yes is assumed.</para> specified, CLEAR_TC=Yes is assumed.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -3644,7 +3645,7 @@
<listitem> <listitem>
<para>(Added at version 1.3.12) - This parameter determines the <para>(Added at version 1.3.12) - This parameter determines the
level at which packets logged under the <link linkend="rfc1918">&#39;norfc1918&#39; level at which packets logged under the <link linkend="rfc1918"><quote>norfc1918</quote>
mechanism</link> are logged. The value must be a valid <ulink mechanism</link> are logged. The value must be a valid <ulink
url="shorewall_logging.html">syslog level</ulink> and if no level is url="shorewall_logging.html">syslog level</ulink> and if no level is
given, then info is assumed. Prior to Shorewall version 1.3.12, given, then info is assumed. Prior to Shorewall version 1.3.12,
@ -4017,12 +4018,12 @@
<listitem> <listitem>
<para>This parameter determines the logging level of mangled/invalid <para>This parameter determines the logging level of mangled/invalid
packets controlled by the &#39;dropunclean and logunclean&#39; packets controlled by the <quote>dropunclean and logunclean</quote>
interface options. If LOGUNCLEAN is empty (LOGUNCLEAN=) then packets interface options. If LOGUNCLEAN is empty (LOGUNCLEAN=) then packets
selected by &#39;dropclean&#39; are dropped silently selected by <quote>dropclean</quote> are dropped silently (<quote>logunclean</quote>
(&#39;logunclean&#39; packets are logged under the &#39;info&#39; packets are logged under the <quote>info</quote> log level).
log level). Otherwise, these packets are logged at the specified Otherwise, these packets are logged at the specified level (Example:
level (Example: LOGUNCLEAN=debug).</para> LOGUNCLEAN=debug).</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -4352,7 +4353,7 @@
blacklist file will be disposed of according to the value assigned to the blacklist file will be disposed of according to the value assigned to the
<link linkend="Conf">BLACKLIST_DISPOSITION</link> and <link linkend="Conf">BLACKLIST_LOGLEVEL</link> <link linkend="Conf">BLACKLIST_DISPOSITION</link> and <link linkend="Conf">BLACKLIST_LOGLEVEL</link>
variables in /etc/shorewall/shorewall.conf. Only packets arriving on variables in /etc/shorewall/shorewall.conf. Only packets arriving on
interfaces that have the &#39;<link linkend="Interfaces">blacklist</link>&#39; interfaces that have the <quote><link linkend="Interfaces">blacklist</link></quote>
option in /etc/shorewall/interfaces are checked against the blacklist. The option in /etc/shorewall/interfaces are checked against the blacklist. The
black list is designed to prevent listed hosts/subnets from accessing black list is designed to prevent listed hosts/subnets from accessing
services on <emphasis role="bold">your</emphasis> network.</para> services on <emphasis role="bold">your</emphasis> network.</para>