Add a caution to the XenMyWay article

git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@3790 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
teastep 2006-04-15 15:48:08 +00:00
parent 5ea0b6bf94
commit 2778ca5e54
2 changed files with 42 additions and 17 deletions

View File

@ -15,7 +15,7 @@
</author> </author>
</authorgroup> </authorgroup>
<pubdate>2006-04-10</pubdate> <pubdate>2006-04-15</pubdate>
<copyright> <copyright>
<year>2006</year> <year>2006</year>
@ -131,26 +131,26 @@
<orderedlist> <orderedlist>
<listitem> <listitem>
<para>Dom0 (ursa.shorewall.net) is used as a local file server (NFS <para>Dom0 (DNS name ursa.shorewall.net) is used as a local file
and Samba).</para> server (NFS and Samba).</para>
</listitem> </listitem>
<listitem> <listitem>
<para>The first DomU (Dom name <emphasis <para>The first DomU (Dom name <emphasis
role="bold">firewall</emphasis>, gateway.shorewall.net) is used as our role="bold">firewall</emphasis>, DNS name gateway.shorewall.net) is
main firewall.</para> used as our main firewall.</para>
</listitem> </listitem>
<listitem> <listitem>
<para>The second DomU (Dom name <emphasis <para>The second DomU (Dom name <emphasis
role="bold">lists</emphasis>, lists.shorewall.net) is used as a public role="bold">lists</emphasis>, DNS name lists.shorewall.net) is used as
Web/FTP/Mail/DNS server.</para> a public Web/FTP/Mail/DNS server.</para>
</listitem> </listitem>
<listitem> <listitem>
<para>The third DomU (Dom name <emphasis <para>The third DomU (Dom name <emphasis
role="bold">wireless</emphasis>, wireless.shorewall.net) is used as a role="bold">wireless</emphasis>, DNS name wireless.shorewall.net) is
gateway to our wireless network.</para> used as a gateway to our wireless network.</para>
</listitem> </listitem>
</orderedlist> </orderedlist>
@ -159,6 +159,26 @@
has three interfaces. Shorewall runs in Dom0, in the firewall domain and has three interfaces. Shorewall runs in Dom0, in the firewall domain and
in the wireless gateway.</para> in the wireless gateway.</para>
<caution>
<para>As the developer of Shorewall, I have enough experience to be very
comfortable with Linux networking and Shorewall/iptables. I arrived at
this configuration after a lot of trial and error experimentation (see
<ulink url="Xen.html">Xen and Shorewall</ulink>). If you are a Linux
networking novice, I recommend that you do not attempt a configuration
like this one for your first Shorewall installation. You are very likely
to frustrate both yourself and the Shorewall support team. Rather I
suggest that you start with something simple like a <ulink
url="standalone.htm">standalone installation</ulink> in a domU; once you
are comfortable with that then you will be ready to try something more
substantial.</para>
<para>As Paul Gear says: <emphasis>Shorewall might make iptables easy,
but it doesn't make understanding fundamental networking principles,
traffic shaping, or multi-ISP routing any easier</emphasis>.</para>
<para>The same goes for Xen networking.</para>
</caution>
<section id="Domains"> <section id="Domains">
<title>Domain Configuration</title> <title>Domain Configuration</title>
@ -274,7 +294,11 @@ disk = [ 'phy:hdb4,hdb4,w' ]</programlisting>
<para>SuSE 10.0 includes Xen 3.0 which does not support PCI <para>SuSE 10.0 includes Xen 3.0 which does not support PCI
delegation<footnote> delegation<footnote>
<para>PCI delegation was a feature of Xen 2.0 but that capability <para>PCI delegation was a feature of Xen 2.0 but that capability
was dropped in 3.0. It has been restore in Xen 3.0.2.</para> was dropped in 3.0. It has been restored in Xen 3.0.2 and once I
upgrade this system to SuSE 10.1 (which includes Xen 3.0.2), I
intend to implement PCI delegation and remove three of the four
bridges. I will probably combine the wireless and firewall domains
at that time as well.</para>
</footnote>; I therefore use a bridged configuration with four bridges </footnote>; I therefore use a bridged configuration with four bridges
(one for each network interface). When Shorewall starts during bootup of (one for each network interface). When Shorewall starts during bootup of
Dom0, it creates the four bridges using this Dom0, it creates the four bridges using this
@ -687,7 +711,7 @@ Trcrt/ACCEPT loc dmz
############################################################################################################################################################################### ###############################################################################################################################################################################
# DMZ to Local # DMZ to Local
# #
ACCEPT dmz net:192.168.1.254 udp 123 ACCEPT dmz loc:192.168.1.5 udp 123
ACCEPT dmz loc:192.168.1.5 tcp 21 ACCEPT dmz loc:192.168.1.5 tcp 21
Ping/ACCEPT dmz loc Ping/ACCEPT dmz loc

View File

@ -15,7 +15,7 @@
</author> </author>
</authorgroup> </authorgroup>
<pubdate>2006-03-24</pubdate> <pubdate>2006-04-10</pubdate>
<copyright> <copyright>
<year>2004</year> <year>2004</year>
@ -888,11 +888,12 @@
<para><command>shorewall [ -q ] refresh</command></para> <para><command>shorewall [ -q ] refresh</command></para>
<para>The rules involving the broadcast addresses of firewall <para>The rules involving the broadcast addresses of firewall
interfaces, the black list, traffic control rules and ECN control interfaces, the black list and ECN control rules are recreated to
rules are recreated to reflect any changes made to your reflect any changes made to your configuration files. Shorewall
configuration files. Existing connections are untouched If -q is versions prior to 3.2.0 Beta 5 also recreate the traffic shaping
specified, less detain is displayed making it easier to spot rules as part of processing the <command>refresh</command> command.
warnings.</para> Existing connections are untouched. If -q is specified, less detail
is displayed making it easier to spot warnings.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>