Second cut at removing references to Documentation.htm

git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@6775 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
teastep 2007-07-04 00:18:10 +00:00
parent fe5af63b14
commit 34101c0766
17 changed files with 53 additions and 53 deletions

View File

@ -855,7 +855,7 @@ to debug/develop the newnat interface.</programlisting></para>
<para><emphasis role="bold">Answer</emphasis>: Add the <para><emphasis role="bold">Answer</emphasis>: Add the
<firstterm>routeback</firstterm> option to <filename <firstterm>routeback</firstterm> option to <filename
class="devicefile">br0</filename> in <ulink class="devicefile">br0</filename> in <ulink
url="Documentation.htm#Interfaces">/etc/shorewall/interfaces</ulink>.</para> url="manpages/shorewall-interfaces.html">/etc/shorewall/interfaces</ulink>.</para>
<para>For more information on this type of configuration, see the <ulink <para>For more information on this type of configuration, see the <ulink
url="SimpleBridge.html">Shorewall Simple Bridge url="SimpleBridge.html">Shorewall Simple Bridge
@ -895,8 +895,8 @@ to debug/develop the newnat interface.</programlisting></para>
messages. It always uses the LOG_KERN (kern) facility (see <quote>man messages. It always uses the LOG_KERN (kern) facility (see <quote>man
openlog</quote>) and you get to choose the log level (again, see openlog</quote>) and you get to choose the log level (again, see
<quote>man syslog</quote>) in your <ulink <quote>man syslog</quote>) in your <ulink
url="Documentation.htm#Policy">policies</ulink> and <ulink url="manpages/shorewall-policy.html">policies</ulink> and <ulink
url="Documentation.htm#Rules">rules</ulink>. The destination for url="manpages/shorewall-rules.html">rules</ulink>. The destination for
messages logged by syslog is controlled by messages logged by syslog is controlled by
<filename>/etc/syslog.conf</filename> (see <quote>man <filename>/etc/syslog.conf</filename> (see <quote>man
syslog.conf</quote>). When you have changed /etc/syslog.conf, be sure to syslog.conf</quote>). When you have changed /etc/syslog.conf, be sure to
@ -1159,10 +1159,10 @@ DROP net fw udp 10619</programlisting>
<listitem> <listitem>
<para>You have a <ulink <para>You have a <ulink
url="Documentation.htm#Policy">policy</ulink> that specifies a log url="manpages/shorewall-policy.html">policy</ulink> that specifies a log
level and this packet is being logged under that policy. If you level and this packet is being logged under that policy. If you
intend to ACCEPT this traffic then you need a <ulink intend to ACCEPT this traffic then you need a <ulink
url="Documentation.htm#Rules">rule</ulink> to that effect.</para> url="manpages/shorewall-rules.html">rule</ulink> to that effect.</para>
<para>Beginning with Shorewall 3.3.3, packets logged out of these <para>Beginning with Shorewall 3.3.3, packets logged out of these
chains may have a source and/or destination that is not in any chains may have a source and/or destination that is not in any
@ -1177,11 +1177,11 @@ DROP net fw udp 10619</programlisting>
<listitem> <listitem>
<para>Either you have a <ulink <para>Either you have a <ulink
url="Documentation.htm#Policy">policy</ulink> for <emphasis url="manpages/shorewall-policy.html">policy</ulink> for <emphasis
role="bold">&lt;zone1&gt;</emphasis> to <emphasis role="bold">&lt;zone1&gt;</emphasis> to <emphasis
role="bold">&lt;zone2&gt;</emphasis> that specifies a log level role="bold">&lt;zone2&gt;</emphasis> that specifies a log level
and this packet is being logged under that policy or this packet and this packet is being logged under that policy or this packet
matches a <ulink url="Documentation.htm#Rules">rule</ulink> that matches a <ulink url="manpages/shorewall-rules.html">rule</ulink> that
includes a log level.</para> includes a log level.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -1207,7 +1207,7 @@ DROP net fw udp 10619</programlisting>
<listitem> <listitem>
<para>The packet is being logged under the <emphasis <para>The packet is being logged under the <emphasis
role="bold">maclist</emphasis> <ulink role="bold">maclist</emphasis> <ulink
url="Documentation.htm#Interfaces">interface url="manpages/shorewall-interfaces.html">interface
option</ulink>.</para> option</ulink>.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -1218,7 +1218,7 @@ DROP net fw udp 10619</programlisting>
<listitem> <listitem>
<para>The packet is being logged under the <emphasis <para>The packet is being logged under the <emphasis
role="bold">logunclean</emphasis> <ulink role="bold">logunclean</emphasis> <ulink
url="Documentation.htm#Interfaces">interface url="manpages/shorewall-interfaces.html">interface
option</ulink>.</para> option</ulink>.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -1229,7 +1229,7 @@ DROP net fw udp 10619</programlisting>
<listitem> <listitem>
<para>The packet is being logged under the <emphasis <para>The packet is being logged under the <emphasis
role="bold">dropunclean</emphasis> <ulink role="bold">dropunclean</emphasis> <ulink
url="Documentation.htm#Interfaces">interface option</ulink> as url="manpages/shorewall-interfaces.html">interface option</ulink> as
specified in the <emphasis role="bold">LOGUNCLEAN</emphasis> specified in the <emphasis role="bold">LOGUNCLEAN</emphasis>
setting in <ulink url="Documentation.htm#Conf"> setting in <ulink url="Documentation.htm#Conf">
<filename>/etc/shorewall/shorewall.conf</filename> <filename>/etc/shorewall/shorewall.conf</filename>
@ -1260,7 +1260,7 @@ DROP net fw udp 10619</programlisting>
interfaces are the same, then you probably need the <emphasis interfaces are the same, then you probably need the <emphasis
role="bold">routeback</emphasis> option on that interface in role="bold">routeback</emphasis> option on that interface in
<filename> <ulink <filename> <ulink
url="Documentation.htm#Interfaces">/etc/shorewall/interfaces</ulink> url="manpages/shorewall-interfaces.html">/etc/shorewall/interfaces</ulink>
</filename> or you need the <emphasis </filename> or you need the <emphasis
role="bold">routeback</emphasis> option in the relevant entry in role="bold">routeback</emphasis> option in the relevant entry in
<filename> <ulink <filename> <ulink
@ -1294,7 +1294,7 @@ DROP net fw udp 10619</programlisting>
<listitem> <listitem>
<para>The packet is being logged because it failed the checks <para>The packet is being logged because it failed the checks
implemented by the <emphasis role="bold">tcpflags</emphasis> implemented by the <emphasis role="bold">tcpflags</emphasis>
<ulink url="Documentation.htm#Interfaces">interface <ulink url="manpages/shorewall-interfaces.html">interface
option</ulink>.</para> option</ulink>.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -1607,7 +1607,7 @@ Creating input Chains...
connected through eth0 and the local zone is defined as all hosts connected through eth0 and the local zone is defined as all hosts
connected through <filename class="devicefile">eth1</filename>. If you connected through <filename class="devicefile">eth1</filename>. If you
are running Shorewall 1.4.10 or later, you can consider setting the are running Shorewall 1.4.10 or later, you can consider setting the
<ulink url="Documentation.htm#Interfaces"> <emphasis <ulink url="manpages/shorewall-interfaces.html"> <emphasis
role="bold">detectnets</emphasis> interface option</ulink> on your local role="bold">detectnets</emphasis> interface option</ulink> on your local
interface (<filename class="devicefile">eth1</filename> in the above interface (<filename class="devicefile">eth1</filename> in the above
example). That will cause Shorewall to restrict the local zone to only example). That will cause Shorewall to restrict the local zone to only
@ -1878,7 +1878,7 @@ iptables: Invalid argument
url="blacklisting_support.htm">blacklisting</ulink> facility. url="blacklisting_support.htm">blacklisting</ulink> facility.
Shorewall versions 2.0.0 and later filter these packets under the Shorewall versions 2.0.0 and later filter these packets under the
<firstterm>nosmurfs</firstterm> interface option in <ulink <firstterm>nosmurfs</firstterm> interface option in <ulink
url="Documentation.htm#Interfaces">/etc/shorewall/interfaces</ulink>.</para> url="manpages/shorewall-interfaces.html">/etc/shorewall/interfaces</ulink>.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -1888,7 +1888,7 @@ iptables: Invalid argument
<listitem> <listitem>
<para><emphasis role="bold">Answer</emphasis>: Yes, if the <ulink <para><emphasis role="bold">Answer</emphasis>: Yes, if the <ulink
url="Documentation.htm#Interfaces">routefilter interface url="manpages/shorewall-interfaces.html">routefilter interface
option</ulink> is selected.</para> option</ulink> is selected.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>

View File

@ -150,7 +150,7 @@ dmz ipv4
<para>The simplest way to define the hosts in a zone is to associate the <para>The simplest way to define the hosts in a zone is to associate the
zone with a network interface using the <ulink zone with a network interface using the <ulink
url="Documentation.htm#Interfaces"><filename>/etc/shorewall/interfaces</filename></ulink> url="manpages/shorewall-interfaces.html"><filename>/etc/shorewall/interfaces</filename></ulink>
file. In the three-interface sample, the three zones are defined using file. In the three-interface sample, the three zones are defined using
that file as follows:</para> that file as follows:</para>
@ -165,7 +165,7 @@ dmz eth2 detect</programlisting>
important to note that the composition of a zone is defined in terms of a important to note that the composition of a zone is defined in terms of a
combination of addresses <emphasis role="bold">and</emphasis> interfaces. combination of addresses <emphasis role="bold">and</emphasis> interfaces.
When using the <ulink When using the <ulink
url="Documentation.htm#Interfaces"><filename>/etc/shorewall/interfaces</filename></ulink> url="manpages/shorewall-interfaces.html"><filename>/etc/shorewall/interfaces</filename></ulink>
file to define a zone, all addresses are included; when you want to define file to define a zone, all addresses are included; when you want to define
a zone that contains a limited subset of the IPv4 address space, you use a zone that contains a limited subset of the IPv4 address space, you use
the <ulink the <ulink
@ -177,7 +177,7 @@ dmz eth2 detect</programlisting>
<listitem> <listitem>
<para>You express your default policy for connections from one zone <para>You express your default policy for connections from one zone
to another zone in the <ulink to another zone in the <ulink
url="Documentation.htm#Policy"><filename url="manpages/shorewall-policy.html"><filename
class="directory">/etc/shorewall/</filename><filename>policy</filename></ulink> class="directory">/etc/shorewall/</filename><filename>policy</filename></ulink>
file. The basic choices for policy are:</para> file. The basic choices for policy are:</para>
@ -203,7 +203,7 @@ dmz eth2 detect</programlisting>
<listitem> <listitem>
<para>You define exceptions to these default policies in the <ulink <para>You define exceptions to these default policies in the <ulink
url="Documentation.htm#Rules"><filename url="manpages/shorewall-rules.html"><filename
class="directory">/etc/shorewall/</filename><filename>rules</filename></ulink> class="directory">/etc/shorewall/</filename><filename>rules</filename></ulink>
file.</para> file.</para>
</listitem> </listitem>

View File

@ -79,7 +79,7 @@
<listitem> <listitem>
<para>The <emphasis role="bold">maclist</emphasis> interface option in <para>The <emphasis role="bold">maclist</emphasis> interface option in
<ulink <ulink
url="Documentation.htm#Interfaces">/etc/shorewall/interfaces</ulink>. url="manpages/shorewall-interfaces.html">/etc/shorewall/interfaces</ulink>.
When this option is specified, all new connection requests arriving on When this option is specified, all new connection requests arriving on
the interface are subject to MAC verification.</para> the interface are subject to MAC verification.</para>
</listitem> </listitem>

View File

@ -53,7 +53,7 @@
<para>Shorewall macros allow a symbolic name to be associated with a <para>Shorewall macros allow a symbolic name to be associated with a
series of one or more iptables rules. The symbolic name may appear in the series of one or more iptables rules. The symbolic name may appear in the
ACTION column of an <filename><ulink ACTION column of an <filename><ulink
url="Documentation.htm#Rules">/etc/shorewall/rules</ulink></filename> file url="manpages/shorewall-rules.html">/etc/shorewall/rules</ulink></filename> file
entry and in the TARGET column of an action in which case, the traffic entry and in the TARGET column of an action in which case, the traffic
matching that rules file entry will be passed to the series of iptables matching that rules file entry will be passed to the series of iptables
rules named by the macro.</para> rules named by the macro.</para>

View File

@ -48,7 +48,7 @@
<para><emphasis role="bold">If all you want to do is forward ports to <para><emphasis role="bold">If all you want to do is forward ports to
servers behind your firewall, you do NOT want to use one-to-one NAT. servers behind your firewall, you do NOT want to use one-to-one NAT.
Port forwarding can be accomplished with simple entries in the <ulink Port forwarding can be accomplished with simple entries in the <ulink
url="Documentation.htm#Rules">rules file</ulink>.</emphasis></para> url="manpages/shorewall-rules.html">rules file</ulink>.</emphasis></para>
</important> </important>
<para>One-to-one NAT is a way to make systems behind a firewall and <para>One-to-one NAT is a way to make systems behind a firewall and

View File

@ -426,7 +426,7 @@ verb 3</programlisting>
<listitem> <listitem>
<para>Specify the <emphasis role="bold">routeback</emphasis> option on <para>Specify the <emphasis role="bold">routeback</emphasis> option on
the <filename class="devicefile">tun+</filename> device in <ulink the <filename class="devicefile">tun+</filename> device in <ulink
url="Documentation.htm#Interfaces">/etc/shorewall/interfaces</ulink>.</para> url="manpages/shorewall-interfaces.html">/etc/shorewall/interfaces</ulink>.</para>
</listitem> </listitem>
</orderedlist> </orderedlist>

View File

@ -98,7 +98,7 @@
<para>Интерфейсы, для которых входящие пакеты проверяются на соответствие чёрному списку, задаются с помощью опции <para>Интерфейсы, для которых входящие пакеты проверяются на соответствие чёрному списку, задаются с помощью опции
<quote>blacklist</quote> <quote>blacklist</quote>
в файле <ulink в файле <ulink
url="Documentation.htm#Interfaces"><filename>/etc/shorewall/interfaces</filename></ulink>.</para> url="manpages/shorewall-interfaces.html"><filename>/etc/shorewall/interfaces</filename></ulink>.</para>
</listitem> </listitem>
<listitem> <listitem>

View File

@ -57,7 +57,7 @@
<listitem> <listitem>
<para>Specify the <quote>dhcp</quote> option on each interface to be <para>Specify the <quote>dhcp</quote> option on each interface to be
served by your server in the <filename><ulink served by your server in the <filename><ulink
url="Documentation.htm#Interfaces">/etc/shorewall/interfaces</ulink></filename> url="manpages/shorewall-interfaces.html">/etc/shorewall/interfaces</ulink></filename>
file. This will generate rules that will allow DHCP to and from your file. This will generate rules that will allow DHCP to and from your
firewall system.</para> firewall system.</para>
</listitem> </listitem>
@ -84,7 +84,7 @@
<listitem> <listitem>
<para>Specify the <quote>dhcp</quote> option for this interface in the <para>Specify the <quote>dhcp</quote> option for this interface in the
<ulink <ulink
url="Documentation.htm#Interfaces"><filename>/etc/shorewall/interfaces</filename></ulink> url="manpages/shorewall-interfaces.html"><filename>/etc/shorewall/interfaces</filename></ulink>
file.&nbsp;This will generate rules that will allow DHCP to and from file.&nbsp;This will generate rules that will allow DHCP to and from
your firewall system.</para> your firewall system.</para>
</listitem> </listitem>
@ -93,7 +93,7 @@
<para>If you know that the dynamic address is always going to be in <para>If you know that the dynamic address is always going to be in
the same subnet, you can specify the subnet address in the interface's the same subnet, you can specify the subnet address in the interface's
entry in the <ulink entry in the <ulink
url="Documentation.htm#Interfaces"><filename>/etc/shorewall/interfaces</filename></ulink> url="manpages/shorewall-interfaces.html"><filename>/etc/shorewall/interfaces</filename></ulink>
file.</para> file.</para>
</listitem> </listitem>
@ -101,7 +101,7 @@
<para>If you don't know the subnet address in advance, you should <para>If you don't know the subnet address in advance, you should
specify <quote>detect</quote> for the interface's subnet address in specify <quote>detect</quote> for the interface's subnet address in
the <ulink the <ulink
url="Documentation.htm#Interfaces"><filename>/etc/shorewall/interfaces</filename></ulink> url="manpages/shorewall-interfaces.html"><filename>/etc/shorewall/interfaces</filename></ulink>
file and start Shorewall after the interface has started.</para> file and start Shorewall after the interface has started.</para>
</listitem> </listitem>
@ -130,7 +130,7 @@
<listitem> <listitem>
<para>Specify the <quote>dhcp</quote> option for the bridge interface <para>Specify the <quote>dhcp</quote> option for the bridge interface
in the <ulink in the <ulink
url="Documentation.htm#Interfaces"><filename>/etc/shorewall/interfaces</filename></ulink> url="manpages/shorewall-interfaces.html"><filename>/etc/shorewall/interfaces</filename></ulink>
file.&nbsp;This will generate rules that will allow DHCP to and from file.&nbsp;This will generate rules that will allow DHCP to and from
your firewall system as well as through the bridge.</para> your firewall system as well as through the bridge.</para>
</listitem> </listitem>
@ -143,7 +143,7 @@
<itemizedlist> <itemizedlist>
<listitem> <listitem>
<para>Specify the "dhcp" option (in <filename><ulink <para>Specify the "dhcp" option (in <filename><ulink
url="Documentation.htm#Interfaces">/etc/shorewall/interfaces</ulink></filename>) url="manpages/shorewall-interfaces.html">/etc/shorewall/interfaces</ulink></filename>)
on the interface facing the DHCP server and on the interfaces to be on the interface facing the DHCP server and on the interfaces to be
relayed.</para> relayed.</para>
</listitem> </listitem>

View File

@ -124,7 +124,7 @@
<listitem> <listitem>
<para>A firewall interface. This interface must have been defined in <para>A firewall interface. This interface must have been defined in
<ulink <ulink
url="Documentation.htm#Interfaces"><filename>/etc/shorewall/interfaces</filename></ulink>.</para> url="manpages/shorewall-interfaces.html"><filename>/etc/shorewall/interfaces</filename></ulink>.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>

View File

@ -52,7 +52,7 @@
<listitem> <listitem>
<para>The packet is part of an established connecection. While the <para>The packet is part of an established connecection. While the
packet can be logged using LOG rules in the ESTABLISHED section of packet can be logged using LOG rules in the ESTABLISHED section of
<ulink url="Documentation.htm#Rules">/etc/shorewall/rules</ulink>, <ulink url="manpages/shorewall-rules.html">/etc/shorewall/rules</ulink>,
that is not recommended because of the large amount of information that is not recommended because of the large amount of information
that may be logged.</para> that may be logged.</para>
</listitem> </listitem>
@ -62,14 +62,14 @@
established connection (such as a <ulink url="FTP.html">data established connection (such as a <ulink url="FTP.html">data
connection associated with an FTP control connection</ulink>). These connection associated with an FTP control connection</ulink>). These
packets may be logged using LOG rules in the RELATED section of <ulink packets may be logged using LOG rules in the RELATED section of <ulink
url="Documentation.htm#Rules">/etc/shorewall/rules</ulink>.</para> url="manpages/shorewall-rules.html">/etc/shorewall/rules</ulink>.</para>
</listitem> </listitem>
<listitem> <listitem>
<para>The packet is rejected because of an option in <ulink <para>The packet is rejected because of an option in <ulink
url="Documentation.htm#Conf">/etc/shorewall/shorewall.conf</ulink> or url="Documentation.htm#Conf">/etc/shorewall/shorewall.conf</ulink> or
<ulink <ulink
url="Documentation.htm#Interfaces">/etc/shorewall/interfaces</ulink>. url="manpages/shorewall-interfaces.html">/etc/shorewall/interfaces</ulink>.
These packets can be logged by setting the appropriate logging-related These packets can be logged by setting the appropriate logging-related
option in <ulink option in <ulink
url="Documentation.htm#Conf">/etc/shorewall/shorewall.conf</ulink>.</para> url="Documentation.htm#Conf">/etc/shorewall/shorewall.conf</ulink>.</para>
@ -77,7 +77,7 @@
<listitem> <listitem>
<para>The packet matches a rule in <ulink <para>The packet matches a rule in <ulink
url="Documentation.htm#Rules">/etc/shorewall/rules</ulink>. By url="manpages/shorewall-rules.html">/etc/shorewall/rules</ulink>. By
including a syslog level (see below) in the ACTION column of a rule including a syslog level (see below) in the ACTION column of a rule
(e.g., <quote>ACCEPT<emphasis role="bold">:info</emphasis> net $FW tcp (e.g., <quote>ACCEPT<emphasis role="bold">:info</emphasis> net $FW tcp
22</quote>), the connection attempt will be logged at that 22</quote>), the connection attempt will be logged at that
@ -87,7 +87,7 @@
<listitem> <listitem>
<para>The packet doesn't match a rule so it is handled by a policy <para>The packet doesn't match a rule so it is handled by a policy
defined in <ulink defined in <ulink
url="Documentation.htm#Policy">/etc/shorewall/policy</ulink>. These url="manpages/shorewall-policy.html">/etc/shorewall/policy</ulink>. These
may be logged by specifying a syslog level in the LOG LEVEL column of may be logged by specifying a syslog level in the LOG LEVEL column of
the policy's entry (e.g., <quote>loc net ACCEPT <emphasis the policy's entry (e.g., <quote>loc net ACCEPT <emphasis
role="bold">info</emphasis></quote>).</para> role="bold">info</emphasis></quote>).</para>

View File

@ -207,14 +207,14 @@ dmz ipv4</programlisting>
<listitem> <listitem>
<para>You express your default policy for connections from one zone to <para>You express your default policy for connections from one zone to
another zone in the <filename><ulink another zone in the <filename><ulink
url="Documentation.htm#Policy">/etc/shorewall/policy</ulink></filename> url="manpages/shorewall-policy.html">/etc/shorewall/policy</ulink></filename>
file.</para> file.</para>
</listitem> </listitem>
<listitem> <listitem>
<para>You define exceptions to those default policies in the <para>You define exceptions to those default policies in the
<filename><ulink <filename><ulink
url="Documentation.htm#Rules">/etc/shorewall/rules</ulink></filename>.</para> url="manpages/shorewall-rules.html">/etc/shorewall/rules</ulink></filename>.</para>
</listitem> </listitem>
</itemizedlist> </itemizedlist>
@ -343,7 +343,7 @@ all all REJECT info</programlisting>
<para>The simplest way to define zones is to associate the zone name <para>The simplest way to define zones is to associate the zone name
(previously defined in /etc/shorewall/zones) with a network interface. (previously defined in /etc/shorewall/zones) with a network interface.
This is done in the <ulink This is done in the <ulink
url="Documentation.htm#Interfaces">/etc/shorewall/interfaces</ulink> file. url="manpages/shorewall-interfaces.html">/etc/shorewall/interfaces</ulink> file.
The firewall illustrated above has three network interfaces. Where The firewall illustrated above has three network interfaces. Where
Internet connectivity is through a cable or DSL <quote>Modem</quote>, the Internet connectivity is through a cable or DSL <quote>Modem</quote>, the
<emphasis>External Interface</emphasis> will be the Ethernet adapter that <emphasis>External Interface</emphasis> will be the Ethernet adapter that
@ -413,7 +413,7 @@ all all REJECT info</programlisting>
<para>The Shorewall default configuration does not define the contents of <para>The Shorewall default configuration does not define the contents of
any zone. To define the above configuration using the <ulink any zone. To define the above configuration using the <ulink
url="Documentation.htm#Interfaces">/etc/shorewall/interfaces </ulink>file, url="manpages/shorewall-interfaces.html">/etc/shorewall/interfaces </ulink>file,
that file would might contain:</para> that file would might contain:</para>
<programlisting>#ZONE INTERFACE BROADCAST OPTIONS <programlisting>#ZONE INTERFACE BROADCAST OPTIONS
@ -1407,7 +1407,7 @@ eth0 192.168.201.0/29 192.0.2.176</programlisting>
system <quote>Local 3</quote>. You could allow connections to the system <quote>Local 3</quote>. You could allow connections to the
internet to her server by adding the following entry in internet to her server by adding the following entry in
<filename><ulink <filename><ulink
url="Documentation.htm#Rules">/etc/shorewall/rules</ulink></filename>:</para> url="manpages/shorewall-rules.html">/etc/shorewall/rules</ulink></filename>:</para>
<programlisting>#ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL <programlisting>#ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL
# PORT(S) PORT(S) DEST # PORT(S) PORT(S) DEST

View File

@ -244,13 +244,13 @@ net ipv4</programlisting>
<listitem> <listitem>
<para>You express your default policy for connections from one zone to <para>You express your default policy for connections from one zone to
another zone in the <ulink another zone in the <ulink
url="Documentation.htm#Policy"><filename>/etc/shorewall/policy</filename></ulink> url="manpages/shorewall-policy.html"><filename>/etc/shorewall/policy</filename></ulink>
file.</para> file.</para>
</listitem> </listitem>
<listitem> <listitem>
<para>You define exceptions to those default policies in the <ulink <para>You define exceptions to those default policies in the <ulink
url="Documentation.htm#Rules"><filename>/etc/shorewall/rules</filename></ulink> url="manpages/shorewall-rules.html"><filename>/etc/shorewall/rules</filename></ulink>
file.</para> file.</para>
</listitem> </listitem>
</itemizedlist> </itemizedlist>

View File

@ -250,13 +250,13 @@ net ipv4</programlisting>
<listitem> <listitem>
<para>Вы отражаете Вашу политику по умолчанию для соединений из одной <para>Вы отражаете Вашу политику по умолчанию для соединений из одной
зоны в другую в файле<ulink зоны в другую в файле<ulink
url="Documentation.htm#Policy"><filename>/etc/shorewall/policy</filename></ulink>.</para> url="manpages/shorewall-policy.html"><filename>/etc/shorewall/policy</filename></ulink>.</para>
</listitem> </listitem>
<listitem> <listitem>
<para>Вы определяете исключения из политики по умолчанию в файле <para>Вы определяете исключения из политики по умолчанию в файле
<ulink <ulink
url="Documentation.htm#Rules"><filename>/etc/shorewall/rules</filename></ulink>.</para> url="manpages/shorewall-rules.html"><filename>/etc/shorewall/rules</filename></ulink>.</para>
</listitem> </listitem>
</itemizedlist> </itemizedlist>

View File

@ -270,13 +270,13 @@ dmz ipv4</programlisting>
<listitem> <listitem>
<para>Вы отражаете Вашу политику по умолчанию для соединений из одной <para>Вы отражаете Вашу политику по умолчанию для соединений из одной
зоны в другую в файле<ulink зоны в другую в файле<ulink
url="Documentation.htm#Policy"><filename>/etc/shorewall/policy</filename></ulink>.</para> url="manpages/shorewall-policy.html"><filename>/etc/shorewall/policy</filename></ulink>.</para>
</listitem> </listitem>
<listitem> <listitem>
<para>Вы определяете исключения из политики по умолчанию в файле <para>Вы определяете исключения из политики по умолчанию в файле
<ulink <ulink
url="Documentation.htm#Rules"><filename>/etc/shorewall/rules</filename></ulink>.</para> url="manpages/shorewall-rules.html"><filename>/etc/shorewall/rules</filename></ulink>.</para>
</listitem> </listitem>
</itemizedlist> </itemizedlist>

View File

@ -214,7 +214,7 @@ gateway:~/test # </programlisting>A look at /var/lib/shorewall/restore at line
configuration if you specify the <emphasis configuration if you specify the <emphasis
role="bold">arp_filter</emphasis> option or the <emphasis role="bold">arp_filter</emphasis> option or the <emphasis
role="bold">arp_ignore</emphasis> option in <filename><ulink role="bold">arp_ignore</emphasis> option in <filename><ulink
url="Documentation.htm#Interfaces">/etc/shorewall/interfaces</ulink></filename> url="manpages/shorewall-interfaces.html">/etc/shorewall/interfaces</ulink></filename>
for all interfaces connected to the common hub/switch. <emphasis for all interfaces connected to the common hub/switch. <emphasis
role="bold">Using such a setup with a production firewall is strongly role="bold">Using such a setup with a production firewall is strongly
recommended against</emphasis>.</para> recommended against</emphasis>.</para>
@ -467,7 +467,7 @@ Ping/DROP net all</programlisting>
zone to or from the destination zone or you haven't set the zone to or from the destination zone or you haven't set the
<emphasis role="bold">routeback</emphasis> option for the <emphasis role="bold">routeback</emphasis> option for the
interface in <ulink interface in <ulink
url="Documentation.htm#Interfaces"><filename>/etc/shorewall/interfaces</filename></ulink>.</para> url="manpages/shorewall-interfaces.html"><filename>/etc/shorewall/interfaces</filename></ulink>.</para>
</listitem> </listitem>
<listitem> <listitem>

View File

@ -249,14 +249,14 @@ loc ipv4</programlisting>Zones are defined in the <ulink
<listitem> <listitem>
<para>You express your default policy for connections from one zone <para>You express your default policy for connections from one zone
to another zone in the <ulink to another zone in the <ulink
url="Documentation.htm#Policy"><filename url="manpages/shorewall-policy.html"><filename
class="directory">/etc/shorewall/</filename><filename>policy</filename></ulink> class="directory">/etc/shorewall/</filename><filename>policy</filename></ulink>
file.</para> file.</para>
</listitem> </listitem>
<listitem> <listitem>
<para>You define exceptions to those default policies in the <ulink <para>You define exceptions to those default policies in the <ulink
url="Documentation.htm#Rules"><filename url="manpages/shorewall-rules.html"><filename
class="directory">/etc/shorewall/</filename><filename>rules</filename></ulink> class="directory">/etc/shorewall/</filename><filename>rules</filename></ulink>
file.</para> file.</para>
</listitem> </listitem>

View File

@ -257,13 +257,13 @@ loc ipv4</programlisting>
<listitem> <listitem>
<para>Вы отражаете Вашу политику по умолчанию для соединений из одной <para>Вы отражаете Вашу политику по умолчанию для соединений из одной
зоны в другую в файле<ulink зоны в другую в файле<ulink
url="Documentation.htm#Policy"><filename>/etc/shorewall/policy</filename></ulink>.</para> url="manpages/shorewall-policy.html"><filename>/etc/shorewall/policy</filename></ulink>.</para>
</listitem> </listitem>
<listitem> <listitem>
<para>Вы определяете исключения из политики по умолчанию в файле <para>Вы определяете исключения из политики по умолчанию в файле
<ulink <ulink
url="Documentation.htm#Rules"><filename>/etc/shorewall/rules</filename></ulink>.</para> url="manpages/shorewall-rules.html"><filename>/etc/shorewall/rules</filename></ulink>.</para>
</listitem> </listitem>
</itemizedlist> </itemizedlist>