diff --git a/Shorewall-docs2/ports.xml b/Shorewall-docs2/ports.xml
index 35fd778a0..900f34532 100644
--- a/Shorewall-docs2/ports.xml
+++ b/Shorewall-docs2/ports.xml
@@ -13,7 +13,7 @@
- 2005-09-02
+ 2005-09-07
2001-2005
@@ -49,7 +49,7 @@
Important Notes
- Shorewall distribution contains a library of user-defined macros
+ Shorewall distribution contains a library of user-defined macros
that allow for easily allowing or blocking a particular application.
Check your /usr/share/shorewall/actions.std file
for a list of macros in your distribution. If you find what you need,
@@ -164,6 +164,31 @@ FTP/ACCEPT <source> <destination>
information.
+
+ Gnutella
+
+
+
+ The internal machine running a Gnutella Client has IP address
+ 192.168.1.4.
+
+
+
+ You use Masquerading or SNAT for the local network.
+
+
+
+ The zones are named as they are in the two- and three-interface
+ QuickStart guides).
+
+
+
+ Your loc->net policy is ACCEPT
+
+ Gnutella/DNAT net loc:192.168.1.4
+
+
ICQ/AIM
@@ -211,15 +236,14 @@ ACCEPT <z1>:<list of client IPs> NTP (Network Time Protocol)
#ACTION SOURCE DESTINATION PROTO DEST PORT(S)
-ACCEPT <source> <destination> udp 123
+NTP/ACCEPT <source> <destination>
PCAnywhere
#ACTION SOURCE DESTINATION PROTO DEST PORT(S)
-ACCEPT <source> <destination> udp 5632
-ACCEPT <source> <destination> tcp 5631
+PCA/ACCEPT <source> <destination>
@@ -233,8 +257,7 @@ ACCEPT <source> <destination>TCP Port 110 (Secure Pop3 is TCP Port 995)
#ACTION SOURCE DESTINATION PROTO DEST PORT(S)
-ACCEPT <source> <destination> tcp 110 #Unsecure Pop3
-ACCEPT <source> <destination> tcp 995 #Secure Pop3
+POP3/ACCEPT <source> <destination> # Secure & Unsecure Pop3
@@ -252,14 +275,14 @@ ACCEPT <source> <destination>rdate
#ACTION SOURCE DESTINATION PROTO DEST PORT(S)
-ACCEPT <source> <destination> tcp 37
+Rdate/ACCEPT <source> <destination>
rsync
#ACTION SOURCE DESTINATION PROTO DEST PORT(S)
-ACCEPT <source> <destination> tcp 873
+Rsync/ACCEPT <source> <destination>
@@ -273,10 +296,8 @@ SSH/ACCEPT <source> <destination>SMB/NMB (Samba/Windows Browsing/File Sharing)
#ACTION SOURCE DESTINATION PROTO DEST PORT(S)
-ACCEPT <source> <destination> tcp 137,139,445
-ACCEPT <source> <destination> udp 137:139
-ACCEPT <destination> <source> tcp 137,139,445
-ACCEPT <destination> <source> udp 137:139
+SMB/ACCEPT <source> <destination>
+SMB/ACCEPT <destination> <source>
Also, see this page.
@@ -285,7 +306,7 @@ ACCEPT <destination> <source>SMTP
#ACTION SOURCE DESTINATION PROTO DEST PORT(S)
-ACCEPT <source> <destination> tcp 25 #Insecure SMTP
+SMTP/ACCEPT<source> <destination> #Insecure SMTP
ACCEPT <source> <destination> tcp 465 #SMTP over SSL (TLS)
@@ -293,15 +314,14 @@ ACCEPT <source> <destination>SNMP
#ACTION SOURCE DESTINATION PROTO DEST PORT(S)
-ACCEPT <source> <destination> udp 161:162
-ACCEPT <source> <destination> tcp 161
+SNMP/ACCEPT <source> <destination>
Telnet
#ACTION SOURCE DESTINATION PROTO DEST PORT(S)
-ACCEPT <source> <destination> tcp 23
+Telnet/ACCEPT <source> <destination>
@@ -325,8 +345,7 @@ ACCEPT <source> <destination>Traceroute
#ACTION SOURCE DESTINATION PROTO DEST PORT(S)
-ACCEPT <source> <destination> udp 33434:33443 #Good for 10 hops
-ACCEPT <source> <destination> icmp 8
+Trcrt/ACCEPT <source> <destination> #Good for 10 hops
UDP traceroute uses ports 33434 through 33434+<max number of
hops>-1. Note that for the firewall to respond with a TTL expired ICMP
@@ -345,7 +364,7 @@ ACCEPT fw ...
Usenet (NNTP)
#ACTION SOURCE DESTINATION PROTO DEST PORT(S)
-ACCEPT <source> <destination> tcp 119
+NNTP/ACCEPT <source> <destination>
TCP Port 119
@@ -367,7 +386,7 @@ ACCEPT <source> <destination>Vncserver to Vncviewer in listen mode -- TCP port 5500.
#ACTION SOURCE DESTINATION PROTO DEST PORT(S)
-ACCEPT <source> <destination> tcp 5500
+VNCL/ACCEPT <source> <destination>
@@ -386,8 +405,7 @@ ACCEPT <source> <destination>Web Access
#ACTION SOURCE DESTINATION PROTO DEST PORT(S)
-ACCEPT <source> <destination> tcp 80 #Insecure HTTP
-ACCEPT <source> <destination> tcp 443 #Secure HTTP
+Web/ACCEPT <source> <destination> #Insecure HTTP& Secure HTTP