From 40f8a9b0445b156341213285962c539264fc12ef Mon Sep 17 00:00:00 2001 From: judas_iscariote Date: Thu, 8 Sep 2005 01:32:28 +0000 Subject: [PATCH] some updates :-) git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@2641 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb --- Shorewall-docs2/ports.xml | 64 +++++++++++++++++++++++++-------------- 1 file changed, 41 insertions(+), 23 deletions(-) diff --git a/Shorewall-docs2/ports.xml b/Shorewall-docs2/ports.xml index 35fd778a0..900f34532 100644 --- a/Shorewall-docs2/ports.xml +++ b/Shorewall-docs2/ports.xml @@ -13,7 +13,7 @@ - 2005-09-02 + 2005-09-07 2001-2005 @@ -49,7 +49,7 @@ Important Notes - Shorewall distribution contains a library of user-defined macros + Shorewall distribution contains a library of user-defined macros that allow for easily allowing or blocking a particular application. Check your /usr/share/shorewall/actions.std file for a list of macros in your distribution. If you find what you need, @@ -164,6 +164,31 @@ FTP/ACCEPT <source> <destination> information. +
+ Gnutella + + + + The internal machine running a Gnutella Client has IP address + 192.168.1.4. + + + + You use Masquerading or SNAT for the local network. + + + + The zones are named as they are in the two- and three-interface + QuickStart guides). + + + + Your loc->net policy is ACCEPT + + Gnutella/DNAT net loc:192.168.1.4 +
+
ICQ/AIM @@ -211,15 +236,14 @@ ACCEPT <z1>:<list of client IPs> NTP (Network Time Protocol) #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> udp 123 +NTP/ACCEPT <source> <destination>
<trademark>PCAnywhere</trademark> #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> udp 5632 -ACCEPT <source> <destination> tcp 5631 +PCA/ACCEPT <source> <destination>
@@ -233,8 +257,7 @@ ACCEPT <source> <destination>TCP Port 110 (Secure Pop3 is TCP Port 995) #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> tcp 110 #Unsecure Pop3 -ACCEPT <source> <destination> tcp 995 #Secure Pop3 +POP3/ACCEPT <source> <destination> # Secure & Unsecure Pop3
@@ -252,14 +275,14 @@ ACCEPT <source> <destination>rdate #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> tcp 37 +Rdate/ACCEPT <source> <destination>
rsync #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> tcp 873 +Rsync/ACCEPT <source> <destination>
@@ -273,10 +296,8 @@ SSH/ACCEPT <source> <destination>SMB/NMB (Samba/Windows Browsing/File Sharing) #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> tcp 137,139,445 -ACCEPT <source> <destination> udp 137:139 -ACCEPT <destination> <source> tcp 137,139,445 -ACCEPT <destination> <source> udp 137:139 +SMB/ACCEPT <source> <destination> +SMB/ACCEPT <destination> <source> Also, see this page.
@@ -285,7 +306,7 @@ ACCEPT <destination> <source>SMTP #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> tcp 25 #Insecure SMTP +SMTP/ACCEPT<source> <destination> #Insecure SMTP ACCEPT <source> <destination> tcp 465 #SMTP over SSL (TLS) @@ -293,15 +314,14 @@ ACCEPT <source> <destination>SNMP #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> udp 161:162 -ACCEPT <source> <destination> tcp 161 +SNMP/ACCEPT <source> <destination>
Telnet #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> tcp 23 +Telnet/ACCEPT <source> <destination>
@@ -325,8 +345,7 @@ ACCEPT <source> <destination>Traceroute #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> udp 33434:33443 #Good for 10 hops -ACCEPT <source> <destination> icmp 8 +Trcrt/ACCEPT <source> <destination> #Good for 10 hops UDP traceroute uses ports 33434 through 33434+<max number of hops>-1. Note that for the firewall to respond with a TTL expired ICMP @@ -345,7 +364,7 @@ ACCEPT fw ... Usenet (NNTP) #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> tcp 119 +NNTP/ACCEPT <source> <destination> TCP Port 119
@@ -367,7 +386,7 @@ ACCEPT <source> <destination>Vncserver to Vncviewer in listen mode -- TCP port 5500.
#ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> tcp 5500 +VNCL/ACCEPT <source> <destination>
@@ -386,8 +405,7 @@ ACCEPT <source> <destination>Web Access #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> tcp 80 #Insecure HTTP -ACCEPT <source> <destination> tcp 443 #Secure HTTP +Web/ACCEPT <source> <destination> #Insecure HTTP& Secure HTTP