Improve documentation of HIGH_ROUTE_MARKS in the configuration files

git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@3855 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
teastep 2006-05-03 21:35:25 +00:00
parent 9f49b4864a
commit 412766ba52
2 changed files with 9 additions and 7 deletions

View File

@ -24,9 +24,10 @@
# file to direct packets to this provider. # file to direct packets to this provider.
# #
# If HIGH_ROUTE_MARKS=Yes in shorewall.conf, then the # If HIGH_ROUTE_MARKS=Yes in shorewall.conf, then the
# value must between 0x0100 and 0xff00 and the # value must be a multiple of 256 between 256 and 65280
# low-order byte of the value must be zero. Otherwise, # or their hexadecimal equivalents (0x0100 and 0xff00
# the value must be between 1 and 255. # with the low-order byte of the value being zero).
# Otherwise, the value must be between 1 and 255.
# #
# DUPLICATE The name of an existing table to duplicate. May be # DUPLICATE The name of an existing table to duplicate. May be
# 'main' or the name of a previous provider. # 'main' or the name of a previous provider.

View File

@ -860,10 +860,11 @@ IMPLICIT_CONTINUE=Yes
# #
# Normally, Shorewall restricts the set of mark values to 1-255. If you set # Normally, Shorewall restricts the set of mark values to 1-255. If you set
# HIGH_ROUTE_MARKS=Yes, Shorewall will rather restrict the set of routing # HIGH_ROUTE_MARKS=Yes, Shorewall will rather restrict the set of routing
# mark values (those specified in the /etc/shorewall/providers file) from # mark values (those specified in the /etc/shorewall/providers file) to
# 0x0100 to 0XFF00 (with the low-order byte being zero). This allows # a multiple of 256 (256 to 65280) or their hexadecimal equivalents
# connection marks to be shared between traffic shaping and policy routing # (0x0100 to 0xff00, with the low-order byte of the value being zero).
# (traffic shaping marks are always restricted to 1-255). # This allows connection marks to be shared between traffic shaping and
# policy routing. Traffic shaping marks are always restricted to 1-255.
# #
# Setting HIGH_ROUTE_MARKS=Yes requires that your kernel and iptables support # Setting HIGH_ROUTE_MARKS=Yes requires that your kernel and iptables support
# both the extended CONNMARK target and the extended connmark match # both the extended CONNMARK target and the extended connmark match