diff --git a/Shorewall-docsN/errata.xml b/Shorewall-docsN/errata.xml
index 68c5852c0..f513184fb 100644
--- a/Shorewall-docsN/errata.xml
+++ b/Shorewall-docsN/errata.xml
@@ -13,7 +13,7 @@
- 2004-07-02
+ 2004-07-06
2001-2004
@@ -87,6 +87,22 @@
Problems in Version 2.0
+
+ Shorewall 2.0.2 and all Shorewall 2.0.3 Releases.
+
+
+
+ DNAT rules with fw as the
+ source zone and that specify logging cause shorewall start
+ to fail with an iptables error. The problem is corrected for
+ Shorewall 2.0.3 users in this
+ firewall script which may be installed in
+ /usr/share/shorewall/firewall as described above.
+
+
+
+
Shorewall 2.0.3a and 2.0.3b
@@ -103,7 +119,7 @@
- These problems are corrected in Shorewall version 2.0.3c.
+ The above problems are corrected in Shorewall version 2.0.3c.
diff --git a/Shorewall-docsN/myfiles.xml b/Shorewall-docsN/myfiles.xml
index 992f9fdfc..bcaf6eb32 100644
--- a/Shorewall-docsN/myfiles.xml
+++ b/Shorewall-docsN/myfiles.xml
@@ -15,7 +15,7 @@
- 2004-06-25
+ 2004-07-04
2001-2004
@@ -42,12 +42,12 @@
address. If you have just a single public IP address, most of what you
see here won't apply to your setup so beware of copying parts of
this configuration and expecting them to work for you. What you copy may
- or may not work in your configuration.
+ or may not work for you.
The configuration shown here corresponds to Shorewall version
- 2.0.1. My configuration uses features not available in earlier Shorewall
+ 2.0.3. My configuration uses features not available in earlier Shorewall
releases.
@@ -69,7 +69,7 @@
I use one-to-one NAT for EastepLaptop (My work system -- Windows
- XP SP2). Internal address 192.168.1.7 and external address
+ XP SP1). Internal address 192.168.1.7 and external address
206.124.146.180.
@@ -99,7 +99,7 @@
The firewall runs on a 256MB PII/233 with Debian Sarge (Testing).
- Wookie and Ursa run Samba and the Wookie acts as a WINS server.
+ Wookie and Ursa run Samba and Wookie acts as a WINS server.
The wireless network connects to Wookie's eth2 via a LinkSys
WAP11. In additional to using the rather weak WEP 40-bit
@@ -124,7 +124,7 @@
desktop environment installed and that desktop environment is available
via XDMCP from the local zone. For the most part though, X tunneled
through SSH is used for server administration and the server runs at run
- level 3 (multi-user console mode on RedHat).
+ level 3 (multi-user console mode on Fedora).
I run an SNMP server on my firewall to serve MRTG running
@@ -190,7 +190,7 @@ TCP_FLAGS_DISPOSITION=DROP
MIRRORS=<list of shorewall mirror ip addresses>
NTPSERVERS=<list of the NTP servers I sync with>
-TEXAS=<ip address of gateway in Dallas>
+TEXAS=<ip address of gateway in Plano>
LOG=info
@@ -203,7 +203,7 @@ LOG=info
net Internet Internet
dmz DMZ Demilitarized zone
loc Local Local networks
-tx Texas Peer Network in Dallas
+tx Texas Peer Network in Plano
#LAST LINE -- ADD YOUR ENTRIES ABOVE THIS ONE - DO NOT REMOVE