mirror of
https://gitlab.com/shorewall/code.git
synced 2025-01-05 13:08:50 +01:00
Document third argument to add_rule()
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@7468 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
parent
c10d7d7155
commit
508fbf0d45
@ -240,8 +240,7 @@
|
|||||||
<entry><ulink url="two-interface.htm#DNAT">Port
|
<entry><ulink url="two-interface.htm#DNAT">Port
|
||||||
Forwarding</ulink></entry>
|
Forwarding</ulink></entry>
|
||||||
|
|
||||||
<entry><ulink url="whitelisting_under_shorewall.htm">White List
|
<entry><ulink url="VPN.htm">VPN Passthrough</ulink></entry>
|
||||||
Creation</ulink></entry>
|
|
||||||
</row>
|
</row>
|
||||||
|
|
||||||
<row>
|
<row>
|
||||||
@ -250,8 +249,8 @@
|
|||||||
|
|
||||||
<entry><ulink url="ports.htm">Port Information</ulink></entry>
|
<entry><ulink url="ports.htm">Port Information</ulink></entry>
|
||||||
|
|
||||||
<entry><ulink url="XenMyWay.html">Xen - Shorewall in a Bridged Xen
|
<entry><ulink url="whitelisting_under_shorewall.htm">White List
|
||||||
DomU</ulink></entry>
|
Creation</ulink></entry>
|
||||||
</row>
|
</row>
|
||||||
|
|
||||||
<row>
|
<row>
|
||||||
@ -261,8 +260,8 @@
|
|||||||
<entry><ulink url="PortKnocking.html">Port Knocking and Other Uses
|
<entry><ulink url="PortKnocking.html">Port Knocking and Other Uses
|
||||||
of the 'Recent Match'</ulink></entry>
|
of the 'Recent Match'</ulink></entry>
|
||||||
|
|
||||||
<entry><ulink url="XenMyWay-Routed.html">Xen - Shorewall in Routed
|
<entry><ulink url="XenMyWay.html">Xen - Shorewall in a Bridged Xen
|
||||||
Xen Dom0</ulink></entry>
|
DomU</ulink></entry>
|
||||||
</row>
|
</row>
|
||||||
|
|
||||||
<row>
|
<row>
|
||||||
@ -270,7 +269,8 @@
|
|||||||
|
|
||||||
<entry><ulink url="PPTP.htm">PPTP</ulink></entry>
|
<entry><ulink url="PPTP.htm">PPTP</ulink></entry>
|
||||||
|
|
||||||
<entry></entry>
|
<entry><ulink url="XenMyWay-Routed.html">Xen - Shorewall in Routed
|
||||||
|
Xen Dom0</ulink></entry>
|
||||||
</row>
|
</row>
|
||||||
|
|
||||||
<row>
|
<row>
|
||||||
|
29
docs/VPN.xml
29
docs/VPN.xml
@ -5,7 +5,7 @@
|
|||||||
<!--$Id$-->
|
<!--$Id$-->
|
||||||
|
|
||||||
<articleinfo>
|
<articleinfo>
|
||||||
<title>VPN</title>
|
<title>VPN Passthrough</title>
|
||||||
|
|
||||||
<authorgroup>
|
<authorgroup>
|
||||||
<author>
|
<author>
|
||||||
@ -53,17 +53,17 @@
|
|||||||
system has IP address 192.168.1.12 and that the remote gateway has IP
|
system has IP address 192.168.1.12 and that the remote gateway has IP
|
||||||
address 192.0.2.224.</para>
|
address 192.0.2.224.</para>
|
||||||
|
|
||||||
<para>If PPTP is being used, there are no firewall requirements beyond the
|
<para>If PPTP is being used and you need to have two or more local systems
|
||||||
default loc->net ACCEPT policy. There is one restriction however: Only
|
connected to the same remote server at the same time, then you should be
|
||||||
one local system at a time can be connected to a single remote gateway
|
sure that the PPTP helpers modules are loaded (ip_conntrack_pptp and
|
||||||
unless you patch your kernel from the <quote>Patch-o-matic</quote> patches
|
ip_nat_pptp or nf_conntrack_pptp and nf_nat_pptp). Using the default
|
||||||
available at <ulink
|
modules file, Shorewall (Lite) will attempt to load these modules when
|
||||||
url="http://www.netfilter.org">http://www.netfilter.org</ulink>.</para>
|
Shorewall (Lite) is started.</para>
|
||||||
|
|
||||||
<para>If IPSEC is being used, you should configure IPSEC to use
|
<para>If IPSEC is being used, you should configure IPSEC to use
|
||||||
<firstterm>NAT Traversal</firstterm> -- Under NAT traversal the IPSEC
|
<firstterm>NAT Traversal</firstterm> -- Under NAT traversal the IPSEC
|
||||||
packets (protocol 50 or 51) are encapsulated in UDP packets with
|
packets (protocol 50 or 51) are encapsulated in UDP packets (normally with
|
||||||
destination port 4500. Additionally, <firstterm>keep-alive
|
destination port 4500). Additionally, <firstterm>keep-alive
|
||||||
messages</firstterm> are sent frequently so that NATing gateways between
|
messages</firstterm> are sent frequently so that NATing gateways between
|
||||||
the end-points will retain their connection-tracking entries. This is the
|
the end-points will retain their connection-tracking entries. This is the
|
||||||
way that I connect to the HP Intranet and it works flawlessly without
|
way that I connect to the HP Intranet and it works flawlessly without
|
||||||
@ -72,9 +72,10 @@
|
|||||||
of Windows XP -- simply select "L2TP IPSec VPN" from the "Type of VPN"
|
of Windows XP -- simply select "L2TP IPSec VPN" from the "Type of VPN"
|
||||||
pulldown.</para>
|
pulldown.</para>
|
||||||
|
|
||||||
<para>Alternatively, if IPSEC is being used then you can try the
|
<para>Alternatively, if you have an IPSEC gateway behind your firewall
|
||||||
following: only one system may connect to the remote gateway and there are
|
then you can try the following: only one system may connect to the remote
|
||||||
firewall configuration requirements as follows:</para>
|
gateway and there are firewall configuration requirements as
|
||||||
|
follows:</para>
|
||||||
|
|
||||||
<table id="Table1">
|
<table id="Table1">
|
||||||
<title>/etc/shorewall/rules</title>
|
<title>/etc/shorewall/rules</title>
|
||||||
@ -196,7 +197,7 @@
|
|||||||
<para>If you want to be able to give access to all of your local systems
|
<para>If you want to be able to give access to all of your local systems
|
||||||
to the remote network, you should consider running a VPN client on your
|
to the remote network, you should consider running a VPN client on your
|
||||||
firewall. As starting points, see <ulink
|
firewall. As starting points, see <ulink
|
||||||
url="manpages/shorewall-tunnels.html">The /etc/shorewall/tunnels manpage</ulink>
|
url="manpages/shorewall-tunnels.html">The /etc/shorewall/tunnels
|
||||||
or <ulink url="PPTP.htm">http://www.shorewall.net/PPTP.htm</ulink>.</para>
|
manpage</ulink>.</para>
|
||||||
</section>
|
</section>
|
||||||
</article>
|
</article>
|
@ -412,8 +412,15 @@ esac</programlisting><caution>
|
|||||||
<member><<emphasis>the rule</emphasis>> is a scalar argument
|
<member><<emphasis>the rule</emphasis>> is a scalar argument
|
||||||
holding the rule text. Do not include "-A <<emphasis>chain
|
holding the rule text. Do not include "-A <<emphasis>chain
|
||||||
name</emphasis>>"</member>
|
name</emphasis>>"</member>
|
||||||
</simplelist>Example:<programlisting>add_rule( $chainref, '-j ACCEPT' );</programlisting>To
|
</simplelist>Example:<programlisting>add_rule( $chainref, '-j ACCEPT' );</programlisting></para>
|
||||||
insert a rule into the chain:<programlisting> insert_rule( $chainref, <<emphasis>rulenum</emphasis>>, <<emphasis>the rule</emphasis>> );</programlisting>The
|
|
||||||
|
<para>Beginning with Shorewall 4.0.5, add_rule() accepts an optional
|
||||||
|
third argument; If that argument evaluates to true and the passed rule
|
||||||
|
contains a --dports list with more than 15 ports (a port range counts as
|
||||||
|
two ports), the rule will be split into multiple rules where each
|
||||||
|
resulting rule has 15 or fewer ports in its --dports list.</para>
|
||||||
|
|
||||||
|
<para>To insert a rule into the chain:<programlisting> insert_rule( $chainref, <<emphasis>rulenum</emphasis>>, <<emphasis>the rule</emphasis>> );</programlisting>The
|
||||||
<emphasis role="bold">log_rule_limit()</emphasis> function works like it
|
<emphasis role="bold">log_rule_limit()</emphasis> function works like it
|
||||||
does in the shell compiler with three exceptions:<itemizedlist>
|
does in the shell compiler with three exceptions:<itemizedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
|
Loading…
Reference in New Issue
Block a user