diff --git a/Shorewall-docs/whitelisting_under_shorewall.htm b/Shorewall-docs/whitelisting_under_shorewall.htm deleted file mode 100644 index b23f190a7..000000000 --- a/Shorewall-docs/whitelisting_under_shorewall.htm +++ /dev/null @@ -1,267 +0,0 @@ - - -
- - - - -For a brief time, the 1.2 version of Shorewall -supported -an /etc/shorewall/whitelist file. This file was intended to contain a -list -of IP addresses of hosts whose POLICY to all zones was ACCEPT. The -whitelist file was implemented as a stop-gap measure until the -facilities necessary for implementing white lists using zones was in -place. As of Version 1.3 RC1, those facilities were available.
-White lists are most often used to give special -privileges to a set of hosts within an organization. Let us -suppose that we have the following environment:
-The basic approach will be that we will place the -operations staff's class C in its own zone called ops. Here are -the appropriate configuration files:
---- -
-- -ZONE -DISPLAY -COMMENTS -- -net -Net -Internet -- -ops -Operations -Operations Staff's Class C -- -loc -Local -Local Class B -- - -dmz -DMZ -Demilitarized zone -
The ops zone has been added to the standard 3-zone zones -file -- since ops is a sub-zone of loc, we list it BEFORE -loc.
---- -
-- -ZONE -INTERFACE -BROADCAST -OPTIONS -- -net -eth0 -<whatever> -<options> -- -dmz -eth1 -<whatever> --
-- - -- -eth2 -10.10.255.255 --
Because eth2 interfaces to two zones (ops and loc), -we don't specify a zone for it here.
---- -
-- -ZONE -HOST(S) -OPTIONS -- -ops -eth2:10.10.10.0/24 --
-- - -loc -eth2:0.0.0.0/0 --
Here we define the ops and loc zones. When Shorewall -is stopped, -only the hosts in the ops zone will be allowed to access the -firewall -and the DMZ. I use 0.0.0.0/0 to define the loc zone rather than -10.10.0.0/16 -so that the limited broadcast address (255.255.255.255) falls into that -zone. If I used 10.10.0.0/16 then I would have to have a separate entry -for that special address.
---- -
-- -SOURCE -DEST -POLICY -LOG LEVEL -LIMIT:BURST -- -ops -all -ACCEPT -- - - -all -ops -CONTINUE -- - - -loc -net -ACCEPT -- - - -net -all -DROP -info -- - - -all -all -REJECT -info --
Two entries for ops have been added to the standard 3-zone -policy file.
---- -
-- -ACTION -SOURCE -DEST -PROTO -DEST -
-PORT(S)SOURCE -
-PORT(S)ORIGINAL -
-DEST- -REDIRECT -loc!ops -3128 -tcp -http -- - - - -... -- - - - - -
This is the rule that transparently redirects web traffic to the -transparent proxy running on the firewall. The SOURCE column explicitly -excludes the ops zone from the rule.
---- -
-- -INTERFACE -
-HOST(S) -- -eth1 -
--
-- - -eth2 -
-10.10.10.0/24 -
-
Updated 2/18/2003 - Tom Eastep -
-Copyright -© 2002, 2003Thomas M. Eastep.
-