Documentation updates

git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@1699 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
teastep 2004-10-17 22:34:23 +00:00
parent db932e0b16
commit 67751bbedf
6 changed files with 3583 additions and 3577 deletions

View File

@ -15,7 +15,7 @@
</author> </author>
</authorgroup> </authorgroup>
<pubdate>2004-07-20</pubdate> <pubdate>2004-10-17</pubdate>
<copyright> <copyright>
<year>2003-2004</year> <year>2003-2004</year>
@ -29,7 +29,8 @@
1.2 or any later version published by the Free Software Foundation; with 1.2 or any later version published by the Free Software Foundation; with
no Invariant Sections, with no Front-Cover, and with no Back-Cover no Invariant Sections, with no Front-Cover, and with no Back-Cover
Texts. A copy of the license is included in the section entitled Texts. A copy of the license is included in the section entitled
<quote><ulink url="GnuCopyright.htm">GNU Free Documentation License</ulink></quote>.</para> <quote><ulink url="GnuCopyright.htm">GNU Free Documentation
License</ulink></quote>.</para>
</legalnotice> </legalnotice>
</articleinfo> </articleinfo>
@ -43,6 +44,13 @@
<section> <section>
<title>Squid as a Transparent Proxy</title> <title>Squid as a Transparent Proxy</title>
<important>
<para>This section gives instructions for transparent proxying of HTTP.
HTTPS (normally TCP port 443) <emphasis role="bold">cannot</emphasis> be
proxied transparently (stop and think about it for a minute; if HTTPS
could be transparently proxied, then how secure would it be?).</para>
</important>
<caution> <caution>
<para>Please observe the following general requirements:</para> <para>Please observe the following general requirements:</para>
@ -55,8 +63,8 @@
<listitem> <listitem>
<para>The following instructions mention the files <para>The following instructions mention the files
/etc/shorewall/start and /etc/shorewall/init -- if you don&#39;t /etc/shorewall/start and /etc/shorewall/init -- if you don't have
have those files, siimply create them.</para> those files, siimply create them.</para>
</listitem> </listitem>
<listitem> <listitem>
@ -84,8 +92,9 @@ MANGLE_ENABLED=Yes</programlisting>
<caution> <caution>
<para>In the instructions below, only TCP Port 80 is opened from the <para>In the instructions below, only TCP Port 80 is opened from the
system running Squid to the internet. If your users require browsing system running Squid to the internet. If your users require browsing
sites that use a port other than 80 (e.g., http://www.domain.tld:<emphasis sites that use a port other than 80 (e.g.,
role="bold">8080</emphasis>) then you must open those ports as well.</para> http://www.domain.tld:<emphasis role="bold">8080</emphasis>) then you
must open those ports as well.</para>
</caution> </caution>
</section> </section>
@ -151,17 +160,17 @@ REDIRECT loc 3128 tcp www - !206.124.146.
<listitem> <listitem>
<para>* On your firewall system, issue the following command</para> <para>* On your firewall system, issue the following command</para>
<programlisting><command>echo 202 www.out &#62;&#62; /etc/iproute2/rt_tables</command></programlisting> <programlisting><command>echo 202 www.out &gt;&gt; /etc/iproute2/rt_tables</command></programlisting>
</listitem> </listitem>
<listitem> <listitem>
<para>In /etc/shorewall/init, put:</para> <para>In /etc/shorewall/init, put:</para>
<programlisting><command>if [ -z &#34;`ip rule list | grep www.out`&#34; ] ; then <programlisting><command>if [ -z "`ip rule list | grep www.out`" ] ; then
ip rule add fwmark CA table www.out # Note 0xCA = 202 ip rule add fwmark CA table www.out # Note 0xCA = 202
ip route add default via 192.168.1.3 dev eth1 table www.out ip route add default via 192.168.1.3 dev eth1 table www.out
ip route flush cache ip route flush cache
echo 0 &#62; /proc/sys/net/ipv4/conf/eth1/send_redirects echo 0 &gt; /proc/sys/net/ipv4/conf/eth1/send_redirects
fi</command></programlisting> fi</command></programlisting>
</listitem> </listitem>
@ -213,7 +222,7 @@ loc loc ACCEPT</programlisting>
execute the following commands after you have typed the iptables execute the following commands after you have typed the iptables
command above:</para> command above:</para>
<programlisting><command>iptables-save &#62; /etc/sysconfig/iptables <programlisting><command>iptables-save &gt; /etc/sysconfig/iptables
chkconfig --level 35 iptables on</command></programlisting> chkconfig --level 35 iptables on</command></programlisting>
</listitem> </listitem>
</orderedlist> </orderedlist>
@ -230,13 +239,13 @@ chkconfig --level 35 iptables on</command></programlisting>
<listitem> <listitem>
<para>On your firewall system, issue the following command</para> <para>On your firewall system, issue the following command</para>
<programlisting><command>echo 202 www.out &#62;&#62; /etc/iproute2/rt_tables</command></programlisting> <programlisting><command>echo 202 www.out &gt;&gt; /etc/iproute2/rt_tables</command></programlisting>
</listitem> </listitem>
<listitem> <listitem>
<para>In /etc/shorewall/init, put:</para> <para>In /etc/shorewall/init, put:</para>
<programlisting><command>if [ -z &#34;`ip rule list | grep www.out`&#34; ] ; then <programlisting><command>if [ -z "`ip rule list | grep www.out`" ] ; then
ip rule add fwmark CA table www.out # Note 0xCA = 202 ip rule add fwmark CA table www.out # Note 0xCA = 202
ip route add default via 192.0.2.177 dev eth1 table www.out ip route add default via 192.0.2.177 dev eth1 table www.out
ip route flush cache ip route flush cache
@ -244,7 +253,8 @@ fi</command></programlisting>
</listitem> </listitem>
<listitem> <listitem>
<para>Do <emphasis role="bold">one</emphasis> of the following:</para> <para>Do <emphasis role="bold">one</emphasis> of the
following:</para>
<orderedlist numeration="loweralpha"> <orderedlist numeration="loweralpha">
<listitem> <listitem>
@ -254,8 +264,10 @@ fi</command></programlisting>
</listitem> </listitem>
<listitem> <listitem>
<para>Set MARK_IN_FORWARD_CHAIN=No in <filename>/etc/shorewall/shorewall.conf</filename> <para>Set MARK_IN_FORWARD_CHAIN=No in
and add the following entry in <filename>/etc/shorewall/tcrules</filename>:</para> <filename>/etc/shorewall/shorewall.conf</filename> and add the
following entry in
<filename>/etc/shorewall/tcrules</filename>:</para>
<programlisting>#MARK SOURCE DESTINATION PROTOCOL PORT <programlisting>#MARK SOURCE DESTINATION PROTOCOL PORT
202 eth2 0.0.0.0/0 tcp 80</programlisting> 202 eth2 0.0.0.0/0 tcp 80</programlisting>
@ -272,7 +284,8 @@ fi</command></programlisting>
</listitem> </listitem>
<listitem> <listitem>
<para>In <filename>/etc/shorewall/rules</filename>, you will need:</para> <para>In <filename>/etc/shorewall/rules</filename>, you will
need:</para>
<programlisting>#ACTION SOURCE DEST PROTO DEST PORT(S) <programlisting>#ACTION SOURCE DEST PROTO DEST PORT(S)
ACCEPT loc dmz tcp 80 ACCEPT loc dmz tcp 80
@ -289,7 +302,7 @@ ACCEPT dmz net tcp 80</programlisting>
execute the following commands after you have typed the iptables execute the following commands after you have typed the iptables
command above:</para> command above:</para>
<programlisting><command>iptables-save &#62; /etc/sysconfig/iptables <programlisting><command>iptables-save &gt; /etc/sysconfig/iptables
chkconfig --level 35 iptables on</command></programlisting> chkconfig --level 35 iptables on</command></programlisting>
</listitem> </listitem>
</orderedlist> </orderedlist>

Binary file not shown.

File diff suppressed because it is too large Load Diff

Binary file not shown.

File diff suppressed because it is too large Load Diff

View File

@ -15,7 +15,7 @@
</author> </author>
</authorgroup> </authorgroup>
<pubdate>2004-10-14</pubdate> <pubdate>2004-10-16</pubdate>
<copyright> <copyright>
<year>2001-2004</year> <year>2001-2004</year>
@ -48,7 +48,7 @@
<caution> <caution>
<para>The configuration shown here corresponds to Shorewall version <para>The configuration shown here corresponds to Shorewall version
2.1.11. My configuration uses features not available in earlier 2.1.12. My configuration uses features not available in earlier
Shorewall releases.</para> Shorewall releases.</para>
</caution> </caution>
@ -669,7 +669,7 @@ ACCEPT tx loc:192.168.1.5 all
</section> </section>
<section> <section>
<title>IPSEC Gateway (Ursa) Configuration</title> <title>Wireless IPSEC Gateway (Ursa) Configuration</title>
<para>As mentioned above, Ursa acts as an IPSEC gateway for the wireless <para>As mentioned above, Ursa acts as an IPSEC gateway for the wireless
network. It's view of the network is diagrammed in the following network. It's view of the network is diagrammed in the following
@ -677,18 +677,7 @@ ACCEPT tx loc:192.168.1.5 all
<graphic align="center" fileref="images/network1.png" valign="middle" /> <graphic align="center" fileref="images/network1.png" valign="middle" />
<para>I've included the files that I used to configure that system -- some <para>I've included the files that I used to configure that system.</para>
of them are SuSE-specific.</para>
<section>
<title>shorewall.conf</title>
<blockquote>
<para>Only the changes from the defaults are shown.</para>
<programlisting>CLAMPMSS=1400 # There is an MTU problem between Tipper and the IMAP server at work. This corrects the problem</programlisting>
</blockquote>
</section>
<section> <section>
<title>zones</title> <title>zones</title>
@ -728,7 +717,6 @@ fw sec ACCEPT
fw WiFi ACCEPT fw WiFi ACCEPT
sec WiFi NONE sec WiFi NONE
WiFi sec NONE WiFi sec NONE
WiFi net ACCEPT
all all REJECT info all all REJECT info
#LAST LINE -- DO NOT REMOVE</programlisting> #LAST LINE -- DO NOT REMOVE</programlisting>
@ -753,9 +741,16 @@ WiFi eth1 192.168.3.255 nobogons,blacklist,maclist,routeback
<title>ipsec</title> <title>ipsec</title>
<blockquote> <blockquote>
<para>The mss=1400 in the OUT OPTIONS uses a feature added in 2.1.12
and sets the MSS field in forwarded TCP SYN packets from the 'sec'
zone to 1400. This works around a problem whereby ICMP
fragmentation-needed packets are being dropped somewhere between my
main firewall and the IMAP server at my work.</para>
<programlisting>#ZONE IPSEC OPTIONS IN OUT <programlisting>#ZONE IPSEC OPTIONS IN OUT
# ONLY OPTIONS OPTIONS # ONLY OPTIONS OPTIONS
sec yes mode=tunnel tunnel-src=192.168.3.8 tunnel-dst=192.168.3.8 sec yes mode=tunnel - <emphasis
role="bold">mss=1400</emphasis>
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE #LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE
</programlisting> </programlisting>
</blockquote> </blockquote>