mirror of
https://gitlab.com/shorewall/code.git
synced 2025-01-20 20:48:54 +01:00
Updates to Actions doc
Signed-off-by: Tom Eastep <teastep@shorewall.net>
This commit is contained in:
parent
e14d48c2cf
commit
83565f7a22
@ -131,9 +131,9 @@ ACCEPT - - tcp 135,139,445
|
|||||||
|
|
||||||
<para>Shorewall allows the association of a <firstterm>default
|
<para>Shorewall allows the association of a <firstterm>default
|
||||||
action</firstterm> with policies. A separate default action may be
|
action</firstterm> with policies. A separate default action may be
|
||||||
associated with ACCEPT, DROP and REJECT policies. Default actions provide
|
associated with ACCEPT, DROP, REJECT, QUEUE and NFQUEUE policies. Default
|
||||||
a way to invoke a set of common rules just before the policy is enforced.
|
actions provide a way to invoke a set of common rules just before the
|
||||||
Default actions accomplish two goals:</para>
|
policy is enforced. Default actions accomplish two goals:</para>
|
||||||
|
|
||||||
<orderedlist>
|
<orderedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
@ -166,12 +166,12 @@ ACCEPT - - tcp 135,139,445
|
|||||||
specifying a different action in the POLICY column of <filename><ulink
|
specifying a different action in the POLICY column of <filename><ulink
|
||||||
url="manpages/shorewall-policy.html">/etc/shorewall/policy</ulink></filename>.</para>
|
url="manpages/shorewall-policy.html">/etc/shorewall/policy</ulink></filename>.</para>
|
||||||
|
|
||||||
<warning>
|
<important>
|
||||||
<para>Entries in the DROP and REJECT default actions <emphasis
|
<para>Entries in the DROP and REJECT default actions <emphasis
|
||||||
role="bold">ARE NOT THE CAUSE OF CONNECTION PROBLEMS</emphasis>.
|
role="bold">ARE NOT THE CAUSE OF CONNECTION PROBLEMS</emphasis>.
|
||||||
Remember — default actions are only invoked immediately before the
|
Remember — default actions are only invoked immediately before the
|
||||||
packet is going to be dropped or rejected anyway!!!</para>
|
packet is going to be dropped or rejected anyway!!!</para>
|
||||||
</warning>
|
</important>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
<section id="Defining">
|
<section id="Defining">
|
||||||
@ -219,7 +219,7 @@ ACCEPT - - tcp 135,139,445
|
|||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>TARGET - Must be ACCEPT, DROP, REJECT, LOG, CONTINUE, QUEUE or
|
<para>TARGET - Must be ACCEPT, DROP, REJECT, LOG, CONTINUE, QUEUE or
|
||||||
<<emphasis>action</emphasis>> where
|
an <<emphasis>action</emphasis>> where
|
||||||
<<emphasis>action</emphasis>> is a previously-defined action
|
<<emphasis>action</emphasis>> is a previously-defined action
|
||||||
(that is, it must precede the action being defined in this file in
|
(that is, it must precede the action being defined in this file in
|
||||||
your <filename>/etc/shorewall/actions</filename> file). These actions
|
your <filename>/etc/shorewall/actions</filename> file). These actions
|
||||||
@ -257,10 +257,6 @@ ACCEPT - - tcp 135,139,445
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>DEST - Location of Server. Same as above with the exception that
|
<para>DEST - Location of Server. Same as above with the exception that
|
||||||
MAC addresses are not allowed.</para>
|
MAC addresses are not allowed.</para>
|
||||||
|
|
||||||
<para>Unlike in the SOURCE column, you may specify a range of up to
|
|
||||||
256 IP addresses using the syntax <<emphasis>first
|
|
||||||
ip</emphasis>>-<<emphasis>last ip</emphasis>>.</para>
|
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
@ -281,23 +277,6 @@ ACCEPT - - tcp 135,139,445
|
|||||||
<para>This column is ignored if PROTO = <quote>all</quote>, but must
|
<para>This column is ignored if PROTO = <quote>all</quote>, but must
|
||||||
be entered if any of the following fields are supplied. In that case,
|
be entered if any of the following fields are supplied. In that case,
|
||||||
it is suggested that this field contain <quote>-</quote>.</para>
|
it is suggested that this field contain <quote>-</quote>.</para>
|
||||||
|
|
||||||
<para>If your kernel contains multi-port match support, then only a
|
|
||||||
single Netfilter rule will be generated if in this list and in the
|
|
||||||
CLIENT PORT(S) list below:</para>
|
|
||||||
|
|
||||||
<orderedlist>
|
|
||||||
<listitem>
|
|
||||||
<para>There are 15 or less ports listed.</para>
|
|
||||||
</listitem>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>No port ranges are included.</para>
|
|
||||||
</listitem>
|
|
||||||
</orderedlist>
|
|
||||||
|
|
||||||
<para>Otherwise, a separate rule will be generated for each
|
|
||||||
port.</para>
|
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
@ -308,23 +287,6 @@ ACCEPT - - tcp 135,139,445
|
|||||||
<para>If you don't want to restrict client ports but need to specify
|
<para>If you don't want to restrict client ports but need to specify
|
||||||
any of the subsequent fields, then place <quote>-</quote> in this
|
any of the subsequent fields, then place <quote>-</quote> in this
|
||||||
column.</para>
|
column.</para>
|
||||||
|
|
||||||
<para>If your kernel contains multi-port match support, then only a
|
|
||||||
single Netfilter rule will be generated if in this list and in the
|
|
||||||
DEST PORT(S) list above:</para>
|
|
||||||
|
|
||||||
<orderedlist>
|
|
||||||
<listitem>
|
|
||||||
<para>There are 15 or less ports listed.</para>
|
|
||||||
</listitem>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para>No port ranges are included.</para>
|
|
||||||
</listitem>
|
|
||||||
</orderedlist>
|
|
||||||
|
|
||||||
<para>Otherwise, a separate rule will be generated for each
|
|
||||||
port.</para>
|
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
@ -541,8 +503,13 @@ bar:debug</programlisting>
|
|||||||
|
|
||||||
<para>/etc/shorewall/action.DropBcasts<programlisting># This file is empty</programlisting>/etc/shorewall/DropBcasts<programlisting>use Shorewall::Chains;
|
<para>/etc/shorewall/action.DropBcasts<programlisting># This file is empty</programlisting>/etc/shorewall/DropBcasts<programlisting>use Shorewall::Chains;
|
||||||
|
|
||||||
log_rule_limit( $level, $chainref, 'DropBcasts', 'DROP', '', $tag, 'add', '' ) if $level ne '';
|
if ( $level ne '' ) {
|
||||||
add_rule( $chainref, '-m pkttype --pkttype broadcast -j DROP' );
|
log_rule_limit $level, $chainref, 'dropBcast' , 'DROP', '', $tag, 'add', ' -m addrtype --dst-type BROADCAST ';
|
||||||
|
log_rule_limit $level, $chainref, 'dropBcast' , 'DROP', '', $tag, 'add', ' -d 224.0.0.0/4 ';
|
||||||
|
}
|
||||||
|
|
||||||
|
add_rule $chainref, '-m addrtype --dst-type BROADCAST -j DROP';
|
||||||
|
add_rule $chainref, '-d 224.0.0.0/4 -j DROP';
|
||||||
|
|
||||||
1;</programlisting></para>
|
1;</programlisting></para>
|
||||||
</example>
|
</example>
|
||||||
|
Loading…
Reference in New Issue
Block a user