diff --git a/docs/IPSEC-2.6.xml b/docs/IPSEC-2.6.xml
index 723d4e79f..de27fb398 100644
--- a/docs/IPSEC-2.6.xml
+++ b/docs/IPSEC-2.6.xml
@@ -59,59 +59,14 @@
(most notably SUSE 9.1 through 10.0).
-
- You must have BOTH the
- Netfilter+ipsec patches and the policy match patch. One without the other will not work.
-
- Here's a combination of components that I know works:
-
-
-
- Kernel 2.6.11 from kernel.org. Patched with:
-
-
-
- The five patches in http://shorewall.net/pub/shorewall/contrib/IPSEC/2.6.11
-
-
-
- The "policy match" extension from the Patch-o-matic-ng CVS
- snapshot from 2005-May-04 (be sure to NOT try to apply the
- ipsec-NN patches from patch-o-matic-ng).
-
-
-
-
-
- iptables 1.3.1 patched with the "policy match" extension from
- the Patch-o-matic-ng CVS snapshot from 2005-May-04.
-
-
-
- ipsec-tools 0.5.2 compiled from source. I've also had success
- with:
-
-
-
- ipsec-tools 0.5.2 and racoon 0.5.2 from Debian
- Sarge/testing
-
-
-
- The ipsec-tools 0.5 rpm from SUSE
- 9.3.
-
-
-
-
-
-
As of this writing, the Netfilter+ipsec and policy match support are
broken when used with a bridge device. The problem has been reported to
- the responsible Netfilter developer who has confirmed the problem.
+ the responsible Netfilter developer who has confirmed the problem. The
+ problem was presumably corrected in Kernel 2.6.20 as a result of the
+ removal of defered FORWARD/OUTPUT processing of traffic destined for a
+ bridge. See the "Bridging without
+ using physdev match support" article.
@@ -365,6 +320,27 @@ loc vpn ACCEPT
vpn loc ACCEPT
+ If you need access from each firewall to hosts in the other network,
+ then you could add:
+
+
+ #SOURCE DESTINATION POLICY LEVEL BURST:LIMIT
+$FW vpn ACCEPT
+
+
+ If you need access between the firewall's, you should describe the
+ access in your /etc/shorewall/rules file. For example, to allow SSH access
+ from System B, add this rule on system A:
+
+
+ #ACTION SOURCE DESTINATION PROTO POLICY
+ACCEPT vpn:134.28.54.2 $FW
+
+
+ Note that your Security Policies must also be set up to send traffic
+ between 134.28.54.2 and 206.162.148.9 through the tunnel (see
+ below).
+
Once you have these entries in place, restart Shorewall (type
shorewall restart); you are now ready to configure IPSEC.
@@ -857,4 +833,4 @@ all all REJECT info
ipsec-tools source tree. It has a wide variety of sample racoon
configuration files.
-
+
\ No newline at end of file