mirror of
https://gitlab.com/shorewall/code.git
synced 2025-01-02 19:49:08 +01:00
document MySQL, Bittorrent and other macros.
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@4362 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
parent
6842ce6432
commit
9de434881f
@ -97,6 +97,22 @@ FTP/DNAT net dmz:192.168.1.4 </programlisting>
|
|||||||
Auth/ACCEPT <emphasis> <source></emphasis> <emphasis><destination></emphasis></programlisting>
|
Auth/ACCEPT <emphasis> <source></emphasis> <emphasis><destination></emphasis></programlisting>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
|
<section>
|
||||||
|
<title>BitTorrent</title>
|
||||||
|
|
||||||
|
<caution>
|
||||||
|
<para>This information is valid only for Shorewall 3.2 or later.</para>
|
||||||
|
</caution>
|
||||||
|
|
||||||
|
<caution>
|
||||||
|
<para><emphasis role="bold"><emphasis>We assume BitTorrent client listen
|
||||||
|
in the default port(s)</emphasis></emphasis></para>
|
||||||
|
</caution>
|
||||||
|
|
||||||
|
<programlisting>#ACTION SOURCE DESTINATION PROTO DEST PORT(S)
|
||||||
|
BitTorrent/ACCEPT <emphasis><source></emphasis> <emphasis><destination></emphasis></programlisting>
|
||||||
|
</section>
|
||||||
|
|
||||||
<section>
|
<section>
|
||||||
<title>DNS</title>
|
<title>DNS</title>
|
||||||
|
|
||||||
@ -125,6 +141,10 @@ DNS/ACCEPT dmz net </programlisting>
|
|||||||
<section id="Emule">
|
<section id="Emule">
|
||||||
<title>Emule</title>
|
<title>Emule</title>
|
||||||
|
|
||||||
|
<caution>
|
||||||
|
<para>This information is valid only for Shorewall 3.2 or later.</para>
|
||||||
|
</caution>
|
||||||
|
|
||||||
<para>In contrast to how the rest of this article is organized, for emule
|
<para>In contrast to how the rest of this article is organized, for emule
|
||||||
I will give you the rules necessary to run emule on a single machine in
|
I will give you the rules necessary to run emule on a single machine in
|
||||||
your loc network (since that's what 99.99% of you want to do). Assume
|
your loc network (since that's what 99.99% of you want to do). Assume
|
||||||
@ -153,9 +173,9 @@ DNS/ACCEPT dmz net </programlisting>
|
|||||||
|
|
||||||
<para><filename>/etc/shorewall/rules:</filename></para>
|
<para><filename>/etc/shorewall/rules:</filename></para>
|
||||||
|
|
||||||
<programlisting>#ACTION SOURCE DESTINATION PROTO DEST PORT(S)
|
<programlisting>#ACTION SOURCE DESTINATION PROTO DEST PORT(S)
|
||||||
DNAT net loc:192.168.1.4 tcp 4662
|
Edonkey/DNAT net loc:192.168.1.4
|
||||||
DNAT net loc:192.168.1.4 udp 4672
|
#if you wish to enable the Emule webserver, add this rule too.
|
||||||
DNAT net loc:192.168.1.4 tcp 4711</programlisting>
|
DNAT net loc:192.168.1.4 tcp 4711</programlisting>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
@ -247,6 +267,26 @@ LDAP/ACCEPT <emphasis><source></emphasis> <emphasis> <destina
|
|||||||
LDAPS/ACCEPT <emphasis><emphasis><source></emphasis> <emphasis> <destination></emphasis></emphasis><emphasis></emphasis> # LDAP over SSL</programlisting>
|
LDAPS/ACCEPT <emphasis><emphasis><source></emphasis> <emphasis> <destination></emphasis></emphasis><emphasis></emphasis> # LDAP over SSL</programlisting>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
|
<section>
|
||||||
|
<title><trademark>MySQL</trademark></title>
|
||||||
|
|
||||||
|
<caution>
|
||||||
|
<para>This information is valid only for Shorewall 3.2 or later.</para>
|
||||||
|
</caution>
|
||||||
|
|
||||||
|
<caution>
|
||||||
|
<para>Allowing access from untrusted hosts to your
|
||||||
|
<trademark>MySQL</trademark> server represents a <emphasis
|
||||||
|
role="bold">severe security risk</emphasis>.</para>
|
||||||
|
|
||||||
|
<para><emphasis role="bold">DO NOT USE THIS </emphasis>if you don't know
|
||||||
|
how to deal with the consecuences, you have been warned.</para>
|
||||||
|
</caution>
|
||||||
|
|
||||||
|
<programlisting>#ACTION SOURCE DESTINATION PROTO DEST PORT(S)
|
||||||
|
MySQL/ACCEPT <emphasis><source></emphasis> <emphasis> <destination></emphasis> <emphasis> </emphasis></programlisting>
|
||||||
|
</section>
|
||||||
|
|
||||||
<section>
|
<section>
|
||||||
<title>NFS</title>
|
<title>NFS</title>
|
||||||
|
|
||||||
@ -428,16 +468,19 @@ NNTPS/ACCEPT <source> <destination> # secure NNTP</programlisti
|
|||||||
<section>
|
<section>
|
||||||
<title>VNC</title>
|
<title>VNC</title>
|
||||||
|
|
||||||
<para>Vncviewer to Vncserver -- TCP port 5900 + <display
|
<caution>
|
||||||
number>.</para>
|
<para>This information is valid only for Shorewall 3.2 or later.</para>
|
||||||
|
</caution>
|
||||||
|
|
||||||
<para>Vncviewer to Vncserver -- TCP port 5900 + <display
|
<para>Vncviewer to Vncserver -- TCP port 5900 + <display
|
||||||
number>.</para>
|
number>.</para>
|
||||||
|
|
||||||
|
<para>the following rule handles VNC traffic for VNC displays 0 -
|
||||||
|
9.</para>
|
||||||
|
|
||||||
<programlisting>#ACTION SOURCE DESTINATION PROTO DEST PORT(S)
|
<programlisting>#ACTION SOURCE DESTINATION PROTO DEST PORT(S)
|
||||||
ACCEPT <emphasis><source></emphasis> <emphasis><destination></emphasis> tcp 5901 #Display Number 1
|
VNC/ACCEPT <emphasis><source></emphasis> <emphasis><destination></emphasis>
|
||||||
ACCEPT <emphasis><source></emphasis> <emphasis><destination></emphasis> tcp 5902 #Display Number 2
|
</programlisting>
|
||||||
...</programlisting>
|
|
||||||
|
|
||||||
<para>Vncserver to Vncviewer in listen mode -- TCP port 5500.</para>
|
<para>Vncserver to Vncviewer in listen mode -- TCP port 5500.</para>
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user