mirror of
https://gitlab.com/shorewall/code.git
synced 2025-01-03 03:59:16 +01:00
more updates for v3..
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@2713 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
parent
1a5852b7c9
commit
ae60b56f41
@ -15,7 +15,7 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2005-09-12</pubdate>
|
<pubdate>2005-09-19</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2002-2005</year>
|
<year>2002-2005</year>
|
||||||
@ -34,6 +34,13 @@
|
|||||||
</legalnotice>
|
</legalnotice>
|
||||||
</articleinfo>
|
</articleinfo>
|
||||||
|
|
||||||
|
<caution>
|
||||||
|
<para><emphasis role="bold">This article applies to Shorewall 3.0 and
|
||||||
|
later. If you are running a version of Shorewall earlier than Shorewall
|
||||||
|
3.0.0 then please see the documentation for that
|
||||||
|
release.</emphasis></para>
|
||||||
|
</caution>
|
||||||
|
|
||||||
<section>
|
<section>
|
||||||
<title>Introduction</title>
|
<title>Introduction</title>
|
||||||
|
|
||||||
@ -340,13 +347,13 @@ $FW net ACCEPT</programlisting>
|
|||||||
to the computer using a cross-over cable).</para>
|
to the computer using a cross-over cable).</para>
|
||||||
|
|
||||||
<caution>
|
<caution>
|
||||||
<para>Do not connect the internal and external interface to the same hub
|
<para><emphasis role="bold">Do NOT connect the internal and external
|
||||||
or switch except for testing AND you are running Shorewall version 1.4.7
|
interface to the same hub or switch except for testing</emphasis>. You
|
||||||
or later. When using these recent versions, you can test using this kind
|
can test using this kind of configuration if you specify the arp_filter
|
||||||
of configuration if you specify the arp_filter option in
|
option in <filename>/etc/shorewall/interfaces</filename> for all
|
||||||
<filename>/etc/shorewall/interfaces</filename> for all interfaces
|
interfaces connected to the common hub/switch. <emphasis
|
||||||
connected to the common hub/switch. Using such a setup with a production
|
role="bold">Using such a setup with a production firewall is strongly
|
||||||
firewall is strongly recommended against.</para>
|
recommended against</emphasis>.</para>
|
||||||
</caution>
|
</caution>
|
||||||
|
|
||||||
<para><inlinegraphic fileref="images/BD21298_.gif" format="GIF" /></para>
|
<para><inlinegraphic fileref="images/BD21298_.gif" format="GIF" /></para>
|
||||||
@ -732,19 +739,16 @@ DNS/ACCEPT dmz $FW </programlisting> Run name server on DMZ
|
|||||||
DNS/ACCEPT loc dmz:10.10.11.1
|
DNS/ACCEPT loc dmz:10.10.11.1
|
||||||
DNS/ACCEPT $FW dmz:10.10.11.1 </programlisting></para>
|
DNS/ACCEPT $FW dmz:10.10.11.1 </programlisting></para>
|
||||||
|
|
||||||
<para>In the rules shown above, <quote>AllowDNS</quote> is an example of a
|
<para>In the rules shown above, <quote>DNS/ACCEPT</quote> is an example of
|
||||||
<emphasis>defined action</emphasis>. Shorewall includes a number of
|
a <emphasis>defined macro</emphasis>. Shorewall includes a number of
|
||||||
defined actions and <ulink url="Actions.html">you can add your
|
defined macros and <ulink url="Actions.html">you can add your own</ulink>.
|
||||||
own</ulink>. To see the list of actions included with your version of
|
To see the list of macros included with your version of Shorewall, look in
|
||||||
Shorewall, look in the file
|
the file <filename>/usr/share/shorewall/actions.std</filename>.</para>
|
||||||
<filename>/usr/share/shorewall/actions.std</filename>. Those actions that
|
|
||||||
accept connection requests have names that begin with
|
|
||||||
<quote>Allow</quote>.</para>
|
|
||||||
|
|
||||||
<para>You don't have to use defined actions when coding a rule in
|
<para>You don't have to use defined macros when coding a rule in
|
||||||
<filename>/etc/shorewall/rules</filename>; the generated Netfilter ruleset
|
<filename>/etc/shorewall/rules</filename>; the generated Netfilter ruleset
|
||||||
is slightly more efficient if you code your rules directly rather than
|
is slightly more efficient if you code your rules directly rather than
|
||||||
using defined actions. The first example above (name server on the
|
using defined macros. The first example above (name server on the
|
||||||
firewall) could also have been coded as follows:</para>
|
firewall) could also have been coded as follows:</para>
|
||||||
|
|
||||||
<programlisting>#ACTION SOURCE DEST PROTO DEST PORT(S)
|
<programlisting>#ACTION SOURCE DEST PROTO DEST PORT(S)
|
||||||
@ -753,8 +757,8 @@ ACCEPT loc $FW udp 53
|
|||||||
ACCEPT dmz $FW tcp 53
|
ACCEPT dmz $FW tcp 53
|
||||||
ACCEPT dmz $FW udp 53 </programlisting>
|
ACCEPT dmz $FW udp 53 </programlisting>
|
||||||
|
|
||||||
<para>In cases where Shorewall doesn't include a defined action to meet
|
<para>In cases where Shorewall doesn't include a defined macro to meet
|
||||||
your needs, you can either define the action yourself or you can simply
|
your needs, you can either define the macro yourself or you can simply
|
||||||
code the appropriate rules directly.</para>
|
code the appropriate rules directly.</para>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
@ -775,7 +779,7 @@ SSH/ACCEPT loc dmz </programlisting>Those rules allow you to run
|
|||||||
connect to those servers from your local systems.</para>
|
connect to those servers from your local systems.</para>
|
||||||
|
|
||||||
<para>If you wish to enable other connections between your systems, the
|
<para>If you wish to enable other connections between your systems, the
|
||||||
general format for using a defined action is: <programlisting>#ACTION SOURCE DEST PROTO DEST PORT(S)
|
general format for using a defined macro is: <programlisting>#ACTION SOURCE DEST PROTO DEST PORT(S)
|
||||||
<<emphasis>macro</emphasis>> <emphasis><source zone> <destination zone></emphasis></programlisting></para>
|
<<emphasis>macro</emphasis>> <emphasis><source zone> <destination zone></emphasis></programlisting></para>
|
||||||
|
|
||||||
<para>The general format when not using a defined action
|
<para>The general format when not using a defined action
|
||||||
@ -892,17 +896,16 @@ ACCEPT net $FW tcp 80 </programlisting><it
|
|||||||
<para><inlinegraphic fileref="images/BD21298_.gif" format="GIF" /></para>
|
<para><inlinegraphic fileref="images/BD21298_.gif" format="GIF" /></para>
|
||||||
|
|
||||||
<para>The <ulink url="Install.htm">installation procedure</ulink>
|
<para>The <ulink url="Install.htm">installation procedure</ulink>
|
||||||
configures your system to start Shorewall at system boot but beginning
|
configures your system to start Shorewall at system boot but startup is
|
||||||
with Shorewall version 1.3.9 startup is disabled so that your system won't
|
disabled so that your system won't try to start Shorewall before
|
||||||
try to start Shorewall before configuration is complete. Once you have
|
configuration is complete. Once you have completed configuration of your
|
||||||
completed configuration of your firewall, you can enable Shorewall startup
|
firewall, you can enable Shorewall startup by removing the file
|
||||||
by removing the file <filename>/etc/shorewall/startup_disabled</filename>.
|
<filename>/etc/shorewall/startup_disabled</filename>. <important>
|
||||||
<important>
|
|
||||||
<para>Users of the <filename>.deb</filename> package must edit
|
<para>Users of the <filename>.deb</filename> package must edit
|
||||||
<filename>/etc/default/shorewall</filename> and set
|
<filename>/etc/default/shorewall</filename> and set
|
||||||
<varname>startup=1</varname>.</para>
|
<varname>startup=1</varname>.</para>
|
||||||
</important><important>
|
</important><important>
|
||||||
<para>Users running Shorewall 2.1.3 or later should edit
|
<para>You should edit
|
||||||
<filename>/etc/shorewall/shorewall.conf</filename> and set
|
<filename>/etc/shorewall/shorewall.conf</filename> and set
|
||||||
STARTUP_ENABLED=Yes.</para>
|
STARTUP_ENABLED=Yes.</para>
|
||||||
</important>The firewall is started using the <command>shorewall
|
</important>The firewall is started using the <command>shorewall
|
||||||
|
Loading…
Reference in New Issue
Block a user