mirror of
https://gitlab.com/shorewall/code.git
synced 2024-11-28 18:43:30 +01:00
More hacks to make xsltproc work
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@8603 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
parent
9a326105aa
commit
bc0fb7e178
@ -38,7 +38,7 @@
|
|||||||
|
|
||||||
<orderedlist>
|
<orderedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>BLACKLISTNEWONLY=No -- проверка осуществляется для всех входящих пакетов. Новые записи в чёрном списке позволяют прервать уже существующие соединения.</para>
|
<para>BLACKLISTNEWONLY=No -- проверка осуществляется для всех входящих пакетов. Новые записи в чёрном списке позволяют прервать уже существующие соединения.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
|
@ -83,7 +83,7 @@
|
|||||||
<para>Specify the <quote>dhcp</quote> option for this interface in the
|
<para>Specify the <quote>dhcp</quote> option for this interface in the
|
||||||
<ulink
|
<ulink
|
||||||
url="manpages/shorewall-interfaces.html"><filename>/etc/shorewall/interfaces</filename></ulink>
|
url="manpages/shorewall-interfaces.html"><filename>/etc/shorewall/interfaces</filename></ulink>
|
||||||
file. This will generate rules that will allow DHCP to and from
|
file. This will generate rules that will allow DHCP to and from
|
||||||
your firewall system.</para>
|
your firewall system.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
@ -129,7 +129,7 @@
|
|||||||
<para>Specify the <quote>dhcp</quote> option for the bridge interface
|
<para>Specify the <quote>dhcp</quote> option for the bridge interface
|
||||||
in the <ulink
|
in the <ulink
|
||||||
url="manpages/shorewall-interfaces.html"><filename>/etc/shorewall/interfaces</filename></ulink>
|
url="manpages/shorewall-interfaces.html"><filename>/etc/shorewall/interfaces</filename></ulink>
|
||||||
file. This will generate rules that will allow DHCP to and from
|
file. This will generate rules that will allow DHCP to and from
|
||||||
your firewall system as well as through the bridge.</para>
|
your firewall system as well as through the bridge.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</itemizedlist>
|
</itemizedlist>
|
||||||
|
@ -98,7 +98,7 @@
|
|||||||
|
|
||||||
<blockquote>
|
<blockquote>
|
||||||
<programlisting>#
|
<programlisting>#
|
||||||
# IP: Netfilter Configuration
|
# IP: Netfilter Configuration
|
||||||
#
|
#
|
||||||
CONFIG_IP_NF_CONNTRACK=m
|
CONFIG_IP_NF_CONNTRACK=m
|
||||||
CONFIG_IP_NF_FTP=m
|
CONFIG_IP_NF_FTP=m
|
||||||
@ -527,4 +527,4 @@ CONFIG_IP_NF_MANGLE=m
|
|||||||
CONFIG_IP_NF_ARPTABLES=m
|
CONFIG_IP_NF_ARPTABLES=m
|
||||||
CONFIG_IP_NF_ARPFILTER=m</programlisting>
|
CONFIG_IP_NF_ARPFILTER=m</programlisting>
|
||||||
</section>
|
</section>
|
||||||
</article>
|
</article>
|
||||||
|
@ -2423,10 +2423,10 @@ foobar.net. 86400 IN A 192.0.2.177
|
|||||||
Also, I don't recommend using <quote>shorewall restart</quote>; it is
|
Also, I don't recommend using <quote>shorewall restart</quote>; it is
|
||||||
better to create an <ulink
|
better to create an <ulink
|
||||||
url="starting_and_stopping_shorewall.htm"><emphasis>an alternate
|
url="starting_and_stopping_shorewall.htm"><emphasis>an alternate
|
||||||
configuration</emphasis></ulink> and test it using the
|
configuration</emphasis></ulink> and test it using the
|
||||||
<quote><ulink
|
<quote><ulink
|
||||||
url="starting_and_stopping_shorewall.htm"><command>shorewall
|
url="starting_and_stopping_shorewall.htm"><command>shorewall
|
||||||
try</command></ulink></quote> command.</para>
|
try</command></ulink></quote> command.</para>
|
||||||
</caution>
|
</caution>
|
||||||
</section>
|
</section>
|
||||||
</article>
|
</article>
|
||||||
|
@ -414,14 +414,14 @@ ACCEPT dmz loc udp 53</programlisting>
|
|||||||
|
|
||||||
<programlisting>#ACTION SOURCE DEST PROTO DEST
|
<programlisting>#ACTION SOURCE DEST PROTO DEST
|
||||||
# PORT(S)
|
# PORT(S)
|
||||||
Ping/ACCEPT <emphasis><source zone></emphasis> <emphasis><destination zone></emphasis></programlisting>
|
Ping/ACCEPT <emphasis><source zone></emphasis> <emphasis><destination zone></emphasis></programlisting>
|
||||||
|
|
||||||
<para>The ramifications of this can be subtle. For example, if you
|
<para>The ramifications of this can be subtle. For example, if you
|
||||||
have the following in <filename><ulink
|
have the following in <filename><ulink
|
||||||
url="NAT.htm">/etc/shorewall/nat</ulink></filename>:</para>
|
url="NAT.htm">/etc/shorewall/nat</ulink></filename>:</para>
|
||||||
|
|
||||||
<programlisting>#EXTERNAL INTERFACE INTERNAL
|
<programlisting>#EXTERNAL INTERFACE INTERNAL
|
||||||
10.1.1.2 eth0 130.252.100.18</programlisting>
|
10.1.1.2 eth0 130.252.100.18</programlisting>
|
||||||
|
|
||||||
<para>and you ping 130.252.100.18, unless you have allowed icmp type 8
|
<para>and you ping 130.252.100.18, unless you have allowed icmp type 8
|
||||||
between the zone containing the system you are pinging from and the
|
between the zone containing the system you are pinging from and the
|
||||||
@ -562,4 +562,4 @@ Ping/DROP net all</programlisting>
|
|||||||
<para>See the <ulink url="support.htm">Shorewall Support
|
<para>See the <ulink url="support.htm">Shorewall Support
|
||||||
Page</ulink>.</para>
|
Page</ulink>.</para>
|
||||||
</section>
|
</section>
|
||||||
</article>
|
</article>
|
||||||
|
Loading…
Reference in New Issue
Block a user