Second batch of mindless ID changes

git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@6694 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
teastep 2007-06-28 15:40:13 +00:00
parent f96772989c
commit c41d3fee71
7 changed files with 49 additions and 49 deletions

View File

@ -46,7 +46,7 @@
to hosts defined in the /etc/shorewall/ecn file.</para> to hosts defined in the /etc/shorewall/ecn file.</para>
</warning> </warning>
<section> <section id="ecn">
<title>Explicit Congestion Notification (ECN)</title> <title>Explicit Congestion Notification (ECN)</title>
<para>Explicit Congestion Notification (ECN) is described in RFC 3168 and <para>Explicit Congestion Notification (ECN) is described in RFC 3168 and
@ -90,11 +90,11 @@
</varlistentry> </varlistentry>
</variablelist> </variablelist>
<example> <example id="Example1">
<title>Your external interface is eth0 and you want to disable ECN for <title>Your external interface is eth0 and you want to disable ECN for
tcp connections to 192.0.2.0/24:</title> tcp connections to 192.0.2.0/24:</title>
<para><table> <para><table id="Table1">
<title>/etc/shorewall/ecn</title> <title>/etc/shorewall/ecn</title>
<tgroup cols="2"> <tgroup cols="2">

View File

@ -43,10 +43,10 @@
release.</emphasis></para> release.</emphasis></para>
</caution> </caution>
<section> <section id="Install">
<title>Installing Shorewall</title> <title>Installing Shorewall</title>
<section> <section id="Howto">
<title>Where do I find Step by Step Installation and Configuration <title>Where do I find Step by Step Installation and Configuration
Instructions?</title> Instructions?</title>
@ -347,7 +347,7 @@ DNAT net fw:192.168.1.1:22 tcp 4104</programlisting>
you use a REDIRECT rule.</para> you use a REDIRECT rule.</para>
</section> </section>
<section> <section id="faq38">
<title>(FAQ 38) Where can I find more information about DNAT?</title> <title>(FAQ 38) Where can I find more information about DNAT?</title>
<para><emphasis role="bold">Answer</emphasis>:Ian Allen has written a <para><emphasis role="bold">Answer</emphasis>:Ian Allen has written a
@ -364,8 +364,8 @@ DNAT net fw:192.168.1.1:22 tcp 4104</programlisting>
</section> </section>
</section> </section>
<section> <section id="DNS-DNAT">
<title>DNS and Port Forwarding/NAT</title> <title id="DNS">DNS and Port Forwarding/NAT</title>
<section id="faq2"> <section id="faq2">
<title>(FAQ 2) I port forward www requests to www.mydomain.com (IP <title>(FAQ 2) I port forward www requests to www.mydomain.com (IP
@ -492,7 +492,7 @@ DNAT loc loc:192.168.1.5 tcp www - $ETH0
</listitem> </listitem>
</orderedlist> </orderedlist>
<example> <example id="Example1">
<title>Example:</title> <title>Example:</title>
<literallayout>Zone: dmz, Interface: eth2, Subnet: 192.168.2.0/24, Address: 192.168.2.254</literallayout> <literallayout>Zone: dmz, Interface: eth2, Subnet: 192.168.2.0/24, Address: 192.168.2.254</literallayout>
@ -577,7 +577,7 @@ DNAT loc dmz:192.168.2.4 tcp 80 - $ETH0
</section> </section>
</section> </section>
<section> <section id="Blacklisting">
<title>Blacklisting</title> <title>Blacklisting</title>
<section id="faq63"> <section id="faq63">
@ -594,7 +594,7 @@ DNAT loc dmz:192.168.2.4 tcp 80 - $ETH0
</section> </section>
</section> </section>
<section> <section id="MSN">
<title>Netmeeting/MSN</title> <title>Netmeeting/MSN</title>
<section id="faq3"> <section id="faq3">
@ -628,7 +628,7 @@ to debug/develop the newnat interface.</programlisting></para>
</section> </section>
</section> </section>
<section> <section id="Openports">
<title>Open Ports</title> <title>Open Ports</title>
<section id="faq51"> <section id="faq51">
@ -736,7 +736,7 @@ to debug/develop the newnat interface.</programlisting></para>
nice integration of Shorewall and PortSentry.</para> nice integration of Shorewall and PortSentry.</para>
</section> </section>
<section> <section id="faq4d">
<title>(FAQ 4d) How do I use Shorewall with Snort-Inline?</title> <title>(FAQ 4d) How do I use Shorewall with Snort-Inline?</title>
<para><emphasis role="bold">Answer:</emphasis> <ulink <para><emphasis role="bold">Answer:</emphasis> <ulink
@ -746,7 +746,7 @@ to debug/develop the newnat interface.</programlisting></para>
</section> </section>
</section> </section>
<section> <section id="Connections">
<title>Connection Problems</title> <title>Connection Problems</title>
<section id="faq5"> <section id="faq5">
@ -834,8 +834,8 @@ to debug/develop the newnat interface.</programlisting></para>
documentation</ulink>.</para> documentation</ulink>.</para>
</section> </section>
<section> <section id="faq64">
<title>(FAQ 63) I just upgraded my kernel to 2.6.20 and my <title>(FAQ 64) I just upgraded my kernel to 2.6.20 and my
bridge/firewall stopped working. What is wrong?</title> bridge/firewall stopped working. What is wrong?</title>
<para><emphasis role="bold">Answer:</emphasis> In kernel 2.6.20, the <para><emphasis role="bold">Answer:</emphasis> In kernel 2.6.20, the
@ -855,7 +855,7 @@ to debug/develop the newnat interface.</programlisting></para>
</section> </section>
</section> </section>
<section> <section id="Logging">
<title>Logging</title> <title>Logging</title>
<section id="faq6"> <section id="faq6">
@ -974,8 +974,8 @@ DROP net fw udp 10619</programlisting>
</listitem> </listitem>
</itemizedlist> </itemizedlist>
<para><example> <para><example id="Example5">
<title>Example</title> <title id="Example2">Example</title>
<para><programlisting>MAC=00:04:4c:dc:e2:28:00:b0:8e:cf:3c:4c:08:00</programlisting> <para><programlisting>MAC=00:04:4c:dc:e2:28:00:b0:8e:cf:3c:4c:08:00</programlisting>
<itemizedlist> <itemizedlist>
@ -1272,7 +1272,7 @@ DROP net fw udp 10619</programlisting>
</varlistentry> </varlistentry>
</variablelist> </variablelist>
<example> <example id="Example3">
<title>Here is an example:</title> <title>Here is an example:</title>
<programlisting>Jun 27 15:37:56 gateway kernel: <programlisting>Jun 27 15:37:56 gateway kernel:
@ -1460,7 +1460,7 @@ modprobe: Can't locate module iptable_raw</programlisting>
</section> </section>
</section> </section>
<section> <section id="Routing">
<title>Routing</title> <title>Routing</title>
<section id="faq32"> <section id="faq32">
@ -1501,7 +1501,7 @@ modprobe: Can't locate module iptable_raw</programlisting>
</section> </section>
</section> </section>
<section> <section id="Start-Stop">
<title>Starting and Stopping</title> <title>Starting and Stopping</title>
<section id="faq7"> <section id="faq7">
@ -1709,7 +1709,7 @@ iptables: Invalid argument
</section> </section>
</section> </section>
<section> <section id="MultiISP">
<title>Multiple ISPs</title> <title>Multiple ISPs</title>
<section id="faq57"> <section id="faq57">
@ -1748,7 +1748,7 @@ iptables: Invalid argument
</section> </section>
</section> </section>
<section> <section id="About">
<title>About Shorewall</title> <title>About Shorewall</title>
<section id="faq10"> <section id="faq10">
@ -1804,7 +1804,7 @@ iptables: Invalid argument
<programlisting><command>/sbin/shorewall[-lite] version</command> </programlisting> <programlisting><command>/sbin/shorewall[-lite] version</command> </programlisting>
<section> <section id="faq25a">
<title>(FAQ 25a) How do I tell which version of Shorewall-perl and <title>(FAQ 25a) How do I tell which version of Shorewall-perl and
Shorewall-shell that I have intalled?</title> Shorewall-shell that I have intalled?</title>
@ -1879,8 +1879,8 @@ iptables: Invalid argument
</variablelist> </variablelist>
</section> </section>
<section id="faq64"> <section id="faq65">
<title>(FAQ 64) How do I accomplish failover with Shorewall?</title> <title>(FAQ 65) How do I accomplish failover with Shorewall?</title>
<para><emphasis role="bold">Answer</emphasis>: <ulink <para><emphasis role="bold">Answer</emphasis>: <ulink
url="http://linuxman.wikispaces.com/Clustering+Shorewall">This article url="http://linuxman.wikispaces.com/Clustering+Shorewall">This article
@ -1888,7 +1888,7 @@ iptables: Invalid argument
</section> </section>
</section> </section>
<section> <section id="RFC1918">
<title>RFC 1918</title> <title>RFC 1918</title>
<section id="faq14"> <section id="faq14">
@ -1999,7 +1999,7 @@ eth0 eth1 # eth1 = interface to local netwo
</section> </section>
</section> </section>
<section> <section id="ALIASES">
<title>Alias IP Addresses/Virtual Interfaces</title> <title>Alias IP Addresses/Virtual Interfaces</title>
<section id="faq18"> <section id="faq18">
@ -2012,7 +2012,7 @@ eth0 eth1 # eth1 = interface to local netwo
</section> </section>
</section> </section>
<section> <section id="Lite">
<title>Shorewall Lite</title> <title>Shorewall Lite</title>
<section id="faq53"> <section id="faq53">
@ -2133,7 +2133,7 @@ eth0 eth1 # eth1 = interface to local netwo
</section> </section>
</section> </section>
<section> <section id="Misc">
<title>Miscellaneous</title> <title>Miscellaneous</title>
<section id="faq20"> <section id="faq20">
@ -2156,7 +2156,7 @@ eth0 eth1 # eth1 = interface to local netwo
<programlisting>net:&lt;ip1&gt;,&lt;ip2&gt;,...</programlisting> <programlisting>net:&lt;ip1&gt;,&lt;ip2&gt;,...</programlisting>
<example> <example id="Example4">
<title>Example:</title> <title>Example:</title>
<programlisting>ACCEPT net:192.0.2.16/28,192.0.2.44 fw tcp 22</programlisting> <programlisting>ACCEPT net:192.0.2.16/28,192.0.2.44 fw tcp 22</programlisting>

View File

@ -47,7 +47,7 @@
release.</emphasis></para> release.</emphasis></para>
</caution> </caution>
<section> <section id="Protocol">
<title>FTP Protocol</title> <title>FTP Protocol</title>
<para>FTP transfers involve two TCP connections. The first <emphasis <para>FTP transfers involve two TCP connections. The first <emphasis
@ -167,7 +167,7 @@ ftp&gt;</programlisting>
</orderedlist> </orderedlist>
</section> </section>
<section> <section id="Conntrack">
<title>Linux FTP connection-tracking</title> <title>Linux FTP connection-tracking</title>
<para>Given the normal loc-&gt;net policy of ACCEPT, passive mode access <para>Given the normal loc-&gt;net policy of ACCEPT, passive mode access
@ -205,7 +205,7 @@ ftp&gt;</programlisting>
to be loaded automatically by Shorewall.</para> to be loaded automatically by Shorewall.</para>
</important> </important>
<example> <example id="Example1">
<title>Example (Kernel 3.2.20)</title> <title>Example (Kernel 3.2.20)</title>
<programlisting>[root@lists etc]# lsmod <programlisting>[root@lists etc]# lsmod
@ -290,7 +290,7 @@ xt_tcpudp 3328 0
/etc/shorewall/shorewall.conf to point to that directory.</para> /etc/shorewall/shorewall.conf to point to that directory.</para>
</section> </section>
<section> <section id="Ports">
<title>FTP on Non-standard Ports</title> <title>FTP on Non-standard Ports</title>
<note> <note>
@ -313,7 +313,7 @@ xt_tcpudp 3328 0
order to use FTP on a non-standard port.</para> order to use FTP on a non-standard port.</para>
</caution></para> </caution></para>
<example> <example id="Example2">
<title>if you run an FTP server that listens on port 49 or you need to <title>if you run an FTP server that listens on port 49 or you need to
access a server on the internet that listens on that port then you would access a server on the internet that listens on that port then you would
have:</title> have:</title>
@ -391,7 +391,7 @@ DNAT ACTION =
the preferred way to generate the rules described above. Here are a couple the preferred way to generate the rules described above. Here are a couple
of examples.</para> of examples.</para>
<para><example> <para><example id="Example3">
<title>Server running behind a Masquerading Gateway</title> <title>Server running behind a Masquerading Gateway</title>
<para>Suppose that you run an FTP server on 192.168.1.5 in your local <para>Suppose that you run an FTP server on 192.168.1.5 in your local
@ -400,7 +400,7 @@ DNAT ACTION =
<programlisting>#ACTION SOURCE DESTINATION PROTO PORT(S) SOURCE ORIGINAL <programlisting>#ACTION SOURCE DESTINATION PROTO PORT(S) SOURCE ORIGINAL
# PORT(S) DESTINATION # PORT(S) DESTINATION
FTP/DNAT net loc:192.168.1.5</programlisting> FTP/DNAT net loc:192.168.1.5</programlisting>
</example><example> </example><example id="Example4">
<title>Allow your DMZ FTP access to the Internet</title> <title>Allow your DMZ FTP access to the Internet</title>
<programlisting>#ACTION SOURCE DESTINATION PROTO PORT(S) SOURCE ORIGINAL <programlisting>#ACTION SOURCE DESTINATION PROTO PORT(S) SOURCE ORIGINAL

View File

@ -45,7 +45,7 @@
can generally describe the tunneling software using <quote>generic can generally describe the tunneling software using <quote>generic
tunnels</quote>.</para> tunnels</quote>.</para>
<section> <section id="Bridged">
<title>Bridging two Masqueraded Networks</title> <title>Bridging two Masqueraded Networks</title>
<para>Suppose that we have the following situation:</para> <para>Suppose that we have the following situation:</para>

View File

@ -34,7 +34,7 @@
</legalnotice> </legalnotice>
</articleinfo> </articleinfo>
<section> <section id="GettingStarted">
<title>Getting Started</title> <title>Getting Started</title>
<para>If you are new to Shorewall, please read these two articles <para>If you are new to Shorewall, please read these two articles

View File

@ -272,7 +272,7 @@
described in the Bering (or Bering uClibc) documentation.</para> described in the Bering (or Bering uClibc) documentation.</para>
</section> </section>
<section> <section id="Debian">
<title>Install the .deb</title> <title>Install the .deb</title>
<important> <important>
@ -307,7 +307,7 @@ Pin-Priority: 700</programlisting><emphasis role="bold"><emphasis>Then
<filename>/etc/default/shorewall</filename>.</emphasis></emphasis></para> <filename>/etc/default/shorewall</filename>.</emphasis></emphasis></para>
</section> </section>
<section> <section id="Upgrade">
<title>General Notes about Upgrading Shorewall</title> <title>General Notes about Upgrading Shorewall</title>
<para>Most problems associated with upgrades come from two causes:</para> <para>Most problems associated with upgrades come from two causes:</para>
@ -594,7 +594,7 @@ tar -xzvf /mnt/package2.lrp
contain all of the information you need.</para> contain all of the information you need.</para>
</section> </section>
<section> <section id="Uninstall">
<title>Uninstall/Fallback</title> <title>Uninstall/Fallback</title>
<para>See <quote><ulink url="fallback.htm">Fallback and <para>See <quote><ulink url="fallback.htm">Fallback and

View File

@ -34,7 +34,7 @@
</legalnotice> </legalnotice>
</articleinfo> </articleinfo>
<section> <section id="Tarball">
<title>Falling Back to the Previous Version of Shorewall using the <title>Falling Back to the Previous Version of Shorewall using the
Fallback Script</title> Fallback Script</title>
@ -62,7 +62,7 @@
</caution> </caution>
</section> </section>
<section> <section id="RPM">
<title>Falling Back to the Previous Version of Shorewall using rpm</title> <title>Falling Back to the Previous Version of Shorewall using rpm</title>
<para>If your previous version of Shorewall was installed using RPM, you <para>If your previous version of Shorewall was installed using RPM, you
@ -72,7 +72,7 @@
3.1.1-0 version of Shorewall).</para> 3.1.1-0 version of Shorewall).</para>
</section> </section>
<section> <section id="Uninstall">
<title>Uninstalling Shorewall</title> <title>Uninstalling Shorewall</title>
<para>If you no longer wish to use Shorewall, you may remove it by:</para> <para>If you no longer wish to use Shorewall, you may remove it by:</para>
@ -92,7 +92,7 @@
<quote>rpm -e shorewall</quote>.</para> <quote>rpm -e shorewall</quote>.</para>
</section> </section>
<section> <section id="Shell-Perl">
<title>Shorewall-shell and Shorewall-perl</title> <title>Shorewall-shell and Shorewall-perl</title>
<para>Shorewall-shell and Shoreall-perl have no configuration files and <para>Shorewall-shell and Shoreall-perl have no configuration files and