mirror of
https://gitlab.com/shorewall/code.git
synced 2024-12-22 22:30:58 +01:00
fixed quotes, add CVS Id
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@969 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
parent
3a70dd9c48
commit
d5b6f09407
@ -2,6 +2,8 @@
|
||||
<!DOCTYPE article PUBLIC "-//OASIS//DTD DocBook XML V4.2//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.2/docbookx.dtd">
|
||||
<article id="Multiple_Zones">
|
||||
<!--$Id$-->
|
||||
|
||||
<articleinfo>
|
||||
<title>Multiple Zones per Interface</title>
|
||||
|
||||
@ -26,8 +28,8 @@
|
||||
document under the terms of the GNU Free Documentation License, Version
|
||||
1.2 or any later version published by the Free Software Foundation; with
|
||||
no Invariant Sections, with no Front-Cover, and with no Back-Cover
|
||||
Texts. A copy of the license is included in the section entitled "<ulink
|
||||
url="GnuCopyright.htm">GNU Free Documentation License</ulink>".</para>
|
||||
Texts. A copy of the license is included in the section entitled
|
||||
<quote><ulink url="GnuCopyright.htm">GNU Free Documentation License</ulink></quote>.</para>
|
||||
</legalnotice>
|
||||
</articleinfo>
|
||||
|
||||
@ -82,11 +84,11 @@
|
||||
|
||||
<para><emphasis role="bold">These examples use the local zone but the same
|
||||
technique works for any zone.</emphasis> Remember that Shorewall
|
||||
doesn't have any conceptual knowledge of "Internet",
|
||||
"Local", or "DMZ" so all zones except the firewall itself
|
||||
($FW) are the same as far as Shorewall is concerned. Also, the examples
|
||||
use private (RFC 1918) addresses but public IP addresses can be used in
|
||||
exactly the same way.</para>
|
||||
doesn't have any conceptual knowledge of <quote>Internet</quote>,
|
||||
<quote>Local</quote>, or <quote>DMZ</quote> so all zones except the
|
||||
firewall itself ($FW) are the same as far as Shorewall is concerned. Also,
|
||||
the examples use private (RFC 1918) addresses but public IP addresses can
|
||||
be used in exactly the same way.</para>
|
||||
</section>
|
||||
|
||||
<section>
|
||||
@ -95,9 +97,9 @@
|
||||
<para>Here is an example of a router in the local zone.</para>
|
||||
|
||||
<note>
|
||||
<para> the <emphasis role="bold">box called "Router" could be a
|
||||
VPN server</emphasis> or other such device; from the point of view of
|
||||
this discussion, it makes no difference.</para>
|
||||
<para>the <emphasis role="bold">box called <quote>Router</quote> could
|
||||
be a VPN server</emphasis> or other such device; from the point of view
|
||||
of this discussion, it makes no difference.</para>
|
||||
</note>
|
||||
|
||||
<graphic fileref="images/MultiZone1.png" />
|
||||
@ -145,8 +147,8 @@
|
||||
</listitem>
|
||||
|
||||
<listitem>
|
||||
<para>Set the 'routeback' and 'newnotsyn' options
|
||||
for eth1 (the local firewall interface) in
|
||||
<para>Set the <quote>routeback</quote> and <quote>newnotsyn</quote>
|
||||
options for eth1 (the local firewall interface) in
|
||||
/etc/shorewall/interfaces.</para>
|
||||
</listitem>
|
||||
|
||||
@ -165,19 +167,19 @@
|
||||
<section>
|
||||
<title>Nested Zones</title>
|
||||
|
||||
<para>You can define one zone (called it 'loc') as being all
|
||||
hosts connectied to eth1 and a second zone 'loc1'
|
||||
<para>You can define one zone (called it <quote>loc</quote>) as being
|
||||
all hosts connectied to eth1 and a second zone <quote>loc1</quote>
|
||||
(192.168.2.0/24) as a sub-zone.</para>
|
||||
|
||||
<graphic fileref="images/MultiZone1A.png" />
|
||||
|
||||
<para>The advantage of this approach is that the zone 'loc1'
|
||||
<para>The advantage of this approach is that the zone <quote>loc1</quote>
|
||||
can use CONTINUE policies such that if a connection request
|
||||
doesn't match a 'loc1' rule, it will be matched against
|
||||
the 'loc' rules. For example, if your loc1->net policy is
|
||||
CONTINUE then if a connection request from loc1 to the internet
|
||||
doesn't match any rules for loc1->net then it will be checked
|
||||
against the loc->net rules.</para>
|
||||
doesn't match a <quote>loc1</quote> rule, it will be matched
|
||||
against the <quote>loc</quote> rules. For example, if your
|
||||
loc1->net policy is CONTINUE then if a connection request from
|
||||
loc1 to the internet doesn't match any rules for loc1->net
|
||||
then it will be checked against the loc->net rules.</para>
|
||||
|
||||
<table>
|
||||
<title>/etc/shorewall/zones</title>
|
||||
@ -274,8 +276,8 @@
|
||||
</table>
|
||||
|
||||
<para>If you don't need Shorewall to set up infrastructure to
|
||||
route traffic between 'loc' and 'loc1', add these two
|
||||
policies:</para>
|
||||
route traffic between <quote>loc</quote> and <quote>loc1</quote>, add
|
||||
these two policies:</para>
|
||||
|
||||
<table>
|
||||
<title>/etc/shorewall/policy</title>
|
||||
@ -435,8 +437,8 @@
|
||||
</table>
|
||||
|
||||
<para>If you don't need Shorewall to set up infrastructure to
|
||||
route traffic between 'loc' and 'loc1', add these two
|
||||
policies:</para>
|
||||
route traffic between <quote>loc</quote> and <quote>loc1</quote>, add
|
||||
these two policies:</para>
|
||||
|
||||
<table>
|
||||
<title>/etc/shorewall/policy</title>
|
||||
@ -593,8 +595,8 @@
|
||||
</table>
|
||||
|
||||
<para>You probably don't want Shorewall to set up infrastructure to
|
||||
route traffic between 'loc' and 'loc1' so you should add
|
||||
these two policies:</para>
|
||||
route traffic between <quote>loc</quote> and <quote>loc1</quote> so you
|
||||
should add these two policies:</para>
|
||||
|
||||
<table>
|
||||
<title>/etc/shorewall/policy</title>
|
||||
|
@ -2,6 +2,8 @@
|
||||
<!DOCTYPE article PUBLIC "-//OASIS//DTD DocBook XML V4.2//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.2/docbookx.dtd">
|
||||
<article id="NAT">
|
||||
<!--$Id$-->
|
||||
|
||||
<articleinfo>
|
||||
<title>One-to-one NAT</title>
|
||||
|
||||
@ -30,8 +32,8 @@
|
||||
document under the terms of the GNU Free Documentation License, Version
|
||||
1.2 or any later version published by the Free Software Foundation; with
|
||||
no Invariant Sections, with no Front-Cover, and with no Back-Cover
|
||||
Texts. A copy of the license is included in the section entitled "<ulink
|
||||
url="GnuCopyright.htm">GNU Free Documentation License</ulink>".</para>
|
||||
Texts. A copy of the license is included in the section entitled
|
||||
<quote><ulink url="GnuCopyright.htm">GNU Free Documentation License</ulink></quote>.</para>
|
||||
</legalnotice>
|
||||
</articleinfo>
|
||||
|
||||
@ -113,25 +115,26 @@
|
||||
/etc/shorewall/masq or /etc/shorewall/proxyarp.</para>
|
||||
|
||||
<note>
|
||||
<para>The "ALL INTERFACES" column is used to specify whether
|
||||
access to the external IP from all firewall interfaces should undergo
|
||||
NAT (Yes or yes) or if only access from the interface in the INTERFACE
|
||||
column should undergo NAT. If you leave this column empty, "Yes"
|
||||
is assumed. The ALL INTERFACES column was added in version 1.1.6.
|
||||
<emphasis role="bold">Specifying "Yes" in this column will not
|
||||
allow systems on the lower LAN to access each other using their public
|
||||
IP addresses.</emphasis> For example, the lower left-hand system
|
||||
(10.1.1.2) cannot connect to 130.252.100.19 and expect to be connected
|
||||
to the lower right-hand system. <ulink url="FAQ.htm#faq2a">See FAQ 2a</ulink>.</para>
|
||||
<para>The <quote>ALL INTERFACES</quote> column is used to specify
|
||||
whether access to the external IP from all firewall interfaces should
|
||||
undergo NAT (Yes or yes) or if only access from the interface in the
|
||||
INTERFACE column should undergo NAT. If you leave this column empty,
|
||||
<quote>Yes</quote> is assumed. The ALL INTERFACES column was added in
|
||||
version 1.1.6. <emphasis role="bold">Specifying <quote>Yes</quote> in
|
||||
this column will not allow systems on the lower LAN to access each other
|
||||
using their public IP addresses.</emphasis> For example, the lower
|
||||
left-hand system (10.1.1.2) cannot connect to 130.252.100.19 and expect
|
||||
to be connected to the lower right-hand system. <ulink
|
||||
url="FAQ.htm#faq2a">See FAQ 2a</ulink>.</para>
|
||||
</note>
|
||||
|
||||
<note>
|
||||
<para>Shorewall will automatically add the external address to the
|
||||
specified interface unless you specify <ulink
|
||||
url="Documentation.htm#Aliases">ADD_IP_ALIASES</ulink>="no" (or
|
||||
"No") in /etc/shorewall/shorewall.conf; If you do not set
|
||||
ADD_IP_ALIASES or if you set it to "Yes" or "yes" then
|
||||
you must NOT configure your own alias(es).</para>
|
||||
url="Documentation.htm#Aliases">ADD_IP_ALIASES</ulink>=<quote>no</quote>
|
||||
(or <quote>No</quote>) in /etc/shorewall/shorewall.conf; If you do not
|
||||
set ADD_IP_ALIASES or if you set it to <quote>Yes</quote> or
|
||||
<quote>yes</quote> then you must NOT configure your own alias(es).</para>
|
||||
|
||||
<para><important><para>Shorewall versions earlier than 1.4.6 can only
|
||||
add external addresses to an interface that is configured with a single
|
||||
@ -141,13 +144,13 @@
|
||||
</note>
|
||||
|
||||
<note>
|
||||
<para>The contents of the "LOCAL" column determine whether
|
||||
<para>The contents of the <quote>LOCAL</quote> column determine whether
|
||||
packets originating on the firewall itself and destined for the EXTERNAL
|
||||
address are redirected to the internal ADDRESS. If this column contains
|
||||
"yes" or "Yes" (and the ALL INTERFACES COLUMN also
|
||||
contains "Yes" or "yes") then such packets are
|
||||
redirected; otherwise, such packets are not redirected. The LOCAL column
|
||||
was added in version 1.1.8.</para>
|
||||
<quote>yes</quote> or <quote>Yes</quote> (and the ALL INTERFACES COLUMN
|
||||
also contains <quote>Yes</quote> or <quote>yes</quote>) then such
|
||||
packets are redirected; otherwise, such packets are not redirected. The
|
||||
LOCAL column was added in version 1.1.8.</para>
|
||||
</note>
|
||||
</section>
|
||||
</article>
|
@ -2,6 +2,8 @@
|
||||
<!DOCTYPE article PUBLIC "-//OASIS//DTD DocBook XML V4.2//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.2/docbookx.dtd">
|
||||
<article id="NetfilterOverview">
|
||||
<!--$Id$-->
|
||||
|
||||
<articleinfo>
|
||||
<title>Netfilter Overview</title>
|
||||
|
||||
@ -26,8 +28,8 @@
|
||||
document under the terms of the GNU Free Documentation License, Version
|
||||
1.2 or any later version published by the Free Software Foundation; with
|
||||
no Invariant Sections, with no Front-Cover, and with no Back-Cover
|
||||
Texts. A copy of the license is included in the section entitled "<ulink
|
||||
url="GnuCopyright.htm">GNU Free Documentation License</ulink>".</para>
|
||||
Texts. A copy of the license is included in the section entitled
|
||||
<quote><ulink url="GnuCopyright.htm">GNU Free Documentation License</ulink></quote>.</para>
|
||||
</legalnotice>
|
||||
</articleinfo>
|
||||
|
||||
@ -76,8 +78,8 @@
|
||||
|
||||
<graphic fileref="images/Netfilter.png" />
|
||||
|
||||
<para>"Local Process" means a process running on the Shorewall
|
||||
system itself.</para>
|
||||
<para><quote>Local Process</quote> means a process running on the
|
||||
Shorewall system itself.</para>
|
||||
|
||||
<para>In the above diagram are boxes similar to this:</para>
|
||||
|
||||
@ -102,10 +104,10 @@
|
||||
</important>
|
||||
|
||||
<para>The above diagram should help you understand the output of
|
||||
"shorewall status".</para>
|
||||
<quote>shorewall status</quote>.</para>
|
||||
|
||||
<para>Here are some excerpts from "shorewall status" on a server
|
||||
with one interface (eth0):</para>
|
||||
<para>Here are some excerpts from <quote>shorewall status</quote> on a
|
||||
server with one interface (eth0):</para>
|
||||
|
||||
<programlisting>[root@lists html]# shorewall status
|
||||
|
||||
@ -124,7 +126,7 @@ Counters reset Sat Oct 11 08:12:57 PDT 2003</programlisting>
|
||||
|
||||
<para>The following rule indicates that all traffic destined for the
|
||||
firewall that comes into the firewall on eth0 is passed to a chain called
|
||||
"eth0_in". That chain will be shown further down.</para>
|
||||
<quote>eth0_in</quote>. That chain will be shown further down.</para>
|
||||
|
||||
<programlisting> 785K 93M eth0_in all -- eth0 * 0.0.0.0/0 0.0.0.0/0
|
||||
0 0 common all -- * * 0.0.0.0/0 0.0.0.0/0
|
||||
@ -157,8 +159,8 @@ Chain OUTPUT (policy DROP 1 packets, 60 bytes)
|
||||
785K 93M dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
|
||||
785K 93M net2fw all -- * * 0.0.0.0/0 0.0.0.0/0</programlisting>
|
||||
|
||||
<para>The "dynamic" chain above is where dynamic blacklisting is
|
||||
done.</para>
|
||||
<para>The <quote>dynamic</quote> chain above is where dynamic blacklisting
|
||||
is done.</para>
|
||||
|
||||
<para>Next comes the <emphasis role="bold">Nat</emphasis> table:</para>
|
||||
|
||||
|
@ -2,6 +2,8 @@
|
||||
<!DOCTYPE article PUBLIC "-//OASIS//DTD DocBook XML V4.2//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.2/docbookx.dtd">
|
||||
<article id="OPENVPN">
|
||||
<!--$Id$-->
|
||||
|
||||
<articleinfo>
|
||||
<title>OpenVPN Tunnels</title>
|
||||
|
||||
@ -34,8 +36,8 @@
|
||||
document under the terms of the GNU Free Documentation License, Version
|
||||
1.2 or any later version published by the Free Software Foundation; with
|
||||
no Invariant Sections, with no Front-Cover, and with no Back-Cover
|
||||
Texts. A copy of the license is included in the section entitled "<ulink
|
||||
url="GnuCopyright.htm">GNU Free Documentation License</ulink>".</para>
|
||||
Texts. A copy of the license is included in the section entitled
|
||||
<quote><ulink url="GnuCopyright.htm">GNU Free Documentation License</ulink></quote>.</para>
|
||||
</legalnotice>
|
||||
</articleinfo>
|
||||
|
||||
@ -65,8 +67,8 @@
|
||||
start and stop it.</para>
|
||||
|
||||
<para>On each firewall, you will need to declare a zone to represent the
|
||||
remote subnet. We'll assume that this zone is called 'vpn' and
|
||||
declare it in /etc/shorewall/zones on both systems as follows.</para>
|
||||
remote subnet. We'll assume that this zone is called <quote>vpn</quote>
|
||||
and declare it in /etc/shorewall/zones on both systems as follows.</para>
|
||||
|
||||
<table>
|
||||
<title>/etc/shorewall/zones system A & B</title>
|
||||
@ -288,9 +290,9 @@ key my-b.key
|
||||
comp-lzo
|
||||
verb 5</programlisting>
|
||||
|
||||
<para>You will need to allow traffic between the "vpn" zone and
|
||||
the "loc" zone on both systems -- if you simply want to admit all
|
||||
traffic in both directions, you can use the policy file:</para>
|
||||
<para>You will need to allow traffic between the <quote>vpn</quote> zone
|
||||
and the <quote>loc</quote> zone on both systems -- if you simply want to
|
||||
admit all traffic in both directions, you can use the policy file:</para>
|
||||
|
||||
<table>
|
||||
<title>/etc/shorewall/policy system A & B</title>
|
||||
|
Loading…
Reference in New Issue
Block a user