mirror of
https://gitlab.com/shorewall/code.git
synced 2025-01-08 22:58:50 +01:00
Shorewall 2.0.3-RC2
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@1403 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
parent
3ca68c3b59
commit
dbd062e23e
@ -4496,7 +4496,7 @@ setup_blacklist() {
|
|||||||
|
|
||||||
createchain blacklst no
|
createchain blacklst no
|
||||||
|
|
||||||
[ -n "$BLACKLISTNEWONLY" ] && state="-m state --state NEW" || state=
|
[ -n "$BLACKLISTNEWONLY" ] && state="-m state --state NEW,INVALID" || state=
|
||||||
|
|
||||||
for host in $hosts; do
|
for host in $hosts; do
|
||||||
interface=${host%%:*}
|
interface=${host%%:*}
|
||||||
@ -4851,7 +4851,7 @@ initialize_netfilter () {
|
|||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
|
|
||||||
[ -n "$BLACKLISTNEWONLY" ] && state="-m state --state NEW" || state=
|
[ -n "$BLACKLISTNEWONLY" ] && state="-m state --state NEW,INVALID" || state=
|
||||||
|
|
||||||
echo "Creating Interface Chains..."
|
echo "Creating Interface Chains..."
|
||||||
|
|
||||||
|
@ -1 +1 @@
|
|||||||
2.0.3-RC1
|
2.0.3-RC2
|
||||||
|
@ -1232,13 +1232,40 @@ DNAT net loc:192.168.1.3 tcp ssh
|
|||||||
|
|
||||||
<para>The <filename>/etc/shorewall/rules</filename> file defines
|
<para>The <filename>/etc/shorewall/rules</filename> file defines
|
||||||
exceptions to the policies established in the <filename>/etc/shorewall/policy</filename>
|
exceptions to the policies established in the <filename>/etc/shorewall/policy</filename>
|
||||||
file. There is one entry in /etc/shorewall/rules for each of these rules.</para>
|
file. There is one entry in /etc/shorewall/rules for each of these rules.
|
||||||
|
Entries in this file only govern the establishment of new connections —
|
||||||
|
packets that are part of an existing connection or that establish a
|
||||||
|
connection that is related to an existing connection are automatically
|
||||||
|
accepted.</para>
|
||||||
|
|
||||||
<para>Shorewall automatically enables firewall->firewall traffic over
|
<para>Shorewall automatically enables firewall->firewall traffic over
|
||||||
the loopback interface (lo) -- that traffic cannot be regulated using
|
the loopback interface (lo) -- that traffic cannot be regulated using
|
||||||
rules and any rule that tries to regulate such traffic will generate a
|
rules and any rule that tries to regulate such traffic will generate a
|
||||||
warning and will be ignored.</para>
|
warning and will be ignored.</para>
|
||||||
|
|
||||||
|
<para>Rules for each pair of zones (source zone, destination zone) are
|
||||||
|
evaluated in the order that they appear in the file — the first match
|
||||||
|
determines the disposition of the connection request with a couple of
|
||||||
|
caveats:</para>
|
||||||
|
|
||||||
|
<itemizedlist>
|
||||||
|
<listitem>
|
||||||
|
<para>LOG rules cause the connection request to be logged then
|
||||||
|
processing continues with the next rule in the file.</para>
|
||||||
|
</listitem>
|
||||||
|
|
||||||
|
<listitem>
|
||||||
|
<para>QUEUE rules cause the connection request to be passed to
|
||||||
|
user-space -- the user-space application can later insert them back
|
||||||
|
into the stream for further processing by following rules.</para>
|
||||||
|
</listitem>
|
||||||
|
|
||||||
|
<listitem>
|
||||||
|
<para>CONTINUE rules may cause the connection request to be
|
||||||
|
reprocessed using a different (source zone, destination zone) pair.</para>
|
||||||
|
</listitem>
|
||||||
|
</itemizedlist>
|
||||||
|
|
||||||
<para>Entries in the file have the following columns:</para>
|
<para>Entries in the file have the following columns:</para>
|
||||||
|
|
||||||
<variablelist>
|
<variablelist>
|
||||||
@ -3115,7 +3142,8 @@ eth1 -</programlisting>
|
|||||||
<appendix>
|
<appendix>
|
||||||
<title>Revision History</title>
|
<title>Revision History</title>
|
||||||
|
|
||||||
<para><revhistory><revision><revnumber>1.12</revnumber><date>2004-01-21</date><authorinitials>TE</authorinitials><revremark>Add
|
<para><revhistory><revision><revnumber>1.13</revnumber><date>2004-02-13</date><authorinitials>TE</authorinitials><revremark>Add
|
||||||
|
information about the order of rules evalution.</revremark></revision><revision><revnumber>1.12</revnumber><date>2004-01-21</date><authorinitials>TE</authorinitials><revremark>Add
|
||||||
masquerade destination list.</revremark></revision><revision><revnumber>1.12</revnumber><date>2004-01-18</date><authorinitials>TE</authorinitials><revremark>Correct
|
masquerade destination list.</revremark></revision><revision><revnumber>1.12</revnumber><date>2004-01-18</date><authorinitials>TE</authorinitials><revremark>Correct
|
||||||
typo.</revremark></revision><revision><revnumber>1.11</revnumber><date>2004-01-05</date><authorinitials>TE</authorinitials><revremark>Standards
|
typo.</revremark></revision><revision><revnumber>1.11</revnumber><date>2004-01-05</date><authorinitials>TE</authorinitials><revremark>Standards
|
||||||
Compliance</revremark></revision><revision><revnumber>1.10</revnumber><date>2004-01-05</date><authorinitials>TE</authorinitials><revremark>Improved
|
Compliance</revremark></revision><revision><revnumber>1.10</revnumber><date>2004-01-05</date><authorinitials>TE</authorinitials><revremark>Improved
|
||||||
|
@ -17,7 +17,7 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2004-01-25</pubdate>
|
<pubdate>2004-03-04</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2001-2004</year>
|
<year>2001-2004</year>
|
||||||
@ -529,6 +529,28 @@ eth2 192.168.2.0/24</programlisting>
|
|||||||
|
|
||||||
<para>See the <ulink url="FTP.html">Shorewall and FTP page</ulink>.</para>
|
<para>See the <ulink url="FTP.html">Shorewall and FTP page</ulink>.</para>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
|
<section id="faq33">
|
||||||
|
<title>(FAQ 33) From clients behind the firewall, connections to some
|
||||||
|
sites fail. Connections to the same sites from the firewall itself work
|
||||||
|
fine. What's wrong.</title>
|
||||||
|
|
||||||
|
<para><emphasis role="bold">Answer</emphasis>: Most likely, you need to
|
||||||
|
set CLAMPMSS=Yes in <ulink url="Documentation.htm#Conf">/etc/shorewall/shorewall.conf</ulink>.</para>
|
||||||
|
</section>
|
||||||
|
|
||||||
|
<section id="faq35">
|
||||||
|
<title>(FAQ 35) I have two Ethernet interfaces to my local network which
|
||||||
|
I have bridged. When Shorewall is started, I'm unable to pass
|
||||||
|
traffic through the bridge. I have defined the bridge interface (br0) as
|
||||||
|
the local interface in /etc/shorewall/interfaces; the bridged Ethernet
|
||||||
|
interfaces are not defined to Shorewall. How do I tell Shorewall to
|
||||||
|
allow traffic through the bridge?</title>
|
||||||
|
|
||||||
|
<para>Answer: Add the <firstterm>routeback</firstterm> option to
|
||||||
|
<filename class="devicefile">br0</filename> in <ulink
|
||||||
|
url="Documentation.htm#Interfaces">/etc/shorewall/interfaces</ulink>.</para>
|
||||||
|
</section>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
<section>
|
<section>
|
||||||
@ -576,7 +598,7 @@ url="http://www.shorewall.net/pub/shorewall/parsefw/">http://www.shorewall.net/p
|
|||||||
<ulink url="http://gege.org/iptables">http://gege.org/iptables</ulink>
|
<ulink url="http://gege.org/iptables">http://gege.org/iptables</ulink>
|
||||||
<ulink url="http://home.regit.org/ulogd-php.html">http://home.regit.org/ulogd-php.html</ulink></literallayout>
|
<ulink url="http://home.regit.org/ulogd-php.html">http://home.regit.org/ulogd-php.html</ulink></literallayout>
|
||||||
|
|
||||||
<para>I personnaly use Logwatch. It emails me a report each day from
|
<para>I personally use Logwatch. It emails me a report each day from
|
||||||
my various systems with each report summarizing the logged activity on
|
my various systems with each report summarizing the logged activity on
|
||||||
the corresponding system.</para>
|
the corresponding system.</para>
|
||||||
</section>
|
</section>
|
||||||
@ -1254,6 +1276,15 @@ Creating input Chains...
|
|||||||
after that will be ignored. Check <quote>man iptables</quote> and look
|
after that will be ignored. Check <quote>man iptables</quote> and look
|
||||||
at the -I (--insert) command.</para>
|
at the -I (--insert) command.</para>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
|
<section id="faq34">
|
||||||
|
<title>(FAQ 34) How can I speed up start (restart)?</title>
|
||||||
|
|
||||||
|
<para>Using a light-weight shell such as <command>ash</command> can
|
||||||
|
dramatically decrease the time required to <emphasis role="bold">start</emphasis>
|
||||||
|
or <emphasis role="bold">restart</emphasis> Shorewall. See the
|
||||||
|
SHOREWALL_SHELL variable in <ulink url="Documentation.htm#Conf"><filename>shorewall.conf</filename></ulink>.</para>
|
||||||
|
</section>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
<section>
|
<section>
|
||||||
@ -1542,19 +1573,19 @@ iptables: Invalid argument
|
|||||||
<section id="faq28">
|
<section id="faq28">
|
||||||
<title>(FAQ 28) How do I use Shorewall as a Bridging Firewall?</title>
|
<title>(FAQ 28) How do I use Shorewall as a Bridging Firewall?</title>
|
||||||
|
|
||||||
<para>Basically, you don't. While there are kernel patches that
|
<para>Experimental Shorewall Bridging Firewall support is available —
|
||||||
allow you to route bridge traffic through Netfilter, the environment is
|
<ulink url="2.0/bridge.html">check here for details</ulink>.</para>
|
||||||
so different from the Layer 3 firewalling environment that very little
|
|
||||||
of Shorewall works. In fact, so much of Shorewall doesn't work that
|
|
||||||
my official position is that <quote>Shorewall doesn't work with
|
|
||||||
Layer 2 Bridging</quote>.</para>
|
|
||||||
</section>
|
</section>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
<appendix>
|
<appendix>
|
||||||
<title>Revision History</title>
|
<title>Revision History</title>
|
||||||
|
|
||||||
<para><revhistory><revision><revnumber>1.15</revnumber><date>2004-01-25</date><authorinitials>TE</authorinitials><revremark>Updated
|
<para><revhistory><revision><revnumber>1.19</revnumber><date>2004-03-05</date><authorinitials>TE</authorinitials><revremark>Added
|
||||||
|
link to Bridge.</revremark></revision><revision><revnumber>1.18</revnumber><date>2004-02-27</date><authorinitials>TE</authorinitials><revremark>Added
|
||||||
|
FAQ 35.</revremark></revision><revision><revnumber>1.17</revnumber><date>2004-02-15</date><authorinitials>TE</authorinitials><revremark>Added
|
||||||
|
FAQ 34.</revremark></revision><revision><revnumber>1.16</revnumber><date>2004-02-11</date><authorinitials>TE</authorinitials><revremark>Added
|
||||||
|
FAQ 33.</revremark></revision><revision><revnumber>1.15</revnumber><date>2004-01-25</date><authorinitials>TE</authorinitials><revremark>Updated
|
||||||
FAQ 32 to mention masquerading. Remove tables.</revremark></revision><revision><revnumber>1.14</revnumber><date>2004-01-24</date><authorinitials>TE</authorinitials><revremark>Added
|
FAQ 32 to mention masquerading. Remove tables.</revremark></revision><revision><revnumber>1.14</revnumber><date>2004-01-24</date><authorinitials>TE</authorinitials><revremark>Added
|
||||||
FAQ 27a regarding kernel/iptables incompatibility.</revremark></revision><revision><revnumber>1.13</revnumber><date>2004-01-24</date><authorinitials>TE</authorinitials><revremark>Add
|
FAQ 27a regarding kernel/iptables incompatibility.</revremark></revision><revision><revnumber>1.13</revnumber><date>2004-01-24</date><authorinitials>TE</authorinitials><revremark>Add
|
||||||
a note about the <emphasis role="bold">detectnets</emphasis> interface
|
a note about the <emphasis role="bold">detectnets</emphasis> interface
|
||||||
|
@ -15,7 +15,7 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2004-01-22</pubdate>
|
<pubdate>2004-03-20</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2001-2004</year>
|
<year>2001-2004</year>
|
||||||
@ -52,24 +52,9 @@
|
|||||||
configuring FreeS/Wan.</para>
|
configuring FreeS/Wan.</para>
|
||||||
|
|
||||||
<warning>
|
<warning>
|
||||||
<para>Do not use Proxy ARP and FreeS/Wan on the same system unless you
|
<para>IPSEC and Proxy ARP don't work well together unless you have
|
||||||
are prepared to suffer the consequences. If you start or restart
|
Shorewall version 1.4.10 with the approriate <ulink url="errata.htm">Errata</ulink>
|
||||||
Shorewall with an IPSEC tunnel active, the proxied IP addresses are
|
fix applied or are running Shorewall 1.4.10e or later.</para>
|
||||||
mistakenly assigned to the IPSEC tunnel device (ipsecX) rather than to
|
|
||||||
the interface that you specify in the INTERFACE column of
|
|
||||||
/etc/shorewall/proxyarp. I haven't had the time to debug this
|
|
||||||
problem so I can't say if it is a bug in the Kernel or in FreeS/Wan.</para>
|
|
||||||
|
|
||||||
<para>You <emphasis role="bold">might</emphasis> be able to work around
|
|
||||||
this problem using the following (I haven't tried it):</para>
|
|
||||||
|
|
||||||
<para>In /etc/shorewall/init, include:</para>
|
|
||||||
|
|
||||||
<programlisting>qt service ipsec stop</programlisting>
|
|
||||||
|
|
||||||
<para>In /etc/shorewall/start, include:</para>
|
|
||||||
|
|
||||||
<programlisting>qt service ipsec start</programlisting>
|
|
||||||
</warning>
|
</warning>
|
||||||
|
|
||||||
<important>
|
<important>
|
||||||
|
@ -15,7 +15,7 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2003-04-08</pubdate>
|
<pubdate>2004-03-01</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2001</year>
|
<year>2001</year>
|
||||||
@ -24,6 +24,8 @@
|
|||||||
|
|
||||||
<year>2003</year>
|
<year>2003</year>
|
||||||
|
|
||||||
|
<year>2004</year>
|
||||||
|
|
||||||
<holder>Thomas M. Eastep</holder>
|
<holder>Thomas M. Eastep</holder>
|
||||||
</copyright>
|
</copyright>
|
||||||
|
|
||||||
@ -37,21 +39,16 @@
|
|||||||
</legalnotice>
|
</legalnotice>
|
||||||
</articleinfo>
|
</articleinfo>
|
||||||
|
|
||||||
<important>
|
|
||||||
<para>Before upgrading, be sure to review the <ulink
|
|
||||||
url="upgrade_issues.htm">Upgrade Issues</ulink>.</para>
|
|
||||||
</important>
|
|
||||||
|
|
||||||
<important>
|
|
||||||
<para>Before attempting installation, I strongly urge you to read and
|
|
||||||
print a copy of the <ulink url="shorewall_quickstart_guide.htm">Shorewall
|
|
||||||
QuickStart</ulink> Guide for the configuration that most closely matches
|
|
||||||
your own.</para>
|
|
||||||
</important>
|
|
||||||
|
|
||||||
<section id="Install_RPM">
|
<section id="Install_RPM">
|
||||||
<title>Install using RPM</title>
|
<title>Install using RPM</title>
|
||||||
|
|
||||||
|
<important>
|
||||||
|
<para>Before attempting installation, I strongly urge you to read and
|
||||||
|
print a copy of the <ulink url="shorewall_quickstart_guide.htm">Shorewall
|
||||||
|
QuickStart</ulink> Guide for the configuration that most closely matches
|
||||||
|
your own.</para>
|
||||||
|
</important>
|
||||||
|
|
||||||
<para>To install Shorewall using the RPM:</para>
|
<para>To install Shorewall using the RPM:</para>
|
||||||
|
|
||||||
<warning>
|
<warning>
|
||||||
@ -117,6 +114,13 @@
|
|||||||
<section id="Install_Tarball">
|
<section id="Install_Tarball">
|
||||||
<title>Install using tarball</title>
|
<title>Install using tarball</title>
|
||||||
|
|
||||||
|
<important>
|
||||||
|
<para>Before attempting installation, I strongly urge you to read and
|
||||||
|
print a copy of the <ulink url="shorewall_quickstart_guide.htm">Shorewall
|
||||||
|
QuickStart</ulink> Guide for the configuration that most closely matches
|
||||||
|
your own.</para>
|
||||||
|
</important>
|
||||||
|
|
||||||
<para>To install Shorewall using the tarball and install script:</para>
|
<para>To install Shorewall using the tarball and install script:</para>
|
||||||
|
|
||||||
<orderedlist>
|
<orderedlist>
|
||||||
@ -186,6 +190,13 @@
|
|||||||
<section id="LRP">
|
<section id="LRP">
|
||||||
<title>Install the .lrp</title>
|
<title>Install the .lrp</title>
|
||||||
|
|
||||||
|
<important>
|
||||||
|
<para>Before attempting installation, I strongly urge you to read and
|
||||||
|
print a copy of the <ulink url="shorewall_quickstart_guide.htm">Shorewall
|
||||||
|
QuickStart</ulink> Guide for the configuration that most closely matches
|
||||||
|
your own.</para>
|
||||||
|
</important>
|
||||||
|
|
||||||
<para>To install my version of Shorewall on a fresh Bering disk, simply
|
<para>To install my version of Shorewall on a fresh Bering disk, simply
|
||||||
replace the <quote>shorwall.lrp</quote> file on the image with the file
|
replace the <quote>shorwall.lrp</quote> file on the image with the file
|
||||||
that you downloaded. See the <ulink url="two-interface.htm">two-interface
|
that you downloaded. See the <ulink url="two-interface.htm">two-interface
|
||||||
@ -195,6 +206,11 @@
|
|||||||
<section id="Upgrade_RPM">
|
<section id="Upgrade_RPM">
|
||||||
<title>Upgrade using RPM</title>
|
<title>Upgrade using RPM</title>
|
||||||
|
|
||||||
|
<important>
|
||||||
|
<para>Before upgrading, be sure to review the <ulink
|
||||||
|
url="upgrade_issues.htm">Upgrade Issues</ulink>.</para>
|
||||||
|
</important>
|
||||||
|
|
||||||
<para>If you already have the Shorewall RPM installed and are upgrading to
|
<para>If you already have the Shorewall RPM installed and are upgrading to
|
||||||
a new version:</para>
|
a new version:</para>
|
||||||
|
|
||||||
@ -264,6 +280,11 @@
|
|||||||
<section id="Upgrade_Tarball">
|
<section id="Upgrade_Tarball">
|
||||||
<title>Upgrade using tarball</title>
|
<title>Upgrade using tarball</title>
|
||||||
|
|
||||||
|
<important>
|
||||||
|
<para>Before upgrading, be sure to review the <ulink
|
||||||
|
url="upgrade_issues.htm">Upgrade Issues</ulink>.</para>
|
||||||
|
</important>
|
||||||
|
|
||||||
<para>If you already have Shorewall installed and are upgrading to a new
|
<para>If you already have Shorewall installed and are upgrading to a new
|
||||||
version using the tarball:</para>
|
version using the tarball:</para>
|
||||||
|
|
||||||
@ -348,6 +369,11 @@
|
|||||||
<section id="LRP_Upgrade">
|
<section id="LRP_Upgrade">
|
||||||
<title>Upgrade the .lrp</title>
|
<title>Upgrade the .lrp</title>
|
||||||
|
|
||||||
|
<important>
|
||||||
|
<para>Before upgrading, be sure to review the <ulink
|
||||||
|
url="upgrade_issues.htm">Upgrade Issues</ulink>.</para>
|
||||||
|
</important>
|
||||||
|
|
||||||
<para>If you already have a running Bering installation and wish to
|
<para>If you already have a running Bering installation and wish to
|
||||||
upgrade to a later version of Shorewall:</para>
|
upgrade to a later version of Shorewall:</para>
|
||||||
|
|
||||||
|
@ -13,11 +13,13 @@
|
|||||||
<surname>Eastep</surname>
|
<surname>Eastep</surname>
|
||||||
</author>
|
</author>
|
||||||
|
|
||||||
<pubdate>2003-10-07</pubdate>
|
<pubdate>2004-03-05</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2003</year>
|
<year>2003</year>
|
||||||
|
|
||||||
|
<year>2004</year>
|
||||||
|
|
||||||
<holder>Thomas M Eastep</holder>
|
<holder>Thomas M Eastep</holder>
|
||||||
</copyright>
|
</copyright>
|
||||||
|
|
||||||
@ -36,7 +38,9 @@
|
|||||||
|
|
||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Be used to filter traffic through a Layer 2 Bridge</para>
|
<para>Be used to filter traffic through a Layer 2 Bridge (although
|
||||||
|
experimental Shorewall Bridge code is available — check <ulink
|
||||||
|
url="2.0/bridge.html">here</ulink> for details).</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
|
@ -15,7 +15,7 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2004-02-04</pubdate>
|
<pubdate>2004-04-19</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2003-2004</year>
|
<year>2003-2004</year>
|
||||||
@ -153,7 +153,7 @@ REDIRECT loc 3228 tcp www - !206.124.146.
|
|||||||
<para>In /etc/shorewall/init, put:</para>
|
<para>In /etc/shorewall/init, put:</para>
|
||||||
|
|
||||||
<programlisting><command>if [ -z "`ip rule list | grep www.out`" ] ; then
|
<programlisting><command>if [ -z "`ip rule list | grep www.out`" ] ; then
|
||||||
ip rule add fwmark 202 table www.out
|
ip rule add fwmark CA table www.out # Note 0xCA = 202
|
||||||
ip route add default via 192.168.1.3 dev eth1 table www.out
|
ip route add default via 192.168.1.3 dev eth1 table www.out
|
||||||
ip route flush cache
|
ip route flush cache
|
||||||
echo 0 > /proc/sys/net/ipv4/conf/eth1/send_redirects
|
echo 0 > /proc/sys/net/ipv4/conf/eth1/send_redirects
|
||||||
@ -232,7 +232,7 @@ chkconfig --level 35 iptables on</command></programlisting>
|
|||||||
<para>In /etc/shorewall/init, put:</para>
|
<para>In /etc/shorewall/init, put:</para>
|
||||||
|
|
||||||
<programlisting><command>if [ -z "`ip rule list | grep www.out`" ] ; then
|
<programlisting><command>if [ -z "`ip rule list | grep www.out`" ] ; then
|
||||||
ip rule add fwmark 202 table www.out
|
ip rule add fwmark CA table www.out # Note 0xCA = 202
|
||||||
ip route add default via 192.0.2.177 dev eth1 table www.out
|
ip route add default via 192.0.2.177 dev eth1 table www.out
|
||||||
ip route flush cache
|
ip route flush cache
|
||||||
fi</command></programlisting>
|
fi</command></programlisting>
|
||||||
|
@ -15,7 +15,7 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2004-01-17</pubdate>
|
<pubdate>2004-02-17</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2002-2004</year>
|
<year>2002-2004</year>
|
||||||
@ -57,7 +57,19 @@
|
|||||||
</listitem>
|
</listitem>
|
||||||
</orderedlist>
|
</orderedlist>
|
||||||
|
|
||||||
<para>Only the source address is checked against the blacklists.</para>
|
<important>
|
||||||
|
<para><emphasis role="bold">Only the source address is checked against
|
||||||
|
the blacklists</emphasis>. Blacklists only stop blacklisted hosts from
|
||||||
|
connecting to you — they do not stop you or your users from connecting
|
||||||
|
to blacklisted hosts .</para>
|
||||||
|
</important>
|
||||||
|
|
||||||
|
<important>
|
||||||
|
<para><emphasis role="bold">Neither form of Shorewall blacklisting is
|
||||||
|
appropriate for blacklisting 1,000s of different addresses</emphasis>.
|
||||||
|
The blacklists will take forever to load and will have a very negative
|
||||||
|
effect on firewall performance.</para>
|
||||||
|
</important>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
<section>
|
<section>
|
||||||
|
@ -15,7 +15,7 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2004-01-05</pubdate>
|
<pubdate>2004-02-20</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2001-2004</year>
|
<year>2001-2004</year>
|
||||||
@ -383,7 +383,7 @@ DNAT net loc:192.168.1.3 tcp 4000:4100</programlisting>
|
|||||||
numbers separated by colons.</para>
|
numbers separated by colons.</para>
|
||||||
|
|
||||||
<example>
|
<example>
|
||||||
<title>MAC Address of a NIC</title>
|
<title>MAC Address of an Ethernet Controller</title>
|
||||||
|
|
||||||
<programlisting>      [root@gateway root]# <command>ifconfig eth0</command>
|
<programlisting>      [root@gateway root]# <command>ifconfig eth0</command>
|
||||||
     eth0 Link encap:Ethernet HWaddr <emphasis
|
     eth0 Link encap:Ethernet HWaddr <emphasis
|
||||||
@ -402,7 +402,7 @@ role="bold">02:00:08:E3:FA:55</emphasis>
|
|||||||
Shorewall requires MAC addresses to be written in another way. In
|
Shorewall requires MAC addresses to be written in another way. In
|
||||||
Shorewall, MAC addresses begin with a tilde (<quote>~</quote>) and consist
|
Shorewall, MAC addresses begin with a tilde (<quote>~</quote>) and consist
|
||||||
of 6 hex numbers separated by hyphens. In Shorewall, the MAC address in
|
of 6 hex numbers separated by hyphens. In Shorewall, the MAC address in
|
||||||
the example above would be written <quote>~02-00-08-E3-FA-55</quote>.</para>
|
the example above would be written <emphasis role="bold">~02-00-08-E3-FA-55</emphasis>.</para>
|
||||||
|
|
||||||
<note>
|
<note>
|
||||||
<para>It is not necessary to use the special Shorewall notation in the
|
<para>It is not necessary to use the special Shorewall notation in the
|
||||||
|
@ -13,7 +13,7 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2004-02-04</pubdate>
|
<pubdate>2004-04-16</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2001-2004</year>
|
<year>2001-2004</year>
|
||||||
@ -86,12 +86,55 @@
|
|||||||
<para>The <emphasis role="bold">maclist</emphasis> interface option
|
<para>The <emphasis role="bold">maclist</emphasis> interface option
|
||||||
previously wasn't available on Atheros WiFi cards.</para>
|
previously wasn't available on Atheros WiFi cards.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
|
<listitem>
|
||||||
|
<para>In the /etc/shorewall/masq entry <quote>eth0:!10.1.1.150
|
||||||
|
   0.0.0.0/0!10.1.0.0/16     10.1.2.16</quote>,
|
||||||
|
the <quote>!10.1.0.0/16</quote> is ignored.</para>
|
||||||
|
</listitem>
|
||||||
|
|
||||||
|
<listitem>
|
||||||
|
<para>A startup error occurs if an entry in the tcrules file has an
|
||||||
|
empty USER/GROUP column.</para>
|
||||||
|
</listitem>
|
||||||
|
|
||||||
|
<listitem>
|
||||||
|
<para>Specifying multiple excluded source zones in a REDIRECT or
|
||||||
|
DNAT rule produces a startup error. Example of problem rule:<programlisting>#ACTION SOURCE DEST PROTO DEST PORT(S)
|
||||||
|
DNAT z1!z2,z3 z4:192.168.4.5 tcp 22</programlisting></para>
|
||||||
|
</listitem>
|
||||||
|
|
||||||
|
<listitem>
|
||||||
|
<para>When using an Action in the ACTIONS column of a rule, you may
|
||||||
|
receive a warning message about the rule being a policy. While this
|
||||||
|
warning may be safely ignored, it may be eliminated by installing
|
||||||
|
the updated script linked below.</para>
|
||||||
|
</listitem>
|
||||||
|
|
||||||
|
<listitem>
|
||||||
|
<para>Thanks to Sean Mathews, a long-standing problem with Proxy ARP
|
||||||
|
and IPSEC has been corrected.</para>
|
||||||
|
</listitem>
|
||||||
</itemizedlist>
|
</itemizedlist>
|
||||||
|
|
||||||
<para>These problems have been corrected in <ulink
|
<para>These problems have been corrected in <ulink
|
||||||
url="http://shorewall.net/pub/shorewall/errata/1.4.10/firewall">this
|
url="http://shorewall.net/pub/shorewall/errata/1.4.10/firewall">this
|
||||||
firewall script</ulink> which may be installed in
|
firewall script</ulink> which may be installed in
|
||||||
/usr/share/shorewall/firewall as described above.</para>
|
/usr/share/shorewall/firewall as described above.</para>
|
||||||
|
|
||||||
|
<para>The first two problem corrections were included in Shorewall
|
||||||
|
update 1.4.10a.</para>
|
||||||
|
|
||||||
|
<para>The first three problem corrections were included in Shorewall
|
||||||
|
update 1.4.10b.</para>
|
||||||
|
|
||||||
|
<para>The first four problem corrections were included in Shorewall
|
||||||
|
update 1.4.10c.</para>
|
||||||
|
|
||||||
|
<para>The first six problem corrections were included in Shorewall
|
||||||
|
update 1.4.10d.</para>
|
||||||
|
|
||||||
|
<para>All problem corrections were included in Shorewall update 1.4.10e.</para>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
<section>
|
<section>
|
||||||
@ -503,7 +546,11 @@ Aborted (core dumped)</programlisting>
|
|||||||
<appendix>
|
<appendix>
|
||||||
<title>Revision History4</title>
|
<title>Revision History4</title>
|
||||||
|
|
||||||
<para><revhistory><revision><revnumber>1.5</revnumber><date>2004-02-05</date><authorinitials>TE</authorinitials><revremark>Startup
|
<para><revhistory><revision><revnumber>1.9</revnumber><date>2004-03-20</date><authorinitials>TE</authorinitials><revremark>Proxy
|
||||||
|
ARP/IPSEC fix.</revremark></revision><revision><revnumber>1.8</revnumber><date>2004-03-04</date><authorinitials>TE</authorinitials><revremark>Multiple
|
||||||
|
excluded zones problem..</revremark></revision><revision><revnumber>1.7</revnumber><date>2004-02-15</date><authorinitials>TE</authorinitials><revremark>TCrules
|
||||||
|
file problem..</revremark></revision><revision><revnumber>1.6</revnumber><date>2004-02-09</date><authorinitials>TE</authorinitials><revremark>Masq
|
||||||
|
file exclusion problem.</revremark></revision><revision><revnumber>1.5</revnumber><date>2004-02-05</date><authorinitials>TE</authorinitials><revremark>Startup
|
||||||
Problem</revremark></revision><revision><revnumber>1.4</revnumber><date>2004-01-19</date><authorinitials>TE</authorinitials><revremark>IPV6
|
Problem</revremark></revision><revision><revnumber>1.4</revnumber><date>2004-01-19</date><authorinitials>TE</authorinitials><revremark>IPV6
|
||||||
address problems. Make RFC1918 file section more prominent.</revremark></revision><revision><revnumber>1.3</revnumber><date>2004-01-14</date><authorinitials>TE</authorinitials><revremark>Confusing
|
address problems. Make RFC1918 file section more prominent.</revremark></revision><revision><revnumber>1.3</revnumber><date>2004-01-14</date><authorinitials>TE</authorinitials><revremark>Confusing
|
||||||
template file in 1.4.9</revremark></revision><revision><revnumber>1.3</revnumber><date>2004-01-03</date><authorinitials>TE</authorinitials><revremark>Added
|
template file in 1.4.9</revremark></revision><revision><revnumber>1.3</revnumber><date>2004-01-03</date><authorinitials>TE</authorinitials><revremark>Added
|
||||||
|
Binary file not shown.
@ -1,5 +1,5 @@
|
|||||||
<?xml version='1.0' encoding='utf-8' ?>
|
<?xml version='1.0' encoding='utf-8' ?>
|
||||||
<?integrity app='Visio' version='10.0' buildnum='525' metric='0' key='3D330883D5BE4379276659B7B337FAEA68F7858049847BF4B73896BB87EE95E3C3BF4CD8EBD5807CEC8562DD2B8068195CBF86047C1AD8342F35E9CB454BE30A' keystart='261' ?>
|
<?integrity app='Visio' version='10.0' buildnum='525' metric='0' key='84600AB4CD69630D9AFF2AEF0195FFF9DC4D028D530F10CBC91B68E9842059260FCCC6173566192227FA36BC2287B555303536255BD184146EF63F63251341A6' keystart='261' ?>
|
||||||
|
|
||||||
<VisioDocument xmlns='urn:schemas-microsoft-com:office:visio'>
|
<VisioDocument xmlns='urn:schemas-microsoft-com:office:visio'>
|
||||||
<DocumentProperties>
|
<DocumentProperties>
|
||||||
@ -1249,8 +1249,8 @@ BAQP/////////////////////////////////////////////////////////////////////////
|
|||||||
/wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//
|
/wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//
|
||||||
wD//wD//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn/////////////////////////////////
|
wD//wD//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn/////////////////////////////////
|
||||||
/////////////////////////////////////////////////////////////////////////////
|
/////////////////////////////////////////////////////////////////////////////
|
||||||
//////////////////////////////////////////////////wAAAP//////////////////////
|
//////////////////////////////////////////////////wAAAP///7+/v////7+/v////7+/
|
||||||
/////////////////////////////////////////////////////////////////////////////
|
v////7+/v////7+/v////7+/v////7+/v////7+/v////7+/v////7+/v////7+/v////7+/v////
|
||||||
///////////////
|
///////////////
|
||||||
/////////////////////////////////////////////////////////////////////////////
|
/////////////////////////////////////////////////////////////////////////////
|
||||||
////////wAAAAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wCfnwkoKA
|
////////wAAAAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wCfnwkoKA
|
||||||
@ -1261,9 +1261,9 @@ vzBAQP///////////////////////////////////////////////////////////////////////
|
|||||||
AAAAD//wAAAAD//wAAAAD//wAAAAD//wAAAAD//wAAAAD//wAAAAD//wAAAAD//wAAAAD//wBAQAD
|
AAAAD//wAAAAD//wAAAAD//wAAAAD//wAAAAD//wAAAAD//wAAAAD//wAAAAD//wAAAAD//wBAQAD
|
||||||
//wD//wD//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn///////////////////////////////
|
//wD//wD//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn///////////////////////////////
|
||||||
/////////////////////////////////////////////////////////////////////////////
|
/////////////////////////////////////////////////////////////////////////////
|
||||||
////////////////////////////////////////////////////wAAAP////////////////////
|
////////////////////////////////////////////////////wAAAGBgYP///wAAAP///wAAAP
|
||||||
/////////////////////////////////////////////////////////////////////////////
|
///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wA
|
||||||
/////////////////////////////////////////////////////////////////////////////
|
AAP//////////////////////////////////////////////////////////////////////////
|
||||||
/////////////////////////wAAAAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//
|
/////////////////////////wAAAAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//
|
||||||
wD//wD//wB/fw5YWAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//w
|
wD//wD//wB/fw5YWAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//w
|
||||||
D//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD
|
D//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD
|
||||||
@ -1273,8 +1273,8 @@ AD//wAAAAD//wAAAAD//wAAAAD//wAAAAD//wAAAAD//wAAAAD//wAAAAD//wAAAAD//wAAAAD//w
|
|||||||
AAAAD//wAAAAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn//////////////
|
AAAAD//wAAAAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn//////////////
|
||||||
/////////////////////////////////////////////////////////////////////////////
|
/////////////////////////////////////////////////////////////////////////////
|
||||||
/////////////////////////////////////////////////////////////////////wAAAP///
|
/////////////////////////////////////////////////////////////////////wAAAP///
|
||||||
/////////////////////////////////////////////////////////////////////////////
|
wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP
|
||||||
/////////////////////////////////////////////////////////////////////////////
|
///wAAAP///wAAAP/////////////////////////////////////////////////////////////
|
||||||
//////////////////////////////////////////wAAAAD//wD//wD//wD//wD//wD//wD//wD/
|
//////////////////////////////////////////wAAAAD//wD//wD//wD//wD//wD//wD//wD/
|
||||||
/wD//wD//wD//wD//wD//wD//wlgYACHhwD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//
|
/wD//wD//wD//wD//wD//wD//wlgYACHhwD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//
|
||||||
wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//w
|
wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//w
|
||||||
@ -1307,8 +1307,8 @@ AQAD//wBAQAD//wBAQAD//wBAQAD//wBwcAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD/
|
|||||||
/wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn////////////////////////////////////////
|
/wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn////////////////////////////////////////
|
||||||
///////////////
|
///////////////
|
||||||
/////////////////////////////////////////////////////0BAQP///0BAQP///0BAQP///
|
/////////////////////////////////////////////////////0BAQP///0BAQP///0BAQP///
|
||||||
0BAQP///0BAQP///0BAQP///////wAAAH9/f////39/f////39/f////39/f////39/f////39/f/
|
0BAQP///0BAQP///0BAQP///////wAAAP////////////////////////////////////////////
|
||||||
///39/f////39/f////39/f////39/f//////////////////////////////////////////////
|
/////////////////////////////////////////////////////////////////////////////
|
||||||
/////////////////////////////////////////////////////////////////////////////
|
/////////////////////////////////////////////////////////////////////////////
|
||||||
/wAAAAD//wD//wD//wCfnwD//wAAAAD//wAAAAD//wAAAAD//wAAAAD//wAAAAD//wAAAAD//wAAA
|
/wAAAAD//wD//wD//wCfnwD//wAAAAD//wAAAAD//wAAAAD//wAAAAD//wAAAAD//wAAAAD//wAAA
|
||||||
AD//wAAAAD//wAAAAD//wAAAAD//wAAAAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//w
|
AD//wAAAAD//wAAAAD//wAAAAD//wAAAAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//w
|
||||||
@ -1318,8 +1318,8 @@ D//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wC/vzBAQP/
|
|||||||
AD//wAAAAD//wAAAAD//wAAAAD//wAAAAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//w
|
AD//wAAAAD//wAAAAD//wAAAAD//wAAAAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//w
|
||||||
D//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn//////////////////////////////////////
|
D//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn//////////////////////////////////////
|
||||||
/////////////////////////////////////////////////////////////////////////////
|
/////////////////////////////////////////////////////////////////////////////
|
||||||
/////////9zc3Hl5eZWVlf///////////////////////wAAAP///wAAAP///wAAAP///wAAAP///
|
/////////9zc3Hl5eZWVlf///////////////////////wAAAP///////////////////////////
|
||||||
wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP////////////////////////
|
/////////////////////////////////////////////////////////////////////////////
|
||||||
/////////////////////////////////////////////////////////////////////////////
|
/////////////////////////////////////////////////////////////////////////////
|
||||||
//////////////////wAAAAD//wD//wD//wD//wBAQAD//wBAQAD//wBAQAD//wBAQAD//wBAQAD/
|
//////////////////wAAAAD//wD//wD//wD//wBAQAD//wBAQAD//wBAQAD//wBAQAD//wBAQAD/
|
||||||
/wBAQAD//wBAQAD//wBAQAD//wBAQAD//wBAQAD//wBAQAD//wDPzwD//wD//wD//wD//wD//wD//
|
/wBAQAD//wBAQAD//wBAQAD//wBAQAD//wBAQAD//wBAQAD//wDPzwD//wD//wD//wD//wD//wD//
|
||||||
@ -1329,8 +1329,8 @@ D//wD//wC/vzBAQP/////////////////////////////////////////////////////////////
|
|||||||
/wD//wD//wCHhwD//wBAQAD//wBAQAD//wBAQAD//wBAQAD//wBwcAD//wD//wD//wD//wD//wD//
|
/wD//wD//wCHhwD//wBAQAD//wBAQAD//wBAQAD//wBAQAD//wBwcAD//wD//wD//wD//wD//wD//
|
||||||
wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn/////////////////////
|
wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn/////////////////////
|
||||||
/////////////////////////////////////////////////////////////////////////////
|
/////////////////////////////////////////////////////////////////////////////
|
||||||
//////////////////////////3l5eTEzOVVVV25ucv///////////////////wAAAAAAAP///wAA
|
//////////////////////////3l5eTEzOVVVV25ucv///////////////////wAAAP//////////
|
||||||
AP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///////////
|
/////////////////////////////////////////////////////////////////////////////
|
||||||
/////////////////////////////////////////////////////////////////////////////
|
/////////////////////////////////////////////////////////////////////////////
|
||||||
///////////////////////////////////wAAAAD//wD//wD//wD//wD//wD//wD//wD//wD//wD
|
///////////////////////////////////wAAAAD//wD//wD//wD//wD//wD//wD//wD//wD//wD
|
||||||
//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD/
|
//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD/
|
||||||
@ -1384,22 +1384,22 @@ wD//wD//wD//wD//wD//wD//wxgYJ+fn/////////////////////////////////////////////
|
|||||||
wC/vzBAQP////////////////////////////////////////////////////////////////////
|
wC/vzBAQP////////////////////////////////////////////////////////////////////
|
||||||
///////////////////////////////7+/vxBAQAD//wD//wD//wD//wD//wD//wD//wD//wD//wD
|
///////////////////////////////7+/vxBAQAD//wD//wD//wD//wD//wD//wD//wD//wD//wD
|
||||||
//wAAAMDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwAAAAJqampCQkA8eHgDn5wD//wD//wD//wD/
|
//wAAAMDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwAAAAJqampCQkA8eHgDn5wD//wD//wD//wD/
|
||||||
/wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn////////////////////////wAAA
|
/wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn////////wAAAP///wAAAP///wAAA
|
||||||
P///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP////
|
P///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///w
|
||||||
///////////////////3d3d2Jmcd/h5ZSe0p6lzs3Nzc3NzUxRaWtsbv///////////////wAAAP/
|
AAAP///wAAAP///////3d3d2Jmcd/h5ZSe0p6lzs3Nzc3NzUxRaWtsbv///////yAgIP///wAAAP/
|
||||||
//wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP//////
|
//wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAA
|
||||||
/////////////////////////////////////////////////////////////////////////////
|
AP///0BAQP///////////////////////////////////////////////////////////////////
|
||||||
////////////////////////////wAAAAD//wD//wD//wD//wD//wCoqAEEBAcNDQcNDQcNDQcNDQ
|
////////////////////////////wAAAAD//wD//wD//wD//wD//wCoqAEEBAcNDQcNDQcNDQcNDQ
|
||||||
cNDQcNDQcNDQcNDQcNDQcNDQcNDQcNDQcNDQcNDQcNDQcNDQYODgDKygD//wD//wD//wD//wD//wD
|
cNDQcNDQcNDQcNDQcNDQcNDQcNDQcNDQcNDQcNDQcNDQcNDQYODgDKygD//wD//wD//wD//wD//wD
|
||||||
//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD/
|
//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD/
|
||||||
/wD//wD//wD//wD//wC/vzBAQP///////////////////////////////////////////////////
|
/wD//wD//wD//wD//wC/vzBAQP///////////////////////////////////////////////////
|
||||||
////////////////////////////////////////////////7+/vxBAQAD//wD//wD//wD//wD//w
|
////////////////////////////////////////////////7+/vxBAQAD//wD//wD//wD//wD//w
|
||||||
D//wD//wD//wD//wD//wAAAMDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwAAAAJqampqamjM/PwC
|
D//wD//wD//wD//wD//wAAAMDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwMDAwAAAAJqampqamjM/PwC
|
||||||
fnwD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn///////////
|
fnwD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn////0BAQP//
|
||||||
/////////0BAQP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAA
|
/wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAA
|
||||||
P///wAAAP///39/f////////////////////3d3d2Jmcd/h5ayy0c3Nzc3NzY6Yz46Yz2ZmZm1ucf
|
P///wAAAP///wAAAP///wAAAP///39/f////3d3d2Jmcd/h5ayy0c3Nzc3NzY6Yz46Yz2ZmZm1ucf
|
||||||
///////0BAQP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP/
|
///////wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP/
|
||||||
//wAAAP///39/f///////////////////////////////////////////////////////////////
|
//wAAAP///wAAAP///wAAAP//////////////////////////////////////////////////////
|
||||||
/////////////////////////////////////////////wAAAAD//wD//wD//wD//wD//wA/PyAgI
|
/////////////////////////////////////////////wAAAAD//wD//wD//wD//wD//wA/PyAgI
|
||||||
JCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkDQ7OxkoKADf3w
|
JCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkDQ7OxkoKADf3w
|
||||||
D//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD
|
D//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD
|
||||||
@ -1407,10 +1407,10 @@ D//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD
|
|||||||
/////////////////////////////////////////////////////////////////7+/vxBAQAD//
|
/////////////////////////////////////////////////////////////////7+/vxBAQAD//
|
||||||
wD//wD//wD//wD//wD//wD//wD//wD//wD//wAAAMDAwIODg6qqqsDAwMXFxcDAwMDAwMDAwMDAwA
|
wD//wD//wD//wD//wD//wD//wD//wD//wD//wAAAMDAwIODg6qqqsDAwMXFxcDAwMDAwMDAwMDAwA
|
||||||
AAAJqampqamjM/PwCfnwD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wx
|
AAAJqampqamjM/PwCfnwD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wx
|
||||||
gYJ+fn////////////////////////7+/v////7+/v////7+/v////7+/v////7+/v////7+/v///
|
gYJ+fn////////7+/v////7+/v////7+/v////7+/v////7+/v////7+/v////7+/v////7+/v///
|
||||||
/7+/v////7+/v////7+/v////7+/v////////////////////////3d3d2Jmcd/h5cTG0M3NzY6Yz
|
/7+/v////7+/v////7+/v////7+/v////7+/v////7+/v////////3d3d2Jmcd/h5cTG0M3NzY6Yz
|
||||||
46Yz83Nzc3NzUxRaW1ucf///////7+/v////7+/v////7+/v////7+/v////7+/v////7+/v////7
|
46Yz83Nzc3NzUxRaW1uccfHx////7+/v////7+/v////7+/v////7+/v////7+/v////7+/v////7
|
||||||
+/v////7+/v////7+/v////7+/v//////////////////////////////////////////////////
|
+/v////7+/v////7+/v////7+/v////7+/v////8/Pz//////////////////////////////////
|
||||||
//////////////////////////////////////////////////////////////wAAAACvrwD//wD/
|
//////////////////////////////////////////////////////////////wAAAACvrwD//wD/
|
||||||
/wD//wD//wA/PyEhIWBgYGBgYLS0tMDAwMDAwMDAwMDAwMDAwMDAwMDAwJ2dnZiYmJiYmKKiopiYm
|
/wD//wD//wA/PyEhIWBgYGBgYLS0tMDAwMDAwMDAwMDAwMDAwMDAwMDAwJ2dnZiYmJiYmKKiopiYm
|
||||||
JiYmEBMTIeHhxMz
|
JiYmEBMTIeHhxMz
|
||||||
@ -1567,9 +1567,9 @@ zBAQP////////////////////////////////////////////////////////////////////////
|
|||||||
///////////////////////////7+/vxBAQAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wA
|
///////////////////////////7+/vxBAQAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wA
|
||||||
AADAwMCNLIwqRChwcHBwcHBMTEwcHBxUVFTAwMAAAAJqampqamjM/PwCfnwD//wD//wD//wD//wD/
|
AADAwMCNLIwqRChwcHBwcHBMTEwcHBxUVFTAwMAAAAJqampqamjM/PwCfnwD//wD//wD//wD//wD/
|
||||||
/wD//wD//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn////////////////////////////////
|
/wD//wD//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn////////////////////////////////
|
||||||
////////7+/v0BAQP///////////////////////////////////////0BAQP///0BAQP///0BAQP
|
////////7+/v0BAQP///////////////////////////////0BAQP///0BAQP///0BAQP///0BAQP
|
||||||
///0BAQP///0BAQP///0BAQP///0BAQP///0BAQP///0BAQJubmyQkJI+PjzMzM////0BAQP/////
|
///0BAQP///0BAQP///0BAQP///0BAQP///0BAQP///0BAQJubmyQkJI+PjzMzM////0BAQP///0B
|
||||||
/////////////////////////////////////////////////////////////////////////////
|
AQP//////////////////////////////////////////////////////////////////////////
|
||||||
/////////////////////////////////////////////////////////////////////////////
|
/////////////////////////////////////////////////////////////////////////////
|
||||||
////////////////////////wAAAAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//w
|
////////////////////////wAAAAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//w
|
||||||
D//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD
|
D//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD
|
||||||
@ -1579,9 +1579,9 @@ D//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD
|
|||||||
/////////////////////////////7+/vxBAQAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//
|
/////////////////////////////7+/vxBAQAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//
|
||||||
wAAADAwMBEZEQAoAAAAAAAAAAAAAAICAg4ODjAwMAAAAJqampqamjM/PwCfnwD//wD//wD//wD//w
|
wAAADAwMBEZEQAoAAAAAAAAAAAAAAICAg4ODjAwMAAAAJqampqamjM/PwCfnwD//wD//wD//wD//w
|
||||||
D//wD//wD//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn//////////////////////////////
|
D//wD//wD//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn//////////////////////////////
|
||||||
//////////7+/v0BAQP///////////////////////////////////9/f3////wAAAP///wAAAP//
|
//////////7+/v0BAQP///////////////////////////5+fn////wAAAP///wAAAP///wAAAP//
|
||||||
/wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///2BgY
|
/wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAA
|
||||||
P////////////////////////////////////////////////////////////////////////////
|
P///yAgIP////////////////////////////////////////////////////////////////////
|
||||||
/////////////////////////////////////////////////////////////////////////////
|
/////////////////////////////////////////////////////////////////////////////
|
||||||
//////////////////////////wAAAAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD/
|
//////////////////////////wAAAAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD/
|
||||||
/wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//
|
/wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//
|
||||||
@ -1590,9 +1590,9 @@ D//wD//wD//wD//wC/vzBAQP/////////////////////////////////////////////////////
|
|||||||
//////////////////////////////////////////////7+/vxBAQAD//wD//wD//wD//wD//wD/
|
//////////////////////////////////////////////7+/vxBAQAD//wD//wD//wD//wD//wD/
|
||||||
/wD//wD//wD//wD//wAAADAwMC4uLgAAAAAAAAAAAAAAAAAAAB4eHjAwMAAAAJqampqamjM/PwCfn
|
/wD//wD//wD//wD//wAAADAwMC4uLgAAAAAAAAAAAAAAAAAAAB4eHjAwMAAAAJqampqamjM/PwCfn
|
||||||
wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn/////////////
|
wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn/////////////
|
||||||
///////////////////////////7+/v0BAQP///////////////////////////////////////0B
|
///////////////////////////7+/v0BAQP///////////////////////////////0BAQP///0B
|
||||||
AQP///0BAQP///0BAQP///0BAQP///0BAQP///0BAQP///0BAQP///0BAQP///0BAQP///0BAQP//
|
AQP///0BAQP///0BAQP///0BAQP///0BAQP///0BAQP///0BAQP///0BAQP///0BAQP///0BAQP//
|
||||||
/0BAQP///0BAQP///////////////////////////////////////////////////////////////
|
/0BAQP///0BAQP///0BAQP///////////////////////////////////////////////////////
|
||||||
/////////////////////////////////////////////////////////////////////////////
|
/////////////////////////////////////////////////////////////////////////////
|
||||||
///////////////////////////////////////////wAAAAD//wD//wD//wD//wD//wD//wD//wD
|
///////////////////////////////////////////wAAAAD//wD//wD//wD//wD//wD//wD//wD
|
||||||
//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD/
|
//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD/
|
||||||
@ -1613,8 +1613,8 @@ fwB/fwB/fwB/fwB/fwB/fwB/fwB/fwB/fwB/fwB/fwB/fwB/fwBgYDBAQP///////////////////
|
|||||||
///7+/vxBAQAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wAAADAwMB83HwjPCC4uLhISEgs
|
///7+/vxBAQAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wAAADAwMB83HwjPCC4uLhISEgs
|
||||||
LCwMDAwoKCjAwMAAAAJqampqamjM/PwCfnwD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD/
|
LCwMDAwoKCjAwMAAAAJqampqamjM/PwCfnwD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD/
|
||||||
/wD//wD//wD//wxgYJ+fn////////////////////////////////////////7+/v0BAQP///////
|
/wD//wD//wD//wxgYJ+fn////////////////////////////////////////7+/v0BAQP///////
|
||||||
////////////////////////////////wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP
|
////////////////////////wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP
|
||||||
///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP/////////////////////////////
|
///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP/////////////////////
|
||||||
/////////////////////////////////////////////////////////////////////////////
|
/////////////////////////////////////////////////////////////////////////////
|
||||||
/////////////////////////////////////////////////////////////////////////////
|
/////////////////////////////////////////////////////////////////////////////
|
||||||
6+vr39/f39/f39/f39/f39/f39/f39/f39/f39/f39/f39/f39/f39/f39/f39/f39/f39/f39/f3
|
6+vr39/f39/f39/f39/f39/f39/f39/f39/f39/f39/f39/f39/f39/f39/f39/f39/f39/f39/f3
|
||||||
@ -1624,8 +1624,8 @@ LCwMDAwoKCjAwMAAAAJqampqamjM/PwCfnwD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD/
|
|||||||
////////////////////7+/vxBAQAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wAAADAwMC
|
////////////////////7+/vxBAQAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wAAADAwMC
|
||||||
kpKQAAAAAAAAAAAAAAAAAAABgYGDAwMAAAAJqampqamjM/PwCfnwD//wD//wD//wD//wD//wD//wD
|
kpKQAAAAAAAAAAAAAAAAAAABgYGDAwMAAAAJqampqamjM/PwCfnwD//wD//wD//wD//wD//wD//wD
|
||||||
//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn///////////////////////////////////////
|
//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn///////////////////////////////////////
|
||||||
/7+/v0BAQP///////////////////////////////////9/f3////wAAAP///wAAAP///wAAAP///
|
/7+/v0BAQP///////////////////////////5+fn////wAAAP///wAAAP///wAAAP///wAAAP///
|
||||||
wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///2BgYP////////
|
wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///yAgIP
|
||||||
/////////////////////////////////////////////////////////////////////////////
|
/////////////////////////////////////////////////////////////////////////////
|
||||||
/////////////////////////////////////////////////////////////////////////////
|
/////////////////////////////////////////////////////////////////////////////
|
||||||
/////////////////////////////////////////////////////////////////////////////
|
/////////////////////////////////////////////////////////////////////////////
|
||||||
@ -1636,8 +1636,8 @@ wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///2BgYP////////
|
|||||||
//////////////////////7+/vxBAQAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wAAAFRU
|
//////////////////////7+/vxBAQAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wAAAFRU
|
||||||
VAAAAAAAAAAAAAAAAAAAAAAAAAAAAFRUVAAAAJqampqamjM/PwCfnwD//wD//wD//wD//wD//wD//
|
VAAAAAAAAAAAAAAAAAAAAAAAAAAAAFRUVAAAAJqampqamjM/PwCfnwD//wD//wD//wD//wD//wD//
|
||||||
wD//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn/////////////////////////////////////
|
wD//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn/////////////////////////////////////
|
||||||
///7+/v0BAQP///////////////////////////////////////39/f////39/f////39/f////39
|
///7+/v0BAQP///////////////////////////////39/f////39/f////39/f////39/f////39
|
||||||
/f////39/f////39/f////39/f////39/f////39/f////39/f////39/f////39/f///////////
|
/f////39/f////39/f////39/f////39/f////39/f////39/f////39/f////39/f////39/f///
|
||||||
/////////////////////////////////////////////////////////////////////////////
|
/////////////////////////////////////////////////////////////////////////////
|
||||||
////////////////////////////////8/PzwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
|
////////////////////////////////8/PzwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
|
||||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
|
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
|
||||||
@ -1659,8 +1659,8 @@ A/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA
|
|||||||
D//wD//wD//wD//wD//wD//wD//wCTkwMGBm9vb4GBgYGBgYGBgYGBgYGBgYGBgYGBgYqKimh3d5q
|
D//wD//wD//wD//wD//wD//wD//wCTkwMGBm9vb4GBgYGBgYGBgYGBgYGBgYGBgYGBgYqKimh3d5q
|
||||||
amjM/PwCfnwD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn///
|
amjM/PwCfnwD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn///
|
||||||
/////////////////////////////////////7+/v0BAQP///////////////////////////////
|
/////////////////////////////////////7+/v0BAQP///////////////////////////////
|
||||||
////////wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP
|
wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP
|
||||||
///wAAAP///wAAAP///wAAAP/////////////////////////////////////////////////////
|
///wAAAP///wAAAP///wAAAP///wAAAP/////////////////////////////////////////////
|
||||||
//////////////////////////////////////////////////////////////////7+/vxAQQAAA
|
//////////////////////////////////////////////////////////////////7+/vxAQQAAA
|
||||||
/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/
|
/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/
|
||||||
wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/w
|
wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/w
|
||||||
@ -1670,8 +1670,8 @@ A/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAAvzAwQP//////////////////////////
|
|||||||
xBAQAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wCoqAkPD8rKyubm5ubm5ubm5ubm5u
|
xBAQAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wCoqAkPD8rKyubm5ubm5ubm5ubm5u
|
||||||
bm5ubm5ubm5ru7u2h3dzM+PgCfnwD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD
|
bm5ubm5ubm5ru7u2h3dzM+PgCfnwD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD
|
||||||
//wD//wxgYJ+fn////////////////////////////////////////7+/v0BAQP//////////////
|
//wD//wxgYJ+fn////////////////////////////////////////7+/v0BAQP//////////////
|
||||||
/////////////////////9/f3////wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///
|
/////////////5+fn////wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///
|
||||||
wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///2BgYP////////////////////////////////
|
wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///yAgIP////////////////////////
|
||||||
/////////////////////////////////////////////////////////////////////////////
|
/////////////////////////////////////////////////////////////////////////////
|
||||||
//////7+/vxAQQAAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA3wAA/wAAfwAA/wAAfwAA
|
//////7+/vxAQQAAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA3wAA/wAAfwAA/wAAfwAA
|
||||||
/wAAfwAA/wAAfwAA/wAAfwAA/wAAfwAA/wAAfwAA/wAAfwAA/wAAfwAA/wAAfwAA/wAAfwAA/wAAf
|
/wAAfwAA/wAAfwAA/wAAfwAA/wAAfwAA/wAAfwAA/wAAfwAA/wAAfwAA/wAAfwAA/wAAfwAA/wAAf
|
||||||
@ -1681,8 +1681,8 @@ AA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAAvzAwQP/////////
|
|||||||
/////////////7+/vxBAQAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wCoqAkPD
|
/////////////7+/vxBAQAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wCoqAkPD
|
||||||
zk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OSQkJBATEwCVlQD//wD//wD//wD//wD//wD//wD//wD//w
|
zk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OSQkJBATEwCVlQD//wD//wD//wD//wD//wD//wD//wD//w
|
||||||
D//wD//wD//wD//wD//wD//wxgYJ+fn////////////////////////////////////////7+/v0B
|
D//wD//wD//wD//wD//wD//wxgYJ+fn////////////////////////////////////////7+/v0B
|
||||||
AQP///////////////////////////////////////7+/v////7+/v////7+/v////7+/v////7+/
|
AQP///////////////////////////////7+/v////7+/v////7+/v////7+/v////7+/v////7+/
|
||||||
v////7+/v////7+/v////7+/v////7+/v////7+/v////7+/v////7+/v////////////////////
|
v////7+/v////7+/v////7+/v////7+/v////7+/v////7+/v////7+/v////7+/v////////////
|
||||||
///////////////
|
///////////////
|
||||||
/////////////////////////////////////////////////////////////////////////////
|
/////////////////////////////////////////////////////////////////////////////
|
||||||
////////7+/vxAQQAAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAAAAAA/wAAAAAA/w
|
////////7+/vxAQQAAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAAAAAA/wAAAAAA/w
|
||||||
@ -1693,8 +1693,8 @@ A/wAAAAAA/wAA3wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA
|
|||||||
///////////////7+/vxBAQAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wC
|
///////////////7+/vxBAQAD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wC
|
||||||
oqAA/PwA/PwA/PwA/PwA/PwA/PwA/PwA/PwA/PwA/PwDg4AD//wD//wD//wD//wD//wD//wD//wD/
|
oqAA/PwA/PwA/PwA/PwA/PwA/PwA/PwA/PwA/PwA/PwDg4AD//wD//wD//wD//wD//wD//wD//wD/
|
||||||
/wD//wD//wD//wD//wD//wD//wxgYJ+fn////////////////////////////////////////7+/v
|
/wD//wD//wD//wD//wD//wD//wxgYJ+fn////////////////////////////////////////7+/v
|
||||||
0BAQP////////////////////////////////////f39////7+/v////7+/v////7+/v////7+/v/
|
0BAQP///////////////////////////+fn5////7+/v////7+/v////7+/v////7+/v////7+/v/
|
||||||
///7+/v////7+/v////7+/v////7+/v////7+/v////7+/v////7+/v////9fX1//////////////
|
///7+/v////7+/v////7+/v////7+/v////7+/v////7+/v////7+/v////7+/v////8fHx//////
|
||||||
/////////////////////////////////////////////////////////////////////////////
|
/////////////////////////////////////////////////////////////////////////////
|
||||||
/////////////////////////7+/vxAQQAAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAAv
|
/////////////////////////7+/vxAQQAAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAAv
|
||||||
wAA/wAAAAAA/wAAAAAA/wAAAAAA/wAAAAAA/wAAAAAA/wAAAAAA/wAAAAAA/wAAAAAA/wAAAAAA/w
|
wAA/wAAAAAA/wAAAAAA/wAAAAAA/wAAAAAA/wAAAAAA/wAAAAAA/wAAAAAA/wAAAAAA/wAAAAAA/w
|
||||||
@ -1704,9 +1704,9 @@ A/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA
|
|||||||
////////////////////////////////7+/vxBAQAD//wD//wD//wD//wD//wD//wD//wD//wD//w
|
////////////////////////////////7+/vxBAQAD//wD//wD//wD//wD//wD//wD//wD//wD//w
|
||||||
D//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD
|
D//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD
|
||||||
//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn///////////////////////////
|
//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn///////////////////////////
|
||||||
/////////////7+/v0BAQP///////////////////////////////////////wAAAP///wAAAP///
|
/////////////7+/v0BAQP///////////////////////////////wAAAP///wAAAP///wAAAP///
|
||||||
wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP
|
wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP
|
||||||
/////////////////////////////////////////////////////////////////////////////
|
///wAAAP/////////////////////////////////////////////////////////////////////
|
||||||
//////////////////////////////////////////7+/vxAQQAAA/wAA/wAA/wAA/wAA/wAA/wAA
|
//////////////////////////////////////////7+/vxAQQAAA/wAA/wAA/wAA/wAA/wAA/wAA
|
||||||
/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/
|
/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/
|
||||||
wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/w
|
wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/w
|
||||||
@ -1715,9 +1715,9 @@ A/wAA/wAA/wAA/wAA/wAAvzAwQP//////////////////////////////////////////////////
|
|||||||
/////////////////////////////////////////////////7+/vxBAQAD//wD//wD//wD//wD//
|
/////////////////////////////////////////////////7+/vxBAQAD//wD//wD//wD//wD//
|
||||||
wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//w
|
wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//w
|
||||||
D//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn//////////
|
D//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wD//wxgYJ+fn//////////
|
||||||
//////////////////////////////7+/v0BAQP///////////////////////////////////9/f
|
//////////////////////////////7+/v0BAQP///////////////////////////5+fn////wAA
|
||||||
3////wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///
|
AP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///wAAAP///
|
||||||
wAAAP///wAAAP///2BgYP////////////////////////////////////////////////////////
|
wAAAP///wAAAP///wAAAP///yAgIP////////////////////////////////////////////////
|
||||||
///////////////////////////////////////////////////////////7+/vxAQQAAA/wAA/wA
|
///////////////////////////////////////////////////////////7+/vxAQQAAA/wAA/wA
|
||||||
A/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAAxwAA/wAAvwAA/wAAvwAA/wAAvwAA
|
A/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/wAAxwAA/wAAvwAA/wAAvwAA/wAAvwAA
|
||||||
/wAAvwAA/wAAvwAA/wAAvwAA/wAAvwAA/wAAvwAA/wAAvwAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/
|
/wAAvwAA/wAAvwAA/wAAvwAA/wAAvwAA/wAAvwAA/wAAvwAA/wAA/wAA/wAA/wAA/wAA/wAA/wAA/
|
||||||
@ -3206,8 +3206,8 @@ f39/f39/f39/f39/f39/f39/f39/f39/f39/f39/f39/f39/f39/f39/f39/f39/f39/f39/f39/f
|
|||||||
/////////////////////////////////////////////////////////////////////////////
|
/////////////////////////////////////////////////////////////////////////////
|
||||||
/////////////w4AAAAUAAAAAAAAABAAAAAUAAAA</PreviewPicture>
|
/////////////w4AAAAUAAAAAAAAABAAAAAUAAAA</PreviewPicture>
|
||||||
<TimeCreated>2002-08-11T08:58:32</TimeCreated>
|
<TimeCreated>2002-08-11T08:58:32</TimeCreated>
|
||||||
<TimeSaved>2003-12-29T07:34:23</TimeSaved>
|
<TimeSaved>2004-02-13T16:20:19</TimeSaved>
|
||||||
<TimeEdited>2003-12-29T07:34:13</TimeEdited>
|
<TimeEdited>2004-02-13T16:11:36</TimeEdited>
|
||||||
<TimePrinted>2002-08-11T08:58:32</TimePrinted>
|
<TimePrinted>2002-08-11T08:58:32</TimePrinted>
|
||||||
</DocumentProperties>
|
</DocumentProperties>
|
||||||
<DocumentSettings TopPage='0' DefaultTextStyle='3' DefaultLineStyle='3' DefaultFillStyle='3' DefaultGuideStyle='4'>
|
<DocumentSettings TopPage='0' DefaultTextStyle='3' DefaultLineStyle='3' DefaultFillStyle='3' DefaultGuideStyle='4'>
|
||||||
@ -40781,7 +40781,7 @@ B/wAAA/8AAB//AAAf/wAAH/8AAA//AAAP/wAAD/8AAA//AAAP/wAAD/+AAA//4AAf//gAP///////
|
|||||||
</Master>
|
</Master>
|
||||||
</Masters>
|
</Masters>
|
||||||
<Pages>
|
<Pages>
|
||||||
<Page ID='0' NameU='Page-1' ViewScale='1' ViewCenterX='35.9' ViewCenterY='27.65'>
|
<Page ID='0' NameU='Page-1' ViewScale='1' ViewCenterX='35.9' ViewCenterY='91.65'>
|
||||||
<PageSheet LineStyle='0' FillStyle='0' TextStyle='0'>
|
<PageSheet LineStyle='0' FillStyle='0' TextStyle='0'>
|
||||||
<PageProps>
|
<PageProps>
|
||||||
<PageWidth Unit='IN'>85</PageWidth>
|
<PageWidth Unit='IN'>85</PageWidth>
|
||||||
@ -40990,10 +40990,10 @@ B/wAAA/8AAB//AAAf/wAAH/8AAA//AAAP/wAAD/8AAA//AAAP/wAAD/+AAA//4AAf//gAP///////
|
|||||||
<Y F='Height*0'>0</Y>
|
<Y F='Height*0'>0</Y>
|
||||||
</LineTo>
|
</LineTo>
|
||||||
</Geom>
|
</Geom>
|
||||||
<Text><cp IX='0'/>206.124.146.176
|
<Text><cp IX='0'/>206.124.146.176/24
|
||||||
206.124.146.178
|
206.124.146.178/24
|
||||||
206.124.146.179
|
206.124.146.179/24
|
||||||
206.124.146.180</Text>
|
206.124.146.180/24</Text>
|
||||||
</Shape>
|
</Shape>
|
||||||
<Shape ID='74' Type='Shape' LineStyle='3' FillStyle='3' TextStyle='3'>
|
<Shape ID='74' Type='Shape' LineStyle='3' FillStyle='3' TextStyle='3'>
|
||||||
<XForm>
|
<XForm>
|
||||||
@ -41731,8 +41731,8 @@ B/wAAA/8AAB//AAAf/wAAH/8AAA//AAAP/wAAD/8AAA//AAAP/wAAD/+AAA//4AAf//gAP///////
|
|||||||
</Shape>
|
</Shape>
|
||||||
<Shape ID='31' Type='Shape' LineStyle='1' FillStyle='1' TextStyle='3'>
|
<Shape ID='31' Type='Shape' LineStyle='1' FillStyle='1' TextStyle='3'>
|
||||||
<XForm>
|
<XForm>
|
||||||
<PinX>44</PinX>
|
<PinX>45.1</PinX>
|
||||||
<PinY>45</PinY>
|
<PinY>43.1</PinY>
|
||||||
<Width>15</Width>
|
<Width>15</Width>
|
||||||
<Height>3</Height>
|
<Height>3</Height>
|
||||||
<LocPinX F='Width*0.5'>7.5</LocPinX>
|
<LocPinX F='Width*0.5'>7.5</LocPinX>
|
||||||
@ -41791,11 +41791,11 @@ B/wAAA/8AAB//AAAf/wAAH/8AAA//AAAP/wAAD/8AAA//AAAP/wAAD/+AAA//4AAf//gAP///////
|
|||||||
<Y F='Height*0'>0</Y>
|
<Y F='Height*0'>0</Y>
|
||||||
</LineTo>
|
</LineTo>
|
||||||
</Geom>
|
</Geom>
|
||||||
<Text><cp IX='0'/>192.168.1.254</Text>
|
<Text><cp IX='0'/>192.168.1.254/24</Text>
|
||||||
</Shape>
|
</Shape>
|
||||||
<Shape ID='33' Type='Shape' LineStyle='1' FillStyle='1' TextStyle='3'>
|
<Shape ID='33' Type='Shape' LineStyle='1' FillStyle='1' TextStyle='3'>
|
||||||
<XForm>
|
<XForm>
|
||||||
<PinX>45</PinX>
|
<PinX>45.4</PinX>
|
||||||
<PinY>47.5</PinY>
|
<PinY>47.5</PinY>
|
||||||
<Width>14</Width>
|
<Width>14</Width>
|
||||||
<Height>3</Height>
|
<Height>3</Height>
|
||||||
@ -41855,7 +41855,7 @@ B/wAAA/8AAB//AAAf/wAAH/8AAA//AAAP/wAAD/8AAA//AAAP/wAAD/+AAA//4AAf//gAP///////
|
|||||||
<Y F='Height*0'>0</Y>
|
<Y F='Height*0'>0</Y>
|
||||||
</LineTo>
|
</LineTo>
|
||||||
</Geom>
|
</Geom>
|
||||||
<Text><cp IX='0'/>192.168.3.254</Text>
|
<Text><cp IX='0'/>192.168.3.254/24</Text>
|
||||||
</Shape>
|
</Shape>
|
||||||
<Shape ID='34' Type='Shape' LineStyle='1' FillStyle='1' TextStyle='3'>
|
<Shape ID='34' Type='Shape' LineStyle='1' FillStyle='1' TextStyle='3'>
|
||||||
<XForm>
|
<XForm>
|
||||||
@ -41936,7 +41936,7 @@ B/wAAA/8AAB//AAAf/wAAH/8AAA//AAAP/wAAD/8AAA//AAAP/wAAD/+AAA//4AAf//gAP///////
|
|||||||
<Y F='Height*0'>0</Y>
|
<Y F='Height*0'>0</Y>
|
||||||
</LineTo>
|
</LineTo>
|
||||||
</Geom>
|
</Geom>
|
||||||
<Text><cp IX='0'/>192.168.2.254</Text>
|
<Text><cp IX='0'/>206.124.146.176/32</Text>
|
||||||
</Shape>
|
</Shape>
|
||||||
<Shape ID='44' NameU='Comm-link' Type='Shape' Master='12'>
|
<Shape ID='44' NameU='Comm-link' Type='Shape' Master='12'>
|
||||||
<XForm>
|
<XForm>
|
||||||
@ -71384,7 +71384,7 @@ www.xxx.yyy.zzz/
|
|||||||
</Page>
|
</Page>
|
||||||
</Pages>
|
</Pages>
|
||||||
<Windows ClientWidth='1280' ClientHeight='850'>
|
<Windows ClientWidth='1280' ClientHeight='850'>
|
||||||
<Window ID='0' WindowType='Drawing' WindowState='1073741824' WindowLeft='-4' WindowTop='-30' WindowWidth='1288' WindowHeight='884' ContainerType='Page' Page='0' ViewScale='1' ViewCenterX='35.9' ViewCenterY='27.65'>
|
<Window ID='0' WindowType='Drawing' WindowState='1073741824' WindowLeft='-4' WindowTop='-30' WindowWidth='1288' WindowHeight='884' ContainerType='Page' Page='0' ViewScale='1' ViewCenterX='35.9' ViewCenterY='91.65'>
|
||||||
<ShowRulers>1</ShowRulers>
|
<ShowRulers>1</ShowRulers>
|
||||||
<ShowGrid>1</ShowGrid>
|
<ShowGrid>1</ShowGrid>
|
||||||
<ShowPageBreaks>0</ShowPageBreaks>
|
<ShowPageBreaks>0</ShowPageBreaks>
|
||||||
|
@ -15,7 +15,7 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2004-01-20</pubdate>
|
<pubdate>2004-02-13</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2001-2004</year>
|
<year>2001-2004</year>
|
||||||
@ -51,10 +51,11 @@
|
|||||||
</caution>
|
</caution>
|
||||||
|
|
||||||
<para>I have DSL service and have 5 static IP addresses
|
<para>I have DSL service and have 5 static IP addresses
|
||||||
(206.124.146.176-180). My DSL <quote>modem</quote> (Fujitsu Speedport) is
|
(206.124.146.176-180/24). My DSL <quote>modem</quote> (Fujitsu Speedport)
|
||||||
connected to eth0. I have a local network connected to eth2 (subnet
|
is connected to eth0. I have a local network connected to eth2 (subnet
|
||||||
192.168.1.0/24), a DMZ connected to eth1 (192.168.2.0/24) and a Wireless
|
192.168.1.0/24), a DMZ connected to eth1 (206.124.146.176/24) and a
|
||||||
network connected to eth3 (192.168.3.0/24).</para>
|
Wireless network connected to eth3 (192.168.3.0/24). Note that the IP
|
||||||
|
address of eth1 is a duplicate of one on eth0.</para>
|
||||||
|
|
||||||
<para>I use:</para>
|
<para>I use:</para>
|
||||||
|
|
||||||
@ -202,7 +203,7 @@ tx Texas Peer Network in Dallas
|
|||||||
<programlisting>#ZONE INERFACE BROADCAST OPTIONS
|
<programlisting>#ZONE INERFACE BROADCAST OPTIONS
|
||||||
net eth0 206.124.146.255 dhcp,norfc1918,routefilter,blacklist,tcpflags
|
net eth0 206.124.146.255 dhcp,norfc1918,routefilter,blacklist,tcpflags
|
||||||
loc eth2 192.168.1.255 dhcp
|
loc eth2 192.168.1.255 dhcp
|
||||||
dmz eth1 192.168.2.255
|
dmz eth1 -
|
||||||
WiFi eth3 192.168.3.255 dhcp,maclist
|
WiFi eth3 192.168.3.255 dhcp,maclist
|
||||||
- texas 192.168.9.255
|
- texas 192.168.9.255
|
||||||
#LAST LINE -- ADD YOUR ENTRIES ABOVE THIS ONE - DO NOT REMOVE</programlisting>
|
#LAST LINE -- ADD YOUR ENTRIES ABOVE THIS ONE - DO NOT REMOVE</programlisting>
|
||||||
@ -453,33 +454,11 @@ ACCEPT dmz fw tcp
|
|||||||
ACCEPT dmz fw udp snmp
|
ACCEPT dmz fw udp snmp
|
||||||
REJECT dmz fw tcp auth
|
REJECT dmz fw tcp auth
|
||||||
###############################################################################################################################################################################
|
###############################################################################################################################################################################
|
||||||
# DMZ to Internet
|
|
||||||
#
|
|
||||||
ACCEPT dmz net tcp smtp,domain,www,https,whois,echo,2702,21,2703,ssh,8080
|
|
||||||
ACCEPT dmz net udp domain
|
|
||||||
ACCEPT dmz net:$POPSERVERS tcp pop3
|
|
||||||
#ACCEPT dmz net:206.191.151.2 tcp pop3
|
|
||||||
#ACCEPT dmz net:66.216.26.115 tcp pop3
|
|
||||||
#
|
|
||||||
# Something is wrong with the FTP connection tracking code or there is some client out there
|
|
||||||
# that is sending a PORT command which that code doesn't understand. Either way,
|
|
||||||
# the following works around the problem.
|
|
||||||
#
|
|
||||||
ACCEPT:$LOG dmz net tcp 1024: 20
|
|
||||||
###############################################################################################################################################################################
|
|
||||||
# DMZ to Firewall -- ntp & snmp, Silently reject Auth
|
|
||||||
#
|
|
||||||
ACCEPT dmz fw udp ntp ntp
|
|
||||||
ACCEPT dmz fw tcp snmp,ssh
|
|
||||||
ACCEPT dmz fw udp snmp
|
|
||||||
REJECT dmz fw tcp auth
|
|
||||||
###############################################################################################################################################################################
|
|
||||||
#
|
|
||||||
# DMZ to Local Network
|
# DMZ to Local Network
|
||||||
#
|
#
|
||||||
ACCEPT dmz loc tcp smtp,6001:6010
|
ACCEPT dmz loc tcp smtp,6001:6010
|
||||||
ACCEPT dmz loc tcp 111
|
ACCEPT dmz:206.124.146.177 loc:192.168.1.3 tcp 111
|
||||||
ACCEPT dmz loc udp
|
ACCEPT dmz:206.124.146.177 loc:192.168.1.3 udp#
|
||||||
###############################################################################################################################################################################
|
###############################################################################################################################################################################
|
||||||
# Internet to Firewall
|
# Internet to Firewall
|
||||||
#
|
#
|
||||||
@ -555,10 +534,9 @@ ACCEPT all all icmp
|
|||||||
<programlisting>...
|
<programlisting>...
|
||||||
auto eth1
|
auto eth1
|
||||||
iface eth1 inet static
|
iface eth1 inet static
|
||||||
address 192.168.2.1
|
address 206.124.146.176
|
||||||
netmask 255.255.255.0
|
netmask 255.255.255.266
|
||||||
network 192.168.2.0
|
broadcast 0.0.0.0
|
||||||
broadcast 192.168.2.255
|
|
||||||
<emphasis role="bold">up ip route add 206.124.146.177 dev eth1
|
<emphasis role="bold">up ip route add 206.124.146.177 dev eth1
|
||||||
</emphasis>...</programlisting>
|
</emphasis>...</programlisting>
|
||||||
</blockquote>
|
</blockquote>
|
||||||
|
@ -15,7 +15,7 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2004-02-08</pubdate>
|
<pubdate>2004-02-22</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2001-2004</year>
|
<year>2001-2004</year>
|
||||||
@ -47,15 +47,16 @@
|
|||||||
|
|
||||||
<caution>
|
<caution>
|
||||||
<para>The configuration shown here corresponds to Shorewall version
|
<para>The configuration shown here corresponds to Shorewall version
|
||||||
2.0.0-Beta1. It may use features not available in earlier Shorewall
|
2.0.0-Beta2. It may use features not available in earlier Shorewall
|
||||||
releases.</para>
|
releases.</para>
|
||||||
</caution>
|
</caution>
|
||||||
|
|
||||||
<para>I have DSL service and have 5 static IP addresses
|
<para>I have DSL service and have 5 static IP addresses
|
||||||
(206.124.146.176-180). My DSL <quote>modem</quote> (Fujitsu Speedport) is
|
(206.124.146.176-180). My DSL <quote>modem</quote> (Fujitsu Speedport) is
|
||||||
connected to eth0. I have a local network connected to eth2 (subnet
|
connected to eth0. I have a local network connected to eth2 (subnet
|
||||||
192.168.1.0/24), a DMZ connected to eth1 (192.168.2.0/24) and a Wireless
|
192.168.1.0/24), a DMZ connected to eth1 (206.124.146.176/32) and a
|
||||||
network connected to eth3 (192.168.3.0/24).</para>
|
Wireless network connected to eth3 (192.168.3.0/24). Note that the IP
|
||||||
|
address of eth1 is a duplicate of one on eth0.</para>
|
||||||
|
|
||||||
<para>I use:</para>
|
<para>I use:</para>
|
||||||
|
|
||||||
@ -204,7 +205,7 @@ tx Texas Peer Network in Dallas
|
|||||||
<programlisting>#ZONE INERFACE BROADCAST OPTIONS
|
<programlisting>#ZONE INERFACE BROADCAST OPTIONS
|
||||||
net eth0 206.124.146.255 dhcp,norfc1918,routefilter,blacklist,tcpflags,nosmurfs
|
net eth0 206.124.146.255 dhcp,norfc1918,routefilter,blacklist,tcpflags,nosmurfs
|
||||||
loc eth2 192.168.1.255 dhcp,detectnets
|
loc eth2 192.168.1.255 dhcp,detectnets
|
||||||
dmz eth1 192.168.2.255
|
dmz eth1 -
|
||||||
WiFi eth3 192.168.3.255 dhcp,maclist,detectnets
|
WiFi eth3 192.168.3.255 dhcp,maclist,detectnets
|
||||||
- texas 192.168.9.255
|
- texas 192.168.9.255
|
||||||
#LAST LINE -- ADD YOUR ENTRIES ABOVE THIS ONE - DO NOT REMOVE</programlisting>
|
#LAST LINE -- ADD YOUR ENTRIES ABOVE THIS ONE - DO NOT REMOVE</programlisting>
|
||||||
@ -261,6 +262,7 @@ eth3 192.168.3.0/24
|
|||||||
<programlisting>#ADDRESS/SUBNET PROTOCOL PORT
|
<programlisting>#ADDRESS/SUBNET PROTOCOL PORT
|
||||||
0.0.0.0/0 udp 1434
|
0.0.0.0/0 udp 1434
|
||||||
0.0.0.0/0 tcp 1433
|
0.0.0.0/0 tcp 1433
|
||||||
|
0.0.0.0/0 tcp 3127
|
||||||
0.0.0.0/0 tcp 8081
|
0.0.0.0/0 tcp 8081
|
||||||
0.0.0.0/0 tcp 57
|
0.0.0.0/0 tcp 57
|
||||||
#LAST LINE -- ADD YOUR ENTRIES ABOVE THIS ONE - DO NOT REMOVE</programlisting>
|
#LAST LINE -- ADD YOUR ENTRIES ABOVE THIS ONE - DO NOT REMOVE</programlisting>
|
||||||
@ -292,7 +294,7 @@ all all REJECT $LOG # Reje
|
|||||||
<blockquote>
|
<blockquote>
|
||||||
<para>Although most of our internal systems use one-to-one NAT, my
|
<para>Although most of our internal systems use one-to-one NAT, my
|
||||||
wife's system (192.168.1.4) uses IP Masquerading (actually SNAT)
|
wife's system (192.168.1.4) uses IP Masquerading (actually SNAT)
|
||||||
as does my SuSE system (192.168.1.3), our laptop (192.168.3.8) and
|
as do my SuSE system (192.168.1.3), our laptop (192.168.3.8) and
|
||||||
visitors with laptops.</para>
|
visitors with laptops.</para>
|
||||||
|
|
||||||
<programlisting>#INTERFACE SUBNET ADDRESS
|
<programlisting>#INTERFACE SUBNET ADDRESS
|
||||||
@ -346,18 +348,7 @@ gre net $TEXAS
|
|||||||
|
|
||||||
<blockquote>
|
<blockquote>
|
||||||
<programlisting>#ACTION
|
<programlisting>#ACTION
|
||||||
DropSMB #Silently Drops Microsoft SMB Traffic
|
|
||||||
RejectSMB #Silently Reject Microsoft SMB Traffic
|
|
||||||
DropUPnP #Silently Drop UPnP Probes
|
|
||||||
RejectAuth #Silently Reject Auth
|
|
||||||
DropPing #Silently Drop Ping
|
|
||||||
DropDNSrep #Silently Drop DNS Replies
|
|
||||||
AllowPing #Accept Ping
|
|
||||||
|
|
||||||
Mirrors #Accept traffic from the Shorewall Mirror sites
|
Mirrors #Accept traffic from the Shorewall Mirror sites
|
||||||
|
|
||||||
MyDrop:DROP #My DROP common action
|
|
||||||
MyReject:REJECT #My REJECT common action
|
|
||||||
#LAST LINE - ADD YOUR ENTRIES ABOVE THIS ONE - DO NOT REMOVE</programlisting>
|
#LAST LINE - ADD YOUR ENTRIES ABOVE THIS ONE - DO NOT REMOVE</programlisting>
|
||||||
</blockquote>
|
</blockquote>
|
||||||
</section>
|
</section>
|
||||||
@ -378,11 +369,11 @@ ACCEPT $MIRRORS
|
|||||||
</section>
|
</section>
|
||||||
|
|
||||||
<section>
|
<section>
|
||||||
<title>action.MyDrop</title>
|
<title>/etc/shorewall/action.Drop</title>
|
||||||
|
|
||||||
<blockquote>
|
<blockquote>
|
||||||
<para>This is my common action for the DROP policy. It is like the
|
<para>This is my common action for the DROP policy. It is like the
|
||||||
standard <emphasis role="bold">Reject</emphasis> action except that it
|
standard <emphasis role="bold">Drop</emphasis> action except that it
|
||||||
allows <quote>Ping</quote>.</para>
|
allows <quote>Ping</quote>.</para>
|
||||||
|
|
||||||
<programlisting>#TARGET SOURCE DEST PROTO DEST SOURCE RATE USER/
|
<programlisting>#TARGET SOURCE DEST PROTO DEST SOURCE RATE USER/
|
||||||
@ -398,12 +389,13 @@ DropDNSrep</programlisting>
|
|||||||
</section>
|
</section>
|
||||||
|
|
||||||
<section>
|
<section>
|
||||||
<title>action.MyReject</title>
|
<title>/etc/shorewall/action.Reject</title>
|
||||||
|
|
||||||
<blockquote>
|
<blockquote>
|
||||||
<para>This is my common action for the REJECT policy. It is like the
|
<para>This is my common action for the REJECT policy. It is like the
|
||||||
standard <emphasis role="bold">Drop</emphasis> action except that it
|
standard <emphasis role="bold">Reject</emphasis> action except that it
|
||||||
allows <quote>Ping</quote>.</para>
|
allows <quote>Ping</quote> and contains one rule that guards against
|
||||||
|
log flooding by broken software running in my local zone.</para>
|
||||||
|
|
||||||
<programlisting>#TARGET SOURCE DEST PROTO DEST SOURCE RATE USER/
|
<programlisting>#TARGET SOURCE DEST PROTO DEST SOURCE RATE USER/
|
||||||
# PORT(S) PORT(S) LIMIT GROUP
|
# PORT(S) PORT(S) LIMIT GROUP
|
||||||
@ -437,15 +429,12 @@ REJECT:$LOG loc net tcp
|
|||||||
REJECT loc net tcp 137,445
|
REJECT loc net tcp 137,445
|
||||||
REJECT loc net udp 137:139
|
REJECT loc net udp 137:139
|
||||||
#
|
#
|
||||||
DROP loc:!192.168.1.0/24 net
|
|
||||||
|
|
||||||
QUEUE loc net udp
|
QUEUE loc net udp
|
||||||
QUEUE loc fw udp
|
QUEUE loc fw udp
|
||||||
QUEUE loc net tcp
|
QUEUE loc net tcp
|
||||||
###############################################################################################################################################################################
|
###############################################################################################################################################################################
|
||||||
# Local Network to Firewall
|
# Local Network to Firewall
|
||||||
#
|
#
|
||||||
DROP loc:!192.168.1.0/24 fw
|
|
||||||
ACCEPT loc fw tcp ssh,time,10000,swat,137,139,445
|
ACCEPT loc fw tcp ssh,time,10000,swat,137,139,445
|
||||||
ACCEPT loc fw udp snmp,ntp,445
|
ACCEPT loc fw udp snmp,ntp,445
|
||||||
ACCEPT loc fw udp 137:139
|
ACCEPT loc fw udp 137:139
|
||||||
@ -453,7 +442,6 @@ ACCEPT loc fw udp
|
|||||||
###############################################################################################################################################################################
|
###############################################################################################################################################################################
|
||||||
# Local Network to DMZ
|
# Local Network to DMZ
|
||||||
#
|
#
|
||||||
DROP loc:!192.168.1.0/24 dmz
|
|
||||||
REJECT loc dmz tcp 465
|
REJECT loc dmz tcp 465
|
||||||
ACCEPT loc dmz udp domain,xdmcp
|
ACCEPT loc dmz udp domain,xdmcp
|
||||||
ACCEPT loc dmz tcp www,smtp,domain,ssh,imap,https,imaps,cvspserver,ftp,10000,8080,10027,pop3 -
|
ACCEPT loc dmz tcp www,smtp,domain,ssh,imap,https,imaps,cvspserver,ftp,10000,8080,10027,pop3 -
|
||||||
@ -509,33 +497,11 @@ ACCEPT dmz fw tcp
|
|||||||
ACCEPT dmz fw udp snmp
|
ACCEPT dmz fw udp snmp
|
||||||
REJECT dmz fw tcp auth
|
REJECT dmz fw tcp auth
|
||||||
###############################################################################################################################################################################
|
###############################################################################################################################################################################
|
||||||
# DMZ to Internet
|
|
||||||
#
|
|
||||||
ACCEPT dmz net tcp smtp,domain,www,https,whois,echo,2702,21,2703,ssh,8080
|
|
||||||
ACCEPT dmz net udp domain
|
|
||||||
ACCEPT dmz net:$POPSERVERS tcp pop3
|
|
||||||
#ACCEPT dmz net:206.191.151.2 tcp pop3
|
|
||||||
#ACCEPT dmz net:66.216.26.115 tcp pop3
|
|
||||||
#
|
|
||||||
# Something is wrong with the FTP connection tracking code or there is some client out there
|
|
||||||
# that is sending a PORT command which that code doesn't understand. Either way,
|
|
||||||
# the following works around the problem.
|
|
||||||
#
|
|
||||||
ACCEPT:$LOG dmz net tcp 1024: 20
|
|
||||||
###############################################################################################################################################################################
|
|
||||||
# DMZ to Firewall -- ntp & snmp, Silently reject Auth
|
|
||||||
#
|
|
||||||
ACCEPT dmz fw udp ntp ntp
|
|
||||||
ACCEPT dmz fw tcp snmp,ssh
|
|
||||||
ACCEPT dmz fw udp snmp
|
|
||||||
REJECT dmz fw tcp auth
|
|
||||||
###############################################################################################################################################################################
|
|
||||||
#
|
|
||||||
# DMZ to Local Network
|
# DMZ to Local Network
|
||||||
#
|
#
|
||||||
ACCEPT dmz loc tcp smtp,6001:6010
|
ACCEPT dmz loc tcp smtp,6001:6010
|
||||||
ACCEPT dmz loc tcp 111
|
ACCEPT dmz:206.124.146.177 loc:192.168.1.3 tcp 111
|
||||||
ACCEPT dmz loc udp
|
ACCEPT dmz:206.124.146.177 loc:192.168.1.3 udp
|
||||||
###############################################################################################################################################################################
|
###############################################################################################################################################################################
|
||||||
# Internet to Firewall
|
# Internet to Firewall
|
||||||
#
|
#
|
||||||
@ -598,7 +564,7 @@ ACCEPT all all icmp
|
|||||||
</blockquote>
|
</blockquote>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
<section>
|
<section id="Interfaces">
|
||||||
<title>/etc/network/interfaces</title>
|
<title>/etc/network/interfaces</title>
|
||||||
|
|
||||||
<blockquote>
|
<blockquote>
|
||||||
@ -611,10 +577,9 @@ ACCEPT all all icmp
|
|||||||
<programlisting>...
|
<programlisting>...
|
||||||
auto eth1
|
auto eth1
|
||||||
iface eth1 inet static
|
iface eth1 inet static
|
||||||
address 192.168.2.1
|
address 206.124.146.176
|
||||||
netmask 255.255.255.0
|
netmask 255.255.255.255
|
||||||
network 192.168.2.0
|
broadcast 0.0.0.0
|
||||||
broadcast 192.168.2.255
|
|
||||||
<emphasis role="bold">up ip route add 206.124.146.177 dev eth1
|
<emphasis role="bold">up ip route add 206.124.146.177 dev eth1
|
||||||
</emphasis>...</programlisting>
|
</emphasis>...</programlisting>
|
||||||
</blockquote>
|
</blockquote>
|
||||||
|
@ -13,7 +13,7 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2004-02-05</pubdate>
|
<pubdate>2004-02-18</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2001-2002</year>
|
<year>2001-2002</year>
|
||||||
@ -118,15 +118,9 @@ ACCEPT <emphasis><destination></emphasis> <emphasis><source>
|
|||||||
<section>
|
<section>
|
||||||
<title>NFS</title>
|
<title>NFS</title>
|
||||||
|
|
||||||
<para>I personally use the following rules for opening access from zone z1
|
<programlisting>#ACTION SOURCE DESTINATION PROTO DEST PORT(S)
|
||||||
to a server with IP address a.b.c.d in zone z2. I have found though that
|
ACCEPT <emphasis><z1></emphasis>:<list of client IPs> <emphasis> <z2></emphasis>:a.b.c.d tcp 111
|
||||||
different distributions behave differently so your milage may vary.</para>
|
ACCEPT <emphasis><z1></emphasis>:<list of client IPs> <emphasis> <z2></emphasis>:a.b.c.d udp</programlisting>
|
||||||
|
|
||||||
<programlisting>#ACTION SOURCE DESTINATION PROTO DEST PORT(S)
|
|
||||||
ACCEPT <emphasis><z1></emphasis> <emphasis> <z2></emphasis>:a.b.c.d tcp 111
|
|
||||||
ACCEPT <emphasis><z1></emphasis> <emphasis> <z2></emphasis>:a.b.c.d udp 111
|
|
||||||
ACCEPT <emphasis><z1></emphasis> <emphasis> <z2></emphasis>:a.b.c.d udp 2049
|
|
||||||
ACCEPT <emphasis><z1></emphasis> <emphasis> <z2></emphasis>:a.b.c.d udp 32700:</programlisting>
|
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
<section>
|
<section>
|
||||||
@ -136,6 +130,14 @@ ACCEPT <emphasis><z1></emphasis> <emphasis> <z2></emphas
|
|||||||
ACCEPT <emphasis><source></emphasis> <emphasis><destination></emphasis> udp 123</programlisting>
|
ACCEPT <emphasis><source></emphasis> <emphasis><destination></emphasis> udp 123</programlisting>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
|
<section>
|
||||||
|
<title><trademark>PCAnywhere</trademark></title>
|
||||||
|
|
||||||
|
<programlisting>#ACTION SOURCE DESTINATION PROTO DEST PORT(S)
|
||||||
|
ACCEPT <emphasis><source></emphasis> <emphasis><destination></emphasis> udp 5632
|
||||||
|
ACCEPT <emphasis><source></emphasis> <emphasis><destination></emphasis> tcp 5631</programlisting>
|
||||||
|
</section>
|
||||||
|
|
||||||
<section>
|
<section>
|
||||||
<title>Pop3</title>
|
<title>Pop3</title>
|
||||||
|
|
||||||
@ -255,7 +257,9 @@ ACCEPT <emphasis><source></emphasis> <emphasis><destination>
|
|||||||
<appendix>
|
<appendix>
|
||||||
<title>Revision History</title>
|
<title>Revision History</title>
|
||||||
|
|
||||||
<para><revhistory><revision><revnumber>1.5</revnumber><date>2004-02-05</date><authorinitials>TE</authorinitials><revremark>Added
|
<para><revhistory><revision><revnumber>1.7</revnumber><date>2004-02-12</date><authorinitials>TE</authorinitials><revremark>Make
|
||||||
|
NFS work for everyone</revremark></revision><revision><revnumber>1.6</revnumber><date>2004-02-12</date><authorinitials>TE</authorinitials><revremark>Added
|
||||||
|
PCAnywhere</revremark></revision><revision><revnumber>1.5</revnumber><date>2004-02-05</date><authorinitials>TE</authorinitials><revremark>Added
|
||||||
information about VNC viewers in listen mode.</revremark></revision><revision><revnumber>1.4</revnumber><date>2004-01-26</date><authorinitials>TE</authorinitials><revremark>Correct
|
information about VNC viewers in listen mode.</revremark></revision><revision><revnumber>1.4</revnumber><date>2004-01-26</date><authorinitials>TE</authorinitials><revremark>Correct
|
||||||
ICQ.</revremark></revision><revision><revnumber>1.3</revnumber><date>2004-01-04</date><authorinitials>TE</authorinitials><revremark>Alphabetize</revremark></revision><revision><revnumber>1.2</revnumber><date>2004-01-03</date><authorinitials>TE</authorinitials><revremark>Add
|
ICQ.</revremark></revision><revision><revnumber>1.3</revnumber><date>2004-01-04</date><authorinitials>TE</authorinitials><revremark>Alphabetize</revremark></revision><revision><revnumber>1.2</revnumber><date>2004-01-03</date><authorinitials>TE</authorinitials><revremark>Add
|
||||||
rules file entries.</revremark></revision><revision><revnumber>1.1</revnumber><date>2002-07-30</date><authorinitials>TE</authorinitials><revremark>Initial
|
rules file entries.</revremark></revision><revision><revnumber>1.1</revnumber><date>2002-07-30</date><authorinitials>TE</authorinitials><revremark>Initial
|
||||||
|
@ -15,7 +15,7 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2004-01-01</pubdate>
|
<pubdate>2004-02-19</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2001-2004</year>
|
<year>2001-2004</year>
|
||||||
@ -121,6 +121,12 @@
|
|||||||
questions but we can't do your job for you.</para>
|
questions but we can't do your job for you.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
|
<listitem>
|
||||||
|
<para>Please do NOT include the output of <command>iptables -L</command>
|
||||||
|
— the output of <emphasis role="bold">shorewall show</emphasis> or
|
||||||
|
<command>shorewall status</command> is much more useful.</para>
|
||||||
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>When reporting a problem, <emphasis role="bold">ALWAYS</emphasis>
|
<para>When reporting a problem, <emphasis role="bold">ALWAYS</emphasis>
|
||||||
include this information:</para>
|
include this information:</para>
|
||||||
@ -296,7 +302,8 @@
|
|||||||
<appendix>
|
<appendix>
|
||||||
<title>Revision History</title>
|
<title>Revision History</title>
|
||||||
|
|
||||||
<para><revhistory><revision><revnumber>1.2</revnumber><date>2003-01-01</date><authorinitials>TE</authorinitials><revremark>Removed
|
<para><revhistory><revision><revnumber>1.3</revnumber><date>2003-02-19</date><authorinitials>TE</authorinitials><revremark>Admonish
|
||||||
|
against including "iptables -L" output.</revremark></revision><revision><revnumber>1.2</revnumber><date>2003-01-01</date><authorinitials>TE</authorinitials><revremark>Removed
|
||||||
.GIF and moved note about unsupported releases. Move Revision History to
|
.GIF and moved note about unsupported releases. Move Revision History to
|
||||||
this Appendix.</revremark></revision><revision><revnumber>1.1</revnumber><date>2003-12-19</date><authorinitials>TE</authorinitials><revremark>Corrected
|
this Appendix.</revremark></revision><revision><revnumber>1.1</revnumber><date>2003-12-19</date><authorinitials>TE</authorinitials><revremark>Corrected
|
||||||
URL for Newbies List</revremark></revision></revhistory></para>
|
URL for Newbies List</revremark></revision></revhistory></para>
|
||||||
|
@ -15,7 +15,7 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2004-12-05</pubdate>
|
<pubdate>2004-02-12</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2002</year>
|
<year>2002</year>
|
||||||
@ -530,6 +530,10 @@ fw net ACCEPT</programlisting>
|
|||||||
<filename class="directory">/etc/shorewall/</filename><filename>masq</filename>
|
<filename class="directory">/etc/shorewall/</filename><filename>masq</filename>
|
||||||
and change it to match your configuration.</para>
|
and change it to match your configuration.</para>
|
||||||
|
|
||||||
|
<para>If, despite all advice to the contrary, you are using this guide and
|
||||||
|
want to use one-to-one NAT or Proxy ARP for your DMZ, remove the entry for
|
||||||
|
eth2 from <filename>/etc/shorewall/masq</filename>.</para>
|
||||||
|
|
||||||
<para><inlinegraphic fileref="images/BD21298_.gif" format="GIF" /></para>
|
<para><inlinegraphic fileref="images/BD21298_.gif" format="GIF" /></para>
|
||||||
|
|
||||||
<para>If your external IP is static, you can enter it in the third column
|
<para>If your external IP is static, you can enter it in the third column
|
||||||
|
@ -15,7 +15,7 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2004-01-21</pubdate>
|
<pubdate>2004-02-11</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2001-2004</year>
|
<year>2001-2004</year>
|
||||||
@ -46,8 +46,7 @@
|
|||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>A new <emphasis role="bold">TC_ENABLED</emphasis> parameter in
|
<para>A new <emphasis role="bold">TC_ENABLED</emphasis> parameter in
|
||||||
/etc/shorewall.conf. Traffic Shaping also requires that you enable
|
/etc/shorewall.conf.</para>
|
||||||
packet mangling.</para>
|
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
@ -229,12 +228,11 @@
|
|||||||
column may only be non-empty if the SOURCE is the firewall itself.
|
column may only be non-empty if the SOURCE is the firewall itself.
|
||||||
When this column is non-empty, the rule applies only if the program
|
When this column is non-empty, the rule applies only if the program
|
||||||
generating the output is running under the effective user and/or
|
generating the output is running under the effective user and/or
|
||||||
group. It may contain : </para>
|
group. It may contain :</para>
|
||||||
|
|
||||||
<para>[<user name or number>]:[<group name or number>]
|
<para>[<user name or number>]:[<group name or number>]</para>
|
||||||
</para>
|
|
||||||
|
|
||||||
<para>The colon is optionnal when specifying only a user. </para>
|
<para>The colon is optionnal when specifying only a user.</para>
|
||||||
|
|
||||||
<para>Examples : john: / john / :users / john:users</para>
|
<para>Examples : john: / john / :users / john:users</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
@ -247,63 +245,11 @@
|
|||||||
arriving on eth2 and eth3 should be marked with 2. All packets
|
arriving on eth2 and eth3 should be marked with 2. All packets
|
||||||
originating on the firewall itself should be marked with 3.</para>
|
originating on the firewall itself should be marked with 3.</para>
|
||||||
|
|
||||||
<informaltable>
|
<programlisting>#MARK SOURCE DESTINATION PROTOCOL USER/GROUP
|
||||||
<tgroup cols="4">
|
1 eth1 0.0.0.0/0 all
|
||||||
<thead>
|
2 eth2 0.0.0.0/0 all
|
||||||
<row>
|
2 eth3 0.0.0.0/0 all
|
||||||
<entry align="center">MARK</entry>
|
3 fw 0.0.0.0/0 all</programlisting>
|
||||||
|
|
||||||
<entry align="center">SOURCE</entry>
|
|
||||||
|
|
||||||
<entry align="center">DESTINATION</entry>
|
|
||||||
|
|
||||||
<entry align="center">PROTOCOL</entry>
|
|
||||||
</row>
|
|
||||||
</thead>
|
|
||||||
|
|
||||||
<tbody>
|
|
||||||
<row>
|
|
||||||
<entry>1</entry>
|
|
||||||
|
|
||||||
<entry>eth1</entry>
|
|
||||||
|
|
||||||
<entry>0.0.0.0/0</entry>
|
|
||||||
|
|
||||||
<entry>all</entry>
|
|
||||||
</row>
|
|
||||||
|
|
||||||
<row>
|
|
||||||
<entry>2</entry>
|
|
||||||
|
|
||||||
<entry>eth2</entry>
|
|
||||||
|
|
||||||
<entry>0.0.0.0/0</entry>
|
|
||||||
|
|
||||||
<entry>all</entry>
|
|
||||||
</row>
|
|
||||||
|
|
||||||
<row>
|
|
||||||
<entry>2</entry>
|
|
||||||
|
|
||||||
<entry>eth3</entry>
|
|
||||||
|
|
||||||
<entry>0.0.0.0/0</entry>
|
|
||||||
|
|
||||||
<entry>all</entry>
|
|
||||||
</row>
|
|
||||||
|
|
||||||
<row>
|
|
||||||
<entry>3</entry>
|
|
||||||
|
|
||||||
<entry>fw</entry>
|
|
||||||
|
|
||||||
<entry>0.0.0.0/0</entry>
|
|
||||||
|
|
||||||
<entry>all</entry>
|
|
||||||
</row>
|
|
||||||
</tbody>
|
|
||||||
</tgroup>
|
|
||||||
</informaltable>
|
|
||||||
</example>
|
</example>
|
||||||
|
|
||||||
<example>
|
<example>
|
||||||
@ -312,33 +258,8 @@
|
|||||||
<para>All GRE (protocol 47) packets not originating on the firewall and
|
<para>All GRE (protocol 47) packets not originating on the firewall and
|
||||||
destined for 155.186.235.151 should be marked with 12.</para>
|
destined for 155.186.235.151 should be marked with 12.</para>
|
||||||
|
|
||||||
<informaltable>
|
<programlisting>#MARK SOURCE DESTINATION PROTOCOL USER/GROUP
|
||||||
<tgroup cols="4">
|
12 0.0.0.0/0 155.182.235.151 47</programlisting>
|
||||||
<thead>
|
|
||||||
<row>
|
|
||||||
<entry align="center">MARK</entry>
|
|
||||||
|
|
||||||
<entry align="center">SOURCE</entry>
|
|
||||||
|
|
||||||
<entry align="center">DESTINATION</entry>
|
|
||||||
|
|
||||||
<entry align="center">PROTOCOL</entry>
|
|
||||||
</row>
|
|
||||||
</thead>
|
|
||||||
|
|
||||||
<tbody>
|
|
||||||
<row>
|
|
||||||
<entry>12</entry>
|
|
||||||
|
|
||||||
<entry>0.0.0.0/0</entry>
|
|
||||||
|
|
||||||
<entry>155.186.235.151</entry>
|
|
||||||
|
|
||||||
<entry>47</entry>
|
|
||||||
</row>
|
|
||||||
</tbody>
|
|
||||||
</tgroup>
|
|
||||||
</informaltable>
|
|
||||||
</example>
|
</example>
|
||||||
|
|
||||||
<example>
|
<example>
|
||||||
@ -347,37 +268,8 @@
|
|||||||
<para>All SSH packets originating in 192.168.1.0/24 and destined for
|
<para>All SSH packets originating in 192.168.1.0/24 and destined for
|
||||||
155.186.235.151 should be marked with 22.</para>
|
155.186.235.151 should be marked with 22.</para>
|
||||||
|
|
||||||
<informaltable>
|
<programlisting>#MARK SOURCE DESTINATION PROTOCOL USER/GROUP
|
||||||
<tgroup cols="5">
|
22 192.168.1.0/24 155.182.235.151 tcp 22</programlisting>
|
||||||
<thead>
|
|
||||||
<row>
|
|
||||||
<entry align="center">MARK</entry>
|
|
||||||
|
|
||||||
<entry align="center">SOURCE</entry>
|
|
||||||
|
|
||||||
<entry align="center">DESTINATION</entry>
|
|
||||||
|
|
||||||
<entry align="center">PROTOCOL</entry>
|
|
||||||
|
|
||||||
<entry align="center">PORT(S)</entry>
|
|
||||||
</row>
|
|
||||||
</thead>
|
|
||||||
|
|
||||||
<tbody>
|
|
||||||
<row>
|
|
||||||
<entry>22</entry>
|
|
||||||
|
|
||||||
<entry>192.168.1.0/24</entry>
|
|
||||||
|
|
||||||
<entry>155.186.235.151</entry>
|
|
||||||
|
|
||||||
<entry>tcp</entry>
|
|
||||||
|
|
||||||
<entry>22</entry>
|
|
||||||
</row>
|
|
||||||
</tbody>
|
|
||||||
</tgroup>
|
|
||||||
</informaltable>
|
|
||||||
</example>
|
</example>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
|
@ -13,7 +13,7 @@
|
|||||||
<surname>Eastep</surname>
|
<surname>Eastep</surname>
|
||||||
</author>
|
</author>
|
||||||
|
|
||||||
<pubdate>2004-01-06</pubdate>
|
<pubdate>2004-02-02</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2001-2004</year>
|
<year>2001-2004</year>
|
||||||
@ -119,6 +119,50 @@ iptables: No chain/target/match by that name
|
|||||||
</example>
|
</example>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
|
<section>
|
||||||
|
<title>Some Things to Keep in Mind</title>
|
||||||
|
|
||||||
|
<itemizedlist>
|
||||||
|
<listitem>
|
||||||
|
<para><emphasis role="bold">You cannot test your firewall from the
|
||||||
|
inside</emphasis>. Just because you send requests to your firewall
|
||||||
|
external IP address does not mean that the request will be associated
|
||||||
|
with the external interface or the <quote>net</quote> zone. Any
|
||||||
|
traffic that you generate from the local network will be associated
|
||||||
|
with your local interface and will be treated as loc->fw traffic.</para>
|
||||||
|
</listitem>
|
||||||
|
|
||||||
|
<listitem>
|
||||||
|
<para><emphasis role="bold">IP addresses are properties of systems,
|
||||||
|
not of interfaces</emphasis>. It is a mistake to believe that your
|
||||||
|
firewall is able to forward packets just because you can ping the IP
|
||||||
|
address of all of the firewall's interfaces from the local
|
||||||
|
network. The only conclusion you can draw from such pinging success is
|
||||||
|
that the link between the local system and the firewall works and that
|
||||||
|
you probably have the local system's default gateway set
|
||||||
|
correctly.</para>
|
||||||
|
</listitem>
|
||||||
|
|
||||||
|
<listitem>
|
||||||
|
<para><emphasis role="bold">Reply packets do NOT automatically follow
|
||||||
|
the reverse path of the one taken by the original request</emphasis>.
|
||||||
|
All packets are routed according to the routing table of the host at
|
||||||
|
each step of the way. This issue commonly comes up when people install
|
||||||
|
a Shorewall firewall parallel to an existing gateway and try to use
|
||||||
|
DNAT through Shorewall without changing the default gateway of the
|
||||||
|
system receiving the forwarded requests. Requests come in through the
|
||||||
|
Shorewall firewall where the destination IP address gets rewritten but
|
||||||
|
replies go out unmodified through the old gateway.</para>
|
||||||
|
</listitem>
|
||||||
|
|
||||||
|
<listitem>
|
||||||
|
<para><emphasis role="bold">Shorewall itself has no notion of inside
|
||||||
|
or outside</emphasis>. These concepts are embodied in how Shorewall is
|
||||||
|
configured. </para>
|
||||||
|
</listitem>
|
||||||
|
</itemizedlist>
|
||||||
|
</section>
|
||||||
|
|
||||||
<section>
|
<section>
|
||||||
<title>Your Network Environment</title>
|
<title>Your Network Environment</title>
|
||||||
|
|
||||||
@ -355,7 +399,8 @@ DROP net fw icmp echo-request</programlist
|
|||||||
<appendix>
|
<appendix>
|
||||||
<title>Revision History</title>
|
<title>Revision History</title>
|
||||||
|
|
||||||
<para><revhistory><revision><revnumber>1.6</revnumber><date>2005-01-06</date><authorinitials>TE</authorinitials><revremark>Add
|
<para><revhistory><revision><revnumber>1.7</revnumber><date>2005-02-02</date><authorinitials>TE</authorinitials><revremark>Add
|
||||||
|
hint about testing from inside the firewall.</revremark></revision><revision><revnumber>1.6</revnumber><date>2005-01-06</date><authorinitials>TE</authorinitials><revremark>Add
|
||||||
pointer to Site and Mailing List Archives Searches.</revremark></revision><revision><revnumber>1.5</revnumber><date>2004-01-01</date><authorinitials>TE</authorinitials><revremark>Added
|
pointer to Site and Mailing List Archives Searches.</revremark></revision><revision><revnumber>1.5</revnumber><date>2004-01-01</date><authorinitials>TE</authorinitials><revremark>Added
|
||||||
information about eliminating ping-generated log messages.</revremark></revision><revision><revnumber>1.4</revnumber><date>2003-12-22</date><authorinitials>TE</authorinitials><revremark>Initial
|
information about eliminating ping-generated log messages.</revremark></revision><revision><revnumber>1.4</revnumber><date>2003-12-22</date><authorinitials>TE</authorinitials><revremark>Initial
|
||||||
Docbook Conversion</revremark></revision></revhistory></para>
|
Docbook Conversion</revremark></revision></revhistory></para>
|
||||||
|
@ -17,7 +17,7 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2004-06-11</pubdate>
|
<pubdate>2004-06-18</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2001-2004</year>
|
<year>2001-2004</year>
|
||||||
@ -58,9 +58,9 @@
|
|||||||
class="directory">/etc/shorewall</filename> and modify the copies.</para>
|
class="directory">/etc/shorewall</filename> and modify the copies.</para>
|
||||||
|
|
||||||
<para>Note that you must copy <filename class="directory">/usr/share/doc/shorewall/default-config/shorewall.conf</filename>
|
<para>Note that you must copy <filename class="directory">/usr/share/doc/shorewall/default-config/shorewall.conf</filename>
|
||||||
and /usr/share/doc/shorewall/default-config/modules to <filename
|
and <filename>/usr/share/doc/shorewall/default-config/modules</filename>
|
||||||
class="directory">/etc/shorewall</filename> even if you do not modify
|
to <filename class="directory">/etc/shorewall</filename> even if you do
|
||||||
those files.</para>
|
not modify those files.</para>
|
||||||
</section>
|
</section>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
@ -407,16 +407,17 @@ eth2 192.168.2.0/24</programlisting>
|
|||||||
following:</para>
|
following:</para>
|
||||||
|
|
||||||
<blockquote>
|
<blockquote>
|
||||||
<para>> I know PoM -ng is going to address this issue, but till it
|
<para><programlisting>> I know PoM -ng is going to address this issue, but till it is ready, and
|
||||||
is ready, and > all the extras are ported to it, is there any way
|
> all the extras are ported to it, is there any way to use the h.323
|
||||||
to use the h.323 > contrack module kernel patch with a 2.6 kernel?
|
> contrack module kernel patch with a 2.6 kernel?
|
||||||
> Running 2.6.1 - no 2.4 kernel stuff on the system, so downgrade
|
> Running 2.6.1 - no 2.4 kernel stuff on the system, so downgrade is not
|
||||||
is not > an option... The module is not ported yet to 2.6, sorry.
|
> an option... The module is not ported yet to 2.6, sorry.
|
||||||
> Do I have any options besides a gatekeeper app (does not work in
|
> Do I have any options besides a gatekeeper app (does not work in my
|
||||||
my > network) or a proxy (would prefer to avoid them)? I suggest
|
> network) or a proxy (would prefer to avoid them)?
|
||||||
everyone to setup a proxy (gatekeeper) instead: the module is really
|
|
||||||
dumb and does not deserve to exist at all. It was an excellent tool to
|
I suggest everyone to setup a proxy (gatekeeper) instead: the module is
|
||||||
debug/develop the newnat interface.</para>
|
really dumb and does not deserve to exist at all. It was an excellent tool
|
||||||
|
to debug/develop the newnat interface.</programlisting></para>
|
||||||
</blockquote>
|
</blockquote>
|
||||||
|
|
||||||
<para>Look <ulink url="http://linux-igd.sourceforge.net">here</ulink>
|
<para>Look <ulink url="http://linux-igd.sourceforge.net">here</ulink>
|
||||||
@ -1734,7 +1735,8 @@ iptables: Invalid argument
|
|||||||
<appendix>
|
<appendix>
|
||||||
<title>Revision History</title>
|
<title>Revision History</title>
|
||||||
|
|
||||||
<para><revhistory><revision><revnumber>1.26</revnumber><date>2004-05-18</date><authorinitials>TE</authorinitials><revremark>Delete
|
<para><revhistory><revision><revnumber>1.27</revnumber><date>2004-06-18</date><authorinitials>TE</authorinitials><revremark>Correct
|
||||||
|
formatting in H323 quote.</revremark></revision><revision><revnumber>1.26</revnumber><date>2004-05-18</date><authorinitials>TE</authorinitials><revremark>Delete
|
||||||
obsolete ping information.</revremark></revision><revision><revnumber>1.25</revnumber><date>2004-05-18</date><authorinitials>TE</authorinitials><revremark>Empty
|
obsolete ping information.</revremark></revision><revision><revnumber>1.25</revnumber><date>2004-05-18</date><authorinitials>TE</authorinitials><revremark>Empty
|
||||||
/etc/shorewall on Debian.</revremark></revision><revision><revnumber>1.25</revnumber><date>2004-05-08</date><authorinitials>TE</authorinitials><revremark>Update
|
/etc/shorewall on Debian.</revremark></revision><revision><revnumber>1.25</revnumber><date>2004-05-08</date><authorinitials>TE</authorinitials><revremark>Update
|
||||||
for Shorewall 2.0.2</revremark></revision><revision><revnumber>1.24</revnumber><date>2004-04-25</date><authorinitials>TE</authorinitials><revremark>Add
|
for Shorewall 2.0.2</revremark></revision><revision><revnumber>1.24</revnumber><date>2004-04-25</date><authorinitials>TE</authorinitials><revremark>Add
|
||||||
|
@ -28,7 +28,7 @@
|
|||||||
# shown below. Simply run this script to revert to your prior version of
|
# shown below. Simply run this script to revert to your prior version of
|
||||||
# Shoreline Firewall.
|
# Shoreline Firewall.
|
||||||
|
|
||||||
VERSION=2.0.3-RC1
|
VERSION=2.0.3-RC2
|
||||||
|
|
||||||
usage() # $1 = exit status
|
usage() # $1 = exit status
|
||||||
{
|
{
|
||||||
|
@ -22,7 +22,7 @@
|
|||||||
# Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA
|
# Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA
|
||||||
#
|
#
|
||||||
|
|
||||||
VERSION=2.0.3-RC1
|
VERSION=2.0.3-RC2
|
||||||
|
|
||||||
usage() # $1 = exit status
|
usage() # $1 = exit status
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
%define name shorewall
|
%define name shorewall
|
||||||
%define version 2.0.3
|
%define version 2.0.3
|
||||||
%define release 0RC1
|
%define release 0RC2
|
||||||
%define prefix /usr
|
%define prefix /usr
|
||||||
|
|
||||||
Summary: Shoreline Firewall is an iptables-based firewall for Linux systems.
|
Summary: Shoreline Firewall is an iptables-based firewall for Linux systems.
|
||||||
@ -141,6 +141,8 @@ fi
|
|||||||
%doc COPYING INSTALL changelog.txt releasenotes.txt tunnel
|
%doc COPYING INSTALL changelog.txt releasenotes.txt tunnel
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Sat Jun 19 2004 Tom Eastep tom@shorewall.net
|
||||||
|
- Updated to 2.0.2-0RC2
|
||||||
* Tue Jun 15 2004 Tom Eastep tom@shorewall.net
|
* Tue Jun 15 2004 Tom Eastep tom@shorewall.net
|
||||||
- Updated to 2.0.2-0RC1
|
- Updated to 2.0.2-0RC1
|
||||||
* Mon Jun 14 2004 Tom Eastep tom@shorewall.net
|
* Mon Jun 14 2004 Tom Eastep tom@shorewall.net
|
||||||
|
@ -26,7 +26,7 @@
|
|||||||
# You may only use this script to uninstall the version
|
# You may only use this script to uninstall the version
|
||||||
# shown below. Simply run this script to remove Seattle Firewall
|
# shown below. Simply run this script to remove Seattle Firewall
|
||||||
|
|
||||||
VERSION=2.0.3-RC1
|
VERSION=2.0.3-RC2
|
||||||
|
|
||||||
usage() # $1 = exit status
|
usage() # $1 = exit status
|
||||||
{
|
{
|
||||||
|
Loading…
Reference in New Issue
Block a user