diff --git a/Shorewall-docs2/MultiISP.xml b/Shorewall-docs2/MultiISP.xml
index 61e185a90..7f5c5dc9b 100644
--- a/Shorewall-docs2/MultiISP.xml
+++ b/Shorewall-docs2/MultiISP.xml
@@ -49,7 +49,7 @@
ethernet interfaces to two different ISPs as in the following
diagram.
-
+
diff --git a/Shorewall-docs2/Xen.xml b/Shorewall-docs2/Xen.xml
index a7e99d69a..a28efc9fa 100644
--- a/Shorewall-docs2/Xen.xml
+++ b/Shorewall-docs2/Xen.xml
@@ -53,9 +53,14 @@
boot time by using the xendomains service.
Xen virtualizes a network interface named eth0 in each domain. In domain 0, Xen also
- creates a bridge (xenbr0) and a
- number of virtual interfaces as shown in the following diagram.
+ class="devicefile">eth0
+ This assumes the default Xen configuration created by
+ xend and assumes that the host system has a single
+ ethernet interface named eth0.
+ in each domain. In domain 0, Xen also creates a bridge
+ (xenbr0) and a number of virtual
+ interfaces as shown in the following diagram.
@@ -90,9 +95,9 @@
As I state in the answer to Shorewall FAQ
2, I object to running servers in a local zone because if the
server becomes compromised then there is no protection between that
- compromised server and the other local systems. Xen allows you to safely
- run Internet-accessible servers in your local zone by creating a firewall
- in (the Extended) Domain 0 to isolate the server(s) from the other local
+ compromised server and the other local systems. Xen allows me to safely
+ run Internet-accessible servers in my local zone by creating a firewall in
+ (the Extended) Domain 0 to isolate the server(s) from the other local
systems (including Domain 0).
Here is an example. In this example, we will assume that the system
@@ -100,15 +105,22 @@
only have to worry about protecting the local lan from the systems running
in domains other than domain 0.
+
+ This is the real configuration which I
+ run at shorewall.net.
+
+
/etc/shorewall/zones
One thing strange about configuring Shorewall in this environment
is that Domain 0 is defined as two different zones. It is defined as the
firewall zone and it is also defined as "all systems connected to
- xenbr0:vif0.0. In this case, we
- call this second zone ursa; that zone
- corresponds roughly to what is shown as Extended Domain 0 above.
+ xenbr0:vif0.0. In this case, I
+ call this second zone ursa (which is
+ the name given to the virtual system running in Domain 0); that zone
+ corresponds roughly to what is shown as the Extended Domain 0
+ above.
# OPTIONS OPTIONS
@@ -143,7 +155,9 @@ net eth0 detect dhcp
zone net.
#ZONE HOST(S) OPTIONS
ursa xenbr0:vif0.0
-dmz xenbr0:vif+
+dmz xenbr0:vif+
+ There is a bug in Shorewall versions prior to 3.0.4 that treats all bridge ports as if they had routeback specified. I recommend that you run a Shorewall verison > 3.0.3 if you run Xen.
+
net xenbr0:peth0
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS LINE -- DO NOT REMOVE
@@ -200,8 +214,7 @@ Ping/ACCEPT dmz net
Ping/ACCEPT dmz ursa
- In this example, 192.168.0.0/22 comprises the local
- network.
+ Here, 192.168.0.0/22 comprises my local network.
From the point of view of Shorewall, the zone diagram is as shown
in the following diagram.
diff --git a/Shorewall-docs2/myfiles.xml b/Shorewall-docs2/myfiles.xml
index d7a65f309..93fda89ea 100644
--- a/Shorewall-docs2/myfiles.xml
+++ b/Shorewall-docs2/myfiles.xml
@@ -446,7 +446,7 @@ Limit #Limit connection rate from each individual Host
#TARGET SOURCE DEST PROTO DEST SOURCE ORIGINAL RATE
# PORT PORT(S) DEST LIMIT
-ACCEPT $MIRRORS
+ACCEPT $MIRRORS
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE
@@ -518,7 +518,7 @@ ACCEPT vpn dmz udp
ACCEPT vpn dmz tcp www,smtp,smtps,domain,ssh,imap,https,imaps,ftp,10023,pop3 -
Ping/ACCEPT vpn dmz
###############################################################################################################################################################################
-# Local network to DMZ
+# Local network to DMZ
#
ACCEPT loc dmz udp domain
ACCEPT loc dmz tcp ssh,smtps,www,ftp,imaps,domain,https -
@@ -880,28 +880,28 @@ ACCEPT net $FW tcp 4000:4100
dev tun
remote gateway.shorewall.net
up /etc/openvpn/home.up
-
+
tls-client
pull
-
+
ca /etc/certs/cacert.pem
-
+
cert /etc/certs/tipper.pem
key /etc/certs/tipper_key.pem
-
+
port 1194
-
+
user nobody
group nogroup
-
+
comp-lzo
-
+
ping 15
ping-restart 45
ping-timer-rem
persist-tun
persist-key
-
+
verb 3
@@ -911,7 +911,7 @@ verb 3
#!/bin/bash
-
+
ip route add 192.168.1.0/24 via $5 #Access to Home Network
ip route add 206.124.146.177/32 via $5 #So that DNS names will resolve in my
#Internal Bind 9 view because the source IP will