updated to 2.6

git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@2529 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
judas_iscariote 2005-08-21 21:28:29 +00:00
parent d6da8fb9d5
commit ee429fcd39
4 changed files with 634 additions and 476 deletions

View File

@ -1,36 +1,33 @@
#
# Shorewall 2.2 -- Sample Interface File For Two Interfaces
# #
# /etc/shorewall/interfaces # Shorewall version 2.6 - Interfaces File
#
# /etc/shorewall/interfaces
# #
# You must add an entry in this file for each network interface on your # You must add an entry in this file for each network interface on your
# firewall system. # firewall system.
# #
# Columns are: # Columns are:
# #
# ZONE # ZONE Zone for this interface. Must match the short name
# Zone for this interface. Must match the short name
# of a zone defined in /etc/shorewall/zones. # of a zone defined in /etc/shorewall/zones.
# #
# If the interface serves multiple zones that will be # If the interface serves multiple zones that will be
# defined in the /etc/shorewall/hosts file, you should # defined in the /etc/shorewall/hosts file, you should
# place "-" in this column. # place "-" in this column.
# #
# INTERFACE # INTERFACE Name of interface. Each interface may be listed only
# Name of interface. Each interface may be listed only
# once in this file. You may NOT specify the name of # once in this file. You may NOT specify the name of
# an alias (e.g., eth0:0) here; see # an alias (e.g., eth0:0) here; see
# http://www.shorewall.net/FAQ.htm#faq18 # http://www.shorewall.net/FAQ.htm#faq18
# #
# You may specify wildcards here. For example, if you # You may specify wildcards here. For example, if you
# want to make a entry that applies to all PPP # want to make an entry that applies to all PPP
# interfaces, use 'ppp+'. # interfaces, use 'ppp+'.
# #
# There is no need to defiane the loopback interface # There is no need to define the loopback interface (lo)
# (lo) in this file. # in this file.
# #
# BROADCAST # BROADCAST The broadcast address for the subnetwork to which the
# The broadcast address for the subnetwork to which the
# interface belongs. For P-T-P interfaces, this # interface belongs. For P-T-P interfaces, this
# column is left blank.If the interface has multiple # column is left blank.If the interface has multiple
# addresses on multiple subnets then list the broadcast # addresses on multiple subnets then list the broadcast
@ -40,153 +37,206 @@
# will detect the broadcast address for you. If you # will detect the broadcast address for you. If you
# select this option, the interface must be up before # select this option, the interface must be up before
# the firewall is started, you must have iproute # the firewall is started, you must have iproute
# installed and the interface must only be associated # installed.
# with a single subnet. #
#
# If you don't want to give a value for this column but # If you don't want to give a value for this column but
# you want to enter a value in the OPTIONS column, enter # you want to enter a value in the OPTIONS column, enter
# "-" in this column. # "-" in this column.
# #
# OPTIONS # OPTIONS A comma-separated list of options including the
# A comma-separated list of options including the
# following: # following:
# #
# dhcp # dhcp - Specify this option when any of
# Interface is managed by DHCP or used by # the following are true:
# a DHCP server running on the firewall or # 1. the interface gets its IP address
# you have a static IP but are on a LAN # via DHCP
# segment with lots of Laptop DHCP clients. # 2. the interface is used by
# norfc1918 # a DHCP server running on the firewall
# This interface should not receive # 3. you have a static IP but are on a LAN
# any packets whose source is in one # segment with lots of Laptop DHCP
# of the ranges reserved by RFC 1918 # clients.
# (i.e., private or "non-routable" # 4. the interface is a bridge with
# addresses. If packet mangling is # a DHCP server on one port and DHCP
# enabled in shorewall.conf, packets # clients on another port.
# whose destination addresses are
# reserved by RFC 1918 are also rejected.
# nobogons
# This interface should not receive
# any packets whose source is in one
# of the ranges reserved by IANA (this
# option does not cover those ranges
# reserved by RFC 1918 -- see above).
# #
# I PERSONALLY RECOMMEND AGAINST USING # norfc1918 - This interface should not receive
# THE 'nobogons' OPTION. # any packets whose source is in one
# routefilter # of the ranges reserved by RFC 1918
# Turn on kernel route filtering for this # (i.e., private or "non-routable"
# interface (anti-spoofing measure). This # addresses. If packet mangling or
# option can also be enabled globally in # connection-tracking match is enabled in
# the /etc/shorewall/shorewall.conf file. # your kernel, packets whose destination
# blacklist # addresses are reserved by RFC 1918 are
# Check packets arriving on this interface # also rejected.
# against the /etc/shorewall/blacklist #
# file. # routefilter - turn on kernel route filtering for this
# logmartians # interface (anti-spoofing measure). This
# Turn on kernel martian logging (logging # option can also be enabled globally in
# of packets with impossible source # the /etc/shorewall/shorewall.conf file.
# addresses. It is suggested that if you #
# set routefilter on an interface that # logmartians - turn on kernel martian logging (logging
# you also set logmartians. This option # of packets with impossible source
# may also be enabled globally in the # addresses. It is suggested that if you
# /etc/shorewall/shorewall.conf file. # set routefilter on an interface that
# maclist # you also set logmartians. This option
# Connection requests from this interface # may also be enabled globally in the
# are compared against the contents of # /etc/shorewall/shorewall.conf file.
# /etc/shorewall/maclist. If this option #
# is specified, the interface must be # blacklist - Check packets arriving on this interface
# an ethernet NIC and must be up before # against the /etc/shorewall/blacklist
# Shorewall is started. # file.
# tcpflags #
# Packets arriving on this interface are # maclist - Connection requests from this interface
# checked for certain illegal combinations # are compared against the contents of
# of TCP flags. Packets found to have # /etc/shorewall/maclist. If this option
# such a combination of flags are handled # is specified, the interface must be
# according to the setting of # an ethernet NIC and must be up before
# TCP_FLAGS_DISPOSITION after having been # Shorewall is started.
# logged according to the setting of #
# TCP_FLAGS_LOG_LEVEL. # tcpflags - Packets arriving on this interface are
# proxyarp # checked for certain illegal combinations
# Sets /proc/sys/net/ipv4/conf/<interface>/proxy_arp. # of TCP flags. Packets found to have
# such a combination of flags are handled
# according to the setting of
# TCP_FLAGS_DISPOSITION after having been
# logged according to the setting of
# TCP_FLAGS_LOG_LEVEL.
#
# proxyarp -
# Sets
# /proc/sys/net/ipv4/conf/<interface>/proxy_arp.
# Do NOT use this option if you are # Do NOT use this option if you are
# employing Proxy ARP through entries in # employing Proxy ARP through entries in
# /etc/shorewall/proxyarp. This option is # /etc/shorewall/proxyarp. This option is
# intended soley for use with Proxy ARP # intended soley for use with Proxy ARP
# sub-networking as described at: # sub-networking as described at:
# http://www.tldp.org/HOWTO/mini/Proxy-ARP-Subnet # http://www.tldp.org/HOWTO/mini/Proxy-ARP-Subnet
# newnotsyn
# TCP packets that don't have the SYN flag set and
# which are not part of an established connection
# will be accepted from this interface, even if
# NEWNOTSYN=No has been specified in
# /etc/shorewall/shorewall.conf. In other
# words, packets coming in on this interface
# are processed as if NEWNOTSYN=Yes had been
# specified in /etc/shorewall/shorewall.conf.
# #
# This option has no effect if NEWNOTSYN=Yes. # newnotsyn - TCP packets that don't have the SYN
# flag set and which are not part of an
# established connection will be accepted
# from this interface, even if
# NEWNOTSYN=No has been specified in
# /etc/shorewall/shorewall.conf. In other
# words, packets coming in on this
# interface are processed as if
# NEWNOTSYN=Yes had been specified in
# /etc/shorewall/shorewall.conf.
# #
# It is the opinion of the author that # This option has no effect if
# NEWNOTSYN=No creates more problems than # NEWNOTSYN=Yes.
# it solves and I recommend against using
# that setting in shorewall.conf (hence
# making the use of the 'newnotsyn'
# interface option unnecessary).
# routeback
# If specified, indicates that Shorewall
# should include rules that allow filtering
# traffic arriving on this interface back
# out that same interface.
# #
# arp_filter # It is the opinion of the author that
# If specified, this interface will only respond # NEWNOTSYN=No creates more problems than
# to ARP who-has requests for IP addresses # it solves and I recommend against using
# configured on the interface. If not specified, # that setting in shorewall.conf (hence
# the interface can respond to ARP who-has requests # making the use of the 'newnotsyn'
# for IP addresses on any of the firewall's interface. # interface option unnecessary).
# The interface must be up when shorewall is started.
# nosmurfs
# Filter packets for smurfs (Packets with a broadcast
# address as the source).
# #
# Smurfs will be optionally logged based on the setting # routeback - If specified, indicates that Shorewall
# of SMURF_LOG_LEVEL in shorewall.conf. After logging # should include rules that allow
# the packets are dropped. # filtering traffic arriving on this
# # interface back out that same interface.
# detectnets
# Automatically taylors the zone named in the ZONE column
# to include only those hosts routed through the interface.
# #
# WARNING: DO NOT SET THE detectnets OPTION ON YOUR INTERNET INTERFACE! # arp_filter - If specified, this interface will only
# respond to ARP who-has requests for IP
# addresses configured on the interface.
# If not specified, the interface can
# respond to ARP who-has requests for
# IP addresses on any of the firewall's
# interface. The interface must be up
# when Shorewall is started.
# #
# arp_ignore[=<number>]
# - If specified, this interface will
# respond to arp requests based on the
# value of <number>.
# #
# The order in which you list the options is not # 1 - reply only if the target IP address
# significant but the list should have no embedded white # is local address configured on the
# space. # incoming interface
# #
# Example 1: # 2 - reply only if the target IP address
# Suppose you have eth0 connected to a DSL modem and # is local address configured on the
# incoming interface and both with the
# sender's IP address are part from same
# subnet on this interface
#
# 3 - do not reply for local addresses
# configured with scope host, only
# resolutions for global and link
# addresses are replied
#
# 4-7 - reserved
#
# 8 - do not reply for all local
# addresses
#
# If no <number> is given then the value
# 1 is assumed
#
# WARNING -- DO NOT SPECIFY arp_ignore
# FOR ANY INTERFACE INVOLVED IN PROXY ARP.
#
# nosmurfs - Filter packets for smurfs
# (packets with a broadcast
# address as the source).
#
# Smurfs will be optionally logged based
# on the setting of SMURF_LOG_LEVEL in
# shorewall.conf. After logging, the
# packets are dropped.
#
# detectnets - Automatically taylors the zone named
# in the ZONE column to include only those
# hosts routed through the interface.
#
# upnp - Incoming requests from this interface
# may be remapped via UPNP (upnpd).
#
# WARNING: DO NOT SET THE detectnets OPTION ON YOUR
# INTERNET INTERFACE.
#
# The order in which you list the options is not
# significant but the list should have no embedded white
# space.
#
# GATEWAY This column is only meaningful if the 'default' OPTION
# is given -- it is ignored otherwise. You may specify
# the default gateway IP address for this interface here
# and Shorewall will use that IP address rather than any
# that it finds in the main routing table.
#
# Example 1: Suppose you have eth0 connected to a DSL modem and
# eth1 connected to your local network and that your # eth1 connected to your local network and that your
# local subnet is 192.168.1.0/24. The eth0 interface gets # local subnet is 192.168.1.0/24. The interface gets
# it's IP address via DHCP from subnet 206.191.149.192/27. # it's IP address via DHCP from subnet
# 206.191.149.192/27. You have a DMZ with subnet
# 192.168.2.0/24 using eth2.
# #
# Your entries for this setup would look like: # Your entries for this setup would look like:
# #
# #ZONE INTERFACE BROADCAST OPTIONS # net eth0 206.191.149.223 dhcp
# net eth0 206.191.149.223 dhcp # local eth1 192.168.1.255
# local eth1 192.168.1.255 # dmz eth2 192.168.2.255
# #
# Example 2: # Example 2: The same configuration without specifying broadcast
# The same configuration without specifying broadcast
# addresses is: # addresses is:
# #
# #ZONE INTERFACE BROADCAST OPTIONS # net eth0 detect dhcp
# net eth0 detect dhcp # loc eth1 detect
# loc eth1 detect # dmz eth2 detect
# #
############################################################################## # Example 3: You have a simple dial-in system with no ethernet
#ZONE INTERFACE BROADCAST OPTIONS # connections.
net eth0 detect dhcp,tcpflags,norfc1918,routefilter,nosmurfs,logmartians #
loc eth1 detect tcpflags,detectnets # net ppp0 -
#
# For additional information, see
# http://shorewall.net/Documentation.htm#Interfaces
#
###############################################################################
#ZONE INTERFACE BROADCAST OPTIONS GATEWAY
net eth0 detect dhcp,tcpflags,norfc1918,routefilter,nosmurfs,logmartians
loc eth1 detect tcpflags,detectnets
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE #LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE

View File

@ -1,209 +1,221 @@
#
# Shorewall 2.2 - Sample Masquerade file For Two Interfaces
# #
# etc/shorewall/masq # Shorewall version 2.6 - Masq file
# #
# Use this file to define dynamic NAT (Masquerading) and to define Source NAT # /etc/shorewall/masq
# (SNAT).
# #
# Columns are: # Use this file to define dynamic NAT (Masquerading) and to define
# Source NAT (SNAT).
# #
# INTERFACE # Columns are:
# Outgoing interface. This is usually your internet
# interface. If ADD_SNAT_ALIASES=Yes in
# /etc/shorewall/shorewall.conf, you may add ":" and
# a digit to indicate that you want the alias added with
# that name (e.g., eth0:0). This will allow the alias to
# be displayed with ifconfig. THAT IS THE ONLY USE FOR
# THE ALIAS NAME AND IT MAY NOT APPEAR IN ANY OTHER
# PLACE IN YOUR SHOREWALL CONFIGURATION.
# #
# This may be qualified by adding the character # INTERFACE -- Outgoing interface. This is usually your internet
# ":" followed by a destination host or subnet. # interface. If ADD_SNAT_ALIASES=Yes in
# /etc/shorewall/shorewall.conf, you may add ":" and
# a digit to indicate that you want the alias added with
# that name (e.g., eth0:0). This will allow the alias to
# be displayed with ifconfig. THAT IS THE ONLY USE FOR
# THE ALIAS NAME AND IT MAY NOT APPEAR IN ANY OTHER
# PLACE IN YOUR SHOREWALL CONFIGURATION.
# #
# If you wish to inhibit the action of ADD_SNAT_ALIASES # This may be qualified by adding the character
# for this entry then include the ":" but omit the digit: # ":" followed by a destination host or subnet.
# #
# eth0: # If you wish to inhibit the action of ADD_SNAT_ALIASES
# eth2::192.0.2.32/27 # for this entry then include the ":" but omit the digit:
# #
# Normally Masq/SNAT rules are evaluated after those for # eth0:
# one-to-one NAT (/etc/shorewall/nat file). If you want # eth2::192.0.2.32/27
# the rule to be applied before one-to-one NAT rules,
# prefix the interface name with "+":
# #
# +eth0 # Normally Masq/SNAT rules are evaluated after those for
# +eth0:192.0.2.32/27 # one-to-one NAT (/etc/shorewall/nat file). If you want
# +eth0:2 # the rule to be applied before one-to-one NAT rules,
# prefix the interface name with "+":
# #
# This feature should only be required if you need to # +eth0
# insert rules in this file that preempt entries in # +eth0:192.0.2.32/27
# /etc/shorewall/nat. # +eth0:2
# #
# SUBNET # This feature should only be required if you need to
# Subnet that you wish to masquerade. You can specify this as # insert rules in this file that preempt entries in
# a subnet or as an interface. If you give the name of an # /etc/shorewall/nat.
# interface, you must have iproute installed and the interface
# must be up before you start the firewall.
# #
# In order to exclude a subset of the specified SUBNET, you # SUBNET -- Subnet that you wish to masquerade. You can specify this as
# may append "!" and a comma-separated list of IP addresses # a subnet or as an interface. If you give the name of an
# and/or subnets that you wish to exclude. # interface, you must have iproute installed and the interface
# must be up before you start the firewall.
# #
# Example: eth1!192.168.1.4,192.168.32.0/27 # In order to exclude a subset of the specified SUBNET, you
# may append "!" and a comma-separated list of IP addresses
# and/or subnets that you wish to exclude.
# #
# In that example traffic from eth1 would be masqueraded unless # Example: eth1!192.168.1.4,192.168.32.0/27
# it came from 192.168.1.4 or 196.168.32.0/27
# #
# ADDRESS (Optional) # In that example traffic from eth1 would be masqueraded unless
# If you specify an address here, SNAT will be # it came from 192.168.1.4 or 196.168.32.0/27
# used and this will be the source address. If
# ADD_SNAT_ALIASES is set to Yes or yes in
# /etc/shorewall/shorewall.conf then Shorewall
# will automatically add this address to the
# INTERFACE named in the first column.
#
# You may also specify a range of up to 256 IP
# addresses if you want the SNAT address to be
# assigned from that range in a round robin range
# by connection. The range is specified by
# <first ip in range>-<last ip in range>.
#
# Example: 206.124.146.177-206.124.146.180
# #
# This column may not contain DNS names. # ADDRESS -- (Optional). If you specify an address here, SNAT will be
# used and this will be the source address. If
# ADD_SNAT_ALIASES is set to Yes or yes in
# /etc/shorewall/shorewall.conf then Shorewall
# will automatically add this address to the
# INTERFACE named in the first column.
# #
# Normally, Netfilter will attempt to retain # You may also specify a range of up to 256
# the source port number. You may cause # IP addresses if you want the SNAT address to
# netfilter to remap the source port by following # be assigned from that range in a round-robin
# an address or range (if any) by ":" and # range by connection. The range is specified by
# a port range with the format <low port>- # <first ip in range>-<last ip in range>.
# <high port>. If this is done, you must
# specify "tcp" or "udp" in the PROTO column.
# #
# Examples: # Example: 206.124.146.177-206.124.146.180
# #
# 192.0.2.4:5000-6000 # Finally, you may also specify a comma-separated
# :4000-5000 # list of ranges and/or addresses in this column.
# #
# If you want to leave this column empty # This column may not contain DNS Names.
# but you need to specify the next column then
# place a hyphen ("-") here.
# #
# PROTO -- (Optional) # Normally, Netfilter will attempt to retain
# If you wish to restrict this entry to a # the source port number. You may cause
# particular protocol then enter the protocol # netfilter to remap the source port by following
# name (from /etc/protocols) or number here. # an address or range (if any) by ":" and
# a port range with the format <low port>-
# <high port>. If this is done, you must
# specify "tcp" or "udp" in the PROTO column.
#
# Examples:
# #
# PORT(S) -- (Optional) # 192.0.2.4:5000-6000
# If the PROTO column specifies TCP (protocol 6) # :4000-5000
# or UDP (protocol 17) then you may list one
# or more port numbers (or names from
# /etc/services) separated by commas or you
# may list a single port range
# (<low port>:<high port>).
# #
# Where a comma-separated list is given, your # You can invoke the SAME target using the
# kernel and iptables must have multiport match # following in this column:
# support and a maximum of 15 ports may be listed.
# #
# IPSEC -- (Optional) # SAME:[nodst:]<address-range>[,<address-range>...]
# If you specify a value other than "-" in this
# column, you must be running kernel 2.6 and
# your kernel and iptables must include policy
# match support.
# #
# Comma-separated list of options from the following. # The <address-ranges> may be single addresses.
# Only packets that will be encrypted via an SA that
# matches these options will have their source address
# changed.
# #
# Yes or yes -- must be the only option listed # SAME works like SNAT with the exception that
# and matches all outbound traffic that will be # the same local IP address is assigned to each
# encrypted. # connection from a local address to a given
# remote address.
# #
# reqid=<number> where <number> is specified # If the 'nodst:' option is included, then the
# using setkey(8) using the 'unique:<number> # same source address is used for a given
# option for the SPD level. # internal system regardless of which remote
# system is involved.
# #
# spi=<number> where <number> is the SPI of # If you want to leave this column empty
# the SA. # but you need to specify the next column then
# place a hyphen ("-") here.
# #
# proto=ah|esp|ipcomp # PROTO -- (Optional) If you wish to restrict this entry to a
# particular protocol then enter the protocol
# name (from /etc/protocols) or number here.
# #
# mode=transport|tunnel # PORT(S) -- (Optional) If the PROTO column specifies TCP (protocol 6)
# or UDP (protocol 17) then you may list one
# or more port numbers (or names from
# /etc/services) separated by commas or you
# may list a single port range
# (<low port>:<high port>).
#
# Where a comma-separated list is given, your
# kernel and iptables must have multiport match
# support and a maximum of 15 ports may be
# listed.
#
# IPSEC -- (Optional) If you specify a value other than "-" in this
# column, you must be running kernel 2.6 and
# your kernel and iptables must include policy
# match support.
# #
# tunnel-src=<address>[/<mask>] (only # Comma-separated list of options from the
# available with mode=tunnel) # following. Only packets that will be encrypted
# via an SA that matches these options will have
# their source address changed.
# #
# tunnel-dst=<address>[/<mask>] (only # Yes or yes -- must be the only option
# available with mode=tunnel) # listed and matches all outbound
# traffic that will be encrypted.
# #
# strict Means that packets must match all # reqid=<number> where <number> is
# rules. # specified using setkey(8) using the
# 'unique:<number> option for the SPD
# level.
# #
# next Separates rules; can only be used # spi=<number> where <number> is the
# with strict.. # SPI of the SA.
# #
# Example 1: # proto=ah|esp|ipcomp
# #
# You have a simple masquerading setup where eth0 connects to # mode=transport|tunnel
# a DSL or cable modem and eth1 connects to your local network
# with subnet 192.168.0.0/24.
# #
# Your entry in the file can be either: # tunnel-src=<address>[/<mask>] (only
# available with mode=tunnel)
# #
# #INTERFACE SUBNET ADDRESS # tunnel-dst=<address>[/<mask>] (only
# eth0 eth1 # available with mode=tunnel)
# #
# or # strict Means that packets must match
# all rules.
# #
# #INTERFACE SUBNET ADDRESS # next Separates rules; can only be
# eth0 192.168.0.0/24 # used with strict..
# #
# Example 2: # Example 1:
# #
# You add a router to your local network to connect subnet # You have a simple masquerading setup where eth0 connects to
# 192.168.1.0/24 which you also want to masquerade. You then # a DSL or cable modem and eth1 connects to your local network
# add a second entry for eth0 to this file: # with subnet 192.168.0.0/24.
# #
# #INTERFACE SUBNET ADDRESS # Your entry in the file can be either:
# eth0 192.168.1.0/24
# #
# Example 3: # eth0 eth1
# #
# You have an IPSEC tunnel through ipsec0 and you want to # or
# masquerade packets coming from 192.168.1.0/24 but only if #
# these packets are destined for hosts in 10.1.1.0/24: # eth0 192.168.0.0/24
#
# Example 2:
#
# You add a router to your local network to connect subnet
# 192.168.1.0/24 which you also want to masquerade. You then
# add a second entry for eth0 to this file:
#
# eth0 192.168.1.0/24
#
# Example 3:
#
# You have an IPSEC tunnel through ipsec0 and you want to
# masquerade packets coming from 192.168.1.0/24 but only if
# these packets are destined for hosts in 10.1.1.0/24:
# #
# #INTERFACE SUBNET ADDRESS
# ipsec0:10.1.1.0/24 196.168.1.0/24 # ipsec0:10.1.1.0/24 196.168.1.0/24
# #
# Example 4: # Example 4:
# #
# You want all outgoing traffic from 192.168.1.0/24 through # You want all outgoing traffic from 192.168.1.0/24 through
# eth0 to use source address 206.124.146.176 which is NOT the # eth0 to use source address 206.124.146.176 which is NOT the
# primary address of eth0. You want 206.124.146.176 added to # primary address of eth0. You want 206.124.146.176 added to
# be added to eth0 with name eth0:0. # be added to eth0 with name eth0:0.
# #
# #INTERFACE SUBNET ADDRESS # eth0:0 192.168.1.0/24 206.124.146.176
# eth0:0 192.168.1.0/24 206.124.146.176
# #
# Example 5: # Example 5:
# #
# You want all outgoing SMTP traffic entering the firewall # You want all outgoing SMTP traffic entering the firewall
# on eth1 to be sent from eth0 with source IP address # on eth1 to be sent from eth0 with source IP address
# 206.124.146.177. You want all other outgoing traffic # 206.124.146.177. You want all other outgoing traffic
# from eth1 to be sent from eth0 with source IP address # from eth1 to be sent from eth0 with source IP address
# 206.124.146.176. # 206.124.146.176.
# #
# INTERFACE SUBNET ADDRESS PROTO PORT(S) # eth0 eth1 206.124.146.177 tcp smtp
# eth0 eth1 206.124.146.177 tcp smtp # eth0 eth1 206.124.146.176
# eth0 eth1 206.124.146.176
# #
# THE ORDER OF THE ABOVE TWO RULES IS SIGNIFICANT!!!!! # THE ORDER OF THE ABOVE TWO RULES IS SIGNIFICANT!!!!!
# #
############################################################################# # For additional information, see http://shorewall.net/Documentation.htm#Masq
#
###############################################################################
#INTERFACE SUBNET ADDRESS PROTO PORT(S) IPSEC #INTERFACE SUBNET ADDRESS PROTO PORT(S) IPSEC
eth0 eth1 eth0 eth1
#LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE

View File

@ -1,12 +1,12 @@
#
# Shorewall version 2.2 - Sample Rules File For Two Interfaces
# #
# /etc/shorewall/rules # Shorewall version 2.6 - Rules File
#
# /etc/shorewall/rules
# #
# Rules in this file govern connection establishment. Requests and # Rules in this file govern connection establishment. Requests and
# responses are automatically allowed using connection tracking. For any # responses are automatically allowed using connection tracking. For any
# particular (source,dest) pair of zones, the rules are evaluated in the # particular (source,dest) pair of zones, the rules are evaluated in the
# order in which they appear in the file and the first match is the one # order in which they appear in this file and the first match is the one
# that determines the disposition of the request. # that determines the disposition of the request.
# #
# In most places where an IP address or subnet is allowed, you # In most places where an IP address or subnet is allowed, you
@ -14,74 +14,73 @@
# indicate that the rule matches all addresses except the address/subnet # indicate that the rule matches all addresses except the address/subnet
# given. Notice that no white space is permitted between "!" and the # given. Notice that no white space is permitted between "!" and the
# address/subnet. # address/subnet.
# #------------------------------------------------------------------------------
# WARNING: If you masquerade or use SNAT from a local system to the internet # WARNING: If you masquerade or use SNAT from a local system to the internet,
# you cannot use a ACCEPT rule to allow traffic from the internet to # you cannot use an ACCEPT rule to allow traffic from the internet to
# that system. You "must" use a DNAT rule instead. # that system. You *must* use a DNAT rule instead.
# #------------------------------------------------------------------------------
# Columns are: # Columns are:
# #
# ACTION ACCEPT, DROP, REJECT, DNAT, DNAT-, REDIRECT, CONTINUE,
# LOG, QUEUE or an <action>.
# #
# ACTION ACCEPT, DROP, REJECT, DNAT, DNAT-, REDIRECT, # ACCEPT -- allow the connection request
# REDIRECT-, CONTINUE, LOG, QUEUE or an <action>. # ACCEPT+ -- like ACCEPT but also excludes the
# # connection from any subsequent
# ACCEPT # DNAT[-] or REDIRECT[-] rules
# Allow the connection request # NONAT -- Excludes the connection from any
# ACCEPT+ # subsequent DNAT[-] or REDIRECT[-]
# Like ACCEPT but also excludes the # rules but doesn't generate a rule
# connection from any subsequent # to accept the traffic.
# DNAT[-] or REDIRECT[-] rules # DROP -- ignore the request
# NONAT # REJECT -- disallow the request and return an
# Excludes the connection from any # icmp-unreachable or an RST packet.
# subsequent DNAT[-] or REDIRECT[-] # DNAT -- Forward the request to another
# rules but doesn't generate a rule # system (and optionally another
# to accept the traffic. # port).
# DROP # DNAT- -- Advanced users only.
# Ignore the request # Like DNAT but only generates the
# REJECT # DNAT iptables rule and not
# Disallow the request and return an # the companion ACCEPT rule.
# icmp-unreachable or an RST packet. # SAME -- Similar to DNAT except that the
# DNAT # port may not be remapped and when
# Forward the request to another # multiple server addresses are
# system (and optionally another # listed, all requests from a given
# port). # remote system go to the same
# DNAT- # server.
# Advanced users only. # SAME- -- Advanced users only.
# Like DNAT but only generates the # Like SAME but only generates the
# DNAT iptables rule and not # NAT iptables rule and not
# the companion ACCEPT rule. # the companion ACCEPT rule.
# REDIRECT # REDIRECT -- Redirect the request to a local
# Redirect the request to a local # port on the firewall.
# port on the firewall.
# REDIRECT- # REDIRECT-
# Advanced users only. # -- Advanced users only.
# Like REDIRECT but only generates the # Like REDIRET but only generates the
# REDIRECT iptables rule and not the # REDIRECT iptables rule and not
# companion ACCEPT rule. # the companion ACCEPT rule.
# CONTINUE
# (For experts only). Do Not Process
# any of the following rules for this
# (source zone,destination zone). If
# the source and/or destination IP
# address falls into a zone defined
# later in /etc/shorewall/zones, this
# connection request will be passed
# to the rules defined for that
# (those) zones(s).
# LOG
# Simply log the packet and continue.
# QUEUE
# Queue the packet to a user-space
# application such as ftwall.
# (http://p2pwall.sf.net).
# <action>
# The name of an action defined in
# /etc/shorewall/actions or in
# /usr/share/shorewall/actions.std.
# #
# The ACTION may optionally be followed by ":" and a syslog # CONTINUE -- (For experts only). Do not process
# log level (e.g, REJECT:info or DNAT:debug). This causes the # any of the following rules for this
# packet to be logged at the specified level. # (source zone,destination zone). If
# The source and/or destination IP
# address falls into a zone defined
# later in /etc/shorewall/zones, this
# connection request will be passed
# to the rules defined for that
# (those) zone(s).
# LOG -- Simply log the packet and continue.
# QUEUE -- Queue the packet to a user-space
# application such as ftwall
# (http://p2pwall.sf.net).
# <action> -- The name of an action defined in
# /etc/shorewall/actions or in
# /usr/share/shorewall/actions.std.
#
# The ACTION may optionally be followed
# by ":" and a syslog log level (e.g, REJECT:info or
# DNAT:debug). This causes the packet to be
# logged at the specified level.
# #
# If the ACTION names an action defined in # If the ACTION names an action defined in
# /etc/shorewall/actions or in # /etc/shorewall/actions or in
@ -97,9 +96,9 @@
# - The special log level 'none!' suppresses logging # - The special log level 'none!' suppresses logging
# by the action. # by the action.
# #
# You may also specify ULOG (must be in upper case) as a # You may also specify ULOG (must be in upper case) as a
# log level. This will log to the ULOG target for routing # log level.This will log to the ULOG target for routing
# to a separate log through use of ulogd. # to a separate log through use of ulogd
# (http://www.gnumonks.org/projects/ulogd). # (http://www.gnumonks.org/projects/ulogd).
# #
# Actions specifying logging may be followed by a # Actions specifying logging may be followed by a
@ -113,17 +112,21 @@
# #
# SOURCE Source hosts to which the rule applies. May be a zone # SOURCE Source hosts to which the rule applies. May be a zone
# defined in /etc/shorewall/zones, $FW to indicate the # defined in /etc/shorewall/zones, $FW to indicate the
# firewall itself, or "all" If the ACTION is DNAT or # firewall itself, "all", "all+" or "none" If the ACTION
# REDIRECT, sub-zones of the specified zone may be # is DNAT or REDIRECT, sub-zones of the specified zone
# excluded from the rule by following the zone name with # may be excluded from the rule by following the zone
# "!' and a comma-separated list of sub-zone names. # name with "!' and a comma-separated list of sub-zone
# names.
#
# When "none" is used either in the SOURCE or DEST
# column, the rule is ignored.
# #
# When "all" is used either in the SOURCE or DEST column # When "all" is used either in the SOURCE or DEST column
# intra-zone traffic is not affected. You must add # intra-zone traffic is not affected. When "all+" is
# separate rules to handle that traffic. # used, intra-zone traffic is affected.
# #
# Except when "all" is specified, clients may be further # Except when "all[+]" is specified, clients may be
# restricted to a list of subnets and/or hosts by # further restricted to a list of subnets and/or hosts by
# appending ":" and a comma-separated list of subnets # appending ":" and a comma-separated list of subnets
# and/or hosts. Hosts may be specified by IP or MAC # and/or hosts. Hosts may be specified by IP or MAC
# address; mac addresses must begin with "~" and must use # address; mac addresses must begin with "~" and must use
@ -132,22 +135,22 @@
# Hosts may be specified as an IP address range using the # Hosts may be specified as an IP address range using the
# syntax <low address>-<high address>. This requires that # syntax <low address>-<high address>. This requires that
# your kernel and iptables contain iprange match support. # your kernel and iptables contain iprange match support.
# If you kernel and iptables have ipset match support
# then you may give the name of an ipset prefaced by "+".
# The ipset name may be optionally followed by a number
# from 1 to 6 enclosed in square brackets ([]) to
# indicate the number of levels of source bindings to be
# matched.
# #
# Some Examples: # dmz:192.168.2.2 Host 192.168.2.2 in the DMZ
# #
# net:155.186.235.1 # net:155.186.235.0/24 Subnet 155.186.235.0/24 on the
# Host 155.186.235.1 on the Internet # Internet
# #
# loc:192.168.1.0/24 # loc:192.168.1.1,192.168.1.2
# Subnet 192.168.1.0/24 on the # Hosts 192.168.1.1 and
# Local Network # 192.168.1.2 in the local zone.
# # loc:~00-A0-C9-15-39-78 Host in the local zone with
# net:155.186.235.1,155.186.235.2
# Hosts 155.186.235.1 and
# 155.186.235.2 on the Internet.
#
# loc:~00-A0-C9-15-39-78
# Host on the Local Network with
# MAC address 00:A0:C9:15:39:78. # MAC address 00:A0:C9:15:39:78.
# #
# net:192.0.2.11-192.0.2.17 # net:192.0.2.11-192.0.2.17
@ -156,73 +159,78 @@
# #
# Alternatively, clients may be specified by interface # Alternatively, clients may be specified by interface
# by appending ":" to the zone name followed by the # by appending ":" to the zone name followed by the
# interface name. For example, net:eth0 specifies a # interface name. For example, loc:eth1 specifies a
# client that communicates with the firewall system # client that communicates with the firewall system
# through eth0. This may be optionally followed by # through eth1. This may be optionally followed by
# another colon (":") and an IP/MAC/subnet address # another colon (":") and an IP/MAC/subnet address
# as described above (e.g., net:eth0:192.168.1.5). # as described above (e.g., loc:eth1:192.168.1.5).
# #
# DEST Location of Server. May be a zone defined in # DEST Location of Server. May be a zone defined in
# /etc/shorewall/zones, $FW to indicate the firewall # /etc/shorewall/zones, $FW to indicate the firewall
# itself or "all" # itself, "all". "all+" or "none".
#
# When "none" is used either in the SOURCE or DEST
# column, the rule is ignored.
# #
# When "all" is used either in the SOURCE or DEST column # When "all" is used either in the SOURCE or DEST column
# intra-zone traffic is not affected. You must add # intra-zone traffic is not affected. When "all+" is
# separate rules to handle that traffic. # used, intra-zone traffic is affected.
# #
# Except when "all" is specified, the server may be # Except when "all[+]" is specified, the server may be
# further restricted to a particular subnet, host or # further restricted to a particular subnet, host or
# interface by appending ":" and the subnet, host or # interface by appending ":" and the subnet, host or
# interface. See above. # interface. See above.
# #
# Restrictions: # Restrictions:
# #
# 1. MAC addresses are not allowed. # 1. MAC addresses are not allowed.
# 2. In DNAT rules, only IP addresses are # 2. In DNAT rules, only IP addresses are
# allowed; no FQDNs or subnet addresses # allowed; no FQDNs or subnet addresses
# are permitted. # are permitted.
# 3 You may not specify both an interface and # 3. You may not specify both an interface and
# an address. # an address.
# #
# Like in the SOURCE column, you may specify a range of # Like in the SOURCE column, you may specify a range of
# up to 256 IP addresses using the syntax # up to 256 IP addresses using the syntax
# <first ip>-<last ip>. When the ACTION is DNAT or DNAT-, # <first ip>-<last ip>. When the ACTION is DNAT or DNAT-,
# the connections will be assigned to the addresses in the # the connections will be assigned to addresses in the
# range in a round-robin fashion. # range in a round-robin fashion.
# #
# If you kernel and iptables have ipset match support
# then you may give the name of an ipset prefaced by "+".
# The ipset name may be optionally followed by a number
# from 1 to 6 enclosed in square brackets ([]) to
# indicate the number of levels of destination bindings
# to be matched. Only one of the SOURCE and DEST columns
# may specify an ipset name.
#
# The port that the server is listening on may be # The port that the server is listening on may be
# included and separated from the server's IP address by # included and separated from the server's IP address by
# ":". If omitted, the firewall will not modifiy the # ":". If omitted, the firewall will not modifiy the
# destination port. A destination port may only be # destination port. A destination port may only be
# included if the ACTION is DNAT or REDIRECT. # included if the ACTION is DNAT or REDIRECT.
# #
# Example: net:155.186.235.1:25 specifies a Internet # Example: loc:192.168.1.3:3128 specifies a local
# server at IP address 155.186.235.1 and listening on port # server at IP address 192.168.1.3 and listening on port
# 25. The port number MUST be specified as an integer # 3128. The port number MUST be specified as an integer
# and not as a name from /etc/services. # and not as a name from /etc/services.
# #
# If the ACTION is REDIRECT, this column needs only to # if the ACTION is REDIRECT, this column needs only to
# contain the port number on the firewall that the # contain the port number on the firewall that the
# request should be redirected to. # request should be redirected to.
# #
# PROTO Protocol - Must be "tcp", "udp", "icmp", "ipp2p", # PROTO Protocol - Must be "tcp", "udp", "icmp", a number, or
# a number, or "all". "ipp2p" requires ipp2p match # "all".
# support in your kernel and iptables.
# #
# DEST PORT(S) Destination Ports. A comma-separated list of Port # DEST PORT(S) Destination Ports. A comma-separated list of Port
# names (from /etc/services), port numbers or port # names (from /etc/services), port numbers or port
# ranges; if the protocol is "icmp", this column is # ranges; if the protocol is "icmp", this column is
# interpreted as the destination icmp-type(s). # interpreted as the destination icmp-type(s).
# #
# If the protocol is ipp2p, this column is interpreted
# as an ipp2p option without the leading "--" (example "bit"
# for bit-torrent). If no port is given, "ipp2p" is
# assumed.
#
# A port range is expressed as <low port>:<high port>. # A port range is expressed as <low port>:<high port>.
# #
# This column is ignored if PROTOCOL = all but must be # This column is ignored if PROTOCOL = all but must be
# entered if any of the following fields are supplied. # entered if any of the following ields are supplied.
# In that case, it is suggested that this field contain # In that case, it is suggested that this field contain
# "-" # "-"
# #
@ -240,8 +248,8 @@
# ranges. # ranges.
# #
# If you don't want to restrict client ports but need to # If you don't want to restrict client ports but need to
# specify an ORIGINAL DEST in the next column, then place # specify an ORIGINAL DEST in the next column, then
# "-" in this column. # place "-" in this column.
# #
# If your kernel contains multi-port match support, then # If your kernel contains multi-port match support, then
# only a single Netfilter rule will be generated if in # only a single Netfilter rule will be generated if in
@ -251,8 +259,8 @@
# Otherwise, a separate rule will be generated for each # Otherwise, a separate rule will be generated for each
# port. # port.
# #
# ORIGINAL DEST (0ptional -- only allowed if ACTION is DNAT[-] or # ORIGINAL DEST (0ptional) -- If ACTION is DNAT[-] or REDIRECT[-]
# REDIRECT[-]) If included and different from the IP # then if included and different from the IP
# address given in the SERVER column, this is an address # address given in the SERVER column, this is an address
# on some interface on the firewall and connections to # on some interface on the firewall and connections to
# that address will be forwarded to the IP and port # that address will be forwarded to the IP and port
@ -261,102 +269,129 @@
# A comma-separated list of addresses may also be used. # A comma-separated list of addresses may also be used.
# This is usually most useful with the REDIRECT target # This is usually most useful with the REDIRECT target
# where you want to redirect traffic destined for # where you want to redirect traffic destined for
# a particular set of hosts. # particular set of hosts.
# #
# Finally, if the list of addresses begins with "!" then # Finally, if the list of addresses begins with "!" then
# the rule will be followed only if the original # the rule will be followed only if the original
# destination address in the connection request does not # destination address in the connection request does not
# match any of the addresses listed. # match any of the addresses listed.
# #
# RATE LIMIT You may rate-limit the rule by placing a value in this column: # For other actions, this column may be included and may
# contain one or more addresses (host or network)
# separated by commas. Address ranges are not allowed.
# When this column is supplied, rules are generated
# that require that the original destination address
# matches one of the listed addresses. This feature is
# most useful when you want to generate a filter rule
# that corresponds to a DNAT- or REDIRECT- rule. In this
# usage, the list of addresses should not begin with "!".
#
# See http://shorewall.net/PortKnocking.html for an
# example of using an entry in this column with a
# user-defined action rule.
#
# RATE LIMIT You may rate-limit the rule by placing a value in
# this colume:
# #
# <rate>/<interval>[:<burst>] # <rate>/<interval>[:<burst>]
# #
# Where <rate> is the number of connections per <interval> ("sec" # where <rate> is the number of connections per
# or "min") and <burst> is the largest burst permitted. If no # <interval> ("sec" or "min") and <burst> is the
# <burst> is given, a value of 5 is assummed. There may be no # largest burst permitted. If no <burst> is given,
# whitespace embedded in the specification. # a value of 5 is assumed. There may be no
# no whitespace embedded in the specification.
# #
# Example: # Example: 10/sec:20
# 10/sec:20
# #
# If you place a rate limit in this column, you may not place # USER/GROUP This column may only be non-empty if the SOURCE is
# a similiar limit in the ACTION column. # the firewall itself.
# #
# USER/GROUP This column may only be non-empty if the SOURCE is the firewall itself.
#
# The column may contain: # The column may contain:
# #
# [!][<user name or number>][:<group name or number>] # [!][<user name or number>][:<group name or number>][+<program name>]
# #
# When this column is non-empty, the rule applies only if the program # When this column is non-empty, the rule applies only
# generating the output is running under the effective <user> and/or <group> # if the program generating the output is running under
# specified (or is NOT running under that id if "!" is given). # the effective <user> and/or <group> specified (or is
# NOT running under that id if "!" is given).
# #
# Examples: # Examples:
# joe # program must be run by joe
# :kids # program must be run by a member of the 'kids' group.
# !:kids # program must not be run by a member of the 'kids' group.
# #
# Also by default all outbound loc -> net communications are allowed. # joe #program must be run by joe
# You can change this behavior in the sample policy file. # :kids #program must be run by a member of
# #the 'kids' group
# !:kids #program must not be run by a member
# #of the 'kids' group
# +upnpd #program named 'upnpd'
# #
# Example: Accept www requests to the firewall. # Example: Accept SMTP requests from the DMZ to the internet
# #
# #ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL RATE USER/ # #ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL
# # PORT PORT(S) DEST LIMIT GROUP # # PORT PORT(S) DEST
# ACCEPT net fw tcp http # ACCEPT dmz net tcp smtp
# #
# Example: Accept SMTP requests from the Local Network to the Internet # Example: Forward all ssh and http connection requests from the
# internet to local system 192.168.1.3
# #
# #ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL RATE USER/ # #ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL
# # PORT PORT(S) DEST LIMIT GROUP # # PORT PORT(S) DEST
# ACCEPT loc net tcp smtp # DNAT net loc:192.168.1.3 tcp ssh,http
# #
# Example: Forward all ssh and http connection requests from the Internet # Example: Forward all http connection requests from the internet
# to local system 192.168.1.3 # to local system 192.168.1.3 with a limit of 3 per second and
# a maximum burst of 10
# #
# #ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL RATE USER/ # #ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL RATE
# # PORT PORT(S) DEST LIMIT GROUP # # PORT PORT(S) DEST LIMIT
# DNAT net loc:192.168.1.3 tcp ssh,http # DNAT net loc:192.168.1.3 tcp http - - 3/sec:10
# #
# Example: Redirect all locally-originating www connection requests to # Example: Redirect all locally-originating www connection requests to
# port 3128 on the firewall (Squid running on the firewall # port 3128 on the firewall (Squid running on the firewall
# system) except when the destination address is 192.168.2.2 # system) except when the destination address is 192.168.2.2
# #
# #ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL RATE USER/ # #ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL
# # PORT PORT(S) DEST LIMIT GROUP # # PORT PORT(S) DEST
# REDIRECT loc 3128 tcp www - !192.168.2.2 # REDIRECT loc 3128 tcp www - !192.168.2.2
# #
# Example: All http requests from the Internet to address # Example: All http requests from the internet to address
# 130.252.100.69 are to be forwarded to 192.168.1.3 # 130.252.100.69 are to be forwarded to 192.168.1.3
# #
# #ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL RATE USER/ # #ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL
# # PORT PORT(S) DEST LIMIT GROUP # # PORT PORT(S) DEST
# DNAT net loc:192.168.1.3 tcp 80 - 130.252.100.69 # DNAT net loc:192.168.1.3 tcp 80 - 130.252.100.69
##############################################################################
#ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL RATE USER/
# PORT PORT(S) DEST LIMIT GROUP
# #
# Accept DNS connections from the firewall to the network # Example: You want to accept SSH connections to your firewall only
# from internet IP addresses 130.252.100.69 and 130.252.100.70
# #
DNS/ACCEPT fw net # #ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL
# # PORT PORT(S) DEST
# ACCEPT net:130.252.100.69,130.252.100.70 fw \
# tcp 22
#############################################################################################################
#ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL RATE USER/
# PORT PORT(S) DEST LIMIT GROUP
# PORT PORT(S) DEST LIMIT GROUP
# #
# Accept SSH connections from the local network for administration # Accept DNS connections from the firewall to the network
# #
SSH/ACCEPT loc net DNS/ACCEPT fw net
# #
# Allow Ping from the local network # Accept SSH connections from the local network for administration
# #
Ping/ACCEPT loc fw SSH/ACCEPT loc net
#
# Allow Ping from the local network
#
Ping/ACCEPT loc fw
# #
# Reject Ping from the "bad" net zone.. and prevent your log from being flooded.. # Reject Ping from the "bad" net zone.. and prevent your log from being flooded..
# #
Ping/REJECT:none! net fw Ping/REJECT:none! net fw
ACCEPT fw loc icmp ACCEPT fw loc icmp
ACCEPT fw net icmp ACCEPT fw net icmp
# #
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE #LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE

View File

@ -1,19 +1,80 @@
# #
# Shorewall 2.2 -- Sample Zone File For Two Interfaces # Shorewall version 2.6 - Zones File
# /etc/shorewall/zones
# #
# This file determines your network zones. Columns are: # /etc/shorewall/zones
# #
# ZONE Short name of the zone (5 Characters or less in length). # This file determines your network zones.
# DISPLAY Display name of the zone #
# COMMENTS Comments about the zone # Columns are:
#
# ZONE Short name of the zone (5 Characters or less in length).
# The names "all" and "none" are reserved and may not be
# used as zone names.
#
# IPSEC Yes -- Communication with all zone hosts is encrypted
# ONLY Your kernel and iptables must include policy
# match support.
# No -- Communication with some zone hosts may be encrypted.
# Encrypted hosts are designated using the 'ipsec'
# option in /etc/shorewall/hosts.
#
# OPTIONS, A comma-separated list of options as follows:
# IN OPTIONS,
# OUT OPTIONS reqid=<number> where <number> is specified
# using setkey(8) using the 'unique:<number>
# option for the SPD level.
#
# spi=<number> where <number> is the SPI of
# the SA used to encrypt/decrypt packets.
#
# proto=ah|esp|ipcomp
#
# mss=<number> (sets the MSS field in TCP packets)
#
# mode=transport|tunnel
#
# tunnel-src=<address>[/<mask>] (only
# available with mode=tunnel)
#
# tunnel-dst=<address>[/<mask>] (only
# available with mode=tunnel)
#
# strict Means that packets must match all rules.
#
# next Separates rules; can only be used with
# strict..
#
# Example:
# mode=transport,reqid=44
#
# The options in the OPTIONS column are applied to both incoming
# and outgoing traffic. The IN OPTIONS are applied to incoming
# traffic (in addition to OPTIONS) and the OUT OPTIONS are
# applied to outgoing traffic.
#
# If you wish to leave a column empty but need to make an entry
# in a following column, use "-".
# #
# THE ORDER OF THE ENTRIES IN THIS FILE IS IMPORTANT IF YOU HAVE NESTED OR # THE ORDER OF THE ENTRIES IN THIS FILE IS IMPORTANT IF YOU HAVE NESTED OR
# OVERLAPPING ZONES DEFINED THROUGH /etc/shorewall/hosts. # OVERLAPPING ZONES DEFINED THROUGH /etc/shorewall/hosts.
# #
# See http://www.shorewall.net/Documentation.html#Nested # See http://www.shorewall.net/Documentation.htm#Nested
#------------------------------------------------------------------------------
# Example zones:
# #
#ZONE DISPLAY COMMENTS # You have a three interface firewall with internet, local and DMZ
net Net Internet # interfaces.
loc Local Local Networks #
#LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE # #ZONE IPSEC OPTIONS IN OUT
# net
# loc
# dmz
#
###############################################################################
#ZONE IPSEC OPTIONS IN OUT
# ONLY OPTIONS OPTIONS
net
loc
#LAST LINE - ADD YOUR ENTRIES ABOVE THIS ONE - DO NOT REMOVE