Add Raw table to Netfilter Overview

This commit is contained in:
Tom Eastep 2009-10-16 11:25:57 -07:00
parent a61c9a9e06
commit f6913953fe
4 changed files with 1003 additions and 1011 deletions

View File

@ -57,26 +57,31 @@
release.</emphasis></para> release.</emphasis></para>
</caution> </caution>
<important>
<para><emphasis role="bold">Shorewall does not configure IPSEC for
you</emphasis> -- it rather configures netfilter to accomodate your IPSEC
configuration.</para>
</important>
<important> <important>
<para>The information in this article is only applicable if you plan to <para>The information in this article is only applicable if you plan to
have IPSEC end-points on the same system where Shorewall is used.</para> have IPSEC end-points on the same system where Shorewall is used.</para>
</important> </important>
<important> <important>
<para>While this article shows configuration of IPSEC using ipsec-tools, <para>While this <emphasis role="bold">article shows configuration of
Shorewall configuration is exactly the same when using OpenSwan or IPSEC using ipsec-tools</emphasis>, <emphasis role="bold">Shorewall
configuration is exactly the same when using OpenSwan</emphasis> or
FreeSwan.</para> FreeSwan.</para>
</important> </important>
<warning> <warning>
<para>When running a Linux kernel prior to 2.6.20, the Netfilter+ipsec and <para>When running a Linux kernel prior to 2.6.20, the Netfilter+ipsec and
policy match support are broken when used with a bridge device. The policy match support are broken when used with a bridge device. The
problem has been reported to the responsible Netfilter developer who has problem was corrected in Kernel 2.6.20 as a result of the removal of
confirmed the problem. The problem was corrected in Kernel 2.6.20 as a deferred FORWARD/OUTPUT processing of traffic destined for a bridge. See
result of the removal of deferred FORWARD/OUTPUT processing of traffic the <ulink url="bridge-Shorewall-perl.html">"<emphasis>Shorewall-perl and
destined for a bridge. See the <ulink Bridged Firewalls</emphasis>"</ulink> article.</para>
url="bridge-Shorewall-perl.html">"<emphasis>Shorewall-perl and Bridged
Firewalls</emphasis>"</ulink> article.</para>
</warning> </warning>
<section id="Overview"> <section id="Overview">
@ -132,12 +137,12 @@
<para>Under the 2.4 Linux Kernel, the association of unencrypted traffic <para>Under the 2.4 Linux Kernel, the association of unencrypted traffic
and zones was made easy by the presence of IPSEC pseudo-interfaces with and zones was made easy by the presence of IPSEC pseudo-interfaces with
names of the form <filename class="devicefile">ipsecn</filename> (e.g. names of the form <filename class="devicefile">ipsecN</filename> (e.g.
<filename class="devicefile">ipsec0</filename>). Outgoing unencrypted <filename class="devicefile">ipsec0</filename>). Outgoing unencrypted
traffic (case 1.) was send through an <filename traffic (case 1.) was send through an <filename
class="devicefile">ipsecn</filename> device while incoming unencrypted class="devicefile">ipsecN</filename> device while incoming unencrypted
traffic (case 2) arrived from an <filename traffic (case 2) arrived from an <filename
class="devicefile">ipsecn</filename> device. The 2.6 kernel-based class="devicefile">ipsecN</filename> device. The 2.6 kernel-based
implementation does away with these pseudo-interfaces. Outgoing traffic implementation does away with these pseudo-interfaces. Outgoing traffic
that is going to be encrypted and incoming traffic that has been decrypted that is going to be encrypted and incoming traffic that has been decrypted
must be matched against policies in the SPD and/or the appropriate must be matched against policies in the SPD and/or the appropriate

View File

@ -197,8 +197,7 @@ Chain POSTROUTING (policy ACCEPT 11579 packets, 771K bytes)
Chain OUTPUT (policy ACCEPT 11579 packets, 771K bytes) Chain OUTPUT (policy ACCEPT 11579 packets, 771K bytes)
pkts bytes target prot opt in out source destination</programlisting> pkts bytes target prot opt in out source destination</programlisting>
<para>And finally, the <emphasis role="bold">Mangle</emphasis> <para>Next, the <emphasis role="bold">Mangle</emphasis> table:</para>
table:</para>
<programlisting>Mangle Table <programlisting>Mangle Table
@ -231,6 +230,16 @@ Chain tcpost (1 references)
pkts bytes target prot opt in out source destination pkts bytes target prot opt in out source destination
Chain tcpre (1 references) Chain tcpre (1 references)
pkts bytes target prot opt in out source destination</programlisting>
<para>And finally, the <emphasis role="bold">Raw</emphasis> table:</para>
<programlisting>Raw Table
Chain PREROUTING (policy ACCEPT 1004K packets, 658M bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 926K packets, 186M bytes)
pkts bytes target prot opt in out source destination</programlisting> pkts bytes target prot opt in out source destination</programlisting>
</section> </section>
</article> </article>

Binary file not shown.

Before

Width:  |  Height:  |  Size: 12 KiB

After

Width:  |  Height:  |  Size: 19 KiB

File diff suppressed because one or more lines are too long