mirror of
https://gitlab.com/shorewall/code.git
synced 2025-06-23 19:21:21 +02:00
Update command page
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@1016 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
parent
bfbcb081c5
commit
f88c54ae33
@ -15,7 +15,7 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2003-12-12</pubdate>
|
<pubdate>2003-12-28</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2001-2003</year>
|
<year>2001-2003</year>
|
||||||
@ -39,11 +39,12 @@
|
|||||||
<para>If you have a permanent internet connection such as DSL or Cable, I
|
<para>If you have a permanent internet connection such as DSL or Cable, I
|
||||||
recommend that you start the firewall automatically at boot. Once you have
|
recommend that you start the firewall automatically at boot. Once you have
|
||||||
installed <quote>firewall</quote> in your init.d directory, simply type
|
installed <quote>firewall</quote> in your init.d directory, simply type
|
||||||
<quote>chkconfig --add firewall</quote>. This will start the firewall in
|
<quote><quote><command>chkconfig --add firewall</command></quote></quote>.
|
||||||
run levels 2-5 and stop it in run levels 1 and 6. If you want to configure
|
This will start the firewall in run levels 2-5 and stop it in run levels 1
|
||||||
your firewall differently from this default, you can use the
|
and 6. If you want to configure your firewall differently from this
|
||||||
<quote>--level</quote> option in chkconfig (see <quote>man chkconfig</quote>)
|
default, you can use the <quote>--level</quote> option in chkconfig (see
|
||||||
or using your favorite graphical run-level editor.</para>
|
<quote>man chkconfig</quote>) or using your favorite graphical run-level
|
||||||
|
editor.</para>
|
||||||
|
|
||||||
<caution>
|
<caution>
|
||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
@ -56,24 +57,24 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>If you use dialup, you may want to start the firewall in your
|
<para>If you use dialup, you may want to start the firewall in your
|
||||||
/etc/ppp/ip-up.local script. I recommend just placing
|
<command>/etc/ppp/ip-up.local</command> script. I recommend just
|
||||||
<quote>shorewall restart</quote> in that script.</para>
|
placing <quote>shorewall restart</quote> in that script.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</itemizedlist>
|
</itemizedlist>
|
||||||
</caution>
|
</caution>
|
||||||
|
|
||||||
<para>You can manually start and stop Shoreline Firewall using the
|
<para>You can manually start and stop Shoreline Firewall using the
|
||||||
<quote>shorewall</quote> shell program. Please refer to the Shorewall
|
<quote><quote>shorewall</quote></quote> shell program. Please refer to the
|
||||||
State Diagram as shown at the bottom of this page.</para>
|
Shorewall State Diagram as shown at the bottom of this page.</para>
|
||||||
|
|
||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>shorewall start - starts the firewall</para>
|
<para><command>shorewall start </command>- starts the firewall</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>shorewall stop - stops the firewall; the only traffic permitted
|
<para><command>shorewall stop</command> - stops the firewall; the only
|
||||||
through the firewall is from systems listed in
|
traffic permitted through the firewall is from systems listed in
|
||||||
/etc/shorewall/routestopped (Beginning with version 1.4.7, if
|
/etc/shorewall/routestopped (Beginning with version 1.4.7, if
|
||||||
ADMINISABSENTMINDED=Yes in /etc/shorewall/shorewall.conf then in
|
ADMINISABSENTMINDED=Yes in /etc/shorewall/shorewall.conf then in
|
||||||
addition, all existing connections are permitted and any new
|
addition, all existing connections are permitted and any new
|
||||||
@ -81,114 +82,118 @@
|
|||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>shorewall restart - stops the firewall (if it's running) and
|
<para><command>shorewall restart </command>- stops the firewall (if
|
||||||
then starts it again</para>
|
it's running) and then starts it again</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>shorewall reset - reset the packet and byte counters in the
|
<para><command>shorewall reset</command> - reset the packet and byte
|
||||||
firewall</para>
|
counters in the firewall</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>shorewall clear - remove all rules and chains installed by
|
<para><command>shorewall clear</command> - remove all rules and chains
|
||||||
Shoreline Firewall. The firewall is <quote>wide open</quote></para>
|
installed by Shoreline Firewall. The firewall is <quote>wide open</quote></para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>shorewall refresh - refresh the rules involving the broadcast
|
<para><command>shorewall refresh</command> - refresh the rules
|
||||||
addresses of firewall interfaces, the black list, traffic control
|
involving the broadcast addresses of firewall interfaces, the black
|
||||||
rules and ECN control rules.</para>
|
list, traffic control rules and ECN control rules.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</itemizedlist>
|
</itemizedlist>
|
||||||
|
|
||||||
<para>If you include the keyword debug as the first argument, then a shell
|
<para>If you include the keyword debug as the first argument, then a shell
|
||||||
trace of the command is produced as in:</para>
|
trace of the command is produced as in:</para>
|
||||||
|
|
||||||
<para><programlisting> shorewall debug start 2> /tmp/trace</programlisting>The
|
<para><programlisting> <command>shorewall debug start 2> /tmp/trace</command></programlisting>The
|
||||||
above command would trace the <quote>start</quote> command and place the
|
above command would trace the <quote>start</quote> command and place the
|
||||||
trace information in the file /tmp/trace</para>
|
trace information in the file /tmp/trace</para>
|
||||||
|
|
||||||
<para>Beginning with version 1.4.7, shorewall can give detailed help about
|
<para>Beginning with version 1.4.7, shorewall can give detailed help about
|
||||||
each of its commands: <programlisting> shorewall help [ command | host | address ]</programlisting>The
|
each of its commands: <programlisting> <command>shorewall help [ command | host | address ]</command></programlisting>The
|
||||||
<quote>shorewall</quote> program may also be used to monitor the firewall.</para>
|
<quote>shorewall</quote> program may also be used to monitor the firewall.</para>
|
||||||
|
|
||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>shorewall status - produce a verbose report about the firewall
|
<para><command>shorewall status</command> - produce a verbose report
|
||||||
(iptables -L -n -v)</para>
|
about the firewall (iptables -L -n -v)</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>shorewall show chain1 [ chain2 ... ] - produce a verbose report
|
<para><command>shorewall show chain1 [ chain2 ... ]</command> -
|
||||||
about the listed chains (iptables -L chain -n -v) Note: You may only
|
produce a verbose report about the listed chains (iptables -L chain -n
|
||||||
list one chain in the show command when running Shorewall version
|
-v) Note: You may only list one chain in the show command when running
|
||||||
1.4.6 and earlier. Version 1.4.7 and later allow you to list multiple
|
Shorewall version 1.4.6 and earlier. Version 1.4.7 and later allow you
|
||||||
chains in one command.</para>
|
to list multiple chains in one command.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>shorewall show nat - produce a verbose report about the nat
|
<para><command>shorewall show nat</command> - produce a verbose report
|
||||||
table (iptables -t nat -L -n -v)</para>
|
about the nat table (iptables -t nat -L -n -v)</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>shorewall show tos - produce a verbose report about the mangle
|
<para><command>shorewall show tos</command> - produce a verbose report
|
||||||
table (iptables -t mangle -L -n -v)</para>
|
about the mangle table (iptables -t mangle -L -n -v)</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>shorewall show log - display the last 20 packet log entries.</para>
|
<para><command>shorewall show log</command> - display the last 20
|
||||||
|
packet log entries.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>shorewall show connections - displays the IP connections
|
<para><command>shorewall show connections</command> - displays the IP
|
||||||
currently being tracked by the firewall.</para>
|
connections currently being tracked by the firewall.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>shorewall show tc - displays information about the traffic
|
<para><command>shorewall show tc</command> - displays information
|
||||||
control/shaping configuration.</para>
|
about the traffic control/shaping configuration.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>shorewall monitor [ delay ] - Continuously display the firewall
|
<para><command>shorewall monitor [ delay ]</command> - Continuously
|
||||||
status, last 20 log entries and nat. When the log entry display
|
display the firewall status, last 20 log entries and nat. When the log
|
||||||
changes, an audible alarm is sounded.</para>
|
entry display changes, an audible alarm is sounded.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>shorewall hits - Produces several reports about the Shorewall
|
<para><command>shorewall hits</command> - Produces several reports
|
||||||
packet log messages in the current /var/log/messages file.</para>
|
about the Shorewall packet log messages in the current
|
||||||
|
/var/log/messages file.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>shorewall version - Displays the installed version number.</para>
|
<para><command>shorewall version</command> - Displays the installed
|
||||||
|
version number.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>shorewall check - Performs a cursory validation of the zones,
|
<para><command>shorewall check</command> - Performs a cursory
|
||||||
interfaces, hosts, rules and policy files.<caution><para>The
|
validation of the zones, interfaces, hosts, rules and policy files.<caution><para>The
|
||||||
<quote>check</quote> command is totally unsuppored and does not parse
|
<quote><quote><command>check</command></quote></quote> command is
|
||||||
and validate the generated iptables commands. Even though the
|
totally unsuppored and does not parse and validate the generated
|
||||||
<quote>check</quote> command completes successfully, the configuration
|
iptables commands. Even though the <quote>check</quote> command
|
||||||
may fail to start. Problem reports that complain about errors that the
|
completes successfully, the configuration may fail to start. Problem
|
||||||
<quote>check</quote> command does not detect will not be accepted.</para><para>See
|
reports that complain about errors that the <quote>check</quote>
|
||||||
the recommended way to make configuration changes described below.</para></caution></para>
|
command does not detect will not be accepted.</para><para>See the
|
||||||
|
recommended way to make configuration changes described below.</para></caution></para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>shorewall try configuration-directory [ timeout ] - Restart
|
<para><command>shorewall try <<errortype>configuration-directory</errortype>>
|
||||||
shorewall using the specified configuration and if an error occurs or
|
[ timeout ]</command> - Restart shorewall using the specified
|
||||||
if the timeout option is given and the new configuration has been up
|
configuration and if an error occurs or if the timeout option is given
|
||||||
for that many seconds then shorewall is restarted using the standard
|
and the new configuration has been up for that many seconds then
|
||||||
configuration.</para>
|
shorewall is restarted using the standard configuration.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>shorewall logwatch (added in version 1.3.2) - Monitors the
|
<para><command>shorewall logwatch</command> (added in version 1.3.2) -
|
||||||
LOGFILE and produces an audible alarm when new Shorewall messages are
|
Monitors the LOGFILE and produces an audible alarm when new Shorewall
|
||||||
logged.</para>
|
messages are logged.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</itemizedlist>
|
</itemizedlist>
|
||||||
|
|
||||||
@ -197,15 +202,16 @@
|
|||||||
|
|
||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>shorewall ipcalc [ address mask | address/vlsm ] - displays the
|
<para><command>shorewall ipcalc [ <address> <mask> |
|
||||||
network address, broadcast address, network in CIDR notation and
|
<address>/<vlsm> ] </command>- displays the network
|
||||||
netmask corresponding to the input[s].</para>
|
address, broadcast address, network in CIDR notation and netmask
|
||||||
|
corresponding to the input[s].</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>shorewall iprange address1-address2 - Decomposes the specified
|
<para><command>shorewall iprange <address1>-<address2></command>
|
||||||
range of IP addresses into the equivalent list of network/host
|
- Decomposes the specified range of IP addresses into the equivalent
|
||||||
addresses.</para>
|
list of network/host addresses.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</itemizedlist>
|
</itemizedlist>
|
||||||
|
|
||||||
@ -214,47 +220,52 @@
|
|||||||
|
|
||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>shorewall drop <ip address list> - causes packets from
|
<para><command>shorewall drop <ip address list></command> -
|
||||||
the listed IP addresses to be silently dropped by the firewall.</para>
|
causes packets from the listed IP addresses to be silently dropped by
|
||||||
|
the firewall.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>shorewall reject <ip address list> - causes packets from
|
<para><command>shorewall reject <ip address list></command> -
|
||||||
the listed IP addresses to be rejected by the firewall.</para>
|
causes packets from the listed IP addresses to be rejected by the
|
||||||
|
firewall.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>shorewall allow <ip address list> - re-enables receipt
|
<para><command>shorewall allow <ip address list></command> -
|
||||||
of packets from hosts previously blacklisted by a drop or reject
|
re-enables receipt of packets from hosts previously blacklisted by a
|
||||||
command.</para>
|
drop or reject command.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>shorewall save - save the dynamic blacklisting configuration so
|
<para><command>shorewall save</command> - save the dynamic
|
||||||
that it will be automatically restored the next time that the firewall
|
blacklisting configuration so that it will be automatically restored
|
||||||
is restarted.</para>
|
the next time that the firewall is restarted.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>show dynamic - displays the dynamic blacklisting chain.</para>
|
<para><command>show dynamic</command> - displays the dynamic
|
||||||
|
blacklisting chain.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</itemizedlist>
|
</itemizedlist>
|
||||||
|
|
||||||
<para>Finally, the <quote>shorewall</quote> program may be used to
|
<para>Finally, the <quote><quote>shorewall</quote></quote> program may be
|
||||||
dynamically alter the contents of a zone.</para>
|
used to dynamically alter the contents of a zone.</para>
|
||||||
|
|
||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>shorewall add interface[:host] zone - Adds the specified
|
<para><command>shorewall add <interface>[:<host>]
|
||||||
interface (and host if included) to the specified zone.</para>
|
<zone></command> - Adds the specified interface (and host if
|
||||||
|
included) to the specified zone.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>shorewall delete interface[:host] zone - Deletes the specified
|
<para><command>shorewall delete <interface>[:<host>]
|
||||||
interface (and host if included) from the specified zone.</para>
|
<zone></command> - Deletes the specified interface (and host
|
||||||
|
if included) from the specified zone.</para>
|
||||||
|
|
||||||
<para>Examples:<programlisting> shorewall add ipsec0:192.0.2.24 vpn1 -- adds the address 192.0.2.24 from interface ipsec0 to the zone vpn1
|
<para>Examples:<programlisting> <command>shorewall add ipsec0:192.0.2.24 vpn1</command> -- adds the address 192.0.2.24 from interface ipsec0 to the zone vpn1
|
||||||
shorewall delete ipsec0:192.0.2.24 vpn1 -- deletes the address 192.0.2.24 from interface ipsec0 from zone vpn1</programlisting></para>
|
<command>shorewall delete ipsec0:192.0.2.24 vpn1</command> -- deletes the address 192.0.2.24 from interface ipsec0 from zone vpn1</programlisting></para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</itemizedlist>
|
</itemizedlist>
|
||||||
|
|
||||||
@ -262,8 +273,8 @@
|
|||||||
shorewall try commands allow you to specify which Shorewall configuration
|
shorewall try commands allow you to specify which Shorewall configuration
|
||||||
to use:</para>
|
to use:</para>
|
||||||
|
|
||||||
<programlisting> shorewall [ -c configuration-directory ] {start|restart|check}
|
<programlisting> <command>shorewall [ -c <configuration-directory> ] {start|restart|check}</command>
|
||||||
shorewall try configuration-directory</programlisting>
|
<command>shorewall try <configuration-directory></command></programlisting>
|
||||||
|
|
||||||
<para>If a <emphasis>configuration-directory</emphasis> is specified, each
|
<para>If a <emphasis>configuration-directory</emphasis> is specified, each
|
||||||
time that Shorewall is going to use a file in /etc/shorewall it will first
|
time that Shorewall is going to use a file in /etc/shorewall it will first
|
||||||
@ -275,11 +286,11 @@
|
|||||||
|
|
||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>mkdir /etc/test</para>
|
<para><command>mkdir /etc/test</command></para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>cd /etc/test</para>
|
<para><command>cd /etc/test</command></para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
@ -288,7 +299,7 @@
|
|||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>shorewall -c . check</para>
|
<para><command>shorewall -c . check</command></para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
@ -296,7 +307,7 @@
|
|||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>/sbin/shorewall try .</para>
|
<para><command>/sbin/shorewall try ./</command></para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</itemizedlist>
|
</itemizedlist>
|
||||||
|
|
||||||
@ -309,15 +320,15 @@
|
|||||||
|
|
||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>cp * /etc/shorewall</para>
|
<para><command>cp * /etc/shorewall</command></para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>cd</para>
|
<para><command>cd</command></para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>rm -rf /etc/test</para>
|
<para><command>rm -rf /etc/test</command></para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</itemizedlist>
|
</itemizedlist>
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user