First batch of mindless ID changes

git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@6693 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
teastep 2007-06-28 15:09:37 +00:00
parent 177cb0487f
commit f96772989c
7 changed files with 49 additions and 49 deletions

View File

@ -40,7 +40,7 @@
documentation for that release.</para> documentation for that release.</para>
</caution> </caution>
<section> <section id="Intro">
<title>What are Shorewall Actions?</title> <title>What are Shorewall Actions?</title>
<para>Shorewall actions allow a symbolic name to be associated with a <para>Shorewall actions allow a symbolic name to be associated with a
@ -112,7 +112,7 @@ ACCEPT - - tcp 135,139,445
</orderedlist> </orderedlist>
</section> </section>
<section> <section id="Enabling">
<title>Enabling the Use of Actions</title> <title>Enabling the Use of Actions</title>
<para>In Shorewall version 3.4 and later, to make use of any of the three <para>In Shorewall version 3.4 and later, to make use of any of the three
@ -188,7 +188,7 @@ Reject:REJECT #Default Action for REJECT policy</programlisting>
</warning> </warning>
</section> </section>
<section> <section id="Defining">
<title>Defining your own Actions</title> <title>Defining your own Actions</title>
<para>Before defining a new action, you should evaluate whether your goal <para>Before defining a new action, you should evaluate whether your goal
@ -445,7 +445,7 @@ Reject:REJECT #Default Action for REJECT policy</programlisting>
LogAndAccept loc $FW tcp 22</programlisting> LogAndAccept loc $FW tcp 22</programlisting>
</section> </section>
<section> <section id="Logging">
<title>Actions and Logging</title> <title>Actions and Logging</title>
<para>Specifying a log level in a rule that specifies a user-defined or <para>Specifying a log level in a rule that specifies a user-defined or
@ -589,7 +589,7 @@ acton:info:test $FW net</programlisting>
one like this.</para> one like this.</para>
</note></para> </note></para>
<example> <example id="Example">
<title>An action to drop all broadcast packets</title> <title>An action to drop all broadcast packets</title>
<para>/etc/shorewall/actions<programlisting>DropBcasts</programlisting></para> <para>/etc/shorewall/actions<programlisting>DropBcasts</programlisting></para>

View File

@ -34,7 +34,7 @@
</legalnotice> </legalnotice>
</articleinfo> </articleinfo>
<section> <section id="Products">
<title>Products</title> <title>Products</title>
<para>Shorewall 4.0 consists of four packages.</para> <para>Shorewall 4.0 consists of four packages.</para>
@ -73,7 +73,7 @@
</orderedlist> </orderedlist>
</section> </section>
<section> <section id="Shorewall">
<title>Shorewall</title> <title>Shorewall</title>
<para>The Shorewall product includes a large number of files which are <para>The Shorewall product includes a large number of files which are
@ -84,7 +84,7 @@
class="directory">/var/lilb/shorewall/</filename>. These are described in class="directory">/var/lilb/shorewall/</filename>. These are described in
the sub-sections that follow.</para> the sub-sections that follow.</para>
<section> <section id="sbin">
<title>/sbin</title> <title>/sbin</title>
<para>The <filename>/sbin/shorewall</filename> shell program is use to <para>The <filename>/sbin/shorewall</filename> shell program is use to
@ -92,7 +92,7 @@
url="manpages/shorewall.html">shorewall</ulink>(8).</para> url="manpages/shorewall.html">shorewall</ulink>(8).</para>
</section> </section>
<section> <section id="share-shorewall">
<title>/usr/share/shorewall</title> <title>/usr/share/shorewall</title>
<para>The bulk of Shorewall is installed here.</para> <para>The bulk of Shorewall is installed here.</para>
@ -175,14 +175,14 @@
</itemizedlist> </itemizedlist>
</section> </section>
<section> <section id="shorewall">
<title>/etc/shorewall</title> <title>/etc/shorewall</title>
<para>This is where the modifiable configuration files are <para>This is where the modifiable configuration files are
installed.</para> installed.</para>
</section> </section>
<section> <section id="init">
<title>/etc/init.d or /etc/rc.d (depends on distribution)</title> <title>/etc/init.d or /etc/rc.d (depends on distribution)</title>
<para>An init script is installed here. Depending on the distribution, <para>An init script is installed here. Depending on the distribution,
@ -190,7 +190,7 @@
<filename>rc.firewall</filename>.</para> <filename>rc.firewall</filename>.</para>
</section> </section>
<section> <section id="var">
<title>/var/lib/shorewall</title> <title>/var/lib/shorewall</title>
<para>Shorewall doesn't install any files in this directory but rather <para>Shorewall doesn't install any files in this directory but rather
@ -288,7 +288,7 @@
</section> </section>
</section> </section>
<section> <section id="Shorewall-shell">
<title>Shorewall-shell</title> <title>Shorewall-shell</title>
<para>The Shorewall-shell product installs all of its files in <para>The Shorewall-shell product installs all of its files in
@ -318,7 +318,7 @@
</itemizedlist> </itemizedlist>
</section> </section>
<section> <section id="Shorewall-perl">
<title>Shorewall-perl</title> <title>Shorewall-perl</title>
<para>The Shorewall-perl product installs all of its files in <para>The Shorewall-perl product installs all of its files in
@ -352,7 +352,7 @@
</itemizedlist> </itemizedlist>
</section> </section>
<section> <section id="Shorewall-lite">
<title>Shorewall-lite</title> <title>Shorewall-lite</title>
<para>The Shorewall-lite product includes files installed in /<filename <para>The Shorewall-lite product includes files installed in /<filename
@ -363,7 +363,7 @@
class="directory">/var/lilb/shorewall/</filename>. These are described in class="directory">/var/lilb/shorewall/</filename>. These are described in
the sub-sections that follow.</para> the sub-sections that follow.</para>
<section> <section id="sbin-lite">
<title>/sbin</title> <title>/sbin</title>
<para>The <filename>/sbin/shorewall-lite</filename> shell program is use <para>The <filename>/sbin/shorewall-lite</filename> shell program is use
@ -371,7 +371,7 @@
url="manpages/shorewall-lite.html">shorewall-lite</ulink>(8).</para> url="manpages/shorewall-lite.html">shorewall-lite</ulink>(8).</para>
</section> </section>
<section> <section id="init-lite">
<title>/etc/init.d or /etc/rc.d (depends on distribution)</title> <title>/etc/init.d or /etc/rc.d (depends on distribution)</title>
<para>An init script is installed here. Depending on the distribution, <para>An init script is installed here. Depending on the distribution,
@ -379,14 +379,14 @@
<filename>rc.firewall</filename>.</para> <filename>rc.firewall</filename>.</para>
</section> </section>
<section> <section id="shorewall-lite">
<title>/etc/shorewall-lite</title> <title>/etc/shorewall-lite</title>
<para>This is where the modifiable configuration files are <para>This is where the modifiable configuration files are
installed.</para> installed.</para>
</section> </section>
<section> <section id="share-lite">
<title>/usr/share/shorewall-lite</title> <title>/usr/share/shorewall-lite</title>
<para>The bulk of Shorewall-lite is installed here.</para> <para>The bulk of Shorewall-lite is installed here.</para>
@ -435,7 +435,7 @@
</itemizedlist> </itemizedlist>
</section> </section>
<section> <section id="var-lite">
<title>/var/lib/shorewall-lite</title> <title>/var/lib/shorewall-lite</title>
<para>Shorewall-lite doesn't install any files in this directory but <para>Shorewall-lite doesn't install any files in this directory but

View File

@ -34,7 +34,7 @@
</legalnotice> </legalnotice>
</articleinfo> </articleinfo>
<section> <section id="Overview">
<title>Overview</title> <title>Overview</title>
<para>Beginning with Shorewall version 3.1, Shorewall has the capability <para>Beginning with Shorewall version 3.1, Shorewall has the capability
@ -43,7 +43,7 @@
system with <emphasis>Shorewall Lite</emphasis> installed and can serve as system with <emphasis>Shorewall Lite</emphasis> installed and can serve as
the firewall creation script for that system.</para> the firewall creation script for that system.</para>
<section> <section id="Restrictions">
<title>Restrictions</title> <title>Restrictions</title>
<para>While compiled Shorewall programs are useful in many cases, there <para>While compiled Shorewall programs are useful in many cases, there
@ -552,7 +552,7 @@ clean:
<programlisting><command>ln -sf shorewall-lite /sbin/shorewall</command></programlisting> <programlisting><command>ln -sf shorewall-lite /sbin/shorewall</command></programlisting>
</blockquote> </blockquote>
<section> <section id="Converting">
<title>Converting a system from Shorewall to Shorewall Lite</title> <title>Converting a system from Shorewall to Shorewall Lite</title>
<para>Converting a firewall system that is currently running Shorewall <para>Converting a firewall system that is currently running Shorewall
@ -822,7 +822,7 @@ MANGLE_FORWARD # Mangle table has FORWARD chain</programlisting
does not attempt to load additional kernel modules.</para> does not attempt to load additional kernel modules.</para>
</section> </section>
<section> <section id="Running">
<title>Running compiled programs directly</title> <title>Running compiled programs directly</title>
<para>Compiled firewall programs are complete programs that support the <para>Compiled firewall programs are complete programs that support the
@ -864,4 +864,4 @@ MANGLE_FORWARD # Mangle table has FORWARD chain</programlisting
is the level specified in the shorewall.conf file used when then program is the level specified in the shorewall.conf file used when then program
was compiled.</para> was compiled.</para>
</section> </section>
</article> </article>

View File

@ -34,7 +34,7 @@
</legalnotice> </legalnotice>
</articleinfo> </articleinfo>
<section> <section id="Intro">
<title>Introduction</title> <title>Introduction</title>
<para>Shorewall supports two different forms of blacklisting; static and <para>Shorewall supports two different forms of blacklisting; static and
@ -73,7 +73,7 @@
</important> </important>
</section> </section>
<section> <section id="Static">
<title>Static Blacklisting</title> <title>Static Blacklisting</title>
<para>Shorewall static blacklisting support has the following <para>Shorewall static blacklisting support has the following
@ -153,7 +153,7 @@ ipset -B Blacklist 206.124.146.177 -b SMTP</programlisting>
<para>This will blacklist SMTP traffic from host 206.124.146.177.</para> <para>This will blacklist SMTP traffic from host 206.124.146.177.</para>
</section> </section>
<section> <section id="Dynamic">
<title>Dynamic Blacklisting</title> <title>Dynamic Blacklisting</title>
<para>Dynamic blacklisting doesn't use any configuration parameters but is <para>Dynamic blacklisting doesn't use any configuration parameters but is
@ -216,7 +216,7 @@ ipset -B Blacklist 206.124.146.177 -b SMTP</programlisting>
<quote>blacklist</quote> option in <quote>blacklist</quote> option in
<filename>/etc/shorewall/interfaces</filename>.</para> <filename>/etc/shorewall/interfaces</filename>.</para>
<example> <example id="Ignore">
<title>Ignore packets from a pair of systems</title> <title>Ignore packets from a pair of systems</title>
<programlisting> <command>shorewall[-lite] drop 192.0.2.124 192.0.2.125</command></programlisting> <programlisting> <command>shorewall[-lite] drop 192.0.2.124 192.0.2.125</command></programlisting>
@ -224,7 +224,7 @@ ipset -B Blacklist 206.124.146.177 -b SMTP</programlisting>
<para>Drops packets from hosts 192.0.2.124 and 192.0.2.125</para> <para>Drops packets from hosts 192.0.2.124 and 192.0.2.125</para>
</example> </example>
<example> <example id="Allow">
<title>Re-enable packets from a system</title> <title>Re-enable packets from a system</title>
<programlisting> <command>shorewall[-lite] allow 192.0.2.125</command></programlisting> <programlisting> <command>shorewall[-lite] allow 192.0.2.125</command></programlisting>

View File

@ -41,7 +41,7 @@
documentation for that release.</emphasis></para> documentation for that release.</emphasis></para>
</caution> </caution>
<section> <section id="Background">
<title>Background</title> <title>Background</title>
<para>Systems where Shorewall runs normally function as <para>Systems where Shorewall runs normally function as
@ -78,7 +78,7 @@
</orderedlist> </orderedlist>
</section> </section>
<section> <section id="Requirements">
<title>Requirements</title> <title>Requirements</title>
<para>Note that if you need a bridge but do not need to restrict the <para>Note that if you need a bridge but do not need to restrict the
@ -123,7 +123,7 @@
</itemizedlist> </itemizedlist>
</section> </section>
<section> <section id="Application">
<title>Application</title> <title>Application</title>
<para>The following diagram shows a typical application of a <para>The following diagram shows a typical application of a
@ -183,7 +183,7 @@
fileref="images/bridge3.png" /></para> fileref="images/bridge3.png" /></para>
</section> </section>
<section> <section id="Bridge">
<title>Configuring the Bridge</title> <title>Configuring the Bridge</title>
<para>Configuring the bridge itself is quite simple and uses the <para>Configuring the bridge itself is quite simple and uses the
@ -502,7 +502,7 @@ rc-update add bridge boot
can post it here.</para> can post it here.</para>
</section> </section>
<section> <section id="Shorewall">
<title>Configuring Shorewall</title> <title>Configuring Shorewall</title>
<para>As described above, Shorewall bridge support requires the <para>As described above, Shorewall bridge support requires the
@ -715,7 +715,7 @@ ACCEPT $FW $DMZ tcp 53 </
</orderedlist> </orderedlist>
</section> </section>
<section> <section id="Limitations">
<title>Limitations</title> <title>Limitations</title>
<para>Bridging doesn't work with some wireless cards — see <ulink <para>Bridging doesn't work with some wireless cards — see <ulink

View File

@ -241,7 +241,7 @@
place comments at the end of any line, again by delimiting the comment place comments at the end of any line, again by delimiting the comment
from the rest of the line with a pound sign.</para> from the rest of the line with a pound sign.</para>
<example> <example id="comment">
<title>Comments in a Configuration File</title> <title>Comments in a Configuration File</title>
<programlisting># This is a comment <programlisting># This is a comment
@ -335,7 +335,7 @@ gateway:~ #
backslash (<quote>\</quote>) followed immediately by a new line character backslash (<quote>\</quote>) followed immediately by a new line character
(Enter key).</para> (Enter key).</para>
<example> <example id="continuation">
<title>Line Continuation</title> <title>Line Continuation</title>
<programlisting>ACCEPT net $FW tcp \↵ <programlisting>ACCEPT net $FW tcp \↵
@ -372,7 +372,7 @@ smtp,www,pop3,imap #Services running on the firewall</programlisting>
<filename>params</filename> file.</para> <filename>params</filename> file.</para>
</caution> </caution>
<example> <example id="include">
<title>Use of INCLUDE</title> <title>Use of INCLUDE</title>
<programlisting> shorewall/params.mgmt: <programlisting> shorewall/params.mgmt:
@ -478,7 +478,7 @@ smtp,www,pop3,imap #Services running on the firewall</programlisting>
Shorewall to insure backward compatibility with existing configuration Shorewall to insure backward compatibility with existing configuration
files.</para> files.</para>
<example> <example id="validdns">
<title>Valid DNS Names</title> <title>Valid DNS Names</title>
<itemizedlist> <itemizedlist>
@ -492,7 +492,7 @@ smtp,www,pop3,imap #Services running on the firewall</programlisting>
</itemizedlist> </itemizedlist>
</example> </example>
<example> <example id="invaliddns">
<title>Invalid DNS Names</title> <title>Invalid DNS Names</title>
<itemizedlist> <itemizedlist>
@ -650,7 +650,7 @@ DNAT net loc:192.168.1.3 tcp 4000:4100</programlisting>
omit the high port number, a value of 65535 is assumed.</para> omit the high port number, a value of 65535 is assumed.</para>
</section> </section>
<section> <section id="Portlists">
<title>Port Lists</title> <title>Port Lists</title>
<para>In most cases where a port or port range may appear, a <para>In most cases where a port or port range may appear, a
@ -795,7 +795,7 @@ DNAT net loc:192.168.1.3 tcp 4000:4100</programlisting>
<para>In GNU/Linux, MAC addresses are usually written as a series of 6 hex <para>In GNU/Linux, MAC addresses are usually written as a series of 6 hex
numbers separated by colons.</para> numbers separated by colons.</para>
<example> <example id="mac">
<title>MAC Address of an Ethernet Controller</title> <title>MAC Address of an Ethernet Controller</title>
<programlisting> &nbsp;&nbsp;&nbsp;&nbsp; [root@gateway root]# <command>ifconfig eth0</command> <programlisting> &nbsp;&nbsp;&nbsp;&nbsp; [root@gateway root]# <command>ifconfig eth0</command>
@ -859,7 +859,7 @@ DNAT net loc:192.168.1.3 tcp 4000:4100</programlisting>
</orderedlist> </orderedlist>
</section> </section>
<section> <section id="Save">
<title>Saved Configurations</title> <title>Saved Configurations</title>
<para>Shorewall allows you to <firstterm>save</firstterm> the <para>Shorewall allows you to <firstterm>save</firstterm> the

View File

@ -50,7 +50,7 @@
Shorewall-generated Netfilter logging rules.</para> Shorewall-generated Netfilter logging rules.</para>
</note> </note>
<section> <section id="Firewall">
<title>If you want to Run a DHCP Server on your firewall</title> <title>If you want to Run a DHCP Server on your firewall</title>
<itemizedlist> <itemizedlist>
@ -77,7 +77,7 @@
</itemizedlist> </itemizedlist>
</section> </section>
<section> <section id="Client">
<title>If a Firewall Interface gets its IP Address via DHCP</title> <title>If a Firewall Interface gets its IP Address via DHCP</title>
<itemizedlist> <itemizedlist>
@ -122,7 +122,7 @@
</itemizedlist> </itemizedlist>
</section> </section>
<section> <section id="Bridge">
<title>If you wish to pass DHCP requests and responses through a <title>If you wish to pass DHCP requests and responses through a
bridge</title> bridge</title>
@ -137,7 +137,7 @@
</itemizedlist> </itemizedlist>
</section> </section>
<section> <section id="Relay">
<title>Running dhcrelay on the firewall</title> <title>Running dhcrelay on the firewall</title>
<itemizedlist> <itemizedlist>
@ -155,4 +155,4 @@
</listitem> </listitem>
</itemizedlist> </itemizedlist>
</section> </section>
</article> </article>