Third cut at removing references to Documentation.htm

git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@6776 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
teastep 2007-07-04 00:23:43 +00:00
parent 34101c0766
commit fe5978edd7
22 changed files with 62 additions and 62 deletions

View File

@ -841,7 +841,7 @@ to debug/develop the newnat interface.</programlisting></para>
<para><emphasis role="bold">Answer</emphasis>: Most likely, you need to <para><emphasis role="bold">Answer</emphasis>: Most likely, you need to
set CLAMPMSS=Yes in <ulink set CLAMPMSS=Yes in <ulink
url="Documentation.htm#Conf">/etc/shorewall/shorewall.conf</ulink>.</para> url="manpages/shorewall.conf.html">/etc/shorewall/shorewall.conf</ulink>.</para>
</section> </section>
<section id="faq35"> <section id="faq35">
@ -904,7 +904,7 @@ to debug/develop the newnat interface.</programlisting></para>
restart</quote>).</para> restart</quote>).</para>
<para>By default, older versions of Shorewall rate-limited log messages <para>By default, older versions of Shorewall rate-limited log messages
through <ulink url="Documentation.htm#Conf">settings</ulink> in through <ulink url="manpages/shorewall.conf.html">settings</ulink> in
<filename>/etc/shorewall/shorewall.conf</filename> -- If you want to log <filename>/etc/shorewall/shorewall.conf</filename> -- If you want to log
all messages, set:</para> all messages, set:</para>
@ -1120,7 +1120,7 @@ DROP net fw udp 10619</programlisting>
<para>The destination address is listed in <para>The destination address is listed in
<filename>/usr/share/shorewall/rfc1918</filename> with a <emphasis <filename>/usr/share/shorewall/rfc1918</filename> with a <emphasis
role="bold">logdrop</emphasis> target -- see <filename> <ulink role="bold">logdrop</emphasis> target -- see <filename> <ulink
url="Documentation.htm#rfc1918">/usr/share/shorewall/rfc1918</ulink> url="manpages/shorewall-rfc1918.html">/usr/share/shorewall/rfc1918</ulink>
</filename>.</para> </filename>.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -1132,7 +1132,7 @@ DROP net fw udp 10619</programlisting>
<para>The source or destination address is listed in <para>The source or destination address is listed in
<filename>/usr/share/shorewall/rfc1918</filename> with a <emphasis <filename>/usr/share/shorewall/rfc1918</filename> with a <emphasis
role="bold">logdrop</emphasis> target -- see <filename> <ulink role="bold">logdrop</emphasis> target -- see <filename> <ulink
url="Documentation.htm#rfc1918">/usr/share/shorewall/rfc1918</ulink> url="manpages/shorewall-rfc1918.html">/usr/share/shorewall/rfc1918</ulink>
</filename>.</para> </filename>.</para>
<note> <note>
@ -1231,7 +1231,7 @@ DROP net fw udp 10619</programlisting>
role="bold">dropunclean</emphasis> <ulink role="bold">dropunclean</emphasis> <ulink
url="manpages/shorewall-interfaces.html">interface option</ulink> as url="manpages/shorewall-interfaces.html">interface option</ulink> as
specified in the <emphasis role="bold">LOGUNCLEAN</emphasis> specified in the <emphasis role="bold">LOGUNCLEAN</emphasis>
setting in <ulink url="Documentation.htm#Conf"> setting in <ulink url="manpages/shorewall.conf.html">
<filename>/etc/shorewall/shorewall.conf</filename> <filename>/etc/shorewall/shorewall.conf</filename>
</ulink>.</para> </ulink>.</para>
</listitem> </listitem>
@ -1243,7 +1243,7 @@ DROP net fw udp 10619</programlisting>
<listitem> <listitem>
<para>The packet is being logged because the source IP is <para>The packet is being logged because the source IP is
blacklisted in the <filename> <ulink blacklisted in the <filename> <ulink
url="Documentation.htm#Blacklist">/etc/shorewall/blacklist</ulink> url="manpages/shorewall-blacklist.html">/etc/shorewall/blacklist</ulink>
</filename> file.</para> </filename> file.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -1264,10 +1264,10 @@ DROP net fw udp 10619</programlisting>
</filename> or you need the <emphasis </filename> or you need the <emphasis
role="bold">routeback</emphasis> option in the relevant entry in role="bold">routeback</emphasis> option in the relevant entry in
<filename> <ulink <filename> <ulink
url="Documentation.htm#Hosts">/etc/shorewall/hosts</ulink>.</filename></para> url="manpages/shorewall-hosts.html">/etc/shorewall/hosts</ulink>.</filename></para>
<para>In Shorewall 3.3.3 and later versions with OPTIMIZE=1 in <para>In Shorewall 3.3.3 and later versions with OPTIMIZE=1 in
<ulink url="Documentation.htm#Conf">shorewall.conf</ulink>, such <ulink url="manpages/shorewall.conf.html">shorewall.conf</ulink>, such
packets may also be logged out of a &lt;zone&gt;2all chain or the packets may also be logged out of a &lt;zone&gt;2all chain or the
all2all chain.</para> all2all chain.</para>
</listitem> </listitem>
@ -1282,7 +1282,7 @@ DROP net fw udp 10619</programlisting>
and look at the printed zone definitions).</para> and look at the printed zone definitions).</para>
<para>In Shorewall 3.3.3 and later versions with OPTIMIZE=1 in <para>In Shorewall 3.3.3 and later versions with OPTIMIZE=1 in
<ulink url="Documentation.htm#Conf">shorewall.conf</ulink>, such <ulink url="manpages/shorewall.conf.html">shorewall.conf</ulink>, such
packets may also be logged out of the fw2all chain or the all2all packets may also be logged out of the fw2all chain or the all2all
chain.</para> chain.</para>
</listitem> </listitem>
@ -1733,7 +1733,7 @@ iptables: Invalid argument
<para><emphasis role="bold">Answer:</emphasis> This usually happens when <para><emphasis role="bold">Answer:</emphasis> This usually happens when
the firewall uses LDAP Authentication. The solution is to list your LDAP the firewall uses LDAP Authentication. The solution is to list your LDAP
server(s) as <emphasis role="bold">critical</emphasis> in <ulink server(s) as <emphasis role="bold">critical</emphasis> in <ulink
url="Documentation.htm#Routestopped">/etc/shorewall/routestopped</ulink>.</para> url="manpages/shorewall-routestopped.html">/etc/shorewall/routestopped</ulink>.</para>
</section> </section>
</section> </section>
@ -1930,7 +1930,7 @@ iptables: Invalid argument
modem in/out but still block all other rfc1918 addresses?</para> modem in/out but still block all other rfc1918 addresses?</para>
<para><emphasis role="bold">Answer:</emphasis> Add the following to <para><emphasis role="bold">Answer:</emphasis> Add the following to
<ulink url="Documentation.htm#rfc1918">/etc/shorewall/rfc1918</ulink> <ulink url="manpages/shorewall-rfc1918.html">/etc/shorewall/rfc1918</ulink>
(Note: If you are running Shorewall 2.0.0 or later, you may need to (Note: If you are running Shorewall 2.0.0 or later, you may need to
first copy <filename>/usr/share/shorewall/rfc1918</filename> to first copy <filename>/usr/share/shorewall/rfc1918</filename> to
<filename>/etc/shorewall/rfc1918</filename>):</para> <filename>/etc/shorewall/rfc1918</filename>):</para>

View File

@ -146,7 +146,7 @@
<listitem> <listitem>
<para>The<filename> </filename><ulink <para>The<filename> </filename><ulink
url="Documentation.htm#Zones"><filename>/etc/shorewall/zones</filename></ulink> url="manpages/shorewall-zones.html"><filename>/etc/shorewall/zones</filename></ulink>
file allows you to associate zones with traffic that will be encrypted file allows you to associate zones with traffic that will be encrypted
or that has been decrypted.</para> or that has been decrypted.</para>
</listitem> </listitem>

View File

@ -403,7 +403,7 @@ ipsec net 0.0.0.0/0</programlisting>
zones and add and delete remote endpoints dynamically using zones and add and delete remote endpoints dynamically using
/sbin/shorewall. With Shorewall 2.0.2 Beta 1 and later versions, this /sbin/shorewall. With Shorewall 2.0.2 Beta 1 and later versions, this
capability must be enabled by setting DYNAMIC_ZONES=Yes in <ulink capability must be enabled by setting DYNAMIC_ZONES=Yes in <ulink
url="Documentation.htm#Conf">shorewall.conf</ulink>.</para> url="manpages/shorewall.conf.html">shorewall.conf</ulink>.</para>
<para>In /etc/shorewall/zones:</para> <para>In /etc/shorewall/zones:</para>

View File

@ -128,9 +128,9 @@ loc Your Local Network
dmz Demilitarized Zone</programlisting> dmz Demilitarized Zone</programlisting>
<para>Zones are declared and given a type in the <ulink <para>Zones are declared and given a type in the <ulink
url="Documentation.htm#Zones"><filename url="manpages/shorewall-zones.html"><filename
class="directory">/etc/shorewall/</filename><filename>zones</filename></ulink> class="directory">/etc/shorewall/</filename><filename>zones</filename></ulink>
file.Here is the <ulink url="Documentation.htm#Zones"><filename file.Here is the <ulink url="manpages/shorewall-zones.html"><filename
class="directory">/etc/shorewall/</filename><filename>zones</filename></ulink> class="directory">/etc/shorewall/</filename><filename>zones</filename></ulink>
file from the three-interface sample:</para> file from the three-interface sample:</para>
@ -169,7 +169,7 @@ dmz eth2 detect</programlisting>
file to define a zone, all addresses are included; when you want to define file to define a zone, all addresses are included; when you want to define
a zone that contains a limited subset of the IPv4 address space, you use a zone that contains a limited subset of the IPv4 address space, you use
the <ulink the <ulink
url="Documentation.htm#Hosts"><filename>/etc/shorewall/hosts</filename></ulink> url="manpages/shorewall-hosts.html"><filename>/etc/shorewall/hosts</filename></ulink>
file.</para> file.</para>
<para>Rules about what traffic to allow and what traffic to deny are <para>Rules about what traffic to allow and what traffic to deny are

View File

@ -86,7 +86,7 @@
<listitem> <listitem>
<para>The <emphasis role="bold">maclist</emphasis> option in <ulink <para>The <emphasis role="bold">maclist</emphasis> option in <ulink
url="Documentation.htm#Hosts">/etc/shorewall/hosts</ulink>. When this url="manpages/shorewall-hosts.html">/etc/shorewall/hosts</ulink>. When this
option is specified for a subnet, all new connection requests from option is specified for a subnet, all new connection requests from
that subnet are subject to MAC verification.</para> that subnet are subject to MAC verification.</para>
</listitem> </listitem>
@ -100,7 +100,7 @@
<listitem> <listitem>
<para>The <emphasis role="bold">MACLIST_DISPOSITION</emphasis> and <para>The <emphasis role="bold">MACLIST_DISPOSITION</emphasis> and
<emphasis role="bold">MACLIST_LOG_LEVEL</emphasis> variables in <ulink <emphasis role="bold">MACLIST_LOG_LEVEL</emphasis> variables in <ulink
url="Documentation.htm#Conf">/etc/shorewall/shorewall.conf</ulink>. url="manpages/shorewall.conf.html">/etc/shorewall/shorewall.conf</ulink>.
The MACLIST_DISPOSITION variable has the value DROP, REJECT or ACCEPT The MACLIST_DISPOSITION variable has the value DROP, REJECT or ACCEPT
and determines the disposition of connection requests that fail MAC and determines the disposition of connection requests that fail MAC
verification. The MACLIST_LOG_LEVEL variable gives the syslogd level verification. The MACLIST_LOG_LEVEL variable gives the syslogd level

View File

@ -102,7 +102,7 @@ PARAM - - tcp 135,139,445
<para>User-defined Macros. These macros are created by end-users. They <para>User-defined Macros. These macros are created by end-users. They
are defined in macros.* files in /etc/shorewall or in another are defined in macros.* files in /etc/shorewall or in another
directory listed in your CONFIG_PATH (defined in <ulink directory listed in your CONFIG_PATH (defined in <ulink
url="Documentation.htm#Conf">/etc/shorewall/shorewall.conf</ulink>).</para> url="manpages/shorewall.conf.html">/etc/shorewall/shorewall.conf</ulink>).</para>
</listitem> </listitem>
</orderedlist> </orderedlist>

View File

@ -222,7 +222,7 @@
role="bold"><emphasis>zone1</emphasis>2<emphasis>zone2</emphasis></emphasis></emphasis> role="bold"><emphasis>zone1</emphasis>2<emphasis>zone2</emphasis></emphasis></emphasis>
chain where <emphasis>zone1</emphasis> is the source zone and chain where <emphasis>zone1</emphasis> is the source zone and
<emphasis>zone2</emphasis> is the destination zone. Note that in the <emphasis>zone2</emphasis> is the destination zone. Note that in the
presence of <ulink url="Documentation.htm#Nested">nested or presence of <ulink url="manpages/shorewall-nested.html">nested or
overlapping zones</ulink> and CONTINUE policies, a packet may go overlapping zones</ulink> and CONTINUE policies, a packet may go
through more than one of these chains.</para> through more than one of these chains.</para>
</listitem> </listitem>

View File

@ -196,7 +196,7 @@
<para>If you want to be able to give access to all of your local systems <para>If you want to be able to give access to all of your local systems
to the remote network, you should consider running a VPN client on your to the remote network, you should consider running a VPN client on your
firewall. As starting points, see <ulink firewall. As starting points, see <ulink
url="Documentation.htm#Tunnels">http://www.shorewall.net/Documentation.htm#Tunnels</ulink> url="manpages/shorewall-tunnels.html">http://www.shorewall.net/Documentation.htm#Tunnels</ulink>
or <ulink url="PPTP.htm">http://www.shorewall.net/PPTP.htm</ulink>.</para> or <ulink url="PPTP.htm">http://www.shorewall.net/PPTP.htm</ulink>.</para>
</section> </section>
</article> </article>

View File

@ -79,17 +79,17 @@
<itemizedlist> <itemizedlist>
<listitem> <listitem>
<para>Пакеты с хостов из чёрного списка будут отбрасываться без уведомления (drop) или с уведомлением (reject), согласно параметру BLACKLIST_DISPOSITION из файла <ulink <para>Пакеты с хостов из чёрного списка будут отбрасываться без уведомления (drop) или с уведомлением (reject), согласно параметру BLACKLIST_DISPOSITION из файла <ulink
url="Documentation.htm#Config"><filename>/etc/shorewall/shorewall.conf</filename>.</ulink></para> url="manpages/shorewall.conf.htmlig"><filename>/etc/shorewall/shorewall.conf</filename>.</ulink></para>
</listitem> </listitem>
<listitem> <listitem>
<para>Пакеты с хостов из чёрного списка будут заноситься в протокол с заданным уровнем syslog согласно параметру BLACKLIST_LOGLEVEL из файла <ulink <para>Пакеты с хостов из чёрного списка будут заноситься в протокол с заданным уровнем syslog согласно параметру BLACKLIST_LOGLEVEL из файла <ulink
url="Documentation.htm#Config"><filename>/etc/shorewall/shorewall.conf</filename></ulink>.</para> url="manpages/shorewall.conf.htmlig"><filename>/etc/shorewall/shorewall.conf</filename></ulink>.</para>
</listitem> </listitem>
<listitem> <listitem>
<para>IP-адреса или подсети, которые требуется занести в чёрный список, указываются в файле <ulink <para>IP-адреса или подсети, которые требуется занести в чёрный список, указываются в файле <ulink
url="Documentation.htm#Blacklist"><filename>/etc/shorewall/blacklist</filename></ulink>. url="manpages/shorewall-blacklist.html"><filename>/etc/shorewall/blacklist</filename></ulink>.
В этом файле можно также указать имена протоколов, номеров портов или имён служб. В этом файле можно также указать имена протоколов, номеров портов или имён служб.
</para> </para>
</listitem> </listitem>

View File

@ -174,7 +174,7 @@
<listitem> <listitem>
<para>Rate Limit (if passed as "" then $LOGLIMIT is assumed — see <para>Rate Limit (if passed as "" then $LOGLIMIT is assumed — see
the LOGLIMIT option in <ulink the LOGLIMIT option in <ulink
url="Documentation.htm#Conf">/etc/shorewall/shorewall.conf</ulink>)</para> url="manpages/shorewall.conf.html">/etc/shorewall/shorewall.conf</ulink>)</para>
</listitem> </listitem>
<listitem> <listitem>

View File

@ -63,7 +63,7 @@
<listitem> <listitem>
<para>Allows you to partition the network into <ulink <para>Allows you to partition the network into <ulink
url="Documentation.htm#Zones">zones</ulink> and gives you complete url="manpages/shorewall-zones.html">zones</ulink> and gives you complete
control over the connections permitted between each pair of control over the connections permitted between each pair of
zones.</para> zones.</para>
</listitem> </listitem>
@ -105,7 +105,7 @@
<itemizedlist> <itemizedlist>
<listitem> <listitem>
<para><ulink <para><ulink
url="Documentation.htm#Masq">Masquerading/SNAT</ulink>.</para> url="manpages/shorewall-masq.html">Masquerading/SNAT</ulink>.</para>
</listitem> </listitem>
<listitem> <listitem>
@ -164,7 +164,7 @@
<itemizedlist> <itemizedlist>
<listitem> <listitem>
<para><ulink url="Documentation.htm#Tunnels">IPSEC, GRE, IPIP and <para><ulink url="manpages/shorewall-tunnels.html">IPSEC, GRE, IPIP and
OpenVPN Tunnels</ulink>.</para> OpenVPN Tunnels</ulink>.</para>
</listitem> </listitem>

View File

@ -67,12 +67,12 @@
<listitem> <listitem>
<para>The packet is rejected because of an option in <ulink <para>The packet is rejected because of an option in <ulink
url="Documentation.htm#Conf">/etc/shorewall/shorewall.conf</ulink> or url="manpages/shorewall.conf.html">/etc/shorewall/shorewall.conf</ulink> or
<ulink <ulink
url="manpages/shorewall-interfaces.html">/etc/shorewall/interfaces</ulink>. url="manpages/shorewall-interfaces.html">/etc/shorewall/interfaces</ulink>.
These packets can be logged by setting the appropriate logging-related These packets can be logged by setting the appropriate logging-related
option in <ulink option in <ulink
url="Documentation.htm#Conf">/etc/shorewall/shorewall.conf</ulink>.</para> url="manpages/shorewall.conf.html">/etc/shorewall/shorewall.conf</ulink>.</para>
</listitem> </listitem>
<listitem> <listitem>

View File

@ -169,7 +169,7 @@
</variablelist> </variablelist>
<para>Zones are defined in the file <filename><ulink <para>Zones are defined in the file <filename><ulink
url="Documentation.htm#Zones"><filename>/etc/shorewall/zones</filename></ulink></filename>.</para> url="manpages/shorewall-zones.html"><filename>/etc/shorewall/zones</filename></ulink></filename>.</para>
<important> <important>
<para>The <filename>/etc/shorewall/zones</filename> file included in the <para>The <filename>/etc/shorewall/zones</filename> file included in the
@ -363,7 +363,7 @@ all all REJECT info</programlisting>
class="devicefile">ppp0</filename> or <filename class="devicefile">ppp0</filename> or <filename
class="devicefile">ippp0</filename> then you will want to set CLAMPMSS=yes class="devicefile">ippp0</filename> then you will want to set CLAMPMSS=yes
in <filename><ulink in <filename><ulink
url="Documentation.htm#Config">/etc/shorewall/shorewall.conf</ulink></filename>.</para> url="manpages/shorewall.conf.htmlig">/etc/shorewall/shorewall.conf</ulink></filename>.</para>
<para>Your <emphasis>Local Interface</emphasis> will be an Ethernet <para>Your <emphasis>Local Interface</emphasis> will be an Ethernet
adapter (<filename class="devicefile">eth0</filename>, adapter (<filename class="devicefile">eth0</filename>,
@ -444,7 +444,7 @@ loc eth2 detect</programlisting>
<para><inlinegraphic fileref="images/BD21298_.gif" /></para> <para><inlinegraphic fileref="images/BD21298_.gif" /></para>
<para>You may define more complicated zones using the<filename> <ulink <para>You may define more complicated zones using the<filename> <ulink
url="Documentation.htm#Hosts">/etc/shorewall/hosts</ulink></filename> file url="manpages/shorewall-hosts.html">/etc/shorewall/hosts</ulink></filename> file
but in most cases, that isn't necessary. See <ulink but in most cases, that isn't necessary. See <ulink
url="Shorewall_and_Aliased_Interfaces.html">Shorewall_and_Aliased_Interfaces.html</ulink> url="Shorewall_and_Aliased_Interfaces.html">Shorewall_and_Aliased_Interfaces.html</ulink>
and <ulink url="Multiple_Zones.html">Multiple_Zones.html</ulink> for and <ulink url="Multiple_Zones.html">Multiple_Zones.html</ulink> for
@ -1377,7 +1377,7 @@ Destination Gateway Genmask Flags MSS Window irtt Iface
<member><inlinegraphic fileref="images/BD21298_.gif" /></member> <member><inlinegraphic fileref="images/BD21298_.gif" /></member>
<member>SNAT is configured in Shorewall using the <filename><ulink <member>SNAT is configured in Shorewall using the <filename><ulink
url="Documentation.htm#Masq">/etc/shorewall/masq</ulink></filename> url="manpages/shorewall-masq.html">/etc/shorewall/masq</ulink></filename>
file.</member> file.</member>
</simplelist> </simplelist>
@ -1803,7 +1803,7 @@ ACCEPT net $FW tcp ssh #SSH to the
<para>If you haven't already, it would be a good idea to browse through <para>If you haven't already, it would be a good idea to browse through
<ulink <ulink
url="Documentation.htm#Config"><filename>/etc/shorewall/shorewall.conf</filename></ulink> url="manpages/shorewall.conf.htmlig"><filename>/etc/shorewall/shorewall.conf</filename></ulink>
just to see if there is anything there that might be of interest. You just to see if there is anything there that might be of interest. You
might also want to look at the other configuration files that you might also want to look at the other configuration files that you
haven't touched yet just to get a feel for the other things that haven't touched yet just to get a feel for the other things that
@ -2402,7 +2402,7 @@ foobar.net. 86400 IN A 192.0.2.177
command and stopped using <quote>shorewall stop</quote>. When the firewall command and stopped using <quote>shorewall stop</quote>. When the firewall
is stopped, routing is enabled on those hosts that have an entry in is stopped, routing is enabled on those hosts that have an entry in
<filename><ulink <filename><ulink
url="Documentation.htm#Routestopped">/etc/shorewall/routestopped</ulink></filename>. url="manpages/shorewall-routestopped.html">/etc/shorewall/routestopped</ulink></filename>.
A running firewall may be restarted using the <quote>shorewall A running firewall may be restarted using the <quote>shorewall
restart</quote> command. If you want to totally remove any trace of restart</quote> command. If you want to totally remove any trace of
Shorewall from your Netfilter configuration, use <quote>shorewall Shorewall from your Netfilter configuration, use <quote>shorewall
@ -2411,7 +2411,7 @@ foobar.net. 86400 IN A 192.0.2.177
<para><inlinegraphic fileref="images/BD21298_.gif" /></para> <para><inlinegraphic fileref="images/BD21298_.gif" /></para>
<para>Edit the <filename><ulink <para>Edit the <filename><ulink
url="Documentation.htm#Routestopped">/etc/shorewall/routestopped</ulink></filename> url="manpages/shorewall-routestopped.html">/etc/shorewall/routestopped</ulink></filename>
file and configure those systems that you want to be able to access the file and configure those systems that you want to be able to access the
firewall when it is stopped.</para> firewall when it is stopped.</para>
@ -2419,7 +2419,7 @@ foobar.net. 86400 IN A 192.0.2.177
<para>If you are connected to your firewall from the internet, do not <para>If you are connected to your firewall from the internet, do not
issue a <quote>shorewall stop</quote> command unless you have added an issue a <quote>shorewall stop</quote> command unless you have added an
entry for the IP address that you are connected from to <filename><ulink entry for the IP address that you are connected from to <filename><ulink
url="Documentation.htm#Routestopped">/etc/shorewall/routestopped</ulink></filename>. url="manpages/shorewall-routestopped.html">/etc/shorewall/routestopped</ulink></filename>.
Also, I don't recommend using <quote>shorewall restart</quote>; it is Also, I don't recommend using <quote>shorewall restart</quote>; it is
better to create an <ulink better to create an <ulink
url="starting_and_stopping_shorewall.htm"><emphasis>an alternate url="starting_and_stopping_shorewall.htm"><emphasis>an alternate

View File

@ -228,7 +228,7 @@ fw firewall
net ipv4</programlisting> net ipv4</programlisting>
<para>Shorewall zones are defined in <ulink <para>Shorewall zones are defined in <ulink
url="Documentation.htm#Zones"><filename>/etc/shorewall/zones</filename></ulink>.</para> url="manpages/shorewall-zones.html"><filename>/etc/shorewall/zones</filename></ulink>.</para>
<para>Note that Shorewall recognizes the firewall system as its own zone. <para>Note that Shorewall recognizes the firewall system as its own zone.
When the <filename>/etc/shorewall/zones</filename> file is processed, the When the <filename>/etc/shorewall/zones</filename> file is processed, the
@ -528,7 +528,7 @@ SSH/ACCEPT net $FW </programlisting>
<quote><command>shorewall stop</command></quote>. When the firewall is <quote><command>shorewall stop</command></quote>. When the firewall is
stopped, routing is enabled on those hosts that have an entry in stopped, routing is enabled on those hosts that have an entry in
<filename><ulink <filename><ulink
url="Documentation.htm#Routestopped">/etc/shorewall/routestopped</ulink></filename>. url="manpages/shorewall-routestopped.html">/etc/shorewall/routestopped</ulink></filename>.
A running firewall may be restarted using the <quote><command>shorewall A running firewall may be restarted using the <quote><command>shorewall
restart</command></quote> command. If you want to totally remove any trace restart</command></quote> command. If you want to totally remove any trace
of Shorewall from your Netfilter configuration, use of Shorewall from your Netfilter configuration, use
@ -539,7 +539,7 @@ SSH/ACCEPT net $FW </programlisting>
issue a <quote><command>shorewall stop</command></quote> command unless issue a <quote><command>shorewall stop</command></quote> command unless
you have added an entry for the IP address that you are connected from you have added an entry for the IP address that you are connected from
to <ulink to <ulink
url="Documentation.htm#Routestopped"><filename>/etc/shorewall/routestopped</filename></ulink>. url="manpages/shorewall-routestopped.html"><filename>/etc/shorewall/routestopped</filename></ulink>.
Also, I don't recommend using <quote><command>shorewall Also, I don't recommend using <quote><command>shorewall
restart</command></quote>; it is better to create an <emphasis><ulink restart</command></quote>; it is better to create an <emphasis><ulink
url="configuration_file_basics.htm#Configs">alternate url="configuration_file_basics.htm#Configs">alternate

View File

@ -234,7 +234,7 @@ fw firewall
net ipv4</programlisting> net ipv4</programlisting>
<para>Зоны Shorewall описаны в файле <ulink <para>Зоны Shorewall описаны в файле <ulink
url="Documentation.htm#Zones"><filename>/etc/shorewall/zones</filename></ulink>.</para> url="manpages/shorewall-zones.html"><filename>/etc/shorewall/zones</filename></ulink>.</para>
<para>Заметьте, что Shorewall рассматривает систему файервола как свою <para>Заметьте, что Shorewall рассматривает систему файервола как свою
собственную зону. При обработке файла собственную зону. При обработке файла
@ -488,7 +488,7 @@ SSH/ACCEPT net $FW </programlisting>
<quote><command>shorewall stop</command></quote>. Когда файервол <quote><command>shorewall stop</command></quote>. Когда файервол
остановливается, маршрутизация разрешается на те хосты, которые указаны в остановливается, маршрутизация разрешается на те хосты, которые указаны в
<filename><ulink <filename><ulink
url="Documentation.htm#Routestopped">/etc/shorewall/routestopped</ulink></filename>. url="manpages/shorewall-routestopped.html">/etc/shorewall/routestopped</ulink></filename>.
Запущенный файервол может быть перезапущен при помощи команды Запущенный файервол может быть перезапущен при помощи команды
<quote><command>shorewall restart</command></quote>. Если Вы хотите <quote><command>shorewall restart</command></quote>. Если Вы хотите
полностью удалить изменения сделанные Shorewall из конфигурации Вашего полностью удалить изменения сделанные Shorewall из конфигурации Вашего
@ -500,7 +500,7 @@ SSH/ACCEPT net $FW </programlisting>
используйте команду <quote><command>shorewall stop</command></quote> используйте команду <quote><command>shorewall stop</command></quote>
если Вы не добавили запись для <acronym>IP</acronym>-адреса, с которого если Вы не добавили запись для <acronym>IP</acronym>-адреса, с которого
Вы подсоединены, в <ulink Вы подсоединены, в <ulink
url="Documentation.htm#Routestopped"><filename>/etc/shorewall/routestopped</filename></ulink>. url="manpages/shorewall-routestopped.html"><filename>/etc/shorewall/routestopped</filename></ulink>.
Также, я не рекоммендую использовать <quote><command>shorewall Также, я не рекоммендую использовать <quote><command>shorewall
restart</command></quote>; лучше создать <emphasis><ulink restart</command></quote>; лучше создать <emphasis><ulink
url="configuration_file_basics.htm#Configs">альтернативную url="configuration_file_basics.htm#Configs">альтернативную

View File

@ -151,9 +151,9 @@
all netfilter rules and open your firewall for all traffic to pass. all netfilter rules and open your firewall for all traffic to pass.
It rather places your firewall in a safe state defined by the It rather places your firewall in a safe state defined by the
contents of your <ulink contents of your <ulink
url="Documentation.htm#Routestopped">/etc/shorewall/routestopped</ulink> url="manpages/shorewall-routestopped.html">/etc/shorewall/routestopped</ulink>
file and the setting of ADMINISABSENTMINDED in <ulink file and the setting of ADMINISABSENTMINDED in <ulink
url="Documentation.htm#Conf">/etc/shorewall/shorewall.conf</ulink>.</para> url="manpages/shorewall.conf.html">/etc/shorewall/shorewall.conf</ulink>.</para>
</important> </important>
</listitem> </listitem>
@ -244,7 +244,7 @@
<para>That command creates the default restore script, <para>That command creates the default restore script,
<filename>/var/lib/shorewall/restore</filename>. The default may be <filename>/var/lib/shorewall/restore</filename>. The default may be
changed using the RESTOREFILE option in <ulink changed using the RESTOREFILE option in <ulink
url="Documentation.htm#Conf">/etc/shorewall/shorewall.conf</ulink>. A url="manpages/shorewall.conf.html">/etc/shorewall/shorewall.conf</ulink>. A
different file name may also be specified in the <command>save</command> different file name may also be specified in the <command>save</command>
command:</para> command:</para>
@ -464,7 +464,7 @@
<listitem> <listitem>
<para>Reduces the verbosity level (see VERBOSITY setting in <ulink <para>Reduces the verbosity level (see VERBOSITY setting in <ulink
url="Documentation.htm#Config">shorewall.conf</ulink>). May be url="manpages/shorewall.conf.htmlig">shorewall.conf</ulink>). May be
repeated (e.g., "-qq") with each instance reducing the verbosity repeated (e.g., "-qq") with each instance reducing the verbosity
level by one.</para> level by one.</para>
</listitem> </listitem>
@ -475,7 +475,7 @@
<listitem> <listitem>
<para>Increases the verbosity level (see VERBOSITY setting in <para>Increases the verbosity level (see VERBOSITY setting in
<ulink url="Documentation.htm#Config">shorewall.conf</ulink>). May <ulink url="manpages/shorewall.conf.htmlig">shorewall.conf</ulink>). May
be repeated (e.g., "-qq") with each instance increasing the be repeated (e.g., "-qq") with each instance increasing the
verbosity level by one.</para> verbosity level by one.</para>
</listitem> </listitem>

View File

@ -1031,7 +1031,7 @@ ACCEPT net $FW tcp 80 </programlisting><it
start</command> command and stopped using <command>shorewall start</command> command and stopped using <command>shorewall
stop</command>. When the firewall is stopped, routing is enabled on those stop</command>. When the firewall is stopped, routing is enabled on those
hosts that have an entry in <ulink hosts that have an entry in <ulink
url="Documentation.htm#Routestopped"><filename>/etc/shorewall/routestopped</filename></ulink>. url="manpages/shorewall-routestopped.html"><filename>/etc/shorewall/routestopped</filename></ulink>.
A running firewall may be restarted using the <command>shorewall A running firewall may be restarted using the <command>shorewall
restart</command> command. If you want to totally remove any trace of restart</command> command. If you want to totally remove any trace of
Shorewall from your Netfilter configuration, use <command>shorewall Shorewall from your Netfilter configuration, use <command>shorewall
@ -1049,7 +1049,7 @@ ACCEPT net $FW tcp 80 </programlisting><it
issue a <command>shorewall stop</command> command unless you have issue a <command>shorewall stop</command> command unless you have
added an entry for the IP address that you are connected from to added an entry for the IP address that you are connected from to
<ulink <ulink
url="Documentation.htm#Routestopped"><filename>/etc/shorewall/routestopped</filename></ulink>. url="manpages/shorewall-routestopped.html"><filename>/etc/shorewall/routestopped</filename></ulink>.
Also, I don't recommend using <command>shorewall restart</command>; it Also, I don't recommend using <command>shorewall restart</command>; it
is better to create an <ulink is better to create an <ulink
url="configuration_file_basics.htm#Levels">alternate url="configuration_file_basics.htm#Levels">alternate

View File

@ -254,7 +254,7 @@ loc ipv4
dmz ipv4</programlisting> dmz ipv4</programlisting>
<para>Зоны Shorewall описаны в файле <ulink <para>Зоны Shorewall описаны в файле <ulink
url="Documentation.htm#Zones"><filename>/etc/shorewall/zones</filename></ulink>.</para> url="manpages/shorewall-zones.html"><filename>/etc/shorewall/zones</filename></ulink>.</para>
<para>Заметьте, что Shorewall рассматривает систему файервола как свою <para>Заметьте, что Shorewall рассматривает систему файервола как свою
собственную зону. При обработке файла собственную зону. При обработке файла
@ -1035,7 +1035,7 @@ ACCEPT net $FW tcp 80 </programlisting><it
помощи <quote><command>shorewall stop</command></quote>. Когда файервол помощи <quote><command>shorewall stop</command></quote>. Когда файервол
остановливается, маршрутизация разрешается на те хосты, которые указаны в остановливается, маршрутизация разрешается на те хосты, которые указаны в
<filename><ulink <filename><ulink
url="Documentation.htm#Routestopped">/etc/shorewall/routestopped</ulink></filename>. url="manpages/shorewall-routestopped.html">/etc/shorewall/routestopped</ulink></filename>.
Запущенный файервол может быть перезапущен при помощи команды Запущенный файервол может быть перезапущен при помощи команды
<quote><command>shorewall restart</command></quote>. Если Вы хотите <quote><command>shorewall restart</command></quote>. Если Вы хотите
полностью удалить изменения сделанные Shorewall из конфигурации Вашего полностью удалить изменения сделанные Shorewall из конфигурации Вашего
@ -1055,7 +1055,7 @@ ACCEPT net $FW tcp 80 </programlisting><it
используйте команду <quote><command>shorewall stop</command></quote> используйте команду <quote><command>shorewall stop</command></quote>
если Вы не добавили запись для <acronym>IP</acronym>-адреса, с если Вы не добавили запись для <acronym>IP</acronym>-адреса, с
которого Вы подсоединены, в <ulink которого Вы подсоединены, в <ulink
url="Documentation.htm#Routestopped"><filename>/etc/shorewall/routestopped</filename></ulink>. url="manpages/shorewall-routestopped.html"><filename>/etc/shorewall/routestopped</filename></ulink>.
Также, я не рекоммендую использовать <quote><command>shorewall Также, я не рекоммендую использовать <quote><command>shorewall
restart</command></quote>; лучше создать <emphasis><ulink restart</command></quote>; лучше создать <emphasis><ulink
url="configuration_file_basics.htm#Configs">альтернативную url="configuration_file_basics.htm#Configs">альтернативную

View File

@ -232,7 +232,7 @@ gateway:~/test # </programlisting>A look at /var/lib/shorewall/restore at line
is to run a DHCP server; running it on your firewall is fine — be sure to is to run a DHCP server; running it on your firewall is fine — be sure to
set the <emphasis role="bold">dhcp</emphasis> option on your internal set the <emphasis role="bold">dhcp</emphasis> option on your internal
interface in <ulink interface in <ulink
url="Documentation.htm#INterfaces">/etc/shorewall/interfaces</ulink>.</para> url="manpages/shorewall-interfaces.html">/etc/shorewall/interfaces</ulink>.</para>
</section> </section>
<section id="Connections"> <section id="Connections">
@ -457,7 +457,7 @@ Ping/DROP net all</programlisting>
<para>your zone definitions are screwed up and the host that is <para>your zone definitions are screwed up and the host that is
sending the packets or the destination host isn't in any zone sending the packets or the destination host isn't in any zone
(using an <ulink (using an <ulink
url="Documentation.htm#Hosts"><filename>/etc/shorewall/hosts</filename></ulink> url="manpages/shorewall-hosts.html"><filename>/etc/shorewall/hosts</filename></ulink>
file are you?); or</para> file are you?); or</para>
</listitem> </listitem>

View File

@ -235,7 +235,7 @@
fw firewall fw firewall
net ipv4 net ipv4
loc ipv4</programlisting>Zones are defined in the <ulink loc ipv4</programlisting>Zones are defined in the <ulink
url="Documentation.htm#Zones"><filename url="manpages/shorewall-zones.html"><filename
class="directory">/etc/shorewall/</filename><filename>zones</filename></ulink> class="directory">/etc/shorewall/</filename><filename>zones</filename></ulink>
file.</para> file.</para>
@ -929,7 +929,7 @@ ACCEPT loc $FW tcp 80 #Allow Weblet to work</progra
<quote><command>shorewall stop</command></quote>. When the firewall is <quote><command>shorewall stop</command></quote>. When the firewall is
stopped, routing is enabled on those hosts that have an entry in <filename stopped, routing is enabled on those hosts that have an entry in <filename
class="directory">/etc/shorewall/</filename><filename><ulink class="directory">/etc/shorewall/</filename><filename><ulink
url="Documentation.htm#Routestopped">routestopped</ulink></filename>. A url="manpages/shorewall-routestopped.html">routestopped</ulink></filename>. A
running firewall may be restarted using the <quote><command>shorewall running firewall may be restarted using the <quote><command>shorewall
restart</command></quote> command. If you want to totally remove any trace restart</command></quote> command. If you want to totally remove any trace
of Shorewall from your Netfilter configuration, use of Shorewall from your Netfilter configuration, use

View File

@ -241,7 +241,7 @@ net ipv4
loc ipv4</programlisting> loc ipv4</programlisting>
<para>Зоны Shorewall описаны в файле <ulink <para>Зоны Shorewall описаны в файле <ulink
url="Documentation.htm#Zones"><filename>/etc/shorewall/zones</filename></ulink>.</para> url="manpages/shorewall-zones.html"><filename>/etc/shorewall/zones</filename></ulink>.</para>
<para>Заметьте, что Shorewall рассматривает систему файервола как свою <para>Заметьте, что Shorewall рассматривает систему файервола как свою
собственную зону. При обработке файла собственную зону. При обработке файла
@ -940,7 +940,7 @@ ACCEPT loc $FW tcp 80 #Allow Weblet to work</progra
помощи <quote><command>shorewall stop</command></quote>. Когда файервол помощи <quote><command>shorewall stop</command></quote>. Когда файервол
остановливается, маршрутизация разрешается на те хосты, которые указаны в остановливается, маршрутизация разрешается на те хосты, которые указаны в
<filename><ulink <filename><ulink
url="Documentation.htm#Routestopped">/etc/shorewall/routestopped</ulink></filename>. url="manpages/shorewall-routestopped.html">/etc/shorewall/routestopped</ulink></filename>.
Запущенный файервол может быть перезапущен при помощи команды Запущенный файервол может быть перезапущен при помощи команды
<quote><command>shorewall restart</command></quote>. Если Вы хотите <quote><command>shorewall restart</command></quote>. Если Вы хотите
полностью удалить изменения сделанные Shorewall из конфигурации Вашего полностью удалить изменения сделанные Shorewall из конфигурации Вашего
@ -960,7 +960,7 @@ ACCEPT loc $FW tcp 80 #Allow Weblet to work</progra
используйте команду <quote><command>shorewall stop</command></quote> используйте команду <quote><command>shorewall stop</command></quote>
если Вы не добавили запись для <acronym>IP</acronym>-адреса, с если Вы не добавили запись для <acronym>IP</acronym>-адреса, с
которого Вы подсоединены, в <ulink которого Вы подсоединены, в <ulink
url="Documentation.htm#Routestopped"><filename>/etc/shorewall/routestopped</filename></ulink>. url="manpages/shorewall-routestopped.html"><filename>/etc/shorewall/routestopped</filename></ulink>.
Также, я не рекоммендую использовать <quote><command>shorewall Также, я не рекоммендую использовать <quote><command>shorewall
restart</command></quote>; лучше создать <emphasis><ulink restart</command></quote>; лучше создать <emphasis><ulink
url="configuration_file_basics.htm#Configs">альтернативную url="configuration_file_basics.htm#Configs">альтернативную

View File

@ -596,7 +596,7 @@ all all REJECT:MyReject info</programlisting>
<para>The shorewall.conf file included in this release sets <para>The shorewall.conf file included in this release sets
IPSECFILE=zones so that new users are expected to use the <ulink IPSECFILE=zones so that new users are expected to use the <ulink
url="Documentation.htm#Zones">new zone file format</ulink>.</para> url="manpages/shorewall-zones.html">new zone file format</ulink>.</para>
</listitem> </listitem>
<listitem> <listitem>