mirror of
https://gitlab.com/shorewall/code.git
synced 2024-11-27 18:13:13 +01:00
f2b2e84808
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@255 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
87 lines
2.7 KiB
Plaintext
Executable File
87 lines
2.7 KiB
Plaintext
Executable File
#
|
|
# Shorewall 1.3 - Masquerade file
|
|
#
|
|
# /etc/shorewall/masq
|
|
#
|
|
# Use this file to define dynamic NAT (Masquerading) and to define Source NAT
|
|
# (SNAT).
|
|
#
|
|
# Columns are:
|
|
#
|
|
# INTERFACE -- Outgoing interface. This is usually your internet
|
|
# interface. This may be qualified by adding the character
|
|
# ":" followed by a destination host or subnet.
|
|
#
|
|
#
|
|
# SUBNET -- Subnet that you wish to masquerade. You can specify this as
|
|
# a subnet or as an interface. If you give the name of an
|
|
# interface, you must have iproute installed and the interface
|
|
# must be up before you start the firewall.
|
|
#
|
|
# In order to exclude a subset of the specified SUBNET, you
|
|
# may append "!" and a comma-separated list of IP addresses
|
|
# and/or subnets that you wish to exclude.
|
|
#
|
|
# Example: eth1!192.168.1.4,192.168.32.0/27
|
|
#
|
|
# In that example traffic from eth1 would be masqueraded unless
|
|
# it came from 192.168.1.4 or 196.168.32.0/27
|
|
#
|
|
# ADDRESS -- (Optional). If you specify an address here, SNAT will be
|
|
# used and this will be the source address. If
|
|
# ADD_SNAT_ALIASES is set to Yes or yes in
|
|
# /etc/shorewall/shorewall.conf then Shorewall
|
|
# will automatically add this address to the
|
|
# INTERFACE named in the first column.
|
|
#
|
|
# WARNING: Do NOT specify ADD_SNAT_ALIASES=Yes if
|
|
# the address given in this column is the primary
|
|
# IP address for the interface in the INTERFACE
|
|
# column.
|
|
#
|
|
# This column may not contain a DNS Name.
|
|
#
|
|
# Example 1:
|
|
#
|
|
# You have a simple masquerading setup where eth0 connects to
|
|
# a DSL or cable modem and eth1 connects to your local network
|
|
# with subnet 192.168.0.0/24.
|
|
#
|
|
# Your entry in the file can be either:
|
|
#
|
|
# eth0 eth1
|
|
#
|
|
# or
|
|
#
|
|
# eth0 192.168.0.0/24
|
|
#
|
|
# Example 2:
|
|
#
|
|
# You add a router to your local network to connect subnet
|
|
# 192.168.1.0/24 which you also want to masquerade. You then
|
|
# add a second entry for eth0 to this file:
|
|
#
|
|
# eth0 192.168.1.0/24
|
|
#
|
|
# Example 3:
|
|
#
|
|
# You have an IPSEC tunnel through ipsec0 and you want to
|
|
# masquerade packets coming from 192.168.1.0/24 but only if
|
|
# these packets are destined for hosts in 10.1.1.0/24:
|
|
#
|
|
# ipsec0:10.1.1.0/24 196.168.1.0/24
|
|
#
|
|
# Example 4:
|
|
#
|
|
# You want all outgoing traffic from 192.168.1.0/24 through
|
|
# eth0 to use source address 206.124.146.176.
|
|
#
|
|
# eth0 192.168.1.0/24 206.124.146.176
|
|
#
|
|
# This would normally be done when you have a static external
|
|
# IP address since it makes the processing of outgoing
|
|
# packets somewhat faster.
|
|
##############################################################################
|
|
#INTERFACE SUBNET ADDRESS
|
|
#LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
|