forked from extern/shorewall_code
Merge branch 'master' of ssh://server.shorewall.net/home/teastep/shorewall/code
This commit is contained in:
commit
51d6aa9165
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-lite-vardir</refentrytitle>
|
<refentrytitle>shorewall-lite-vardir</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -54,7 +56,7 @@
|
|||||||
/opt/var/lib/shorewall-lite/.</para>
|
/opt/var/lib/shorewall-lite/.</para>
|
||||||
</blockquote>
|
</blockquote>
|
||||||
|
|
||||||
<para> When VARDIR is set in /etc/shorewall-lite/vardir, Shorewall Lite
|
<para>When VARDIR is set in /etc/shorewall-lite/vardir, Shorewall Lite
|
||||||
will save its state in the <replaceable>directory</replaceable>
|
will save its state in the <replaceable>directory</replaceable>
|
||||||
specified.</para>
|
specified.</para>
|
||||||
</note>
|
</note>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-lite.conf</refentrytitle>
|
<refentrytitle>shorewall-lite.conf</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-lite</refentrytitle>
|
<refentrytitle>shorewall-lite</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>8</manvolnum>
|
<manvolnum>8</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Administrative Commands</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-accounting</refentrytitle>
|
<refentrytitle>shorewall-accounting</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-actions</refentrytitle>
|
<refentrytitle>shorewall-actions</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -24,8 +26,8 @@
|
|||||||
<title>Description</title>
|
<title>Description</title>
|
||||||
|
|
||||||
<para>This file allows you to define new ACTIONS for use in rules (see
|
<para>This file allows you to define new ACTIONS for use in rules (see
|
||||||
<ulink url="/manpages/shorewall-rules.html">shorewall-rules(5)</ulink>). You define
|
<ulink url="/manpages/shorewall-rules.html">shorewall-rules(5)</ulink>).
|
||||||
the iptables rules to be performed in an ACTION in
|
You define the iptables rules to be performed in an ACTION in
|
||||||
/etc/shorewall/action.<emphasis>action-name</emphasis>.</para>
|
/etc/shorewall/action.<emphasis>action-name</emphasis>.</para>
|
||||||
|
|
||||||
<para>Columns are:</para>
|
<para>Columns are:</para>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-arprules</refentrytitle>
|
<refentrytitle>shorewall-arprules</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-blacklist</refentrytitle>
|
<refentrytitle>shorewall-blacklist</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -44,8 +46,8 @@
|
|||||||
(if your kernel and iptables contain iprange match support) or ipset
|
(if your kernel and iptables contain iprange match support) or ipset
|
||||||
name prefaced by "+" (if your kernel supports ipset match).
|
name prefaced by "+" (if your kernel supports ipset match).
|
||||||
Exclusion (<ulink
|
Exclusion (<ulink
|
||||||
url="/manpages/shorewall-exclusion.html">shorewall-exclusion</ulink>(5)) is
|
url="/manpages/shorewall-exclusion.html">shorewall-exclusion</ulink>(5))
|
||||||
supported.</para>
|
is supported.</para>
|
||||||
|
|
||||||
<para>MAC addresses must be prefixed with "~" and use "-" as a
|
<para>MAC addresses must be prefixed with "~" and use "-" as a
|
||||||
separator.</para>
|
separator.</para>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-blrules</refentrytitle>
|
<refentrytitle>shorewall-blrules</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -33,8 +35,9 @@
|
|||||||
connections in the NEW and INVALID states.</para>
|
connections in the NEW and INVALID states.</para>
|
||||||
|
|
||||||
<para>The format of rules in this file is the same as the format of rules
|
<para>The format of rules in this file is the same as the format of rules
|
||||||
in <ulink url="/manpages/shorewall-rules.html">shorewall-rules (5)</ulink>. The
|
in <ulink url="/manpages/shorewall-rules.html">shorewall-rules
|
||||||
difference in the two files lies in the ACTION (first) column.</para>
|
(5)</ulink>. The difference in the two files lies in the ACTION (first)
|
||||||
|
column.</para>
|
||||||
|
|
||||||
<variablelist>
|
<variablelist>
|
||||||
<varlistentry>
|
<varlistentry>
|
||||||
@ -69,8 +72,8 @@
|
|||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>If BLACKLIST_LOGLEVEL is specified in <ulink
|
<para>If BLACKLIST_LOGLEVEL is specified in <ulink
|
||||||
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5), then
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5),
|
||||||
the macro expands to <emphasis
|
then the macro expands to <emphasis
|
||||||
role="bold">blacklog</emphasis>.</para>
|
role="bold">blacklog</emphasis>.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
@ -88,10 +91,11 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>May only be used if BLACKLIST_LOGLEVEL is specified in
|
<para>May only be used if BLACKLIST_LOGLEVEL is specified in
|
||||||
<ulink url="/manpages/shorewall.conf.html">shorewall.conf </ulink>(5).
|
<ulink url="/manpages/shorewall.conf.html">shorewall.conf
|
||||||
Logs, audits (if specified) and applies the
|
</ulink>(5). Logs, audits (if specified) and applies the
|
||||||
BLACKLIST_DISPOSITION specified in <ulink
|
BLACKLIST_DISPOSITION specified in <ulink
|
||||||
url="/manpages/shorewall.conf.html">shorewall.conf</ulink> (5).</para>
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>
|
||||||
|
(5).</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -205,8 +209,8 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>The name of an <emphasis>action</emphasis> declared in
|
<para>The name of an <emphasis>action</emphasis> declared in
|
||||||
<ulink
|
<ulink
|
||||||
url="/manpages/shorewall-actions.html">shorewall-actions</ulink>(5) or
|
url="/manpages/shorewall-actions.html">shorewall-actions</ulink>(5)
|
||||||
in /usr/share/shorewall/actions.std.</para>
|
or in /usr/share/shorewall/actions.std.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -237,8 +241,8 @@
|
|||||||
|
|
||||||
<para>If the <emphasis role="bold">ACTION</emphasis> names an
|
<para>If the <emphasis role="bold">ACTION</emphasis> names an
|
||||||
<emphasis>action</emphasis> declared in <ulink
|
<emphasis>action</emphasis> declared in <ulink
|
||||||
url="/manpages/shorewall-actions.html">shorewall-actions</ulink>(5) or in
|
url="/manpages/shorewall-actions.html">shorewall-actions</ulink>(5)
|
||||||
/usr/share/shorewall/actions.std then:</para>
|
or in /usr/share/shorewall/actions.std then:</para>
|
||||||
|
|
||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-conntrack</refentrytitle>
|
<refentrytitle>shorewall6-conntrack</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -365,7 +367,8 @@
|
|||||||
<para>Where <replaceable>interface</replaceable> is an interface to
|
<para>Where <replaceable>interface</replaceable> is an interface to
|
||||||
that zone, and <replaceable>address-list</replaceable> is a
|
that zone, and <replaceable>address-list</replaceable> is a
|
||||||
comma-separated list of addresses (may contain exclusion - see
|
comma-separated list of addresses (may contain exclusion - see
|
||||||
<ulink url="/manpages/shorewall-exclusion.html">shorewall-exclusion</ulink>
|
<ulink
|
||||||
|
url="/manpages/shorewall-exclusion.html">shorewall-exclusion</ulink>
|
||||||
(5)).</para>
|
(5)).</para>
|
||||||
|
|
||||||
<para>COMMENT is only allowed in format 1; the remainder of the line
|
<para>COMMENT is only allowed in format 1; the remainder of the line
|
||||||
@ -381,7 +384,8 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>where <replaceable>address-list</replaceable> is a
|
<para>where <replaceable>address-list</replaceable> is a
|
||||||
comma-separated list of addresses (may contain exclusion - see
|
comma-separated list of addresses (may contain exclusion - see
|
||||||
<ulink url="/manpages/shorewall-exclusion.html">shorewall-exclusion</ulink>
|
<ulink
|
||||||
|
url="/manpages/shorewall-exclusion.html">shorewall-exclusion</ulink>
|
||||||
(5)).</para>
|
(5)).</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-ecn</refentrytitle>
|
<refentrytitle>shorewall-ecn</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -64,12 +66,13 @@
|
|||||||
<title>See ALSO</title>
|
<title>See ALSO</title>
|
||||||
|
|
||||||
<para>shorewall(8), shorewall-accounting(5), shorewall-actions(5),
|
<para>shorewall(8), shorewall-accounting(5), shorewall-actions(5),
|
||||||
shorewall-blacklist(5), shorewall-hosts(5), shorewall_interfaces(5), shorewall-ipsets(5),
|
shorewall-blacklist(5), shorewall-hosts(5), shorewall_interfaces(5),
|
||||||
shorewall-maclist(5), shorewall-masq(5), shorewall-nat(5),
|
shorewall-ipsets(5), shorewall-maclist(5), shorewall-masq(5),
|
||||||
shorewall-netmap(5), shorewall-params(5), shorewall-policy(5),
|
shorewall-nat(5), shorewall-netmap(5), shorewall-params(5),
|
||||||
shorewall-providers(5), shorewall-proxyarp(5), shorewall-rtrules(5),
|
shorewall-policy(5), shorewall-providers(5), shorewall-proxyarp(5),
|
||||||
shorewall-routestopped(5), shorewall-rules(5), shorewall.conf(5), shorewall-secmarks(5),
|
shorewall-rtrules(5), shorewall-routestopped(5), shorewall-rules(5),
|
||||||
shorewall-tcclasses(5), shorewall-tcdevices(5), shorewall-mangle(5),
|
shorewall.conf(5), shorewall-secmarks(5), shorewall-tcclasses(5),
|
||||||
shorewall-tos(5), shorewall-tunnels(5), shorewall-zones(5)</para>
|
shorewall-tcdevices(5), shorewall-mangle(5), shorewall-tos(5),
|
||||||
|
shorewall-tunnels(5), shorewall-zones(5)</para>
|
||||||
</refsect1>
|
</refsect1>
|
||||||
</refentry>
|
</refentry>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-exclusion</refentrytitle>
|
<refentrytitle>shorewall-exclusion</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -88,8 +90,8 @@ ACCEPT all!z2 net tcp 22</programlisting>
|
|||||||
<para>In most contexts, ipset names can be used as an
|
<para>In most contexts, ipset names can be used as an
|
||||||
<replaceable>address-or-range</replaceable>. Beginning with Shorewall
|
<replaceable>address-or-range</replaceable>. Beginning with Shorewall
|
||||||
4.4.14, ipset lists enclosed in +[...] may also be included (see <ulink
|
4.4.14, ipset lists enclosed in +[...] may also be included (see <ulink
|
||||||
url="/manpages/shorewall-ipsets.html">shorewall-ipsets</ulink> (5)). The semantics
|
url="/manpages/shorewall-ipsets.html">shorewall-ipsets</ulink> (5)). The
|
||||||
of these lists when used in an exclusion are as follows:</para>
|
semantics of these lists when used in an exclusion are as follows:</para>
|
||||||
|
|
||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-hosts</refentrytitle>
|
<refentrytitle>shorewall-hosts</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -29,8 +31,8 @@
|
|||||||
|
|
||||||
<para>The order of entries in this file is not significant in determining
|
<para>The order of entries in this file is not significant in determining
|
||||||
zone composition. Rather, the order that the zones are declared in <ulink
|
zone composition. Rather, the order that the zones are declared in <ulink
|
||||||
url="/manpages/shorewall-zones.html">shorewall-zones</ulink>(5) determines the order
|
url="/manpages/shorewall-zones.html">shorewall-zones</ulink>(5) determines
|
||||||
in which the records in this file are interpreted.</para>
|
the order in which the records in this file are interpreted.</para>
|
||||||
|
|
||||||
<warning>
|
<warning>
|
||||||
<para>The only time that you need this file is when you have more than
|
<para>The only time that you need this file is when you have more than
|
||||||
@ -39,9 +41,9 @@
|
|||||||
|
|
||||||
<warning>
|
<warning>
|
||||||
<para>If you have an entry for a zone and interface in <ulink
|
<para>If you have an entry for a zone and interface in <ulink
|
||||||
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5) then do
|
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5)
|
||||||
not include any entries in this file for that same (zone, interface)
|
then do not include any entries in this file for that same (zone,
|
||||||
pair.</para>
|
interface) pair.</para>
|
||||||
</warning>
|
</warning>
|
||||||
|
|
||||||
<para>The columns in the file are as follows.</para>
|
<para>The columns in the file are as follows.</para>
|
||||||
@ -53,8 +55,8 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>The name of a zone declared in <ulink
|
<para>The name of a zone declared in <ulink
|
||||||
url="/manpages/shorewall-zones.html">shorewall-zones</ulink>(5). You may not
|
url="/manpages/shorewall-zones.html">shorewall-zones</ulink>(5). You
|
||||||
list the firewall zone in this column.</para>
|
may not list the firewall zone in this column.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -67,9 +69,9 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>The name of an interface defined in the <ulink
|
<para>The name of an interface defined in the <ulink
|
||||||
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5) file
|
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5)
|
||||||
followed by a colon (":") and a comma-separated list whose elements
|
file followed by a colon (":") and a comma-separated list whose
|
||||||
are either:</para>
|
elements are either:</para>
|
||||||
|
|
||||||
<orderedlist numeration="loweralpha">
|
<orderedlist numeration="loweralpha">
|
||||||
<listitem>
|
<listitem>
|
||||||
@ -169,8 +171,8 @@
|
|||||||
<para>The zone is accessed via a kernel 2.6 ipsec SA. Note
|
<para>The zone is accessed via a kernel 2.6 ipsec SA. Note
|
||||||
that if the zone named in the ZONE column is specified as an
|
that if the zone named in the ZONE column is specified as an
|
||||||
IPSEC zone in the <ulink
|
IPSEC zone in the <ulink
|
||||||
url="/manpages/shorewall-zones.html">shorewall-zones</ulink>(5) file
|
url="/manpages/shorewall-zones.html">shorewall-zones</ulink>(5)
|
||||||
then you do NOT need to specify the 'ipsec' option
|
file then you do NOT need to specify the 'ipsec' option
|
||||||
here.</para>
|
here.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -181,8 +183,8 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>Connection requests from these hosts are compared
|
<para>Connection requests from these hosts are compared
|
||||||
against the contents of <ulink
|
against the contents of <ulink
|
||||||
url="/manpages/shorewall-maclist.html">shorewall-maclist</ulink>(5). If
|
url="/manpages/shorewall-maclist.html">shorewall-maclist</ulink>(5).
|
||||||
this option is specified, the interface must be an Ethernet
|
If this option is specified, the interface must be an Ethernet
|
||||||
NIC or equivalent and must be up before Shorewall is
|
NIC or equivalent and must be up before Shorewall is
|
||||||
started.</para>
|
started.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
@ -212,8 +214,8 @@
|
|||||||
|
|
||||||
<para>Smurfs will be optionally logged based on the setting of
|
<para>Smurfs will be optionally logged based on the setting of
|
||||||
SMURF_LOG_LEVEL in <ulink
|
SMURF_LOG_LEVEL in <ulink
|
||||||
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5). After
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5).
|
||||||
logging, the packets are dropped.</para>
|
After logging, the packets are dropped.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-init</refentrytitle>
|
<refentrytitle>shorewall-init</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>8</manvolnum>
|
<manvolnum>8</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Administrative Commands</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -145,10 +147,11 @@
|
|||||||
|
|
||||||
<para>On a laptop with both Ethernet and wireless interfaces, you will
|
<para>On a laptop with both Ethernet and wireless interfaces, you will
|
||||||
want to make both interfaces optional and set the REQUIRE_INTERFACE option
|
want to make both interfaces optional and set the REQUIRE_INTERFACE option
|
||||||
to Yes in <ulink url="/manpages/shorewall.conf.html">shorewall.conf </ulink>(5) or
|
to Yes in <ulink url="/manpages/shorewall.conf.html">shorewall.conf
|
||||||
<ulink url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>
|
</ulink>(5) or <ulink
|
||||||
(5). This causes the firewall to remain stopped until at least one of the
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink> (5). This
|
||||||
interfaces comes up.</para>
|
causes the firewall to remain stopped until at least one of the interfaces
|
||||||
|
comes up.</para>
|
||||||
</refsect1>
|
</refsect1>
|
||||||
|
|
||||||
<refsect1>
|
<refsect1>
|
||||||
@ -163,12 +166,13 @@
|
|||||||
<title>See ALSO</title>
|
<title>See ALSO</title>
|
||||||
|
|
||||||
<para>shorewall(8), shorewall-accounting(5), shorewall-actions(5),
|
<para>shorewall(8), shorewall-accounting(5), shorewall-actions(5),
|
||||||
shorewall-blacklist(5), shorewall-hosts(5), shorewall_interfaces(5), shorewall-ipsets(5),
|
shorewall-blacklist(5), shorewall-hosts(5), shorewall_interfaces(5),
|
||||||
shorewall-maclist(5), shorewall-masq(5), shorewall-nat(5),
|
shorewall-ipsets(5), shorewall-maclist(5), shorewall-masq(5),
|
||||||
shorewall-netmap(5), shorewall-params(5), shorewall-policy(5),
|
shorewall-nat(5), shorewall-netmap(5), shorewall-params(5),
|
||||||
shorewall-providers(5), shorewall-proxyarp(5), shorewall-rtrules(5),
|
shorewall-policy(5), shorewall-providers(5), shorewall-proxyarp(5),
|
||||||
shorewall-routestopped(5), shorewall-rules(5), shorewall.conf(5), shorewall-secmarks(5),
|
shorewall-rtrules(5), shorewall-routestopped(5), shorewall-rules(5),
|
||||||
shorewall-tcclasses(5), shorewall-tcdevices(5), shorewall-mangle(5),
|
shorewall.conf(5), shorewall-secmarks(5), shorewall-tcclasses(5),
|
||||||
shorewall-tos(5), shorewall-tunnels(5), shorewall-zones(5)</para>
|
shorewall-tcdevices(5), shorewall-mangle(5), shorewall-tos(5),
|
||||||
|
shorewall-tunnels(5), shorewall-zones(5)</para>
|
||||||
</refsect1>
|
</refsect1>
|
||||||
</refentry>
|
</refentry>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-interfaces</refentrytitle>
|
<refentrytitle>shorewall-interfaces</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -71,7 +73,8 @@
|
|||||||
in this column.</para>
|
in this column.</para>
|
||||||
|
|
||||||
<para>If the interface serves multiple zones that will be defined in
|
<para>If the interface serves multiple zones that will be defined in
|
||||||
the <ulink url="/manpages/shorewall-hosts.html">shorewall-hosts</ulink>(5)
|
the <ulink
|
||||||
|
url="/manpages/shorewall-hosts.html">shorewall-hosts</ulink>(5)
|
||||||
file, you should place "-" in this column.</para>
|
file, you should place "-" in this column.</para>
|
||||||
|
|
||||||
<para>If there are multiple interfaces to the same zone, you must
|
<para>If there are multiple interfaces to the same zone, you must
|
||||||
@ -111,8 +114,8 @@ loc eth2 -</programlisting>
|
|||||||
<para>When using Shorewall versions before 4.1.4, care must be
|
<para>When using Shorewall versions before 4.1.4, care must be
|
||||||
exercised when using wildcards where there is another zone that uses
|
exercised when using wildcards where there is another zone that uses
|
||||||
a matching specific interface. See <ulink
|
a matching specific interface. See <ulink
|
||||||
url="/manpages/shorewall-nesting.html">shorewall-nesting</ulink>(5) for a
|
url="/manpages/shorewall-nesting.html">shorewall-nesting</ulink>(5)
|
||||||
discussion of this problem.</para>
|
for a discussion of this problem.</para>
|
||||||
|
|
||||||
<para>Shorewall allows '+' as an interface name.</para>
|
<para>Shorewall allows '+' as an interface name.</para>
|
||||||
|
|
||||||
@ -433,8 +436,8 @@ loc eth2 -</programlisting>
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>Connection requests from this interface are compared
|
<para>Connection requests from this interface are compared
|
||||||
against the contents of <ulink
|
against the contents of <ulink
|
||||||
url="/manpages/shorewall-maclist.html">shorewall-maclist</ulink>(5). If
|
url="/manpages/shorewall-maclist.html">shorewall-maclist</ulink>(5).
|
||||||
this option is specified, the interface must be an Ethernet
|
If this option is specified, the interface must be an Ethernet
|
||||||
NIC and must be up before Shorewall is started.</para>
|
NIC and must be up before Shorewall is started.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -486,8 +489,8 @@ loc eth2 -</programlisting>
|
|||||||
|
|
||||||
<para>Smurfs will be optionally logged based on the setting of
|
<para>Smurfs will be optionally logged based on the setting of
|
||||||
SMURF_LOG_LEVEL in <ulink
|
SMURF_LOG_LEVEL in <ulink
|
||||||
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5). After
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5).
|
||||||
logging, the packets are dropped.</para>
|
After logging, the packets are dropped.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -631,9 +634,9 @@ loc eth2 -</programlisting>
|
|||||||
|
|
||||||
<important>
|
<important>
|
||||||
<para>If ROUTE_FILTER=Yes in <ulink
|
<para>If ROUTE_FILTER=Yes in <ulink
|
||||||
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5), or if
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5),
|
||||||
your distribution sets net.ipv4.conf.all.rp_filter=1 in
|
or if your distribution sets net.ipv4.conf.all.rp_filter=1
|
||||||
<filename>/etc/sysctl.conf</filename>, then setting
|
in <filename>/etc/sysctl.conf</filename>, then setting
|
||||||
<emphasis role="bold">routefilter</emphasis>=0 in an
|
<emphasis role="bold">routefilter</emphasis>=0 in an
|
||||||
<replaceable>interface</replaceable> entry will not disable
|
<replaceable>interface</replaceable> entry will not disable
|
||||||
route filtering on that
|
route filtering on that
|
||||||
@ -653,8 +656,8 @@ loc eth2 -</programlisting>
|
|||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>If USE_DEFAULT_RT=Yes in <ulink
|
<para>If USE_DEFAULT_RT=Yes in <ulink
|
||||||
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5) and
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5)
|
||||||
the interface is listed in <ulink
|
and the interface is listed in <ulink
|
||||||
url="/manpages/shorewall-providers.html">shorewall-providers</ulink>(5).</para>
|
url="/manpages/shorewall-providers.html">shorewall-providers</ulink>(5).</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-ipsets</refentrytitle>
|
<refentrytitle>shorewall-ipsets</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -79,7 +81,8 @@
|
|||||||
specified, matching packets must match all of the listed sets.</para>
|
specified, matching packets must match all of the listed sets.</para>
|
||||||
|
|
||||||
<para>For information about set lists and exclusion, see <ulink
|
<para>For information about set lists and exclusion, see <ulink
|
||||||
url="/manpages/shorewall-exclusion.html">shorewall-exclusion</ulink> (5).</para>
|
url="/manpages/shorewall-exclusion.html">shorewall-exclusion</ulink>
|
||||||
|
(5).</para>
|
||||||
|
|
||||||
<para>Beginning with Shorewall 4.5.16, you can increment one or more
|
<para>Beginning with Shorewall 4.5.16, you can increment one or more
|
||||||
nfacct objects each time a packet matches an ipset. You do that by listing
|
nfacct objects each time a packet matches an ipset. You do that by listing
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-maclist</refentrytitle>
|
<refentrytitle>shorewall-maclist</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -27,9 +29,9 @@
|
|||||||
associated IP addresses to be allowed to use the specified interface. The
|
associated IP addresses to be allowed to use the specified interface. The
|
||||||
feature is enabled by using the <emphasis role="bold">maclist</emphasis>
|
feature is enabled by using the <emphasis role="bold">maclist</emphasis>
|
||||||
option in the <ulink
|
option in the <ulink
|
||||||
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5) or <ulink
|
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5)
|
||||||
url="/manpages/shorewall-hosts.html">shorewall-hosts</ulink>(5) configuration
|
or <ulink url="/manpages/shorewall-hosts.html">shorewall-hosts</ulink>(5)
|
||||||
file.</para>
|
configuration file.</para>
|
||||||
|
|
||||||
<para>The columns in the file are as follows (where the column name is
|
<para>The columns in the file are as follows (where the column name is
|
||||||
followed by a different name in parentheses, the different name is used in
|
followed by a different name in parentheses, the different name is used in
|
||||||
@ -45,8 +47,8 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para><emphasis role="bold">ACCEPT</emphasis> or <emphasis
|
<para><emphasis role="bold">ACCEPT</emphasis> or <emphasis
|
||||||
role="bold">DROP</emphasis> (if MACLIST_TABLE=filter in <ulink
|
role="bold">DROP</emphasis> (if MACLIST_TABLE=filter in <ulink
|
||||||
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5), then REJECT is
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5), then
|
||||||
also allowed). If specified, the
|
REJECT is also allowed). If specified, the
|
||||||
<replaceable>log-level</replaceable> causes packets matching the
|
<replaceable>log-level</replaceable> causes packets matching the
|
||||||
rule to be logged at that level.</para>
|
rule to be logged at that level.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-mangle</refentrytitle>
|
<refentrytitle>shorewall-mangle</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -24,13 +26,15 @@
|
|||||||
<title>Description</title>
|
<title>Description</title>
|
||||||
|
|
||||||
<para>This file was introduced in Shorewall 4.6.0 and is intended to
|
<para>This file was introduced in Shorewall 4.6.0 and is intended to
|
||||||
replace <ulink url="/manpages/shorewall-mangle.html">shorewall-rules(5)</ulink>.
|
replace <ulink
|
||||||
This file is only processed by the compiler if:</para>
|
url="/manpages/shorewall-mangle.html">shorewall-rules(5)</ulink>. This
|
||||||
|
file is only processed by the compiler if:</para>
|
||||||
|
|
||||||
<orderedlist numeration="loweralpha">
|
<orderedlist numeration="loweralpha">
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>No file named 'tcrules' exists on the current CONFIG_PATH (see
|
<para>No file named 'tcrules' exists on the current CONFIG_PATH (see
|
||||||
<ulink url="/manpages/shorewall.conf.html">shorewall.conf(5)</ulink>); or</para>
|
<ulink url="/manpages/shorewall.conf.html">shorewall.conf(5)</ulink>);
|
||||||
|
or</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
@ -44,10 +48,10 @@
|
|||||||
|
|
||||||
<important>
|
<important>
|
||||||
<para>Unlike rules in the <ulink
|
<para>Unlike rules in the <ulink
|
||||||
url="/manpages/shorewall-rules.html">shorewall-rules</ulink>(5) file, evaluation
|
url="/manpages/shorewall-rules.html">shorewall-rules</ulink>(5) file,
|
||||||
of rules in this file will continue after a match. So the final mark for
|
evaluation of rules in this file will continue after a match. So the
|
||||||
each packet will be the one assigned by the LAST tcrule that
|
final mark for each packet will be the one assigned by the LAST tcrule
|
||||||
matches.</para>
|
that matches.</para>
|
||||||
|
|
||||||
<para>If you use multiple internet providers with the 'track' option, in
|
<para>If you use multiple internet providers with the 'track' option, in
|
||||||
/etc/shorewall/providers be sure to read the restrictions at <ulink
|
/etc/shorewall/providers be sure to read the restrictions at <ulink
|
||||||
@ -104,8 +108,8 @@
|
|||||||
<para>Unless otherwise specified for the particular
|
<para>Unless otherwise specified for the particular
|
||||||
<replaceable>command</replaceable>, the default chain is PREROUTING
|
<replaceable>command</replaceable>, the default chain is PREROUTING
|
||||||
when MARK_IN_FORWARD_CHAIN=No in <ulink
|
when MARK_IN_FORWARD_CHAIN=No in <ulink
|
||||||
url="/manpages/shorewall.conf.html">shorewall.conf(5)</ulink>, and FORWARD
|
url="/manpages/shorewall.conf.html">shorewall.conf(5)</ulink>, and
|
||||||
when MARK_IN_FORWARD_CHAIN=Yes.</para>
|
FORWARD when MARK_IN_FORWARD_CHAIN=Yes.</para>
|
||||||
|
|
||||||
<para>A chain-designator may not be specified if the SOURCE or DEST
|
<para>A chain-designator may not be specified if the SOURCE or DEST
|
||||||
columns begin with '$FW'. When the SOURCE is $FW, the generated rule
|
columns begin with '$FW'. When the SOURCE is $FW, the generated rule
|
||||||
@ -310,8 +314,8 @@ INLINE eth0 - ; -p tcp -j MARK --set-mark
|
|||||||
</programlisting>
|
</programlisting>
|
||||||
|
|
||||||
<para>If INLINE_MATCHES=Yes in <ulink
|
<para>If INLINE_MATCHES=Yes in <ulink
|
||||||
url="/manpages/shorewall.conf.html">shorewall6.conf(5)</ulink> then the
|
url="/manpages/shorewall.conf.html">shorewall6.conf(5)</ulink>
|
||||||
third rule above can be specified as follows:</para>
|
then the third rule above can be specified as follows:</para>
|
||||||
|
|
||||||
<programlisting>2:P eth0 - ; -p tcp</programlisting>
|
<programlisting>2:P eth0 - ; -p tcp</programlisting>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-masq</refentrytitle>
|
<refentrytitle>shorewall-masq</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -35,8 +37,8 @@
|
|||||||
<para>If you have more than one ISP link, adding entries to this file
|
<para>If you have more than one ISP link, adding entries to this file
|
||||||
will <emphasis role="bold">not</emphasis> force connections to go out
|
will <emphasis role="bold">not</emphasis> force connections to go out
|
||||||
through a particular link. You must use entries in <ulink
|
through a particular link. You must use entries in <ulink
|
||||||
url="/manpages/shorewall-rtrules.html">shorewall-rtrules</ulink>(5) or PREROUTING
|
url="/manpages/shorewall-rtrules.html">shorewall-rtrules</ulink>(5) or
|
||||||
entries in <ulink
|
PREROUTING entries in <ulink
|
||||||
url="/manpages/shorewall-mangle.html">shorewall-mangle</ulink>(5) to do
|
url="/manpages/shorewall-mangle.html">shorewall-mangle</ulink>(5) to do
|
||||||
that.</para>
|
that.</para>
|
||||||
</warning>
|
</warning>
|
||||||
@ -55,27 +57,26 @@
|
|||||||
<para>Outgoing <emphasis>interfacelist</emphasis>. This may be a
|
<para>Outgoing <emphasis>interfacelist</emphasis>. This may be a
|
||||||
comma-separated list of interface names. This is usually your
|
comma-separated list of interface names. This is usually your
|
||||||
internet interface. If ADD_SNAT_ALIASES=Yes in <ulink
|
internet interface. If ADD_SNAT_ALIASES=Yes in <ulink
|
||||||
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5), you may add ":"
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5), you
|
||||||
and a <emphasis>digit</emphasis> to indicate that you want the alias
|
may add ":" and a <emphasis>digit</emphasis> to indicate that you
|
||||||
added with that name (e.g., eth0:0). This will allow the alias to be
|
want the alias added with that name (e.g., eth0:0). This will allow
|
||||||
displayed with ifconfig. <emphasis role="bold">That is the only use
|
the alias to be displayed with ifconfig. <emphasis role="bold">That
|
||||||
for the alias name; it may not appear in any other place in your
|
is the only use for the alias name; it may not appear in any other
|
||||||
Shorewall configuration.</emphasis></para>
|
place in your Shorewall configuration.</emphasis></para>
|
||||||
|
|
||||||
<para>Each interface must match an entry in <ulink
|
<para>Each interface must match an entry in <ulink
|
||||||
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5).
|
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5).
|
||||||
Shorewall allows loose matches to wildcard entries in <ulink
|
Shorewall allows loose matches to wildcard entries in <ulink
|
||||||
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5). For
|
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5).
|
||||||
example, <filename class="devicefile">ppp0</filename> in this file
|
For example, <filename class="devicefile">ppp0</filename> in this
|
||||||
will match a <ulink
|
file will match a <ulink
|
||||||
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5)
|
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5)
|
||||||
entry that defines <filename
|
entry that defines <filename
|
||||||
class="devicefile">ppp+</filename>.</para>
|
class="devicefile">ppp+</filename>.</para>
|
||||||
|
|
||||||
<para>Where <ulink
|
<para>Where <ulink url="/4.4/MultiISP.html#Shared">more that one
|
||||||
url="/4.4/MultiISP.html#Shared">more that
|
internet provider share a single interface</ulink>, the provider is
|
||||||
one internet provider share a single interface</ulink>, the provider
|
specified by including the provider name or number in
|
||||||
is specified by including the provider name or number in
|
|
||||||
parentheses:</para>
|
parentheses:</para>
|
||||||
|
|
||||||
<programlisting> eth0(Avvanta)</programlisting>
|
<programlisting> eth0(Avvanta)</programlisting>
|
||||||
@ -88,8 +89,8 @@
|
|||||||
addresses to indicate that you only want to change the source IP
|
addresses to indicate that you only want to change the source IP
|
||||||
address for packets being sent to those particular destinations.
|
address for packets being sent to those particular destinations.
|
||||||
Exclusion is allowed (see <ulink
|
Exclusion is allowed (see <ulink
|
||||||
url="/manpages/shorewall-exclusion.html">shorewall-exclusion</ulink>(5)) as
|
url="/manpages/shorewall-exclusion.html">shorewall-exclusion</ulink>(5))
|
||||||
are ipset names preceded by a plus sign '+';</para>
|
as are ipset names preceded by a plus sign '+';</para>
|
||||||
|
|
||||||
<para>If you wish to inhibit the action of ADD_SNAT_ALIASES for this
|
<para>If you wish to inhibit the action of ADD_SNAT_ALIASES for this
|
||||||
entry then include the ":" but omit the digit:</para>
|
entry then include the ":" but omit the digit:</para>
|
||||||
@ -99,9 +100,9 @@
|
|||||||
|
|
||||||
<para>Normally Masq/SNAT rules are evaluated after those for
|
<para>Normally Masq/SNAT rules are evaluated after those for
|
||||||
one-to-one NAT (defined in <ulink
|
one-to-one NAT (defined in <ulink
|
||||||
url="/manpages/shorewall-nat.html">shorewall-nat</ulink>(5)). If you want the
|
url="/manpages/shorewall-nat.html">shorewall-nat</ulink>(5)). If you
|
||||||
rule to be applied before one-to-one NAT rules, prefix the interface
|
want the rule to be applied before one-to-one NAT rules, prefix the
|
||||||
name with "+":</para>
|
interface name with "+":</para>
|
||||||
|
|
||||||
<programlisting> +eth0
|
<programlisting> +eth0
|
||||||
+eth0:192.0.2.32/27
|
+eth0:192.0.2.32/27
|
||||||
@ -174,7 +175,8 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>If you specify an address here, SNAT will be used and this
|
<para>If you specify an address here, SNAT will be used and this
|
||||||
will be the source address. If ADD_SNAT_ALIASES is set to Yes or yes
|
will be the source address. If ADD_SNAT_ALIASES is set to Yes or yes
|
||||||
in <ulink url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5) then
|
in <ulink
|
||||||
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5) then
|
||||||
Shorewall will automatically add this address to the INTERFACE named
|
Shorewall will automatically add this address to the INTERFACE named
|
||||||
in the first column.</para>
|
in the first column.</para>
|
||||||
|
|
||||||
@ -689,8 +691,8 @@
|
|||||||
</programlisting>
|
</programlisting>
|
||||||
|
|
||||||
<para>If INLINE_MATCHES=Yes in <ulink
|
<para>If INLINE_MATCHES=Yes in <ulink
|
||||||
url="/manpages/shorewall.conf.html">shorewall.conf(5)</ulink>, then these
|
url="/manpages/shorewall.conf.html">shorewall.conf(5)</ulink>, then
|
||||||
rules may be specified as follows:</para>
|
these rules may be specified as follows:</para>
|
||||||
|
|
||||||
<programlisting>/etc/shorewall/masq:
|
<programlisting>/etc/shorewall/masq:
|
||||||
|
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-modules</refentrytitle>
|
<refentrytitle>shorewall-modules</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -86,13 +88,13 @@
|
|||||||
<title>See ALSO</title>
|
<title>See ALSO</title>
|
||||||
|
|
||||||
<para>shorewall(8), shorewall-accounting(5), shorewall-actions(5),
|
<para>shorewall(8), shorewall-accounting(5), shorewall-actions(5),
|
||||||
shorewall-blacklist(5), shorewall-hosts(5), shorewall_interfaces(5), shorewall-ipsets(5),
|
shorewall-blacklist(5), shorewall-hosts(5), shorewall_interfaces(5),
|
||||||
shorewall-maclist(5), shorewall-masq(5), shorewall-nat(5),
|
shorewall-ipsets(5), shorewall-maclist(5), shorewall-masq(5),
|
||||||
shorewall-netmap(5), shorewall-params(5), shorewall-policy(5),
|
shorewall-nat(5), shorewall-netmap(5), shorewall-params(5),
|
||||||
shorewall-providers(5), shorewall-proxyarp(5), shorewall-rtrules(5),
|
shorewall-policy(5), shorewall-providers(5), shorewall-proxyarp(5),
|
||||||
shorewall-routestopped(5), shorewall-rules(5), shorewall.conf(5),
|
shorewall-rtrules(5), shorewall-routestopped(5), shorewall-rules(5),
|
||||||
shorewall-secmarks(5), shorewall-tcclasses(5), shorewall-tcdevices(5),
|
shorewall.conf(5), shorewall-secmarks(5), shorewall-tcclasses(5),
|
||||||
shorewall-mangle(5), shorewall-tos(5), shorewall-tunnels(5),
|
shorewall-tcdevices(5), shorewall-mangle(5), shorewall-tos(5),
|
||||||
shorewall-zones(5)</para>
|
shorewall-tunnels(5), shorewall-zones(5)</para>
|
||||||
</refsect1>
|
</refsect1>
|
||||||
</refentry>
|
</refentry>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-nat</refentrytitle>
|
<refentrytitle>shorewall-nat</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -29,10 +31,10 @@
|
|||||||
<warning>
|
<warning>
|
||||||
<para>If all you want to do is simple port forwarding, do NOT use this
|
<para>If all you want to do is simple port forwarding, do NOT use this
|
||||||
file. See <ulink
|
file. See <ulink
|
||||||
url="/FAQ.htm#faq1">http://www.shorewall.net/FAQ.htm#faq1</ulink>.
|
url="/FAQ.htm#faq1">http://www.shorewall.net/FAQ.htm#faq1</ulink>. Also,
|
||||||
Also, in many cases, Proxy ARP (<ulink
|
in many cases, Proxy ARP (<ulink
|
||||||
url="/manpages/shorewall-proxyarp.html">shorewall-proxyarp</ulink>(5)) is a better
|
url="/manpages/shorewall-proxyarp.html">shorewall-proxyarp</ulink>(5))
|
||||||
solution that one-to-one NAT.</para>
|
is a better solution that one-to-one NAT.</para>
|
||||||
</warning>
|
</warning>
|
||||||
|
|
||||||
<para>The columns in the file are as follows (where the column name is
|
<para>The columns in the file are as follows (where the column name is
|
||||||
@ -72,7 +74,8 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>Interfaces that have the <emphasis
|
<para>Interfaces that have the <emphasis
|
||||||
role="bold">EXTERNAL</emphasis> address. If ADD_IP_ALIASES=Yes in
|
role="bold">EXTERNAL</emphasis> address. If ADD_IP_ALIASES=Yes in
|
||||||
<ulink url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5),
|
<ulink
|
||||||
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5),
|
||||||
Shorewall will automatically add the EXTERNAL address to this
|
Shorewall will automatically add the EXTERNAL address to this
|
||||||
interface. Also if ADD_IP_ALIASES=Yes, you may follow the interface
|
interface. Also if ADD_IP_ALIASES=Yes, you may follow the interface
|
||||||
name with ":" and a <emphasis>digit</emphasis> to indicate that you
|
name with ":" and a <emphasis>digit</emphasis> to indicate that you
|
||||||
@ -85,9 +88,9 @@
|
|||||||
<para>Each interface must match an entry in <ulink
|
<para>Each interface must match an entry in <ulink
|
||||||
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5).
|
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5).
|
||||||
Shorewall allows loose matches to wildcard entries in <ulink
|
Shorewall allows loose matches to wildcard entries in <ulink
|
||||||
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5). For
|
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5).
|
||||||
example, <filename class="devicefile">ppp0</filename> in this file
|
For example, <filename class="devicefile">ppp0</filename> in this
|
||||||
will match a <ulink
|
file will match a <ulink
|
||||||
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5)
|
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5)
|
||||||
entry that defines <filename
|
entry that defines <filename
|
||||||
class="devicefile">ppp+</filename>.</para>
|
class="devicefile">ppp+</filename>.</para>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-nesting</refentrytitle>
|
<refentrytitle>shorewall-nesting</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -24,17 +26,18 @@
|
|||||||
<refsect1>
|
<refsect1>
|
||||||
<title>Description</title>
|
<title>Description</title>
|
||||||
|
|
||||||
<para>In <ulink url="/manpages/shorewall-zones.html">shorewall-zones</ulink>(5), a
|
<para>In <ulink
|
||||||
zone may be declared to be a sub-zone of one or more other zones using the
|
url="/manpages/shorewall-zones.html">shorewall-zones</ulink>(5), a zone
|
||||||
|
may be declared to be a sub-zone of one or more other zones using the
|
||||||
above syntax. The <replaceable>child-zone</replaceable> may be neither the
|
above syntax. The <replaceable>child-zone</replaceable> may be neither the
|
||||||
firewall zone nor a vserver zone. The firewall zone may not appear as a
|
firewall zone nor a vserver zone. The firewall zone may not appear as a
|
||||||
parent zone, although all vserver zones are handled as sub-zones of the
|
parent zone, although all vserver zones are handled as sub-zones of the
|
||||||
firewall zone.</para>
|
firewall zone.</para>
|
||||||
|
|
||||||
<para>Where zones are nested, the CONTINUE policy in <ulink
|
<para>Where zones are nested, the CONTINUE policy in <ulink
|
||||||
url="/manpages/shorewall-policy.html">shorewall-policy</ulink>(5) allows hosts that
|
url="/manpages/shorewall-policy.html">shorewall-policy</ulink>(5) allows
|
||||||
are within multiple zones to be managed under the rules of all of these
|
hosts that are within multiple zones to be managed under the rules of all
|
||||||
zones.</para>
|
of these zones.</para>
|
||||||
</refsect1>
|
</refsect1>
|
||||||
|
|
||||||
<refsect1>
|
<refsect1>
|
||||||
@ -74,7 +77,8 @@
|
|||||||
under rules where the source zone is net. It is important that this policy
|
under rules where the source zone is net. It is important that this policy
|
||||||
be listed BEFORE the next policy (net to all). You can have this policy
|
be listed BEFORE the next policy (net to all). You can have this policy
|
||||||
generated for you automatically by using the IMPLICIT_CONTINUE option in
|
generated for you automatically by using the IMPLICIT_CONTINUE option in
|
||||||
<ulink url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5).</para>
|
<ulink
|
||||||
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5).</para>
|
||||||
|
|
||||||
<para>Partial <filename>/etc/shorewall/rules</filename>:</para>
|
<para>Partial <filename>/etc/shorewall/rules</filename>:</para>
|
||||||
|
|
||||||
@ -204,12 +208,13 @@
|
|||||||
<title>See ALSO</title>
|
<title>See ALSO</title>
|
||||||
|
|
||||||
<para>shorewall(8), shorewall-accounting(5), shorewall-actions(5),
|
<para>shorewall(8), shorewall-accounting(5), shorewall-actions(5),
|
||||||
shorewall-blacklist(5), shorewall-hosts(5), shorewall_interfaces(5), shorewall-ipsets(5),
|
shorewall-blacklist(5), shorewall-hosts(5), shorewall_interfaces(5),
|
||||||
shorewall-maclist(5), shorewall-masq(5), shorewall-nat(5),
|
shorewall-ipsets(5), shorewall-maclist(5), shorewall-masq(5),
|
||||||
shorewall-netmap(5), shorewall-params(5), shorewall-policy(5),
|
shorewall-nat(5), shorewall-netmap(5), shorewall-params(5),
|
||||||
shorewall-providers(5), shorewall-proxyarp(5), shorewall-rtrules(5),
|
shorewall-policy(5), shorewall-providers(5), shorewall-proxyarp(5),
|
||||||
shorewall-routestopped(5), shorewall-rules(5), shorewall.conf(5), shorewall-secmarks(5),
|
shorewall-rtrules(5), shorewall-routestopped(5), shorewall-rules(5),
|
||||||
shorewall-tcclasses(5), shorewall-tcdevices(5), shorewall-mangle(5),
|
shorewall.conf(5), shorewall-secmarks(5), shorewall-tcclasses(5),
|
||||||
shorewall-tos(5), shorewall-tunnels(5), shorewall-zones(5)</para>
|
shorewall-tcdevices(5), shorewall-mangle(5), shorewall-tos(5),
|
||||||
|
shorewall-tunnels(5), shorewall-zones(5)</para>
|
||||||
</refsect1>
|
</refsect1>
|
||||||
</refentry>
|
</refentry>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-netmap</refentrytitle>
|
<refentrytitle>shorewall-netmap</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -95,9 +97,9 @@
|
|||||||
in <ulink
|
in <ulink
|
||||||
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5).
|
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5).
|
||||||
Shorewall allows loose matches to wildcard entries in <ulink
|
Shorewall allows loose matches to wildcard entries in <ulink
|
||||||
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5). For
|
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5).
|
||||||
example, <filename class="devicefile">ppp0</filename> in this file
|
For example, <filename class="devicefile">ppp0</filename> in this
|
||||||
will match a <ulink
|
file will match a <ulink
|
||||||
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(8)
|
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(8)
|
||||||
entry that defines <filename
|
entry that defines <filename
|
||||||
class="devicefile">ppp+</filename>.</para>
|
class="devicefile">ppp+</filename>.</para>
|
||||||
@ -145,8 +147,8 @@
|
|||||||
range</emphasis>s; if the protocol is <emphasis
|
range</emphasis>s; if the protocol is <emphasis
|
||||||
role="bold">icmp</emphasis>, this column is interpreted as the
|
role="bold">icmp</emphasis>, this column is interpreted as the
|
||||||
destination icmp-type(s). ICMP types may be specified as a numeric
|
destination icmp-type(s). ICMP types may be specified as a numeric
|
||||||
type, a numeric type and code separated by a slash (e.g., 3/4), or
|
type, a numeric type and code separated by a slash (e.g., 3/4), or a
|
||||||
a typename. See <ulink
|
typename. See <ulink
|
||||||
url="/configuration_file_basics.htm#ICMP">http://www.shorewall.net/configuration_file_basics.htm#ICMP</ulink>.</para>
|
url="/configuration_file_basics.htm#ICMP">http://www.shorewall.net/configuration_file_basics.htm#ICMP</ulink>.</para>
|
||||||
|
|
||||||
<para>If the protocol is <emphasis role="bold">ipp2p</emphasis>,
|
<para>If the protocol is <emphasis role="bold">ipp2p</emphasis>,
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-params</refentrytitle>
|
<refentrytitle>shorewall-params</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -26,8 +28,8 @@
|
|||||||
<para>Assign any shell variables that you need in this file. The file is
|
<para>Assign any shell variables that you need in this file. The file is
|
||||||
always processed by <filename>/bin/sh</filename> or by the shell specified
|
always processed by <filename>/bin/sh</filename> or by the shell specified
|
||||||
through SHOREWALL_SHELL in <ulink
|
through SHOREWALL_SHELL in <ulink
|
||||||
url="/manpages/shorewall.conf.html">shorewall.conf</ulink> (5) so the full range of
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink> (5) so the full
|
||||||
shell capabilities may be used.</para>
|
range of shell capabilities may be used.</para>
|
||||||
|
|
||||||
<para>It is suggested that variable names begin with an upper case letter
|
<para>It is suggested that variable names begin with an upper case letter
|
||||||
to distinguish them from variables used internally within the Shorewall
|
to distinguish them from variables used internally within the Shorewall
|
||||||
@ -40,7 +42,8 @@
|
|||||||
|
|
||||||
<simplelist>
|
<simplelist>
|
||||||
<member><emphasis role="bold">Any option from <ulink
|
<member><emphasis role="bold">Any option from <ulink
|
||||||
url="/manpages/shorewall.conf.html">shorewall.conf</ulink> (5)</emphasis></member>
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>
|
||||||
|
(5)</emphasis></member>
|
||||||
|
|
||||||
<member><emphasis role="bold">COMMAND</emphasis></member>
|
<member><emphasis role="bold">COMMAND</emphasis></member>
|
||||||
|
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-policy</refentrytitle>
|
<refentrytitle>shorewall-policy</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -66,8 +68,8 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Source zone. Must be the name of a zone defined in <ulink
|
<para>Source zone. Must be the name of a zone defined in <ulink
|
||||||
url="/manpages/shorewall-zones.html">shorewall-zones</ulink>(5), $FW, "all" or
|
url="/manpages/shorewall-zones.html">shorewall-zones</ulink>(5),
|
||||||
"all+".</para>
|
$FW, "all" or "all+".</para>
|
||||||
|
|
||||||
<para>Support for "all+" was added in Shorewall 4.5.17. "all" does
|
<para>Support for "all+" was added in Shorewall 4.5.17. "all" does
|
||||||
not override the implicit intra-zone ACCEPT policy while "all+"
|
not override the implicit intra-zone ACCEPT policy while "all+"
|
||||||
@ -84,11 +86,11 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Destination zone. Must be the name of a zone defined in <ulink
|
<para>Destination zone. Must be the name of a zone defined in <ulink
|
||||||
url="/manpages/shorewall-zones.html">shorewall-zones</ulink>(5), $FW, "all" or
|
url="/manpages/shorewall-zones.html">shorewall-zones</ulink>(5),
|
||||||
"all+". If the DEST is a bport zone, then the SOURCE must be "all",
|
$FW, "all" or "all+". If the DEST is a bport zone, then the SOURCE
|
||||||
"all+", another bport zone associated with the same bridge, or it
|
must be "all", "all+", another bport zone associated with the same
|
||||||
must be an ipv4 zone that is associated with only the same
|
bridge, or it must be an ipv4 zone that is associated with only the
|
||||||
bridge.</para>
|
same bridge.</para>
|
||||||
|
|
||||||
<para>Support for "all+" was added in Shorewall 4.5.17. "all" does
|
<para>Support for "all+" was added in Shorewall 4.5.17. "all" does
|
||||||
not override the implicit intra-zone ACCEPT policy while "all+"
|
not override the implicit intra-zone ACCEPT policy while "all+"
|
||||||
@ -118,8 +120,8 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>The word "None" or "none". This causes any default action
|
<para>The word "None" or "none". This causes any default action
|
||||||
defined in <ulink
|
defined in <ulink
|
||||||
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5) to be
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5) to
|
||||||
omitted for this policy.</para>
|
be omitted for this policy.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
@ -191,8 +193,8 @@
|
|||||||
might also match (where the source or destination zone in
|
might also match (where the source or destination zone in
|
||||||
those rules is a superset of the SOURCE or DEST in this
|
those rules is a superset of the SOURCE or DEST in this
|
||||||
policy). See <ulink
|
policy). See <ulink
|
||||||
url="/manpages/shorewall-nesting.html">shorewall-nesting</ulink>(5) for
|
url="/manpages/shorewall-nesting.html">shorewall-nesting</ulink>(5)
|
||||||
additional information.</para>
|
for additional information.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-providers</refentrytitle>
|
<refentrytitle>shorewall-providers</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -77,17 +79,17 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>A FWMARK <emphasis>value</emphasis> used in your <ulink
|
<para>A FWMARK <emphasis>value</emphasis> used in your <ulink
|
||||||
url="/manpages/shorewall-mangle.html">shorewall-mangle(5)</ulink> file to
|
url="/manpages/shorewall-mangle.html">shorewall-mangle(5)</ulink>
|
||||||
direct packets to this provider.</para>
|
file to direct packets to this provider.</para>
|
||||||
|
|
||||||
<para>If HIGH_ROUTE_MARKS=Yes in <ulink
|
<para>If HIGH_ROUTE_MARKS=Yes in <ulink
|
||||||
url="/manpages/shorewall.conf.html">shorewall.conf(5)</ulink>, then the value
|
url="/manpages/shorewall.conf.html">shorewall.conf(5)</ulink>, then
|
||||||
must be a multiple of 256 between 256 and 65280 or their hexadecimal
|
the value must be a multiple of 256 between 256 and 65280 or their
|
||||||
equivalents (0x0100 and 0xff00 with the low-order byte of the value
|
hexadecimal equivalents (0x0100 and 0xff00 with the low-order byte
|
||||||
being zero). Otherwise, the value must be between 1 and 255. Each
|
of the value being zero). Otherwise, the value must be between 1 and
|
||||||
provider must be assigned a unique mark value. This column may be
|
255. Each provider must be assigned a unique mark value. This column
|
||||||
omitted if you don't use packet marking to direct connections to a
|
may be omitted if you don't use packet marking to direct connections
|
||||||
particular provider.</para>
|
to a particular provider.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -112,8 +114,8 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>The name of the network interface to the provider. Must be
|
<para>The name of the network interface to the provider. Must be
|
||||||
listed in <ulink
|
listed in <ulink
|
||||||
url="/manpages/shorewall-interfaces.html">shorewall-interfaces(5)</ulink>. In
|
url="/manpages/shorewall-interfaces.html">shorewall-interfaces(5)</ulink>.
|
||||||
general, that interface should not have the
|
In general, that interface should not have the
|
||||||
<option>proxyarp</option> option specified unless
|
<option>proxyarp</option> option specified unless
|
||||||
<option>loose</option> is given in the OPTIONS column of this
|
<option>loose</option> is given in the OPTIONS column of this
|
||||||
entry.</para>
|
entry.</para>
|
||||||
@ -177,8 +179,9 @@
|
|||||||
|
|
||||||
<para>Beginning with Shorewall 4.4.3, <option>track</option>
|
<para>Beginning with Shorewall 4.4.3, <option>track</option>
|
||||||
defaults to the setting of the TRACK_PROVIDERS option in
|
defaults to the setting of the TRACK_PROVIDERS option in
|
||||||
<ulink url="/manpages/shorewall.conf.html">shorewall.conf</ulink> (5).
|
<ulink
|
||||||
If you set TRACK_PROVIDERS=Yes and want to override that
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>
|
||||||
|
(5). If you set TRACK_PROVIDERS=Yes and want to override that
|
||||||
setting for an individual provider, then specify
|
setting for an individual provider, then specify
|
||||||
<option>notrack</option> (see below).</para>
|
<option>notrack</option> (see below).</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-proxyarp</refentrytitle>
|
<refentrytitle>shorewall-proxyarp</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-routes</refentrytitle>
|
<refentrytitle>shorewall-routes</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -34,8 +36,8 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>The name or number of a provider defined in <ulink
|
<para>The name or number of a provider defined in <ulink
|
||||||
url="/manpages/shorewall-providers.html">shorewall-providers</ulink> (5).
|
url="/manpages/shorewall-providers.html">shorewall-providers</ulink>
|
||||||
Beginning with Shorewall 4.5.14, you may also enter
|
(5). Beginning with Shorewall 4.5.14, you may also enter
|
||||||
<option>main</option> in this column to add routes to the main
|
<option>main</option> in this column to add routes to the main
|
||||||
routing table.</para>
|
routing table.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
@ -73,8 +75,8 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>Specifies the device route. If neither DEVICE nor GATEWAY is
|
<para>Specifies the device route. If neither DEVICE nor GATEWAY is
|
||||||
given, then the INTERFACE specified for the PROVIDER in <ulink
|
given, then the INTERFACE specified for the PROVIDER in <ulink
|
||||||
url="/manpages/shorewall-providers.html">shorewall-providers</ulink> (5). This
|
url="/manpages/shorewall-providers.html">shorewall-providers</ulink>
|
||||||
column must be omitted if <option>blackhole</option>,
|
(5). This column must be omitted if <option>blackhole</option>,
|
||||||
<option>prohibit</option> or <option>unreachable</option> is
|
<option>prohibit</option> or <option>unreachable</option> is
|
||||||
specified in the GATEWAY column.</para>
|
specified in the GATEWAY column.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-routestopped</refentrytitle>
|
<refentrytitle>shorewall-routestopped</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-rtrules</refentrytitle>
|
<refentrytitle>shorewall-rtrules</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-rules</refentrytitle>
|
<refentrytitle>shorewall-rules</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -25,8 +27,8 @@
|
|||||||
|
|
||||||
<para>Entries in this file govern connection establishment by defining
|
<para>Entries in this file govern connection establishment by defining
|
||||||
exceptions to the policies laid out in <ulink
|
exceptions to the policies laid out in <ulink
|
||||||
url="/manpages/shorewall-policy.html">shorewall-policy</ulink>(5). By default,
|
url="/manpages/shorewall-policy.html">shorewall-policy</ulink>(5). By
|
||||||
subsequent requests and responses are automatically allowed using
|
default, subsequent requests and responses are automatically allowed using
|
||||||
connection tracking. For any particular (source,dest) pair of zones, the
|
connection tracking. For any particular (source,dest) pair of zones, the
|
||||||
rules are evaluated in the order in which they appear in this file and the
|
rules are evaluated in the order in which they appear in this file and the
|
||||||
first terminating match is the one that determines the disposition of the
|
first terminating match is the one that determines the disposition of the
|
||||||
@ -145,8 +147,8 @@
|
|||||||
|
|
||||||
<warning>
|
<warning>
|
||||||
<para>If you specify FASTACCEPT=Yes in <ulink
|
<para>If you specify FASTACCEPT=Yes in <ulink
|
||||||
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5) then the <emphasis
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5) then the
|
||||||
role="bold">ALL, ESTABLISHED</emphasis> and <emphasis
|
<emphasis role="bold">ALL, ESTABLISHED</emphasis> and <emphasis
|
||||||
role="bold">RELATED</emphasis> sections must be empty.</para>
|
role="bold">RELATED</emphasis> sections must be empty.</para>
|
||||||
|
|
||||||
<para>An except is made if you are running Shorewall 4.4.27 or later and
|
<para>An except is made if you are running Shorewall 4.4.27 or later and
|
||||||
@ -234,8 +236,8 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>The name of an <emphasis>action</emphasis> declared in
|
<para>The name of an <emphasis>action</emphasis> declared in
|
||||||
<ulink
|
<ulink
|
||||||
url="/manpages/shorewall-actions.html">shorewall-actions</ulink>(5) or
|
url="/manpages/shorewall-actions.html">shorewall-actions</ulink>(5)
|
||||||
in /usr/share/shorewall/actions.std.</para>
|
or in /usr/share/shorewall/actions.std.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -329,12 +331,13 @@
|
|||||||
<para>Do not process any of the following rules for this
|
<para>Do not process any of the following rules for this
|
||||||
(source zone,destination zone). If the source and/or
|
(source zone,destination zone). If the source and/or
|
||||||
destination IP address falls into a zone defined later in
|
destination IP address falls into a zone defined later in
|
||||||
<ulink url="/manpages/shorewall-zones.html">shorewall-zones</ulink>(5)
|
<ulink
|
||||||
|
url="/manpages/shorewall-zones.html">shorewall-zones</ulink>(5)
|
||||||
or in a parent zone of the source or destination zones, then
|
or in a parent zone of the source or destination zones, then
|
||||||
this connection request will be passed to the rules defined
|
this connection request will be passed to the rules defined
|
||||||
for that (those) zone(s). See <ulink
|
for that (those) zone(s). See <ulink
|
||||||
url="/manpages/shorewall-nesting.html">shorewall-nesting</ulink>(5) for
|
url="/manpages/shorewall-nesting.html">shorewall-nesting</ulink>(5)
|
||||||
additional information.</para>
|
for additional information.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -671,8 +674,8 @@
|
|||||||
|
|
||||||
<para>If the <emphasis role="bold">ACTION</emphasis> names an
|
<para>If the <emphasis role="bold">ACTION</emphasis> names an
|
||||||
<emphasis>action</emphasis> declared in <ulink
|
<emphasis>action</emphasis> declared in <ulink
|
||||||
url="/manpages/shorewall-actions.html">shorewall-actions</ulink>(5) or in
|
url="/manpages/shorewall-actions.html">shorewall-actions</ulink>(5)
|
||||||
/usr/share/shorewall/actions.std then:</para>
|
or in /usr/share/shorewall/actions.std then:</para>
|
||||||
|
|
||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
@ -732,10 +735,10 @@
|
|||||||
<para>Beginning with Shorewall 4.4.13, you may use a
|
<para>Beginning with Shorewall 4.4.13, you may use a
|
||||||
<replaceable>zone-list </replaceable>which consists of a
|
<replaceable>zone-list </replaceable>which consists of a
|
||||||
comma-separated list of zones declared in <ulink
|
comma-separated list of zones declared in <ulink
|
||||||
url="/manpages/shorewall-zones.html">shorewall-zones</ulink> (5). This
|
url="/manpages/shorewall-zones.html">shorewall-zones</ulink> (5).
|
||||||
<replaceable>zone-list</replaceable> may be optionally followed by
|
This <replaceable>zone-list</replaceable> may be optionally followed
|
||||||
"+" to indicate that the rule is to apply to intra-zone traffic as
|
by "+" to indicate that the rule is to apply to intra-zone traffic
|
||||||
well as inter-zone traffic.</para>
|
as well as inter-zone traffic.</para>
|
||||||
|
|
||||||
<para>When <emphasis role="bold">none</emphasis> is used either in
|
<para>When <emphasis role="bold">none</emphasis> is used either in
|
||||||
the <emphasis role="bold">SOURCE</emphasis> or <emphasis
|
the <emphasis role="bold">SOURCE</emphasis> or <emphasis
|
||||||
@ -906,18 +909,19 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Location of Server. May be a zone declared in <ulink
|
<para>Location of Server. May be a zone declared in <ulink
|
||||||
url="/manpages/shorewall-zones.html">shorewall-zones</ulink>(5), $<emphasis
|
url="/manpages/shorewall-zones.html">shorewall-zones</ulink>(5),
|
||||||
role="bold">FW</emphasis> to indicate the firewall itself, <emphasis
|
$<emphasis role="bold">FW</emphasis> to indicate the firewall
|
||||||
role="bold">all</emphasis>. <emphasis role="bold">all+</emphasis> or
|
itself, <emphasis role="bold">all</emphasis>. <emphasis
|
||||||
<emphasis role="bold">none</emphasis>.</para>
|
role="bold">all+</emphasis> or <emphasis
|
||||||
|
role="bold">none</emphasis>.</para>
|
||||||
|
|
||||||
<para>Beginning with Shorewall 4.4.13, you may use a
|
<para>Beginning with Shorewall 4.4.13, you may use a
|
||||||
<replaceable>zone-list </replaceable>which consists of a
|
<replaceable>zone-list </replaceable>which consists of a
|
||||||
comma-separated list of zones declared in <ulink
|
comma-separated list of zones declared in <ulink
|
||||||
url="/manpages/shorewall-zones.html">shorewall-zones</ulink> (5). This
|
url="/manpages/shorewall-zones.html">shorewall-zones</ulink> (5).
|
||||||
<replaceable>zone-list</replaceable> may be optionally followed by
|
This <replaceable>zone-list</replaceable> may be optionally followed
|
||||||
"+" to indicate that the rule is to apply to intra-zone traffic as
|
by "+" to indicate that the rule is to apply to intra-zone traffic
|
||||||
well as inter-zone traffic.</para>
|
as well as inter-zone traffic.</para>
|
||||||
|
|
||||||
<para>Beginning with Shorewall 4.5.4, A
|
<para>Beginning with Shorewall 4.5.4, A
|
||||||
<replaceable>countrycode-list</replaceable> may be specified. A
|
<replaceable>countrycode-list</replaceable> may be specified. A
|
||||||
@ -1577,8 +1581,8 @@
|
|||||||
</simplelist>
|
</simplelist>
|
||||||
|
|
||||||
<para>If the HELPERS option is specified in <ulink
|
<para>If the HELPERS option is specified in <ulink
|
||||||
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5), then any module
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5), then
|
||||||
specified in this column must be listed in the HELPERS
|
any module specified in this column must be listed in the HELPERS
|
||||||
setting.</para>
|
setting.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-secmarks</refentrytitle>
|
<refentrytitle>shorewall-secmarks</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -25,10 +27,10 @@
|
|||||||
|
|
||||||
<important>
|
<important>
|
||||||
<para>Unlike rules in the <ulink
|
<para>Unlike rules in the <ulink
|
||||||
url="/manpages/shorewall-rules.html">shorewall-rules</ulink>(5) file, evaluation
|
url="/manpages/shorewall-rules.html">shorewall-rules</ulink>(5) file,
|
||||||
of rules in this file will continue after a match. So the final secmark
|
evaluation of rules in this file will continue after a match. So the
|
||||||
for each packet will be the one assigned by the LAST rule that
|
final secmark for each packet will be the one assigned by the LAST rule
|
||||||
matches.</para>
|
that matches.</para>
|
||||||
</important>
|
</important>
|
||||||
|
|
||||||
<para>The secmarks file is used to associate an SELinux context with
|
<para>The secmarks file is used to associate an SELinux context with
|
||||||
@ -249,8 +251,8 @@
|
|||||||
<emphasis>port range</emphasis>s; if the protocol is <emphasis
|
<emphasis>port range</emphasis>s; if the protocol is <emphasis
|
||||||
role="bold">icmp</emphasis>, this column is interpreted as the
|
role="bold">icmp</emphasis>, this column is interpreted as the
|
||||||
destination icmp-type(s). ICMP types may be specified as a numeric
|
destination icmp-type(s). ICMP types may be specified as a numeric
|
||||||
type, a numeric type and code separated by a slash (e.g., 3/4), or
|
type, a numeric type and code separated by a slash (e.g., 3/4), or a
|
||||||
a typename. See <ulink
|
typename. See <ulink
|
||||||
url="/configuration_file_basics.htm#ICMP">http://www.shorewall.net/configuration_file_basics.htm#ICMP</ulink>.</para>
|
url="/configuration_file_basics.htm#ICMP">http://www.shorewall.net/configuration_file_basics.htm#ICMP</ulink>.</para>
|
||||||
|
|
||||||
<para>If the protocol is <emphasis role="bold">ipp2p</emphasis>,
|
<para>If the protocol is <emphasis role="bold">ipp2p</emphasis>,
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-stoppedrules</refentrytitle>
|
<refentrytitle>shorewall-stoppedrules</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-tcclasses</refentrytitle>
|
<refentrytitle>shorewall-tcclasses</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -125,9 +127,9 @@
|
|||||||
<para>You may specify the interface number rather than the interface
|
<para>You may specify the interface number rather than the interface
|
||||||
name. If the <emphasis role="bold">classify</emphasis> option is
|
name. If the <emphasis role="bold">classify</emphasis> option is
|
||||||
given for the interface in <ulink
|
given for the interface in <ulink
|
||||||
url="/manpages/shorewall-tcdevices.html">shorewall-tcdevices</ulink>(5), then
|
url="/manpages/shorewall-tcdevices.html">shorewall-tcdevices</ulink>(5),
|
||||||
you must also specify an interface class (an integer that must be
|
then you must also specify an interface class (an integer that must
|
||||||
unique within classes associated with this interface). If the
|
be unique within classes associated with this interface). If the
|
||||||
classify option is not given, you may still specify a
|
classify option is not given, you may still specify a
|
||||||
<emphasis>class</emphasis> or you may have Shorewall generate a
|
<emphasis>class</emphasis> or you may have Shorewall generate a
|
||||||
class number from the MARK value. Interface numbers and class
|
class number from the MARK value. Interface numbers and class
|
||||||
@ -144,8 +146,8 @@
|
|||||||
|
|
||||||
<para>Normally, all classes defined here are sub-classes of a root
|
<para>Normally, all classes defined here are sub-classes of a root
|
||||||
class that is implicitly defined from the entry in <ulink
|
class that is implicitly defined from the entry in <ulink
|
||||||
url="/manpages/shorewall-tcdevices.html">shorewall-tcdevices</ulink>(5). You
|
url="/manpages/shorewall-tcdevices.html">shorewall-tcdevices</ulink>(5).
|
||||||
can establish a class hierarchy by specifying a
|
You can establish a class hierarchy by specifying a
|
||||||
<emphasis>parent</emphasis> class -- the number of a class that you
|
<emphasis>parent</emphasis> class -- the number of a class that you
|
||||||
have previously defined. The sub-class may borrow unused bandwidth
|
have previously defined. The sub-class may borrow unused bandwidth
|
||||||
from its parent.</para>
|
from its parent.</para>
|
||||||
@ -159,11 +161,12 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>The mark <emphasis>value</emphasis> which is an integer in the
|
<para>The mark <emphasis>value</emphasis> which is an integer in the
|
||||||
range 1-255. You set mark values in the <ulink
|
range 1-255. You set mark values in the <ulink
|
||||||
url="/manpages/shorewall-mangle.html">shorewall-mangle</ulink>(5) file,
|
url="/manpages/shorewall-mangle.html">shorewall-mangle</ulink>(5)
|
||||||
marking the traffic you want to fit in the classes defined in here.
|
file, marking the traffic you want to fit in the classes defined in
|
||||||
Must be specified as '-' if the <emphasis
|
here. Must be specified as '-' if the <emphasis
|
||||||
role="bold">classify</emphasis> option is given for the interface in
|
role="bold">classify</emphasis> option is given for the interface in
|
||||||
<ulink url="/manpages/shorewall-tcdevices.html">shorewall-tcdevices</ulink>(5)
|
<ulink
|
||||||
|
url="/manpages/shorewall-tcdevices.html">shorewall-tcdevices</ulink>(5)
|
||||||
and you are running Shorewall 4.5.5 or earlier.</para>
|
and you are running Shorewall 4.5.5 or earlier.</para>
|
||||||
|
|
||||||
<para>You can use the same marks for different interfaces.</para>
|
<para>You can use the same marks for different interfaces.</para>
|
||||||
@ -290,7 +293,7 @@
|
|||||||
<para>This is the default class for that interface where all
|
<para>This is the default class for that interface where all
|
||||||
traffic should go, that is not classified otherwise.</para>
|
traffic should go, that is not classified otherwise.</para>
|
||||||
|
|
||||||
<para/>
|
<para></para>
|
||||||
|
|
||||||
<note>
|
<note>
|
||||||
<para>You must define <emphasis
|
<para>You must define <emphasis
|
||||||
@ -417,7 +420,8 @@
|
|||||||
of the class. So the total RATE represented by an entry with
|
of the class. So the total RATE represented by an entry with
|
||||||
'occurs' will be the listed RATE multiplied by
|
'occurs' will be the listed RATE multiplied by
|
||||||
<emphasis>number</emphasis>. For additional information, see
|
<emphasis>number</emphasis>. For additional information, see
|
||||||
<ulink url="/manpages/shorewall-tcrules.html">shorewall-tcrules</ulink>
|
<ulink
|
||||||
|
url="/manpages/shorewall-tcrules.html">shorewall-tcrules</ulink>
|
||||||
(5).</para>
|
(5).</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -720,10 +724,10 @@
|
|||||||
priority number, giving less delay) and will be granted excess
|
priority number, giving less delay) and will be granted excess
|
||||||
bandwidth (up to 180kbps, the class ceiling) first, before any other
|
bandwidth (up to 180kbps, the class ceiling) first, before any other
|
||||||
traffic. A single VoIP stream, depending upon codecs, after
|
traffic. A single VoIP stream, depending upon codecs, after
|
||||||
encapsulation, can take up to 80kbps on a PPPoE/DSL link, so we pad a
|
encapsulation, can take up to 80kbps on a PPPoE/DSL link, so we pad
|
||||||
little bit just in case. (TOS byte values 0xb8 and 0x68 are DiffServ
|
a little bit just in case. (TOS byte values 0xb8 and 0x68 are
|
||||||
classes EF and AFF3-1 respectively and are often used by VOIP
|
DiffServ classes EF and AFF3-1 respectively and are often used by
|
||||||
devices).</para>
|
VOIP devices).</para>
|
||||||
|
|
||||||
<para>Interactive traffic (tos-minimum-delay) and TCP acks (and ICMP
|
<para>Interactive traffic (tos-minimum-delay) and TCP acks (and ICMP
|
||||||
echo traffic if you use the example in tcrules) and any packet with
|
echo traffic if you use the example in tcrules) and any packet with
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-tcdevices</refentrytitle>
|
<refentrytitle>shorewall-tcdevices</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -150,8 +152,7 @@
|
|||||||
Beginning with Shorewall 4.4.25, a rate-estimated policing filter
|
Beginning with Shorewall 4.4.25, a rate-estimated policing filter
|
||||||
may be configured instead. Rate-estimated filters should be used
|
may be configured instead. Rate-estimated filters should be used
|
||||||
with Ethernet adapters that have Generic Receive Offload enabled by
|
with Ethernet adapters that have Generic Receive Offload enabled by
|
||||||
default. See <ulink
|
default. See <ulink url="/FAQ.htm#faq97a">Shorewall FAQ
|
||||||
url="/FAQ.htm#faq97a">Shorewall FAQ
|
|
||||||
97a</ulink>.</para>
|
97a</ulink>.</para>
|
||||||
|
|
||||||
<para>To create a rate-estimated filter, precede the bandwidth with
|
<para>To create a rate-estimated filter, precede the bandwidth with
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-tcfilters</refentrytitle>
|
<refentrytitle>shorewall-tcfilters</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-tcinterfaces</refentrytitle>
|
<refentrytitle>shorewall-tcinterfaces</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -25,7 +27,8 @@
|
|||||||
|
|
||||||
<para>This file lists the interfaces that are subject to simple traffic
|
<para>This file lists the interfaces that are subject to simple traffic
|
||||||
shaping. Simple traffic shaping is enabled by setting TC_ENABLED=Simple in
|
shaping. Simple traffic shaping is enabled by setting TC_ENABLED=Simple in
|
||||||
<ulink url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5).</para>
|
<ulink
|
||||||
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5).</para>
|
||||||
|
|
||||||
<para>A note on the <emphasis>bandwidth</emphasis> definition used in this
|
<para>A note on the <emphasis>bandwidth</emphasis> definition used in this
|
||||||
file:</para>
|
file:</para>
|
||||||
@ -161,8 +164,7 @@
|
|||||||
Beginning with Shorewall 4.4.25, a rate-estimated policing filter
|
Beginning with Shorewall 4.4.25, a rate-estimated policing filter
|
||||||
may be configured instead. Rate-estimated filters should be used
|
may be configured instead. Rate-estimated filters should be used
|
||||||
with Ethernet adapters that have Generic Receive Offload enabled by
|
with Ethernet adapters that have Generic Receive Offload enabled by
|
||||||
default. See <ulink
|
default. See <ulink url="/FAQ.htm#faq97a">Shorewall FAQ
|
||||||
url="/FAQ.htm#faq97a">Shorewall FAQ
|
|
||||||
97a</ulink>.</para>
|
97a</ulink>.</para>
|
||||||
|
|
||||||
<para>To create a rate-estimated filter, precede the bandwidth with
|
<para>To create a rate-estimated filter, precede the bandwidth with
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-tcpri</refentrytitle>
|
<refentrytitle>shorewall-tcpri</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -25,12 +27,13 @@
|
|||||||
|
|
||||||
<para>This file is used to specify the priority of traffic for simple
|
<para>This file is used to specify the priority of traffic for simple
|
||||||
traffic shaping (TC_ENABLED=Simple in <ulink
|
traffic shaping (TC_ENABLED=Simple in <ulink
|
||||||
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5)). The priority band of
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5)). The
|
||||||
each packet is determined by the <emphasis role="bold">last</emphasis>
|
priority band of each packet is determined by the <emphasis
|
||||||
entry that the packet matches. If a packet doesn't match any entry in this
|
role="bold">last</emphasis> entry that the packet matches. If a packet
|
||||||
file, then its priority will be determined by its TOS field. The default
|
doesn't match any entry in this file, then its priority will be determined
|
||||||
mapping is as follows but can be changed by setting the TC_PRIOMAP option
|
by its TOS field. The default mapping is as follows but can be changed by
|
||||||
in <ulink url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5).</para>
|
setting the TC_PRIOMAP option in <ulink
|
||||||
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5).</para>
|
||||||
|
|
||||||
<programlisting>TOS Bits Means Linux Priority BAND
|
<programlisting>TOS Bits Means Linux Priority BAND
|
||||||
------------------------------------------------------------
|
------------------------------------------------------------
|
||||||
@ -131,8 +134,8 @@
|
|||||||
[<replaceable>helper</replaceable>]</term>
|
[<replaceable>helper</replaceable>]</term>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Optional. Names a Netfilter protocol helper module such as ftp,
|
<para>Optional. Names a Netfilter protocol helper module such as
|
||||||
sip, amanda, etc. A packet will match if it was accepted by the
|
ftp, sip, amanda, etc. A packet will match if it was accepted by the
|
||||||
named helper module. You can also append "-" and a port number to
|
named helper module. You can also append "-" and a port number to
|
||||||
the helper module name (e.g., ftp-21) to specify the port number
|
the helper module name (e.g., ftp-21) to specify the port number
|
||||||
that the original connection was made on.</para>
|
that the original connection was made on.</para>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-</refentrytitle>
|
<refentrytitle>shorewall-</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -52,12 +54,13 @@
|
|||||||
<title>See ALSO</title>
|
<title>See ALSO</title>
|
||||||
|
|
||||||
<para>shorewall(8), shorewall-accounting(5), shorewall-actions(5),
|
<para>shorewall(8), shorewall-accounting(5), shorewall-actions(5),
|
||||||
shorewall-blacklist(5), shorewall-hosts(5), shorewall_interfaces(5), shorewall-ipsets(5),
|
shorewall-blacklist(5), shorewall-hosts(5), shorewall_interfaces(5),
|
||||||
shorewall-maclist(5), shorewall-masq(5), shorewall-nat(5),
|
shorewall-ipsets(5), shorewall-maclist(5), shorewall-masq(5),
|
||||||
shorewall-netmap(5), shorewall-params(5), shorewall-policy(5),
|
shorewall-nat(5), shorewall-netmap(5), shorewall-params(5),
|
||||||
shorewall-providers(5), shorewall-proxyarp(5), shorewall-rtrules(5),
|
shorewall-policy(5), shorewall-providers(5), shorewall-proxyarp(5),
|
||||||
shorewall-routestopped(5), shorewall-rules(5), shorewall.conf(5), shorewall-secmarks(5),
|
shorewall-rtrules(5), shorewall-routestopped(5), shorewall-rules(5),
|
||||||
shorewall-tcclasses(5), shorewall-tcdevices(5), shorewall-mangle(5),
|
shorewall.conf(5), shorewall-secmarks(5), shorewall-tcclasses(5),
|
||||||
shorewall-tos(5), shorewall-tunnels(5), shorewall-zones(5)</para>
|
shorewall-tcdevices(5), shorewall-mangle(5), shorewall-tos(5),
|
||||||
|
shorewall-tunnels(5), shorewall-zones(5)</para>
|
||||||
</refsect1>
|
</refsect1>
|
||||||
</refentry>
|
</refentry>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-tos</refentrytitle>
|
<refentrytitle>shorewall-tos</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -25,7 +27,8 @@
|
|||||||
|
|
||||||
<para>This file defines rules for setting Type Of Service (TOS). Its use
|
<para>This file defines rules for setting Type Of Service (TOS). Its use
|
||||||
is deprecated, beginning in Shorewall 4.5.1, in favor of the TOS target in
|
is deprecated, beginning in Shorewall 4.5.1, in favor of the TOS target in
|
||||||
<ulink url="/manpages/shorewall-mangle.html">shorewall-mangle</ulink> (5).</para>
|
<ulink url="/manpages/shorewall-mangle.html">shorewall-mangle</ulink>
|
||||||
|
(5).</para>
|
||||||
|
|
||||||
<para>The columns in the file are as follows (where the column name is
|
<para>The columns in the file are as follows (where the column name is
|
||||||
followed by a different name in parentheses, the different name is used in
|
followed by a different name in parentheses, the different name is used in
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-tunnels</refentrytitle>
|
<refentrytitle>shorewall-tunnels</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -27,8 +29,8 @@
|
|||||||
encrypted) traffic to pass between the Shorewall system and a remote
|
encrypted) traffic to pass between the Shorewall system and a remote
|
||||||
gateway. Traffic flowing through the tunnel is handled using the normal
|
gateway. Traffic flowing through the tunnel is handled using the normal
|
||||||
zone/policy/rule mechanism. See <ulink
|
zone/policy/rule mechanism. See <ulink
|
||||||
url="/VPNBasics.html">http://www.shorewall.net/VPNBasics.html</ulink>
|
url="/VPNBasics.html">http://www.shorewall.net/VPNBasics.html</ulink> for
|
||||||
for details.</para>
|
details.</para>
|
||||||
|
|
||||||
<para>The columns in the file are as follows.</para>
|
<para>The columns in the file are as follows.</para>
|
||||||
|
|
||||||
@ -143,8 +145,8 @@
|
|||||||
|
|
||||||
<para>Beginning with Shorewall 4.5.3, a list of addresses or ranges
|
<para>Beginning with Shorewall 4.5.3, a list of addresses or ranges
|
||||||
may be given. Exclusion (<ulink
|
may be given. Exclusion (<ulink
|
||||||
url="/manpages/shorewall-exclusion.html">shorewall-exclusion</ulink> (5) ) is
|
url="/manpages/shorewall-exclusion.html">shorewall-exclusion</ulink>
|
||||||
not supported.</para>
|
(5) ) is not supported.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-vardir</refentrytitle>
|
<refentrytitle>shorewall-vardir</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -54,12 +56,13 @@
|
|||||||
<title>See ALSO</title>
|
<title>See ALSO</title>
|
||||||
|
|
||||||
<para>shorewall(8), shorewall-accounting(5), shorewall-actions(5),
|
<para>shorewall(8), shorewall-accounting(5), shorewall-actions(5),
|
||||||
shorewall-blacklist(5), shorewall-hosts(5), shorewall_interfaces(5), shorewall-ipsets(5),
|
shorewall-blacklist(5), shorewall-hosts(5), shorewall_interfaces(5),
|
||||||
shorewall-maclist(5), shorewall-masq(5), shorewall-nat(5),
|
shorewall-ipsets(5), shorewall-maclist(5), shorewall-masq(5),
|
||||||
shorewall-netmap(5), shorewall-params(5), shorewall-policy(5),
|
shorewall-nat(5), shorewall-netmap(5), shorewall-params(5),
|
||||||
shorewall-providers(5), shorewall-proxyarp(5), shorewall-rtrules(5),
|
shorewall-policy(5), shorewall-providers(5), shorewall-proxyarp(5),
|
||||||
shorewall-routestopped(5), shorewall-rules(5), shorewall.conf(5), shorewall-secmarks(5),
|
shorewall-rtrules(5), shorewall-routestopped(5), shorewall-rules(5),
|
||||||
shorewall-tcclasses(5), shorewall-tcdevices(5), shorewall-mangle(5),
|
shorewall.conf(5), shorewall-secmarks(5), shorewall-tcclasses(5),
|
||||||
shorewall-tos(5), shorewall-tunnels(5), shorewall-zones(5)</para>
|
shorewall-tcdevices(5), shorewall-mangle(5), shorewall-tos(5),
|
||||||
|
shorewall-tunnels(5), shorewall-zones(5)</para>
|
||||||
</refsect1>
|
</refsect1>
|
||||||
</refentry>
|
</refentry>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-zones</refentrytitle>
|
<refentrytitle>shorewall-zones</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -45,17 +47,17 @@
|
|||||||
"none", "any", "SOURCE" and "DEST" are reserved and may not be used
|
"none", "any", "SOURCE" and "DEST" are reserved and may not be used
|
||||||
as zone names. The maximum length of a zone name is determined by
|
as zone names. The maximum length of a zone name is determined by
|
||||||
the setting of the LOGFORMAT option in <ulink
|
the setting of the LOGFORMAT option in <ulink
|
||||||
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5). With the
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5). With
|
||||||
default LOGFORMAT, zone names can be at most 5 characters
|
the default LOGFORMAT, zone names can be at most 5 characters
|
||||||
long.</para>
|
long.</para>
|
||||||
|
|
||||||
<blockquote>
|
<blockquote>
|
||||||
<para>The maximum length of an iptables log prefix is 29 bytes. As
|
<para>The maximum length of an iptables log prefix is 29 bytes. As
|
||||||
explained in <ulink
|
explained in <ulink
|
||||||
url="/manpages/shorewall.conf.html">shorewall.conf</ulink> (5), the default
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink> (5),
|
||||||
LOGPREFIX formatting string is “Shorewall:%s:%s:” where the first
|
the default LOGPREFIX formatting string is “Shorewall:%s:%s:”
|
||||||
%s is replaced by the chain name and the second is replaced by the
|
where the first %s is replaced by the chain name and the second is
|
||||||
disposition.</para>
|
replaced by the disposition.</para>
|
||||||
|
|
||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
@ -97,8 +99,8 @@
|
|||||||
(sub)zone name by ":" and a comma-separated list of the parent
|
(sub)zone name by ":" and a comma-separated list of the parent
|
||||||
zones. The parent zones must have been declared in earlier records
|
zones. The parent zones must have been declared in earlier records
|
||||||
in this file. See <ulink
|
in this file. See <ulink
|
||||||
url="/manpages/shorewall-nesting.html">shorewall-nesting</ulink>(5) for
|
url="/manpages/shorewall-nesting.html">shorewall-nesting</ulink>(5)
|
||||||
additional information.</para>
|
for additional information.</para>
|
||||||
|
|
||||||
<para>Example:</para>
|
<para>Example:</para>
|
||||||
|
|
||||||
@ -110,8 +112,8 @@ c:a,b ipv4</programlisting>
|
|||||||
<para>Currently, Shorewall uses this information to reorder the zone
|
<para>Currently, Shorewall uses this information to reorder the zone
|
||||||
list so that parent zones appear after their subzones in the list.
|
list so that parent zones appear after their subzones in the list.
|
||||||
The IMPLICIT_CONTINUE option in <ulink
|
The IMPLICIT_CONTINUE option in <ulink
|
||||||
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5) can also create
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5) can
|
||||||
implicit CONTINUE policies to/from the subzone.</para>
|
also create implicit CONTINUE policies to/from the subzone.</para>
|
||||||
|
|
||||||
<para>Where an <emphasis role="bold">ipsec</emphasis> zone is
|
<para>Where an <emphasis role="bold">ipsec</emphasis> zone is
|
||||||
explicitly included as a child of an <emphasis
|
explicitly included as a child of an <emphasis
|
||||||
@ -180,7 +182,8 @@ c:a,b ipv4</programlisting>
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>Added in Shorewall 4.4.11 Beta 2 - A zone composed of
|
<para>Added in Shorewall 4.4.11 Beta 2 - A zone composed of
|
||||||
Linux-vserver guests. The zone contents must be defined in
|
Linux-vserver guests. The zone contents must be defined in
|
||||||
<ulink url="/manpages/shorewall-hosts.html">shorewall-hosts</ulink>
|
<ulink
|
||||||
|
url="/manpages/shorewall-hosts.html">shorewall-hosts</ulink>
|
||||||
(5).</para>
|
(5).</para>
|
||||||
|
|
||||||
<para>Vserver zones are implicitly handled as subzones of the
|
<para>Vserver zones are implicitly handled as subzones of the
|
||||||
@ -310,7 +313,8 @@ c:a,b ipv4</programlisting>
|
|||||||
<para>Added in Shorewall 4.5.9. May only be specified in the
|
<para>Added in Shorewall 4.5.9. May only be specified in the
|
||||||
OPTIONS column and indicates that only a single ipset should
|
OPTIONS column and indicates that only a single ipset should
|
||||||
be created for this zone if it has multiple dynamic entries in
|
be created for this zone if it has multiple dynamic entries in
|
||||||
<ulink url="/manpages/shorewall-hosts.html">shorewall-hosts</ulink>(5).
|
<ulink
|
||||||
|
url="/manpages/shorewall-hosts.html">shorewall-hosts</ulink>(5).
|
||||||
Without this option, a separate ipset is created for each
|
Without this option, a separate ipset is created for each
|
||||||
interface.</para>
|
interface.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
@ -354,9 +358,9 @@ c:a,b ipv4</programlisting>
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>sets the MSS field in TCP packets. If you supply this
|
<para>sets the MSS field in TCP packets. If you supply this
|
||||||
option, you should also set FASTACCEPT=No in <ulink
|
option, you should also set FASTACCEPT=No in <ulink
|
||||||
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5) to insure
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5)
|
||||||
that both the SYN and SYN,ACK packets have their MSS field
|
to insure that both the SYN and SYN,ACK packets have their MSS
|
||||||
adjusted.</para>
|
field adjusted.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall.conf</refentrytitle>
|
<refentrytitle>shorewall.conf</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -204,8 +206,8 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>Added in Shorewall 4.4.7. If set to Yes, Shorewall accounting
|
<para>Added in Shorewall 4.4.7. If set to Yes, Shorewall accounting
|
||||||
is enabled (see <ulink
|
is enabled (see <ulink
|
||||||
url="/manpages/shorewall-accounting.html">shorewall-accounting</ulink>(5)). If
|
url="/manpages/shorewall-accounting.html">shorewall-accounting</ulink>(5)).
|
||||||
not specified or set to the empty value, ACCOUNTING=Yes is
|
If not specified or set to the empty value, ACCOUNTING=Yes is
|
||||||
assumed.</para>
|
assumed.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -230,8 +232,8 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>This parameter determines whether Shorewall automatically adds
|
<para>This parameter determines whether Shorewall automatically adds
|
||||||
the external address(es) in <ulink
|
the external address(es) in <ulink
|
||||||
url="/manpages/shorewall-nat.html">shorewall-nat</ulink>(5). If the variable
|
url="/manpages/shorewall-nat.html">shorewall-nat</ulink>(5). If the
|
||||||
is set to <emphasis role="bold">Yes</emphasis> or <emphasis
|
variable is set to <emphasis role="bold">Yes</emphasis> or <emphasis
|
||||||
role="bold">yes</emphasis> then Shorewall automatically adds these
|
role="bold">yes</emphasis> then Shorewall automatically adds these
|
||||||
aliases. If it is set to <emphasis role="bold">No</emphasis> or
|
aliases. If it is set to <emphasis role="bold">No</emphasis> or
|
||||||
<emphasis role="bold">no</emphasis>, you must add these aliases
|
<emphasis role="bold">no</emphasis>, you must add these aliases
|
||||||
@ -256,13 +258,13 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>This parameter determines whether Shorewall automatically adds
|
<para>This parameter determines whether Shorewall automatically adds
|
||||||
the SNAT ADDRESS in <ulink
|
the SNAT ADDRESS in <ulink
|
||||||
url="/manpages/shorewall-masq.html">shorewall-masq</ulink>(5). If the variable
|
url="/manpages/shorewall-masq.html">shorewall-masq</ulink>(5). If
|
||||||
is set to <emphasis role="bold">Yes</emphasis> or <emphasis
|
the variable is set to <emphasis role="bold">Yes</emphasis> or
|
||||||
role="bold">yes</emphasis> then Shorewall automatically adds these
|
<emphasis role="bold">yes</emphasis> then Shorewall automatically
|
||||||
addresses. If it is set to <emphasis role="bold">No</emphasis> or
|
adds these addresses. If it is set to <emphasis
|
||||||
<emphasis role="bold">no</emphasis>, you must add these addresses
|
role="bold">No</emphasis> or <emphasis role="bold">no</emphasis>,
|
||||||
yourself using your distribution's network configuration
|
you must add these addresses yourself using your distribution's
|
||||||
tools.</para>
|
network configuration tools.</para>
|
||||||
|
|
||||||
<para>If this variable is not set or is given an empty value
|
<para>If this variable is not set or is given an empty value
|
||||||
(ADD_SNAT_ALIASES="") then ADD_SNAT_ALIASES=No is assumed.</para>
|
(ADD_SNAT_ALIASES="") then ADD_SNAT_ALIASES=No is assumed.</para>
|
||||||
@ -356,7 +358,8 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Specify the appropriate helper in the HELPER column in
|
<para>Specify the appropriate helper in the HELPER column in
|
||||||
<ulink url="/manpages/shorewall-rules.html">shorewall-rules</ulink>
|
<ulink
|
||||||
|
url="/manpages/shorewall-rules.html">shorewall-rules</ulink>
|
||||||
(5).</para>
|
(5).</para>
|
||||||
|
|
||||||
<note>
|
<note>
|
||||||
@ -430,7 +433,8 @@
|
|||||||
url="/manpages/shorewall-rules.html">shorewall-rules</ulink> (5). It
|
url="/manpages/shorewall-rules.html">shorewall-rules</ulink> (5). It
|
||||||
determines the disposition of packets sent to the <emphasis
|
determines the disposition of packets sent to the <emphasis
|
||||||
role="bold">blacklog</emphasis> target of <ulink
|
role="bold">blacklog</emphasis> target of <ulink
|
||||||
url="/manpages/shorewall-blrules.html">shorewall-blrules </ulink>(5).</para>
|
url="/manpages/shorewall-blrules.html">shorewall-blrules
|
||||||
|
</ulink>(5).</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -463,9 +467,11 @@
|
|||||||
role="bold">yes</emphasis>, blacklists are only consulted for new
|
role="bold">yes</emphasis>, blacklists are only consulted for new
|
||||||
connections and for packets in the INVALID connection state (such as
|
connections and for packets in the INVALID connection state (such as
|
||||||
TCP SYN,ACK when there has been no corresponding SYN). That includes
|
TCP SYN,ACK when there has been no corresponding SYN). That includes
|
||||||
entries in the <ulink url="/manpages/shorewall-blrules.html">shorewall-blrules</ulink> (5) file
|
entries in the <ulink
|
||||||
and in the BLACKLIST section of <ulink
|
url="/manpages/shorewall-blrules.html">shorewall-blrules</ulink> (5)
|
||||||
url="/manpages/shorewall-rules.html">shorewall-rules</ulink> (5).</para>
|
file and in the BLACKLIST section of <ulink
|
||||||
|
url="/manpages/shorewall-rules.html">shorewall-rules</ulink>
|
||||||
|
(5).</para>
|
||||||
|
|
||||||
<para>When set to <emphasis role="bold">No</emphasis> or <emphasis
|
<para>When set to <emphasis role="bold">No</emphasis> or <emphasis
|
||||||
role="bold">no</emphasis>, blacklists are consulted for every packet
|
role="bold">no</emphasis>, blacklists are consulted for every packet
|
||||||
@ -534,8 +540,8 @@
|
|||||||
/etc/shorewall/tcstart file. That way, your traffic shaping rules
|
/etc/shorewall/tcstart file. That way, your traffic shaping rules
|
||||||
can still use the “fwmark” classifier based on packet marking
|
can still use the “fwmark” classifier based on packet marking
|
||||||
defined in <ulink
|
defined in <ulink
|
||||||
url="/manpages/shorewall-tcrules.html">shorewall-tcrules</ulink>(5). If not
|
url="/manpages/shorewall-tcrules.html">shorewall-tcrules</ulink>(5).
|
||||||
specified, CLEAR_TC=Yes is assumed.</para>
|
If not specified, CLEAR_TC=Yes is assumed.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -907,8 +913,9 @@ net all DROP info</programlisting>then the chain name is 'net2all'
|
|||||||
|
|
||||||
<para>Prior to version 3.2.0, it was not possible to use connection
|
<para>Prior to version 3.2.0, it was not possible to use connection
|
||||||
marking in <ulink
|
marking in <ulink
|
||||||
url="/manpages/shorewall-tcrules.html">shorewall-tcrules</ulink>(5) if you had
|
url="/manpages/shorewall-tcrules.html">shorewall-tcrules</ulink>(5)
|
||||||
a multi-ISP configuration that uses the track option.</para>
|
if you had a multi-ISP configuration that uses the track
|
||||||
|
option.</para>
|
||||||
|
|
||||||
<para>You may set HIGH_ROUTE_MARKS=Yes in to effectively divide the
|
<para>You may set HIGH_ROUTE_MARKS=Yes in to effectively divide the
|
||||||
packet mark and connection mark into two mark fields.</para>
|
packet mark and connection mark into two mark fields.</para>
|
||||||
@ -990,11 +997,12 @@ net all DROP info</programlisting>then the chain name is 'net2all'
|
|||||||
|
|
||||||
<para>Subzones are defined by following their name with ":" and a
|
<para>Subzones are defined by following their name with ":" and a
|
||||||
list of parent zones (in <ulink
|
list of parent zones (in <ulink
|
||||||
url="/manpages/shorewall-zones.html">shorewall-zones</ulink>(5)). Normally,
|
url="/manpages/shorewall-zones.html">shorewall-zones</ulink>(5)).
|
||||||
you want to have a set of special rules for the subzone and if a
|
Normally, you want to have a set of special rules for the subzone
|
||||||
connection doesn't match any of those subzone-specific rules then
|
and if a connection doesn't match any of those subzone-specific
|
||||||
you want the parent zone rules and policies to be applied; see
|
rules then you want the parent zone rules and policies to be
|
||||||
<ulink url="/manpages/shorewall-nesting.html">shorewall-nesting</ulink>(5).
|
applied; see <ulink
|
||||||
|
url="/manpages/shorewall-nesting.html">shorewall-nesting</ulink>(5).
|
||||||
With IMPLICIT_CONTINUE=Yes, that happens automatically.</para>
|
With IMPLICIT_CONTINUE=Yes, that happens automatically.</para>
|
||||||
|
|
||||||
<para>If IMPLICIT_CONTINUE=No or if IMPLICIT_CONTINUE is not set,
|
<para>If IMPLICIT_CONTINUE=No or if IMPLICIT_CONTINUE is not set,
|
||||||
@ -1011,9 +1019,9 @@ net all DROP info</programlisting>then the chain name is 'net2all'
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Added in Shorewall 4.6.0. Traditionally in <ulink
|
<para>Added in Shorewall 4.6.0. Traditionally in <ulink
|
||||||
url="/manpages/shorewall-rules.html">shorewall-rules</ulink>(5), a semicolon
|
url="/manpages/shorewall-rules.html">shorewall-rules</ulink>(5), a
|
||||||
separates column-oriented specifications on the left from <ulink
|
semicolon separates column-oriented specifications on the left from
|
||||||
url="/configuration_file_basics.htm#Pairs">alternative
|
<ulink url="/configuration_file_basics.htm#Pairs">alternative
|
||||||
specificaitons</ulink> on the right.. When INLINE_MATCHES=Yes is
|
specificaitons</ulink> on the right.. When INLINE_MATCHES=Yes is
|
||||||
specified, the specifications on the right are interpreted as if
|
specified, the specifications on the right are interpreted as if
|
||||||
INLINE had been specified in the ACTION column. If not specified or
|
INLINE had been specified in the ACTION column. If not specified or
|
||||||
@ -1029,10 +1037,10 @@ net all DROP info</programlisting>then the chain name is 'net2all'
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>Added in Shorewall 4.5.13. Shorewall has traditionally passed
|
<para>Added in Shorewall 4.5.13. Shorewall has traditionally passed
|
||||||
INVALID packets through the NEW section of <ulink
|
INVALID packets through the NEW section of <ulink
|
||||||
url="/manpages/shorewall-rules.html">shorewall-rules</ulink> (5). When a
|
url="/manpages/shorewall-rules.html">shorewall-rules</ulink> (5).
|
||||||
packet in INVALID state fails to match any rule in the INVALID
|
When a packet in INVALID state fails to match any rule in the
|
||||||
section, the packet is disposed of based on this setting. The
|
INVALID section, the packet is disposed of based on this setting.
|
||||||
default value is CONTINUE for compatibility with earlier
|
The default value is CONTINUE for compatibility with earlier
|
||||||
versions.</para>
|
versions.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -1117,11 +1125,11 @@ net all DROP info</programlisting>then the chain name is 'net2all'
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>This option indicates that zone-related ipsec information is
|
<para>This option indicates that zone-related ipsec information is
|
||||||
found in the zones file (<ulink
|
found in the zones file (<ulink
|
||||||
url="/manpages/shorewall-zones.html">shorewall-zones</ulink>(5)). The option
|
url="/manpages/shorewall-zones.html">shorewall-zones</ulink>(5)).
|
||||||
indicates to the compiler that this is not a legacy configuration
|
The option indicates to the compiler that this is not a legacy
|
||||||
where the ipsec information was contained in a separate file. The
|
configuration where the ipsec information was contained in a
|
||||||
value of this option must not be changed and the option must not be
|
separate file. The value of this option must not be changed and the
|
||||||
deleted.</para>
|
option must not be deleted.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -1378,7 +1386,8 @@ net all DROP info</programlisting>then the chain name is 'net2all'
|
|||||||
<note>
|
<note>
|
||||||
<para>The setting of LOGFORMAT has an effect of the permitted
|
<para>The setting of LOGFORMAT has an effect of the permitted
|
||||||
length of zone names. See <ulink
|
length of zone names. See <ulink
|
||||||
url="/manpages/shorewall-zones.html">shorewall-zones</ulink> (5).</para>
|
url="/manpages/shorewall-zones.html">shorewall-zones</ulink>
|
||||||
|
(5).</para>
|
||||||
</note>
|
</note>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -1546,8 +1555,8 @@ LOG:info:,bar net fw</programlisting>
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>The performance of configurations with a large numbers of
|
<para>The performance of configurations with a large numbers of
|
||||||
entries in <ulink
|
entries in <ulink
|
||||||
url="/manpages/shorewall-maclist.html">shorewall-maclist</ulink>(5) can be
|
url="/manpages/shorewall-maclist.html">shorewall-maclist</ulink>(5)
|
||||||
improved by setting the MACLIST_TTL variable in <ulink
|
can be improved by setting the MACLIST_TTL variable in <ulink
|
||||||
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5).</para>
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5).</para>
|
||||||
|
|
||||||
<para>If your iptables and kernel support the "Recent Match" (see
|
<para>If your iptables and kernel support the "Recent Match" (see
|
||||||
@ -1557,14 +1566,15 @@ LOG:info:,bar net fw</programlisting>
|
|||||||
|
|
||||||
<para>When a new connection arrives from a 'maclist' interface, the
|
<para>When a new connection arrives from a 'maclist' interface, the
|
||||||
packet passes through then list of entries for that interface in
|
packet passes through then list of entries for that interface in
|
||||||
<ulink url="/manpages/shorewall-maclist.html">shorewall-maclist</ulink>(5). If
|
<ulink
|
||||||
there is a match then the source IP address is added to the 'Recent'
|
url="/manpages/shorewall-maclist.html">shorewall-maclist</ulink>(5).
|
||||||
set for that interface. Subsequent connection attempts from that IP
|
If there is a match then the source IP address is added to the
|
||||||
address occurring within $MACLIST_TTL seconds will be accepted
|
'Recent' set for that interface. Subsequent connection attempts from
|
||||||
without having to scan all of the entries. After $MACLIST_TTL from
|
that IP address occurring within $MACLIST_TTL seconds will be
|
||||||
the first accepted connection request from an IP address, the next
|
accepted without having to scan all of the entries. After
|
||||||
connection request from that IP address will be checked against the
|
$MACLIST_TTL from the first accepted connection request from an IP
|
||||||
entire list.</para>
|
address, the next connection request from that IP address will be
|
||||||
|
checked against the entire list.</para>
|
||||||
|
|
||||||
<para>If MACLIST_TTL is not specified or is specified as empty (e.g,
|
<para>If MACLIST_TTL is not specified or is specified as empty (e.g,
|
||||||
MACLIST_TTL="" or is specified as zero then 'maclist' lookups will
|
MACLIST_TTL="" or is specified as zero then 'maclist' lookups will
|
||||||
@ -2104,12 +2114,13 @@ LOG:info:,bar net fw</programlisting>
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>Added in Shorewall 4.4.27. Shorewall has traditionally
|
<para>Added in Shorewall 4.4.27. Shorewall has traditionally
|
||||||
ACCEPTed RELATED packets that don't match any rule in the RELATED
|
ACCEPTed RELATED packets that don't match any rule in the RELATED
|
||||||
section of <ulink url="/manpages/shorewall-rules.html">shorewall-rules</ulink>
|
section of <ulink
|
||||||
(5). Concern about the safety of this practice resulted in the
|
url="/manpages/shorewall-rules.html">shorewall-rules</ulink> (5).
|
||||||
addition of this option. When a packet in RELATED state fails to
|
Concern about the safety of this practice resulted in the addition
|
||||||
match any rule in the RELATED section, the packet is disposed of
|
of this option. When a packet in RELATED state fails to match any
|
||||||
based on this setting. The default value is ACCEPT for compatibility
|
rule in the RELATED section, the packet is disposed of based on this
|
||||||
with earlier versions.</para>
|
setting. The default value is ACCEPT for compatibility with earlier
|
||||||
|
versions.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -2120,9 +2131,9 @@ LOG:info:,bar net fw</programlisting>
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>Added in Shorewall 4.4.27. Packets in the related state that
|
<para>Added in Shorewall 4.4.27. Packets in the related state that
|
||||||
do not match any rule in the RELATED section of <ulink
|
do not match any rule in the RELATED section of <ulink
|
||||||
url="/manpages/shorewall-rules.html">shorewall-rules</ulink> (5) are logged at
|
url="/manpages/shorewall-rules.html">shorewall-rules</ulink> (5) are
|
||||||
this level. The default value is empty which means no logging is
|
logged at this level. The default value is empty which means no
|
||||||
performed.</para>
|
logging is performed.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -2203,7 +2214,8 @@ INLINE - - - ; -j REJECT
|
|||||||
<para>Added in Shorewall 4.4.10. The default is No. If set to Yes,
|
<para>Added in Shorewall 4.4.10. The default is No. If set to Yes,
|
||||||
at least one optional interface must be up in order for the firewall
|
at least one optional interface must be up in order for the firewall
|
||||||
to be in the started state. Intended to be used with the <ulink
|
to be in the started state. Intended to be used with the <ulink
|
||||||
url="/manpages/shorewall-init.html">Shorewall Init Package</ulink>.</para>
|
url="/manpages/shorewall-init.html">Shorewall Init
|
||||||
|
Package</ulink>.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -2266,17 +2278,17 @@ INLINE - - - ; -j REJECT
|
|||||||
<para>During <emphasis role="bold">shorewall star</emphasis>t, IP
|
<para>During <emphasis role="bold">shorewall star</emphasis>t, IP
|
||||||
addresses to be added as a consequence of ADD_IP_ALIASES=Yes and
|
addresses to be added as a consequence of ADD_IP_ALIASES=Yes and
|
||||||
ADD_SNAT_ALIASES=Yes are quietly deleted when <ulink
|
ADD_SNAT_ALIASES=Yes are quietly deleted when <ulink
|
||||||
url="/manpages/shorewall-nat.html">shorewall-nat</ulink>(5) and <ulink
|
url="/manpages/shorewall-nat.html">shorewall-nat</ulink>(5) and
|
||||||
url="/manpages/shorewall-masq.html">shorewall-masq</ulink>(5) are processed
|
<ulink url="/manpages/shorewall-masq.html">shorewall-masq</ulink>(5)
|
||||||
then are re-added later. This is done to help ensure that the
|
are processed then are re-added later. This is done to help ensure
|
||||||
addresses can be added with the specified labels but can have the
|
that the addresses can be added with the specified labels but can
|
||||||
undesirable side effect of causing routes to be quietly deleted.
|
have the undesirable side effect of causing routes to be quietly
|
||||||
When RETAIN_ALIASES is set to Yes, existing addresses will not be
|
deleted. When RETAIN_ALIASES is set to Yes, existing addresses will
|
||||||
deleted. Regardless of the setting of RETAIN_ALIASES, addresses
|
not be deleted. Regardless of the setting of RETAIN_ALIASES,
|
||||||
added during <emphasis role="bold">shorewall start</emphasis> are
|
addresses added during <emphasis role="bold">shorewall
|
||||||
still deleted at a subsequent <emphasis role="bold">shorewall
|
start</emphasis> are still deleted at a subsequent <emphasis
|
||||||
stop</emphasis> or <emphasis role="bold">shorewall
|
role="bold">shorewall stop</emphasis> or <emphasis
|
||||||
restart</emphasis>.</para>
|
role="bold">shorewall restart</emphasis>.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -2374,9 +2386,9 @@ INLINE - - - ; -j REJECT
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>Added in Shorewall 4.4.20. Determines the disposition of
|
<para>Added in Shorewall 4.4.20. Determines the disposition of
|
||||||
packets matching the <option>sfilter</option> option (see <ulink
|
packets matching the <option>sfilter</option> option (see <ulink
|
||||||
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5)) and
|
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5))
|
||||||
of <firstterm>hairpin</firstterm> packets on interfaces without the
|
and of <firstterm>hairpin</firstterm> packets on interfaces without
|
||||||
<option>routeback</option> option.<footnote>
|
the <option>routeback</option> option.<footnote>
|
||||||
<para>Hairpin packets are packets that are routed out of the
|
<para>Hairpin packets are packets that are routed out of the
|
||||||
same interface that they arrived on.</para>
|
same interface that they arrived on.</para>
|
||||||
</footnote> interfaces without the routeback option.</para>
|
</footnote> interfaces without the routeback option.</para>
|
||||||
@ -2390,9 +2402,9 @@ INLINE - - - ; -j REJECT
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>Added on Shorewall 4.4.20. Determines the logging of packets
|
<para>Added on Shorewall 4.4.20. Determines the logging of packets
|
||||||
matching the <option>sfilter</option> option (see <ulink
|
matching the <option>sfilter</option> option (see <ulink
|
||||||
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5)) and
|
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5))
|
||||||
of <firstterm>hairpin</firstterm> packets on interfaces without the
|
and of <firstterm>hairpin</firstterm> packets on interfaces without
|
||||||
<option>routeback</option> option.<footnote>
|
the <option>routeback</option> option.<footnote>
|
||||||
<para>Hairpin packets are packets that are routed out of the
|
<para>Hairpin packets are packets that are routed out of the
|
||||||
same interface that they arrived on.</para>
|
same interface that they arrived on.</para>
|
||||||
</footnote> interfaces without the routeback option. The default
|
</footnote> interfaces without the routeback option. The default
|
||||||
@ -2421,9 +2433,9 @@ INLINE - - - ; -j REJECT
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>Added in Shorewall 4.4.20. The default setting is DROP which
|
<para>Added in Shorewall 4.4.20. The default setting is DROP which
|
||||||
causes smurf packets (see the nosmurfs option in <ulink
|
causes smurf packets (see the nosmurfs option in <ulink
|
||||||
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5)) to
|
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5))
|
||||||
be dropped. A_DROP causes the packets to be audited prior to being
|
to be dropped. A_DROP causes the packets to be audited prior to
|
||||||
dropped and requires AUDIT_TARGET support in the kernel and
|
being dropped and requires AUDIT_TARGET support in the kernel and
|
||||||
iptables.</para>
|
iptables.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -2435,8 +2447,8 @@ INLINE - - - ; -j REJECT
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>Specifies the logging level for smurf packets (see the
|
<para>Specifies the logging level for smurf packets (see the
|
||||||
nosmurfs option in <ulink
|
nosmurfs option in <ulink
|
||||||
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5)). If
|
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5)).
|
||||||
set to the empty value ( SMURF_LOG_LEVEL="" ) then smurfs are not
|
If set to the empty value ( SMURF_LOG_LEVEL="" ) then smurfs are not
|
||||||
logged.</para>
|
logged.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -2525,7 +2537,8 @@ INLINE - - - ; -j REJECT
|
|||||||
<para>If you set TC_ENABLED=Simple (Shorewall 4.4.6 and later),
|
<para>If you set TC_ENABLED=Simple (Shorewall 4.4.6 and later),
|
||||||
simple traffic shaping using <ulink
|
simple traffic shaping using <ulink
|
||||||
url="/manpages/shorewall-tcinterfaces.html">shorewall-tcinterfaces</ulink>(5)
|
url="/manpages/shorewall-tcinterfaces.html">shorewall-tcinterfaces</ulink>(5)
|
||||||
and <ulink url="/manpages/shorewall-tcpri.html">shorewall-tcpri</ulink>(5) is
|
and <ulink
|
||||||
|
url="/manpages/shorewall-tcpri.html">shorewall-tcpri</ulink>(5) is
|
||||||
enabled.</para>
|
enabled.</para>
|
||||||
|
|
||||||
<para>If you set TC_ENABLED=Internal or internal or leave the option
|
<para>If you set TC_ENABLED=Internal or internal or leave the option
|
||||||
@ -2589,10 +2602,10 @@ INLINE - - - ; -j REJECT
|
|||||||
<para>Determines the disposition of TCP packets that fail the checks
|
<para>Determines the disposition of TCP packets that fail the checks
|
||||||
enabled by the <emphasis role="bold">tcpflags</emphasis> interface
|
enabled by the <emphasis role="bold">tcpflags</emphasis> interface
|
||||||
option (see <ulink
|
option (see <ulink
|
||||||
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5)) and
|
url="/manpages/shorewall-interfaces.html">shorewall-interfaces</ulink>(5))
|
||||||
must have a value of ACCEPT (accept the packet), REJECT (send an RST
|
and must have a value of ACCEPT (accept the packet), REJECT (send an
|
||||||
response) or DROP (ignore the packet). If not set or if set to the
|
RST response) or DROP (ignore the packet). If not set or if set to
|
||||||
empty value (e.g., TCP_FLAGS_DISPOSITION="") then
|
the empty value (e.g., TCP_FLAGS_DISPOSITION="") then
|
||||||
TCP_FLAGS_DISPOSITION=DROP is assumed.</para>
|
TCP_FLAGS_DISPOSITION=DROP is assumed.</para>
|
||||||
|
|
||||||
<para>A_DROP and A_REJECT are audited versions of DROP and REJECT
|
<para>A_DROP and A_REJECT are audited versions of DROP and REJECT
|
||||||
@ -2621,8 +2634,8 @@ INLINE - - - ; -j REJECT
|
|||||||
<para>Added in Shorewall 4.4.3. When set to Yes, causes the
|
<para>Added in Shorewall 4.4.3. When set to Yes, causes the
|
||||||
<option>track</option> option to be assumed on all providers defined
|
<option>track</option> option to be assumed on all providers defined
|
||||||
in <ulink
|
in <ulink
|
||||||
url="/manpages/shorewall-providers.html">shorewall-providers</ulink>(5). May
|
url="/manpages/shorewall-providers.html">shorewall-providers</ulink>(5).
|
||||||
be overridden on an individual provider through use of the
|
May be overridden on an individual provider through use of the
|
||||||
<option>notrack</option> option. The default value is 'No'.</para>
|
<option>notrack</option> option. The default value is 'No'.</para>
|
||||||
|
|
||||||
<para>Beginning in Shorewall 4.4.6, setting this option to 'Yes'
|
<para>Beginning in Shorewall 4.4.6, setting this option to 'Yes'
|
||||||
@ -2669,10 +2682,10 @@ INLINE - - - ; -j REJECT
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>Added in Shorewall 4.5.13. Shorewall has traditionally passed
|
<para>Added in Shorewall 4.5.13. Shorewall has traditionally passed
|
||||||
UNTRACKED packets through the NEW section of <ulink
|
UNTRACKED packets through the NEW section of <ulink
|
||||||
url="/manpages/shorewall-rules.html">shorewall-rules</ulink> (5). When a
|
url="/manpages/shorewall-rules.html">shorewall-rules</ulink> (5).
|
||||||
packet in UNTRACKED state fails to match any rule in the UNTRACKED
|
When a packet in UNTRACKED state fails to match any rule in the
|
||||||
section, the packet is disposed of based on this setting. The
|
UNTRACKED section, the packet is disposed of based on this setting.
|
||||||
default value is CONTINUE for compatibility with earlier
|
The default value is CONTINUE for compatibility with earlier
|
||||||
versions.</para>
|
versions.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -2684,9 +2697,9 @@ INLINE - - - ; -j REJECT
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>Added in Shorewall 4.5.13. Packets in the UNTRACKED state that
|
<para>Added in Shorewall 4.5.13. Packets in the UNTRACKED state that
|
||||||
do not match any rule in the UNTRACKED section of <ulink
|
do not match any rule in the UNTRACKED section of <ulink
|
||||||
url="/manpages/shorewall-rules.html">shorewall-rules</ulink> (5) are logged at
|
url="/manpages/shorewall-rules.html">shorewall-rules</ulink> (5) are
|
||||||
this level. The default value is empty which means no logging is
|
logged at this level. The default value is empty which means no
|
||||||
performed.</para>
|
logging is performed.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -2708,8 +2721,8 @@ INLINE - - - ; -j REJECT
|
|||||||
<orderedlist>
|
<orderedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Both the DUPLICATE and the COPY columns in <ulink
|
<para>Both the DUPLICATE and the COPY columns in <ulink
|
||||||
url="/manpages/shorewall-providers.html">providers</ulink>(5) file must
|
url="/manpages/shorewall-providers.html">providers</ulink>(5)
|
||||||
remain empty (or contain "-").</para>
|
file must remain empty (or contain "-").</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
@ -2725,9 +2738,9 @@ INLINE - - - ; -j REJECT
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>Packets are sent through the main routing table by a rule
|
<para>Packets are sent through the main routing table by a rule
|
||||||
with priority 999. In <ulink
|
with priority 999. In <ulink
|
||||||
url="/manpages/shorewall-routing_rules.html">routing_rules</ulink>(5), the
|
url="/manpages/shorewall-routing_rules.html">routing_rules</ulink>(5),
|
||||||
range 1-998 may be used for inserting rules that bypass the main
|
the range 1-998 may be used for inserting rules that bypass the
|
||||||
table.</para>
|
main table.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-lite-vardir</refentrytitle>
|
<refentrytitle>shorewall6-lite-vardir</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-lite.conf</refentrytitle>
|
<refentrytitle>shorewall6-lite.conf</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-lite</refentrytitle>
|
<refentrytitle>shorewall6-lite</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>8</manvolnum>
|
<manvolnum>8</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Administrative Commands</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-accounting</refentrytitle>
|
<refentrytitle>shorewall6-accounting</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-actions</refentrytitle>
|
<refentrytitle>shorewall6-actions</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -24,8 +26,9 @@
|
|||||||
<title>Description</title>
|
<title>Description</title>
|
||||||
|
|
||||||
<para>This file allows you to define new ACTIONS for use in rules (see
|
<para>This file allows you to define new ACTIONS for use in rules (see
|
||||||
<ulink url="/manpages6/shorewall6-rules.html">shorewall6-rules(5)</ulink>). You define
|
<ulink
|
||||||
the ip6tables rules to be performed in an ACTION in
|
url="/manpages6/shorewall6-rules.html">shorewall6-rules(5)</ulink>). You
|
||||||
|
define the ip6tables rules to be performed in an ACTION in
|
||||||
/etc/shorewall6/action.<emphasis>action-name</emphasis>.</para>
|
/etc/shorewall6/action.<emphasis>action-name</emphasis>.</para>
|
||||||
|
|
||||||
<para>Columns are:</para>
|
<para>Columns are:</para>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-blacklist</refentrytitle>
|
<refentrytitle>shorewall6-blacklist</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -26,10 +28,11 @@
|
|||||||
<para>The blacklist file is used to perform static blacklisting by source
|
<para>The blacklist file is used to perform static blacklisting by source
|
||||||
address (IP or MAC), or by application. The use of this file is deprecated
|
address (IP or MAC), or by application. The use of this file is deprecated
|
||||||
in favor of <ulink
|
in favor of <ulink
|
||||||
url="/manpages6/shorewall6-blrules.html">shorewall6-blrules</ulink>(5), and beginning
|
url="/manpages6/shorewall6-blrules.html">shorewall6-blrules</ulink>(5),
|
||||||
with Shorewall 4.5.7, the blacklist file is no longer installed. Existing
|
and beginning with Shorewall 4.5.7, the blacklist file is no longer
|
||||||
blacklist files can be converted to a corresponding blrules file using the
|
installed. Existing blacklist files can be converted to a corresponding
|
||||||
<command>shorewall6 update -b</command> command.</para>
|
blrules file using the <command>shorewall6 update -b</command>
|
||||||
|
command.</para>
|
||||||
|
|
||||||
<para>The columns in the file are as follows (where the column name is
|
<para>The columns in the file are as follows (where the column name is
|
||||||
followed by a different name in parentheses, the different name is used in
|
followed by a different name in parentheses, the different name is used in
|
||||||
@ -47,8 +50,8 @@
|
|||||||
(if your kernel and ip6tables contain iprange match support) or
|
(if your kernel and ip6tables contain iprange match support) or
|
||||||
ipset name prefaced by "+" (if your kernel supports ipset match).
|
ipset name prefaced by "+" (if your kernel supports ipset match).
|
||||||
Exclusion (<ulink
|
Exclusion (<ulink
|
||||||
url="/manpages6/shorewall6-exclusion.html">shorewall6-exclusion</ulink>(5)) is
|
url="/manpages6/shorewall6-exclusion.html">shorewall6-exclusion</ulink>(5))
|
||||||
supported.</para>
|
is supported.</para>
|
||||||
|
|
||||||
<para>MAC addresses must be prefixed with "~" and use "-" as a
|
<para>MAC addresses must be prefixed with "~" and use "-" as a
|
||||||
separator.</para>
|
separator.</para>
|
||||||
@ -145,13 +148,13 @@
|
|||||||
|
|
||||||
<para>When a packet arrives on an interface that has the <emphasis
|
<para>When a packet arrives on an interface that has the <emphasis
|
||||||
role="bold">blacklist</emphasis> option specified in <ulink
|
role="bold">blacklist</emphasis> option specified in <ulink
|
||||||
url="/manpages6/shorewall6-interfaces.html">shorewall6-interfaces</ulink>(5), its
|
url="/manpages6/shorewall6-interfaces.html">shorewall6-interfaces</ulink>(5),
|
||||||
source IP address and MAC address is checked against this file and
|
its source IP address and MAC address is checked against this file and
|
||||||
disposed of according to the <emphasis
|
disposed of according to the <emphasis
|
||||||
role="bold">BLACKLIST_DISPOSITION</emphasis> and <emphasis
|
role="bold">BLACKLIST_DISPOSITION</emphasis> and <emphasis
|
||||||
role="bold">BLACKLIST_LOGLEVEL</emphasis> variables in <ulink
|
role="bold">BLACKLIST_LOGLEVEL</emphasis> variables in <ulink
|
||||||
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5). If <emphasis
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5). If
|
||||||
role="bold">PROTOCOL</emphasis> or <emphasis
|
<emphasis role="bold">PROTOCOL</emphasis> or <emphasis
|
||||||
role="bold">PROTOCOL</emphasis> and <emphasis role="bold">PORTS</emphasis>
|
role="bold">PROTOCOL</emphasis> and <emphasis role="bold">PORTS</emphasis>
|
||||||
are supplied, only packets matching the protocol (and one of the ports if
|
are supplied, only packets matching the protocol (and one of the ports if
|
||||||
<emphasis role="bold">PORTS</emphasis> supplied) are blocked.</para>
|
<emphasis role="bold">PORTS</emphasis> supplied) are blocked.</para>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-blrules</refentrytitle>
|
<refentrytitle>shorewall6-blrules</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -34,7 +36,8 @@
|
|||||||
connections in the NEW and INVALID states.</para>
|
connections in the NEW and INVALID states.</para>
|
||||||
|
|
||||||
<para>The format of rules in this file is the same as the format of rules
|
<para>The format of rules in this file is the same as the format of rules
|
||||||
in <ulink url="/manpages6/shorewall6-rules.html">shorewall6-rules</ulink>(5). The
|
in <ulink
|
||||||
|
url="/manpages6/shorewall6-rules.html">shorewall6-rules</ulink>(5). The
|
||||||
difference in the two files lies in the ACTION (first) column.</para>
|
difference in the two files lies in the ACTION (first) column.</para>
|
||||||
|
|
||||||
<variablelist>
|
<variablelist>
|
||||||
@ -89,10 +92,11 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>May only be used if BLACKLIST_LOGLEVEL is specified in
|
<para>May only be used if BLACKLIST_LOGLEVEL is specified in
|
||||||
<ulink url="/manpages6/shorewall6.conf.html">shorewall6.conf </ulink>(5).
|
<ulink url="/manpages6/shorewall6.conf.html">shorewall6.conf
|
||||||
Logs, audits (if specified) and applies the
|
</ulink>(5). Logs, audits (if specified) and applies the
|
||||||
BLACKLIST_DISPOSITION specified in <ulink
|
BLACKLIST_DISPOSITION specified in <ulink
|
||||||
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink> (5).</para>
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>
|
||||||
|
(5).</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -206,8 +210,8 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>The name of an <emphasis>action</emphasis> declared in
|
<para>The name of an <emphasis>action</emphasis> declared in
|
||||||
<ulink
|
<ulink
|
||||||
url="/manpages6/shorewall6-actions.html">shorewall6-actions</ulink>(5) or
|
url="/manpages6/shorewall6-actions.html">shorewall6-actions</ulink>(5)
|
||||||
in /usr/share/shorewall6/actions.std.</para>
|
or in /usr/share/shorewall6/actions.std.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -238,8 +242,8 @@
|
|||||||
|
|
||||||
<para>If the <emphasis role="bold">ACTION</emphasis> names an
|
<para>If the <emphasis role="bold">ACTION</emphasis> names an
|
||||||
<emphasis>action</emphasis> declared in <ulink
|
<emphasis>action</emphasis> declared in <ulink
|
||||||
url="/manpages6/shorewall6-actions.html">shorewall6-actions</ulink>(5) or in
|
url="/manpages6/shorewall6-actions.html">shorewall6-actions</ulink>(5)
|
||||||
/usr/share/shorewall6/actions.std then:</para>
|
or in /usr/share/shorewall6/actions.std then:</para>
|
||||||
|
|
||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
@ -274,7 +278,8 @@
|
|||||||
</variablelist>
|
</variablelist>
|
||||||
|
|
||||||
<para>For the remaining columns, see <ulink
|
<para>For the remaining columns, see <ulink
|
||||||
url="/manpages6/shorewall6-rules.html">shorewall6-rules (5)</ulink>.</para>
|
url="/manpages6/shorewall6-rules.html">shorewall6-rules
|
||||||
|
(5)</ulink>.</para>
|
||||||
</refsect1>
|
</refsect1>
|
||||||
|
|
||||||
<refsect1>
|
<refsect1>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-conntrack</refentrytitle>
|
<refentrytitle>shorewall6-conntrack</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -357,7 +359,8 @@
|
|||||||
<para>Where <replaceable>interface</replaceable> is an interface to
|
<para>Where <replaceable>interface</replaceable> is an interface to
|
||||||
that zone, and <replaceable>address-list</replaceable> is a
|
that zone, and <replaceable>address-list</replaceable> is a
|
||||||
comma-separated list of addresses (may contain exclusion - see
|
comma-separated list of addresses (may contain exclusion - see
|
||||||
<ulink url="/manpages6/shorewall6-exclusion.html">shorewall6-exclusion</ulink>
|
<ulink
|
||||||
|
url="/manpages6/shorewall6-exclusion.html">shorewall6-exclusion</ulink>
|
||||||
(5)).</para>
|
(5)).</para>
|
||||||
|
|
||||||
<para>COMMENT is only allowed in format 1; the remainder of the line
|
<para>COMMENT is only allowed in format 1; the remainder of the line
|
||||||
@ -373,7 +376,8 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>where <replaceable>address-list</replaceable> is a
|
<para>where <replaceable>address-list</replaceable> is a
|
||||||
comma-separated list of addresses (may contain exclusion - see
|
comma-separated list of addresses (may contain exclusion - see
|
||||||
<ulink url="/manpages6/shorewall6-exclusion.html">shorewall6-exclusion</ulink>
|
<ulink
|
||||||
|
url="/manpages6/shorewall6-exclusion.html">shorewall6-exclusion</ulink>
|
||||||
(5)).</para>
|
(5)).</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-exclusion</refentrytitle>
|
<refentrytitle>shorewall6-exclusion</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -103,10 +105,11 @@ ACCEPT all!z2 net tcp 22</programlisting>
|
|||||||
|
|
||||||
<para>shorewall6(8), shorewall6-accounting(5), shorewall6-actions(5),
|
<para>shorewall6(8), shorewall6-accounting(5), shorewall6-actions(5),
|
||||||
shorewall6-blacklist(5), shorewall6-hosts(5), shorewall6-interfaces(5),
|
shorewall6-blacklist(5), shorewall6-hosts(5), shorewall6-interfaces(5),
|
||||||
shorewall6-maclist(5), shorewall6-netmap(5),shorewall6-params(5), shorewall6-policy(5),
|
shorewall6-maclist(5), shorewall6-netmap(5),shorewall6-params(5),
|
||||||
shorewall6-providers(5), shorewall6-rtrules(5),
|
shorewall6-policy(5), shorewall6-providers(5), shorewall6-rtrules(5),
|
||||||
shorewall6-routestopped(5), shorewall6-rules(5), shorewall6.conf(5), shorewall6-secmarks(5),
|
shorewall6-routestopped(5), shorewall6-rules(5), shorewall6.conf(5),
|
||||||
shorewall6-tcclasses(5), shorewall6-tcdevices(5), shorewall6-mangle(5),
|
shorewall6-secmarks(5), shorewall6-tcclasses(5), shorewall6-tcdevices(5),
|
||||||
shorewall6-tos(5), shorewall6-tunnels(5), shorewall-zones(5)</para>
|
shorewall6-mangle(5), shorewall6-tos(5), shorewall6-tunnels(5),
|
||||||
|
shorewall-zones(5)</para>
|
||||||
</refsect1>
|
</refsect1>
|
||||||
</refentry>
|
</refentry>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-hosts</refentrytitle>
|
<refentrytitle>shorewall6-hosts</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -29,8 +31,9 @@
|
|||||||
|
|
||||||
<para>The order of entries in this file is not significant in determining
|
<para>The order of entries in this file is not significant in determining
|
||||||
zone composition. Rather, the order that the zones are declared in <ulink
|
zone composition. Rather, the order that the zones are declared in <ulink
|
||||||
url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink>(5) determines the
|
url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink>(5)
|
||||||
order in which the records in this file are interpreted.</para>
|
determines the order in which the records in this file are
|
||||||
|
interpreted.</para>
|
||||||
|
|
||||||
<warning>
|
<warning>
|
||||||
<para>The only time that you need this file is when you have more than
|
<para>The only time that you need this file is when you have more than
|
||||||
@ -39,9 +42,9 @@
|
|||||||
|
|
||||||
<warning>
|
<warning>
|
||||||
<para>If you have an entry for a zone and interface in <ulink
|
<para>If you have an entry for a zone and interface in <ulink
|
||||||
url="/manpages6/shorewall6-interfaces.html">shorewall6-interfaces</ulink>(5) then do
|
url="/manpages6/shorewall6-interfaces.html">shorewall6-interfaces</ulink>(5)
|
||||||
not include any entries in this file for that same (zone, interface)
|
then do not include any entries in this file for that same (zone,
|
||||||
pair.</para>
|
interface) pair.</para>
|
||||||
</warning>
|
</warning>
|
||||||
|
|
||||||
<para>The columns in the file are as follows (where the column name is
|
<para>The columns in the file are as follows (where the column name is
|
||||||
@ -55,8 +58,8 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>The name of a zone declared in <ulink
|
<para>The name of a zone declared in <ulink
|
||||||
url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink>(5). You may not
|
url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink>(5).
|
||||||
list the firewall zone in this column.</para>
|
You may not list the firewall zone in this column.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -137,8 +140,8 @@
|
|||||||
<para>The zone is accessed via a kernel 2.6 ipsec SA. Note
|
<para>The zone is accessed via a kernel 2.6 ipsec SA. Note
|
||||||
that if the zone named in the ZONE column is specified as an
|
that if the zone named in the ZONE column is specified as an
|
||||||
IPSEC zone in the <ulink
|
IPSEC zone in the <ulink
|
||||||
url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink>(5) file
|
url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink>(5)
|
||||||
then you do NOT need to specify the 'ipsec' option
|
file then you do NOT need to specify the 'ipsec' option
|
||||||
here.</para>
|
here.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-interfaces</refentrytitle>
|
<refentrytitle>shorewall6-interfaces</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -71,7 +73,8 @@
|
|||||||
zone in this column.</para>
|
zone in this column.</para>
|
||||||
|
|
||||||
<para>If the interface serves multiple zones that will be defined in
|
<para>If the interface serves multiple zones that will be defined in
|
||||||
the <ulink url="/manpages6/shorewall6-hosts.html">shorewall6-hosts</ulink>(5)
|
the <ulink
|
||||||
|
url="/manpages6/shorewall6-hosts.html">shorewall6-hosts</ulink>(5)
|
||||||
file, you should place "-" in this column.</para>
|
file, you should place "-" in this column.</para>
|
||||||
|
|
||||||
<para>If there are multiple interfaces to the same zone, you must
|
<para>If there are multiple interfaces to the same zone, you must
|
||||||
@ -115,8 +118,8 @@ loc eth2 -</programlisting>
|
|||||||
|
|
||||||
<para>Care must be exercised when using wildcards where there is
|
<para>Care must be exercised when using wildcards where there is
|
||||||
another zone that uses a matching specific interface. See <ulink
|
another zone that uses a matching specific interface. See <ulink
|
||||||
url="/manpages6/shorewall6-nesting.html">shorewall6-nesting</ulink>(5) for a
|
url="/manpages6/shorewall6-nesting.html">shorewall6-nesting</ulink>(5)
|
||||||
discussion of this problem.</para>
|
for a discussion of this problem.</para>
|
||||||
|
|
||||||
<para>Shorewall6 allows '+' as an interface name.</para>
|
<para>Shorewall6 allows '+' as an interface name.</para>
|
||||||
|
|
||||||
@ -270,8 +273,8 @@ loc eth2 -</programlisting>
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>the interface is a <ulink
|
<para>the interface is a <ulink
|
||||||
url="/SimpleBridge.html">simple bridge</ulink> with a
|
url="/SimpleBridge.html">simple bridge</ulink> with a DHCP
|
||||||
DHCP server on one port and DHCP clients on another
|
server on one port and DHCP clients on another
|
||||||
port.</para>
|
port.</para>
|
||||||
|
|
||||||
<note>
|
<note>
|
||||||
@ -501,7 +504,7 @@ loc eth2 -</programlisting>
|
|||||||
according to the setting of TCP_FLAGS_LOG_LEVEL.</para>
|
according to the setting of TCP_FLAGS_LOG_LEVEL.</para>
|
||||||
|
|
||||||
<para>Beginning with Shorewall 4.6.0, tcpflags=1 is the
|
<para>Beginning with Shorewall 4.6.0, tcpflags=1 is the
|
||||||
default. To disable this option, specify tcpflags=0. </para>
|
default. To disable this option, specify tcpflags=0.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall-ipsets</refentrytitle>
|
<refentrytitle>shorewall-ipsets</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -78,7 +80,8 @@
|
|||||||
specified, matching packets must match all of the listed sets.</para>
|
specified, matching packets must match all of the listed sets.</para>
|
||||||
|
|
||||||
<para>For information about set lists and exclusion, see <ulink
|
<para>For information about set lists and exclusion, see <ulink
|
||||||
url="/manpages6/shorewall6-exclusion.html">shorewall6-exclusion</ulink> (5).</para>
|
url="/manpages6/shorewall6-exclusion.html">shorewall6-exclusion</ulink>
|
||||||
|
(5).</para>
|
||||||
|
|
||||||
<para>Beginning with Shorewall 4.5.16, you can increment one or more
|
<para>Beginning with Shorewall 4.5.16, you can increment one or more
|
||||||
nfacct objects each time a packet matches an ipset. You do that by listing
|
nfacct objects each time a packet matches an ipset. You do that by listing
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-maclist</refentrytitle>
|
<refentrytitle>shorewall6-maclist</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -27,8 +29,9 @@
|
|||||||
associated IPv6 addresses to be allowed to use the specified interface.
|
associated IPv6 addresses to be allowed to use the specified interface.
|
||||||
The feature is enabled by using the <emphasis
|
The feature is enabled by using the <emphasis
|
||||||
role="bold">maclist</emphasis> option in the <ulink
|
role="bold">maclist</emphasis> option in the <ulink
|
||||||
url="/manpages6/shorewall6-interfaces.html">shorewall6-interfaces</ulink>(5) or
|
url="/manpages6/shorewall6-interfaces.html">shorewall6-interfaces</ulink>(5)
|
||||||
<ulink url="/manpages6/shorewall6-hosts.html">shorewall6-hosts</ulink>(5)
|
or <ulink
|
||||||
|
url="/manpages6/shorewall6-hosts.html">shorewall6-hosts</ulink>(5)
|
||||||
configuration file.</para>
|
configuration file.</para>
|
||||||
|
|
||||||
<para>The columns in the file are as follows.</para>
|
<para>The columns in the file are as follows.</para>
|
||||||
@ -43,8 +46,8 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para><emphasis role="bold">ACCEPT</emphasis> or <emphasis
|
<para><emphasis role="bold">ACCEPT</emphasis> or <emphasis
|
||||||
role="bold">DROP</emphasis> (if MACLIST_TABLE=filter in <ulink
|
role="bold">DROP</emphasis> (if MACLIST_TABLE=filter in <ulink
|
||||||
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5), then REJECT
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5),
|
||||||
is also allowed). If specified, the
|
then REJECT is also allowed). If specified, the
|
||||||
<replaceable>log-level</replaceable> causes packets matching the
|
<replaceable>log-level</replaceable> causes packets matching the
|
||||||
rule to be logged at that level.</para>
|
rule to be logged at that level.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-mangle</refentrytitle>
|
<refentrytitle>shorewall6-mangle</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -25,13 +27,14 @@
|
|||||||
|
|
||||||
<para>This file was introduced in Shorewall 4.6.0 and is intended to
|
<para>This file was introduced in Shorewall 4.6.0 and is intended to
|
||||||
replace <ulink
|
replace <ulink
|
||||||
url="/manpages6/shorewall6-tcrules.html">shorewall6-tcrules(5)</ulink>. This file is
|
url="/manpages6/shorewall6-tcrules.html">shorewall6-tcrules(5)</ulink>.
|
||||||
only processed by the compiler if:</para>
|
This file is only processed by the compiler if:</para>
|
||||||
|
|
||||||
<orderedlist numeration="loweralpha">
|
<orderedlist numeration="loweralpha">
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>No file named 'tcrules' exists on the current CONFIG_PATH (see
|
<para>No file named 'tcrules' exists on the current CONFIG_PATH (see
|
||||||
<ulink url="/manpages6/shorewall6.conf.html">shorewall6.conf(5)</ulink>);
|
<ulink
|
||||||
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf(5)</ulink>);
|
||||||
or</para>
|
or</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
@ -46,10 +49,10 @@
|
|||||||
|
|
||||||
<important>
|
<important>
|
||||||
<para>Unlike rules in the <ulink
|
<para>Unlike rules in the <ulink
|
||||||
url="/manpages6/shorewall6-rules.html">shorewall6-rules</ulink>(5) file, evaluation
|
url="/manpages6/shorewall6-rules.html">shorewall6-rules</ulink>(5) file,
|
||||||
of rules in this file will continue after a match. So the final mark for
|
evaluation of rules in this file will continue after a match. So the
|
||||||
each packet will be the one assigned by the LAST tcrule that
|
final mark for each packet will be the one assigned by the LAST tcrule
|
||||||
matches.</para>
|
that matches.</para>
|
||||||
|
|
||||||
<para>If you use multiple internet providers with the 'track' option, in
|
<para>If you use multiple internet providers with the 'track' option, in
|
||||||
/etc/shorewall/providers be sure to read the restrictions at <ulink
|
/etc/shorewall/providers be sure to read the restrictions at <ulink
|
||||||
@ -106,8 +109,8 @@
|
|||||||
<para>Unless otherwise specified for the particular
|
<para>Unless otherwise specified for the particular
|
||||||
<replaceable>command</replaceable>, the default chain is PREROUTING
|
<replaceable>command</replaceable>, the default chain is PREROUTING
|
||||||
when MARK_IN_FORWARD_CHAIN=No in <ulink
|
when MARK_IN_FORWARD_CHAIN=No in <ulink
|
||||||
url="/manpages6/shorewall6.conf.html">shorewall6.conf(5)</ulink>, and FORWARD
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf(5)</ulink>,
|
||||||
when MARK_IN_FORWARD_CHAIN=Yes.</para>
|
and FORWARD when MARK_IN_FORWARD_CHAIN=Yes.</para>
|
||||||
|
|
||||||
<para>A chain-designator may not be specified if the SOURCE or DEST
|
<para>A chain-designator may not be specified if the SOURCE or DEST
|
||||||
columns begin with '$FW'. When the SOURCE is $FW, the generated rule
|
columns begin with '$FW'. When the SOURCE is $FW, the generated rule
|
||||||
@ -312,8 +315,8 @@ INLINE eth0 - ; -p tcp -j MARK --set-mark
|
|||||||
</programlisting>
|
</programlisting>
|
||||||
|
|
||||||
<para>If INLINE_MATCHES=Yes in <ulink
|
<para>If INLINE_MATCHES=Yes in <ulink
|
||||||
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5) then the
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5)
|
||||||
third rule above can be specified as follows:</para>
|
then the third rule above can be specified as follows:</para>
|
||||||
|
|
||||||
<programlisting>2:P eth0 - ; -p tcp</programlisting>
|
<programlisting>2:P eth0 - ; -p tcp</programlisting>
|
||||||
</listitem>
|
</listitem>
|
||||||
@ -731,9 +734,9 @@ Normal-Service => 0x00</programlisting>
|
|||||||
<para>An interface name. May not be used in the PREROUTING chain
|
<para>An interface name. May not be used in the PREROUTING chain
|
||||||
(:P in the mark column or no chain qualifier and
|
(:P in the mark column or no chain qualifier and
|
||||||
MARK_IN_FORWARD_CHAIN=No in <ulink
|
MARK_IN_FORWARD_CHAIN=No in <ulink
|
||||||
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink> (5)). The
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>
|
||||||
interface name may be optionally followed by a colon (":") and
|
(5)). The interface name may be optionally followed by a colon
|
||||||
an IP address list.</para>
|
(":") and an IP address list.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-masq</refentrytitle>
|
<refentrytitle>shorewall6-masq</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -35,10 +37,10 @@
|
|||||||
<para>If you have more than one ISP link, adding entries to this file
|
<para>If you have more than one ISP link, adding entries to this file
|
||||||
will <emphasis role="bold">not</emphasis> force connections to go out
|
will <emphasis role="bold">not</emphasis> force connections to go out
|
||||||
through a particular link. You must use entries in <ulink
|
through a particular link. You must use entries in <ulink
|
||||||
url="/manpages6/shorewall6-rtrules.html">shorewall6-rtrules</ulink>(5) or
|
url="/manpages6/shorewall6-rtrules.html">shorewall6-rtrules</ulink>(5)
|
||||||
PREROUTING entries in <ulink
|
or PREROUTING entries in <ulink
|
||||||
url="/manpages6/shorewall6-tcrules.html">shorewall-tcrules</ulink>(5) to do
|
url="/manpages6/shorewall6-tcrules.html">shorewall-tcrules</ulink>(5) to
|
||||||
that.</para>
|
do that.</para>
|
||||||
</warning>
|
</warning>
|
||||||
|
|
||||||
<para>The columns in the file are as follows.</para>
|
<para>The columns in the file are as follows.</para>
|
||||||
@ -65,10 +67,9 @@
|
|||||||
entry that defines <filename
|
entry that defines <filename
|
||||||
class="devicefile">ppp+</filename>.</para>
|
class="devicefile">ppp+</filename>.</para>
|
||||||
|
|
||||||
<para>Where <ulink
|
<para>Where <ulink url="/4.4/MultiISP.html#Shared">more that one
|
||||||
url="/4.4/MultiISP.html#Shared">more that
|
internet provider share a single interface</ulink>, the provider is
|
||||||
one internet provider share a single interface</ulink>, the provider
|
specified by including the provider name or number in
|
||||||
is specified by including the provider name or number in
|
|
||||||
parentheses:</para>
|
parentheses:</para>
|
||||||
|
|
||||||
<programlisting> eth0(Avvanta)</programlisting>
|
<programlisting> eth0(Avvanta)</programlisting>
|
||||||
@ -81,8 +82,8 @@
|
|||||||
addresses to indicate that you only want to change the source IP
|
addresses to indicate that you only want to change the source IP
|
||||||
address for packets being sent to those particular destinations.
|
address for packets being sent to those particular destinations.
|
||||||
Exclusion is allowed (see <ulink
|
Exclusion is allowed (see <ulink
|
||||||
url="/manpages6/shorewall6-exclusion.html">shorewall6-exclusion</ulink>(5)) as
|
url="/manpages6/shorewall6-exclusion.html">shorewall6-exclusion</ulink>(5))
|
||||||
are ipset names preceded by a plus sign '+'.</para>
|
as are ipset names preceded by a plus sign '+'.</para>
|
||||||
|
|
||||||
<para>Comments may be attached to Netfilter rules generated from
|
<para>Comments may be attached to Netfilter rules generated from
|
||||||
entries in this file through the use of COMMENT lines. These lines
|
entries in this file through the use of COMMENT lines. These lines
|
||||||
@ -545,8 +546,8 @@
|
|||||||
</programlisting>
|
</programlisting>
|
||||||
|
|
||||||
<para>If INLINE_MATCHES=Yes in <ulink
|
<para>If INLINE_MATCHES=Yes in <ulink
|
||||||
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5), then these
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5),
|
||||||
rules may be specified as follows:</para>
|
then these rules may be specified as follows:</para>
|
||||||
|
|
||||||
<programlisting>/etc/shorewall/masq:
|
<programlisting>/etc/shorewall/masq:
|
||||||
|
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-modules</refentrytitle>
|
<refentrytitle>shorewall6-modules</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -30,8 +32,8 @@
|
|||||||
<para>These files specify which kernel modules shorewall6 will load before
|
<para>These files specify which kernel modules shorewall6 will load before
|
||||||
trying to determine your ip6tables/kernel's capabilities. The
|
trying to determine your ip6tables/kernel's capabilities. The
|
||||||
<filename>modules</filename> file is used when LOAD_HELPERS_ONLY=No in
|
<filename>modules</filename> file is used when LOAD_HELPERS_ONLY=No in
|
||||||
<ulink url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5); the
|
<ulink url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5);
|
||||||
<filename>helpers</filename> file is used when
|
the <filename>helpers</filename> file is used when
|
||||||
LOAD_HELPERS_ONLY=Yes.</para>
|
LOAD_HELPERS_ONLY=Yes.</para>
|
||||||
|
|
||||||
<para>Each record in the files has the following format:</para>
|
<para>Each record in the files has the following format:</para>
|
||||||
@ -86,8 +88,8 @@
|
|||||||
|
|
||||||
<para>shorewall6(8), shorewall6-accounting(5), shorewall6-actions(5),
|
<para>shorewall6(8), shorewall6-accounting(5), shorewall6-actions(5),
|
||||||
shorewall6-blacklist(5), shorewall6-hosts(5), shorewall6-interfaces(5),
|
shorewall6-blacklist(5), shorewall6-hosts(5), shorewall6-interfaces(5),
|
||||||
shorewall6-maclist(5), shorewall6-netmap(5),shorewall6-params(5), shorewall6-policy(5),
|
shorewall6-maclist(5), shorewall6-netmap(5),shorewall6-params(5),
|
||||||
shorewall6-providers(5), shorewall6-rtrules(5),
|
shorewall6-policy(5), shorewall6-providers(5), shorewall6-rtrules(5),
|
||||||
shorewall6-routestopped(5), shorewall6-rules(5), shorewall6.conf(5),
|
shorewall6-routestopped(5), shorewall6-rules(5), shorewall6.conf(5),
|
||||||
shorewall6-secmarks(5), shorewall6-tcclasses(5), shorewall6-tcdevices(5),
|
shorewall6-secmarks(5), shorewall6-tcclasses(5), shorewall6-tcdevices(5),
|
||||||
shorewall6-mangle(5), shorewall6-tos(5), shorewall6-tunnels(5),
|
shorewall6-mangle(5), shorewall6-tos(5), shorewall6-tunnels(5),
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-nesting</refentrytitle>
|
<refentrytitle>shorewall6-nesting</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -24,17 +26,18 @@
|
|||||||
<refsect1>
|
<refsect1>
|
||||||
<title>Description</title>
|
<title>Description</title>
|
||||||
|
|
||||||
<para>In <ulink url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink>(5), a
|
<para>In <ulink
|
||||||
zone may be declared to be a sub-zone of one or more other zones using the
|
url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink>(5), a zone
|
||||||
|
may be declared to be a sub-zone of one or more other zones using the
|
||||||
above syntax. The <replaceable>child-zone</replaceable> may be neither the
|
above syntax. The <replaceable>child-zone</replaceable> may be neither the
|
||||||
firewall zone nor a vserver zone. The firewall zone may not appear as a
|
firewall zone nor a vserver zone. The firewall zone may not appear as a
|
||||||
parent zone, although all vserver zones are handled as sub-zones of the
|
parent zone, although all vserver zones are handled as sub-zones of the
|
||||||
firewall zone.</para>
|
firewall zone.</para>
|
||||||
|
|
||||||
<para>Where zones are nested, the CONTINUE policy in <ulink
|
<para>Where zones are nested, the CONTINUE policy in <ulink
|
||||||
url="/manpages6/shorewall6-policy.html">shorewall6-policy</ulink>(5) allows hosts
|
url="/manpages6/shorewall6-policy.html">shorewall6-policy</ulink>(5)
|
||||||
that are within multiple zones to be managed under the rules of all of
|
allows hosts that are within multiple zones to be managed under the rules
|
||||||
these zones.</para>
|
of all of these zones.</para>
|
||||||
</refsect1>
|
</refsect1>
|
||||||
|
|
||||||
<refsect1>
|
<refsect1>
|
||||||
@ -74,7 +77,8 @@
|
|||||||
under rules where the source zone is net. It is important that this policy
|
under rules where the source zone is net. It is important that this policy
|
||||||
be listed BEFORE the next policy (net to all). You can have this policy
|
be listed BEFORE the next policy (net to all). You can have this policy
|
||||||
generated for you automatically by using the IMPLICIT_CONTINUE option in
|
generated for you automatically by using the IMPLICIT_CONTINUE option in
|
||||||
<ulink url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5).</para>
|
<ulink
|
||||||
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5).</para>
|
||||||
|
|
||||||
<para>Partial <filename>/etc/shorewall6/rules</filename>:</para>
|
<para>Partial <filename>/etc/shorewall6/rules</filename>:</para>
|
||||||
|
|
||||||
@ -109,10 +113,11 @@
|
|||||||
|
|
||||||
<para>shorewall6(8), shorewall6-accounting(5), shorewall6-actions(5),
|
<para>shorewall6(8), shorewall6-accounting(5), shorewall6-actions(5),
|
||||||
shorewall6-blacklist(5), shorewall6-hosts(5), shorewall6-interfaces(5),
|
shorewall6-blacklist(5), shorewall6-hosts(5), shorewall6-interfaces(5),
|
||||||
shorewall6-maclist(5), shorewall6-netmap(5),shorewall6-params(5), shorewall6-policy(5),
|
shorewall6-maclist(5), shorewall6-netmap(5),shorewall6-params(5),
|
||||||
shorewall6-providers(5), shorewall6-rtrules(5),
|
shorewall6-policy(5), shorewall6-providers(5), shorewall6-rtrules(5),
|
||||||
shorewall6-routestopped(5), shorewall6-rules(5), shorewall6.conf(5), shorewall6-secmarks(5),
|
shorewall6-routestopped(5), shorewall6-rules(5), shorewall6.conf(5),
|
||||||
shorewall6-tcclasses(5), shorewall6-tcdevices(5), shorewall6-mangle(5),
|
shorewall6-secmarks(5), shorewall6-tcclasses(5), shorewall6-tcdevices(5),
|
||||||
shorewall6-tos(5), shorewall6-tunnels(5), shorewall6-zones(5)</para>
|
shorewall6-mangle(5), shorewall6-tos(5), shorewall6-tunnels(5),
|
||||||
|
shorewall6-zones(5)</para>
|
||||||
</refsect1>
|
</refsect1>
|
||||||
</refentry>
|
</refentry>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-netmap</refentrytitle>
|
<refentrytitle>shorewall6-netmap</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -24,8 +26,7 @@
|
|||||||
<title>Description</title>
|
<title>Description</title>
|
||||||
|
|
||||||
<para>This file is used to map addresses in one network to corresponding
|
<para>This file is used to map addresses in one network to corresponding
|
||||||
addresses in a second network. It was added in Shorewall6
|
addresses in a second network. It was added in Shorewall6 4.4.23.3.</para>
|
||||||
4.4.23.3.</para>
|
|
||||||
|
|
||||||
<warning>
|
<warning>
|
||||||
<para>To use this file, your kernel and ip6tables must have RAWPOST
|
<para>To use this file, your kernel and ip6tables must have RAWPOST
|
||||||
@ -145,8 +146,8 @@
|
|||||||
<emphasis>port range</emphasis>s; if the protocol is <emphasis
|
<emphasis>port range</emphasis>s; if the protocol is <emphasis
|
||||||
role="bold">icmp</emphasis>, this column is interpreted as the
|
role="bold">icmp</emphasis>, this column is interpreted as the
|
||||||
destination icmp-type(s). ICMP types may be specified as a numeric
|
destination icmp-type(s). ICMP types may be specified as a numeric
|
||||||
type, a numeric type and code separated by a slash (e.g., 3/4), or
|
type, a numeric type and code separated by a slash (e.g., 3/4), or a
|
||||||
a typename. See <ulink
|
typename. See <ulink
|
||||||
url="/configuration_file_basics.htm#ICMP">http://www.shorewall.net/configuration_file_basics.htm#ICMP</ulink>.</para>
|
url="/configuration_file_basics.htm#ICMP">http://www.shorewall.net/configuration_file_basics.htm#ICMP</ulink>.</para>
|
||||||
|
|
||||||
<para>If the protocol is <emphasis role="bold">ipp2p</emphasis>,
|
<para>If the protocol is <emphasis role="bold">ipp2p</emphasis>,
|
||||||
|
@ -3,9 +3,11 @@
|
|||||||
"http://www.oasis-open.org/docbook/xml/4.4/docbookx.dtd">
|
"http://www.oasis-open.org/docbook/xml/4.4/docbookx.dtd">
|
||||||
<refentry>
|
<refentry>
|
||||||
<refmeta>
|
<refmeta>
|
||||||
<refentrytitle>shorewall6-netmap(5),shorewall6-params</refentrytitle>
|
<refentrytitle>shorewall6-params</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -26,8 +28,8 @@
|
|||||||
<para>Assign any shell variables that you need in this file. The file is
|
<para>Assign any shell variables that you need in this file. The file is
|
||||||
always processed by <filename>/bin/sh</filename> or by the shell specified
|
always processed by <filename>/bin/sh</filename> or by the shell specified
|
||||||
through SHOREWALL_SHELL in <ulink
|
through SHOREWALL_SHELL in <ulink
|
||||||
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink> (5) so the full range
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink> (5) so the
|
||||||
of shell capabilities may be used.</para>
|
full range of shell capabilities may be used.</para>
|
||||||
|
|
||||||
<para>It is suggested that variable names begin with an upper case letter
|
<para>It is suggested that variable names begin with an upper case letter
|
||||||
to distinguish them from variables used internally within the Shorewall
|
to distinguish them from variables used internally within the Shorewall
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-policy</refentrytitle>
|
<refentrytitle>shorewall6-policy</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -66,8 +68,8 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Source zone. Must be the name of a zone defined in <ulink
|
<para>Source zone. Must be the name of a zone defined in <ulink
|
||||||
url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink>(5), $FW, "all" or
|
url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink>(5),
|
||||||
"all+".</para>
|
$FW, "all" or "all+".</para>
|
||||||
|
|
||||||
<para>Support for "all+" was added in Shorewall 4.5.17. "all" does
|
<para>Support for "all+" was added in Shorewall 4.5.17. "all" does
|
||||||
not override the implicit intra-zone ACCEPT policy while "all+"
|
not override the implicit intra-zone ACCEPT policy while "all+"
|
||||||
@ -84,11 +86,11 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Destination zone. Must be the name of a zone defined in <ulink
|
<para>Destination zone. Must be the name of a zone defined in <ulink
|
||||||
url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink>(5), $FW, "all" or
|
url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink>(5),
|
||||||
"all+". If the DEST is a bport zone, then the SOURCE must be "all",
|
$FW, "all" or "all+". If the DEST is a bport zone, then the SOURCE
|
||||||
"all+", another bport zone associated with the same bridge, or it
|
must be "all", "all+", another bport zone associated with the same
|
||||||
must be an ipv4 zone that is associated with only the same
|
bridge, or it must be an ipv4 zone that is associated with only the
|
||||||
bridge.</para>
|
same bridge.</para>
|
||||||
|
|
||||||
<para>Support for "all+" was added in Shorewall 4.5.17. "all" does
|
<para>Support for "all+" was added in Shorewall 4.5.17. "all" does
|
||||||
not override the implicit intra-zone ACCEPT policy while "all+"
|
not override the implicit intra-zone ACCEPT policy while "all+"
|
||||||
@ -118,8 +120,8 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>The word "None" or "none". This causes any default action
|
<para>The word "None" or "none". This causes any default action
|
||||||
defined in <ulink
|
defined in <ulink
|
||||||
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5) to be
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5)
|
||||||
omitted for this policy.</para>
|
to be omitted for this policy.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-providers</refentrytitle>
|
<refentrytitle>shorewall6-providers</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -77,17 +79,17 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>A FWMARK <emphasis>value</emphasis> used in your <ulink
|
<para>A FWMARK <emphasis>value</emphasis> used in your <ulink
|
||||||
url="/manpages6/shorewall6-mangle.html">shorewall6-mangle</ulink>(5) file to
|
url="/manpages6/shorewall6-mangle.html">shorewall6-mangle</ulink>(5)
|
||||||
direct packets to this provider.</para>
|
file to direct packets to this provider.</para>
|
||||||
|
|
||||||
<para>If HIGH_ROUTE_MARKS=Yes in <ulink
|
<para>If HIGH_ROUTE_MARKS=Yes in <ulink
|
||||||
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5), then the
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5),
|
||||||
value must be a multiple of 256 between 256 and 65280 or their
|
then the value must be a multiple of 256 between 256 and 65280 or
|
||||||
hexadecimal equivalents (0x0100 and 0xff00 with the low-order byte
|
their hexadecimal equivalents (0x0100 and 0xff00 with the low-order
|
||||||
of the value being zero). Otherwise, the value must be between 1 and
|
byte of the value being zero). Otherwise, the value must be between
|
||||||
255. Each provider must be assigned a unique mark value. This column
|
1 and 255. Each provider must be assigned a unique mark value. This
|
||||||
may be omitted if you don't use packet marking to direct connections
|
column may be omitted if you don't use packet marking to direct
|
||||||
to a particular provider.</para>
|
connections to a particular provider.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -190,7 +192,8 @@
|
|||||||
|
|
||||||
<para>Beginning with Shorewall 4.4.3, <option>track</option>
|
<para>Beginning with Shorewall 4.4.3, <option>track</option>
|
||||||
defaults to the setting of the TRACK_PROVIDERS option in
|
defaults to the setting of the TRACK_PROVIDERS option in
|
||||||
<ulink url="/manpages6/shorwewall6.conf.html">shorewall6.conf</ulink>
|
<ulink
|
||||||
|
url="/manpages6/shorwewall6.conf.html">shorewall6.conf</ulink>
|
||||||
(5). If you set TRACK_PROVIDERS=Yes and want to override that
|
(5). If you set TRACK_PROVIDERS=Yes and want to override that
|
||||||
setting for an individual provider, then specify
|
setting for an individual provider, then specify
|
||||||
<option>notrack</option> (see below).</para>
|
<option>notrack</option> (see below).</para>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-proxyndp</refentrytitle>
|
<refentrytitle>shorewall6-proxyndp</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-routes</refentrytitle>
|
<refentrytitle>shorewall6-routes</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -34,8 +36,8 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>The name or number of a provider defined in <ulink
|
<para>The name or number of a provider defined in <ulink
|
||||||
url="/manpages6/shorewall6-providers.html">shorewall6-providers</ulink> (5).
|
url="/manpages6/shorewall6-providers.html">shorewall6-providers</ulink>
|
||||||
Beginning with Shorewall 4.5.14, you may also enter
|
(5). Beginning with Shorewall 4.5.14, you may also enter
|
||||||
<option>main</option> in this column to add routes to the main
|
<option>main</option> in this column to add routes to the main
|
||||||
routing table.</para>
|
routing table.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-routestopped</refentrytitle>
|
<refentrytitle>shorewall6-routestopped</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-rtrules</refentrytitle>
|
<refentrytitle>shorewall6-rtrules</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-rules</refentrytitle>
|
<refentrytitle>shorewall6-rules</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -25,8 +27,8 @@
|
|||||||
|
|
||||||
<para>Entries in this file govern connection establishment by defining
|
<para>Entries in this file govern connection establishment by defining
|
||||||
exceptions to the policies laid out in <ulink
|
exceptions to the policies laid out in <ulink
|
||||||
url="/manpages6/shorewall6-policy.html">shorewall6-policy</ulink>(5). By default,
|
url="/manpages6/shorewall6-policy.html">shorewall6-policy</ulink>(5). By
|
||||||
subsequent requests and responses are automatically allowed using
|
default, subsequent requests and responses are automatically allowed using
|
||||||
connection tracking. For any particular (source,dest) pair of zones, the
|
connection tracking. For any particular (source,dest) pair of zones, the
|
||||||
rules are evaluated in the order in which they appear in this file and the
|
rules are evaluated in the order in which they appear in this file and the
|
||||||
first terminating match is the one that determines the disposition of the
|
first terminating match is the one that determines the disposition of the
|
||||||
@ -137,8 +139,8 @@
|
|||||||
|
|
||||||
<warning>
|
<warning>
|
||||||
<para>If you specify FASTACCEPT=Yes in <ulink
|
<para>If you specify FASTACCEPT=Yes in <ulink
|
||||||
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5) then the <emphasis
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5) then
|
||||||
role="bold">ESTABLISHED</emphasis> and <emphasis
|
the <emphasis role="bold">ESTABLISHED</emphasis> and <emphasis
|
||||||
role="bold">RELATED</emphasis> sections must be empty.</para>
|
role="bold">RELATED</emphasis> sections must be empty.</para>
|
||||||
|
|
||||||
<para>An except is made if you are running Shorewall 4.4.27 or later and
|
<para>An except is made if you are running Shorewall 4.4.27 or later and
|
||||||
@ -207,8 +209,8 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>The name of an <emphasis>action</emphasis> declared in
|
<para>The name of an <emphasis>action</emphasis> declared in
|
||||||
<ulink
|
<ulink
|
||||||
url="/manpages6/shorewall6-actions.html">shorewall6-actions</ulink>(5) or
|
url="/manpages6/shorewall6-actions.html">shorewall6-actions</ulink>(5)
|
||||||
in /usr/share/shorewall/actions.std.</para>
|
or in /usr/share/shorewall/actions.std.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -302,7 +304,8 @@
|
|||||||
<para>Do not process any of the following rules for this
|
<para>Do not process any of the following rules for this
|
||||||
(source zone,destination zone). If the source and/or
|
(source zone,destination zone). If the source and/or
|
||||||
destination IP address falls into a zone defined later in
|
destination IP address falls into a zone defined later in
|
||||||
<ulink url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink>(5)
|
<ulink
|
||||||
|
url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink>(5)
|
||||||
or in a parent zone of the source or destination zones, then
|
or in a parent zone of the source or destination zones, then
|
||||||
this connection request will be passed to the rules defined
|
this connection request will be passed to the rules defined
|
||||||
for that (those) zone(s). See <ulink
|
for that (those) zone(s). See <ulink
|
||||||
@ -629,8 +632,8 @@
|
|||||||
|
|
||||||
<para>If the <emphasis role="bold">ACTION</emphasis> names an
|
<para>If the <emphasis role="bold">ACTION</emphasis> names an
|
||||||
<emphasis>action</emphasis> declared in <ulink
|
<emphasis>action</emphasis> declared in <ulink
|
||||||
url="/manpages/shorewall-actions.html">shorewall-actions</ulink>(5) or in
|
url="/manpages/shorewall-actions.html">shorewall-actions</ulink>(5)
|
||||||
/usr/share/shorewall/actions.std then:</para>
|
or in /usr/share/shorewall/actions.std then:</para>
|
||||||
|
|
||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
@ -688,10 +691,10 @@
|
|||||||
<para>Beginning with Shorewall 4.4.13, you may use a
|
<para>Beginning with Shorewall 4.4.13, you may use a
|
||||||
<replaceable>zone-list </replaceable>which consists of a
|
<replaceable>zone-list </replaceable>which consists of a
|
||||||
comma-separated list of zones declared in <ulink
|
comma-separated list of zones declared in <ulink
|
||||||
url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink> (5). This
|
url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink> (5).
|
||||||
<replaceable>zone-list</replaceable> may be optionally followed by
|
This <replaceable>zone-list</replaceable> may be optionally followed
|
||||||
"+" to indicate that the rule is to apply to intra-zone traffic as
|
by "+" to indicate that the rule is to apply to intra-zone traffic
|
||||||
well as inter-zone traffic.</para>
|
as well as inter-zone traffic.</para>
|
||||||
|
|
||||||
<para>When <emphasis role="bold">none</emphasis> is used either in
|
<para>When <emphasis role="bold">none</emphasis> is used either in
|
||||||
the <emphasis role="bold">SOURCE</emphasis> or <emphasis
|
the <emphasis role="bold">SOURCE</emphasis> or <emphasis
|
||||||
@ -856,18 +859,19 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Location of Server. May be a zone declared in <ulink
|
<para>Location of Server. May be a zone declared in <ulink
|
||||||
url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink>(5), $<emphasis
|
url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink>(5),
|
||||||
role="bold">FW</emphasis> to indicate the firewall itself, <emphasis
|
$<emphasis role="bold">FW</emphasis> to indicate the firewall
|
||||||
role="bold">all</emphasis>. <emphasis role="bold">all+</emphasis> or
|
itself, <emphasis role="bold">all</emphasis>. <emphasis
|
||||||
<emphasis role="bold">none</emphasis>.</para>
|
role="bold">all+</emphasis> or <emphasis
|
||||||
|
role="bold">none</emphasis>.</para>
|
||||||
|
|
||||||
<para>Beginning with Shorewall 4.4.13, you may use a
|
<para>Beginning with Shorewall 4.4.13, you may use a
|
||||||
<replaceable>zone-list </replaceable>which consists of a
|
<replaceable>zone-list </replaceable>which consists of a
|
||||||
comma-separated list of zones declared in <ulink
|
comma-separated list of zones declared in <ulink
|
||||||
url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink> (5). Ths
|
url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink> (5).
|
||||||
<replaceable>zone-list</replaceable> may be optionally followed by
|
Ths <replaceable>zone-list</replaceable> may be optionally followed
|
||||||
"+" to indicate that the rule is to apply to intra-zone traffic as
|
by "+" to indicate that the rule is to apply to intra-zone traffic
|
||||||
well as inter-zone traffic. Beginning with Shorewall-4.4.13,
|
as well as inter-zone traffic. Beginning with Shorewall-4.4.13,
|
||||||
exclusion is supported -- see see <ulink
|
exclusion is supported -- see see <ulink
|
||||||
url="/manpages6/shorewall6-exclusion.html">shorewall6-exclusion</ulink>(5).</para>
|
url="/manpages6/shorewall6-exclusion.html">shorewall6-exclusion</ulink>(5).</para>
|
||||||
|
|
||||||
@ -1559,9 +1563,9 @@
|
|||||||
</simplelist>
|
</simplelist>
|
||||||
|
|
||||||
<para>If the HELPERS option is specified in <ulink
|
<para>If the HELPERS option is specified in <ulink
|
||||||
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5), then any module
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5),
|
||||||
specified in this column must be listed in the HELPERS
|
then any module specified in this column must be listed in the
|
||||||
setting.</para>
|
HELPERS setting.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
</variablelist>
|
</variablelist>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-secmarks</refentrytitle>
|
<refentrytitle>shorewall6-secmarks</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -25,10 +27,10 @@
|
|||||||
|
|
||||||
<important>
|
<important>
|
||||||
<para>Unlike rules in the <ulink
|
<para>Unlike rules in the <ulink
|
||||||
url="/manpages6/shorewall6-rules.html">shorewall6-rules</ulink>(5) file, evaluation
|
url="/manpages6/shorewall6-rules.html">shorewall6-rules</ulink>(5) file,
|
||||||
of rules in this file will continue after a match. So the final secmark
|
evaluation of rules in this file will continue after a match. So the
|
||||||
for each packet will be the one assigned by the LAST rule that
|
final secmark for each packet will be the one assigned by the LAST rule
|
||||||
matches.</para>
|
that matches.</para>
|
||||||
</important>
|
</important>
|
||||||
|
|
||||||
<para>The secmarks file is used to associate an SELinux context with
|
<para>The secmarks file is used to associate an SELinux context with
|
||||||
@ -243,8 +245,8 @@
|
|||||||
<emphasis>port range</emphasis>s; if the protocol is <emphasis
|
<emphasis>port range</emphasis>s; if the protocol is <emphasis
|
||||||
role="bold">icmp</emphasis>, this column is interpreted as the
|
role="bold">icmp</emphasis>, this column is interpreted as the
|
||||||
destination icmp-type(s). ICMP types may be specified as a numeric
|
destination icmp-type(s). ICMP types may be specified as a numeric
|
||||||
type, a numeric type and code separated by a slash (e.g., 3/4), or
|
type, a numeric type and code separated by a slash (e.g., 3/4), or a
|
||||||
a typename. See <ulink
|
typename. See <ulink
|
||||||
url="/configuration_file_basics.htm#ICMP">http://www.shorewall.net/configuration_file_basics.htm#ICMP</ulink>.</para>
|
url="/configuration_file_basics.htm#ICMP">http://www.shorewall.net/configuration_file_basics.htm#ICMP</ulink>.</para>
|
||||||
|
|
||||||
<para>If the protocol is <emphasis role="bold">ipp2p</emphasis>,
|
<para>If the protocol is <emphasis role="bold">ipp2p</emphasis>,
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-stoppedrules</refentrytitle>
|
<refentrytitle>shorewall6-stoppedrules</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-tcclasses</refentrytitle>
|
<refentrytitle>shorewall6-tcclasses</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -140,8 +142,8 @@
|
|||||||
<para>Normally, all classes defined here are sub-classes of a root
|
<para>Normally, all classes defined here are sub-classes of a root
|
||||||
class (class number 1) that is implicitly defined from the entry in
|
class (class number 1) that is implicitly defined from the entry in
|
||||||
<ulink
|
<ulink
|
||||||
url="/manpages6/shorewall6-tcdevices.html">shorewall6-tcdevices</ulink>(5). You
|
url="/manpages6/shorewall6-tcdevices.html">shorewall6-tcdevices</ulink>(5).
|
||||||
can establish a class hierarchy by specifying a
|
You can establish a class hierarchy by specifying a
|
||||||
<emphasis>parent</emphasis> class -- the number of a class that you
|
<emphasis>parent</emphasis> class -- the number of a class that you
|
||||||
have previously defined. The sub-class may borrow unused bandwidth
|
have previously defined. The sub-class may borrow unused bandwidth
|
||||||
from its parent.</para>
|
from its parent.</para>
|
||||||
@ -155,13 +157,13 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>The mark <emphasis>value</emphasis> which is an integer in the
|
<para>The mark <emphasis>value</emphasis> which is an integer in the
|
||||||
range 1-255. You set mark values in the <ulink
|
range 1-255. You set mark values in the <ulink
|
||||||
url="/manpages6/shorewall6-mangle.html">shorewall6-mangle</ulink>(5) file,
|
url="/manpages6/shorewall6-mangle.html">shorewall6-mangle</ulink>(5)
|
||||||
marking the traffic you want to fit in the classes defined in here.
|
file, marking the traffic you want to fit in the classes defined in
|
||||||
Must be specified as '-' if the <emphasis
|
here. Must be specified as '-' if the <emphasis
|
||||||
role="bold">classify</emphasis> option is given for the interface in
|
role="bold">classify</emphasis> option is given for the interface in
|
||||||
<ulink
|
<ulink
|
||||||
url="/manpages6/shorewall6-tcdevices.html">shorewall6-tcdevices</ulink>(5) and
|
url="/manpages6/shorewall6-tcdevices.html">shorewall6-tcdevices</ulink>(5)
|
||||||
you are running Shorewall 4.5 5 or earlier.</para>
|
and you are running Shorewall 4.5 5 or earlier.</para>
|
||||||
|
|
||||||
<para>You can use the same marks for different interfaces.</para>
|
<para>You can use the same marks for different interfaces.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
@ -672,10 +674,10 @@
|
|||||||
priority number, giving less delay) and will be granted excess
|
priority number, giving less delay) and will be granted excess
|
||||||
bandwidth (up to 180kbps, the class ceiling) first, before any other
|
bandwidth (up to 180kbps, the class ceiling) first, before any other
|
||||||
traffic. A single VoIP stream, depending upon codecs, after
|
traffic. A single VoIP stream, depending upon codecs, after
|
||||||
encapsulation, can take up to 80kbps on a PPPoE/DSL link, so we pad a
|
encapsulation, can take up to 80kbps on a PPPoE/DSL link, so we pad
|
||||||
little bit just in case. (TOS byte values 0xb8 and 0x68 are DiffServ
|
a little bit just in case. (TOS byte values 0xb8 and 0x68 are
|
||||||
classes EF and AFF3-1 respectively and are often used by VOIP
|
DiffServ classes EF and AFF3-1 respectively and are often used by
|
||||||
devices).</para>
|
VOIP devices).</para>
|
||||||
|
|
||||||
<para>Interactive traffic (tos-minimum-delay) and TCP acks (and ICMP
|
<para>Interactive traffic (tos-minimum-delay) and TCP acks (and ICMP
|
||||||
echo traffic if you use the example in tcrules) and any packet with
|
echo traffic if you use the example in tcrules) and any packet with
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-tcdevices</refentrytitle>
|
<refentrytitle>shorewall6-tcdevices</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -151,8 +153,7 @@
|
|||||||
Beginning with Shorewall 4.4.25, a rate-estimated policing filter
|
Beginning with Shorewall 4.4.25, a rate-estimated policing filter
|
||||||
may be configured instead. Rate-estimated filters should be used
|
may be configured instead. Rate-estimated filters should be used
|
||||||
with Ethernet adapters that have Generic Receive Offload enabled by
|
with Ethernet adapters that have Generic Receive Offload enabled by
|
||||||
default. See <ulink
|
default. See <ulink url="/FAQ.htm#faq97a">Shorewall FAQ
|
||||||
url="/FAQ.htm#faq97a">Shorewall FAQ
|
|
||||||
97a</ulink>.</para>
|
97a</ulink>.</para>
|
||||||
|
|
||||||
<para>To create a rate-estimated filter, precede the bandwidth with
|
<para>To create a rate-estimated filter, precede the bandwidth with
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-tcfilters</refentrytitle>
|
<refentrytitle>shorewall6-tcfilters</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-tcinterfaces</refentrytitle>
|
<refentrytitle>shorewall6-tcinterfaces</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -25,7 +27,8 @@
|
|||||||
|
|
||||||
<para>This file lists the interfaces that are subject to simple traffic
|
<para>This file lists the interfaces that are subject to simple traffic
|
||||||
shaping. Simple traffic shaping is enabled by setting TC_ENABLED=Simple in
|
shaping. Simple traffic shaping is enabled by setting TC_ENABLED=Simple in
|
||||||
<ulink url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5).</para>
|
<ulink
|
||||||
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5).</para>
|
||||||
|
|
||||||
<para>A note on the <emphasis>bandwidth</emphasis> definition used in this
|
<para>A note on the <emphasis>bandwidth</emphasis> definition used in this
|
||||||
file:</para>
|
file:</para>
|
||||||
@ -161,8 +164,7 @@
|
|||||||
Beginning with Shorewall 4.4.25, a rate-estimated policing filter
|
Beginning with Shorewall 4.4.25, a rate-estimated policing filter
|
||||||
may be configured instead. Rate-estimated filters should be used
|
may be configured instead. Rate-estimated filters should be used
|
||||||
with Ethernet adapters that have Generic Receive Offload enabled by
|
with Ethernet adapters that have Generic Receive Offload enabled by
|
||||||
default. See <ulink
|
default. See <ulink url="/FAQ.htm#faq97a">Shorewall FAQ
|
||||||
url="/FAQ.htm#faq97a">Shorewall FAQ
|
|
||||||
97a</ulink>.</para>
|
97a</ulink>.</para>
|
||||||
|
|
||||||
<para>To create a rate-estimated filter, precede the bandwidth with
|
<para>To create a rate-estimated filter, precede the bandwidth with
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-tcpri</refentrytitle>
|
<refentrytitle>shorewall6-tcpri</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -25,12 +27,13 @@
|
|||||||
|
|
||||||
<para>This file is used to specify the priority band of traffic for simple
|
<para>This file is used to specify the priority band of traffic for simple
|
||||||
traffic shaping (TC_ENABLED=Simple in <ulink
|
traffic shaping (TC_ENABLED=Simple in <ulink
|
||||||
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5)). The priority band
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5)). The
|
||||||
of each packet is determined by the <emphasis role="bold">last</emphasis>
|
priority band of each packet is determined by the <emphasis
|
||||||
entry that the packet matches. If a packet doesn't match any entry in this
|
role="bold">last</emphasis> entry that the packet matches. If a packet
|
||||||
file, then its priority will be determined by its TOS field. The default
|
doesn't match any entry in this file, then its priority will be determined
|
||||||
mapping is as follows but can be changed by setting the TC_PRIOMAP option
|
by its TOS field. The default mapping is as follows but can be changed by
|
||||||
in <ulink url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5).</para>
|
setting the TC_PRIOMAP option in <ulink
|
||||||
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5).</para>
|
||||||
|
|
||||||
<programlisting>TOS Bits Means Linux Priority BAND
|
<programlisting>TOS Bits Means Linux Priority BAND
|
||||||
------------------------------------------------------------
|
------------------------------------------------------------
|
||||||
@ -131,8 +134,8 @@
|
|||||||
[<replaceable>helper</replaceable>]</term>
|
[<replaceable>helper</replaceable>]</term>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Optional. Names a Netfilter protocol helper module such as ftp,
|
<para>Optional. Names a Netfilter protocol helper module such as
|
||||||
sip, amanda, etc. A packet will match if it was accepted by the
|
ftp, sip, amanda, etc. A packet will match if it was accepted by the
|
||||||
named helper module. You can also append "-" and a port number to
|
named helper module. You can also append "-" and a port number to
|
||||||
the helper module name (e.g., ftp-21) to specify the port number
|
the helper module name (e.g., ftp-21) to specify the port number
|
||||||
that the original connection was made on.</para>
|
that the original connection was made on.</para>
|
||||||
|
@ -3,9 +3,11 @@
|
|||||||
"http://www.oasis-open.org/docbook/xml/4.4/docbookx.dtd">
|
"http://www.oasis-open.org/docbook/xml/4.4/docbookx.dtd">
|
||||||
<refentry>
|
<refentry>
|
||||||
<refmeta>
|
<refmeta>
|
||||||
<refentrytitle>shorewall6-mangle</refentrytitle>
|
<refentrytitle>shorewall6-tcrules</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -28,10 +30,10 @@
|
|||||||
|
|
||||||
<important>
|
<important>
|
||||||
<para>Unlike rules in the <ulink
|
<para>Unlike rules in the <ulink
|
||||||
url="/manpages6/shorewall6-rules.html">shorewall6-rules</ulink>(5) file, evaluation
|
url="/manpages6/shorewall6-rules.html">shorewall6-rules</ulink>(5) file,
|
||||||
of rules in this file will continue after a match. So the final mark for
|
evaluation of rules in this file will continue after a match. So the
|
||||||
each packet will be the one assigned by the LAST tcrule that
|
final mark for each packet will be the one assigned by the LAST tcrule
|
||||||
matches.</para>
|
that matches.</para>
|
||||||
|
|
||||||
<para>If you use multiple internet providers with the 'track' option, in
|
<para>If you use multiple internet providers with the 'track' option, in
|
||||||
/etc/shorewall6/providers be sure to read the restrictions at <ulink
|
/etc/shorewall6/providers be sure to read the restrictions at <ulink
|
||||||
@ -517,7 +519,8 @@
|
|||||||
[<replaceable>option</replaceable>] ...") after any matches
|
[<replaceable>option</replaceable>] ...") after any matches
|
||||||
specified at the end of the rule. If the target is not one known
|
specified at the end of the rule. If the target is not one known
|
||||||
to Shorewall, then it must be defined as a builtin action in
|
to Shorewall, then it must be defined as a builtin action in
|
||||||
<ulink url="/manpages6/shorewall6-actions.html">shorewall6-actions</ulink>
|
<ulink
|
||||||
|
url="/manpages6/shorewall6-actions.html">shorewall6-actions</ulink>
|
||||||
(5).</para>
|
(5).</para>
|
||||||
|
|
||||||
<para>The following rules are equivalent:</para>
|
<para>The following rules are equivalent:</para>
|
||||||
@ -529,8 +532,8 @@ INLINE eth0 - tcp 22 ; -j MARK --set-mark 2
|
|||||||
INLINE eth0 - ; -p tcp -j MARK --set-mark 2</programlisting>
|
INLINE eth0 - ; -p tcp -j MARK --set-mark 2</programlisting>
|
||||||
|
|
||||||
<para>If INLINE_MATCHES=Yes in <ulink
|
<para>If INLINE_MATCHES=Yes in <ulink
|
||||||
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5) then the
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5)
|
||||||
third rule above can be specified as follows:</para>
|
then the third rule above can be specified as follows:</para>
|
||||||
|
|
||||||
<programlisting>2:P eth0 - ; -p tcp</programlisting>
|
<programlisting>2:P eth0 - ; -p tcp</programlisting>
|
||||||
|
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-</refentrytitle>
|
<refentrytitle>shorewall6-</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -54,10 +56,11 @@
|
|||||||
<para>shorewall6(8), shorewall6-accounting(5), shorewall6-actions(5),
|
<para>shorewall6(8), shorewall6-accounting(5), shorewall6-actions(5),
|
||||||
shorewall6-blacklist(5), shorewall6-exclusion(5), shorewall6-hosts(5),
|
shorewall6-blacklist(5), shorewall6-exclusion(5), shorewall6-hosts(5),
|
||||||
shorewall6-interfaces(5), shorewall6-maclist(5), shorewall6-nesting(5),
|
shorewall6-interfaces(5), shorewall6-maclist(5), shorewall6-nesting(5),
|
||||||
shorewall6-netmap(5),shorewall6-params(5), shorewall6-policy(5), shorewall6-providers(5),
|
shorewall6-netmap(5),shorewall6-params(5), shorewall6-policy(5),
|
||||||
shorewall6-rtrules(5), shorewall6-routestopped(5),
|
shorewall6-providers(5), shorewall6-rtrules(5),
|
||||||
shorewall6-rules(5), shorewall6.conf(5), shorewall6-secmarks(5), shorewall6-tcclasses(5),
|
shorewall6-routestopped(5), shorewall6-rules(5), shorewall6.conf(5),
|
||||||
shorewall6-tcdevices(5), shorewall6-mangle(5), shorewall6-tos(5),
|
shorewall6-secmarks(5), shorewall6-tcclasses(5), shorewall6-tcdevices(5),
|
||||||
shorewall6-tunnels(5), shorewall6-zones(5)</para>
|
shorewall6-mangle(5), shorewall6-tos(5), shorewall6-tunnels(5),
|
||||||
|
shorewall6-zones(5)</para>
|
||||||
</refsect1>
|
</refsect1>
|
||||||
</refentry>
|
</refentry>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-tos</refentrytitle>
|
<refentrytitle>shorewall6-tos</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-tunnels</refentrytitle>
|
<refentrytitle>shorewall6-tunnels</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -27,8 +29,8 @@
|
|||||||
encrypted) traffic to pass between the Shorewall6 system and a remote
|
encrypted) traffic to pass between the Shorewall6 system and a remote
|
||||||
gateway. Traffic flowing through the tunnel is handled using the normal
|
gateway. Traffic flowing through the tunnel is handled using the normal
|
||||||
zone/policy/rule mechanism. See <ulink
|
zone/policy/rule mechanism. See <ulink
|
||||||
url="/VPNBasics.html">http://www.shorewall.net/VPNBasics.html</ulink>
|
url="/VPNBasics.html">http://www.shorewall.net/VPNBasics.html</ulink> for
|
||||||
for details.</para>
|
details.</para>
|
||||||
|
|
||||||
<para>The columns in the file are as follows (where the column name is
|
<para>The columns in the file are as follows (where the column name is
|
||||||
followed by a different name in parentheses, the different name is used in
|
followed by a different name in parentheses, the different name is used in
|
||||||
@ -138,8 +140,8 @@
|
|||||||
|
|
||||||
<para>Beginning with Shorewall 4.5.3, a list of addresses or ranges
|
<para>Beginning with Shorewall 4.5.3, a list of addresses or ranges
|
||||||
may be given. Exclusion (<ulink
|
may be given. Exclusion (<ulink
|
||||||
url="/manpages6/shorewall6-exclusion.html">shorewall6-exclusion</ulink> (5) )
|
url="/manpages6/shorewall6-exclusion.html">shorewall6-exclusion</ulink>
|
||||||
is not supported.</para>
|
(5) ) is not supported.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-vardir</refentrytitle>
|
<refentrytitle>shorewall6-vardir</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -55,10 +57,11 @@
|
|||||||
|
|
||||||
<para>shorewall6(8), shorewall6-accounting(5), shorewall6-actions(5),
|
<para>shorewall6(8), shorewall6-accounting(5), shorewall6-actions(5),
|
||||||
shorewall6-blacklist(5), shorewall6-hosts(5), shorewall6-interfaces(5),
|
shorewall6-blacklist(5), shorewall6-hosts(5), shorewall6-interfaces(5),
|
||||||
shorewall6-maclist(5), shorewall6-netmap(5),shorewall6-params(5), shorewall6-policy(5),
|
shorewall6-maclist(5), shorewall6-netmap(5),shorewall6-params(5),
|
||||||
shorewall6-providers(5), shorewall6-rtrules(5),
|
shorewall6-policy(5), shorewall6-providers(5), shorewall6-rtrules(5),
|
||||||
shorewall6-routestopped(5), shorewall6-rules(5), shorewall6.conf(5), shorewall6-secmarks(5),
|
shorewall6-routestopped(5), shorewall6-rules(5), shorewall6.conf(5),
|
||||||
shorewall6-tcclasses(5), shorewall6-tcdevices(5), shorewall6-mangle(5),
|
shorewall6-secmarks(5), shorewall6-tcclasses(5), shorewall6-tcdevices(5),
|
||||||
shorewall6-tos(5), shorewall6-tunnels(5), shorewall6-zones(5)</para>
|
shorewall6-mangle(5), shorewall6-tos(5), shorewall6-tunnels(5),
|
||||||
|
shorewall6-zones(5)</para>
|
||||||
</refsect1>
|
</refsect1>
|
||||||
</refentry>
|
</refentry>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6-zones</refentrytitle>
|
<refentrytitle>shorewall6-zones</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -44,17 +46,17 @@
|
|||||||
"none", "SOURCE" and "DEST" are reserved and may not be used as zone
|
"none", "SOURCE" and "DEST" are reserved and may not be used as zone
|
||||||
names. The maximum length of a zone name is determined by the
|
names. The maximum length of a zone name is determined by the
|
||||||
setting of the LOGFORMAT option in <ulink
|
setting of the LOGFORMAT option in <ulink
|
||||||
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5). With the
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5).
|
||||||
default LOGFORMAT, zone names can be at most 5 characters
|
With the default LOGFORMAT, zone names can be at most 5 characters
|
||||||
long.</para>
|
long.</para>
|
||||||
|
|
||||||
<blockquote>
|
<blockquote>
|
||||||
<para>The maximum length of an iptables log prefix is 29 bytes. As
|
<para>The maximum length of an iptables log prefix is 29 bytes. As
|
||||||
explained in <ulink
|
explained in <ulink
|
||||||
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink> (5), the default
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink> (5),
|
||||||
LOGPREFIX formatting string is “Shorewall:%s:%s:” where the first
|
the default LOGPREFIX formatting string is “Shorewall:%s:%s:”
|
||||||
%s is replaced by the chain name and the second is replaced by the
|
where the first %s is replaced by the chain name and the second is
|
||||||
disposition.</para>
|
replaced by the disposition.</para>
|
||||||
|
|
||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
@ -95,8 +97,8 @@
|
|||||||
follow the (sub)zone name by ":" and a comma-separated list of the
|
follow the (sub)zone name by ":" and a comma-separated list of the
|
||||||
parent zones. The parent zones must have been declared in earlier
|
parent zones. The parent zones must have been declared in earlier
|
||||||
records in this file. See <ulink
|
records in this file. See <ulink
|
||||||
url="/manpages6/shorewall6-nesting.html">shorewall6-nesting</ulink>(5) for
|
url="/manpages6/shorewall6-nesting.html">shorewall6-nesting</ulink>(5)
|
||||||
additional information.</para>
|
for additional information.</para>
|
||||||
|
|
||||||
<para>Example:</para>
|
<para>Example:</para>
|
||||||
|
|
||||||
@ -108,8 +110,8 @@ c:a,b ipv6</programlisting>
|
|||||||
<para>Currently, Shorewall6 uses this information to reorder the
|
<para>Currently, Shorewall6 uses this information to reorder the
|
||||||
zone list so that parent zones appear after their subzones in the
|
zone list so that parent zones appear after their subzones in the
|
||||||
list. The IMPLICIT_CONTINUE option in <ulink
|
list. The IMPLICIT_CONTINUE option in <ulink
|
||||||
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5) can also
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5) can
|
||||||
create implicit CONTINUE policies to/from the subzone.</para>
|
also create implicit CONTINUE policies to/from the subzone.</para>
|
||||||
|
|
||||||
<para>Where an <emphasis role="bold">ipsec</emphasis> zone is
|
<para>Where an <emphasis role="bold">ipsec</emphasis> zone is
|
||||||
explicitly included as a child of an <emphasis
|
explicitly included as a child of an <emphasis
|
||||||
@ -178,7 +180,8 @@ c:a,b ipv6</programlisting>
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>Added in Shorewall 4.4.11 Beta 2 - A zone composed of
|
<para>Added in Shorewall 4.4.11 Beta 2 - A zone composed of
|
||||||
Linux-vserver guests. The zone contents must be defined in
|
Linux-vserver guests. The zone contents must be defined in
|
||||||
<ulink url="/manpages6/shorewall6-hosts.html">shorewall6-hosts</ulink>
|
<ulink
|
||||||
|
url="/manpages6/shorewall6-hosts.html">shorewall6-hosts</ulink>
|
||||||
(5).</para>
|
(5).</para>
|
||||||
|
|
||||||
<para>Vserver zones are implicitly handled as subzones of the
|
<para>Vserver zones are implicitly handled as subzones of the
|
||||||
@ -353,8 +356,8 @@ c:a,b ipv6</programlisting>
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>sets the MSS field in TCP packets. If you supply this
|
<para>sets the MSS field in TCP packets. If you supply this
|
||||||
option, you should also set FASTACCEPT=No in <ulink
|
option, you should also set FASTACCEPT=No in <ulink
|
||||||
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5) to
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5)
|
||||||
insure that both the SYN and SYN,ACK packets have their MSS
|
to insure that both the SYN and SYN,ACK packets have their MSS
|
||||||
field adjusted.</para>
|
field adjusted.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6.conf</refentrytitle>
|
<refentrytitle>shorewall6.conf</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>5</manvolnum>
|
<manvolnum>5</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Configuration Files</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -286,7 +288,8 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Specify the appropriate helper in the HELPER column in
|
<para>Specify the appropriate helper in the HELPER column in
|
||||||
<ulink url="/manpages6/shorewall6-rules.html">shorewall6-rules</ulink>
|
<ulink
|
||||||
|
url="/manpages6/shorewall6-rules.html">shorewall6-rules</ulink>
|
||||||
(5).</para>
|
(5).</para>
|
||||||
|
|
||||||
<note>
|
<note>
|
||||||
@ -393,9 +396,10 @@
|
|||||||
packets that are UNTRACKED due to entries in <ulink
|
packets that are UNTRACKED due to entries in <ulink
|
||||||
url="/manpages6/shorewall6-conntrack.html">shorewall6-conntrack</ulink>(5).
|
url="/manpages6/shorewall6-conntrack.html">shorewall6-conntrack</ulink>(5).
|
||||||
This includes entries in the <ulink
|
This includes entries in the <ulink
|
||||||
url="/manpages6/shorewall6-blrules.html">shorewall6-blrules</ulink> (5) file
|
url="/manpages6/shorewall6-blrules.html">shorewall6-blrules</ulink>
|
||||||
and in the BLACKLIST section of <ulink
|
(5) file and in the BLACKLIST section of <ulink
|
||||||
url="/manpages6/shorewall6-rules.html">shorewall6-rules</ulink> (5).</para>
|
url="/manpages6/shorewall6-rules.html">shorewall6-rules</ulink>
|
||||||
|
(5).</para>
|
||||||
|
|
||||||
<para>When set to <emphasis role="bold">No</emphasis> or <emphasis
|
<para>When set to <emphasis role="bold">No</emphasis> or <emphasis
|
||||||
role="bold">no</emphasis>, blacklists are consulted for every packet
|
role="bold">no</emphasis>, blacklists are consulted for every packet
|
||||||
@ -464,8 +468,8 @@
|
|||||||
/etc/shorewall6/tcstart file. That way, your traffic shaping rules
|
/etc/shorewall6/tcstart file. That way, your traffic shaping rules
|
||||||
can still use the “fwmark” classifier based on packet marking
|
can still use the “fwmark” classifier based on packet marking
|
||||||
defined in <ulink
|
defined in <ulink
|
||||||
url="/manpages6/shorewall6-tcrules.html">shorewall6-tcrules</ulink>(5). If not
|
url="/manpages6/shorewall6-tcrules.html">shorewall6-tcrules</ulink>(5).
|
||||||
specified, CLEAR_TC=No is assumed.</para>
|
If not specified, CLEAR_TC=No is assumed.</para>
|
||||||
|
|
||||||
<warning>
|
<warning>
|
||||||
<para>If you also run Shorewall and if you have
|
<para>If you also run Shorewall and if you have
|
||||||
@ -861,11 +865,12 @@ net all DROP info</programlisting>then the chain name is 'net2all'
|
|||||||
|
|
||||||
<para>Subzones are defined by following their name with ":" and a
|
<para>Subzones are defined by following their name with ":" and a
|
||||||
list of parent zones (in <ulink
|
list of parent zones (in <ulink
|
||||||
url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink>(5)). Normally,
|
url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink>(5)).
|
||||||
you want to have a set of special rules for the subzone and if a
|
Normally, you want to have a set of special rules for the subzone
|
||||||
connection doesn't match any of those subzone-specific rules then
|
and if a connection doesn't match any of those subzone-specific
|
||||||
you want the parent zone rules and policies to be applied; see
|
rules then you want the parent zone rules and policies to be
|
||||||
<ulink url="/manpages6/shorewall6-nesting.html">shorewall6-nesting</ulink>(5).
|
applied; see <ulink
|
||||||
|
url="/manpages6/shorewall6-nesting.html">shorewall6-nesting</ulink>(5).
|
||||||
With IMPLICIT_CONTINUE=Yes, that happens automatically.</para>
|
With IMPLICIT_CONTINUE=Yes, that happens automatically.</para>
|
||||||
|
|
||||||
<para>If IMPLICIT_CONTINUE=No or if IMPLICIT_CONTINUE is not set,
|
<para>If IMPLICIT_CONTINUE=No or if IMPLICIT_CONTINUE is not set,
|
||||||
@ -882,9 +887,9 @@ net all DROP info</programlisting>then the chain name is 'net2all'
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Added in Shorewall 4.6.0. Traditionally in <ulink
|
<para>Added in Shorewall 4.6.0. Traditionally in <ulink
|
||||||
url="/manpages6/shorewall6-rules.html">shorewall6-rules(5)</ulink>, a semicolon
|
url="/manpages6/shorewall6-rules.html">shorewall6-rules(5)</ulink>,
|
||||||
separates column-oriented specifications on the left from <ulink
|
a semicolon separates column-oriented specifications on the left
|
||||||
url="/configuration_file_basics.htm#Pairs">alternative
|
from <ulink url="/configuration_file_basics.htm#Pairs">alternative
|
||||||
specificaitons</ulink> on the right.. When INLINE_MATCHES=Yes is
|
specificaitons</ulink> on the right.. When INLINE_MATCHES=Yes is
|
||||||
specified, the specifications on the right are interpreted as if
|
specified, the specifications on the right are interpreted as if
|
||||||
INLINE had been specified in the ACTION column. If not specified or
|
INLINE had been specified in the ACTION column. If not specified or
|
||||||
@ -900,10 +905,10 @@ net all DROP info</programlisting>then the chain name is 'net2all'
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>Added in Shorewall 4.5.13. Shorewall has traditionally passed
|
<para>Added in Shorewall 4.5.13. Shorewall has traditionally passed
|
||||||
INVALID packets through the NEW section of <ulink
|
INVALID packets through the NEW section of <ulink
|
||||||
url="/manpages6/shorewall6-rules.html">shorewall-rules</ulink> (5). When a
|
url="/manpages6/shorewall6-rules.html">shorewall-rules</ulink> (5).
|
||||||
packet in INVALID state fails to match any rule in the INVALID
|
When a packet in INVALID state fails to match any rule in the
|
||||||
section, the packet is disposed of based on this setting. The
|
INVALID section, the packet is disposed of based on this setting.
|
||||||
default value is CONTINUE for compatibility with earlier
|
The default value is CONTINUE for compatibility with earlier
|
||||||
versions.</para>
|
versions.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -915,8 +920,8 @@ net all DROP info</programlisting>then the chain name is 'net2all'
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>Added in Shorewall 4.5.13. Packets in the INVALID state that
|
<para>Added in Shorewall 4.5.13. Packets in the INVALID state that
|
||||||
do not match any rule in the INVALID section of <ulink
|
do not match any rule in the INVALID section of <ulink
|
||||||
url="/manpages6/shorewall6-rules.html">shorewall6-rules</ulink> (5) are
|
url="/manpages6/shorewall6-rules.html">shorewall6-rules</ulink> (5)
|
||||||
logged at this level. The default value is empty which means no
|
are logged at this level. The default value is empty which means no
|
||||||
logging is performed.</para>
|
logging is performed.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -1205,7 +1210,8 @@ net all DROP info</programlisting>then the chain name is 'net2all'
|
|||||||
<note>
|
<note>
|
||||||
<para>The setting of LOGFORMAT has an effect of the permitted
|
<para>The setting of LOGFORMAT has an effect of the permitted
|
||||||
length of zone names. See <ulink
|
length of zone names. See <ulink
|
||||||
url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink> (5).</para>
|
url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink>
|
||||||
|
(5).</para>
|
||||||
</note>
|
</note>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -1373,8 +1379,8 @@ LOG:info:,bar net fw</programlisting>
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>The performance of configurations with a large numbers of
|
<para>The performance of configurations with a large numbers of
|
||||||
entries in <ulink
|
entries in <ulink
|
||||||
url="/manpages6/shorewall6-maclist.html">shorewall6-maclist</ulink>(5) can be
|
url="/manpages6/shorewall6-maclist.html">shorewall6-maclist</ulink>(5)
|
||||||
improved by setting the MACLIST_TTL variable in <ulink
|
can be improved by setting the MACLIST_TTL variable in <ulink
|
||||||
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5).</para>
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5).</para>
|
||||||
|
|
||||||
<para>If your iptables and kernel support the "Recent Match" (see
|
<para>If your iptables and kernel support the "Recent Match" (see
|
||||||
@ -1384,14 +1390,15 @@ LOG:info:,bar net fw</programlisting>
|
|||||||
|
|
||||||
<para>When a new connection arrives from a 'maclist' interface, the
|
<para>When a new connection arrives from a 'maclist' interface, the
|
||||||
packet passes through then list of entries for that interface in
|
packet passes through then list of entries for that interface in
|
||||||
<ulink url="/manpages6/shorewall6-maclist.html">shorewall6-maclist</ulink>(5). If
|
<ulink
|
||||||
there is a match then the source IP address is added to the 'Recent'
|
url="/manpages6/shorewall6-maclist.html">shorewall6-maclist</ulink>(5).
|
||||||
set for that interface. Subsequent connection attempts from that IP
|
If there is a match then the source IP address is added to the
|
||||||
address occurring within $MACLIST_TTL seconds will be accepted
|
'Recent' set for that interface. Subsequent connection attempts from
|
||||||
without having to scan all of the entries. After $MACLIST_TTL from
|
that IP address occurring within $MACLIST_TTL seconds will be
|
||||||
the first accepted connection request from an IP address, the next
|
accepted without having to scan all of the entries. After
|
||||||
connection request from that IP address will be checked against the
|
$MACLIST_TTL from the first accepted connection request from an IP
|
||||||
entire list.</para>
|
address, the next connection request from that IP address will be
|
||||||
|
checked against the entire list.</para>
|
||||||
|
|
||||||
<para>If MACLIST_TTL is not specified or is specified as empty (e.g,
|
<para>If MACLIST_TTL is not specified or is specified as empty (e.g,
|
||||||
MACLIST_TTL="" or is specified as zero then 'maclist' lookups will
|
MACLIST_TTL="" or is specified as zero then 'maclist' lookups will
|
||||||
@ -1860,10 +1867,10 @@ LOG:info:,bar net fw</programlisting>
|
|||||||
<para>Added in Shorewall 4.4.27. Shorewall has traditionally
|
<para>Added in Shorewall 4.4.27. Shorewall has traditionally
|
||||||
ACCEPTed RELATED packets that don't match any rule in the RELATED
|
ACCEPTed RELATED packets that don't match any rule in the RELATED
|
||||||
section of <ulink
|
section of <ulink
|
||||||
url="/manpages6/shorewall6-rules.html">shorewall6-rules</ulink> (5). Concern
|
url="/manpages6/shorewall6-rules.html">shorewall6-rules</ulink> (5).
|
||||||
about the safety of this practice resulted in the addition of this
|
Concern about the safety of this practice resulted in the addition
|
||||||
option. When a packet in RELATED state fails to match any rule in
|
of this option. When a packet in RELATED state fails to match any
|
||||||
the RELATED section, the packet is disposed of based on this
|
rule in the RELATED section, the packet is disposed of based on this
|
||||||
setting. The default value is ACCEPT for compatibility with earlier
|
setting. The default value is ACCEPT for compatibility with earlier
|
||||||
versions.</para>
|
versions.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
@ -1876,8 +1883,8 @@ LOG:info:,bar net fw</programlisting>
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>Added in Shorewall 4.4.27. Packets in the related state that
|
<para>Added in Shorewall 4.4.27. Packets in the related state that
|
||||||
do not match any rule in the RELATED section of <ulink
|
do not match any rule in the RELATED section of <ulink
|
||||||
url="/manpages6/shorewall6-rules.html">shorewall6-rules</ulink> (5) are
|
url="/manpages6/shorewall6-rules.html">shorewall6-rules</ulink> (5)
|
||||||
logged at this level. The default value is empty which means no
|
are logged at this level. The default value is empty which means no
|
||||||
logging is performed.</para>
|
logging is performed.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -2040,9 +2047,9 @@ INLINE - - - ; -j REJECT
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>Added in Shorewall 4.4.20. The default setting is DROP which
|
<para>Added in Shorewall 4.4.20. The default setting is DROP which
|
||||||
causes smurf packets (see the nosmurfs option in <ulink
|
causes smurf packets (see the nosmurfs option in <ulink
|
||||||
url="/manpages6/shorewall6-interfaces.html">shorewall6-interfaces</ulink>(5)) to
|
url="/manpages6/shorewall6-interfaces.html">shorewall6-interfaces</ulink>(5))
|
||||||
be dropped. A_DROP causes the packets to be audited prior to being
|
to be dropped. A_DROP causes the packets to be audited prior to
|
||||||
dropped and requires AUDIT_TARGET support in the kernel and
|
being dropped and requires AUDIT_TARGET support in the kernel and
|
||||||
ip6tables.</para>
|
ip6tables.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -2187,7 +2194,8 @@ INLINE - - - ; -j REJECT
|
|||||||
<filename>tcdevices</filename> and <filename>tcclasses</filename>
|
<filename>tcdevices</filename> and <filename>tcclasses</filename>
|
||||||
files. This allows the compiler to have access to your Shorewall
|
files. This allows the compiler to have access to your Shorewall
|
||||||
traffic shaping configuration so that it can validate CLASSIFY rules
|
traffic shaping configuration so that it can validate CLASSIFY rules
|
||||||
in <ulink url="/manpages6/shorewall6-tcrules.html">shorewall6-tcrules</ulink>
|
in <ulink
|
||||||
|
url="/manpages6/shorewall6-tcrules.html">shorewall6-tcrules</ulink>
|
||||||
(5).</para>
|
(5).</para>
|
||||||
|
|
||||||
<warning>
|
<warning>
|
||||||
@ -2222,12 +2230,12 @@ INLINE - - - ; -j REJECT
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>Added in Shorewall 4.4.6. Determines the mapping of a packet's
|
<para>Added in Shorewall 4.4.6. Determines the mapping of a packet's
|
||||||
TOS field to priority bands. See <ulink
|
TOS field to priority bands. See <ulink
|
||||||
url="/manpages6/shorewall6-tcpri.html">shorewall6-tcpri</ulink>(5). The
|
url="/manpages6/shorewall6-tcpri.html">shorewall6-tcpri</ulink>(5).
|
||||||
<emphasis>map</emphasis> consists of 16 space-separated digits with
|
The <emphasis>map</emphasis> consists of 16 space-separated digits
|
||||||
values 1, 2 or 3. A value of 1 corresponds to Linux priority 0, 2 to
|
with values 1, 2 or 3. A value of 1 corresponds to Linux priority 0,
|
||||||
Linux priority 1, and 3 to Linux Priority 2. The first entry gives
|
2 to Linux priority 1, and 3 to Linux Priority 2. The first entry
|
||||||
the priority of TOS value 0, the second of TOS value 1, and so on.
|
gives the priority of TOS value 0, the second of TOS value 1, and so
|
||||||
See tc-prio(8) for additional information.</para>
|
on. See tc-prio(8) for additional information.</para>
|
||||||
|
|
||||||
<para>The default setting is TC_PRIOMAP="2 3 3 3 2 3 1 1 2 2 2 2 2 2
|
<para>The default setting is TC_PRIOMAP="2 3 3 3 2 3 1 1 2 2 2 2 2 2
|
||||||
2 2".</para>
|
2 2".</para>
|
||||||
@ -2273,8 +2281,8 @@ INLINE - - - ; -j REJECT
|
|||||||
<para>Added in Shorewall 4.4.3. When set to Yes, causes the
|
<para>Added in Shorewall 4.4.3. When set to Yes, causes the
|
||||||
<option>track</option> option to be assumed on all providers defined
|
<option>track</option> option to be assumed on all providers defined
|
||||||
in <ulink
|
in <ulink
|
||||||
url="/manpages6/shorewall6-providers.html">shorewall6-providers</ulink>(5). May
|
url="/manpages6/shorewall6-providers.html">shorewall6-providers</ulink>(5).
|
||||||
be overridden on an individual provider through use of the
|
May be overridden on an individual provider through use of the
|
||||||
<option>notrack</option> option. The default value is 'No'.</para>
|
<option>notrack</option> option. The default value is 'No'.</para>
|
||||||
|
|
||||||
<para>Beginning in Shorewall 4.4.6, setting this option to 'Yes'
|
<para>Beginning in Shorewall 4.4.6, setting this option to 'Yes'
|
||||||
@ -2286,14 +2294,15 @@ INLINE - - - ; -j REJECT
|
|||||||
to zero, thus allowing the packet to be routed using the 'main'
|
to zero, thus allowing the packet to be routed using the 'main'
|
||||||
routing table. Using the main table allowed dynamic routes (such as
|
routing table. Using the main table allowed dynamic routes (such as
|
||||||
those added for VPNs) to be effective. The <ulink
|
those added for VPNs) to be effective. The <ulink
|
||||||
url="/manpages6/shorewall6-rtrules.html">shorewall6-rtrules</ulink>(5) file was
|
url="/manpages6/shorewall6-rtrules.html">shorewall6-rtrules</ulink>(5)
|
||||||
created to provide a better alternative to clearing the packet mark.
|
file was created to provide a better alternative to clearing the
|
||||||
As a consequence, passing these packets to PREROUTING complicates
|
packet mark. As a consequence, passing these packets to PREROUTING
|
||||||
things without providing any real benefit. Beginning with Shorewall
|
complicates things without providing any real benefit. Beginning
|
||||||
4.4.6, when TRACK_PROVIDERS=Yes and TC_EXPERT=No, packets arriving
|
with Shorewall 4.4.6, when TRACK_PROVIDERS=Yes and TC_EXPERT=No,
|
||||||
through 'tracked' interfaces will not be passed to the PREROUTING
|
packets arriving through 'tracked' interfaces will not be passed to
|
||||||
rules. Since TRACK_PROVIDERS was just introduced in 4.4.3, this
|
the PREROUTING rules. Since TRACK_PROVIDERS was just introduced in
|
||||||
change should be transparent to most, if not all, users.</para>
|
4.4.3, this change should be transparent to most, if not all,
|
||||||
|
users.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -2322,10 +2331,10 @@ INLINE - - - ; -j REJECT
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>Added in Shorewall 4.5.13. Shorewall has traditionally passed
|
<para>Added in Shorewall 4.5.13. Shorewall has traditionally passed
|
||||||
UNTRACKED packets through the NEW section of <ulink
|
UNTRACKED packets through the NEW section of <ulink
|
||||||
url="/manpages6/shorewall6-rules.html">shorewall6-rules</ulink> (5). When a
|
url="/manpages6/shorewall6-rules.html">shorewall6-rules</ulink> (5).
|
||||||
packet in UNTRACKED state fails to match any rule in the UNTRACKED
|
When a packet in UNTRACKED state fails to match any rule in the
|
||||||
section, the packet is disposed of based on this setting. The
|
UNTRACKED section, the packet is disposed of based on this setting.
|
||||||
default value is CONTINUE for compatibility with earlier
|
The default value is CONTINUE for compatibility with earlier
|
||||||
versions.</para>
|
versions.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -2337,8 +2346,8 @@ INLINE - - - ; -j REJECT
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>Added in Shorewall 4.5.13. Packets in the UNTRACKED state that
|
<para>Added in Shorewall 4.5.13. Packets in the UNTRACKED state that
|
||||||
do not match any rule in the UNTRACKED section of <ulink
|
do not match any rule in the UNTRACKED section of <ulink
|
||||||
url="/manpages6/shorewall6-rules.html">shorewall6-rules</ulink> (5) are
|
url="/manpages6/shorewall6-rules.html">shorewall6-rules</ulink> (5)
|
||||||
logged at this level. The default value is empty which means no
|
are logged at this level. The default value is empty which means no
|
||||||
logging is performed.</para>
|
logging is performed.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
@ -6,6 +6,8 @@
|
|||||||
<refentrytitle>shorewall6</refentrytitle>
|
<refentrytitle>shorewall6</refentrytitle>
|
||||||
|
|
||||||
<manvolnum>8</manvolnum>
|
<manvolnum>8</manvolnum>
|
||||||
|
|
||||||
|
<refmiscinfo>Administrative Commands</refmiscinfo>
|
||||||
</refmeta>
|
</refmeta>
|
||||||
|
|
||||||
<refnamediv>
|
<refnamediv>
|
||||||
@ -659,9 +661,9 @@
|
|||||||
role="bold">v</emphasis> and <emphasis role="bold">q</emphasis>. If the
|
role="bold">v</emphasis> and <emphasis role="bold">q</emphasis>. If the
|
||||||
options are omitted, the amount of output is determined by the setting of
|
options are omitted, the amount of output is determined by the setting of
|
||||||
the VERBOSITY parameter in <ulink
|
the VERBOSITY parameter in <ulink
|
||||||
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5). Each <emphasis
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5). Each
|
||||||
role="bold">v</emphasis> adds one to the effective verbosity and each
|
<emphasis role="bold">v</emphasis> adds one to the effective verbosity and
|
||||||
<emphasis role="bold">q</emphasis> subtracts one from the effective
|
each <emphasis role="bold">q</emphasis> subtracts one from the effective
|
||||||
VERBOSITY. Alternatively, <emphasis role="bold">v</emphasis> may be
|
VERBOSITY. Alternatively, <emphasis role="bold">v</emphasis> may be
|
||||||
followed immediately with one of -1,0,1,2 to specify a specify VERBOSITY.
|
followed immediately with one of -1,0,1,2 to specify a specify VERBOSITY.
|
||||||
There may be no white-space between <emphasis role="bold">v</emphasis> and
|
There may be no white-space between <emphasis role="bold">v</emphasis> and
|
||||||
@ -701,10 +703,10 @@
|
|||||||
|
|
||||||
<para>Beginning with Shorewall 4.5.9, the <emphasis
|
<para>Beginning with Shorewall 4.5.9, the <emphasis
|
||||||
role="bold">dynamic_shared</emphasis> zone option (<ulink
|
role="bold">dynamic_shared</emphasis> zone option (<ulink
|
||||||
url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink>(5)) allows a
|
url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink>(5))
|
||||||
single ipset to handle entries for multiple interfaces. When that
|
allows a single ipset to handle entries for multiple interfaces.
|
||||||
option is specified for a zone, the <command>add</command> command
|
When that option is specified for a zone, the <command>add</command>
|
||||||
has the alternative syntax in which the
|
command has the alternative syntax in which the
|
||||||
<replaceable>zone</replaceable> name precedes the
|
<replaceable>zone</replaceable> name precedes the
|
||||||
<replaceable>host-list</replaceable>.</para>
|
<replaceable>host-list</replaceable>.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
@ -756,7 +758,8 @@
|
|||||||
warning message to be issued if the line current line contains
|
warning message to be issued if the line current line contains
|
||||||
alternative input specifications following a semicolon (";"). Such
|
alternative input specifications following a semicolon (";"). Such
|
||||||
lines will be handled incorrectly if INLINE_MATCHES is set to Yes in
|
lines will be handled incorrectly if INLINE_MATCHES is set to Yes in
|
||||||
<ulink url="/manpages6/shorewall6.conf.html">shorewall6.conf(5)</ulink>.</para>
|
<ulink
|
||||||
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf(5)</ulink>.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -822,7 +825,8 @@
|
|||||||
warning message to be issued if the line current line contains
|
warning message to be issued if the line current line contains
|
||||||
alternative input specifications following a semicolon (";"). Such
|
alternative input specifications following a semicolon (";"). Such
|
||||||
lines will be handled incorrectly if INLINE_MATCHES is set to Yes in
|
lines will be handled incorrectly if INLINE_MATCHES is set to Yes in
|
||||||
<ulink url="/manpages6/shorewall6.conf.html">shorewall6.conf(5)</ulink>.</para>
|
<ulink
|
||||||
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf(5)</ulink>.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -842,11 +846,11 @@
|
|||||||
|
|
||||||
<para>Beginning with Shorewall 4.5.9, the <emphasis
|
<para>Beginning with Shorewall 4.5.9, the <emphasis
|
||||||
role="bold">dynamic_shared</emphasis> zone option (<ulink
|
role="bold">dynamic_shared</emphasis> zone option (<ulink
|
||||||
url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink>(5)) allows a
|
url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink>(5))
|
||||||
single ipset to handle entries for multiple interfaces. When that
|
allows a single ipset to handle entries for multiple interfaces.
|
||||||
option is specified for a zone, the <command>delete</command>
|
When that option is specified for a zone, the
|
||||||
command has the alternative syntax in which the
|
<command>delete</command> command has the alternative syntax in
|
||||||
<replaceable>zone</replaceable> name precedes the
|
which the <replaceable>zone</replaceable> name precedes the
|
||||||
<replaceable>host-list</replaceable>.</para>
|
<replaceable>host-list</replaceable>.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -865,8 +869,8 @@
|
|||||||
any optional network interface. <replaceable>interface</replaceable>
|
any optional network interface. <replaceable>interface</replaceable>
|
||||||
may be either the logical or physical name of the interface. The
|
may be either the logical or physical name of the interface. The
|
||||||
command removes any routes added from <ulink
|
command removes any routes added from <ulink
|
||||||
url="/manpages6/shorewall6-routes.html">shorewall6-routes</ulink>(5) and any
|
url="/manpages6/shorewall6-routes.html">shorewall6-routes</ulink>(5)
|
||||||
traffic shaping configuration for the interface.</para>
|
and any traffic shaping configuration for the interface.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -912,8 +916,8 @@
|
|||||||
may be either the logical or physical name of the interface. The
|
may be either the logical or physical name of the interface. The
|
||||||
command sets <filename>/proc</filename> entries for the interface,
|
command sets <filename>/proc</filename> entries for the interface,
|
||||||
adds any route specified in <ulink
|
adds any route specified in <ulink
|
||||||
url="/manpages6/shorewall6-routes.html">shorewall6-routes</ulink>(5) and
|
url="/manpages6/shorewall6-routes.html">shorewall6-routes</ulink>(5)
|
||||||
installs the interface's traffic shaping configuration, if
|
and installs the interface's traffic shaping configuration, if
|
||||||
any.</para>
|
any.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -1032,7 +1036,8 @@
|
|||||||
warning message to be issued if the line current line contains
|
warning message to be issued if the line current line contains
|
||||||
alternative input specifications following a semicolon (";"). Such
|
alternative input specifications following a semicolon (";"). Such
|
||||||
lines will be handled incorrectly if INLINE_MATCHES is set to Yes in
|
lines will be handled incorrectly if INLINE_MATCHES is set to Yes in
|
||||||
<ulink url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5).</para>
|
<ulink
|
||||||
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5).</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -1043,7 +1048,8 @@
|
|||||||
<para>Causes traffic from the listed <emphasis>address</emphasis>es
|
<para>Causes traffic from the listed <emphasis>address</emphasis>es
|
||||||
to be logged then discarded. Logging occurs at the log level
|
to be logged then discarded. Logging occurs at the log level
|
||||||
specified by the BLACKLIST_LOGLEVEL setting in <ulink
|
specified by the BLACKLIST_LOGLEVEL setting in <ulink
|
||||||
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink> (5).</para>
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>
|
||||||
|
(5).</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -1052,7 +1058,8 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Monitors the log file specified by the LOGFILE option in
|
<para>Monitors the log file specified by the LOGFILE option in
|
||||||
<ulink url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5) and
|
<ulink
|
||||||
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5) and
|
||||||
produces an audible alarm when new Shorewall6 messages are logged.
|
produces an audible alarm when new Shorewall6 messages are logged.
|
||||||
The <emphasis role="bold">-m</emphasis> option causes the MAC
|
The <emphasis role="bold">-m</emphasis> option causes the MAC
|
||||||
address of each packet source to be displayed if that information is
|
address of each packet source to be displayed if that information is
|
||||||
@ -1072,7 +1079,8 @@
|
|||||||
<para>Causes traffic from the listed <emphasis>address</emphasis>es
|
<para>Causes traffic from the listed <emphasis>address</emphasis>es
|
||||||
to be logged then rejected. Logging occurs at the log level
|
to be logged then rejected. Logging occurs at the log level
|
||||||
specified by the BLACKLIST_LOGLEVEL setting in <ulink
|
specified by the BLACKLIST_LOGLEVEL setting in <ulink
|
||||||
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink> (5).</para>
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>
|
||||||
|
(5).</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -1124,7 +1132,8 @@
|
|||||||
warning message to be issued if the line current line contains
|
warning message to be issued if the line current line contains
|
||||||
alternative input specifications following a semicolon (";"). Such
|
alternative input specifications following a semicolon (";"). Such
|
||||||
lines will be handled incorrectly if INLINE_MATCHES is set to Yes in
|
lines will be handled incorrectly if INLINE_MATCHES is set to Yes in
|
||||||
<ulink url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5).</para>
|
<ulink
|
||||||
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5).</para>
|
||||||
|
|
||||||
<para>The -<option>D</option> option was added in Shorewall 4.5.3
|
<para>The -<option>D</option> option was added in Shorewall 4.5.3
|
||||||
and causes Shorewall to look in the given
|
and causes Shorewall to look in the given
|
||||||
@ -1184,7 +1193,8 @@
|
|||||||
warning message to be issued if the line current line contains
|
warning message to be issued if the line current line contains
|
||||||
alternative input specifications following a semicolon (";"). Such
|
alternative input specifications following a semicolon (";"). Such
|
||||||
lines will be handled incorrectly if INLINE_MATCHES is set to Yes in
|
lines will be handled incorrectly if INLINE_MATCHES is set to Yes in
|
||||||
<ulink url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5).</para>
|
<ulink
|
||||||
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5).</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -1229,9 +1239,9 @@
|
|||||||
<para>The <option>-c</option> option was added in Shorewall 4.4.20
|
<para>The <option>-c</option> option was added in Shorewall 4.4.20
|
||||||
and performs the compilation step unconditionally, overriding the
|
and performs the compilation step unconditionally, overriding the
|
||||||
AUTOMAKE setting in <ulink
|
AUTOMAKE setting in <ulink
|
||||||
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5). When both
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5).
|
||||||
<option>-f</option> and <option>-c </option>are present, the result
|
When both <option>-f</option> and <option>-c </option>are present,
|
||||||
is determined by the option that appears last.</para>
|
the result is determined by the option that appears last.</para>
|
||||||
|
|
||||||
<para>The <option>-T</option> option was added in Shorewall 4.5.3
|
<para>The <option>-T</option> option was added in Shorewall 4.5.3
|
||||||
and causes a Perl stack trace to be included with each
|
and causes a Perl stack trace to be included with each
|
||||||
@ -1241,7 +1251,8 @@
|
|||||||
warning message to be issued if the line current line contains
|
warning message to be issued if the line current line contains
|
||||||
alternative input specifications following a semicolon (";"). Such
|
alternative input specifications following a semicolon (";"). Such
|
||||||
lines will be handled incorrectly if INLINE_MATCHES is set to Yes in
|
lines will be handled incorrectly if INLINE_MATCHES is set to Yes in
|
||||||
<ulink url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5).</para>
|
<ulink
|
||||||
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5).</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -1445,8 +1456,8 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>Displays the last 20 Shorewall6 messages from the log
|
<para>Displays the last 20 Shorewall6 messages from the log
|
||||||
file specified by the LOGFILE option in <ulink
|
file specified by the LOGFILE option in <ulink
|
||||||
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5). The
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5).
|
||||||
<emphasis role="bold">-m</emphasis> option causes the MAC
|
The <emphasis role="bold">-m</emphasis> option causes the MAC
|
||||||
address of each packet source to be displayed if that
|
address of each packet source to be displayed if that
|
||||||
information is available.</para>
|
information is available.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
@ -1537,16 +1548,16 @@
|
|||||||
for configuration files. If <emphasis role="bold">-f</emphasis> is
|
for configuration files. If <emphasis role="bold">-f</emphasis> is
|
||||||
specified, the saved configuration specified by the RESTOREFILE
|
specified, the saved configuration specified by the RESTOREFILE
|
||||||
option in <ulink
|
option in <ulink
|
||||||
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5) will be
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5)
|
||||||
restored if that saved configuration exists and has been modified
|
will be restored if that saved configuration exists and has been
|
||||||
more recently than the files in /etc/shorewall6. When <emphasis
|
modified more recently than the files in /etc/shorewall6. When
|
||||||
role="bold">-f</emphasis> is given, a
|
<emphasis role="bold">-f</emphasis> is given, a
|
||||||
<replaceable>directory</replaceable> may not be specified.</para>
|
<replaceable>directory</replaceable> may not be specified.</para>
|
||||||
|
|
||||||
<para>Update: In Shorewall6 4.4.20, a new LEGACY_FASTSTART option
|
<para>Update: In Shorewall6 4.4.20, a new LEGACY_FASTSTART option
|
||||||
was added to <ulink
|
was added to <ulink
|
||||||
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5). When
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5).
|
||||||
LEGACY_FASTSTART=No, the modification times of files in
|
When LEGACY_FASTSTART=No, the modification times of files in
|
||||||
/etc/shorewall6 are compared with that of
|
/etc/shorewall6 are compared with that of
|
||||||
/var/lib/shorewall6/firewall (the compiled script that last
|
/var/lib/shorewall6/firewall (the compiled script that last
|
||||||
started/restarted the firewall).</para>
|
started/restarted the firewall).</para>
|
||||||
@ -1557,9 +1568,9 @@
|
|||||||
<para>The <option>-c</option> option was added in Shorewall 4.4.20
|
<para>The <option>-c</option> option was added in Shorewall 4.4.20
|
||||||
and performs the compilation step unconditionally, overriding the
|
and performs the compilation step unconditionally, overriding the
|
||||||
AUTOMAKE setting in <ulink
|
AUTOMAKE setting in <ulink
|
||||||
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5). When both
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5).
|
||||||
<option>-f</option> and <option>-c </option>are present, the result
|
When both <option>-f</option> and <option>-c </option>are present,
|
||||||
is determined by the option that appears last.</para>
|
the result is determined by the option that appears last.</para>
|
||||||
|
|
||||||
<para>The <option>-T</option> option was added in Shorewall 4.5.3
|
<para>The <option>-T</option> option was added in Shorewall 4.5.3
|
||||||
and causes a Perl stack trace to be included with each
|
and causes a Perl stack trace to be included with each
|
||||||
@ -1569,7 +1580,8 @@
|
|||||||
warning message to be issued if the line current line contains
|
warning message to be issued if the line current line contains
|
||||||
alternative input specifications following a semicolon (";"). Such
|
alternative input specifications following a semicolon (";"). Such
|
||||||
lines will be handled incorrectly if INLINE_MATCHES is set to Yes in
|
lines will be handled incorrectly if INLINE_MATCHES is set to Yes in
|
||||||
<ulink url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5).</para>
|
<ulink
|
||||||
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5).</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -1581,9 +1593,9 @@
|
|||||||
listed in <ulink
|
listed in <ulink
|
||||||
url="/manpages6/shorewall6-routestopped.html">shorewall6-routestopped</ulink>(5)
|
url="/manpages6/shorewall6-routestopped.html">shorewall6-routestopped</ulink>(5)
|
||||||
or permitted by the ADMINISABSENTMINDED option in <ulink
|
or permitted by the ADMINISABSENTMINDED option in <ulink
|
||||||
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5), are taken
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf</ulink>(5),
|
||||||
down. The only new traffic permitted through the firewall is from
|
are taken down. The only new traffic permitted through the firewall
|
||||||
systems listed in <ulink
|
is from systems listed in <ulink
|
||||||
url="/manpages6/shorewall6-routestopped.html">shorewall6-routestopped</ulink>(5)
|
url="/manpages6/shorewall6-routestopped.html">shorewall6-routestopped</ulink>(5)
|
||||||
or by ADMINISABSENTMINDED.</para>
|
or by ADMINISABSENTMINDED.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
@ -1652,13 +1664,15 @@
|
|||||||
|
|
||||||
<para>The <option>-b</option> option was added in Shorewall 4.4.26
|
<para>The <option>-b</option> option was added in Shorewall 4.4.26
|
||||||
and causes legacy blacklisting rules (<ulink
|
and causes legacy blacklisting rules (<ulink
|
||||||
url="/manpages6/shorewall6-blacklist.html">shorewall6-blacklist</ulink> (5) )
|
url="/manpages6/shorewall6-blacklist.html">shorewall6-blacklist</ulink>
|
||||||
to be converted to entries in the blrules file (<ulink
|
(5) ) to be converted to entries in the blrules file (<ulink
|
||||||
url="/manpages6/shorewall6-blrules.html">shorewall6-blrules</ulink> (5) ). The
|
url="/manpages6/shorewall6-blrules.html">shorewall6-blrules</ulink>
|
||||||
blacklist keyword is removed from <ulink
|
(5) ). The blacklist keyword is removed from <ulink
|
||||||
url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink> (5), <ulink
|
url="/manpages6/shorewall6-zones.html">shorewall6-zones</ulink> (5),
|
||||||
url="/manpages6/shorewall6-interfaces.html">shorewall6-interfaces</ulink> (5)
|
<ulink
|
||||||
and <ulink url="/manpages6/shorewall6-hosts.html">shorewall6-hosts</ulink> (5).
|
url="/manpages6/shorewall6-interfaces.html">shorewall6-interfaces</ulink>
|
||||||
|
(5) and <ulink
|
||||||
|
url="/manpages6/shorewall6-hosts.html">shorewall6-hosts</ulink> (5).
|
||||||
The unmodified files are saved with a .bak suffix.</para>
|
The unmodified files are saved with a .bak suffix.</para>
|
||||||
|
|
||||||
<para>The <option>-D</option> option was added in Shorewall 4.5.11.
|
<para>The <option>-D</option> option was added in Shorewall 4.5.11.
|
||||||
@ -1672,7 +1686,8 @@
|
|||||||
warning message to be issued if the line current line contains
|
warning message to be issued if the line current line contains
|
||||||
alternative input specifications following a semicolon (";"). Such
|
alternative input specifications following a semicolon (";"). Such
|
||||||
lines will be handled incorrectly if INLINE_MATCHES is set to Yes in
|
lines will be handled incorrectly if INLINE_MATCHES is set to Yes in
|
||||||
<ulink url="/manpages6/shorewall6.conf.html">shorewall6.conf(5)</ulink>.</para>
|
<ulink
|
||||||
|
url="/manpages6/shorewall6.conf.html">shorewall6.conf(5)</ulink>.</para>
|
||||||
|
|
||||||
<para>For a description of the other options, see the <emphasis
|
<para>For a description of the other options, see the <emphasis
|
||||||
role="bold">check</emphasis> command above.</para>
|
role="bold">check</emphasis> command above.</para>
|
||||||
|
Loading…
Reference in New Issue
Block a user