From 58204f5bc01c7f689b840ff6de9a2bb5d984d475 Mon Sep 17 00:00:00 2001 From: teastep Date: Thu, 23 Sep 2004 22:50:12 +0000 Subject: [PATCH] Update for Shorewall 2.0.9 git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@1641 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb --- Lrp2/etc/shorewall/actions | 12 +- Lrp2/etc/shorewall/masq | 7 + Lrp2/etc/shorewall/rules | 4 +- Lrp2/usr/share/shorewall/bogons | 9 +- Lrp2/usr/share/shorewall/firewall | 2 + Lrp2/usr/share/shorewall/version | 2 +- Shorewall-docs2/Documentation.xml | 15 +- Shorewall-docs2/Documentation_Index.xml | 402 +++++++++++++++++++----- Shorewall-docs2/FAQ.xml | 47 ++- Shorewall-docs2/OPENVPN.xml | 297 +++++------------ Shorewall-docs2/Shorewall_and_Kazaa.xml | 15 +- Shorewall-docs2/SimpleBridge.xml | 119 +++++++ Shorewall-docs2/bridge.xml | 9 +- Shorewall-docs2/images/SimpleBridge.dia | Bin 0 -> 1771 bytes Shorewall-docs2/images/SimpleBridge.png | Bin 0 -> 18017 bytes Shorewall-docs2/myfiles.xml | 75 +++-- Shorewall-docs2/ports.xml | 319 ++++++++++++++----- Shorewall-docs2/support.xml | 13 +- 18 files changed, 890 insertions(+), 457 deletions(-) create mode 100644 Shorewall-docs2/SimpleBridge.xml create mode 100644 Shorewall-docs2/images/SimpleBridge.dia create mode 100644 Shorewall-docs2/images/SimpleBridge.png diff --git a/Lrp2/etc/shorewall/actions b/Lrp2/etc/shorewall/actions index 8fb669752..9f6bca91f 100644 --- a/Lrp2/etc/shorewall/actions +++ b/Lrp2/etc/shorewall/actions @@ -1,5 +1,5 @@ # -# Shorewall 2.0 /etc/shorewall/actions +# Shorewall 2.1 /etc/shorewall/actions # # This file allows you to define new ACTIONS for use in rules # (/etc/shorewall/rules). You define the iptables rules to @@ -8,10 +8,12 @@ # # ACTION names should begin with an upper-case letter to # distinguish them from Shorewall-generated chain names and -# they must need the requirements of a Netfilter chain -# name as well as the requirements for a Bourne Shell identifier -# (must begin with a letter and be composed of letters, digits -# and underscore characters). +# they must need the requirements of a Netfilter chain. If +# you intend to log from the action then the name must be +# no longer than 11 character in length. Names must also +# meet the requirements for a Bourne Shell identifier (must +# begin with a letter and be composed of letters, digits and +# underscore characters). # # If you follow the action name with ":DROP", ":REJECT" or # :ACCEPT then the action will be taken before a DROP, REJECT or diff --git a/Lrp2/etc/shorewall/masq b/Lrp2/etc/shorewall/masq index 0acffd87e..e00044725 100644 --- a/Lrp2/etc/shorewall/masq +++ b/Lrp2/etc/shorewall/masq @@ -42,6 +42,13 @@ # will automatically add this address to the # INTERFACE named in the first column. # +# If you have set ADD_SNAT_ALIASES=Yes in +# /etc/shorewall/shorewall.conf then DO NOT +# PLACE YOUR EXTERNAL INTERFACE'S PRIMARY IP +# ADDRESS IN THIS COLUMN -- If you do so, you +# will loose your default route when Shorewall +# starts. +# # You may also specify a range of up to 256 # IP addresses if you want the SNAT address to # be assigned from that range in a round-robin diff --git a/Lrp2/etc/shorewall/rules b/Lrp2/etc/shorewall/rules index 74a4c1ea0..ec70e947f 100644 --- a/Lrp2/etc/shorewall/rules +++ b/Lrp2/etc/shorewall/rules @@ -195,8 +195,8 @@ # ranges. # # If you don't want to restrict client ports but need to -# specify an ADDRESS in the next column, then place "-" -# in this column. +# specify an ORIGINAL DEST in the next column, then place +# "-" in this column. # # If your kernel contains multi-port match support, then # only a single Netfilter rule will be generated if in diff --git a/Lrp2/usr/share/shorewall/bogons b/Lrp2/usr/share/shorewall/bogons index 8043d0d02..7b96cefde 100644 --- a/Lrp2/usr/share/shorewall/bogons +++ b/Lrp2/usr/share/shorewall/bogons @@ -14,7 +14,9 @@ # # Columns are: # -# SUBNET The subnet (host addresses also allowed) +# SUBNET The subnet (host addresses also allowed as are IP +# address ranges provided that your kernel and iptables +# include iprange match support). # TARGET Where to send packets to/from this subnet # RETURN - let the packet be processed normally # DROP - silently drop the packet @@ -47,8 +49,9 @@ 49.0.0.0/8 logdrop # JTC - Returned to IANA Mar 98 50.0.0.0/8 logdrop # JTC - Returned to IANA Mar 98 58.0.0.0/7 logdrop # Reserved -71.0.0.0/8 logdrop # Reserved -72.0.0.0/5 logdrop # Reserved +73.0.0.0/8 logdrop # Reserved +74.0.0.0/7 logdrop # Reserved +76.0.0.0/6 logdrop # Reserved 89.0.0.0/8 logdrop # Reserved 90.0.0.0/7 logdrop # Reserved 92.0.0.0/6 logdrop # Reserved diff --git a/Lrp2/usr/share/shorewall/firewall b/Lrp2/usr/share/shorewall/firewall index 28fd28713..8de9d460b 100755 --- a/Lrp2/usr/share/shorewall/firewall +++ b/Lrp2/usr/share/shorewall/firewall @@ -2075,6 +2075,8 @@ process_tc_rule() fi [ "x$dest" = "x-" ] || r="${r}-d $dest " + [ "x$proto" = "x-" ] && proto=all + [ "x$proto" = "x" ] && proto=all [ "$proto" = "all" ] || r="${r}-p $proto " [ "x$port" = "x-" ] || r="${r}--dport $port " [ "x$sport" = "x-" ] || r="${r}--sport $sport " diff --git a/Lrp2/usr/share/shorewall/version b/Lrp2/usr/share/shorewall/version index 815e68dd2..09843e3be 100644 --- a/Lrp2/usr/share/shorewall/version +++ b/Lrp2/usr/share/shorewall/version @@ -1 +1 @@ -2.0.8 +2.0.9 diff --git a/Shorewall-docs2/Documentation.xml b/Shorewall-docs2/Documentation.xml index b9b568290..39972f8be 100644 --- a/Shorewall-docs2/Documentation.xml +++ b/Shorewall-docs2/Documentation.xml @@ -15,7 +15,7 @@ - 2004-08-10 + 2004-09-10 2001-2004 @@ -1759,6 +1759,17 @@ DNAT loc:192.168.1.0/24 loc:192.168.1.3 tcp address), the original source address is used. If you want any destination address to match the rule but want to specify SNAT, simply use a colon followed by the SNAT address. + + + Shorewall does not take any steps to ensure that IP + addresses entered in this column are added to the appropriate + firewall interface. Unless traffic for this address is + automatically routed to the firewall by another router, it is your + responsibility to add the address using your distributions network + configuration facilities. See this article + for additional information. + @@ -3553,7 +3564,7 @@ eth1 - No - Only traffic to/from some of the hosts in this zone is encrypted. Those encrypted hosts are designated using the ipsec option in /etc/shorewall/hosts. + linkend="Hosts">/etc/shorewall/hosts. diff --git a/Shorewall-docs2/Documentation_Index.xml b/Shorewall-docs2/Documentation_Index.xml index 123d01137..752a24d15 100644 --- a/Shorewall-docs2/Documentation_Index.xml +++ b/Shorewall-docs2/Documentation_Index.xml @@ -15,7 +15,7 @@ - 2004-07-20 + 2004-09-23 2001-2004 @@ -31,14 +31,21 @@ 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, with no Front-Cover, and with no Back-Cover Texts. A copy of the license is included in the section entitled - GNU Free Documentation License. + GNU Free Documentation + License. + + The complete Shorewall Documentation is available for download + in both Docbook XML and HTML formats. + + Are you running Shorewall on Mandrake Linux - with a two-interface setup? + url="http://www.mandrakesoft.com">Mandrake + Linux with a two-interface setup? If so and if you configured your system while running a Mandrake release earlier than 10.0 final then this documentation will not apply @@ -51,7 +58,8 @@ - Introduction to Shorewall + Introduction to + Shorewall @@ -107,48 +115,167 @@ Common configuration - file features Comments in configuration - filesLine ContinuationINCLUDE DirectivePort Numbers/Service Namesconfiguration_file_basics.htm#PortsPort RangesUsing Shell VariablesUsing DNS NamesComplementing an IP - address or SubnetShorewall Configurations - (making a test configuration)Using MAC Addresses in Shorewall + file features  + + Comments + in configuration files + + + + Line + Continuation + + + + INCLUDE + Directive + + + + Port + Numbers/Service + Namesconfiguration_file_basics.htm#Ports + + + + Port + Ranges + + + + Using + Shell Variables + + + + Using + DNS Names + + + + Complementing an IP + address or Subnet + + + + Shorewall + Configurations (making a test configuration) + + + + Using MAC + Addresses in Shorewall + + Configuration File Reference Manual - paramszonesinterfaceshostspolicyrulesmasqproxyarpnattunnelstcrulesshorewall.confmodulestosblacklistrfc1918routestoppedaccountingusersets and usersmaclistactions and action.templatebogonsnetmap + + + params + + + + zones + + + + interfaces + + + + hosts + + + + policy + + + + rules + + + + masq + + + + proxyarp + + + + nat + + + + tunnels + + + + tcrules + + + + shorewall.conf + + + + modules + + + + tos + + + + blacklist + + + + rfc1918 + + + + routestopped + + + + accounting + + + + usersets and users + + + + maclist + + + + actions and + action.template + + + + bogons + + + + netmap + + @@ -161,7 +288,8 @@ - ECN Disabling by host or subnet + ECN Disabling by host or + subnet @@ -169,9 +297,9 @@ - Extension Scripts - (How to extend Shorewall without modifying Shorewall code through the - use of files in /etc/shorewall -- /etc/shorewall/start, + Extension + Scripts (How to extend Shorewall without modifying Shorewall + code through the use of files in /etc/shorewall -- /etc/shorewall/start, /etc/shorewall/stopped, etc.) @@ -197,7 +325,8 @@ - Getting help or answers to questions + Getting help or answers to + questions @@ -209,7 +338,8 @@ - Kazaa Filtering + Kazaa + Filtering @@ -235,7 +365,8 @@ - Netfilter Overview + Netfilter + Overview @@ -261,7 +392,7 @@ - 'Ping' Management + 'Ping' Management @@ -291,11 +422,13 @@ - Requirements + Requirements - Routing on One Interface + Routing on One + Interface @@ -303,29 +436,117 @@ - Shorewall Setup GuideIntroductionShorewall ConceptsNetwork InterfacesAddressing, Subnets and - RoutingIP AddressesSubnetsRoutingAddress Resolution Protocol (ARP)RFC 1918Setting up your NetworkRoutedNon-routedSNATDNATProxy ARPOne-to-one NATRulesOdds and EndsDNSStarting and Stopping the - Firewall + Shorewall Setup + Guide + + Introduction + + + + Shorewall + Concepts + + + + Network + Interfaces + + + + Addressing, Subnets and + Routing + + + + IP + Addresses + + + + Subnets + + + + Routing + + + + Address + Resolution Protocol (ARP) + + + + RFC + 1918 + + + + + + Setting up + your Network + + + + Routed + + + + Non-routed + + + + SNAT + + + + DNAT + + + + Proxy + ARP + + + + One-to-one + NAT + + + + + + Rules + + + + Odds + and Ends + + + + + + DNS + + + + Starting + and Stopping the Firewall + + @@ -334,13 +555,20 @@ Starting/stopping - the FirewallDescription of all - /sbin/shorewall commandsHow to safely - test a Shorewall configuration change + the Firewall + + Description of all /sbin/shorewall commands + + + + How to safely test a Shorewall configuration change + + - Squid with Shorewall + Squid with + Shorewall @@ -352,16 +580,18 @@ - Traffic Shaping/QOS + Traffic + Shaping/QOS Troubleshooting (Things to - try if it doesn't work) + try if it doesn't work) - User-defined Actions + User-defined + Actions @@ -402,13 +632,15 @@ - Other VPN types + Other VPN + types - White List Creation + White List + Creation \ No newline at end of file diff --git a/Shorewall-docs2/FAQ.xml b/Shorewall-docs2/FAQ.xml index 4ab719827..1a53f46da 100644 --- a/Shorewall-docs2/FAQ.xml +++ b/Shorewall-docs2/FAQ.xml @@ -17,7 +17,7 @@ - 2004-08-31 + 2004-09-23 2001-2004 @@ -617,6 +617,10 @@ to debug/develop the newnat interface. Answer: Add the routeback option to br0 in /etc/shorewall/interfaces. + + For more information on this type of configuration, see the Shorewall Simple Bridge + documentation. @@ -817,10 +821,11 @@ LOGBURST=""
- (FAQ 17) What does this log message mean? + (FAQ 17) Why are these packets being Dropped/Rejected? - Answer: Logging occurs out of a - number of chains (as indicated in the log message) in Shorewall: + Answer: Logging of + dropped/rejected packets occurs out of a number of chains (as indicated + in the log message) in Shorewall: @@ -937,9 +942,14 @@ LOGBURST="" The packet has a source IP address that isn't in any of your defined zones (shorewall check and look at the printed zone definitions) or the chain is FORWARD and the - destination IP isn't in any of your defined zones. Also see for another cause of packets being logged in - the FORWARD chain. + destination IP isn't in any of your defined zones. If the chain is + FORWARD and the IN and OUT interfaces are the same, then you + probably need the routeback + option on that interface in /etc/shorewall/interfaces + or you need the routeback option + in the relevant entry in /etc/shorewall/hosts. @@ -976,7 +986,7 @@ LOGBURST="" This packet was REJECTed out of the all2all chain -- the packet was rejected under the all->all REJECT - policy ( above). + policy (all2all above). @@ -1820,6 +1830,27 @@ iptables: Invalid argument Revision History + + 1.32 + + 2004-09-23 + + TE + + Add link to simple bridge documentation from FAQ + 35. + + + + 1.31 + + 2004-09-12 + + TE + + Rename FAQ 17. + + 1.30 diff --git a/Shorewall-docs2/OPENVPN.xml b/Shorewall-docs2/OPENVPN.xml index a80c7660e..589afc31e 100644 --- a/Shorewall-docs2/OPENVPN.xml +++ b/Shorewall-docs2/OPENVPN.xml @@ -21,7 +21,7 @@ - 2003-02-04 + 2004-09-14 2003 @@ -37,7 +37,8 @@ 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, with no Front-Cover, and with no Back-Cover Texts. A copy of the license is included in the section entitled - GNU Free Documentation License. + GNU Free Documentation + License. @@ -45,8 +46,9 @@ Network) daemon which can be used to securely link two or more private networks using an encrypted tunnel over the internet. OpenVPN is an Open Source project and is licensed under the GPL. - OpenVPN can be downloaded from http://openvpn.sourceforge.net/. + url="http://openvpn.sourceforge.net/license.html">licensed under the + GPL. OpenVPN can be downloaded from http://openvpn.sourceforge.net/. OpenVPN support was added to Shorewall in version 1.3.14. @@ -59,146 +61,73 @@ We want systems in the 192.168.1.0/24 subnetwork to be able to communicate with the systems in the 10.0.0.0/8 network. This is - accomplished through use of the /etc/shorewall/tunnels file and the - /etc/shorewall/policy file and OpenVPN. + accomplished through use of the + /etc/shorewall/tunnels file and the + /etc/shorewall/policy file and OpenVPN. While it was possible to use the Shorewall start and stop script to start and stop OpenVPN, I decided to use the init script of OpenVPN to start and stop it. On each firewall, you will need to declare a zone to represent the - remote subnet. We'll assume that this zone is called vpn - and declare it in /etc/shorewall/zones on both systems as follows. + remote subnet. We'll assume that this zone is called vpn + and declare it in /etc/shorewall/zones on both + systems as follows. - - /etc/shorewall/zones system A & B +
+ /etc/shorewall/zones — Systems A & + B - -
- - ZONE + #ZONE DISPLAY COMMENTS +vpn VPN Remote subnet + - DISPLAY + On system A, the 10.0.0.0/8 will comprise the vpn zone. - COMMENTS - - +
+ In /etc/shorewall/interfaces on system + A: -
- - vpn + #ZONE INTERFACE BROADCAST OPTIONS +vpn tun0 + - VPN + In /etc/shorewall/tunnels on system A, we need + the following: - Remote Subnet - - - -
+
+ #TYPE ZONE GATEWAY GATEWAY ZONE +openvpn net 134.28.54.2 +
- On system A, the 10.0.0.0/8 will comprise the vpn - zone. In /etc/shorewall/interfaces: + + Some OpenVPN clients (notabley on Windows) + do not use the same source and destination ports which can cause + problems. If system B is a Windows system, then you will want the + following entry in /etc/shorewall/tunnels instead of the one + above: - - etc/shorewall/interfaces system A + #TYPE ZONE GATEWAY GATEWAY ZONE +generic:udp:5000 net 134.28.54.2 + - - - - ZONE + This entry in /etc/shorewall/tunnels opens the + firewall so that OpenVPN traffic on the default port 5000/udp will be + accepted to/from the remote gateway. If you change the port used by + OpenVPN to 7777, you can define /etc/shorewall/tunnels like this: - INTERFACE +
+ /etc/shorewall/tunnels with port 7777: - BROADCAST - - OPTIONS - -
- - - - vpn - - tun0 - - - - - - - -
- - In /etc/shorewall/tunnels on system A, we need the following: - - - /etc/shorewall/tunnels system A - - - - - TYPE - - ZONE - - GATEWAY - - GATEWAY ZONE - - - - - - openvpn - - net - - 134.28.54.2 - - - - - -
- - This entry in /etc/shorewall/tunnels opens the firewall so that - OpenVPN traffic on the default port 5000/udp will be accepted to/from the - remote gateway. If you change the port used by OpenVPN to 7777, you can - define /etc/shorewall/tunnels like this: - - - /etc/shorewall/tunnels port 7777 - - - - - TYPE - - ZONE - - GATEWAY - - GATEWAY ZONE - - - - - - openvpn:7777 - - net - - 134.28.54.2 - - - - - -
+ #TYPE ZONE GATEWAY GATEWAY ZONE +openvpn:77777 net 134.28.54.2 + This is the OpenVPN config on system A: - dev tun +
+ dev tun local 206.162.148.9 remote 134.28.54.2 ifconfig 192.168.99.1 192.168.99.2 @@ -210,75 +139,31 @@ cert my-a.crt key my-a.key comp-lzo verb 5 +
Similarly, On system B the 192.168.1.0/24 subnet will comprise the - vpn zone. In /etc/shorewall/interfaces: + vpn zone - - /etc/shorewall/interfaces system B +
+ In /etc/shorewall/interfaces on system + B: - -
- - ZONE + #ZONE INTERFACE BROADCAST OPTIONS +vpn tun0 192.168.1.255 + - INTERFACE + In /etc/shorewall/tunnels on system B, we + have: - BROADCAST - - OPTIONS - - - - - - vpn - - tun0 - - 192.168.1.255 - - - - - -
- - In /etc/shorewall/tunnels on system B, we have: - - - /etc/shorewall/tunnels system B - - - - - TYPE - - ZONE - - GATEWAY - - GATEWAY ZONE - - - - - - openvpn - - net - - 206.191.148.9 - - - - - -
+
+ #TYPE ZONE GATEWAY GATEWAY ZONE +openvpn net 206.191.148.9 +
And in the OpenVPN config on system B: - dev tun +
+ dev tun local 134.28.54.2 remote 206.162.148.9 ifconfig 192.168.99.2 192.168.99.1 @@ -289,50 +174,20 @@ cert my-b.crt key my-b.key comp-lzo verb 5 +
You will need to allow traffic between the vpn zone and the loc zone on both systems -- if you simply want to admit all traffic in both directions, you can use the policy file: - - /etc/shorewall/policy system A & B +
+ /etc/shorewall/policy on systems A & + B - -
- - SOURCE - - DEST - - POLICY - - LOG LEVEL - - - - - - loc - - vpn - - ACCEPT - - - - - - vpn - - loc - - ACCEPT - - - - - -
+ #SOURCE DEST POLICY LOG LEVEL +loc vpn ACCEPT +vpn loc ACCEPT + On both systems, restart Shorewall and start OpenVPN. The systems in the two masqueraded subnetworks can now talk to each other. diff --git a/Shorewall-docs2/Shorewall_and_Kazaa.xml b/Shorewall-docs2/Shorewall_and_Kazaa.xml index 7af47bdd0..1c715e2f9 100644 --- a/Shorewall-docs2/Shorewall_and_Kazaa.xml +++ b/Shorewall-docs2/Shorewall_and_Kazaa.xml @@ -15,7 +15,7 @@ - 2004-02-04 + 2004-09-16 2003-2004 @@ -29,7 +29,8 @@ 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, with no Front-Cover, and with no Back-Cover Texts. A copy of the license is included in the section entitled - GNU Free Documentation License. + GNU Free Documentation + License. @@ -41,9 +42,8 @@ KazaaLite, iMash and Grokster. To filter traffic from your loc zone with ftwall, you - insert the following rules near the top of - your /etc/shorewall/rules file (before any ACCEPT rules whose source is the - loc zone). + insert the following rules in /etc/shorewall/rules file after any DROP or + REJECT rules whose source is the loc zone. #ACTION SOURCE DEST PROTO QUEUE loc net tcp @@ -54,8 +54,9 @@ and restart Shorewall. - There are ftwall init scripts for use with SuSE - and Debian Linux at There are ftwall init scripts for use with + SuSE and Debian Linux at + http://shorewall.net/pub/shorewall/contrib/ftwall. \ No newline at end of file diff --git a/Shorewall-docs2/SimpleBridge.xml b/Shorewall-docs2/SimpleBridge.xml new file mode 100644 index 000000000..27f5bad9c --- /dev/null +++ b/Shorewall-docs2/SimpleBridge.xml @@ -0,0 +1,119 @@ + + +
+ + + + Shorewall and a Simple Bridge + + + + Tom + + Eastep + + + + 2004-09-23 + + + 2004 + + Thomas M. Eastep + + + + Permission is granted to copy, distribute and/or modify this + document under the terms of the GNU Free Documentation License, Version + 1.2 or any later version published by the Free Software Foundation; with + no Invariant Sections, with no Front-Cover, and with no Back-Cover + Texts. A copy of the license is included in the section entitled + GNU Free Documentation + License. + + + +
+ Background + + Systems where Shorewall runs normally function as + routers. In the context of the Open System + Interconnect (OSI) reference model, a router operates at layer 3. + Shorewall may also be deployed on a GNU Linux System that acts as a + bridge. Bridges are layer-2 devices in the OSI + model (think of a bridge as an ethernet switch). + + Some differences between routers and bridges are: + + + + Routers determine packet destination based on the destination IP + address while bridges route traffic based on the destination MAC + address in the ethernet frame. + + + + As a consequence of the first difference, routers can be + connected to more than one IP network while a bridge may be part of + only a single network. + + + + A router cannot forward broadcast packets while a bridge + can. + + +
+ +
+ Application + + There are cases where you want to create a bridge to join two or + more LAN segments and you don't need to restrict the traffic between those + segments. This is the environment that is described in this article. + + + If you do need to restrict traffic through the bridge, please refer + to the Shorewall Bridge/Firewall + documentation. Also please refer to that documentation for + information about how to create a bridge. + + The following diagram shows a firewall for two bridged LAN + segments. + + + + This is fundimentally the Two-interface Firewall described in the + Two-interface Quickstart Guide. The + bridge-specific changes are restricted to the + /etc/shorewall/interfaces file. + + /etc/shorewall/interfaces: + + #ZONE INTERFACE BROADCAST OPTIONS +net eth0 detect ... +loc br0 10.0.1.255 routeback,... + + So the key points here are: + + + + The loc interface is br0. + + + + Neither eth1 nor + eth2 have IP addresses and + neither are mentioned in the Shorewall configuration. + + + + The routeback option is + specified for br0. + + +
+
\ No newline at end of file diff --git a/Shorewall-docs2/bridge.xml b/Shorewall-docs2/bridge.xml index d18ce081e..e419c042a 100755 --- a/Shorewall-docs2/bridge.xml +++ b/Shorewall-docs2/bridge.xml @@ -15,7 +15,7 @@ - 2004-09-10 + 2004-09-23 2004 @@ -70,7 +70,7 @@
Requirements - In order to use Shorewall with a bridging firewall: + In order to use Shorewall as a bridging firewall: @@ -103,6 +103,11 @@ You must be running Shorewall 2.0.1 Beta 1 or later. + + Note that if you need a bridge but do not need to restrict the + traffic through the bridge then any version of Shorewall will work. See + the Simple Bridge documentation for + details.
diff --git a/Shorewall-docs2/images/SimpleBridge.dia b/Shorewall-docs2/images/SimpleBridge.dia new file mode 100644 index 0000000000000000000000000000000000000000..ee88bda57a4fc3c0e99b8110bb513d8a985ae141 GIT binary patch literal 1771 zcmVPCyu} zK`O@ocwy*`rOaWqbP&3}q)1rIj&BZhk-q&W;P=0ZKjOvw0%4(OZI0~dlcE75KH0V*^ zpU4zasT7Ll7q6~FmWkw5KCI&5qrSSqHX6#7UNR4&sx3J`VLllcP_mtg=Np)sHV~RN zkeD_Qq?1*gWQiAKRU^|l4uu!xcCutGj<=J}yih`=%@K6G_S+!K;yvTP^}_TJ2lB@c zE9beZaGnHy`y$+tXwb3={A@A#W@x%{?e~VX-vwzf3Ps)MgDC4w{e3^`%hAzH{P^*X zXvnoSQoYXv74-R3KVJvFNcX^OSEfPJq7WPJoAt8Xp%aroDkWZRBJ}P>QmDUtOu1GO z;DT|U%tAc0{?vUE8Lx*vPV*zq`t}ot>On1 zxu-T@Wsj?T(WHDjE$dF?@V#griYNNd5C`@tvVnb^B@v3{WELk;HL>^OiZ-Abqw3BB zTi{N^Ux;A7$ePu2K#$X&F5=CkrkvZK-=1UTHVjsiMVthG$5G~mtyW4|=-Fl@%Clf* z&dAF1{oOoWiUkBVwJAL^+?n`RiF28_N-|BM)urc-T&YrRs8L%ILes>{u+|w;&#hZ; z8HD$8JYJNJtTek<%q1x(|L89wyb~&5PYL$M!swkas=)g{PzC&M zsRDPV3L9`LL*|&I3TZ>q#HkCItJtD2$q5~biXXD5C?js*h~qipu`m7@Bx2)*VG2#y zooNE9pdkvdNuH4C!`xP8pv!GtR!~AuvD)%P++@Gp)xSfUW*Z=8Gin_)6O`0QJ)0_;JikNM(amD}=u8<*nCFtTaE`LB< zzP5o)@R6Igvp9+-BJ#B_&-Ab=#AV*qQpXBrx=tqx*|~(GZ6q=sVn%S)@2V&P$fnHE zQ)W}QO_T!UO1)YuX02X2Qk1z^YsIKl)CCw3M6^~!>^4ybuvEsj;oUQXeW0FpF76zV zGnG-?ODmLfq9?}TRLtB+O=)1)#a_OLV$>?buz~GNOJDj)kxKdBEY!PNg(S3`%iX2z6A3x-ux6rC}(;FXj+v(BxeW#sL^;N?BgU`O!i{F#;4lO2hl^t)Zp92P+8{LZpq$Y zw*YBtwA%`k=Fb_2quU21cfrR&giN*}J$qosPLVr^giBu42vI-|6WWhP0`QN5#|9*_ z&Pc>EO>yT`{$vg@x=k!&P6|ti;4@{}ReLgoLgVE@lb7|PdQ`^>NydM+DvzY@B2$}E z<(Hg18R@jLL9l(t%1aOmg)G+hW30z_YfM#?_H#tRdpOO+9lDW2PcwBRK;8T}6S;W@ zT1>a20!dXU&=>fj<|ir5hAWhDQJI(psldu6WmaJx$WrqG0@voK|BzTQR3--j|J))(~*n9A^CMDbk|+urNRb4S3XW=QT!8q?Xl&5H6n!&A3g`x&Fv=57 z4>wYnzAfUKy(7r<;W{riL3A@CxdOhBO%ObAMeq9_HNYFl;xMwvU+X`-a&fZrmsu`O N{sphE7)6Oq0017?YLEZ` literal 0 HcmV?d00001 diff --git a/Shorewall-docs2/images/SimpleBridge.png b/Shorewall-docs2/images/SimpleBridge.png new file mode 100644 index 0000000000000000000000000000000000000000..d4d6efddc0b36e3f29f893c9c60a127802f37977 GIT binary patch literal 18017 zcmb_^2{cyi-|iN|qZLYq$UGJbl_X>g88Q`Rib9bx&qJaV87fkyl9`MZnIj>UBt>P) zOl3-D&h_;E|KE4cx4w1Och)+4t+$tK``P>6zv22_*L8ROnC=nMb`n7lBux!f1A?GP z!GF!P8}K(BCmxC7f0VAunntv=v|s!6`tU8?B@I(of}nYiuL%nImA%vi!9!@ODj9ht z{_OTP**fxtrce0vk>eDecanH2c*4R+VJxMOo_>!xsh_7NfBe+vXD1m(+j88q-4#ea_!Gp`?c}97%A(1S;LQ2IXO8mU%p&eSO^ITNloR8DLQ}tJW)F`>wU-~ zv!ujC?8uSE+S=OdTZMhRy<^(>1!&@(vbJ8haG|-mneOi~HZ~SKI5RcHcF3zRHkyKR zW1)$diVy&@Jof({04w zeftzwf45H$G)8eNTBxX~cuZ9JFaN3bUw)S)*Er-@L-QfrK^bddwuszdZpRBO%#R;ech?WZ^-G>Sp(0dN>N`74a$1zMgT^w%@Q&4QZdd!o_xAq2iMff- zMkfSvs;d?D?!A+D>DRaC?(XhJCqhO^tvf|R)6&xJN!!K6#ho-UQB_x8T3RwN*T4HN zS$?_8F2(rx@q-5ryliM7aUF^uzrkpJx?Hli`L^)LyQG$ZX@#ZHM>dU-qH9B}H*em= zg4OuWJFTy+?zX5L9UfM9R||`qlJL1I=QY)rDC6^*U!FQpP*8}mOnkNsOp^EA-!b(2{qC9-sf#^__U(J>I`U5E{@&~3 zE{sW5EqCr&RQs_rGrt^}W#Brb(Th8Yj*d33@NjL6Ocqcv9Fqg()qa=149(z z(0g_m@t|jPm!FzL#%X1~X8mzShR0-&JS!_J*86wR*sH@8o|6_u)(!6;s^G0ZdGaJn z;>bZ|6_voHG2x>}Tb?}GOG!zIbNAxhy%&2bi;9Y}b90aC>i+rtJFT2EyMNm2^5x4& zF2fA%#nt)VBHshQb-ljbJol-<((=?PInQ5aLTVgDR#uj(n%cel_bn>DoF_g#HoAMo zo|x}u8$z+b3q#s2!iD083*xA`VJUnnJ^Y&jAlCKfRWoExt7H8Sn zFA#m>`u@W1UiGX-}Q{y0Ws8n3#xqXkZ?m_^r&j{`2S0t*yHyCG|f| z>=YFh6%ol=s(AfcYevn`aBFyjb&-kV{scj+c*Dz=XRK&my?W(U5Xxy)E~yj{Q2qGv zVLz`-H+NnLR3h~1epm0r`SeUtb}TCv}j@CFwTk3VyB zJEU#jjJ7=@kx1!fmjoVYxl?G6))odBh-1%wwW2tYHf_QhJU5eAv^uVd7cew5bk@#J z(dV~_9QmjyEG!)8_1(5@+vaOFC_nc0ou|TLVwe_{j~uzyIzrENoX_j+z%(v#^q`1@ z#JeW)(OKmylknE#(j_)&+fDb}goK1XEI2X}8647Q&YU5Fu3e+Sf+ghS>?EF)mWJPR zI>fbm*REar{vN`@!s6mO0xcguendSvYinyOkrueVCf_6Tq_A-GKy>Q}?rn4!RT)w3 zK7nAt@d*{Z%kf!CN^dYVeTH62{=ONi2{rCH9>j#s_bmdJzD5RJv}`yUc6{)Yr~%}UOc?mTkVp)y3Rxu zbNjX{asZ!#%l; z!s?H%lDc}1?c1AnscE3U1nVPn^7Hc%OE{1>rO%$l`F3=lyKrF@$;i*ozm?ov0tzgu z;>1rqJKwQW@cHW_OM_Eyj06mkB1GT!@5=7HE^~v;TW1(MP#$rzg+&i)P_ca*AIbz? zSiktUx;pDWKe~MX{Ls|YJa_Kg!}3c-2ogRNWj}tD-I$mdqZ6t}dpkP1(CS5S%iY~_2M!1b36+(2Md z_wJeM>$l;(O&N&VetqijdAuW+F1WKMa2-t`TjJWrJ>8>^pFTB4#@5ybRo)^bPdPd| zYG`OUI7}dU>+0%IUE3u4r$VH5?cDi&b`ibah&6cd^rt*iG-h;mwp#Dvh}{8V#n9KRngmui;F*e`V=rX9-ExZ z)iET(S$X0zmzI_m`je@#F-qzQz#RN};>7%)pI^UxIfQfmXeP;$W@rrObIZ4QdG+3LSJXyYawzKf`f)&%p*eHc1`+-+C z*OznO_R(zX*82ws0dDk)kD?O$ENPX^yq=*JxdRm$nQp?M$ z?@F$kReAF%M8n$Z@}ozOCVOl2HnU5e(KvSOJ+S4sZ{M;WliHY~8YjM%UIef)HD&*^ zm4DNzj2S}!kdPpv zlah4Yd2dk9cc014&OQfR1dQU~==kyddlRG(LK|f|JD*EhV$xUe))fO<HZlP=BLUMekUpTe`#xzR8Z)7^X3OIHSh!51&xfR%wTkm7=}_c0d1Lc=PzDdAI~ia z4h{w;R9037yv)?Tr|hn;A!;@7g#XYlp?&G;>9>XT0;c*d$HcVt*I%=H6R+g1rg0s& z8!{%eqpPdywvdj`;*8+6`sW@$PXgd&=hKRk2a65FGwsmREk-1y&%n^o+{{pms9{E0 zdiv=nyo>y$<>(5>%)>UkaPzgq^srS(8)e?4+->Z+>j>M*F}JiPz$=2_cG$J4{b$u7 z@0l~N?}+N?=s0}N@2>DHxN(Ejv5i+yE#s7$8g)mg2xDc>;}N8YdL-u}K8c#1g;Umr z>SC7i#}6GHSY{jzIx!*3PVygndbrrwG`Jk(+(sFl^uk=!)z!@;O7rt0$Ca6>GfpwA zjwr69F2$6T%%X@H8&7|fPE9T`&}Xs<%rpeGhqYnk!# zud8hST3{>%Mx2s$5Wo)>qvQu!$*&X z|NY>EGhe=b_5AgXjsT>4xnI;kL|j~)2&!_Vvntm_8_USbvL9@UQBY7Y`W*bex34;Z zR$GRSk*dgl*@G~t@DRr(1yHi6G7_k6-M-B&?{ntDg`2C}d8tFh4VmJdwxCK9L4AEz zl^(33+k<&_?%HK+WQ4AP!ljRo2+}SM3Lu1C#x3M-MiiEmJSu0T4jvQAKUM04St@FW981dU%ghMVBk@k(cZ!G*|MVB7 ztgZ1*J5HBh5C1Xu@#V{qab?DFRbAc9R^_WZG7`#qs{QHXoiun+*m`RME&ulQu3o)r#LB1m>C-1fG3RC) z;`Qs-osQ4K!|A)I)l5xIYXVk@p!)tx2RL8cNh>av>JM}|keHDn)PI@(NTlEIQGJ>4 zpKf$X`Qfh_G)^Zf267Q=(@}wl&0yYWFF=&d1g25)Cm}{*uFC{fIHz)7E^rR_E zcm3R%GasGL1z!dV!S#OF79~kMYDVaPC$GMPiE6srvzOwqy}byU3#YaWE)cWd z>DvLjcZrfVuiO;xUB0a3)2f=>ihTa zS5i{KJzOe0yHjGuv=_xFwVd$=iCZDDzJCP;Nk0DWraUkO!0Yn9f3#1A8`~!Azpx?b zV)f$2l=QDmzbdY`G&E2Xz;oFWAwHOmIAxs7q5^dRrI!EvOgQMC({ybyIowzoRq?2% zW>I0`-^n3gjj6vnp-fvxhlYX6?AWoXr8$QjhnTJ0+$lG1+=x73en3ucd1=W*ad#K( zw(4XRuOFzqBY>Fh<3`2x4Z5sfSGODkeljs(BQWf+%DtFmRtUG)@DEBP&y2FJLP(T! zbw*Vyt3J#|7)b`U3hN#-j|{H!m!b3W^`$&)V6X)dcNU1?UG9m3`}gks?5#;bK(ZpW z0ClN}&jps5<&0?`BROS@ZQpJ;HtuN8)SH-?Ff@<+Ugvf@==SaQXkHbx@unVI##=Ry zjzmeEd=mE779_^E?rw~c%-eA(6EUEY5`sra=<4{%=nuTK-*XG9PnKQc4R2Ul97zFh zpyRG~V{_|HjbT*Y`m3apqN3)OmPh3*X{vznSUC=E?pEufNNz<1yLX&9yHY8>dESo5 z&CPxM_(DKH00t@Yqk_IEz1ZvI?CUG^`1u8>>A`~s*BH1#*Zc){Ek@P=9)S3m_0W1*SXjvO!<3PX0(cO*ti37(PqGuM<=-}Ys#OH$BQ6d`%)CTv7PZ%}(DeHWR_Q%3n zM~{k&iFqBeIDNW5h=LMDSF~IQq1aidv@%A6t`0~IfJv3|;*SFEz<%sQ`ttl_3XOU;Vec5)!<{VslNY=TdNW1shxDU(9E`B+18=2e$F>f*mHVA zc*BjTC=f(q9YZ`mUJFyFLI2?;9zI+fyX!>Z5o^=hxUuD#+1anv{&II)RuK{H?d{~d zy^@>jfRU~5#g(mCA{7;9VHK7=-D!O-yKBq}t(4r|pVrg_YH5+k*B!+z`}tK~zupXX z4D6hyyX+=1LO2r1XTeiG;^MMJ3o|ePxl#-efv7lJ|l#8 z>_|d{%KI%GOJwh@_UGW@a&mOsL;y(wKh`U*FX|Cx;0N*?)Iajo*efd5{Q2XN9yv0CFEGCsqDvGOzDE;6JJHwop8l?eL27k*9!u_wO7ZO3 zej*;>9m9VFxN7*#y{+4}xg)k}YY*r2ZoTyo{Xj;h6eUMZRaN8Txh>;V4P!Zbi%Uvs zmd1C{(9k$nGvgJ8(zDvy+0ok~e>M`)OxNSZ<>k#W88lb}lY>sFLh-HySOpeFvy=~5 zK?x{(`0(NL=l2>1?qRqC2Xyiz=2;(K-|%m~qmz??KfgQ$J#xDKs=l%8tpqZ(GbyTT zXb=<^Ctdt7E~zc!bIIAc`OOh${uN|@Hc zomeY)P_>yG7~G1Aib6ZZ^oe;WOX6DGl&+XhR$d<1ikJ3=To_4H{AM(fOXcnpS^1&) zmwIn*#1!V{?oLD6{(HP*SB`@cc}j3PfBv;?2|Ydi^4!D`ciG=pmYwz<)7PgU02|4Z zWe!LOjD`-tmo!KJY|7vuMYmpf-_em?&M0sZK+3Mjm4WyN@>y@z`WZXD5w-RiBTp{>2CBlJB3E@V|MTH-wL>YTm3fS_QE%n0u^ z=1U?YL8|@JCy;{}sn93W%USNfaC=0dEh9KGF+u;Y*7P5LH8Mg&EL3jR{O31sm6ViF z2Hm=~C5QeYySB`B9=YM6*+o1?*2Bz98iGvyvMNjey&qL@2o6Al7*@zft=ny8+!E%# z`|x*2FE0;O2wlVqB?zwyOY=k$aEdtKKF*A(BMU#B@;Zc%13KXjTyX|93fd3z^`r9q z`KN*F0R$~Q{Z{Xn;y%LKGGEx_eV*LBse_XG_*5wvE+%R!Dx&s*(iQyn@jR1TLw^K}`*8aNwUVyMH3($qVbEI5E==fvb{7_^vW=JDolqlaR1X9y#PZ zt8wQE7pwIR4duX0JbgNc*go&zke#n@P1YGOxJIx`Pu(+-SK?X1;vxKS>Ml`Hgr?dP z=K*zM;d}UQDitu@J6KpUa&k!IAjcy*B6%?m?2;?rUG5!{n)kJ_wOG>Z7puLzHq@Ggb_;M;t7!q0Bi!R5+yhia?T>I z>^gFciN2AM#*tafG5u52XW zXeYso?<9Wz>aNJki$HYId*_V<08J*|Y8^>Y4D4xW2z_%vSU6MK?%lC!xiAF>%7$#ZJF|%tSp}0tP5z<+ZIR54nc+~HW9P2vC*^}oc4lxpmJ@qptKVr z5mVXYyu3SVG3MtS9Oy};4P+q*pzgJ6hc*~c8^9<^n$1)}VAKtJ(hR6@K6Ox(;#!$q z3GM`aj)`AAnmsc;{pqFtIv{<`(k9*5J9nZd_U+yK=Iz_q`t7k485~tZgM(}w9F(=7 zX*Au%nFm~+L(C#BP4-mHn|-YEoyXGyo#?(wtf*LqICjR3dS6PbB6`F1>vZ0EKQUt$ zn}oa6xjm`^GMgA5-%ty_BKG<9a)-|n#MGZZai2DTbFQziM`2dAO+>B$b%34*{CILa z=GHB18ygh~#RCV}^!PPcGdQ-UWn|pa+lG*l*ts*coRfr8K`r2Mpk`@!HXq`eT$-Dp zXO-Bycdvkr20FmkufE;o?tv@QM^MTb;<`S4@>u#khE92l9&$}Yc=&CnuCQ7+n~1zT zv6%;6c(7jYr>ymto}0~V=q7ROZ*md`VjXEsVIYw{w6!sP%XplcDh2Kv;@UdYAxsOq zMMOr&{Txh9yFkz>uCKU)cb%F3N?18MR-#Ir?HPy@Wl>`M-t82{Y>qrFKHCzxL++Jz zk;3}QEZ_x1z+>ij-gJEWgyB#~SlHLg>u*nZ)53hWMd#?zih$K6;Amv#{rmSr8W9lE z(j|aP5G}%$YiW=EDIp^y_=rB(qEx{lG-p9C7U~om~Lpp-0EG{AJ>>CY@q5k)NW^`{a?&Y?V85rQDF}>gSg-HA-XFI?df<*~ z43CUlYYkkxefKU6fi;9^2stKR>Z}%CcXqz+22i&ke$>**o{hFb2nLKy`{16(4kicD-?MNC6jm$ZI~)!jBSwF20y2Za2i zv*^bUM`E-i_cLl9h{Fq3R)^isg@G%-a{{l$&u<0trG!PLiMhErn*vB;ra)(R_t;rA zS1P45wzg~2jof7Z6}hSIlmbX>f%yy!J+mM8R#9ecncpKr*}%%#+2lXf)YO9Y#aLQU z%0Re4_QHWLK7Bequ2Tm^j+`(N5oF1;(yQp4q1(Rx{rB+JWIh;gkdcuMQ=?Ju(`6bGQku{ZlX*C`6+P?OngLD zy$URL@!~}r8)@jK+It1Ifq1eulb8owK>rGaV)C3{$O|u1AHCP&!pk8SI0w83guBk> zLxX9mPObpmosb~)jUjxHp`FzH8hE|6v$GS`oXnm%D7~g#7Cu~DH!@2>EY}`3dLhox zOv>O$WpVP>IKHQw@#&=&m15-#4vWmIS;1ph&ww2M=kM@MR_H0NTidi{RK>r|MCZZ5 zaK1n8+8OG0l0JRuA%R`-PGKj@hImZ@B0tvscbEO2Un1ssIZBCyWp$z-tOB-nV_Pf^>`Q=ONm{iea?0Ot%fdrY@gNf*X)Q#cXufpZuiE?j`393mVR6}1l21YVBd za89r6MH7?G8{2l7nVC^t%p73+NQneF?i1(ar;zg2HZv`aRw_N$@<909NV^vbJJjf? zM%XU0;oL!+YrNjee!lL<&z~R+wW=c{BA9hc;UwDU@Cjq9n!wD7Z)PKPoX9w!?vsVEJhSi z1JD7el*r{EQiYCN3>-%tR0G=J1^6#kJ5E??maF%x(H+&&DlRPaTKX-z*a{eekrTy% zUdaC9Mb?O)CRe69e~oOr!|QVA@c^TMg0_snE`$Ja%+yqLECON2KugO8Aqj#8NPXI1 zlc(onQ2~>Z%ukH{0cb@--L)$hqz&lZ>&HhxnEm*XmySD|_JuR0mF3`NLba-R4*r%Yio^R8SlKUpCQPJE z4p;*S{}vWi=V%h^rfRd@`BRX8_(chc_V5=NP0kbEA9||l>{YhB7;w^9Y7?U0@koc` z0bQxZ$9>u|XYVE?$bEP#p7y*;=Z(0M3gu?*jr%zwxk3|U&YE?nXc2sJKc1d0fA|a9 zRaZl27m322V3f)F@sn49i$vm)HO&a6tDv9Sx?dwE1RZt0if0A~*k@5bhFN zT6$2hJK_An_V>h*sJeGakOuv{SgVS|t%~*<8P^!-$Mo)OO}wmmyY};m72oG(U%#Z% z1<%f3_F|PE=lWH_8}!G+{^H%<@urE7WoGslVtch>X2{FmtO=3`Af)*-n#HSENxwH0 zp6|#}y0Q_(kB^tvnX_k`OAlv|SrA=lUzk}cQq=!zq4y)%>;xp!F)%PNGfP}(@1=Mj zokb&{hVT6PYA?@QM#9Sh8nq`-mJbyOv?LN8up?k?aRj6_gu%_%CMXI-lW8|GG5HAbDm%OR z@lFDelk|M|l&*6)YkO%f33UUAta?NlLqA`vwJPw;H+Xgg1gMae)#}%{bU=ywUt?e zeNr=>jp^T2o{fzyT1AylJE&plYp5xpzr&|I5RW&k)IUml9aoa#<>ke+__npR_t}N7 ztd@SxsNTS=WcvP_8G)5Y&4%%eV2rBM5 zfCRJv zG~2hk{QOMS#)#^?P3ejMEa2cc7rtTWw_pAxmy@e>V>8YLs7Ds^p=MBI&ELQ=b|hYb3e4QMtQE>=$6tmZ3Uk$&jA@T{kb2 zrpiZ2htxE?`R13C3rh|M0xbd@RDWL^%YX^3vzYpsBa`P+mG9{>1Cw&*)YLPk$7u>I zn%&*Q)~50{D2LrcnNWTcGIo{G8X8duqx9+j;wY|jQ=ygIn!)kkpX#$TxYepCOJc*{ z+NF{bKvG zt8m0Qz0vw|kt7@Yb-AjCyu{)4wc7rsd=Y(PV@9USZC3??@pvX;CPm8M?X3OR<^9&H z97*F5S11W9R7XJRpu4+yWlaNe2QJmVXDlvxSZ(pmG$*I8U2o{5K&qm)OnT!;{fjG? zrXH+(^6KB9eQ!fJi;}@DD%b1l+R7mW(Yli-Bp$Ey-?r-i`y%`w4(xxQnwojxYtYS8 zyT>;>afe;q?*vo?DlW^H+ywC5#hTCzA^Qve`?8E1^?}s-k1i00K-;I$hWBybda&yf-;3i$8X3T)!i&+5%C|Z60c~9RjH~;k`s*Ye7E`J z$$z@R9WJHAwnC~$!sV(GI66BIyGSv!ye{0y6dSw8fn{){<>Jk-H8eP!rM>Cp%P_gs zo+>LF%H??#qdQ_P<9$C*Jp(9me0rc5o8J%BrAOYRB^O07LwK5_$RBb;gQJ_FTCCvi0SCMegC& zyE;lqMNdO>cE<0ce?-Cvqcg@t^{tG8innIpyF|L<$EPL=j+u%561&)2N5g&Cze=n{ zS^EkCk9I@8MQHAcp;C1kn!@7X`fI$RngP4iUeo*y8@Tb?47LSve*F*z&XjSrlDI^( zu)E_d4>h@=4^!732%-(r8}t_Xr$%f=J_C-ba{QC>VO$ny@O1riPGK9r5XuzK5YU=X z2IRH{T?)E6V>a}Atk#+$N_dU)C!uJKGf$U`R?JZqC68}syhVLJvLZG%c4%ZoX8-=z zuIcz1>bsolaKxb#Bm$FbV21X+nT2T^*#cHx!6Q25kIkOLdG-g>%ZwRlpE2l()po61 z-ucYLFL3ElPcc~GWXTWEANODE5obf`KZQQyR^@QM5 zJkzbKlhw--e0<6oxn-^+kwOfq_o-{{uN~QrAF(sR6_|VtokpQ-DEHQ+D=^S zuG5Sj`=Q*Rv{1?ClrFO6nW|$~8@n01B{SaAM)Z2#o^@j8@>Fqatn`=Jn31q0+4w=5 zb15t&(8AwYzKYyIPk{LtJRCzuwjF_$iF9=)TT3z^_>-NIW{yBGadF2T9CnfYvv8Gu z>gb4h#HHZZWLgAEw7T6{p_n zpWnapv5CZEIwTYBaEK8S4%rQB2YGQ0G=22>DYVegS z@Wi40`I@e0+26z`Eas_QkF4nLs4U*|*Ld%x@1avvYIzcAW83P?VDT z(A!%xV0Na38QHdqTkGoVY#Nyr)=TyS9wExyC*pXz@jlxCJ1{;0uE8wOwDz`*&E`+e zVF}Hf;)bvC=l$IrZEo;f`2mFtgyAx5wiWkU;KhS{gXM;z$GJHZzlsqHG~2<0_Y--b z2Z)H!5-_qIl9$JzB63CMC1XTa?uLz}+S7R(x?_~$;^P@zQP2b~3JaPk^00B-uS>D$Jm;`zdjQ0Q=tP*C??Y<9qhksT`q9Bf!aqMW_8P?p< z;f}KmGj+wucFOxO&%?LAKGU)r7A<0r$B#~Y2I+n}SxoTofFDo-5~i5gw`zY-n0FF$ zGI?J;VW()l_lM1rR*7*i{OZ+>1ZGq0fnj8ydly*UdIwV|O%PdOTGw3(^_y;B9ZcRF z>gVT&r#-+Ksqqzt#e2}ia0jrb3MS+R>*LWuq-`Vu1J~h`oBP$xK_E&iyr!*{%E8=W zLG|_=1&bil>t_gfW^622M)mT`mnEz$p9)N4XBV8dZL|3jF=HA&4v6iuk~`6Lhf0Zg z+ct_?B>ZM>g>M6)ZqhjkGAlq!a6WhWKQNcQ1XxZ<{C)zrRqwt27Q}J&-{zwUVT4ppb}ojw&V}+gZ+p~?(N@g*~ojt78DQ&;GH`P zyByDvz&BD55_eA-8U23u+-F6d&DBlM9b&7|1sTvu5WCK{4xcT7?w-(K9kbiW$cU;y zP5pZ1ueB8OoA83YZfb&Z7gSQ>8pZlyKnriA?X5BE=qecTypvDI!|x{D2i{# z#zOu3^RC$^F>TQKDpV%y4$!z$v*mH*w=}#3#Y=sMr$-Eojdx)9jpt@|04p%ap!uQK zPFMFG6hwF&*qNAkQ@CXpTj4ALK%d8?i=7pdMWGr(5)w`@ir{4}B4LM~8C(YUtM))}m8DXP)+p{%tZ z@pB0nv!g#sX1{HE;$~P^Lh|}X(qy{*B|`hC3<_gV<3B$XNtx#pEzd}}b?7#QBpZJG z=8#>EfVmTpUbc-v0@JCC50~w>F-q_Gd!2fWrd13=PucIqIcd3n!`3FAzh|}U94tJ0 zBmT1H1$EnGX>>odVpdN1G*#8FOp@)Mhd_-_+K%^8LPcr%R7k#Ih9HC%R);Re;gW_k$phx`Wa2KHN znTmaa6^8nDQI{h&7tG`gz=Z~J$i4h<3_FuGA-blGLD0z9SeA41wfdrG&mc?2xli9Q zEb}jgL>+fJ^ortsAl61r=dV z<>RY+|9%Ro5Zn**6^VgiQs`OveJ0-FvFTRT2Qa3*e5o3@ZzolQRw=xIFjY6cevOhn z3b$BrKgfRcOt`IXy$fTU{k>oZ-xvIv5Z^(onwgu!2{mZ2`z-UWZgNu#4kmc;o7i9g z4I)?{mx~AsZVW3L{F;Wr_6D!C?t#^N#CH7^4ktpDz!7O_V8gs^YvmK1La*jE!Tb zEulx?{-M+hvvF{8CdS8`fNNy?j(C`u`06a1^iHI{oaq+-xmE4Hf&nL(obX!b=H`Gy z>U(xEDZfcOEN&RWcnjLr|MOJ#KZ4=^->%Bc*Zr>;3uKq`a6}gX@fz{ztfQmYN@{zN z`Ph@fe}Yo8N|}j)Tj5NR35XMB?N_!X=4NKJ!K2k1W7yLTPB*%17CH9+eDUSW!Gj0O z?cA$Jjti{ce7JnmP}RbMEX2S|0V|uic~ZP9-PVuT3|HZ|=n}J??J(~L5`kS6F6%A> zuSnn}1_#gNgpX5!5`bHrh6WPC?4qBG26Q-tx&QDRc1^oGnaQ!@om{Dp9-(pdmKe7z zwWNCNGDnwzi2~+06v#Cok$Ee+;3Wt^;I7imdFGe}yH#n|h`89;v5AS@ro}Ito6lie zC2{Q7vA&532YmF8A1hP+^)O;x3k{8__eDwQ?4%_iUR8L{3K4L4L_rp-@9+HbWoP*l7?nWjTznhae4)81~H=@A1Vm@+J&!kx%-UF6^YQU*B9RKrD}>mp;XIz2nsTzv&1I)P7@!J{4*t#(yVhr= zrQA|ynxHsVc-KhnJoT@HJ@a5{Ep$qTZzh{`Q7x(Zk#3FH>6tFJgB`0m*u-RD@ZpZA z;a@Wc_#t!g%mnVR2LXSLx+E7nb^;ssz|~+g$dsMh(U1*rvm5K{7p=BHuYo9uG303E zhxhNvkkHB+zjfyhb1)C+A+l}`WBu2!U$;^fVM`8@7yxJ5s}kllU^7wySy~x91A7^~ zDRsM5ceY`t%*-I25+luK&V|uOQK}?HW_8Aw@sc)R1nq)(Nc8m7l#0tgN|36-JlI_# z!6sth3ey_4Aj6DyB1OHi4jY7F)}{-lWnf^Sqhm_`afLx4?8c2P5_!w)6?`j97=>b} zg#`qnA2;Rq6o|cMab$p4fVTm5Dknex*Lm|`LAMp7(9%@hUj0nVxTzm5ooojKn7-$g zr>3GZM*AVK9nYWtGUkHt9;V@2S)_eEFPnD=0z>`BVh+nOfywz$LG(m3c!-o ze;L&gZ9?WPun}7UXeVygluZA}PT&tU+P?bv;63(<}B-ed|YBH;RcW&;} zCO4bW(WG1!#qO~DKpyk-Q;n@RGMJy7{jyCVrPa2?(7*t;n%UV|Zh0Rn0&=!29G+lb zk;AsO!;s_s{QW6{T83bd4FI%7Wzg2r;-ghgb;src?4WU%j(clc(iON&oH}{3sedxh z8{+|V`Owf%j1go<>U`{f58oLhb}0BAxK>X_V1h|ZFBifvsmd0%&+mFv9Qse0&&xt|KA7#-#w2Oxb-t9PpF@zM;HB4>0Q#4 ztqDUG^eU7&O2Tvtp|Os&286IFYXo%zObYcX+}^T2rt+e-pbDdGF`o!$j;m1dgcmUykDmgNivmItrhR z%Xf?(^OL=S*uoE61*56e332$Cbzs*(KtOQDmX7@G{BXC{1a#Nc1=shJy%Kx&NJ_Rr zB!2hK3E>d@Cs^Yx`XOdA^xdaLMeO^|8$n&uAi<6>x*OXS$^KTdJ{sSLPeZ_CHmVDK znmy?tXj&$DOc|nWJe+kq_v|S|zGEw%l+>+pmt&r1R?qgo zIxPOplT5C@eFwUcY@7T)nOIS+a??|%ZYT8w9iusbLV<#S;pDEpzPWo2e}nFggXp^3 zrOt%)rR?y{Wcsw)8F_RobjuFd9>m1OQN)hOY@oezue?7(jkI;DzkpkXoWw2?u||vdROsuT?o3x7OH9J#qg$EoLTzS z=wWuh7Pt=@3~lfM=kG7Ei8o9lUsK4u%Euj>{OWAbED?{fb?bp9Bb zCr8xPfeqmOfDvXI)~ck*We5d;ljm+iE;RiqU`md9| z|Nb@g&Mh3U(>3SG6C-2=wEiz&eBi4Z`~{ayH#$DIf}hAOf7qHu;~9V0`J>>tBk0-NA{aW6X@U?QUwK^ft@P zq(5#Q)NkeFellhH@@ZCl8hhfooh$0dpFKSY#gHRNu-!l-3JL+>3kIXH|1a^7_Z9-O zJ%A64XCwm5)}RU<2rsgO$)nB{V>5PT)3SVZ)=zpD%6Lyj2fqux!IjQq*`^RwP2z0h*`*dAAA;x8ELY3?^@m z3)s^gUyz>O(A+Evi)TW036nL~Uqs$E3HgNfI^} - 2004-09-06 + 2004-09-07 2001-2004 @@ -78,11 +78,11 @@ I use SNAT through 206.124.146.179 for my Wife's Windows XP - system Tarry, and our  dual-booting (Windows - XP/SuSE 9.1) laptop Tipper which connects through the - Wireless Access Point (wap) via a Wireless Bridge (wet). + system Tarry, and our  dual-booting (SuSE + 9.1/Windows XP) laptop Tipper which connects through + the Wireless Access Point (wap) via a Wireless Bridge (wet). While the distance between the WAP and where I usually use - the laptop isn't very far (25 feet or so), using a WAC11 (CardBus + the laptop isn't very far (50 feet or so), using a WAC11 (CardBus wireless card) has proved very unsatisfactory (lots of lost connections). By replacing the WAC11 with the WET11 wireless bridge, I have virtually eliminated these problems (Being an old @@ -148,7 +148,8 @@ Tarry (192.168.1.4) runs a PPTP server for Road Warrior access from my work laptop and the Firewall is configured with IPSEC for tunnel mode - road warrior access from Tipper. + access from our second home in Omak, Washington.
@@ -397,7 +398,7 @@ $EXT_IF:2 eth2 206.124.146.179
- Tunnels File (Shell variable TEXAS set in + <title>Tunnels File (Shell variables TEXAS and OMAK set in /etc/shorewall/params)
@@ -653,6 +654,10 @@ ACCEPT tx loc:192.168.1.5 all zones
+ Because loc is a sub-zone of + net, loc must be defined first. + #ZONE DISPLAY COMMENTS loc Local Local networks net Internet The Big Bad Internet @@ -688,7 +693,7 @@ all all REJECT info
#ZONE INTERFACE BROADCAST OPTIONS -- br0 192.168.1.255 dhcp +- br0 192.168.1.255 dhcp #LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE
@@ -754,11 +759,13 @@ br0:eth0 00:0b:c1:53:cc:97 192.168.1.8 #TIPPER
This file is SuSE-specific and creates the bridge device br0. A script for other - disbributions would be similar. + distributions would be similar (see the Shorewall Bridge documentation for + examples). #!/bin/sh ################################################################################ -# Script to create a bridge between eth0, eth1 and eth2 +# Script to create a bridge # # This program is under GPL [http://www.gnu.org/copyleft/gpl.htm] # @@ -766,6 +773,15 @@ br0:eth0 00:0b:c1:53:cc:97 192.168.1.8 #TIPPER # # Modify the following variables to match your configuration # +#### BEGIN INIT INFO +# Provides: bridge +# Required-Start: coldplug +# Required-Stop: +# Default-Start: 2 3 5 +# Default-Stop: 0 1 6 +# Description: starts and stops a bridge +### END INIT INFO +# # chkconfig: 2345 05 89 # description: Layer 2 Bridge # @@ -773,21 +789,29 @@ br0:eth0 00:0b:c1:53:cc:97 192.168.1.8 #TIPPER PATH=$PATH:/sbin:/usr/sbin:/usr/local/sbin +INTERFACES="eth0 eth1" +BRIDGE="br0" + do_stop() { - echo "Stopping Bridge" - brctl delbr br0 - ip link set eth0 down - ip link set eth1 down + echo "Stopping Bridge $BRIDGE" + brctl delbr $BRIDGE + for interface in $INTERFACES; do + ip link set $interface down + done } do_start() { - echo "Starting Bridge" - ip link set eth0 up - ip link set eth1 up - brctl addbr br0 - brctl addif br0 eth0 - brctl addif br0 eth1 + echo "Starting Bridge $BRIDGE" + for interface in $INTERFACES; do + ip link set $interface up + done + + brctl addbr $BRIDGE + + for interface in $INTERFACES; do + brctl addif $BRIDGE $interface + done } case "$1" in @@ -816,11 +840,7 @@ exit 0
This file is SuSE-specific - BOOTPROTO='static' -BROADCAST='192.168.1.255' -IPADDR='192.168.1.5' -NETWORK='192.168.1.0' -NETMASK='255.255.255.0' + BOOTPROTO='dhcp' REMOTE_IPADDR='' STARTMODE='onboot' UNIQUE='3hqH.MjuOqWfSZ+C' @@ -835,8 +855,9 @@ MTU=''
This file is SuSE-specific - 192.168.1.0 - 255.255.255.0 br0 -default 192.168.1.254 - - + 192.168.1.0/24 dev br0 proto kernel scope link src 192.168.1.5 +127.0.0.0/8 dev lo scope link +default via 192.168.1.254 dev br0
diff --git a/Shorewall-docs2/ports.xml b/Shorewall-docs2/ports.xml index f9d4a5c77..940307f99 100644 --- a/Shorewall-docs2/ports.xml +++ b/Shorewall-docs2/ports.xml @@ -13,7 +13,7 @@ - 2004-07-31 + 2004-09-21 2001-2002 @@ -29,7 +29,8 @@ 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, with no Front-Cover, and with no Back-Cover Texts. A copy of the license is included in the section entitled - GNU Free Documentation License. + GNU Free Documentation + License. @@ -50,8 +51,8 @@ /usr/share/shorewall/actions.std file for a list of the actions in your distribution. If you find what you need, you simply use the action in a rule. For example, to allow DNS queries from the - dmz zone to the net - zone: + dmz zone to the net zone: #ACTION SOURCE DESTINATION AllowDNS dmz net @@ -67,7 +68,7 @@ AllowDNS dmz net
at 192.168.1.4 in your DMZ. The FTP section below gives you: #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> tcp 21 +ACCEPT <source> <destination> tcp 21 You would code your rule as follows: @@ -80,23 +81,23 @@ DNAT net dmz:192.168.1.4 tcp 21 Auth (identd) #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> tcp 113 +ACCEPT <source> <destination> tcp 113
DNS #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> udp 53 -ACCEPT <source> <destination> tcp 53 +ACCEPT <source> <destination> udp 53 +ACCEPT <source> <destination> tcp 53 Note that if you are setting up a DNS server that supports recursive - resolution, the server is the <destination> - for resolution requests (from clients) and is also the <source> - of recursive resolution requests (usually to other servers in the - 'net' zone). So for example, if you have a public DNS server in - your DMZ that supports recursive resolution for local clients then you - would need: + resolution, the server is the <destination> for + resolution requests (from clients) and is also the + <source> of recursive resolution requests + (usually to other servers in the 'net' zone). So for example, if you have + a public DNS server in your DMZ that supports recursive resolution for + local clients then you would need: #ACTION SOURCE DESTINATION PROTO DEST PORT(S) ACCEPT all dmz udp 53 @@ -105,9 +106,9 @@ ACCEPT dmz net udp 53 ACCEPT dmz net tcp 53 - Recursive Resolution means that if the server itself can't - resolve the name presented to it, the server will attempt to resolve the - name with the help of other servers. + Recursive Resolution means that if the server itself can't resolve + the name presented to it, the server will attempt to resolve the name + with the help of other servers.
@@ -115,36 +116,37 @@ ACCEPT dmz net tcp 53 FTP #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> tcp 21 +ACCEPT <source> <destination> tcp 21 - Look here for much more information. + Look here for much more + information.
ICQ/AIM #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> net tcp 5190 +ACCEPT <source> net tcp 5190
IMAP #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> tcp 143 #Unsecure IMAP -ACCEPT <source> <destination> tcp 993 #Secure IMAP +ACCEPT <source> <destination> tcp 143 #Unsecure IMAP +ACCEPT <source> <destination> tcp 993 #Secure IMAP
IPSEC #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> 50 -ACCEPT <source> <destination> 51 -ACCEPT <source> <destination> udp 500 -ACCEPT <destination> <source> 50 -ACCEPT <destination> <source> 51 -ACCEPT <destination> <source> udp 500 +ACCEPT <source> <destination> 50 +ACCEPT <source> <destination> 51 +ACCEPT <source> <destination> udp 500 +ACCEPT <destination> <source> 50 +ACCEPT <destination> <source> 51 +ACCEPT <destination> <source> udp 500 Lots more information here and here. @@ -154,23 +156,23 @@ ACCEPT <destination> <source> NFS #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <z1>:<list of client IPs> <z2>:a.b.c.d tcp 111 -ACCEPT <z1>:<list of client IPs> <z2>:a.b.c.d udp +ACCEPT <z1>:<list of client IPs> <z2>:a.b.c.d tcp 111 +ACCEPT <z1>:<list of client IPs> <z2>:a.b.c.d udp
NTP (Network Time Protocol) #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> udp 123 +ACCEPT <source> <destination> udp 123
<trademark>PCAnywhere</trademark> #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> udp 5632 -ACCEPT <source> <destination> tcp 5631 +ACCEPT <source> <destination> udp 5632 +ACCEPT <source> <destination> tcp 5631
@@ -179,16 +181,16 @@ ACCEPT <source> <destination> TCP Port 110 (Secure Pop3 is TCP Port 995) #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> tcp 110 #Unsecure Pop3 -ACCEPT <source> <destination> tcp 995 #Secure Pop3 +ACCEPT <source> <destination> tcp 110 #Unsecure Pop3 +ACCEPT <source> <destination> tcp 995 #Secure Pop3
PPTP #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> 47 -ACCEPT <source> <destination> tcp 1723 +ACCEPT <source> <destination> 47 +ACCEPT <source> <destination> tcp 1723 Lots more information here and here. @@ -198,24 +200,24 @@ ACCEPT <source> <destination> rdate #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> tcp 37 +ACCEPT <source> <destination> tcp 37
SSH #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> tcp 22 +ACCEPT <source> <destination> tcp 22
SMB/NMB (Samba/Windows Browsing/File Sharing) #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> tcp 137,139,445 -ACCEPT <source> <destination> udp 137:139 -ACCEPT <destination> <source> tcp 137,139,445 -ACCEPT <destination> <source> udp 137:139 +ACCEPT <source> <destination> tcp 137,139,445 +ACCEPT <source> <destination> udp 137:139 +ACCEPT <destination> <source> tcp 137,139,445 +ACCEPT <destination> <source> udp 137:139 Also, see this page.
@@ -224,57 +226,67 @@ ACCEPT <destination> <source> SMTP #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> tcp 25 #Insecure SMTP -ACCEPT <source> <destination> tcp 465 #SMTP over SSL (TLS) +ACCEPT <source> <destination> tcp 25 #Insecure SMTP +ACCEPT <source> <destination> tcp 465 #SMTP over SSL (TLS)
SNMP #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> udp 161:162 -ACCEPT <source> <destination> tcp 161 +ACCEPT <source> <destination> udp 161:162 +ACCEPT <source> <destination> tcp 161
Telnet #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> tcp 23 +ACCEPT <source> <destination> tcp 23
TFTP You must have TFTP connection tracking support in your kernel. If - modularized, the modules are ip_conntrack_tftp - (and ip_nat_tftp if any form of NAT is - involved) These modules may be loaded using entries in - /etc/shorewall/modules. The ip_conntrack_tftp - module must be loaded first. Note that the /etc/shorewall/modules - file released with recent Shorewall versions contains entries for these - modules. + modularized, the modules are ip_conntrack_tftp (and ip_nat_tftp if any form of NAT is involved) These + modules may be loaded using entries in + /etc/shorewall/modules. The ip_conntrack_tftp module must be loaded first. Note + that the /etc/shorewall/modules file released with + recent Shorewall versions contains entries for these modules. #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> udp 69 +ACCEPT <source> <destination> udp 69
Traceroute #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> udp 33434:33443 #Good for 10 hops -ACCEPT <source> <destination> icmp 8 +ACCEPT <source> <destination> udp 33434:33443 #Good for 10 hops +ACCEPT <source> <destination> icmp 8 - UDP traceroute uses ports 33434 through 33434+<max number of - hops>-1 + UDP traceroute uses ports 33434 through 33434+<max number of + hops>-1. Note that for the firewall to respond with a TTL expired ICMP + reply, you will need to allow ICMP 11 outbound from the firewall. The + standard Shorewall sample configurations all set this up for you + automatically since those sample configurations enable all ICMP packet + types originating on the firewall itself. + + #ACTION SOURCE DESTINATION PROTO DEST PORT(S) +ACCEPT fw net icmp +ACCEPT fw loc icmp +ACCEPT fw ...
Usenet (NNTP) #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> tcp 119 +ACCEPT <source> <destination> tcp 119 TCP Port 119
@@ -282,43 +294,60 @@ ACCEPT <source> <destination>
VNC - Vncviewer to Vncserver -- TCP port 5900 + <display number>. + Vncviewer to Vncserver -- TCP port 5900 + <display + number>. + + Vncviewer to Vncserver -- TCP port 5900 + <display + number>. #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> tcp 5901 #Display Number 1 -ACCEPT <source> <destination> tcp 5902 #Display Number 2 +ACCEPT <source> <destination> tcp 5901 #Display Number 1 +ACCEPT <source> <destination> tcp 5902 #Display Number 2 ... Vncserver to Vncviewer in listen mode -- TCP port 5500. #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> tcp 5500 +ACCEPT <source> <destination> tcp 5500 +
+ +
+ <trademark>Vonage</trademark> + + The standard Shorewall loc->net ACCEPT policy is all that is + required for Vonage IP phone service to work, + provided that you have loaded the tftp helper modules (add the following + entries to /etc/shorewall/modules if they are not there already): + + loadmodule ip_conntrack_tftp + loadmodule ip_nat_tftp
Web Access #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <source> <destination> tcp 80 #Insecure HTTP -ACCEPT <source> <destination> tcp 443 #Secure HTTP +ACCEPT <source> <destination> tcp 80 #Insecure HTTP +ACCEPT <source> <destination> tcp 443 #Secure HTTP
X/XDMCP - Assume that the Choser and/or X Server are running at <chooser> - and the Display Manager/X applications are running at <apps>. + Assume that the Choser and/or X Server are running at + <chooser> and the Display Manager/X + applications are running at <apps>. #ACTION SOURCE DESTINATION PROTO DEST PORT(S) -ACCEPT <chooser> <apps> udp 177 #XDMCP -ACCEPT <apps> <chooser> tcp 6000:6009 #X Displays 0-9 +ACCEPT <chooser> <apps> udp 177 #XDMCP +ACCEPT <apps> <chooser> tcp 6000:6009 #X Displays 0-9
Other Source of Port Information - Didn't find what you are looking for -- have you looked in your - own /etc/services file? + Didn't find what you are looking for -- have you looked in your own + /etc/services file? Still looking? Try http://www.networkice.com/advice/Exploits/Ports @@ -327,16 +356,138 @@ ACCEPT <apps> <chooser Revision History - 1.112004-05-28TECorrected - directory for actions.std and enhanced the DNS section.1.102004-05-09TEAdded - TFTP.1.92004-04-24TERevised - ICQ/AIM.1.82004-04-23TEAdded - SNMP.1.72004-02-18TEMake - NFS work for everyone.1.62004-02-14TEAdd - PCAnywhere.1.52004-02-05TEAdded - information about VNC viewers in listen mode.1.42004-01-26TECorrect - ICQ.1.32004-01-04TEAlphabetize1.22004-01-03TEAdd - rules file entries.1.12002-07-30TEInitial - version converted to Docbook XML + + + 1.13 + + 2004-09-21 + + TE + + Add note about ICMP type 11 to Traceroute. + + + + 1.12 + + 2004-09-09 + + TE + + Add note about Vonage. + + + + 1.11 + + 2004-05-28 + + TE + + Corrected directory for actions.std and enhanced the DNS + section. + + + + 1.10 + + 2004-05-09 + + TE + + Added TFTP. + + + + 1.9 + + 2004-04-24 + + TE + + Revised ICQ/AIM. + + + + 1.8 + + 2004-04-23 + + TE + + Added SNMP. + + + + 1.7 + + 2004-02-18 + + TE + + Make NFS work for everyone. + + + + 1.6 + + 2004-02-14 + + TE + + Add PCAnywhere. + + + + 1.5 + + 2004-02-05 + + TE + + Added information about VNC viewers in listen + mode. + + + + 1.4 + + 2004-01-26 + + TE + + Correct ICQ. + + + + 1.3 + + 2004-01-04 + + TE + + Alphabetize + + + + 1.2 + + 2004-01-03 + + TE + + Add rules file entries. + + + + 1.1 + + 2002-07-30 + + TE + + Initial version converted to Docbook XML + + \ No newline at end of file diff --git a/Shorewall-docs2/support.xml b/Shorewall-docs2/support.xml index 43350149a..c1d3a0488 100644 --- a/Shorewall-docs2/support.xml +++ b/Shorewall-docs2/support.xml @@ -15,7 +15,7 @@ - 2004-09-04 + 2004-09-07 2001-2004 @@ -175,14 +175,6 @@ other output is better than a paraphrase or summary. - - Please don't describe your problem as Computer A can't - see Computer B. Of course it can't -- it hasn't any eyes! If - ping from A to B fails, say so (and see below for information about - reporting ping problems). If Computer B doesn't show up - in Network Neighborhood then say so. - - Please give details about what doesn't work. Reports that say I followed the directions and it didn't work will @@ -220,7 +212,8 @@ (/sbin/shorewall show log) when you exercise the function that is giving you problems? If so, include the message(s) in your post along with a copy of your - /etc/shorewall/interfaces file. + /etc/shorewall/interfaces file (and /etc/shorewall/hosts file if you + have entries in that file).