diff --git a/Shorewall/compiler b/Shorewall/compiler
index 72d090ff6..8a44126e7 100755
--- a/Shorewall/compiler
+++ b/Shorewall/compiler
@@ -9220,7 +9220,7 @@ case "$COMMAND" in
compile_firewall $2
;;
- call)
+ call)
#
# Undocumented way to call functions in /usr/share/shorewall/compiler directly
#
diff --git a/docs/OPENVPN.xml b/docs/OPENVPN.xml
index f1d965abf..7ea4f173c 100644
--- a/docs/OPENVPN.xml
+++ b/docs/OPENVPN.xml
@@ -21,7 +21,7 @@
- 2006-03-19
+ 2006-03-21
2003
@@ -181,7 +181,7 @@ openvpn:tcp:7777 net 134.28.54.2
local 206.162.148.9
remote 134.28.54.2
ifconfig 192.168.99.1 192.168.99.2
-up ./route-a.up
+route 10.0.0.0 255.0.0.0 192.168.99.2
tls-server
dh dh1024.pem
ca ca.crt
@@ -217,7 +217,7 @@ openvpn net 206.191.148.9
local 134.28.54.2
remote 206.162.148.9
ifconfig 192.168.99.2 192.168.99.1
-up ./route-b.up
+route 192.168.1.0 255.255.255.0 192.168.99.1
tls-client
ca ca.crt
cert my-b.crt
diff --git a/docs/XenMyWay.xml b/docs/XenMyWay.xml
index 48c1bf0f4..0160e1e0d 100644
--- a/docs/XenMyWay.xml
+++ b/docs/XenMyWay.xml
@@ -15,7 +15,7 @@
- 2006-03-20
+ 2006-03-21
2006
@@ -110,7 +110,8 @@
eth0 -- conntected to
the switch in my office. That switch is cabled to a second switch in
my wife's office where there is my wife's desktop and her networked
- printer.
+ printer (sure which there had been wireless back when I strung that
+ CAT-5 cable halfway across the house).
@@ -279,7 +280,7 @@ done
- Dom0 Shorewall Configuration
+ Dom0 Configuration
The goals for the Shorewall configuration in Dom0 are as
follows:
@@ -349,7 +350,7 @@ SECTION NEW
- Firewall DomU Shorewall Configuration
+ Firewall DomU Configuration
In the firewall DomU, I run a conventional three-interface
firewall with Proxy ARP DMZ -- it is very similar to the firewall
@@ -493,7 +494,10 @@ vpn tun+ -
206.124.146.180 $EXT_IF 192.168.1.6 No No
#LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
- /etc/shorewall/masq:
+ /etc/shorewall/masq (Note the cute drick here and in
+ the proxyarp file that follows that allows me to
+ access the DSL "Modem" using it's default IP address
+ (192.168.1.1)):
#INTERFACE SUBNET ADDRESS PROTO PORT(S) IPSEC
+$EXT_IF:192.168.1.1 0.0.0.0/0 192.168.1.254
@@ -697,18 +701,20 @@ DROP net:82.96.96.3 all
Wireless Gateway DomU Configuration
- The Shorewall configuration in the 'wireless' DomU is very
- simple-minded. It's sole purpose is to protect the local network from
- the Wireless net by restricting wireless access to clients that have
- established an OpenVPN Bridged
- connection. This configuration illustrates that you can use any Linux
- system on your internal LAN as a wireless gateway -- it doesn't have to
- be your main firewall (and it doesn't have to run in a Xen domain
- either). The wireless gateway runs a DHCP server that assigns wireless
- hosts an IP address in 192.168.3.0/24 -- The OpenVPN server running on
- the gateway assigns its clients an IP address in 192.168.1.0/24 so,
- thanks to bridging, these clients appear to be physically attached to
- the LAN).
+ The Shorewall configuration in the 'wireless' DomU is very simple.
+ It's sole purpose is to protect the local network from the Wireless net
+ by restricting wireless access to clients that have established an
+ OpenVPN Bridged connection. This
+ configuration illustrates that you can use any system on your internal
+ LAN as a wireless gateway -- it doesn't have to be your main firewall
+ (and it doesn't have to run in a Xen domain either and it doesn't even
+ have to run Linux). Our wireless gateway runs a DHCP server that assigns
+ wireless hosts an IP address in 192.168.3.0/24 -- The OpenVPN server
+ running on the gateway assigns its clients an IP address in
+ 192.168.1.0/24 so, thanks to bridging, these clients appear to be
+ physically attached to the LAN). That allows our two laptops to have the
+ same IP address in 192.168.1.0/24 regardless of whether they are
+ connected to the LAN directory or are connected wirelessly.
@@ -926,7 +932,8 @@ loc br0 192.168.1.255 dhcp,routeback
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE
- /etc/shorewall/policy:
+ /etc/shorewall/policy (again, note the use
+ of an ACCEPT all->all policy):
#SOURCE DEST POLICY LOG LIMIT:BURST
# LEVEL
@@ -953,8 +960,24 @@ ACCEPT eth4 00:0f:66:ef:b6:f6 192.168.3.8
ACCEPT eth4 00:12:79:3d:fe:2e 192.168.3.6 #Work Laptop
ACCEPT eth4 - 192.168.3.254 #Broadcast/Multicast from us
DROP:info eth4 - 192.168.3.0/24
+DROP:info eth4 - 169.254.0.0/16 #Stop autoconfigured hosts.
#LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
+ The routing table on the wireless gateway is as follows:
+
+
+ 192.168.3.0/24 dev eth4 proto kernel scope link src 192.168.3.254
+192.168.1.0/24 dev br0 proto kernel scope link src 192.168.1.7
+169.254.0.0/16 dev eth4 scope link
+127.0.0.0/8 dev lo scope link
+default via 192.168.1.254 dev br0
+
+
+ The route to 169.254.0.0/16 is automatically generated by the
+ SuSE network scripts so I include that network in the
+ /etc/shorewall/maclist file for
+ completeness.
+
/etc/shorewall/rules:
#ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL RATE USER/
@@ -962,6 +985,7 @@ DROP:info eth4 - 192.168.3.0/24
#SECTION ESTABLISHED
#SECTION RELATED
SECTION NEW
+ACCEPT Wifi loc:192.168.1.5 udp 123 #Allow NTP before OpenVPN is up.
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE
@@ -970,10 +994,9 @@ SECTION NEW
/etc/openvpn/server-bridge (Note that I
prefer to push two /1 routes rather than to use the redirect-gateway directive on the client
- systems; I find that the latter occasionally leaves the remote system
- with no default gateway while my
- approach always works):
+ role="bold">redirect-gateway directive; I find that the
+ latter occasionally leaves the remote system with no default gateway):
dev tap0
@@ -1012,7 +1035,7 @@ verb 3
push "route 0.0.0.0 128.0.0.0 192.168.1.254"
push "route 128.0.0.0 128.0.0.0 192.168.1.254"
- /etc/openvpn/bridge-clients/tipper.shorewall.net
+ /etc/bridge-clients/tipper.shorewall.net
(used to assign a fixed IP address to clients -- there are other
similar files in this directory):