forked from extern/shorewall_code
More manpage corrections from vieri
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@4964 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
parent
659746620e
commit
597cfce50d
@ -24,8 +24,8 @@
|
|||||||
<para>Entries in this file define the bandwidth for interfaces on which
|
<para>Entries in this file define the bandwidth for interfaces on which
|
||||||
you want traffic shaping to be enabled.</para>
|
you want traffic shaping to be enabled.</para>
|
||||||
|
|
||||||
<para> If you do not plan to use traffic shaping for a device, don't put
|
<para>If you do not plan to use traffic shaping for a device, don't put it
|
||||||
it in here as it limits the troughput of that device to the limits you set
|
in here as it limits the troughput of that device to the limits you set
|
||||||
here.</para>
|
here.</para>
|
||||||
|
|
||||||
<para>The columns in the file are as follows.</para>
|
<para>The columns in the file are as follows.</para>
|
||||||
@ -39,7 +39,7 @@
|
|||||||
this file. You may NOT specify the name of an alias (e.g., eth0:0)
|
this file. You may NOT specify the name of an alias (e.g., eth0:0)
|
||||||
here; see http://www.shorewall.net/FAQ.htm#faq18</para>
|
here; see http://www.shorewall.net/FAQ.htm#faq18</para>
|
||||||
|
|
||||||
<para>You man NOT specify wildcards here, e.g. if you have multiple
|
<para>You may NOT specify wildcards here, e.g. if you have multiple
|
||||||
ppp interfaces, you need to put them all in here!</para>
|
ppp interfaces, you need to put them all in here!</para>
|
||||||
|
|
||||||
<para>If the device doesn't exist, a warning message will be issued
|
<para>If the device doesn't exist, a warning message will be issued
|
||||||
@ -74,12 +74,12 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>The outgoing Bandwidth of that interface. This is the maximum
|
<para>The outgoing Bandwidth of that interface. This is the maximum
|
||||||
speed you connection can handle. It is also the speed you can refer
|
speed your connection can handle. It is also the speed you can refer
|
||||||
as "full" if you define the tc classes. Outgoing traffic above this
|
as "full" if you define the tc classes. Outgoing traffic above this
|
||||||
rate will be dropped.</para>
|
rate will be dropped.</para>
|
||||||
|
|
||||||
<para> Use kbit or kbps(for Kilobytes per second) for speed, and
|
<para>Use kbit or kbps(for Kilobytes per second) for speed, and make
|
||||||
make sure there is NO space between the number and the unit.</para>
|
sure there is NO space between the number and the unit.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
</variablelist>
|
</variablelist>
|
||||||
|
@ -170,7 +170,7 @@
|
|||||||
the line will be attached as a comment to the Netfilter rule(s)
|
the line will be attached as a comment to the Netfilter rule(s)
|
||||||
generated by the following entries. The comment will appear
|
generated by the following entries. The comment will appear
|
||||||
delimited by "/* ... */" in the output of <command>shorewall
|
delimited by "/* ... */" in the output of <command>shorewall
|
||||||
show mangle</command> </para>
|
show mangle</command></para>
|
||||||
|
|
||||||
<para>To stop the comment from being attached to further rules,
|
<para>To stop the comment from being attached to further rules,
|
||||||
simply include COMMENT on a line by itself.</para>
|
simply include COMMENT on a line by itself.</para>
|
||||||
@ -218,7 +218,7 @@
|
|||||||
an address (e.g., eth1:192.168.1.0/24). If the <emphasis
|
an address (e.g., eth1:192.168.1.0/24). If the <emphasis
|
||||||
role="bold">MARK</emphasis> column specificies a classification of
|
role="bold">MARK</emphasis> column specificies a classification of
|
||||||
the form <emphasis>major</emphasis>:<emphasis>minor</emphasis> then
|
the form <emphasis>major</emphasis>:<emphasis>minor</emphasis> then
|
||||||
this column may also contain an interface name. </para>
|
this column may also contain an interface name.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -241,7 +241,7 @@
|
|||||||
<term><emphasis role="bold">PORT(S)</emphasis></term>
|
<term><emphasis role="bold">PORT(S)</emphasis></term>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para> Destination Ports. A comma-separated list of Port names (from
|
<para>Destination Ports. A comma-separated list of Port names (from
|
||||||
services(5)), <emphasis>port number</emphasis>s or <emphasis>port
|
services(5)), <emphasis>port number</emphasis>s or <emphasis>port
|
||||||
range</emphasis>s; if the protocol is <emphasis
|
range</emphasis>s; if the protocol is <emphasis
|
||||||
role="bold">icmp</emphasis>, this column is interpreted as the
|
role="bold">icmp</emphasis>, this column is interpreted as the
|
||||||
@ -337,9 +337,9 @@
|
|||||||
<term>TEST</term>
|
<term>TEST</term>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para> Defines a test on the existing packet or connection mark. The
|
<para>Defines a test on the existing packet or connection mark. The
|
||||||
rule will match only if the test returns true. Tests have the format
|
rule will match only if the test returns true. Tests have the
|
||||||
</para>
|
format</para>
|
||||||
|
|
||||||
<para>[<emphasis
|
<para>[<emphasis
|
||||||
role="bold">!</emphasis>]<emphasis>value</emphasis>[/<emphasis>mask</emphasis>][<emphasis
|
role="bold">!</emphasis>]<emphasis>value</emphasis>[/<emphasis>mask</emphasis>][<emphasis
|
||||||
@ -436,8 +436,7 @@
|
|||||||
are P2P packets, we mark the entire connection as P2P if any of the
|
are P2P packets, we mark the entire connection as P2P if any of the
|
||||||
packets are determined to match.</para>
|
packets are determined to match.</para>
|
||||||
|
|
||||||
<para>We assume packet/connection mark 0 to means
|
<para>We assume packet/connection mark 0 means unclassified.</para>
|
||||||
unclassified.</para>
|
|
||||||
|
|
||||||
<programlisting> #MARK/ SOURCE DEST PROTO PORT(S) SOURCE USER TEST
|
<programlisting> #MARK/ SOURCE DEST PROTO PORT(S) SOURCE USER TEST
|
||||||
#CLASSIFY PORT(S)
|
#CLASSIFY PORT(S)
|
||||||
|
@ -96,7 +96,7 @@ c:a,b ipv4</programlisting>
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Communication with all zone hosts is encrypted. Your
|
<para>Communication with all zone hosts is encrypted. Your
|
||||||
kernel and iptables must include polic match support.</para>
|
kernel and iptables must include policy match support.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -105,10 +105,11 @@ c:a,b ipv4</programlisting>
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Designates the firewall itself. You must have exactly
|
<para>Designates the firewall itself. You must have exactly
|
||||||
one 'firewall' zone. No options ar permitted with a 'firewall'
|
one 'firewall' zone. No options are permitted with a
|
||||||
zone. The name that you enter in the ZONE column will be
|
'firewall' zone. The name that you enter in the ZONE column
|
||||||
stored in the shell variable $FW which you may use in other
|
will be stored in the shell variable $FW which you may use in
|
||||||
configuration files to designate the firewall zone.</para>
|
other configuration files to designate the firewall
|
||||||
|
zone.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
</variablelist>
|
</variablelist>
|
||||||
|
Loading…
Reference in New Issue
Block a user