fixed quotes

git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@942 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
mhnoyes 2003-12-24 21:55:24 +00:00
parent 108fc8d82c
commit 6c300cdd4e

View File

@ -30,8 +30,8 @@
document under the terms of the GNU Free Documentation License, Version document under the terms of the GNU Free Documentation License, Version
1.2 or any later version published by the Free Software Foundation; with 1.2 or any later version published by the Free Software Foundation; with
no Invariant Sections, with no Front-Cover, and with no Back-Cover no Invariant Sections, with no Front-Cover, and with no Back-Cover
Texts. A copy of the license is included in the section entitled &#34;<ulink Texts. A copy of the license is included in the section entitled
url="GnuCopyright.htm">GNU Free Documentation License</ulink>&#34;.</para> <quote><ulink url="GnuCopyright.htm">GNU Free Documentation License</ulink></quote>.</para>
</legalnotice> </legalnotice>
<abstract> <abstract>
@ -71,7 +71,7 @@
<listitem> <listitem>
<para>a parameter file installed in /etc/shorewall that defines a <para>a parameter file installed in /etc/shorewall that defines a
network partitioning into &#34;zones&#34;</para> network partitioning into <quote>zones</quote></para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -366,8 +366,8 @@
is reserved for use by Shorewall itself. Note that the output is reserved for use by Shorewall itself. Note that the output
produced by iptables is much easier to read if you select short produced by iptables is much easier to read if you select short
names that are three characters or less in length. The name names that are three characters or less in length. The name
&#34;all&#34; may not be used as a zone name nor may the zone name <quote>all</quote> may not be used as a zone name nor may the zone
assigned to the firewall itself via the FW variable in <xref name assigned to the firewall itself via the FW variable in <xref
linkend="Conf" />.</para> linkend="Conf" />.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -436,9 +436,9 @@
file as desired so long as you have at least one zone defined.</para> file as desired so long as you have at least one zone defined.</para>
<warning> <warning>
<para>If you rename or delete a zone, you should perform &#34;shorewall <para>If you rename or delete a zone, you should perform <quote>shorewall
stop; shorewall start&#34; to install the change rather than stop; shorewall start</quote> to install the change rather than
&#34;shorewall restart&#34;.</para> <quote>shorewall restart</quote>.</para>
</warning> </warning>
<warning> <warning>
@ -461,8 +461,8 @@
<listitem> <listitem>
<para>A zone defined in the <xref linkend="Zones" /> file or <para>A zone defined in the <xref linkend="Zones" /> file or
&#34;-&#34;. If you specify &#34;-&#34;, you must use the <xref <quote>-</quote>. If you specify <quote>-</quote>, you must use the
linkend="Hosts" /> file to define the zones accessed via this <xref linkend="Hosts" /> file to define the zones accessed via this
interface.</para> interface.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -488,9 +488,10 @@
<para>the broadcast address(es) for the sub-network(s) attached to <para>the broadcast address(es) for the sub-network(s) attached to
the interface. This should be left empty for P-T-P interfaces (ppp*, the interface. This should be left empty for P-T-P interfaces (ppp*,
ippp*); if you need to specify options for such an interface, enter ippp*); if you need to specify options for such an interface, enter
&#34;-&#34; in this column. If you supply the special value <quote>-</quote> in this column. If you supply the special value
&#34;detect&#34; in this column, the firewall will automatically <quote>detect</quote> in this column, the firewall will
determine the broadcast address. In order to use &#34;detect&#34;:</para> automatically determine the broadcast address. In order to use
<quote>detect</quote>:</para>
<itemizedlist> <itemizedlist>
<listitem> <listitem>
@ -548,7 +549,7 @@
<para>(Added in version 1.4.2) - This option causes Shorewall <para>(Added in version 1.4.2) - This option causes Shorewall
to set up handling for routing packets that arrive on this to set up handling for routing packets that arrive on this
interface back out the same interface. If this option is interface back out the same interface. If this option is
specified, the ZONE column may not contain &#34;-&#34;.</para> specified, the ZONE column may not contain <quote>-</quote>.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -560,7 +561,7 @@
to make sanity checks on the header flags in TCP packets to make sanity checks on the header flags in TCP packets
arriving on this interface. Checks include Null flags, arriving on this interface. Checks include Null flags,
SYN+FIN, SYN+RST and FIN+URG+PSH; these flag combinations are SYN+FIN, SYN+RST and FIN+URG+PSH; these flag combinations are
typically used for &#34;silent&#34; port scans. Packets typically used for <quote>silent</quote> port scans. Packets
failing these checks are logged according to the failing these checks are logged according to the
TCP_FLAGS_LOG_LEVEL option in <xref linkend="Conf" /> and are TCP_FLAGS_LOG_LEVEL option in <xref linkend="Conf" /> and are
disposed of according to the TCP_FLAGS_DISPOSITION option.</para> disposed of according to the TCP_FLAGS_DISPOSITION option.</para>
@ -611,9 +612,9 @@
<para>Beware that as IPv4 addresses become in increasingly <para>Beware that as IPv4 addresses become in increasingly
short supply, ISPs are beginning to use RFC 1918 addresses short supply, ISPs are beginning to use RFC 1918 addresses
within their own infrastructure. Also, many cable and DSL within their own infrastructure. Also, many cable and DSL
&#34;modems&#34; have an RFC 1918 address that can be used <quote>modems</quote> have an RFC 1918 address that can be
through a web browser for management and monitoring functions. used through a web browser for management and monitoring
If you want to specify <emphasis role="bold">norfc1918</emphasis> functions. If you want to specify <emphasis role="bold">norfc1918</emphasis>
on your external interface but need to allow access to certain on your external interface but need to allow access to certain
addresses from the above list, see <ulink url="FAQ.htm#faq14">FAQ addresses from the above list, see <ulink url="FAQ.htm#faq14">FAQ
14</ulink>.</para> 14</ulink>.</para>
@ -683,7 +684,8 @@
&#39;unclean&#39; match target in iptables are logged &#39;unclean&#39; match target in iptables are logged
<emphasis>but not dropped</emphasis>. The level at which the <emphasis>but not dropped</emphasis>. The level at which the
packets are logged is determined by the setting of LOGUNCLEAN packets are logged is determined by the setting of LOGUNCLEAN
and if LOGUNCLEAN has not been set, &#34;info&#34; is assumed.</para> and if LOGUNCLEAN has not been set, <quote>info</quote> is
assumed.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -900,8 +902,8 @@
<term>HOST(S)</term> <term>HOST(S)</term>
<listitem> <listitem>
<para>The name of a network interface followed by a colon <para>The name of a network interface followed by a colon (<quote>:</quote>)
(&#34;:&#34;) followed by a comma-separated list either:</para> followed by a comma-separated list either:</para>
<orderedlist> <orderedlist>
<listitem> <listitem>
@ -1254,7 +1256,7 @@
<listitem> <listitem>
<para>The name of a client zone (a zone defined in the <xref <para>The name of a client zone (a zone defined in the <xref
linkend="Zones" /> file , the <link linkend="Conf">name of the linkend="Zones" /> file , the <link linkend="Conf">name of the
firewall zone</link> or &#34;all&#34;).</para> firewall zone</link> or <quote>all</quote>).</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -1264,7 +1266,7 @@
<listitem> <listitem>
<para>The name of a destination zone (a zone defined in the <xref <para>The name of a destination zone (a zone defined in the <xref
linkend="Zones" /> file , the <link linkend="Conf">name of the linkend="Zones" /> file , the <link linkend="Conf">name of the
firewall zone</link> or &#34;all&#34;). Shorewall automatically firewall zone</link> or <quote>all</quote>). Shorewall automatically
allows all traffic from the firewall to itself so the <link allows all traffic from the firewall to itself so the <link
linkend="Conf">name of the firewall zone</link> cannot appear in linkend="Conf">name of the firewall zone</link> cannot appear in
both the SOURCE and DEST columns.</para> both the SOURCE and DEST columns.</para>
@ -1299,8 +1301,8 @@
role="bold">SOURCE</emphasis> zone to the <emphasis role="bold">DEST</emphasis> role="bold">SOURCE</emphasis> zone to the <emphasis role="bold">DEST</emphasis>
zone will not be rate-limited. Otherwise, this column specifies the zone will not be rate-limited. Otherwise, this column specifies the
maximum rate at which TCP connection requests will be accepted maximum rate at which TCP connection requests will be accepted
followed by a colon (&#34;:&#34;) followed by the maximum burst size followed by a colon (<quote>:</quote>) followed by the maximum burst
that will be tolerated. Example: <emphasis role="bold">10/sec:40</emphasis> size that will be tolerated. Example: <emphasis role="bold">10/sec:40</emphasis>
specifies that the maximum rate of TCP connection requests allowed specifies that the maximum rate of TCP connection requests allowed
will be 10 per second and a burst of 40 connections will be will be 10 per second and a burst of 40 connections will be
tolerated. Connection requests in excess of these limits will be tolerated. Connection requests in excess of these limits will be
@ -1310,7 +1312,7 @@
</varlistentry> </varlistentry>
</variablelist> </variablelist>
<para>In the SOURCE and DEST columns, you can enter &#34;all&#34; to <para>In the SOURCE and DEST columns, you can enter <quote>all</quote> to
indicate all zones.</para> indicate all zones.</para>
<table> <table>
@ -1461,7 +1463,7 @@
interface. Beginning with Shorewall 1.4.1, Shorewall will ACCEPT all interface. Beginning with Shorewall 1.4.1, Shorewall will ACCEPT all
traffic from a zone to itself provided that there is no explicit policy traffic from a zone to itself provided that there is no explicit policy
governing traffic from that zone to itself (an explicit policy does not governing traffic from that zone to itself (an explicit policy does not
specify &#34;all&#34; in either the SOURCE or DEST column) and that specify <quote>all</quote> in either the SOURCE or DEST column) and that
there are no rules concerning connections from that zone to itself. If there are no rules concerning connections from that zone to itself. If
there is an explicit policy or if there are one or more rules, then there is an explicit policy or if there are one or more rules, then
traffic within the zone is handled just like traffic between zones is.</para> traffic within the zone is handled just like traffic between zones is.</para>
@ -1962,9 +1964,9 @@
<listitem> <listitem>
<para>Causes the connection request to be forwarded to the <para>Causes the connection request to be forwarded to the
system specified in the DEST column (port forwarding). system specified in the DEST column (port forwarding).
&#34;DNAT&#34; stands for &#34;<emphasis role="bold">D</emphasis>estination <quote>DNAT</quote> stands for <quote><emphasis role="bold">D</emphasis>estination
<emphasis role="bold">N</emphasis>etwork <emphasis role="bold">A</emphasis>ddress <emphasis role="bold">N</emphasis>etwork <emphasis role="bold">A</emphasis>ddress
<emphasis role="bold">T</emphasis>ranslation&#34;</para> <emphasis role="bold">T</emphasis>ranslation</quote></para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -2039,9 +2041,9 @@
<note> <note>
<para>When the protocol specified in the PROTO column is TCP <para>When the protocol specified in the PROTO column is TCP
(&#34;tcp&#34;, &#34;TCP&#34; or &#34;6&#34;), Shorewall (<quote>tcp</quote>, <quote>TCP</quote> or <quote>6</quote>),
will only pass connection requests (SYN packets) to user Shorewall will only pass connection requests (SYN packets)
space. This is for compatibility with ftwall.</para> to user space. This is for compatibility with ftwall.</para>
</note> </note>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -2064,7 +2066,7 @@
&#60;rate&#62;/&#60;interval&#62;[:&#60;burst&#62;] &#62;</programlisting> &#60;rate&#62;/&#60;interval&#62;[:&#60;burst&#62;] &#62;</programlisting>
<para>where &#60;rate&#62; is the number of connections per <para>where &#60;rate&#62; is the number of connections per
&#60;interval&#62; (&#34;sec&#34; or &#34;min&#34;) and &#60;interval&#62; (<quote>sec</quote> or <quote>min</quote>) and
&#60;burst&#62; is the largest burst permitted. If no burst value is &#60;burst&#62; is the largest burst permitted. If no burst value is
given, a value of 5 is assumed.</para> given, a value of 5 is assumed.</para>
@ -2086,10 +2088,10 @@
</example> </example>
<warning> <warning>
<para>When rate limiting is specified on a rule with &#34;all&#34; <para>When rate limiting is specified on a rule with
in the SOURCE or DEST fields below, the limit will apply to each <quote>all</quote> in the SOURCE or DEST fields below, the limit
pair of zones individually rather than as a single limit for all will apply to each pair of zones individually rather than as a
pairs of zones covered by the rule.</para> single limit for all pairs of zones covered by the rule.</para>
</warning> </warning>
<para>Rate limiting may also be specified in the RATE LIMIT column <para>Rate limiting may also be specified in the RATE LIMIT column
@ -2097,11 +2099,12 @@
column.</para> column.</para>
<para>The ACTION (and rate limit) may optionally be followed by <para>The ACTION (and rate limit) may optionally be followed by
&#34;:&#34; and a <ulink url="shorewall_logging.html">syslog level</ulink> <quote>:</quote> and a <ulink url="shorewall_logging.html">syslog
(example: REJECT:info or ACCEPT&#60;2/sec:4&#62;:debugging). This level</ulink> (example: REJECT:info or
causes the packet to be logged at the specified level prior to being ACCEPT&#60;2/sec:4&#62;:debugging). This causes the packet to be
processed according to the specified ACTION. Note: if the ACTION is logged at the specified level prior to being processed according to
LOG then you MUST specify a syslog level.</para> the specified ACTION. Note: if the ACTION is LOG then you MUST
specify a syslog level.</para>
<para>The use of DNAT or REDIRECT requires that you have NAT <para>The use of DNAT or REDIRECT requires that you have NAT
enabled.</para> enabled.</para>
@ -2114,15 +2117,15 @@
<listitem> <listitem>
<para>Describes the source hosts to which the rule applies.. The <para>Describes the source hosts to which the rule applies.. The
contents of this field must begin with the name of a zone defined in contents of this field must begin with the name of a zone defined in
/etc/shorewall/zones, $FW or &#34;all&#34;. If the ACTION is DNAT or /etc/shorewall/zones, $FW or <quote>all</quote>. If the ACTION is
REDIRECT, sub-zones may be excluded from the rule by following the DNAT or REDIRECT, sub-zones may be excluded from the rule by
initial zone name with &#34;!&#39; and a comma-separated list of following the initial zone name with <quote>!</quote> and a
those sub-zones to be excluded. There is an <link linkend="Exclude">example</link> comma-separated list of those sub-zones to be excluded. There is an
above.</para> <link linkend="Exclude">example</link> above.</para>
<para>If the source is not &#39;all&#39; then the source may be <para>If the source is not &#39;all&#39; then the source may be
further restricted by adding a colon (&#34;:&#34;) followed by a further restricted by adding a colon (<quote>:</quote>) followed by
comma-separated list of qualifiers. Qualifiers are may include:</para> a comma-separated list of qualifiers. Qualifiers are may include:</para>
<variablelist> <variablelist>
<varlistentry> <varlistentry>
@ -2132,7 +2135,7 @@
<para>refers to any connection requests arriving on the <para>refers to any connection requests arriving on the
specified interface (example loc:eth4). Beginning with specified interface (example loc:eth4). Beginning with
Shorwall 1.3.9, the interface name may optionally be followed Shorwall 1.3.9, the interface name may optionally be followed
by a colon (&#34;:&#34;) and an IP address or subnet by a colon (<quote>:</quote>) and an IP address or subnet
(examples: loc:eth4:192.168.4.22, net:eth0:192.0.2.0/24).</para> (examples: loc:eth4:192.168.4.22, net:eth0:192.0.2.0/24).</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -2226,8 +2229,8 @@
<listitem> <listitem>
<para>Protocol. Must be a protocol name from /etc/protocols, a <para>Protocol. Must be a protocol name from /etc/protocols, a
number or &#34;all&#34;. Specifies the protocol of the connection number or <quote>all</quote>. Specifies the protocol of the
request.</para> connection request.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -2240,9 +2243,9 @@
udp or icmp. For icmp, this column&#39;s contents are interpreted as udp or icmp. For icmp, this column&#39;s contents are interpreted as
an icmp type. If you don&#39;t want to specify DEST PORT(S) but need an icmp type. If you don&#39;t want to specify DEST PORT(S) but need
to include information in one of the columns to the right, enter to include information in one of the columns to the right, enter
&#34;-&#34; in this column. You may give a list of ports and/or port <quote>-</quote> in this column. You may give a list of ports and/or
ranges separated by commas. Port numbers may be either integers or port ranges separated by commas. Port numbers may be either integers
service names from /etc/services.</para> or service names from /etc/services.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -2254,10 +2257,10 @@
or port range (a port range is specified as &#60;low port or port range (a port range is specified as &#60;low port
number&#62;:&#60;high port number&#62;). If you don&#39;t want to number&#62;:&#60;high port number&#62;). If you don&#39;t want to
restrict client ports but want to specify something in the next restrict client ports but want to specify something in the next
column, enter &#34;-&#34; in this column. If you wish to specify a column, enter <quote>-</quote> in this column. If you wish to
list of port number or ranges, separate the list elements with specify a list of port number or ranges, separate the list elements
commas (with no embedded white space). Port numbers may be either with commas (with no embedded white space). Port numbers may be
integers or service names from /etc/services.</para> either integers or service names from /etc/services.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -2280,13 +2283,13 @@
addresses are specified in the ORIGINAL DEST column as a addresses are specified in the ORIGINAL DEST column as a
comma-separated list.</para> comma-separated list.</para>
<para>The IP address(es) may be optionally followed by &#34;:&#34; <para>The IP address(es) may be optionally followed by
and a second IP address. This latter address, if present, is used as <quote>:</quote> and a second IP address. This latter address, if
the source address for packets forwarded to the server (This is present, is used as the source address for packets forwarded to the
called &#34;Source NAT&#34; or SNAT.</para> server (This is called <quote>Source NAT</quote> or SNAT.</para>
<para>If this list begins with &#34;!&#34; then the rule will only <para>If this list begins with <quote>!</quote> then the rule will
apply if the original destination address matches none of the only apply if the original destination address matches none of the
addresses listed.</para> addresses listed.</para>
<note> <note>
@ -2305,10 +2308,10 @@
</example> </example>
</note> </note>
<para>If SNAT is not used (no &#34;:&#34; and second IP address), <para>If SNAT is not used (no <quote>:</quote> and second IP
the original source address is used. If you want any destination address), the original source address is used. If you want any
address to match the rule but want to specify SNAT, simply use a destination address to match the rule but want to specify SNAT,
colon followed by the SNAT address.</para> simply use a colon followed by the SNAT address.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -2323,7 +2326,7 @@
<programlisting>&#60;rate&#62;/&#60;interval&#62;[:&#60;burst&#62;]</programlisting> <programlisting>&#60;rate&#62;/&#60;interval&#62;[:&#60;burst&#62;]</programlisting>
<para>where &#60;rate&#62; is the number of connections per <para>where &#60;rate&#62; is the number of connections per
&#60;interval&#62; (&#34;sec&#34; or &#34;min&#34;) and &#60;interval&#62; (<quote>sec</quote> or <quote>min</quote>) and
&#60;burst&#62; is the largest burst permitted. If no burst value is &#60;burst&#62; is the largest burst permitted. If no burst value is
given, a value of 5 is assumed.</para> given, a value of 5 is assumed.</para>
@ -2345,10 +2348,10 @@
</example> </example>
<warning> <warning>
<para>When rate limiting is specified on a rule with &#34;all&#34; <para>When rate limiting is specified on a rule with
in the SOURCE or DEST fields below, the limit will apply to each <quote>all</quote> in the SOURCE or DEST fields below, the limit
pair of zones individually rather than as a single limit for all will apply to each pair of zones individually rather than as a
pairs of zones covered by the rule.</para> single limit for all pairs of zones covered by the rule.</para>
</warning> </warning>
<para>Rate limiting may also be specified in the ACTION column <para>Rate limiting may also be specified in the ACTION column
@ -2356,7 +2359,7 @@
LIMIT column.</para> LIMIT column.</para>
<para>If you want to specify any following columns but no rate <para>If you want to specify any following columns but no rate
limit, place &#34;-&#34; in this column.</para> limit, place <quote>-</quote> in this column.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -2431,8 +2434,8 @@
proxy running on the firewall and listening on port 3128. Squid will of proxy running on the firewall and listening on port 3128. Squid will of
course require access to remote web servers. This example shows yet course require access to remote web servers. This example shows yet
another use for the ORIGINAL DEST column; here, connection requests that another use for the ORIGINAL DEST column; here, connection requests that
were NOT (notice the &#34;!&#34;) originally destined to 206.124.146.177 were NOT (notice the <quote>!</quote>) originally destined to
are redirected to local port 3128.</title> 206.124.146.177 are redirected to local port 3128.</title>
<informaltable> <informaltable>
<tgroup cols="9"> <tgroup cols="9">
@ -2668,8 +2671,8 @@
<programlisting>passive ports 0.0.0.0/0 65500 65534</programlisting> <programlisting>passive ports 0.0.0.0/0 65500 65534</programlisting>
<para>If you are running pure-ftpd, you would include &#34;-p <para>If you are running pure-ftpd, you would include <quote>-p
65500:65534&#34; on the pure-ftpd runline.</para> 65500:65534</quote> on the pure-ftpd runline.</para>
<para>The important point here is to ensure that the port range used for <para>The important point here is to ensure that the port range used for
FTP passive connections is unique and will not overlap with any usage on FTP passive connections is unique and will not overlap with any usage on
@ -2935,8 +2938,8 @@
</tgroup> </tgroup>
</informaltable> </informaltable>
<para>Using &#34;DNAT-&#34; rather than &#34;DNAT&#34; avoids two extra <para>Using <quote>DNAT-</quote> rather than <quote>DNAT</quote> avoids
copies of the third rule from being generated.</para> two extra copies of the third rule from being generated.</para>
</example> </example>
<example> <example>
@ -3029,8 +3032,8 @@
<listitem> <listitem>
<para>The interface that will masquerade the subnet; this is <para>The interface that will masquerade the subnet; this is
normally your internet interface. This interface name can be normally your internet interface. This interface name can be
optionally qualified by adding &#34;:&#34; and a subnet or host IP. optionally qualified by adding <quote>:</quote> and a subnet or host
When this qualification is added, only packets addressed to that IP. When this qualification is added, only packets addressed to that
host or subnet will be masqueraded. Beginning with Shorewall version host or subnet will be masqueraded. Beginning with Shorewall version
1.3.14, if you have set ADD_SNAT_ALIASES=Yes in <xref linkend="Conf" />, 1.3.14, if you have set ADD_SNAT_ALIASES=Yes in <xref linkend="Conf" />,
you can cause Shorewall to create an alias <emphasis>label</emphasis> you can cause Shorewall to create an alias <emphasis>label</emphasis>
@ -3065,8 +3068,8 @@
named interface.</para> named interface.</para>
</caution> </caution>
<para>The subnet may be optionally followed by &#34;!&#39; and a <para>The subnet may be optionally followed by <quote>!</quote> and
comma-separated list of addresses and/or subnets that are to be a comma-separated list of addresses and/or subnets that are to be
excluded from masquerading.</para> excluded from masquerading.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -3308,7 +3311,7 @@
<listitem> <listitem>
<para>the interface that connects to the system. If the interface is <para>the interface that connects to the system. If the interface is
obvious from the subnetting, you may enter &#34;-&#34; in this obvious from the subnetting, you may enter <quote>-</quote> in this
column.</para> column.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -3327,9 +3330,9 @@
<listitem> <listitem>
<para>If you already have a route through INTERFACE to ADDRESS, this <para>If you already have a route through INTERFACE to ADDRESS, this
column should contain &#34;Yes&#34; or &#34;yes&#34;. If you want column should contain <quote>Yes</quote> or <quote>yes</quote>. If
Shorewall to add the route, the column should contain &#34;No&#34; you want Shorewall to add the route, the column should contain
or &#34;no&#34;.</para> <quote>No</quote> or <quote>no</quote>.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
</variablelist> </variablelist>
@ -3343,10 +3346,10 @@
changed, you may need to flush the ARP cache on host A as well.</para> changed, you may need to flush the ARP cache on host A as well.</para>
<para>ISPs typically have ARP configured with long TTL (hours!) so if <para>ISPs typically have ARP configured with long TTL (hours!) so if
your ISPs router has a stale cache entry (as seen using &#34;tcpdump your ISPs router has a stale cache entry (as seen using <quote>tcpdump
-nei &#60;external interface&#62; host &#60;IP addr&#62;&#34;), it may -nei &#60;external interface&#62; host &#60;IP addr&#62;</quote>), it
take a long while to time out. I personally have had to contact my ISP may take a long while to time out. I personally have had to contact my
and ask them to delete a stale entry in order to restore a system to ISP and ask them to delete a stale entry in order to restore a system to
working order after changing my proxy ARP settings.</para> working order after changing my proxy ARP settings.</para>
</note> </note>
@ -3395,7 +3398,7 @@
a subnet that is smaller than the subnet of your internet interface. See a subnet that is smaller than the subnet of your internet interface. See
the <ulink url="http://www.tldp.org/HOWTO/mini/Proxy-ARP-Subnet/">Proxy the <ulink url="http://www.tldp.org/HOWTO/mini/Proxy-ARP-Subnet/">Proxy
ARP Subnet Mini HOWTO</ulink> for details. In this case you will want to ARP Subnet Mini HOWTO</ulink> for details. In this case you will want to
place &#34;Yes&#34; in the HAVEROUTE column.</para></tip></para> place <quote>Yes</quote> in the HAVEROUTE column.</para></tip></para>
</example> </example>
<warning> <warning>
@ -3578,21 +3581,22 @@
disposition). To use LOGFORMAT with <ulink disposition). To use LOGFORMAT with <ulink
url="http://www.fireparse.com">fireparse</ulink>, set it as:</para> url="http://www.fireparse.com">fireparse</ulink>, set it as:</para>
<programlisting>LOGFORMAT=&#34;fp=%s:%d a=%s &#34;</programlisting> <programlisting>LOGFORMAT=<quote>fp=%s:%d a=%s </quote></programlisting>
<para>If the LOGFORMAT value contains the substring &#39;%d&#39; <para>If the LOGFORMAT value contains the substring &#39;%d&#39;
then the logging rule number is calculated and formatted in that then the logging rule number is calculated and formatted in that
position; if that substring is not included then the rule number is position; if that substring is not included then the rule number is
not included. If not supplied or supplied as empty not included. If not supplied or supplied as empty
(LOGFORMAT=&#34;&#34;) then &#34;Shorewall:%s:%s:&#34; is assumed.</para> (LOGFORMAT=&#34;&#34;) then <quote>Shorewall:%s:%s:</quote> is
assumed.</para>
<caution> <caution>
<para>/sbin/shorewall uses the leading part of the LOGFORMAT <para>/sbin/shorewall uses the leading part of the LOGFORMAT
string (up to but not including the first &#39;%&#39;) to find log string (up to but not including the first &#39;%&#39;) to find log
messages in the &#39;show log&#39;, &#39;status&#39; and messages in the &#39;show log&#39;, &#39;status&#39; and
&#39;hits&#39; commands. This part should not be omitted (the &#39;hits&#39; commands. This part should not be omitted (the
LOGFORMAT should not begin with &#34;%&#34;) and the leading part LOGFORMAT should not begin with <quote>%</quote>) and the leading
should be sufficiently unique for /sbin/shorewall to identify part should be sufficiently unique for /sbin/shorewall to identify
Shorewall messages.</para> Shorewall messages.</para>
</caution> </caution>
</listitem> </listitem>
@ -3626,8 +3630,8 @@
that chain rather than in the PREROUTING chain. This permits you to that chain rather than in the PREROUTING chain. This permits you to
mark inbound traffic based on its destination address when SNAT or mark inbound traffic based on its destination address when SNAT or
Masquerading are in use. To determine if your kernel has a FORWARD Masquerading are in use. To determine if your kernel has a FORWARD
chain in the mangle table, use the &#34;/sbin/shorewall show chain in the mangle table, use the <quote>/sbin/shorewall show
mangle&#34; command; if a FORWARD chain is displayed then your mangle</quote> command; if a FORWARD chain is displayed then your
kernel will support this option. If this option is not specified or kernel will support this option. If this option is not specified or
if it is given the empty value (e.g., if it is given the empty value (e.g.,
MARK_IN_FORWARD_CHAIN=&#34;&#34;) then MARK_IN_FORWARD_CHAIN=No is MARK_IN_FORWARD_CHAIN=&#34;&#34;) then MARK_IN_FORWARD_CHAIN=No is
@ -3707,12 +3711,12 @@
<term>NEWNOTSYN</term> <term>NEWNOTSYN</term>
<listitem> <listitem>
<para>(Added in Version 1.3.8) - When set to &#34;Yes&#34; or <para>(Added in Version 1.3.8) - When set to <quote>Yes</quote> or
&#34;yes&#34;, Shorewall will filter TCP packets that are not part <quote>yes</quote>, Shorewall will filter TCP packets that are not
of an established connention and that are not SYN packets (SYN flag part of an established connention and that are not SYN packets (SYN
on - ACK flag off). If set to &#34;No&#34;, Shorewall will silently flag on - ACK flag off). If set to <quote>No</quote>, Shorewall will
drop such packets. If not set or set to the empty value (e.g., silently drop such packets. If not set or set to the empty value
&#34;NEWNOTSYN=&#34;), NEWNOTSYN=No is assumed.</para> (e.g., <quote>NEWNOTSYN=</quote>), NEWNOTSYN=No is assumed.</para>
<para>If you have a HA setup with failover to another firewall, you <para>If you have a HA setup with failover to another firewall, you
should have NEWNOTSYN=Yes on both firewalls. You should also select should have NEWNOTSYN=Yes on both firewalls. You should also select
@ -3742,13 +3746,14 @@
<term>DETECT_DNAT_ADDRS</term> <term>DETECT_DNAT_ADDRS</term>
<listitem> <listitem>
<para>(Added in Version 1.3.4) - If set to &#34;Yes&#34; or <para>(Added in Version 1.3.4) - If set to <quote>Yes</quote> or
&#34;yes&#34;, Shorewall will detect the first IP address of the <quote>yes</quote>, Shorewall will detect the first IP address of
interface to the source zone and will include this address in DNAT the interface to the source zone and will include this address in
rules as the original destination IP address. If set to &#34;No&#34; DNAT rules as the original destination IP address. If set to
or &#34;no&#34;, Shorewall will not detect this address and any <quote>No</quote> or <quote>no</quote>, Shorewall will not detect
destination IP address will match the DNAT rule. If not specified or this address and any destination IP address will match the DNAT
empty, &#34;DETECT_DNAT_ADDRS=Yes&#34; is assumed.</para> rule. If not specified or empty, <quote>DETECT_DNAT_ADDRS=Yes</quote>
is assumed.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -3761,9 +3766,9 @@
now automatically detected by Shorewall</para> now automatically detected by Shorewall</para>
</note> </note>
<para>If set to &#34;Yes&#34; or &#34;yes&#34;, Shorewall will use <para>If set to <quote>Yes</quote> or <quote>yes</quote>, Shorewall
the Netfilter multiport facility. In order to use this facility, will use the Netfilter multiport facility. In order to use this
your kernel must have multiport support facility, your kernel must have multiport support
(CONFIG_IP_NF_MATCH_MULTIPORT). When this support is used, Shorewall (CONFIG_IP_NF_MATCH_MULTIPORT). When this support is used, Shorewall
will generate a single rule from each record in the will generate a single rule from each record in the
/etc/shorewall/rules file that meets these criteria:</para> /etc/shorewall/rules file that meets these criteria:</para>
@ -3787,11 +3792,12 @@
<term>NAT_BEFORE_RULES</term> <term>NAT_BEFORE_RULES</term>
<listitem> <listitem>
<para>If set to &#34;No&#34; or &#34;no&#34;, port forwarding rules <para>If set to <quote>No</quote> or <quote>no</quote>, port
can override the contents of the <xref linkend="NAT" /> file. If set forwarding rules can override the contents of the <xref
to &#34;Yes&#34; or &#34;yes&#34;, port forwarding rules cannot linkend="NAT" /> file. If set to <quote>Yes</quote> or
override one-to-one NAT. If not set or set to an empty value, <quote>yes</quote>, port forwarding rules cannot override one-to-one
&#34;Yes&#34; is assumed.</para> NAT. If not set or set to an empty value, <quote>Yes</quote> is
assumed.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -3800,7 +3806,8 @@
<listitem> <listitem>
<para>This parameter specifies the name of the firewall zone. If not <para>This parameter specifies the name of the firewall zone. If not
set or if set to an empty string, the value &#34;fw&#34; is assumed.</para> set or if set to an empty string, the value <quote>fw</quote> is
assumed.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -3869,10 +3876,10 @@
<listitem> <listitem>
<para>This parameter tells the /sbin/shorewall program where to look <para>This parameter tells the /sbin/shorewall program where to look
for Shorewall messages when processing the &#34;show log&#34;, for Shorewall messages when processing the <quote>show log</quote>,
&#34;monitor&#34;, &#34;status&#34; and &#34;hits&#34; commands. If <quote>monitor</quote>, <quote>status</quote> and <quote>hits</quote>
not assigned or if assigned an empty value, /var/log/messages is commands. If not assigned or if assigned an empty value,
assumed.</para> /var/log/messages is assumed.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -3898,9 +3905,10 @@
<member>Masquerading</member> <member>Masquerading</member>
</simplelist> </simplelist>
<para>If the parameter has no value or has a value of &#34;Yes&#34; <para>If the parameter has no value or has a value of
or &#34;yes&#34; then NAT is enabled. If the parameter has a value <quote>Yes</quote> or <quote>yes</quote> then NAT is enabled. If the
of &#34;no&#34; or &#34;No&#34; then NAT is disabled.</para> parameter has a value of <quote>no</quote> or <quote>No</quote> then
NAT is disabled.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -3914,11 +3922,11 @@
</note> </note>
<para>This parameter determines if packet mangling is enabled. If <para>This parameter determines if packet mangling is enabled. If
the parameter has no value or has a value of &#34;Yes&#34; or the parameter has no value or has a value of <quote>Yes</quote> or
&#34;yes&#34; than packet mangling is enabled. If the parameter has <quote>yes</quote> than packet mangling is enabled. If the parameter
a value of &#34;no&#34; or &#34;No&#34; then packet mangling is has a value of <quote>no</quote> or <quote>No</quote> then packet
disabled. If packet mangling is disabled, the /etc/shorewall/tos mangling is disabled. If packet mangling is disabled, the
file is ignored.</para> /etc/shorewall/tos file is ignored.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -3968,10 +3976,10 @@
<listitem> <listitem>
<para>This parameter determines whether Shorewall automatically adds <para>This parameter determines whether Shorewall automatically adds
the <emphasis>external</emphasis> address(es) in <xref linkend="NAT" />. the <emphasis>external</emphasis> address(es) in <xref linkend="NAT" />.
If the variable is set to &#34;Yes&#34; or &#34;yes&#34; then If the variable is set to <quote>Yes</quote> or <quote>yes</quote>
Shorewall automatically adds these aliases. If it is set to then Shorewall automatically adds these aliases. If it is set to
&#34;No&#34; or &#34;no&#34;, you must add these aliases yourself <quote>No</quote> or <quote>no</quote>, you must add these aliases
using your distribution&#39;s network configuration tools.</para> yourself using your distribution&#39;s network configuration tools.</para>
<important> <important>
<para>Shorewall versions before 1.4.6 can only add addresses to <para>Shorewall versions before 1.4.6 can only add addresses to
@ -3989,10 +3997,10 @@
<listitem> <listitem>
<para>This parameter determines whether Shorewall automatically adds <para>This parameter determines whether Shorewall automatically adds
the SNAT <emphasis>ADDRESS</emphasis> in <xref linkend="Masq" />. If the SNAT <emphasis>ADDRESS</emphasis> in <xref linkend="Masq" />. If
the variable is set to &#34;Yes&#34; or &#34;yes&#34; then Shorewall the variable is set to <quote>Yes</quote> or <quote>yes</quote> then
automatically adds these addresses. If it is set to &#34;No&#34; or Shorewall automatically adds these addresses. If it is set to
&#34;no&#34;, you must add these addresses yourself using your <quote>No</quote> or <quote>no</quote>, you must add these addresses
distribution&#39;s network configuration tools.</para> yourself using your distribution&#39;s network configuration tools.</para>
<important> <important>
<para>Shorewall versions before 1.4.6 can only add addresses to <para>Shorewall versions before 1.4.6 can only add addresses to
@ -4049,9 +4057,9 @@
<listitem> <listitem>
<para>This parameter enables the TCP Clamp MSS to PMTU feature of <para>This parameter enables the TCP Clamp MSS to PMTU feature of
Netfilter and is usually required when your internet connection is Netfilter and is usually required when your internet connection is
through PPPoE or PPTP. If set to &#34;Yes&#34; or &#34;yes&#34;, the through PPPoE or PPTP. If set to <quote>Yes</quote> or
feature is enabled. If left blank or set to &#34;No&#34; or <quote>yes</quote>, the feature is enabled. If left blank or set to
&#34;no&#34;, the feature is not enabled.</para> <quote>No</quote> or <quote>no</quote>, the feature is not enabled.</para>
<note> <note>
<para>This option requires CONFIG_IP_NF_TARGET_TCPMSS <ulink <para>This option requires CONFIG_IP_NF_TARGET_TCPMSS <ulink
@ -4064,9 +4072,9 @@
<term>ROUTE_FILTER</term> <term>ROUTE_FILTER</term>
<listitem> <listitem>
<para>If this parameter is given the value &#34;Yes&#34; or <para>If this parameter is given the value <quote>Yes</quote> or
&#34;yes&#34; then route filtering (anti-spoofing) is enabled on all <quote>yes</quote> then route filtering (anti-spoofing) is enabled
network interfaces. The default value is &#34;no&#34;.</para> on all network interfaces. The default value is <quote>no</quote>.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
</variablelist> </variablelist>
@ -4082,7 +4090,7 @@
linkend="Conf" /> above).</para> linkend="Conf" /> above).</para>
<para>The file that is released with Shorewall calls the Shorewall <para>The file that is released with Shorewall calls the Shorewall
function &#34;loadmodule&#34; for the set of modules that I load.</para> function <quote>loadmodule</quote> for the set of modules that I load.</para>
<para>The <emphasis>loadmodule</emphasis> function is called as follows:</para> <para>The <emphasis>loadmodule</emphasis> function is called as follows:</para>
@ -4096,8 +4104,8 @@
<term>&#60;<emphasis>modulename</emphasis>&#62;</term> <term>&#60;<emphasis>modulename</emphasis>&#62;</term>
<listitem> <listitem>
<para>is the name of the modules without the trailing &#34;.o&#34; <para>is the name of the modules without the trailing
(example ip_conntrack).</para> <quote>.o</quote> (example ip_conntrack).</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -4112,7 +4120,7 @@
<para>The function determines if the module named by &#60;<emphasis>modulename</emphasis>&#62; <para>The function determines if the module named by &#60;<emphasis>modulename</emphasis>&#62;
is already loaded and if not then the function determines if the is already loaded and if not then the function determines if the
&#34;.o&#34; file corresponding to the module exists in the <quote>.o</quote> file corresponding to the module exists in the
<emphasis>moduledirectory</emphasis>; if so, then the following command is <emphasis>moduledirectory</emphasis>; if so, then the following command is
executed:</para> executed:</para>
@ -4120,7 +4128,7 @@
&#60;<emphasis>module parameters</emphasis>&#62;</programlisting> &#60;<emphasis>module parameters</emphasis>&#62;</programlisting>
<para>If the file doesn&#39;t exist, the function determines of the <para>If the file doesn&#39;t exist, the function determines of the
&#34;.o.gz&#34; file corresponding to the module exists in the <quote>.o.gz</quote> file corresponding to the module exists in the
<emphasis>moduledirectory</emphasis>. If it does, the function assumes <emphasis>moduledirectory</emphasis>. If it does, the function assumes
that the running configuration supports compressed modules and execute the that the running configuration supports compressed modules and execute the
following command:</para> following command:</para>
@ -4145,12 +4153,12 @@
<listitem> <listitem>
<para>The source zone. May be qualified by following the zone name <para>The source zone. May be qualified by following the zone name
with a colon (&#34;:&#34;) and either an IP address, an IP subnet, a with a colon (<quote>:</quote>) and either an IP address, an IP
MAC address <ulink url="configuration_file_basics.htm#MAC">in subnet, a MAC address <ulink url="configuration_file_basics.htm#MAC">in
Shorewall Format</ulink> or the name of an interface. This column Shorewall Format</ulink> or the name of an interface. This column
may also contain the name of the firewall zone to indicate packets may also contain the name of the firewall zone to indicate packets
originating on the firewall itself or &#34;all&#34; to indicate any originating on the firewall itself or <quote>all</quote> to indicate
source.</para> any source.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -4159,10 +4167,10 @@
<listitem> <listitem>
<para>The destination zone. May be qualified by following the zone <para>The destination zone. May be qualified by following the zone
name with a colon (&#34;:&#34;) and either an IP address or an IP name with a colon (<quote>:</quote>) and either an IP address or an
subnet. Because packets are marked prior to routing, you may not IP subnet. Because packets are marked prior to routing, you may not
specify the name of an interface. This column may also contain specify the name of an interface. This column may also contain
&#34;all&#34; to indicate any destination.</para> <quote>all</quote> to indicate any destination.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -4180,7 +4188,7 @@
<listitem> <listitem>
<para>The source port or a port range. For all ports, place a hyphen <para>The source port or a port range. For all ports, place a hyphen
(&#34;-&#34;) in this column.</para> (<quote>-</quote>) in this column.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -4189,7 +4197,7 @@
<listitem> <listitem>
<para>The destination port or a port range. To indicate all ports, <para>The destination port or a port range. To indicate all ports,
place a hyphen (&#34;-&#34;) in this column.</para> place a hyphen (<quote>-</quote>) in this column.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -4379,7 +4387,7 @@
(from /etc/services). If present, only packets destined for the (from /etc/services). If present, only packets destined for the
specified protocol and one of the listed ports are blocked. When the specified protocol and one of the listed ports are blocked. When the
PROTOCOL is icmp, the PORTS column contains a comma-separated list PROTOCOL is icmp, the PORTS column contains a comma-separated list
of ICMP type numbers or names (see &#34;iptables -h icmp&#34;).</para> of ICMP type numbers or names (see <quote>iptables -h icmp</quote>).</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
</variablelist> </variablelist>
@ -4469,7 +4477,7 @@
<listitem> <listitem>
<para>A comma-separated list of IP/Subnet addresses. If not supplied <para>A comma-separated list of IP/Subnet addresses. If not supplied
or supplied as &#34;-&#34; then 0.0.0.0/0 is assumed.</para> or supplied as <quote>-</quote> then 0.0.0.0/0 is assumed.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
</variablelist> </variablelist>