forked from extern/shorewall_code
fixed quotes
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@942 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
parent
108fc8d82c
commit
6c300cdd4e
@ -30,8 +30,8 @@
|
|||||||
document under the terms of the GNU Free Documentation License, Version
|
document under the terms of the GNU Free Documentation License, Version
|
||||||
1.2 or any later version published by the Free Software Foundation; with
|
1.2 or any later version published by the Free Software Foundation; with
|
||||||
no Invariant Sections, with no Front-Cover, and with no Back-Cover
|
no Invariant Sections, with no Front-Cover, and with no Back-Cover
|
||||||
Texts. A copy of the license is included in the section entitled "<ulink
|
Texts. A copy of the license is included in the section entitled
|
||||||
url="GnuCopyright.htm">GNU Free Documentation License</ulink>".</para>
|
<quote><ulink url="GnuCopyright.htm">GNU Free Documentation License</ulink></quote>.</para>
|
||||||
</legalnotice>
|
</legalnotice>
|
||||||
|
|
||||||
<abstract>
|
<abstract>
|
||||||
@ -71,7 +71,7 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>a parameter file installed in /etc/shorewall that defines a
|
<para>a parameter file installed in /etc/shorewall that defines a
|
||||||
network partitioning into "zones"</para>
|
network partitioning into <quote>zones</quote></para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -366,8 +366,8 @@
|
|||||||
is reserved for use by Shorewall itself. Note that the output
|
is reserved for use by Shorewall itself. Note that the output
|
||||||
produced by iptables is much easier to read if you select short
|
produced by iptables is much easier to read if you select short
|
||||||
names that are three characters or less in length. The name
|
names that are three characters or less in length. The name
|
||||||
"all" may not be used as a zone name nor may the zone name
|
<quote>all</quote> may not be used as a zone name nor may the zone
|
||||||
assigned to the firewall itself via the FW variable in <xref
|
name assigned to the firewall itself via the FW variable in <xref
|
||||||
linkend="Conf" />.</para>
|
linkend="Conf" />.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -436,9 +436,9 @@
|
|||||||
file as desired so long as you have at least one zone defined.</para>
|
file as desired so long as you have at least one zone defined.</para>
|
||||||
|
|
||||||
<warning>
|
<warning>
|
||||||
<para>If you rename or delete a zone, you should perform "shorewall
|
<para>If you rename or delete a zone, you should perform <quote>shorewall
|
||||||
stop; shorewall start" to install the change rather than
|
stop; shorewall start</quote> to install the change rather than
|
||||||
"shorewall restart".</para>
|
<quote>shorewall restart</quote>.</para>
|
||||||
</warning>
|
</warning>
|
||||||
|
|
||||||
<warning>
|
<warning>
|
||||||
@ -461,8 +461,8 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>A zone defined in the <xref linkend="Zones" /> file or
|
<para>A zone defined in the <xref linkend="Zones" /> file or
|
||||||
"-". If you specify "-", you must use the <xref
|
<quote>-</quote>. If you specify <quote>-</quote>, you must use the
|
||||||
linkend="Hosts" /> file to define the zones accessed via this
|
<xref linkend="Hosts" /> file to define the zones accessed via this
|
||||||
interface.</para>
|
interface.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -488,9 +488,10 @@
|
|||||||
<para>the broadcast address(es) for the sub-network(s) attached to
|
<para>the broadcast address(es) for the sub-network(s) attached to
|
||||||
the interface. This should be left empty for P-T-P interfaces (ppp*,
|
the interface. This should be left empty for P-T-P interfaces (ppp*,
|
||||||
ippp*); if you need to specify options for such an interface, enter
|
ippp*); if you need to specify options for such an interface, enter
|
||||||
"-" in this column. If you supply the special value
|
<quote>-</quote> in this column. If you supply the special value
|
||||||
"detect" in this column, the firewall will automatically
|
<quote>detect</quote> in this column, the firewall will
|
||||||
determine the broadcast address. In order to use "detect":</para>
|
automatically determine the broadcast address. In order to use
|
||||||
|
<quote>detect</quote>:</para>
|
||||||
|
|
||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
@ -548,7 +549,7 @@
|
|||||||
<para>(Added in version 1.4.2) - This option causes Shorewall
|
<para>(Added in version 1.4.2) - This option causes Shorewall
|
||||||
to set up handling for routing packets that arrive on this
|
to set up handling for routing packets that arrive on this
|
||||||
interface back out the same interface. If this option is
|
interface back out the same interface. If this option is
|
||||||
specified, the ZONE column may not contain "-".</para>
|
specified, the ZONE column may not contain <quote>-</quote>.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -560,7 +561,7 @@
|
|||||||
to make sanity checks on the header flags in TCP packets
|
to make sanity checks on the header flags in TCP packets
|
||||||
arriving on this interface. Checks include Null flags,
|
arriving on this interface. Checks include Null flags,
|
||||||
SYN+FIN, SYN+RST and FIN+URG+PSH; these flag combinations are
|
SYN+FIN, SYN+RST and FIN+URG+PSH; these flag combinations are
|
||||||
typically used for "silent" port scans. Packets
|
typically used for <quote>silent</quote> port scans. Packets
|
||||||
failing these checks are logged according to the
|
failing these checks are logged according to the
|
||||||
TCP_FLAGS_LOG_LEVEL option in <xref linkend="Conf" /> and are
|
TCP_FLAGS_LOG_LEVEL option in <xref linkend="Conf" /> and are
|
||||||
disposed of according to the TCP_FLAGS_DISPOSITION option.</para>
|
disposed of according to the TCP_FLAGS_DISPOSITION option.</para>
|
||||||
@ -611,9 +612,9 @@
|
|||||||
<para>Beware that as IPv4 addresses become in increasingly
|
<para>Beware that as IPv4 addresses become in increasingly
|
||||||
short supply, ISPs are beginning to use RFC 1918 addresses
|
short supply, ISPs are beginning to use RFC 1918 addresses
|
||||||
within their own infrastructure. Also, many cable and DSL
|
within their own infrastructure. Also, many cable and DSL
|
||||||
"modems" have an RFC 1918 address that can be used
|
<quote>modems</quote> have an RFC 1918 address that can be
|
||||||
through a web browser for management and monitoring functions.
|
used through a web browser for management and monitoring
|
||||||
If you want to specify <emphasis role="bold">norfc1918</emphasis>
|
functions. If you want to specify <emphasis role="bold">norfc1918</emphasis>
|
||||||
on your external interface but need to allow access to certain
|
on your external interface but need to allow access to certain
|
||||||
addresses from the above list, see <ulink url="FAQ.htm#faq14">FAQ
|
addresses from the above list, see <ulink url="FAQ.htm#faq14">FAQ
|
||||||
14</ulink>.</para>
|
14</ulink>.</para>
|
||||||
@ -683,7 +684,8 @@
|
|||||||
'unclean' match target in iptables are logged
|
'unclean' match target in iptables are logged
|
||||||
<emphasis>but not dropped</emphasis>. The level at which the
|
<emphasis>but not dropped</emphasis>. The level at which the
|
||||||
packets are logged is determined by the setting of LOGUNCLEAN
|
packets are logged is determined by the setting of LOGUNCLEAN
|
||||||
and if LOGUNCLEAN has not been set, "info" is assumed.</para>
|
and if LOGUNCLEAN has not been set, <quote>info</quote> is
|
||||||
|
assumed.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -900,8 +902,8 @@
|
|||||||
<term>HOST(S)</term>
|
<term>HOST(S)</term>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>The name of a network interface followed by a colon
|
<para>The name of a network interface followed by a colon (<quote>:</quote>)
|
||||||
(":") followed by a comma-separated list either:</para>
|
followed by a comma-separated list either:</para>
|
||||||
|
|
||||||
<orderedlist>
|
<orderedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
@ -1254,7 +1256,7 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>The name of a client zone (a zone defined in the <xref
|
<para>The name of a client zone (a zone defined in the <xref
|
||||||
linkend="Zones" /> file , the <link linkend="Conf">name of the
|
linkend="Zones" /> file , the <link linkend="Conf">name of the
|
||||||
firewall zone</link> or "all").</para>
|
firewall zone</link> or <quote>all</quote>).</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -1264,7 +1266,7 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>The name of a destination zone (a zone defined in the <xref
|
<para>The name of a destination zone (a zone defined in the <xref
|
||||||
linkend="Zones" /> file , the <link linkend="Conf">name of the
|
linkend="Zones" /> file , the <link linkend="Conf">name of the
|
||||||
firewall zone</link> or "all"). Shorewall automatically
|
firewall zone</link> or <quote>all</quote>). Shorewall automatically
|
||||||
allows all traffic from the firewall to itself so the <link
|
allows all traffic from the firewall to itself so the <link
|
||||||
linkend="Conf">name of the firewall zone</link> cannot appear in
|
linkend="Conf">name of the firewall zone</link> cannot appear in
|
||||||
both the SOURCE and DEST columns.</para>
|
both the SOURCE and DEST columns.</para>
|
||||||
@ -1299,8 +1301,8 @@
|
|||||||
role="bold">SOURCE</emphasis> zone to the <emphasis role="bold">DEST</emphasis>
|
role="bold">SOURCE</emphasis> zone to the <emphasis role="bold">DEST</emphasis>
|
||||||
zone will not be rate-limited. Otherwise, this column specifies the
|
zone will not be rate-limited. Otherwise, this column specifies the
|
||||||
maximum rate at which TCP connection requests will be accepted
|
maximum rate at which TCP connection requests will be accepted
|
||||||
followed by a colon (":") followed by the maximum burst size
|
followed by a colon (<quote>:</quote>) followed by the maximum burst
|
||||||
that will be tolerated. Example: <emphasis role="bold">10/sec:40</emphasis>
|
size that will be tolerated. Example: <emphasis role="bold">10/sec:40</emphasis>
|
||||||
specifies that the maximum rate of TCP connection requests allowed
|
specifies that the maximum rate of TCP connection requests allowed
|
||||||
will be 10 per second and a burst of 40 connections will be
|
will be 10 per second and a burst of 40 connections will be
|
||||||
tolerated. Connection requests in excess of these limits will be
|
tolerated. Connection requests in excess of these limits will be
|
||||||
@ -1310,7 +1312,7 @@
|
|||||||
</varlistentry>
|
</varlistentry>
|
||||||
</variablelist>
|
</variablelist>
|
||||||
|
|
||||||
<para>In the SOURCE and DEST columns, you can enter "all" to
|
<para>In the SOURCE and DEST columns, you can enter <quote>all</quote> to
|
||||||
indicate all zones.</para>
|
indicate all zones.</para>
|
||||||
|
|
||||||
<table>
|
<table>
|
||||||
@ -1461,7 +1463,7 @@
|
|||||||
interface. Beginning with Shorewall 1.4.1, Shorewall will ACCEPT all
|
interface. Beginning with Shorewall 1.4.1, Shorewall will ACCEPT all
|
||||||
traffic from a zone to itself provided that there is no explicit policy
|
traffic from a zone to itself provided that there is no explicit policy
|
||||||
governing traffic from that zone to itself (an explicit policy does not
|
governing traffic from that zone to itself (an explicit policy does not
|
||||||
specify "all" in either the SOURCE or DEST column) and that
|
specify <quote>all</quote> in either the SOURCE or DEST column) and that
|
||||||
there are no rules concerning connections from that zone to itself. If
|
there are no rules concerning connections from that zone to itself. If
|
||||||
there is an explicit policy or if there are one or more rules, then
|
there is an explicit policy or if there are one or more rules, then
|
||||||
traffic within the zone is handled just like traffic between zones is.</para>
|
traffic within the zone is handled just like traffic between zones is.</para>
|
||||||
@ -1962,9 +1964,9 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>Causes the connection request to be forwarded to the
|
<para>Causes the connection request to be forwarded to the
|
||||||
system specified in the DEST column (port forwarding).
|
system specified in the DEST column (port forwarding).
|
||||||
"DNAT" stands for "<emphasis role="bold">D</emphasis>estination
|
<quote>DNAT</quote> stands for <quote><emphasis role="bold">D</emphasis>estination
|
||||||
<emphasis role="bold">N</emphasis>etwork <emphasis role="bold">A</emphasis>ddress
|
<emphasis role="bold">N</emphasis>etwork <emphasis role="bold">A</emphasis>ddress
|
||||||
<emphasis role="bold">T</emphasis>ranslation"</para>
|
<emphasis role="bold">T</emphasis>ranslation</quote></para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -2039,9 +2041,9 @@
|
|||||||
|
|
||||||
<note>
|
<note>
|
||||||
<para>When the protocol specified in the PROTO column is TCP
|
<para>When the protocol specified in the PROTO column is TCP
|
||||||
("tcp", "TCP" or "6"), Shorewall
|
(<quote>tcp</quote>, <quote>TCP</quote> or <quote>6</quote>),
|
||||||
will only pass connection requests (SYN packets) to user
|
Shorewall will only pass connection requests (SYN packets)
|
||||||
space. This is for compatibility with ftwall.</para>
|
to user space. This is for compatibility with ftwall.</para>
|
||||||
</note>
|
</note>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -2064,7 +2066,7 @@
|
|||||||
<rate>/<interval>[:<burst>] ></programlisting>
|
<rate>/<interval>[:<burst>] ></programlisting>
|
||||||
|
|
||||||
<para>where <rate> is the number of connections per
|
<para>where <rate> is the number of connections per
|
||||||
<interval> ("sec" or "min") and
|
<interval> (<quote>sec</quote> or <quote>min</quote>) and
|
||||||
<burst> is the largest burst permitted. If no burst value is
|
<burst> is the largest burst permitted. If no burst value is
|
||||||
given, a value of 5 is assumed.</para>
|
given, a value of 5 is assumed.</para>
|
||||||
|
|
||||||
@ -2086,10 +2088,10 @@
|
|||||||
</example>
|
</example>
|
||||||
|
|
||||||
<warning>
|
<warning>
|
||||||
<para>When rate limiting is specified on a rule with "all"
|
<para>When rate limiting is specified on a rule with
|
||||||
in the SOURCE or DEST fields below, the limit will apply to each
|
<quote>all</quote> in the SOURCE or DEST fields below, the limit
|
||||||
pair of zones individually rather than as a single limit for all
|
will apply to each pair of zones individually rather than as a
|
||||||
pairs of zones covered by the rule.</para>
|
single limit for all pairs of zones covered by the rule.</para>
|
||||||
</warning>
|
</warning>
|
||||||
|
|
||||||
<para>Rate limiting may also be specified in the RATE LIMIT column
|
<para>Rate limiting may also be specified in the RATE LIMIT column
|
||||||
@ -2097,11 +2099,12 @@
|
|||||||
column.</para>
|
column.</para>
|
||||||
|
|
||||||
<para>The ACTION (and rate limit) may optionally be followed by
|
<para>The ACTION (and rate limit) may optionally be followed by
|
||||||
":" and a <ulink url="shorewall_logging.html">syslog level</ulink>
|
<quote>:</quote> and a <ulink url="shorewall_logging.html">syslog
|
||||||
(example: REJECT:info or ACCEPT<2/sec:4>:debugging). This
|
level</ulink> (example: REJECT:info or
|
||||||
causes the packet to be logged at the specified level prior to being
|
ACCEPT<2/sec:4>:debugging). This causes the packet to be
|
||||||
processed according to the specified ACTION. Note: if the ACTION is
|
logged at the specified level prior to being processed according to
|
||||||
LOG then you MUST specify a syslog level.</para>
|
the specified ACTION. Note: if the ACTION is LOG then you MUST
|
||||||
|
specify a syslog level.</para>
|
||||||
|
|
||||||
<para>The use of DNAT or REDIRECT requires that you have NAT
|
<para>The use of DNAT or REDIRECT requires that you have NAT
|
||||||
enabled.</para>
|
enabled.</para>
|
||||||
@ -2114,15 +2117,15 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>Describes the source hosts to which the rule applies.. The
|
<para>Describes the source hosts to which the rule applies.. The
|
||||||
contents of this field must begin with the name of a zone defined in
|
contents of this field must begin with the name of a zone defined in
|
||||||
/etc/shorewall/zones, $FW or "all". If the ACTION is DNAT or
|
/etc/shorewall/zones, $FW or <quote>all</quote>. If the ACTION is
|
||||||
REDIRECT, sub-zones may be excluded from the rule by following the
|
DNAT or REDIRECT, sub-zones may be excluded from the rule by
|
||||||
initial zone name with "!' and a comma-separated list of
|
following the initial zone name with <quote>!</quote> and a
|
||||||
those sub-zones to be excluded. There is an <link linkend="Exclude">example</link>
|
comma-separated list of those sub-zones to be excluded. There is an
|
||||||
above.</para>
|
<link linkend="Exclude">example</link> above.</para>
|
||||||
|
|
||||||
<para>If the source is not 'all' then the source may be
|
<para>If the source is not 'all' then the source may be
|
||||||
further restricted by adding a colon (":") followed by a
|
further restricted by adding a colon (<quote>:</quote>) followed by
|
||||||
comma-separated list of qualifiers. Qualifiers are may include:</para>
|
a comma-separated list of qualifiers. Qualifiers are may include:</para>
|
||||||
|
|
||||||
<variablelist>
|
<variablelist>
|
||||||
<varlistentry>
|
<varlistentry>
|
||||||
@ -2132,7 +2135,7 @@
|
|||||||
<para>refers to any connection requests arriving on the
|
<para>refers to any connection requests arriving on the
|
||||||
specified interface (example loc:eth4). Beginning with
|
specified interface (example loc:eth4). Beginning with
|
||||||
Shorwall 1.3.9, the interface name may optionally be followed
|
Shorwall 1.3.9, the interface name may optionally be followed
|
||||||
by a colon (":") and an IP address or subnet
|
by a colon (<quote>:</quote>) and an IP address or subnet
|
||||||
(examples: loc:eth4:192.168.4.22, net:eth0:192.0.2.0/24).</para>
|
(examples: loc:eth4:192.168.4.22, net:eth0:192.0.2.0/24).</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -2226,8 +2229,8 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Protocol. Must be a protocol name from /etc/protocols, a
|
<para>Protocol. Must be a protocol name from /etc/protocols, a
|
||||||
number or "all". Specifies the protocol of the connection
|
number or <quote>all</quote>. Specifies the protocol of the
|
||||||
request.</para>
|
connection request.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -2240,9 +2243,9 @@
|
|||||||
udp or icmp. For icmp, this column's contents are interpreted as
|
udp or icmp. For icmp, this column's contents are interpreted as
|
||||||
an icmp type. If you don't want to specify DEST PORT(S) but need
|
an icmp type. If you don't want to specify DEST PORT(S) but need
|
||||||
to include information in one of the columns to the right, enter
|
to include information in one of the columns to the right, enter
|
||||||
"-" in this column. You may give a list of ports and/or port
|
<quote>-</quote> in this column. You may give a list of ports and/or
|
||||||
ranges separated by commas. Port numbers may be either integers or
|
port ranges separated by commas. Port numbers may be either integers
|
||||||
service names from /etc/services.</para>
|
or service names from /etc/services.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -2254,10 +2257,10 @@
|
|||||||
or port range (a port range is specified as <low port
|
or port range (a port range is specified as <low port
|
||||||
number>:<high port number>). If you don't want to
|
number>:<high port number>). If you don't want to
|
||||||
restrict client ports but want to specify something in the next
|
restrict client ports but want to specify something in the next
|
||||||
column, enter "-" in this column. If you wish to specify a
|
column, enter <quote>-</quote> in this column. If you wish to
|
||||||
list of port number or ranges, separate the list elements with
|
specify a list of port number or ranges, separate the list elements
|
||||||
commas (with no embedded white space). Port numbers may be either
|
with commas (with no embedded white space). Port numbers may be
|
||||||
integers or service names from /etc/services.</para>
|
either integers or service names from /etc/services.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -2280,13 +2283,13 @@
|
|||||||
addresses are specified in the ORIGINAL DEST column as a
|
addresses are specified in the ORIGINAL DEST column as a
|
||||||
comma-separated list.</para>
|
comma-separated list.</para>
|
||||||
|
|
||||||
<para>The IP address(es) may be optionally followed by ":"
|
<para>The IP address(es) may be optionally followed by
|
||||||
and a second IP address. This latter address, if present, is used as
|
<quote>:</quote> and a second IP address. This latter address, if
|
||||||
the source address for packets forwarded to the server (This is
|
present, is used as the source address for packets forwarded to the
|
||||||
called "Source NAT" or SNAT.</para>
|
server (This is called <quote>Source NAT</quote> or SNAT.</para>
|
||||||
|
|
||||||
<para>If this list begins with "!" then the rule will only
|
<para>If this list begins with <quote>!</quote> then the rule will
|
||||||
apply if the original destination address matches none of the
|
only apply if the original destination address matches none of the
|
||||||
addresses listed.</para>
|
addresses listed.</para>
|
||||||
|
|
||||||
<note>
|
<note>
|
||||||
@ -2305,10 +2308,10 @@
|
|||||||
</example>
|
</example>
|
||||||
</note>
|
</note>
|
||||||
|
|
||||||
<para>If SNAT is not used (no ":" and second IP address),
|
<para>If SNAT is not used (no <quote>:</quote> and second IP
|
||||||
the original source address is used. If you want any destination
|
address), the original source address is used. If you want any
|
||||||
address to match the rule but want to specify SNAT, simply use a
|
destination address to match the rule but want to specify SNAT,
|
||||||
colon followed by the SNAT address.</para>
|
simply use a colon followed by the SNAT address.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -2323,7 +2326,7 @@
|
|||||||
<programlisting><rate>/<interval>[:<burst>]</programlisting>
|
<programlisting><rate>/<interval>[:<burst>]</programlisting>
|
||||||
|
|
||||||
<para>where <rate> is the number of connections per
|
<para>where <rate> is the number of connections per
|
||||||
<interval> ("sec" or "min") and
|
<interval> (<quote>sec</quote> or <quote>min</quote>) and
|
||||||
<burst> is the largest burst permitted. If no burst value is
|
<burst> is the largest burst permitted. If no burst value is
|
||||||
given, a value of 5 is assumed.</para>
|
given, a value of 5 is assumed.</para>
|
||||||
|
|
||||||
@ -2345,10 +2348,10 @@
|
|||||||
</example>
|
</example>
|
||||||
|
|
||||||
<warning>
|
<warning>
|
||||||
<para>When rate limiting is specified on a rule with "all"
|
<para>When rate limiting is specified on a rule with
|
||||||
in the SOURCE or DEST fields below, the limit will apply to each
|
<quote>all</quote> in the SOURCE or DEST fields below, the limit
|
||||||
pair of zones individually rather than as a single limit for all
|
will apply to each pair of zones individually rather than as a
|
||||||
pairs of zones covered by the rule.</para>
|
single limit for all pairs of zones covered by the rule.</para>
|
||||||
</warning>
|
</warning>
|
||||||
|
|
||||||
<para>Rate limiting may also be specified in the ACTION column
|
<para>Rate limiting may also be specified in the ACTION column
|
||||||
@ -2356,7 +2359,7 @@
|
|||||||
LIMIT column.</para>
|
LIMIT column.</para>
|
||||||
|
|
||||||
<para>If you want to specify any following columns but no rate
|
<para>If you want to specify any following columns but no rate
|
||||||
limit, place "-" in this column.</para>
|
limit, place <quote>-</quote> in this column.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -2431,8 +2434,8 @@
|
|||||||
proxy running on the firewall and listening on port 3128. Squid will of
|
proxy running on the firewall and listening on port 3128. Squid will of
|
||||||
course require access to remote web servers. This example shows yet
|
course require access to remote web servers. This example shows yet
|
||||||
another use for the ORIGINAL DEST column; here, connection requests that
|
another use for the ORIGINAL DEST column; here, connection requests that
|
||||||
were NOT (notice the "!") originally destined to 206.124.146.177
|
were NOT (notice the <quote>!</quote>) originally destined to
|
||||||
are redirected to local port 3128.</title>
|
206.124.146.177 are redirected to local port 3128.</title>
|
||||||
|
|
||||||
<informaltable>
|
<informaltable>
|
||||||
<tgroup cols="9">
|
<tgroup cols="9">
|
||||||
@ -2668,8 +2671,8 @@
|
|||||||
|
|
||||||
<programlisting>passive ports 0.0.0.0/0 65500 65534</programlisting>
|
<programlisting>passive ports 0.0.0.0/0 65500 65534</programlisting>
|
||||||
|
|
||||||
<para>If you are running pure-ftpd, you would include "-p
|
<para>If you are running pure-ftpd, you would include <quote>-p
|
||||||
65500:65534" on the pure-ftpd runline.</para>
|
65500:65534</quote> on the pure-ftpd runline.</para>
|
||||||
|
|
||||||
<para>The important point here is to ensure that the port range used for
|
<para>The important point here is to ensure that the port range used for
|
||||||
FTP passive connections is unique and will not overlap with any usage on
|
FTP passive connections is unique and will not overlap with any usage on
|
||||||
@ -2935,8 +2938,8 @@
|
|||||||
</tgroup>
|
</tgroup>
|
||||||
</informaltable>
|
</informaltable>
|
||||||
|
|
||||||
<para>Using "DNAT-" rather than "DNAT" avoids two extra
|
<para>Using <quote>DNAT-</quote> rather than <quote>DNAT</quote> avoids
|
||||||
copies of the third rule from being generated.</para>
|
two extra copies of the third rule from being generated.</para>
|
||||||
</example>
|
</example>
|
||||||
|
|
||||||
<example>
|
<example>
|
||||||
@ -3029,8 +3032,8 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>The interface that will masquerade the subnet; this is
|
<para>The interface that will masquerade the subnet; this is
|
||||||
normally your internet interface. This interface name can be
|
normally your internet interface. This interface name can be
|
||||||
optionally qualified by adding ":" and a subnet or host IP.
|
optionally qualified by adding <quote>:</quote> and a subnet or host
|
||||||
When this qualification is added, only packets addressed to that
|
IP. When this qualification is added, only packets addressed to that
|
||||||
host or subnet will be masqueraded. Beginning with Shorewall version
|
host or subnet will be masqueraded. Beginning with Shorewall version
|
||||||
1.3.14, if you have set ADD_SNAT_ALIASES=Yes in <xref linkend="Conf" />,
|
1.3.14, if you have set ADD_SNAT_ALIASES=Yes in <xref linkend="Conf" />,
|
||||||
you can cause Shorewall to create an alias <emphasis>label</emphasis>
|
you can cause Shorewall to create an alias <emphasis>label</emphasis>
|
||||||
@ -3065,8 +3068,8 @@
|
|||||||
named interface.</para>
|
named interface.</para>
|
||||||
</caution>
|
</caution>
|
||||||
|
|
||||||
<para>The subnet may be optionally followed by "!' and a
|
<para>The subnet may be optionally followed by <quote>!</quote> and
|
||||||
comma-separated list of addresses and/or subnets that are to be
|
a comma-separated list of addresses and/or subnets that are to be
|
||||||
excluded from masquerading.</para>
|
excluded from masquerading.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -3308,7 +3311,7 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>the interface that connects to the system. If the interface is
|
<para>the interface that connects to the system. If the interface is
|
||||||
obvious from the subnetting, you may enter "-" in this
|
obvious from the subnetting, you may enter <quote>-</quote> in this
|
||||||
column.</para>
|
column.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -3327,9 +3330,9 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>If you already have a route through INTERFACE to ADDRESS, this
|
<para>If you already have a route through INTERFACE to ADDRESS, this
|
||||||
column should contain "Yes" or "yes". If you want
|
column should contain <quote>Yes</quote> or <quote>yes</quote>. If
|
||||||
Shorewall to add the route, the column should contain "No"
|
you want Shorewall to add the route, the column should contain
|
||||||
or "no".</para>
|
<quote>No</quote> or <quote>no</quote>.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
</variablelist>
|
</variablelist>
|
||||||
@ -3343,10 +3346,10 @@
|
|||||||
changed, you may need to flush the ARP cache on host A as well.</para>
|
changed, you may need to flush the ARP cache on host A as well.</para>
|
||||||
|
|
||||||
<para>ISPs typically have ARP configured with long TTL (hours!) so if
|
<para>ISPs typically have ARP configured with long TTL (hours!) so if
|
||||||
your ISPs router has a stale cache entry (as seen using "tcpdump
|
your ISPs router has a stale cache entry (as seen using <quote>tcpdump
|
||||||
-nei <external interface> host <IP addr>"), it may
|
-nei <external interface> host <IP addr></quote>), it
|
||||||
take a long while to time out. I personally have had to contact my ISP
|
may take a long while to time out. I personally have had to contact my
|
||||||
and ask them to delete a stale entry in order to restore a system to
|
ISP and ask them to delete a stale entry in order to restore a system to
|
||||||
working order after changing my proxy ARP settings.</para>
|
working order after changing my proxy ARP settings.</para>
|
||||||
</note>
|
</note>
|
||||||
|
|
||||||
@ -3395,7 +3398,7 @@
|
|||||||
a subnet that is smaller than the subnet of your internet interface. See
|
a subnet that is smaller than the subnet of your internet interface. See
|
||||||
the <ulink url="http://www.tldp.org/HOWTO/mini/Proxy-ARP-Subnet/">Proxy
|
the <ulink url="http://www.tldp.org/HOWTO/mini/Proxy-ARP-Subnet/">Proxy
|
||||||
ARP Subnet Mini HOWTO</ulink> for details. In this case you will want to
|
ARP Subnet Mini HOWTO</ulink> for details. In this case you will want to
|
||||||
place "Yes" in the HAVEROUTE column.</para></tip></para>
|
place <quote>Yes</quote> in the HAVEROUTE column.</para></tip></para>
|
||||||
</example>
|
</example>
|
||||||
|
|
||||||
<warning>
|
<warning>
|
||||||
@ -3578,21 +3581,22 @@
|
|||||||
disposition). To use LOGFORMAT with <ulink
|
disposition). To use LOGFORMAT with <ulink
|
||||||
url="http://www.fireparse.com">fireparse</ulink>, set it as:</para>
|
url="http://www.fireparse.com">fireparse</ulink>, set it as:</para>
|
||||||
|
|
||||||
<programlisting>LOGFORMAT="fp=%s:%d a=%s "</programlisting>
|
<programlisting>LOGFORMAT=<quote>fp=%s:%d a=%s </quote></programlisting>
|
||||||
|
|
||||||
<para>If the LOGFORMAT value contains the substring '%d'
|
<para>If the LOGFORMAT value contains the substring '%d'
|
||||||
then the logging rule number is calculated and formatted in that
|
then the logging rule number is calculated and formatted in that
|
||||||
position; if that substring is not included then the rule number is
|
position; if that substring is not included then the rule number is
|
||||||
not included. If not supplied or supplied as empty
|
not included. If not supplied or supplied as empty
|
||||||
(LOGFORMAT="") then "Shorewall:%s:%s:" is assumed.</para>
|
(LOGFORMAT="") then <quote>Shorewall:%s:%s:</quote> is
|
||||||
|
assumed.</para>
|
||||||
|
|
||||||
<caution>
|
<caution>
|
||||||
<para>/sbin/shorewall uses the leading part of the LOGFORMAT
|
<para>/sbin/shorewall uses the leading part of the LOGFORMAT
|
||||||
string (up to but not including the first '%') to find log
|
string (up to but not including the first '%') to find log
|
||||||
messages in the 'show log', 'status' and
|
messages in the 'show log', 'status' and
|
||||||
'hits' commands. This part should not be omitted (the
|
'hits' commands. This part should not be omitted (the
|
||||||
LOGFORMAT should not begin with "%") and the leading part
|
LOGFORMAT should not begin with <quote>%</quote>) and the leading
|
||||||
should be sufficiently unique for /sbin/shorewall to identify
|
part should be sufficiently unique for /sbin/shorewall to identify
|
||||||
Shorewall messages.</para>
|
Shorewall messages.</para>
|
||||||
</caution>
|
</caution>
|
||||||
</listitem>
|
</listitem>
|
||||||
@ -3626,8 +3630,8 @@
|
|||||||
that chain rather than in the PREROUTING chain. This permits you to
|
that chain rather than in the PREROUTING chain. This permits you to
|
||||||
mark inbound traffic based on its destination address when SNAT or
|
mark inbound traffic based on its destination address when SNAT or
|
||||||
Masquerading are in use. To determine if your kernel has a FORWARD
|
Masquerading are in use. To determine if your kernel has a FORWARD
|
||||||
chain in the mangle table, use the "/sbin/shorewall show
|
chain in the mangle table, use the <quote>/sbin/shorewall show
|
||||||
mangle" command; if a FORWARD chain is displayed then your
|
mangle</quote> command; if a FORWARD chain is displayed then your
|
||||||
kernel will support this option. If this option is not specified or
|
kernel will support this option. If this option is not specified or
|
||||||
if it is given the empty value (e.g.,
|
if it is given the empty value (e.g.,
|
||||||
MARK_IN_FORWARD_CHAIN="") then MARK_IN_FORWARD_CHAIN=No is
|
MARK_IN_FORWARD_CHAIN="") then MARK_IN_FORWARD_CHAIN=No is
|
||||||
@ -3707,12 +3711,12 @@
|
|||||||
<term>NEWNOTSYN</term>
|
<term>NEWNOTSYN</term>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>(Added in Version 1.3.8) - When set to "Yes" or
|
<para>(Added in Version 1.3.8) - When set to <quote>Yes</quote> or
|
||||||
"yes", Shorewall will filter TCP packets that are not part
|
<quote>yes</quote>, Shorewall will filter TCP packets that are not
|
||||||
of an established connention and that are not SYN packets (SYN flag
|
part of an established connention and that are not SYN packets (SYN
|
||||||
on - ACK flag off). If set to "No", Shorewall will silently
|
flag on - ACK flag off). If set to <quote>No</quote>, Shorewall will
|
||||||
drop such packets. If not set or set to the empty value (e.g.,
|
silently drop such packets. If not set or set to the empty value
|
||||||
"NEWNOTSYN="), NEWNOTSYN=No is assumed.</para>
|
(e.g., <quote>NEWNOTSYN=</quote>), NEWNOTSYN=No is assumed.</para>
|
||||||
|
|
||||||
<para>If you have a HA setup with failover to another firewall, you
|
<para>If you have a HA setup with failover to another firewall, you
|
||||||
should have NEWNOTSYN=Yes on both firewalls. You should also select
|
should have NEWNOTSYN=Yes on both firewalls. You should also select
|
||||||
@ -3742,13 +3746,14 @@
|
|||||||
<term>DETECT_DNAT_ADDRS</term>
|
<term>DETECT_DNAT_ADDRS</term>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>(Added in Version 1.3.4) - If set to "Yes" or
|
<para>(Added in Version 1.3.4) - If set to <quote>Yes</quote> or
|
||||||
"yes", Shorewall will detect the first IP address of the
|
<quote>yes</quote>, Shorewall will detect the first IP address of
|
||||||
interface to the source zone and will include this address in DNAT
|
the interface to the source zone and will include this address in
|
||||||
rules as the original destination IP address. If set to "No"
|
DNAT rules as the original destination IP address. If set to
|
||||||
or "no", Shorewall will not detect this address and any
|
<quote>No</quote> or <quote>no</quote>, Shorewall will not detect
|
||||||
destination IP address will match the DNAT rule. If not specified or
|
this address and any destination IP address will match the DNAT
|
||||||
empty, "DETECT_DNAT_ADDRS=Yes" is assumed.</para>
|
rule. If not specified or empty, <quote>DETECT_DNAT_ADDRS=Yes</quote>
|
||||||
|
is assumed.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -3761,9 +3766,9 @@
|
|||||||
now automatically detected by Shorewall</para>
|
now automatically detected by Shorewall</para>
|
||||||
</note>
|
</note>
|
||||||
|
|
||||||
<para>If set to "Yes" or "yes", Shorewall will use
|
<para>If set to <quote>Yes</quote> or <quote>yes</quote>, Shorewall
|
||||||
the Netfilter multiport facility. In order to use this facility,
|
will use the Netfilter multiport facility. In order to use this
|
||||||
your kernel must have multiport support
|
facility, your kernel must have multiport support
|
||||||
(CONFIG_IP_NF_MATCH_MULTIPORT). When this support is used, Shorewall
|
(CONFIG_IP_NF_MATCH_MULTIPORT). When this support is used, Shorewall
|
||||||
will generate a single rule from each record in the
|
will generate a single rule from each record in the
|
||||||
/etc/shorewall/rules file that meets these criteria:</para>
|
/etc/shorewall/rules file that meets these criteria:</para>
|
||||||
@ -3787,11 +3792,12 @@
|
|||||||
<term>NAT_BEFORE_RULES</term>
|
<term>NAT_BEFORE_RULES</term>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>If set to "No" or "no", port forwarding rules
|
<para>If set to <quote>No</quote> or <quote>no</quote>, port
|
||||||
can override the contents of the <xref linkend="NAT" /> file. If set
|
forwarding rules can override the contents of the <xref
|
||||||
to "Yes" or "yes", port forwarding rules cannot
|
linkend="NAT" /> file. If set to <quote>Yes</quote> or
|
||||||
override one-to-one NAT. If not set or set to an empty value,
|
<quote>yes</quote>, port forwarding rules cannot override one-to-one
|
||||||
"Yes" is assumed.</para>
|
NAT. If not set or set to an empty value, <quote>Yes</quote> is
|
||||||
|
assumed.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -3800,7 +3806,8 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>This parameter specifies the name of the firewall zone. If not
|
<para>This parameter specifies the name of the firewall zone. If not
|
||||||
set or if set to an empty string, the value "fw" is assumed.</para>
|
set or if set to an empty string, the value <quote>fw</quote> is
|
||||||
|
assumed.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -3869,10 +3876,10 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>This parameter tells the /sbin/shorewall program where to look
|
<para>This parameter tells the /sbin/shorewall program where to look
|
||||||
for Shorewall messages when processing the "show log",
|
for Shorewall messages when processing the <quote>show log</quote>,
|
||||||
"monitor", "status" and "hits" commands. If
|
<quote>monitor</quote>, <quote>status</quote> and <quote>hits</quote>
|
||||||
not assigned or if assigned an empty value, /var/log/messages is
|
commands. If not assigned or if assigned an empty value,
|
||||||
assumed.</para>
|
/var/log/messages is assumed.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -3898,9 +3905,10 @@
|
|||||||
<member>Masquerading</member>
|
<member>Masquerading</member>
|
||||||
</simplelist>
|
</simplelist>
|
||||||
|
|
||||||
<para>If the parameter has no value or has a value of "Yes"
|
<para>If the parameter has no value or has a value of
|
||||||
or "yes" then NAT is enabled. If the parameter has a value
|
<quote>Yes</quote> or <quote>yes</quote> then NAT is enabled. If the
|
||||||
of "no" or "No" then NAT is disabled.</para>
|
parameter has a value of <quote>no</quote> or <quote>No</quote> then
|
||||||
|
NAT is disabled.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -3914,11 +3922,11 @@
|
|||||||
</note>
|
</note>
|
||||||
|
|
||||||
<para>This parameter determines if packet mangling is enabled. If
|
<para>This parameter determines if packet mangling is enabled. If
|
||||||
the parameter has no value or has a value of "Yes" or
|
the parameter has no value or has a value of <quote>Yes</quote> or
|
||||||
"yes" than packet mangling is enabled. If the parameter has
|
<quote>yes</quote> than packet mangling is enabled. If the parameter
|
||||||
a value of "no" or "No" then packet mangling is
|
has a value of <quote>no</quote> or <quote>No</quote> then packet
|
||||||
disabled. If packet mangling is disabled, the /etc/shorewall/tos
|
mangling is disabled. If packet mangling is disabled, the
|
||||||
file is ignored.</para>
|
/etc/shorewall/tos file is ignored.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -3968,10 +3976,10 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>This parameter determines whether Shorewall automatically adds
|
<para>This parameter determines whether Shorewall automatically adds
|
||||||
the <emphasis>external</emphasis> address(es) in <xref linkend="NAT" />.
|
the <emphasis>external</emphasis> address(es) in <xref linkend="NAT" />.
|
||||||
If the variable is set to "Yes" or "yes" then
|
If the variable is set to <quote>Yes</quote> or <quote>yes</quote>
|
||||||
Shorewall automatically adds these aliases. If it is set to
|
then Shorewall automatically adds these aliases. If it is set to
|
||||||
"No" or "no", you must add these aliases yourself
|
<quote>No</quote> or <quote>no</quote>, you must add these aliases
|
||||||
using your distribution's network configuration tools.</para>
|
yourself using your distribution's network configuration tools.</para>
|
||||||
|
|
||||||
<important>
|
<important>
|
||||||
<para>Shorewall versions before 1.4.6 can only add addresses to
|
<para>Shorewall versions before 1.4.6 can only add addresses to
|
||||||
@ -3989,10 +3997,10 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>This parameter determines whether Shorewall automatically adds
|
<para>This parameter determines whether Shorewall automatically adds
|
||||||
the SNAT <emphasis>ADDRESS</emphasis> in <xref linkend="Masq" />. If
|
the SNAT <emphasis>ADDRESS</emphasis> in <xref linkend="Masq" />. If
|
||||||
the variable is set to "Yes" or "yes" then Shorewall
|
the variable is set to <quote>Yes</quote> or <quote>yes</quote> then
|
||||||
automatically adds these addresses. If it is set to "No" or
|
Shorewall automatically adds these addresses. If it is set to
|
||||||
"no", you must add these addresses yourself using your
|
<quote>No</quote> or <quote>no</quote>, you must add these addresses
|
||||||
distribution's network configuration tools.</para>
|
yourself using your distribution's network configuration tools.</para>
|
||||||
|
|
||||||
<important>
|
<important>
|
||||||
<para>Shorewall versions before 1.4.6 can only add addresses to
|
<para>Shorewall versions before 1.4.6 can only add addresses to
|
||||||
@ -4049,9 +4057,9 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>This parameter enables the TCP Clamp MSS to PMTU feature of
|
<para>This parameter enables the TCP Clamp MSS to PMTU feature of
|
||||||
Netfilter and is usually required when your internet connection is
|
Netfilter and is usually required when your internet connection is
|
||||||
through PPPoE or PPTP. If set to "Yes" or "yes", the
|
through PPPoE or PPTP. If set to <quote>Yes</quote> or
|
||||||
feature is enabled. If left blank or set to "No" or
|
<quote>yes</quote>, the feature is enabled. If left blank or set to
|
||||||
"no", the feature is not enabled.</para>
|
<quote>No</quote> or <quote>no</quote>, the feature is not enabled.</para>
|
||||||
|
|
||||||
<note>
|
<note>
|
||||||
<para>This option requires CONFIG_IP_NF_TARGET_TCPMSS <ulink
|
<para>This option requires CONFIG_IP_NF_TARGET_TCPMSS <ulink
|
||||||
@ -4064,9 +4072,9 @@
|
|||||||
<term>ROUTE_FILTER</term>
|
<term>ROUTE_FILTER</term>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>If this parameter is given the value "Yes" or
|
<para>If this parameter is given the value <quote>Yes</quote> or
|
||||||
"yes" then route filtering (anti-spoofing) is enabled on all
|
<quote>yes</quote> then route filtering (anti-spoofing) is enabled
|
||||||
network interfaces. The default value is "no".</para>
|
on all network interfaces. The default value is <quote>no</quote>.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
</variablelist>
|
</variablelist>
|
||||||
@ -4082,7 +4090,7 @@
|
|||||||
linkend="Conf" /> above).</para>
|
linkend="Conf" /> above).</para>
|
||||||
|
|
||||||
<para>The file that is released with Shorewall calls the Shorewall
|
<para>The file that is released with Shorewall calls the Shorewall
|
||||||
function "loadmodule" for the set of modules that I load.</para>
|
function <quote>loadmodule</quote> for the set of modules that I load.</para>
|
||||||
|
|
||||||
<para>The <emphasis>loadmodule</emphasis> function is called as follows:</para>
|
<para>The <emphasis>loadmodule</emphasis> function is called as follows:</para>
|
||||||
|
|
||||||
@ -4096,8 +4104,8 @@
|
|||||||
<term><<emphasis>modulename</emphasis>></term>
|
<term><<emphasis>modulename</emphasis>></term>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>is the name of the modules without the trailing ".o"
|
<para>is the name of the modules without the trailing
|
||||||
(example ip_conntrack).</para>
|
<quote>.o</quote> (example ip_conntrack).</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -4112,7 +4120,7 @@
|
|||||||
|
|
||||||
<para>The function determines if the module named by <<emphasis>modulename</emphasis>>
|
<para>The function determines if the module named by <<emphasis>modulename</emphasis>>
|
||||||
is already loaded and if not then the function determines if the
|
is already loaded and if not then the function determines if the
|
||||||
".o" file corresponding to the module exists in the
|
<quote>.o</quote> file corresponding to the module exists in the
|
||||||
<emphasis>moduledirectory</emphasis>; if so, then the following command is
|
<emphasis>moduledirectory</emphasis>; if so, then the following command is
|
||||||
executed:</para>
|
executed:</para>
|
||||||
|
|
||||||
@ -4120,7 +4128,7 @@
|
|||||||
<<emphasis>module parameters</emphasis>></programlisting>
|
<<emphasis>module parameters</emphasis>></programlisting>
|
||||||
|
|
||||||
<para>If the file doesn't exist, the function determines of the
|
<para>If the file doesn't exist, the function determines of the
|
||||||
".o.gz" file corresponding to the module exists in the
|
<quote>.o.gz</quote> file corresponding to the module exists in the
|
||||||
<emphasis>moduledirectory</emphasis>. If it does, the function assumes
|
<emphasis>moduledirectory</emphasis>. If it does, the function assumes
|
||||||
that the running configuration supports compressed modules and execute the
|
that the running configuration supports compressed modules and execute the
|
||||||
following command:</para>
|
following command:</para>
|
||||||
@ -4145,12 +4153,12 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>The source zone. May be qualified by following the zone name
|
<para>The source zone. May be qualified by following the zone name
|
||||||
with a colon (":") and either an IP address, an IP subnet, a
|
with a colon (<quote>:</quote>) and either an IP address, an IP
|
||||||
MAC address <ulink url="configuration_file_basics.htm#MAC">in
|
subnet, a MAC address <ulink url="configuration_file_basics.htm#MAC">in
|
||||||
Shorewall Format</ulink> or the name of an interface. This column
|
Shorewall Format</ulink> or the name of an interface. This column
|
||||||
may also contain the name of the firewall zone to indicate packets
|
may also contain the name of the firewall zone to indicate packets
|
||||||
originating on the firewall itself or "all" to indicate any
|
originating on the firewall itself or <quote>all</quote> to indicate
|
||||||
source.</para>
|
any source.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -4159,10 +4167,10 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>The destination zone. May be qualified by following the zone
|
<para>The destination zone. May be qualified by following the zone
|
||||||
name with a colon (":") and either an IP address or an IP
|
name with a colon (<quote>:</quote>) and either an IP address or an
|
||||||
subnet. Because packets are marked prior to routing, you may not
|
IP subnet. Because packets are marked prior to routing, you may not
|
||||||
specify the name of an interface. This column may also contain
|
specify the name of an interface. This column may also contain
|
||||||
"all" to indicate any destination.</para>
|
<quote>all</quote> to indicate any destination.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -4180,7 +4188,7 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>The source port or a port range. For all ports, place a hyphen
|
<para>The source port or a port range. For all ports, place a hyphen
|
||||||
("-") in this column.</para>
|
(<quote>-</quote>) in this column.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -4189,7 +4197,7 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>The destination port or a port range. To indicate all ports,
|
<para>The destination port or a port range. To indicate all ports,
|
||||||
place a hyphen ("-") in this column.</para>
|
place a hyphen (<quote>-</quote>) in this column.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -4379,7 +4387,7 @@
|
|||||||
(from /etc/services). If present, only packets destined for the
|
(from /etc/services). If present, only packets destined for the
|
||||||
specified protocol and one of the listed ports are blocked. When the
|
specified protocol and one of the listed ports are blocked. When the
|
||||||
PROTOCOL is icmp, the PORTS column contains a comma-separated list
|
PROTOCOL is icmp, the PORTS column contains a comma-separated list
|
||||||
of ICMP type numbers or names (see "iptables -h icmp").</para>
|
of ICMP type numbers or names (see <quote>iptables -h icmp</quote>).</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
</variablelist>
|
</variablelist>
|
||||||
@ -4469,7 +4477,7 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>A comma-separated list of IP/Subnet addresses. If not supplied
|
<para>A comma-separated list of IP/Subnet addresses. If not supplied
|
||||||
or supplied as "-" then 0.0.0.0/0 is assumed.</para>
|
or supplied as <quote>-</quote> then 0.0.0.0/0 is assumed.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
</variablelist>
|
</variablelist>
|
||||||
|
Loading…
Reference in New Issue
Block a user