forked from extern/shorewall_code
fixed quotes
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@942 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
parent
108fc8d82c
commit
6c300cdd4e
@ -30,8 +30,8 @@
|
||||
document under the terms of the GNU Free Documentation License, Version
|
||||
1.2 or any later version published by the Free Software Foundation; with
|
||||
no Invariant Sections, with no Front-Cover, and with no Back-Cover
|
||||
Texts. A copy of the license is included in the section entitled "<ulink
|
||||
url="GnuCopyright.htm">GNU Free Documentation License</ulink>".</para>
|
||||
Texts. A copy of the license is included in the section entitled
|
||||
<quote><ulink url="GnuCopyright.htm">GNU Free Documentation License</ulink></quote>.</para>
|
||||
</legalnotice>
|
||||
|
||||
<abstract>
|
||||
@ -71,7 +71,7 @@
|
||||
|
||||
<listitem>
|
||||
<para>a parameter file installed in /etc/shorewall that defines a
|
||||
network partitioning into "zones"</para>
|
||||
network partitioning into <quote>zones</quote></para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
|
||||
@ -366,8 +366,8 @@
|
||||
is reserved for use by Shorewall itself. Note that the output
|
||||
produced by iptables is much easier to read if you select short
|
||||
names that are three characters or less in length. The name
|
||||
"all" may not be used as a zone name nor may the zone name
|
||||
assigned to the firewall itself via the FW variable in <xref
|
||||
<quote>all</quote> may not be used as a zone name nor may the zone
|
||||
name assigned to the firewall itself via the FW variable in <xref
|
||||
linkend="Conf" />.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
@ -436,9 +436,9 @@
|
||||
file as desired so long as you have at least one zone defined.</para>
|
||||
|
||||
<warning>
|
||||
<para>If you rename or delete a zone, you should perform "shorewall
|
||||
stop; shorewall start" to install the change rather than
|
||||
"shorewall restart".</para>
|
||||
<para>If you rename or delete a zone, you should perform <quote>shorewall
|
||||
stop; shorewall start</quote> to install the change rather than
|
||||
<quote>shorewall restart</quote>.</para>
|
||||
</warning>
|
||||
|
||||
<warning>
|
||||
@ -461,8 +461,8 @@
|
||||
|
||||
<listitem>
|
||||
<para>A zone defined in the <xref linkend="Zones" /> file or
|
||||
"-". If you specify "-", you must use the <xref
|
||||
linkend="Hosts" /> file to define the zones accessed via this
|
||||
<quote>-</quote>. If you specify <quote>-</quote>, you must use the
|
||||
<xref linkend="Hosts" /> file to define the zones accessed via this
|
||||
interface.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
@ -488,9 +488,10 @@
|
||||
<para>the broadcast address(es) for the sub-network(s) attached to
|
||||
the interface. This should be left empty for P-T-P interfaces (ppp*,
|
||||
ippp*); if you need to specify options for such an interface, enter
|
||||
"-" in this column. If you supply the special value
|
||||
"detect" in this column, the firewall will automatically
|
||||
determine the broadcast address. In order to use "detect":</para>
|
||||
<quote>-</quote> in this column. If you supply the special value
|
||||
<quote>detect</quote> in this column, the firewall will
|
||||
automatically determine the broadcast address. In order to use
|
||||
<quote>detect</quote>:</para>
|
||||
|
||||
<itemizedlist>
|
||||
<listitem>
|
||||
@ -548,7 +549,7 @@
|
||||
<para>(Added in version 1.4.2) - This option causes Shorewall
|
||||
to set up handling for routing packets that arrive on this
|
||||
interface back out the same interface. If this option is
|
||||
specified, the ZONE column may not contain "-".</para>
|
||||
specified, the ZONE column may not contain <quote>-</quote>.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
|
||||
@ -560,7 +561,7 @@
|
||||
to make sanity checks on the header flags in TCP packets
|
||||
arriving on this interface. Checks include Null flags,
|
||||
SYN+FIN, SYN+RST and FIN+URG+PSH; these flag combinations are
|
||||
typically used for "silent" port scans. Packets
|
||||
typically used for <quote>silent</quote> port scans. Packets
|
||||
failing these checks are logged according to the
|
||||
TCP_FLAGS_LOG_LEVEL option in <xref linkend="Conf" /> and are
|
||||
disposed of according to the TCP_FLAGS_DISPOSITION option.</para>
|
||||
@ -611,9 +612,9 @@
|
||||
<para>Beware that as IPv4 addresses become in increasingly
|
||||
short supply, ISPs are beginning to use RFC 1918 addresses
|
||||
within their own infrastructure. Also, many cable and DSL
|
||||
"modems" have an RFC 1918 address that can be used
|
||||
through a web browser for management and monitoring functions.
|
||||
If you want to specify <emphasis role="bold">norfc1918</emphasis>
|
||||
<quote>modems</quote> have an RFC 1918 address that can be
|
||||
used through a web browser for management and monitoring
|
||||
functions. If you want to specify <emphasis role="bold">norfc1918</emphasis>
|
||||
on your external interface but need to allow access to certain
|
||||
addresses from the above list, see <ulink url="FAQ.htm#faq14">FAQ
|
||||
14</ulink>.</para>
|
||||
@ -683,7 +684,8 @@
|
||||
'unclean' match target in iptables are logged
|
||||
<emphasis>but not dropped</emphasis>. The level at which the
|
||||
packets are logged is determined by the setting of LOGUNCLEAN
|
||||
and if LOGUNCLEAN has not been set, "info" is assumed.</para>
|
||||
and if LOGUNCLEAN has not been set, <quote>info</quote> is
|
||||
assumed.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
|
||||
@ -900,8 +902,8 @@
|
||||
<term>HOST(S)</term>
|
||||
|
||||
<listitem>
|
||||
<para>The name of a network interface followed by a colon
|
||||
(":") followed by a comma-separated list either:</para>
|
||||
<para>The name of a network interface followed by a colon (<quote>:</quote>)
|
||||
followed by a comma-separated list either:</para>
|
||||
|
||||
<orderedlist>
|
||||
<listitem>
|
||||
@ -1254,7 +1256,7 @@
|
||||
<listitem>
|
||||
<para>The name of a client zone (a zone defined in the <xref
|
||||
linkend="Zones" /> file , the <link linkend="Conf">name of the
|
||||
firewall zone</link> or "all").</para>
|
||||
firewall zone</link> or <quote>all</quote>).</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
|
||||
@ -1264,7 +1266,7 @@
|
||||
<listitem>
|
||||
<para>The name of a destination zone (a zone defined in the <xref
|
||||
linkend="Zones" /> file , the <link linkend="Conf">name of the
|
||||
firewall zone</link> or "all"). Shorewall automatically
|
||||
firewall zone</link> or <quote>all</quote>). Shorewall automatically
|
||||
allows all traffic from the firewall to itself so the <link
|
||||
linkend="Conf">name of the firewall zone</link> cannot appear in
|
||||
both the SOURCE and DEST columns.</para>
|
||||
@ -1299,8 +1301,8 @@
|
||||
role="bold">SOURCE</emphasis> zone to the <emphasis role="bold">DEST</emphasis>
|
||||
zone will not be rate-limited. Otherwise, this column specifies the
|
||||
maximum rate at which TCP connection requests will be accepted
|
||||
followed by a colon (":") followed by the maximum burst size
|
||||
that will be tolerated. Example: <emphasis role="bold">10/sec:40</emphasis>
|
||||
followed by a colon (<quote>:</quote>) followed by the maximum burst
|
||||
size that will be tolerated. Example: <emphasis role="bold">10/sec:40</emphasis>
|
||||
specifies that the maximum rate of TCP connection requests allowed
|
||||
will be 10 per second and a burst of 40 connections will be
|
||||
tolerated. Connection requests in excess of these limits will be
|
||||
@ -1310,7 +1312,7 @@
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
|
||||
<para>In the SOURCE and DEST columns, you can enter "all" to
|
||||
<para>In the SOURCE and DEST columns, you can enter <quote>all</quote> to
|
||||
indicate all zones.</para>
|
||||
|
||||
<table>
|
||||
@ -1461,7 +1463,7 @@
|
||||
interface. Beginning with Shorewall 1.4.1, Shorewall will ACCEPT all
|
||||
traffic from a zone to itself provided that there is no explicit policy
|
||||
governing traffic from that zone to itself (an explicit policy does not
|
||||
specify "all" in either the SOURCE or DEST column) and that
|
||||
specify <quote>all</quote> in either the SOURCE or DEST column) and that
|
||||
there are no rules concerning connections from that zone to itself. If
|
||||
there is an explicit policy or if there are one or more rules, then
|
||||
traffic within the zone is handled just like traffic between zones is.</para>
|
||||
@ -1962,9 +1964,9 @@
|
||||
<listitem>
|
||||
<para>Causes the connection request to be forwarded to the
|
||||
system specified in the DEST column (port forwarding).
|
||||
"DNAT" stands for "<emphasis role="bold">D</emphasis>estination
|
||||
<quote>DNAT</quote> stands for <quote><emphasis role="bold">D</emphasis>estination
|
||||
<emphasis role="bold">N</emphasis>etwork <emphasis role="bold">A</emphasis>ddress
|
||||
<emphasis role="bold">T</emphasis>ranslation"</para>
|
||||
<emphasis role="bold">T</emphasis>ranslation</quote></para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
|
||||
@ -2039,9 +2041,9 @@
|
||||
|
||||
<note>
|
||||
<para>When the protocol specified in the PROTO column is TCP
|
||||
("tcp", "TCP" or "6"), Shorewall
|
||||
will only pass connection requests (SYN packets) to user
|
||||
space. This is for compatibility with ftwall.</para>
|
||||
(<quote>tcp</quote>, <quote>TCP</quote> or <quote>6</quote>),
|
||||
Shorewall will only pass connection requests (SYN packets)
|
||||
to user space. This is for compatibility with ftwall.</para>
|
||||
</note>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
@ -2064,7 +2066,7 @@
|
||||
<rate>/<interval>[:<burst>] ></programlisting>
|
||||
|
||||
<para>where <rate> is the number of connections per
|
||||
<interval> ("sec" or "min") and
|
||||
<interval> (<quote>sec</quote> or <quote>min</quote>) and
|
||||
<burst> is the largest burst permitted. If no burst value is
|
||||
given, a value of 5 is assumed.</para>
|
||||
|
||||
@ -2086,10 +2088,10 @@
|
||||
</example>
|
||||
|
||||
<warning>
|
||||
<para>When rate limiting is specified on a rule with "all"
|
||||
in the SOURCE or DEST fields below, the limit will apply to each
|
||||
pair of zones individually rather than as a single limit for all
|
||||
pairs of zones covered by the rule.</para>
|
||||
<para>When rate limiting is specified on a rule with
|
||||
<quote>all</quote> in the SOURCE or DEST fields below, the limit
|
||||
will apply to each pair of zones individually rather than as a
|
||||
single limit for all pairs of zones covered by the rule.</para>
|
||||
</warning>
|
||||
|
||||
<para>Rate limiting may also be specified in the RATE LIMIT column
|
||||
@ -2097,11 +2099,12 @@
|
||||
column.</para>
|
||||
|
||||
<para>The ACTION (and rate limit) may optionally be followed by
|
||||
":" and a <ulink url="shorewall_logging.html">syslog level</ulink>
|
||||
(example: REJECT:info or ACCEPT<2/sec:4>:debugging). This
|
||||
causes the packet to be logged at the specified level prior to being
|
||||
processed according to the specified ACTION. Note: if the ACTION is
|
||||
LOG then you MUST specify a syslog level.</para>
|
||||
<quote>:</quote> and a <ulink url="shorewall_logging.html">syslog
|
||||
level</ulink> (example: REJECT:info or
|
||||
ACCEPT<2/sec:4>:debugging). This causes the packet to be
|
||||
logged at the specified level prior to being processed according to
|
||||
the specified ACTION. Note: if the ACTION is LOG then you MUST
|
||||
specify a syslog level.</para>
|
||||
|
||||
<para>The use of DNAT or REDIRECT requires that you have NAT
|
||||
enabled.</para>
|
||||
@ -2114,15 +2117,15 @@
|
||||
<listitem>
|
||||
<para>Describes the source hosts to which the rule applies.. The
|
||||
contents of this field must begin with the name of a zone defined in
|
||||
/etc/shorewall/zones, $FW or "all". If the ACTION is DNAT or
|
||||
REDIRECT, sub-zones may be excluded from the rule by following the
|
||||
initial zone name with "!' and a comma-separated list of
|
||||
those sub-zones to be excluded. There is an <link linkend="Exclude">example</link>
|
||||
above.</para>
|
||||
/etc/shorewall/zones, $FW or <quote>all</quote>. If the ACTION is
|
||||
DNAT or REDIRECT, sub-zones may be excluded from the rule by
|
||||
following the initial zone name with <quote>!</quote> and a
|
||||
comma-separated list of those sub-zones to be excluded. There is an
|
||||
<link linkend="Exclude">example</link> above.</para>
|
||||
|
||||
<para>If the source is not 'all' then the source may be
|
||||
further restricted by adding a colon (":") followed by a
|
||||
comma-separated list of qualifiers. Qualifiers are may include:</para>
|
||||
further restricted by adding a colon (<quote>:</quote>) followed by
|
||||
a comma-separated list of qualifiers. Qualifiers are may include:</para>
|
||||
|
||||
<variablelist>
|
||||
<varlistentry>
|
||||
@ -2132,7 +2135,7 @@
|
||||
<para>refers to any connection requests arriving on the
|
||||
specified interface (example loc:eth4). Beginning with
|
||||
Shorwall 1.3.9, the interface name may optionally be followed
|
||||
by a colon (":") and an IP address or subnet
|
||||
by a colon (<quote>:</quote>) and an IP address or subnet
|
||||
(examples: loc:eth4:192.168.4.22, net:eth0:192.0.2.0/24).</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
@ -2226,8 +2229,8 @@
|
||||
|
||||
<listitem>
|
||||
<para>Protocol. Must be a protocol name from /etc/protocols, a
|
||||
number or "all". Specifies the protocol of the connection
|
||||
request.</para>
|
||||
number or <quote>all</quote>. Specifies the protocol of the
|
||||
connection request.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
|
||||
@ -2240,9 +2243,9 @@
|
||||
udp or icmp. For icmp, this column's contents are interpreted as
|
||||
an icmp type. If you don't want to specify DEST PORT(S) but need
|
||||
to include information in one of the columns to the right, enter
|
||||
"-" in this column. You may give a list of ports and/or port
|
||||
ranges separated by commas. Port numbers may be either integers or
|
||||
service names from /etc/services.</para>
|
||||
<quote>-</quote> in this column. You may give a list of ports and/or
|
||||
port ranges separated by commas. Port numbers may be either integers
|
||||
or service names from /etc/services.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
|
||||
@ -2254,10 +2257,10 @@
|
||||
or port range (a port range is specified as <low port
|
||||
number>:<high port number>). If you don't want to
|
||||
restrict client ports but want to specify something in the next
|
||||
column, enter "-" in this column. If you wish to specify a
|
||||
list of port number or ranges, separate the list elements with
|
||||
commas (with no embedded white space). Port numbers may be either
|
||||
integers or service names from /etc/services.</para>
|
||||
column, enter <quote>-</quote> in this column. If you wish to
|
||||
specify a list of port number or ranges, separate the list elements
|
||||
with commas (with no embedded white space). Port numbers may be
|
||||
either integers or service names from /etc/services.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
|
||||
@ -2280,13 +2283,13 @@
|
||||
addresses are specified in the ORIGINAL DEST column as a
|
||||
comma-separated list.</para>
|
||||
|
||||
<para>The IP address(es) may be optionally followed by ":"
|
||||
and a second IP address. This latter address, if present, is used as
|
||||
the source address for packets forwarded to the server (This is
|
||||
called "Source NAT" or SNAT.</para>
|
||||
<para>The IP address(es) may be optionally followed by
|
||||
<quote>:</quote> and a second IP address. This latter address, if
|
||||
present, is used as the source address for packets forwarded to the
|
||||
server (This is called <quote>Source NAT</quote> or SNAT.</para>
|
||||
|
||||
<para>If this list begins with "!" then the rule will only
|
||||
apply if the original destination address matches none of the
|
||||
<para>If this list begins with <quote>!</quote> then the rule will
|
||||
only apply if the original destination address matches none of the
|
||||
addresses listed.</para>
|
||||
|
||||
<note>
|
||||
@ -2305,10 +2308,10 @@
|
||||
</example>
|
||||
</note>
|
||||
|
||||
<para>If SNAT is not used (no ":" and second IP address),
|
||||
the original source address is used. If you want any destination
|
||||
address to match the rule but want to specify SNAT, simply use a
|
||||
colon followed by the SNAT address.</para>
|
||||
<para>If SNAT is not used (no <quote>:</quote> and second IP
|
||||
address), the original source address is used. If you want any
|
||||
destination address to match the rule but want to specify SNAT,
|
||||
simply use a colon followed by the SNAT address.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
|
||||
@ -2323,7 +2326,7 @@
|
||||
<programlisting><rate>/<interval>[:<burst>]</programlisting>
|
||||
|
||||
<para>where <rate> is the number of connections per
|
||||
<interval> ("sec" or "min") and
|
||||
<interval> (<quote>sec</quote> or <quote>min</quote>) and
|
||||
<burst> is the largest burst permitted. If no burst value is
|
||||
given, a value of 5 is assumed.</para>
|
||||
|
||||
@ -2345,10 +2348,10 @@
|
||||
</example>
|
||||
|
||||
<warning>
|
||||
<para>When rate limiting is specified on a rule with "all"
|
||||
in the SOURCE or DEST fields below, the limit will apply to each
|
||||
pair of zones individually rather than as a single limit for all
|
||||
pairs of zones covered by the rule.</para>
|
||||
<para>When rate limiting is specified on a rule with
|
||||
<quote>all</quote> in the SOURCE or DEST fields below, the limit
|
||||
will apply to each pair of zones individually rather than as a
|
||||
single limit for all pairs of zones covered by the rule.</para>
|
||||
</warning>
|
||||
|
||||
<para>Rate limiting may also be specified in the ACTION column
|
||||
@ -2356,7 +2359,7 @@
|
||||
LIMIT column.</para>
|
||||
|
||||
<para>If you want to specify any following columns but no rate
|
||||
limit, place "-" in this column.</para>
|
||||
limit, place <quote>-</quote> in this column.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
|
||||
@ -2431,8 +2434,8 @@
|
||||
proxy running on the firewall and listening on port 3128. Squid will of
|
||||
course require access to remote web servers. This example shows yet
|
||||
another use for the ORIGINAL DEST column; here, connection requests that
|
||||
were NOT (notice the "!") originally destined to 206.124.146.177
|
||||
are redirected to local port 3128.</title>
|
||||
were NOT (notice the <quote>!</quote>) originally destined to
|
||||
206.124.146.177 are redirected to local port 3128.</title>
|
||||
|
||||
<informaltable>
|
||||
<tgroup cols="9">
|
||||
@ -2668,8 +2671,8 @@
|
||||
|
||||
<programlisting>passive ports 0.0.0.0/0 65500 65534</programlisting>
|
||||
|
||||
<para>If you are running pure-ftpd, you would include "-p
|
||||
65500:65534" on the pure-ftpd runline.</para>
|
||||
<para>If you are running pure-ftpd, you would include <quote>-p
|
||||
65500:65534</quote> on the pure-ftpd runline.</para>
|
||||
|
||||
<para>The important point here is to ensure that the port range used for
|
||||
FTP passive connections is unique and will not overlap with any usage on
|
||||
@ -2935,8 +2938,8 @@
|
||||
</tgroup>
|
||||
</informaltable>
|
||||
|
||||
<para>Using "DNAT-" rather than "DNAT" avoids two extra
|
||||
copies of the third rule from being generated.</para>
|
||||
<para>Using <quote>DNAT-</quote> rather than <quote>DNAT</quote> avoids
|
||||
two extra copies of the third rule from being generated.</para>
|
||||
</example>
|
||||
|
||||
<example>
|
||||
@ -3029,8 +3032,8 @@
|
||||
<listitem>
|
||||
<para>The interface that will masquerade the subnet; this is
|
||||
normally your internet interface. This interface name can be
|
||||
optionally qualified by adding ":" and a subnet or host IP.
|
||||
When this qualification is added, only packets addressed to that
|
||||
optionally qualified by adding <quote>:</quote> and a subnet or host
|
||||
IP. When this qualification is added, only packets addressed to that
|
||||
host or subnet will be masqueraded. Beginning with Shorewall version
|
||||
1.3.14, if you have set ADD_SNAT_ALIASES=Yes in <xref linkend="Conf" />,
|
||||
you can cause Shorewall to create an alias <emphasis>label</emphasis>
|
||||
@ -3065,8 +3068,8 @@
|
||||
named interface.</para>
|
||||
</caution>
|
||||
|
||||
<para>The subnet may be optionally followed by "!' and a
|
||||
comma-separated list of addresses and/or subnets that are to be
|
||||
<para>The subnet may be optionally followed by <quote>!</quote> and
|
||||
a comma-separated list of addresses and/or subnets that are to be
|
||||
excluded from masquerading.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
@ -3308,7 +3311,7 @@
|
||||
|
||||
<listitem>
|
||||
<para>the interface that connects to the system. If the interface is
|
||||
obvious from the subnetting, you may enter "-" in this
|
||||
obvious from the subnetting, you may enter <quote>-</quote> in this
|
||||
column.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
@ -3327,9 +3330,9 @@
|
||||
|
||||
<listitem>
|
||||
<para>If you already have a route through INTERFACE to ADDRESS, this
|
||||
column should contain "Yes" or "yes". If you want
|
||||
Shorewall to add the route, the column should contain "No"
|
||||
or "no".</para>
|
||||
column should contain <quote>Yes</quote> or <quote>yes</quote>. If
|
||||
you want Shorewall to add the route, the column should contain
|
||||
<quote>No</quote> or <quote>no</quote>.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
@ -3343,10 +3346,10 @@
|
||||
changed, you may need to flush the ARP cache on host A as well.</para>
|
||||
|
||||
<para>ISPs typically have ARP configured with long TTL (hours!) so if
|
||||
your ISPs router has a stale cache entry (as seen using "tcpdump
|
||||
-nei <external interface> host <IP addr>"), it may
|
||||
take a long while to time out. I personally have had to contact my ISP
|
||||
and ask them to delete a stale entry in order to restore a system to
|
||||
your ISPs router has a stale cache entry (as seen using <quote>tcpdump
|
||||
-nei <external interface> host <IP addr></quote>), it
|
||||
may take a long while to time out. I personally have had to contact my
|
||||
ISP and ask them to delete a stale entry in order to restore a system to
|
||||
working order after changing my proxy ARP settings.</para>
|
||||
</note>
|
||||
|
||||
@ -3395,7 +3398,7 @@
|
||||
a subnet that is smaller than the subnet of your internet interface. See
|
||||
the <ulink url="http://www.tldp.org/HOWTO/mini/Proxy-ARP-Subnet/">Proxy
|
||||
ARP Subnet Mini HOWTO</ulink> for details. In this case you will want to
|
||||
place "Yes" in the HAVEROUTE column.</para></tip></para>
|
||||
place <quote>Yes</quote> in the HAVEROUTE column.</para></tip></para>
|
||||
</example>
|
||||
|
||||
<warning>
|
||||
@ -3578,21 +3581,22 @@
|
||||
disposition). To use LOGFORMAT with <ulink
|
||||
url="http://www.fireparse.com">fireparse</ulink>, set it as:</para>
|
||||
|
||||
<programlisting>LOGFORMAT="fp=%s:%d a=%s "</programlisting>
|
||||
<programlisting>LOGFORMAT=<quote>fp=%s:%d a=%s </quote></programlisting>
|
||||
|
||||
<para>If the LOGFORMAT value contains the substring '%d'
|
||||
then the logging rule number is calculated and formatted in that
|
||||
position; if that substring is not included then the rule number is
|
||||
not included. If not supplied or supplied as empty
|
||||
(LOGFORMAT="") then "Shorewall:%s:%s:" is assumed.</para>
|
||||
(LOGFORMAT="") then <quote>Shorewall:%s:%s:</quote> is
|
||||
assumed.</para>
|
||||
|
||||
<caution>
|
||||
<para>/sbin/shorewall uses the leading part of the LOGFORMAT
|
||||
string (up to but not including the first '%') to find log
|
||||
messages in the 'show log', 'status' and
|
||||
'hits' commands. This part should not be omitted (the
|
||||
LOGFORMAT should not begin with "%") and the leading part
|
||||
should be sufficiently unique for /sbin/shorewall to identify
|
||||
LOGFORMAT should not begin with <quote>%</quote>) and the leading
|
||||
part should be sufficiently unique for /sbin/shorewall to identify
|
||||
Shorewall messages.</para>
|
||||
</caution>
|
||||
</listitem>
|
||||
@ -3626,8 +3630,8 @@
|
||||
that chain rather than in the PREROUTING chain. This permits you to
|
||||
mark inbound traffic based on its destination address when SNAT or
|
||||
Masquerading are in use. To determine if your kernel has a FORWARD
|
||||
chain in the mangle table, use the "/sbin/shorewall show
|
||||
mangle" command; if a FORWARD chain is displayed then your
|
||||
chain in the mangle table, use the <quote>/sbin/shorewall show
|
||||
mangle</quote> command; if a FORWARD chain is displayed then your
|
||||
kernel will support this option. If this option is not specified or
|
||||
if it is given the empty value (e.g.,
|
||||
MARK_IN_FORWARD_CHAIN="") then MARK_IN_FORWARD_CHAIN=No is
|
||||
@ -3707,12 +3711,12 @@
|
||||
<term>NEWNOTSYN</term>
|
||||
|
||||
<listitem>
|
||||
<para>(Added in Version 1.3.8) - When set to "Yes" or
|
||||
"yes", Shorewall will filter TCP packets that are not part
|
||||
of an established connention and that are not SYN packets (SYN flag
|
||||
on - ACK flag off). If set to "No", Shorewall will silently
|
||||
drop such packets. If not set or set to the empty value (e.g.,
|
||||
"NEWNOTSYN="), NEWNOTSYN=No is assumed.</para>
|
||||
<para>(Added in Version 1.3.8) - When set to <quote>Yes</quote> or
|
||||
<quote>yes</quote>, Shorewall will filter TCP packets that are not
|
||||
part of an established connention and that are not SYN packets (SYN
|
||||
flag on - ACK flag off). If set to <quote>No</quote>, Shorewall will
|
||||
silently drop such packets. If not set or set to the empty value
|
||||
(e.g., <quote>NEWNOTSYN=</quote>), NEWNOTSYN=No is assumed.</para>
|
||||
|
||||
<para>If you have a HA setup with failover to another firewall, you
|
||||
should have NEWNOTSYN=Yes on both firewalls. You should also select
|
||||
@ -3742,13 +3746,14 @@
|
||||
<term>DETECT_DNAT_ADDRS</term>
|
||||
|
||||
<listitem>
|
||||
<para>(Added in Version 1.3.4) - If set to "Yes" or
|
||||
"yes", Shorewall will detect the first IP address of the
|
||||
interface to the source zone and will include this address in DNAT
|
||||
rules as the original destination IP address. If set to "No"
|
||||
or "no", Shorewall will not detect this address and any
|
||||
destination IP address will match the DNAT rule. If not specified or
|
||||
empty, "DETECT_DNAT_ADDRS=Yes" is assumed.</para>
|
||||
<para>(Added in Version 1.3.4) - If set to <quote>Yes</quote> or
|
||||
<quote>yes</quote>, Shorewall will detect the first IP address of
|
||||
the interface to the source zone and will include this address in
|
||||
DNAT rules as the original destination IP address. If set to
|
||||
<quote>No</quote> or <quote>no</quote>, Shorewall will not detect
|
||||
this address and any destination IP address will match the DNAT
|
||||
rule. If not specified or empty, <quote>DETECT_DNAT_ADDRS=Yes</quote>
|
||||
is assumed.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
|
||||
@ -3761,9 +3766,9 @@
|
||||
now automatically detected by Shorewall</para>
|
||||
</note>
|
||||
|
||||
<para>If set to "Yes" or "yes", Shorewall will use
|
||||
the Netfilter multiport facility. In order to use this facility,
|
||||
your kernel must have multiport support
|
||||
<para>If set to <quote>Yes</quote> or <quote>yes</quote>, Shorewall
|
||||
will use the Netfilter multiport facility. In order to use this
|
||||
facility, your kernel must have multiport support
|
||||
(CONFIG_IP_NF_MATCH_MULTIPORT). When this support is used, Shorewall
|
||||
will generate a single rule from each record in the
|
||||
/etc/shorewall/rules file that meets these criteria:</para>
|
||||
@ -3787,11 +3792,12 @@
|
||||
<term>NAT_BEFORE_RULES</term>
|
||||
|
||||
<listitem>
|
||||
<para>If set to "No" or "no", port forwarding rules
|
||||
can override the contents of the <xref linkend="NAT" /> file. If set
|
||||
to "Yes" or "yes", port forwarding rules cannot
|
||||
override one-to-one NAT. If not set or set to an empty value,
|
||||
"Yes" is assumed.</para>
|
||||
<para>If set to <quote>No</quote> or <quote>no</quote>, port
|
||||
forwarding rules can override the contents of the <xref
|
||||
linkend="NAT" /> file. If set to <quote>Yes</quote> or
|
||||
<quote>yes</quote>, port forwarding rules cannot override one-to-one
|
||||
NAT. If not set or set to an empty value, <quote>Yes</quote> is
|
||||
assumed.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
|
||||
@ -3800,7 +3806,8 @@
|
||||
|
||||
<listitem>
|
||||
<para>This parameter specifies the name of the firewall zone. If not
|
||||
set or if set to an empty string, the value "fw" is assumed.</para>
|
||||
set or if set to an empty string, the value <quote>fw</quote> is
|
||||
assumed.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
|
||||
@ -3869,10 +3876,10 @@
|
||||
|
||||
<listitem>
|
||||
<para>This parameter tells the /sbin/shorewall program where to look
|
||||
for Shorewall messages when processing the "show log",
|
||||
"monitor", "status" and "hits" commands. If
|
||||
not assigned or if assigned an empty value, /var/log/messages is
|
||||
assumed.</para>
|
||||
for Shorewall messages when processing the <quote>show log</quote>,
|
||||
<quote>monitor</quote>, <quote>status</quote> and <quote>hits</quote>
|
||||
commands. If not assigned or if assigned an empty value,
|
||||
/var/log/messages is assumed.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
|
||||
@ -3898,9 +3905,10 @@
|
||||
<member>Masquerading</member>
|
||||
</simplelist>
|
||||
|
||||
<para>If the parameter has no value or has a value of "Yes"
|
||||
or "yes" then NAT is enabled. If the parameter has a value
|
||||
of "no" or "No" then NAT is disabled.</para>
|
||||
<para>If the parameter has no value or has a value of
|
||||
<quote>Yes</quote> or <quote>yes</quote> then NAT is enabled. If the
|
||||
parameter has a value of <quote>no</quote> or <quote>No</quote> then
|
||||
NAT is disabled.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
|
||||
@ -3914,11 +3922,11 @@
|
||||
</note>
|
||||
|
||||
<para>This parameter determines if packet mangling is enabled. If
|
||||
the parameter has no value or has a value of "Yes" or
|
||||
"yes" than packet mangling is enabled. If the parameter has
|
||||
a value of "no" or "No" then packet mangling is
|
||||
disabled. If packet mangling is disabled, the /etc/shorewall/tos
|
||||
file is ignored.</para>
|
||||
the parameter has no value or has a value of <quote>Yes</quote> or
|
||||
<quote>yes</quote> than packet mangling is enabled. If the parameter
|
||||
has a value of <quote>no</quote> or <quote>No</quote> then packet
|
||||
mangling is disabled. If packet mangling is disabled, the
|
||||
/etc/shorewall/tos file is ignored.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
|
||||
@ -3968,10 +3976,10 @@
|
||||
<listitem>
|
||||
<para>This parameter determines whether Shorewall automatically adds
|
||||
the <emphasis>external</emphasis> address(es) in <xref linkend="NAT" />.
|
||||
If the variable is set to "Yes" or "yes" then
|
||||
Shorewall automatically adds these aliases. If it is set to
|
||||
"No" or "no", you must add these aliases yourself
|
||||
using your distribution's network configuration tools.</para>
|
||||
If the variable is set to <quote>Yes</quote> or <quote>yes</quote>
|
||||
then Shorewall automatically adds these aliases. If it is set to
|
||||
<quote>No</quote> or <quote>no</quote>, you must add these aliases
|
||||
yourself using your distribution's network configuration tools.</para>
|
||||
|
||||
<important>
|
||||
<para>Shorewall versions before 1.4.6 can only add addresses to
|
||||
@ -3989,10 +3997,10 @@
|
||||
<listitem>
|
||||
<para>This parameter determines whether Shorewall automatically adds
|
||||
the SNAT <emphasis>ADDRESS</emphasis> in <xref linkend="Masq" />. If
|
||||
the variable is set to "Yes" or "yes" then Shorewall
|
||||
automatically adds these addresses. If it is set to "No" or
|
||||
"no", you must add these addresses yourself using your
|
||||
distribution's network configuration tools.</para>
|
||||
the variable is set to <quote>Yes</quote> or <quote>yes</quote> then
|
||||
Shorewall automatically adds these addresses. If it is set to
|
||||
<quote>No</quote> or <quote>no</quote>, you must add these addresses
|
||||
yourself using your distribution's network configuration tools.</para>
|
||||
|
||||
<important>
|
||||
<para>Shorewall versions before 1.4.6 can only add addresses to
|
||||
@ -4049,9 +4057,9 @@
|
||||
<listitem>
|
||||
<para>This parameter enables the TCP Clamp MSS to PMTU feature of
|
||||
Netfilter and is usually required when your internet connection is
|
||||
through PPPoE or PPTP. If set to "Yes" or "yes", the
|
||||
feature is enabled. If left blank or set to "No" or
|
||||
"no", the feature is not enabled.</para>
|
||||
through PPPoE or PPTP. If set to <quote>Yes</quote> or
|
||||
<quote>yes</quote>, the feature is enabled. If left blank or set to
|
||||
<quote>No</quote> or <quote>no</quote>, the feature is not enabled.</para>
|
||||
|
||||
<note>
|
||||
<para>This option requires CONFIG_IP_NF_TARGET_TCPMSS <ulink
|
||||
@ -4064,9 +4072,9 @@
|
||||
<term>ROUTE_FILTER</term>
|
||||
|
||||
<listitem>
|
||||
<para>If this parameter is given the value "Yes" or
|
||||
"yes" then route filtering (anti-spoofing) is enabled on all
|
||||
network interfaces. The default value is "no".</para>
|
||||
<para>If this parameter is given the value <quote>Yes</quote> or
|
||||
<quote>yes</quote> then route filtering (anti-spoofing) is enabled
|
||||
on all network interfaces. The default value is <quote>no</quote>.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
@ -4082,7 +4090,7 @@
|
||||
linkend="Conf" /> above).</para>
|
||||
|
||||
<para>The file that is released with Shorewall calls the Shorewall
|
||||
function "loadmodule" for the set of modules that I load.</para>
|
||||
function <quote>loadmodule</quote> for the set of modules that I load.</para>
|
||||
|
||||
<para>The <emphasis>loadmodule</emphasis> function is called as follows:</para>
|
||||
|
||||
@ -4096,8 +4104,8 @@
|
||||
<term><<emphasis>modulename</emphasis>></term>
|
||||
|
||||
<listitem>
|
||||
<para>is the name of the modules without the trailing ".o"
|
||||
(example ip_conntrack).</para>
|
||||
<para>is the name of the modules without the trailing
|
||||
<quote>.o</quote> (example ip_conntrack).</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
|
||||
@ -4112,7 +4120,7 @@
|
||||
|
||||
<para>The function determines if the module named by <<emphasis>modulename</emphasis>>
|
||||
is already loaded and if not then the function determines if the
|
||||
".o" file corresponding to the module exists in the
|
||||
<quote>.o</quote> file corresponding to the module exists in the
|
||||
<emphasis>moduledirectory</emphasis>; if so, then the following command is
|
||||
executed:</para>
|
||||
|
||||
@ -4120,7 +4128,7 @@
|
||||
<<emphasis>module parameters</emphasis>></programlisting>
|
||||
|
||||
<para>If the file doesn't exist, the function determines of the
|
||||
".o.gz" file corresponding to the module exists in the
|
||||
<quote>.o.gz</quote> file corresponding to the module exists in the
|
||||
<emphasis>moduledirectory</emphasis>. If it does, the function assumes
|
||||
that the running configuration supports compressed modules and execute the
|
||||
following command:</para>
|
||||
@ -4145,12 +4153,12 @@
|
||||
|
||||
<listitem>
|
||||
<para>The source zone. May be qualified by following the zone name
|
||||
with a colon (":") and either an IP address, an IP subnet, a
|
||||
MAC address <ulink url="configuration_file_basics.htm#MAC">in
|
||||
with a colon (<quote>:</quote>) and either an IP address, an IP
|
||||
subnet, a MAC address <ulink url="configuration_file_basics.htm#MAC">in
|
||||
Shorewall Format</ulink> or the name of an interface. This column
|
||||
may also contain the name of the firewall zone to indicate packets
|
||||
originating on the firewall itself or "all" to indicate any
|
||||
source.</para>
|
||||
originating on the firewall itself or <quote>all</quote> to indicate
|
||||
any source.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
|
||||
@ -4159,10 +4167,10 @@
|
||||
|
||||
<listitem>
|
||||
<para>The destination zone. May be qualified by following the zone
|
||||
name with a colon (":") and either an IP address or an IP
|
||||
subnet. Because packets are marked prior to routing, you may not
|
||||
name with a colon (<quote>:</quote>) and either an IP address or an
|
||||
IP subnet. Because packets are marked prior to routing, you may not
|
||||
specify the name of an interface. This column may also contain
|
||||
"all" to indicate any destination.</para>
|
||||
<quote>all</quote> to indicate any destination.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
|
||||
@ -4180,7 +4188,7 @@
|
||||
|
||||
<listitem>
|
||||
<para>The source port or a port range. For all ports, place a hyphen
|
||||
("-") in this column.</para>
|
||||
(<quote>-</quote>) in this column.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
|
||||
@ -4189,7 +4197,7 @@
|
||||
|
||||
<listitem>
|
||||
<para>The destination port or a port range. To indicate all ports,
|
||||
place a hyphen ("-") in this column.</para>
|
||||
place a hyphen (<quote>-</quote>) in this column.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
|
||||
@ -4379,7 +4387,7 @@
|
||||
(from /etc/services). If present, only packets destined for the
|
||||
specified protocol and one of the listed ports are blocked. When the
|
||||
PROTOCOL is icmp, the PORTS column contains a comma-separated list
|
||||
of ICMP type numbers or names (see "iptables -h icmp").</para>
|
||||
of ICMP type numbers or names (see <quote>iptables -h icmp</quote>).</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
@ -4469,7 +4477,7 @@
|
||||
|
||||
<listitem>
|
||||
<para>A comma-separated list of IP/Subnet addresses. If not supplied
|
||||
or supplied as "-" then 0.0.0.0/0 is assumed.</para>
|
||||
or supplied as <quote>-</quote> then 0.0.0.0/0 is assumed.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
|
Loading…
Reference in New Issue
Block a user