forked from extern/shorewall_code
Allow policy-level specification of default action or macro
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@4481 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
parent
1ec8b73540
commit
8c4eef48c4
@ -2,4 +2,7 @@ Changes in 3.3.1
|
||||
|
||||
1) Load the proxyarp lib when 'proxyarp' option is specified.
|
||||
|
||||
2) Implement default action/macros at the individual policy level.
|
||||
|
||||
|
||||
|
||||
|
File diff suppressed because it is too large
Load Diff
@ -59,19 +59,20 @@
|
||||
# contain the firewall zone ($FW) or
|
||||
# "all".
|
||||
#
|
||||
# If USE_ACTIONS=Yes in shorewall.conf (or if that
|
||||
# option is not set) then if this column contains ACCEPT,
|
||||
# DROP, or REJECT and a corresponding default action
|
||||
# is defined in /etc/shorewall/actions (or
|
||||
# /usr/share/shorewall/actions.std) then that action
|
||||
# will be invoked before the policy named in this column
|
||||
# is enforced.
|
||||
#
|
||||
# If USE_ACTIONS=No in shorewall.conf then ACCEPT,DROP
|
||||
# REJECT may be optionally followed by ":" and the name
|
||||
# of a macro. The rules in the macro will be expanded
|
||||
# and packets will pass through the rules prior to
|
||||
# the policy being applied.
|
||||
# If the policy is ACCEPT, DROP, REJECT or QUEUE then
|
||||
# the policy may be followed by ":" and one of the
|
||||
# following:
|
||||
#
|
||||
# a) The word "None" or "none". This causes any default
|
||||
# action define in /etc/shorewall/actions.std or
|
||||
# /etc/shorewall/actions to be omitted for this
|
||||
# policy.
|
||||
# b) The name of an action (requires that USE_ACTIONS=Yes
|
||||
# in shorewall.conf). That action will be invoked
|
||||
# before the policy is enforced.
|
||||
# c) The name of a macro. The rules in that macro will
|
||||
# be applied before the policy is enforced. This
|
||||
# does not require USE_ACTIONS=Yes.
|
||||
#
|
||||
# LOG LEVEL If supplied, each connection handled under the default
|
||||
# POLICY is logged at that level. If not supplied, no
|
||||
|
@ -112,4 +112,50 @@ New Features:
|
||||
The macros macro.Drop and macro.Reject are supplied to help you do
|
||||
that.
|
||||
|
||||
3) Prior to Shorewall 3.3, default actions were specified in
|
||||
/usr/share/shorewall/actions.std or in /etc/shorewall/actions.
|
||||
|
||||
This approach has two drawbacks:
|
||||
|
||||
a) All DROP policies must use the same default action and all
|
||||
REJECT policies must use the same default action.
|
||||
|
||||
b) Now that we have modularized action processing, we need a way to
|
||||
define default rules for a policy.
|
||||
|
||||
The solution is to extend the POLICY column in
|
||||
/etc/shorewall/policy.
|
||||
|
||||
When the POLICY is ACCEPT, DROP, REJECT or QUEUE then the policy
|
||||
may be followed by ":" and one of the following:
|
||||
|
||||
a) The word "None" or "none". This causes any default
|
||||
action define in /etc/shorewall/actions.std or
|
||||
/etc/shorewall/actions to be omitted for this
|
||||
policy.
|
||||
b) The name of an action (requires that USE_ACTIONS=Yes
|
||||
in shorewall.conf). That action will be invoked
|
||||
before the policy is enforced.
|
||||
c) The name of a macro. The rules in that macro will
|
||||
be applied before the policy is enforced. This
|
||||
does not require USE_ACTIONS=Yes.
|
||||
|
||||
Example:
|
||||
|
||||
#SOURCE DEST POLICY LOG
|
||||
# LEVEL
|
||||
loc net ACCEPT
|
||||
net all DROP:Drop info
|
||||
#
|
||||
# THE FOLLOWING POLICY MUST BE LAST
|
||||
#
|
||||
all all REJECT:Reject info
|
||||
|
||||
With USE_ACTIONS=Yes, the above will work the same way that the
|
||||
pre-3.3 setup did. The 'Drop' and 'Reject' actions will be invoked
|
||||
before the DROP and REJECT policies are enforced.
|
||||
|
||||
With USE_ACTION=No, there will be no Drop or Reject actions so
|
||||
Shorewall will look for macros by that name; as described in item
|
||||
2) above, these macros are provided as part of the Shorewall 3.3
|
||||
release.
|
||||
|
Loading…
Reference in New Issue
Block a user