forked from extern/shorewall_code
Documentation Updates
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@1090 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
parent
2e80e459bb
commit
ac8d03c5f4
@ -15,7 +15,7 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2004-01-05</pubdate>
|
<pubdate>2004-01-22</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2001-2004</year>
|
<year>2001-2004</year>
|
||||||
@ -680,6 +680,21 @@ dmz DMZ Demilitarized zone</programlisting>
|
|||||||
</varlistentry>
|
</varlistentry>
|
||||||
</variablelist>
|
</variablelist>
|
||||||
|
|
||||||
|
<variablelist>
|
||||||
|
<varlistentry>
|
||||||
|
<term>detectnets</term>
|
||||||
|
|
||||||
|
<listitem>
|
||||||
|
<para>(Added in version 1.4.10) - If this option is specified,
|
||||||
|
the zone named in the ZONE column will contain only the hosts
|
||||||
|
routed through the interface named in the INTERFACE column.
|
||||||
|
<emphasis role="bold">Do not set this option on your external
|
||||||
|
(Internet) interface!</emphasis> The interface must be in the
|
||||||
|
UP state when Shorewall is [re]started.</para>
|
||||||
|
</listitem>
|
||||||
|
</varlistentry>
|
||||||
|
</variablelist>
|
||||||
|
|
||||||
<para>My recommendations concerning options:</para>
|
<para>My recommendations concerning options:</para>
|
||||||
|
|
||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
@ -688,7 +703,7 @@ dmz DMZ Demilitarized zone</programlisting>
|
|||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Wireless Interface -- <emphasis role="bold">maclist,routefilter,tcpflags</emphasis></para>
|
<para>Wireless Interface -- <emphasis role="bold">maclist,routefilter,tcpflags,detectnets</emphasis></para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
@ -926,7 +941,7 @@ loc eth1:192.168.1.0/24,192.168.12.0/24</programlisting>
|
|||||||
to a particular connection request then the policy from
|
to a particular connection request then the policy from
|
||||||
<filename>/etc/shorewall/policy</filename> is applied.</para>
|
<filename>/etc/shorewall/policy</filename> is applied.</para>
|
||||||
|
|
||||||
<para>Four policies are defined:</para>
|
<para>Five policies are defined:</para>
|
||||||
|
|
||||||
<variablelist>
|
<variablelist>
|
||||||
<varlistentry>
|
<varlistentry>
|
||||||
@ -1827,14 +1842,23 @@ DNAT net loc:192.168.1.101-192.168.1.109 tcp 80</programlisting>
|
|||||||
optionally qualified by adding <quote>:</quote> and a subnet or host
|
optionally qualified by adding <quote>:</quote> and a subnet or host
|
||||||
IP. When this qualification is added, only packets addressed to that
|
IP. When this qualification is added, only packets addressed to that
|
||||||
host or subnet will be masqueraded. Beginning with Shorewall version
|
host or subnet will be masqueraded. Beginning with Shorewall version
|
||||||
1.3.14, if you have set ADD_SNAT_ALIASES=Yes in <xref linkend="Conf" />,
|
1.4.10, the interface name can be qualified with ":"
|
||||||
you can cause Shorewall to create an alias <emphasis>label</emphasis>
|
followed by a comma separated list of hosts and/or subnets. If this
|
||||||
of the form <emphasis>interfacename:digit</emphasis> (e.g., eth0:0)
|
list begins with <quote>!</quote> (e.g., <quote>eth0:!192.0.2.8/29,192.0.2.32/29</quote>)
|
||||||
by placing that label in this column. See example 5 below. Alias
|
then only packets addressed to destinations <emphasis role="bold">not</emphasis>
|
||||||
labels created in this way allow the alias to be visible to the
|
listed will be masqueraded; otherwise (e.g., <quote>eth0:192.0.2.8/29,192.0.2.32/29</quote>),
|
||||||
ipconfig utility. <emphasis role="bold">THAT IS THE ONLY THING THAT
|
traffic will be masqueraded if it <emphasis role="bold">does</emphasis>
|
||||||
THIS LABEL IS GOOD FOR AND IT MAY NOT APPEAR ANYWHERE ELSE IN YOUR
|
match one of the listed addresses.</para>
|
||||||
SHOREWALL CONFIGURATION.</emphasis></para>
|
|
||||||
|
<para>Beginning with Shorewall version 1.3.14, if you have set
|
||||||
|
ADD_SNAT_ALIASES=Yes in <xref linkend="Conf" />, you can cause
|
||||||
|
Shorewall to create an alias <emphasis>label</emphasis> of the form
|
||||||
|
<emphasis>interfacename:digit</emphasis> (e.g., eth0:0) by placing
|
||||||
|
that label in this column. See example 5 below. Alias labels created
|
||||||
|
in this way allow the alias to be visible to the ipconfig utility.
|
||||||
|
<emphasis role="bold">THAT IS THE ONLY THING THAT THIS LABEL IS GOOD
|
||||||
|
FOR AND IT MAY NOT APPEAR ANYWHERE ELSE IN YOUR SHOREWALL
|
||||||
|
CONFIGURATION.</emphasis></para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -3091,7 +3115,9 @@ eth1 -</programlisting>
|
|||||||
<appendix>
|
<appendix>
|
||||||
<title>Revision History</title>
|
<title>Revision History</title>
|
||||||
|
|
||||||
<para><revhistory><revision><revnumber>1.11</revnumber><date>2005-01-05</date><authorinitials>TE</authorinitials><revremark>Standards
|
<para><revhistory><revision><revnumber>1.12</revnumber><date>2004-01-21</date><authorinitials>TE</authorinitials><revremark>Add
|
||||||
|
masquerade destination list.</revremark></revision><revision><revnumber>1.12</revnumber><date>2004-01-18</date><authorinitials>TE</authorinitials><revremark>Correct
|
||||||
|
typo.</revremark></revision><revision><revnumber>1.11</revnumber><date>2004-01-05</date><authorinitials>TE</authorinitials><revremark>Standards
|
||||||
Compliance</revremark></revision><revision><revnumber>1.10</revnumber><date>2004-01-05</date><authorinitials>TE</authorinitials><revremark>Improved
|
Compliance</revremark></revision><revision><revnumber>1.10</revnumber><date>2004-01-05</date><authorinitials>TE</authorinitials><revremark>Improved
|
||||||
formatting of DNAT- and REDIRECT- for clarity</revremark></revision><revision><revnumber>1.9</revnumber><date>2003-12-25</date><authorinitials>MN</authorinitials><revremark>Initial
|
formatting of DNAT- and REDIRECT- for clarity</revremark></revision><revision><revnumber>1.9</revnumber><date>2003-12-25</date><authorinitials>MN</authorinitials><revremark>Initial
|
||||||
Docbook Conversion Complete</revremark></revision></revhistory></para>
|
Docbook Conversion Complete</revremark></revision></revhistory></para>
|
||||||
|
@ -15,7 +15,7 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2003-12-31</pubdate>
|
<pubdate>2004-01-21</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2001-2003</year>
|
<year>2001-2003</year>
|
||||||
@ -23,7 +23,7 @@
|
|||||||
<holder>Thomas M. Eastep</holder>
|
<holder>Thomas M. Eastep</holder>
|
||||||
</copyright>
|
</copyright>
|
||||||
|
|
||||||
<edition>1.4.8</edition>
|
<edition>1.4.9</edition>
|
||||||
|
|
||||||
<legalnotice>
|
<legalnotice>
|
||||||
<para>Permission is granted to copy, distribute and/or modify this
|
<para>Permission is granted to copy, distribute and/or modify this
|
||||||
@ -73,6 +73,10 @@
|
|||||||
(virtual) Interfaces (e.g., eth0:0)</ulink></para>
|
(virtual) Interfaces (e.g., eth0:0)</ulink></para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
|
<listitem>
|
||||||
|
<para><ulink url="traffic_shaping.htm">Bandwidth Control</ulink></para>
|
||||||
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para><ulink url="blacklisting_support.htm">Blacklisting</ulink></para>
|
<para><ulink url="blacklisting_support.htm">Blacklisting</ulink></para>
|
||||||
|
|
||||||
|
@ -17,7 +17,7 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2004-01-20</pubdate>
|
<pubdate>2004-01-24</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2001-2004</year>
|
<year>2001-2004</year>
|
||||||
@ -1590,7 +1590,12 @@ Creating input Chains...
|
|||||||
<para><emphasis role="bold">Answer:</emphasis> The above output is
|
<para><emphasis role="bold">Answer:</emphasis> The above output is
|
||||||
perfectly normal. The Net zone is defined as all hosts that are
|
perfectly normal. The Net zone is defined as all hosts that are
|
||||||
connected through eth0 and the local zone is defined as all hosts
|
connected through eth0 and the local zone is defined as all hosts
|
||||||
connected through eth1</para>
|
connected through eth1. If you are running Shorewall 1.4.10 or later,
|
||||||
|
you can consider setting the <ulink url="Documentation.htm#Interfaces"><emphasis
|
||||||
|
role="bold">detectnets</emphasis> interface option</ulink> on your local
|
||||||
|
interface (eth1 in the above example). That will cause Shorewall to
|
||||||
|
restrict the local zone to only those networks routed through that
|
||||||
|
interface.</para>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
<section id="faq22">
|
<section id="faq22">
|
||||||
@ -1909,7 +1914,9 @@ Creating input Chains...
|
|||||||
<appendix>
|
<appendix>
|
||||||
<title>Revision History</title>
|
<title>Revision History</title>
|
||||||
|
|
||||||
<para><revhistory><revision><revnumber>1.12</revnumber><date>2004-01-20</date><authorinitials>TE</authorinitials><revremark>Improve
|
<para><revhistory><revision><revnumber>1.13</revnumber><date>2004-01-24</date><authorinitials>TE</authorinitials><revremark>Add
|
||||||
|
a note about the <emphasis role="bold">detectnets</emphasis> interface
|
||||||
|
option in FAQ 9.</revremark></revision><revision><revnumber>1.12</revnumber><date>2004-01-20</date><authorinitials>TE</authorinitials><revremark>Improve
|
||||||
FAQ 16 answer.</revremark></revision><revision><revnumber>1.11</revnumber><date>2004-01-14</date><authorinitials>TE</authorinitials><revremark>Corrected
|
FAQ 16 answer.</revremark></revision><revision><revnumber>1.11</revnumber><date>2004-01-14</date><authorinitials>TE</authorinitials><revremark>Corrected
|
||||||
broken link</revremark></revision><revision><revnumber>1.10</revnumber><date>2004-01-09</date><authorinitials>TE</authorinitials><revremark>Added
|
broken link</revremark></revision><revision><revnumber>1.10</revnumber><date>2004-01-09</date><authorinitials>TE</authorinitials><revremark>Added
|
||||||
a couple of more legacy FAQ numbers.</revremark></revision><revision><revnumber>1.9</revnumber><date>2004-01-08</date><authorinitials>TE</authorinitials><revremark>Corrected
|
a couple of more legacy FAQ numbers.</revremark></revision><revision><revnumber>1.9</revnumber><date>2004-01-08</date><authorinitials>TE</authorinitials><revremark>Corrected
|
||||||
|
@ -15,14 +15,10 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2003-10-29</pubdate>
|
<pubdate>2004-01-22</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2001</year>
|
<year>2001-2004</year>
|
||||||
|
|
||||||
<year>2002</year>
|
|
||||||
|
|
||||||
<year>2003</year>
|
|
||||||
|
|
||||||
<holder>Thomas M. Eastep</holder>
|
<holder>Thomas M. Eastep</holder>
|
||||||
</copyright>
|
</copyright>
|
||||||
@ -37,6 +33,16 @@
|
|||||||
</legalnotice>
|
</legalnotice>
|
||||||
</articleinfo>
|
</articleinfo>
|
||||||
|
|
||||||
|
<warning>
|
||||||
|
<para>This documentation does not cover configuring IPSEC under the 2.6
|
||||||
|
Linux Kernel. David Hollis has provided i<ulink
|
||||||
|
url="http://lists.shorewall.net/pipermail/shorewall-users/2003-December/010417.html">nformation
|
||||||
|
about how to set up a simple tunnel under 2.6</ulink>. One important point
|
||||||
|
that is not made explicit in David's post is that the <emphasis
|
||||||
|
role="bold">vpn</emphasis> zone must be defined before the <emphasis
|
||||||
|
role="bold">net</emphasis> zone in <filename>/etc/shorewall/zones</filename>.</para>
|
||||||
|
</warning>
|
||||||
|
|
||||||
<section>
|
<section>
|
||||||
<title>Configuring FreeS/Wan</title>
|
<title>Configuring FreeS/Wan</title>
|
||||||
|
|
||||||
|
@ -15,10 +15,10 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2003-10-17</pubdate>
|
<pubdate>2004-01-20</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2003</year>
|
<year>2003-2004</year>
|
||||||
|
|
||||||
<holder>Thomas M. Eastep</holder>
|
<holder>Thomas M. Eastep</holder>
|
||||||
</copyright>
|
</copyright>
|
||||||
@ -33,7 +33,7 @@
|
|||||||
</legalnotice>
|
</legalnotice>
|
||||||
</articleinfo>
|
</articleinfo>
|
||||||
|
|
||||||
<para> </para>
|
<para></para>
|
||||||
|
|
||||||
<para>This page covers Shorewall configuration to use with <ulink
|
<para>This page covers Shorewall configuration to use with <ulink
|
||||||
url="http://www.squid-cache.org">Squid</ulink> running as a Transparent
|
url="http://www.squid-cache.org">Squid</ulink> running as a Transparent
|
||||||
@ -401,7 +401,7 @@ chkconfig --level 35 iptables on</programlisting>
|
|||||||
</section>
|
</section>
|
||||||
|
|
||||||
<section id="DMZ">
|
<section id="DMZ">
|
||||||
<title>Squid (transparent) Running in the DMZ (This is what I do)</title>
|
<title>Squid (transparent) Running in the DMZ</title>
|
||||||
|
|
||||||
<para>You have a single Linux system in your DMZ with IP address
|
<para>You have a single Linux system in your DMZ with IP address
|
||||||
192.0.2.177. You want to run both a web server and Squid on that system.
|
192.0.2.177. You want to run both a web server and Squid on that system.
|
||||||
|
@ -15,10 +15,10 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2003-10-22</pubdate>
|
<pubdate>2004-01-19</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2003</year>
|
<year>2003-2004</year>
|
||||||
|
|
||||||
<holder>Thomas M. Eastep</holder>
|
<holder>Thomas M. Eastep</holder>
|
||||||
</copyright>
|
</copyright>
|
||||||
@ -42,7 +42,7 @@
|
|||||||
|
|
||||||
<para>To filter traffic from your <quote>loc</quote> zone with ftwall, you
|
<para>To filter traffic from your <quote>loc</quote> zone with ftwall, you
|
||||||
insert the following rules <emphasis role="bold">near the top</emphasis> of
|
insert the following rules <emphasis role="bold">near the top</emphasis> of
|
||||||
your /etc/shorewall/rules file (before and ACCEPT rules whose source is the
|
your /etc/shorewall/rules file (before any ACCEPT rules whose source is the
|
||||||
<quote>loc</quote> zone).</para>
|
<quote>loc</quote> zone).</para>
|
||||||
|
|
||||||
<programlisting> QUEUE loc net tcp
|
<programlisting> QUEUE loc net tcp
|
||||||
@ -51,4 +51,9 @@
|
|||||||
|
|
||||||
<para>Now simply configure ftwall as described in the ftwall documentation
|
<para>Now simply configure ftwall as described in the ftwall documentation
|
||||||
and restart Shorewall.</para>
|
and restart Shorewall.</para>
|
||||||
|
|
||||||
|
<tip>
|
||||||
|
<para>There is an ftwall init script for use with <trademark>SuSE</trademark>
|
||||||
|
Linux at <ulink url="http://shorewall.net/pub/shorewall/contrib/ftwall">http://shorewall.net/pub/shorewall/contrib/ftwall</ulink>.</para>
|
||||||
|
</tip>
|
||||||
</article>
|
</article>
|
@ -15,7 +15,7 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2004-01-05</pubdate>
|
<pubdate>2004-01-17</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2002-2004</year>
|
<year>2002-2004</year>
|
||||||
@ -140,7 +140,7 @@
|
|||||||
option in <filename>/etc/shorewall/interfaces</filename>.</para>
|
option in <filename>/etc/shorewall/interfaces</filename>.</para>
|
||||||
|
|
||||||
<example>
|
<example>
|
||||||
<title>Ingore packets from a pair of systems</title>
|
<title>Ignore packets from a pair of systems</title>
|
||||||
|
|
||||||
<programlisting> <command>shorewall drop 192.0.2.124 192.0.2.125</command></programlisting>
|
<programlisting> <command>shorewall drop 192.0.2.124 192.0.2.125</command></programlisting>
|
||||||
|
|
||||||
|
@ -13,7 +13,7 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2004-01-03</pubdate>
|
<pubdate>2004-01-19</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2001-2004</year>
|
<year>2001-2004</year>
|
||||||
@ -62,16 +62,44 @@
|
|||||||
</itemizedlist>
|
</itemizedlist>
|
||||||
</caution>
|
</caution>
|
||||||
|
|
||||||
|
<section>
|
||||||
|
<title>RFC1918 File</title>
|
||||||
|
|
||||||
|
<para><ulink url="http://shorewall.net/pub/shorewall/errata/1.4.8/rfc1918">Here</ulink>
|
||||||
|
is the most up to date version of the <ulink
|
||||||
|
url="Documentation.htm#rfc1918">rfc1918 file</ulink>.</para>
|
||||||
|
</section>
|
||||||
|
|
||||||
<section>
|
<section>
|
||||||
<title>Problems in Version 1.4</title>
|
<title>Problems in Version 1.4</title>
|
||||||
|
|
||||||
<section>
|
<section>
|
||||||
<title>All Versions</title>
|
<title>Shorewall 1.4.9</title>
|
||||||
|
|
||||||
<para><ulink
|
<itemizedlist>
|
||||||
url="http://shorewall.net/pub/shorewall/errata/1.4.8/rfc1918">Here</ulink>
|
<listitem>
|
||||||
is the most up to date version of the <ulink
|
<para>The column descriptions in the action.template file did not
|
||||||
url="Documentation.htm#rfc1918">rfc1918 file</ulink>.</para>
|
match the column headings.</para>
|
||||||
|
</listitem>
|
||||||
|
</itemizedlist>
|
||||||
|
|
||||||
|
<para>This problem has been corrected in <ulink
|
||||||
|
url="http://shorewall.net/pub/shorewall/errata/1.4.9/action.template">this
|
||||||
|
action.template file</ulink> which may be installed in /etc/shorewall.</para>
|
||||||
|
|
||||||
|
<itemizedlist>
|
||||||
|
<listitem>
|
||||||
|
<para>The presence of IPV6 addresses on devices generates error
|
||||||
|
messages during <command>[re]start </command>if ADD_IP_ALIASES=Yes
|
||||||
|
or ADD_SNAT_ALIASES=Yes are specified in
|
||||||
|
/etc/shorewall/shorewall.conf.</para>
|
||||||
|
</listitem>
|
||||||
|
</itemizedlist>
|
||||||
|
|
||||||
|
<para>This problem has been corrected in <ulink
|
||||||
|
url="http://shorewall.net/pub/shorewall/errata/1.4.8/firewall">this
|
||||||
|
firewall script</ulink> which may be installed in
|
||||||
|
/usr/share/shorewall/firewall as described above.</para>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
<section>
|
<section>
|
||||||
@ -437,9 +465,11 @@ Aborted (core dumped)</programlisting>
|
|||||||
</section>
|
</section>
|
||||||
|
|
||||||
<appendix>
|
<appendix>
|
||||||
<title>Revision History</title>
|
<title>Revision History4</title>
|
||||||
|
|
||||||
<para><revhistory><revision><revnumber>1.3</revnumber><date>2004-01-03</date><authorinitials>TE</authorinitials><revremark>Added
|
<para><revhistory><revision><revnumber>1.4</revnumber><date>2004-01-19</date><authorinitials>TE</authorinitials><revremark>IPV6
|
||||||
|
address problems. Make RFC1918 file section more prominent.</revremark></revision><revision><revnumber>1.3</revnumber><date>2004-01-14</date><authorinitials>TE</authorinitials><revremark>Confusing
|
||||||
|
template file in 1.4.9</revremark></revision><revision><revnumber>1.3</revnumber><date>2004-01-03</date><authorinitials>TE</authorinitials><revremark>Added
|
||||||
note about REJECT RedHat Kernal problem being corrected.</revremark></revision><revision><revnumber>1.2</revnumber><date>2003-12-29</date><authorinitials>TE</authorinitials><revremark>Updated
|
note about REJECT RedHat Kernal problem being corrected.</revremark></revision><revision><revnumber>1.2</revnumber><date>2003-12-29</date><authorinitials>TE</authorinitials><revremark>Updated
|
||||||
RFC1918 file</revremark></revision><revision><revnumber>1.1</revnumber><date>2003-12-17</date><authorinitials>TE</authorinitials><revremark>Initial
|
RFC1918 file</revremark></revision><revision><revnumber>1.1</revnumber><date>2003-12-17</date><authorinitials>TE</authorinitials><revremark>Initial
|
||||||
Conversion to Docbook XML</revremark></revision></revhistory></para>
|
Conversion to Docbook XML</revremark></revision></revhistory></para>
|
||||||
|
@ -15,7 +15,7 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2004-01-08</pubdate>
|
<pubdate>2004-01-20</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2001-2004</year>
|
<year>2001-2004</year>
|
||||||
@ -66,8 +66,9 @@
|
|||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>One-to-one NAT for EastepLaptop (My work system). Internal
|
<para>One-to-one NAT for EastepLaptop (My work system -- Windows XP
|
||||||
address 192.168.1.7 and external address 206.124.146.180.</para>
|
SP2). Internal address 192.168.1.7 and external address
|
||||||
|
206.124.146.180.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
@ -86,7 +87,7 @@
|
|||||||
</listitem>
|
</listitem>
|
||||||
</itemizedlist>
|
</itemizedlist>
|
||||||
|
|
||||||
<para>The firewall runs on a 256MB PII/233 with RH9.0.</para>
|
<para>The firewall runs on a 256MB PII/233 with Debian Sarge (Testing).</para>
|
||||||
|
|
||||||
<para>Wookie, Ursa and the Firewall all run Samba and the Firewall acts as
|
<para>Wookie, Ursa and the Firewall all run Samba and the Firewall acts as
|
||||||
a WINS server.</para>
|
a WINS server.</para>
|
||||||
@ -100,19 +101,20 @@
|
|||||||
|
|
||||||
<para>The single system in the DMZ (address 206.124.146.177) runs postfix,
|
<para>The single system in the DMZ (address 206.124.146.177) runs postfix,
|
||||||
Courier IMAP (imaps and pop3), DNS, a Web server (Apache) and an FTP
|
Courier IMAP (imaps and pop3), DNS, a Web server (Apache) and an FTP
|
||||||
server (Pure-ftpd). The system also runs fetchmail to fetch our email from
|
server (Pure-ftpd) under RedHat 9.0. The system also runs fetchmail to
|
||||||
our old and current ISPs. That server is managed through Proxy ARP.</para>
|
fetch our email from our old and current ISPs. That server is managed
|
||||||
|
through Proxy ARP.</para>
|
||||||
|
|
||||||
<para>The firewall system itself runs a DHCP server that serves the local
|
<para>The firewall system itself runs a DHCP server that serves the local
|
||||||
network.</para>
|
network.</para>
|
||||||
|
|
||||||
<para>All administration and publishing is done using ssh/scp. I have X
|
<para>All administration and publishing is done using ssh/scp. I have a
|
||||||
installed on the firewall but no X server or desktop is installed. X
|
desktop environment installed on the firewall but I am not usually logged
|
||||||
applications tunnel through SSH to XWin.exe running on Ursa. The server
|
in to it. X applications tunnel through SSH to Ursa. The server also has a
|
||||||
does have a desktop environment installed and that desktop environment is
|
desktop environment installed and that desktop environment is available
|
||||||
available via XDMCP from the local zone. For the most part though, X
|
via XDMCP from the local zone. For the most part though, X tunneled
|
||||||
tunneled through SSH is used for server administration and the server runs
|
through SSH is used for server administration and the server runs at run
|
||||||
at run level 3 (multi-user console mode on RedHat).</para>
|
level 3 (multi-user console mode on RedHat).</para>
|
||||||
|
|
||||||
<para>I run an SNMP server on my firewall to serve <ulink
|
<para>I run an SNMP server on my firewall to serve <ulink
|
||||||
url="http://www.ee.ethz.ch/~oetiker/webtools/mrtg/">MRTG</ulink> running
|
url="http://www.ee.ethz.ch/~oetiker/webtools/mrtg/">MRTG</ulink> running
|
||||||
@ -120,9 +122,9 @@
|
|||||||
ethernet interface in the Server is configured with IP address
|
ethernet interface in the Server is configured with IP address
|
||||||
206.124.146.177, netmask 255.255.255.0. The server's default gateway
|
206.124.146.177, netmask 255.255.255.0. The server's default gateway
|
||||||
is 206.124.146.254 (Router at my ISP. This is the same default gateway
|
is 206.124.146.254 (Router at my ISP. This is the same default gateway
|
||||||
used by the firewall itself). On the firewall, my /sbin/ifup-local script
|
used by the firewall itself). On the firewall, an entry in my
|
||||||
(see below) adds a host route to 206.124.146.177 through eth1 when that
|
/etc/network/interfaces file (see below) adds a host route to
|
||||||
interface is brought up.</para>
|
206.124.146.177 through eth1 when that interface is brought up.</para>
|
||||||
|
|
||||||
<para>Ursa (192.168.1.5 A.K.A. 206.124.146.178) runs a PPTP server for
|
<para>Ursa (192.168.1.5 A.K.A. 206.124.146.178) runs a PPTP server for
|
||||||
Road Warrior access.</para>
|
Road Warrior access.</para>
|
||||||
@ -541,90 +543,24 @@ ACCEPT all all icmp
|
|||||||
</section>
|
</section>
|
||||||
|
|
||||||
<section>
|
<section>
|
||||||
<title>Init File</title>
|
<title>/etc/network/interfaces</title>
|
||||||
|
|
||||||
<blockquote>
|
<blockquote>
|
||||||
<para>This file deals with redirecting html requests to <ulink
|
<para>This file is Debian specific. My additional entry (which is
|
||||||
url="Shorewall_Squid_Usage.html#DMZ">Squid on the DMZ server</ulink>.</para>
|
displayed in <emphasis role="bold">bold type</emphasis>) adds a route
|
||||||
</blockquote>
|
to my DMZ server when eth1 is brought up. It allows me to enter
|
||||||
|
<quote>Yes</quote> in the HAVEROUTE column of <link linkend="ProxyARP">my
|
||||||
|
Proxy ARP file</link>.</para>
|
||||||
|
|
||||||
<blockquote>
|
<programlisting>...
|
||||||
<programlisting>#
|
auto eth1
|
||||||
# Add a second routing table with my server as the default gateway
|
iface eth1 inet static
|
||||||
# Use this routing table with all packets marked with value 1
|
address 192.168.2.1
|
||||||
#
|
netmask 255.255.255.0
|
||||||
if [ -z "`ip route list table 202 2> /dev/null`" ] ; then
|
network 192.168.2.0
|
||||||
run_ip rule add fwmark 1 table www.out
|
broadcast 192.168.2.255
|
||||||
run_ip route add default via 206.124.146.177 dev eth1 table www.out
|
<emphasis role="bold">up ip route add 206.124.146.177 dev eth1
|
||||||
run_ip route flush cache
|
</emphasis>...</programlisting>
|
||||||
fi</programlisting>
|
|
||||||
</blockquote>
|
|
||||||
</section>
|
|
||||||
|
|
||||||
<section>
|
|
||||||
<title>/etc/iproute2/rt_tables</title>
|
|
||||||
|
|
||||||
<blockquote>
|
|
||||||
<para>This file deals with redirecting html requests to <ulink
|
|
||||||
url="Shorewall_Squid_Usage.html#DMZ">Squid on the DMZ server</ulink>.</para>
|
|
||||||
</blockquote>
|
|
||||||
|
|
||||||
<blockquote>
|
|
||||||
<programlisting>#
|
|
||||||
# reserved values
|
|
||||||
#
|
|
||||||
#255 local
|
|
||||||
#254 main
|
|
||||||
#253 default
|
|
||||||
#0 unspec
|
|
||||||
|
|
||||||
#
|
|
||||||
# local -- I added the entry below
|
|
||||||
#
|
|
||||||
202 www.out</programlisting>
|
|
||||||
</blockquote>
|
|
||||||
</section>
|
|
||||||
|
|
||||||
<section>
|
|
||||||
<title>Tcrules File</title>
|
|
||||||
|
|
||||||
<blockquote>
|
|
||||||
<para>This file deals with redirecting html requests to <ulink
|
|
||||||
url="Shorewall_Squid_Usage.html#DMZ">Squid on the DMZ server</ulink>
|
|
||||||
-- in my setup, it is <emphasis role="bold">not</emphasis> used for
|
|
||||||
traffic shapping/control.</para>
|
|
||||||
</blockquote>
|
|
||||||
|
|
||||||
<blockquote>
|
|
||||||
<programlisting>#MARK SOURCE DEST PROTO PORT(S) CLIENT PORT(S)
|
|
||||||
1:P eth2,eth3 !192.168.0.0/16 tcp 80</programlisting>
|
|
||||||
</blockquote>
|
|
||||||
</section>
|
|
||||||
|
|
||||||
<section>
|
|
||||||
<title>Tcstart File</title>
|
|
||||||
|
|
||||||
<blockquote>
|
|
||||||
<para>My tcstart file is just the HTB version of <ulink
|
|
||||||
url="http://lartc.org/wondershaper/">The WonderShaper</ulink>.</para>
|
|
||||||
</blockquote>
|
|
||||||
</section>
|
|
||||||
|
|
||||||
<section>
|
|
||||||
<title>/sbin/ifup-local</title>
|
|
||||||
|
|
||||||
<blockquote>
|
|
||||||
<para>This file is Redhat specific and adds a route to my DMZ server
|
|
||||||
when eth1 is brought up. It allows me to enter <quote>Yes</quote> in
|
|
||||||
the HAVEROUTE column of <link linkend="ProxyARP">my Proxy ARP file</link>.</para>
|
|
||||||
|
|
||||||
<programlisting>#!/bin/sh
|
|
||||||
|
|
||||||
case $1 in
|
|
||||||
eth1)
|
|
||||||
ip route add 206.124.146.177 dev eth1
|
|
||||||
;;
|
|
||||||
esac</programlisting>
|
|
||||||
</blockquote>
|
</blockquote>
|
||||||
</section>
|
</section>
|
||||||
</section>
|
</section>
|
||||||
|
@ -15,10 +15,10 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2003-10-21</pubdate>
|
<pubdate>2004-01-21</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2001-2003</year>
|
<year>2001-2004</year>
|
||||||
|
|
||||||
<holder>Thomas M. Eastep</holder>
|
<holder>Thomas M. Eastep</holder>
|
||||||
</copyright>
|
</copyright>
|
||||||
@ -223,6 +223,21 @@
|
|||||||
omitted, any source port is acceptable. Specified as a comma-separate
|
omitted, any source port is acceptable. Specified as a comma-separate
|
||||||
list of port names, port numbers or port ranges.</para>
|
list of port names, port numbers or port ranges.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
|
<listitem>
|
||||||
|
<para>USER (Added in Shorewall version 1.4.10) - (Optional) This
|
||||||
|
column may only be non-empty if the SOURCE is the firewall itself.
|
||||||
|
When this column is non-empty, the rule applies only if the program
|
||||||
|
generating the output is running under the effective user and/or
|
||||||
|
group. It may contain : </para>
|
||||||
|
|
||||||
|
<para>[<user name or number>]:[<group name or number>]
|
||||||
|
</para>
|
||||||
|
|
||||||
|
<para>The colon is optionnal when specifying only a user. </para>
|
||||||
|
|
||||||
|
<para>Examples : john: / john / :users / john:users</para>
|
||||||
|
</listitem>
|
||||||
</itemizedlist>
|
</itemizedlist>
|
||||||
|
|
||||||
<example>
|
<example>
|
||||||
@ -233,7 +248,7 @@
|
|||||||
originating on the firewall itself should be marked with 3.</para>
|
originating on the firewall itself should be marked with 3.</para>
|
||||||
|
|
||||||
<informaltable>
|
<informaltable>
|
||||||
<tgroup cols="6">
|
<tgroup cols="4">
|
||||||
<thead>
|
<thead>
|
||||||
<row>
|
<row>
|
||||||
<entry align="center">MARK</entry>
|
<entry align="center">MARK</entry>
|
||||||
@ -243,10 +258,6 @@
|
|||||||
<entry align="center">DESTINATION</entry>
|
<entry align="center">DESTINATION</entry>
|
||||||
|
|
||||||
<entry align="center">PROTOCOL</entry>
|
<entry align="center">PROTOCOL</entry>
|
||||||
|
|
||||||
<entry align="center">PORT(S)</entry>
|
|
||||||
|
|
||||||
<entry align="center">CLIENT PORT(S)</entry>
|
|
||||||
</row>
|
</row>
|
||||||
</thead>
|
</thead>
|
||||||
|
|
||||||
@ -259,10 +270,6 @@
|
|||||||
<entry>0.0.0.0/0</entry>
|
<entry>0.0.0.0/0</entry>
|
||||||
|
|
||||||
<entry>all</entry>
|
<entry>all</entry>
|
||||||
|
|
||||||
<entry></entry>
|
|
||||||
|
|
||||||
<entry></entry>
|
|
||||||
</row>
|
</row>
|
||||||
|
|
||||||
<row>
|
<row>
|
||||||
@ -273,10 +280,6 @@
|
|||||||
<entry>0.0.0.0/0</entry>
|
<entry>0.0.0.0/0</entry>
|
||||||
|
|
||||||
<entry>all</entry>
|
<entry>all</entry>
|
||||||
|
|
||||||
<entry></entry>
|
|
||||||
|
|
||||||
<entry></entry>
|
|
||||||
</row>
|
</row>
|
||||||
|
|
||||||
<row>
|
<row>
|
||||||
@ -287,10 +290,6 @@
|
|||||||
<entry>0.0.0.0/0</entry>
|
<entry>0.0.0.0/0</entry>
|
||||||
|
|
||||||
<entry>all</entry>
|
<entry>all</entry>
|
||||||
|
|
||||||
<entry></entry>
|
|
||||||
|
|
||||||
<entry></entry>
|
|
||||||
</row>
|
</row>
|
||||||
|
|
||||||
<row>
|
<row>
|
||||||
@ -301,10 +300,6 @@
|
|||||||
<entry>0.0.0.0/0</entry>
|
<entry>0.0.0.0/0</entry>
|
||||||
|
|
||||||
<entry>all</entry>
|
<entry>all</entry>
|
||||||
|
|
||||||
<entry></entry>
|
|
||||||
|
|
||||||
<entry></entry>
|
|
||||||
</row>
|
</row>
|
||||||
</tbody>
|
</tbody>
|
||||||
</tgroup>
|
</tgroup>
|
||||||
@ -318,7 +313,7 @@
|
|||||||
destined for 155.186.235.151 should be marked with 12.</para>
|
destined for 155.186.235.151 should be marked with 12.</para>
|
||||||
|
|
||||||
<informaltable>
|
<informaltable>
|
||||||
<tgroup cols="6">
|
<tgroup cols="4">
|
||||||
<thead>
|
<thead>
|
||||||
<row>
|
<row>
|
||||||
<entry align="center">MARK</entry>
|
<entry align="center">MARK</entry>
|
||||||
@ -328,10 +323,6 @@
|
|||||||
<entry align="center">DESTINATION</entry>
|
<entry align="center">DESTINATION</entry>
|
||||||
|
|
||||||
<entry align="center">PROTOCOL</entry>
|
<entry align="center">PROTOCOL</entry>
|
||||||
|
|
||||||
<entry align="center">PORT(S)</entry>
|
|
||||||
|
|
||||||
<entry align="center">CLIENT PORT(S)</entry>
|
|
||||||
</row>
|
</row>
|
||||||
</thead>
|
</thead>
|
||||||
|
|
||||||
@ -344,10 +335,6 @@
|
|||||||
<entry>155.186.235.151</entry>
|
<entry>155.186.235.151</entry>
|
||||||
|
|
||||||
<entry>47</entry>
|
<entry>47</entry>
|
||||||
|
|
||||||
<entry></entry>
|
|
||||||
|
|
||||||
<entry></entry>
|
|
||||||
</row>
|
</row>
|
||||||
</tbody>
|
</tbody>
|
||||||
</tgroup>
|
</tgroup>
|
||||||
@ -361,7 +348,7 @@
|
|||||||
155.186.235.151 should be marked with 22.</para>
|
155.186.235.151 should be marked with 22.</para>
|
||||||
|
|
||||||
<informaltable>
|
<informaltable>
|
||||||
<tgroup cols="6">
|
<tgroup cols="5">
|
||||||
<thead>
|
<thead>
|
||||||
<row>
|
<row>
|
||||||
<entry align="center">MARK</entry>
|
<entry align="center">MARK</entry>
|
||||||
@ -373,8 +360,6 @@
|
|||||||
<entry align="center">PROTOCOL</entry>
|
<entry align="center">PROTOCOL</entry>
|
||||||
|
|
||||||
<entry align="center">PORT(S)</entry>
|
<entry align="center">PORT(S)</entry>
|
||||||
|
|
||||||
<entry align="center">CLIENT PORT(S)</entry>
|
|
||||||
</row>
|
</row>
|
||||||
</thead>
|
</thead>
|
||||||
|
|
||||||
@ -389,8 +374,6 @@
|
|||||||
<entry>tcp</entry>
|
<entry>tcp</entry>
|
||||||
|
|
||||||
<entry>22</entry>
|
<entry>22</entry>
|
||||||
|
|
||||||
<entry></entry>
|
|
||||||
</row>
|
</row>
|
||||||
</tbody>
|
</tbody>
|
||||||
</tgroup>
|
</tgroup>
|
||||||
@ -405,10 +388,7 @@
|
|||||||
url="http://lartc.org/wondershaper/">The Wonder Shaper </ulink>(I just
|
url="http://lartc.org/wondershaper/">The Wonder Shaper </ulink>(I just
|
||||||
copied wshaper.htb to /etc/shorewall/tcstart and modified it as shown in
|
copied wshaper.htb to /etc/shorewall/tcstart and modified it as shown in
|
||||||
the Wondershaper README). WonderShaper DOES NOT USE THE
|
the Wondershaper README). WonderShaper DOES NOT USE THE
|
||||||
/etc/shorewall/tcrules file. While I currently have entries in
|
/etc/shorewall/tcrules file.</para>
|
||||||
/etc/shorewall/tcrules, I do so for <ulink
|
|
||||||
url="Shorewall_Squid_Usage.html">policy routing for Squid</ulink> and not
|
|
||||||
for Traffic Shaping.</para>
|
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
<section>
|
<section>
|
||||||
|
Loading…
Reference in New Issue
Block a user