fixed quotes

git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@945 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
mhnoyes 2003-12-24 22:28:25 +00:00
parent 78078fe878
commit c2196d749c

View File

@ -32,8 +32,8 @@
document under the terms of the GNU Free Documentation License, Version document under the terms of the GNU Free Documentation License, Version
1.2 or any later version published by the Free Software Foundation; with 1.2 or any later version published by the Free Software Foundation; with
no Invariant Sections, with no Front-Cover, and with no Back-Cover no Invariant Sections, with no Front-Cover, and with no Back-Cover
Texts. A copy of the license is included in the section entitled &#34;<ulink Texts. A copy of the license is included in the section entitled
url="GnuCopyright.htm">GNU Free Documentation License</ulink>&#34;.</para> <quote><ulink url="GnuCopyright.htm">GNU Free Documentation License</ulink></quote>.</para>
</legalnotice> </legalnotice>
</articleinfo> </articleinfo>
@ -227,8 +227,8 @@
<itemizedlist> <itemizedlist>
<listitem> <listitem>
<para>As root, type &#34;iptables -t nat -Z&#34;. This clears the <para>As root, type <quote>iptables -t nat -Z</quote>. This clears
NetFilter counters in the nat table.</para> the NetFilter counters in the nat table.</para>
</listitem> </listitem>
<listitem> <listitem>
@ -236,7 +236,7 @@
</listitem> </listitem>
<listitem> <listitem>
<para>As root type &#34;shorewall show nat&#34;</para> <para>As root type <quote>shorewall show nat</quote></para>
</listitem> </listitem>
<listitem> <listitem>
@ -268,7 +268,7 @@
<para>you are trying to connect to a secondary IP address on <para>you are trying to connect to a secondary IP address on
your firewall and your rule is only redirecting the primary IP your firewall and your rule is only redirecting the primary IP
address (You need to specify the secondary IP address in the address (You need to specify the secondary IP address in the
&#34;ORIG. DEST.&#34; column in your DNAT rule); or</para> <quote>ORIG. DEST.</quote> column in your DNAT rule); or</para>
</listitem> </listitem>
<listitem> <listitem>
@ -373,7 +373,7 @@
<listitem> <listitem>
<para>The accessibility problem is best solved using <ulink <para>The accessibility problem is best solved using <ulink
url="shorewall_setup_guide.htm#DNS">Bind Version 9 &#34;views&#34;</ulink> url="shorewall_setup_guide.htm#DNS">Bind Version 9 <quote>views</quote></ulink>
(or using a separate DNS server for local clients) such that (or using a separate DNS server for local clients) such that
www.mydomain.com resolves to 130.141.100.69 externally and www.mydomain.com resolves to 130.141.100.69 externally and
192.168.1.5 internally. That&#39;s what I do here at shorewall.net 192.168.1.5 internally. That&#39;s what I do here at shorewall.net
@ -526,15 +526,15 @@
</itemizedlist> </itemizedlist>
<section id="faq2a"> <section id="faq2a">
<title>(FAQ 2a) I have a zone &#34;Z&#34; with an RFC1918 subnet and I <title>(FAQ 2a) I have a zone <quote>Z</quote> with an RFC1918 subnet
use one-to-one NAT to assign non-RFC1918 addresses to hosts in Z. and I use one-to-one NAT to assign non-RFC1918 addresses to hosts in
Hosts in Z cannot communicate with each other using their external Z. Hosts in Z cannot communicate with each other using their external
(non-RFC1918 addresses) so they can&#39;t access each other using (non-RFC1918 addresses) so they can&#39;t access each other using
their DNS names.</title> their DNS names.</title>
<note> <note>
<para>If the ALL INTERFACES column in /etc/shorewall/nat is empty or <para>If the ALL INTERFACES column in /etc/shorewall/nat is empty or
contains &#34;Yes&#34;, you will also see log messages like the contains <quote>Yes</quote>, you will also see log messages like the
following when trying to access a host in Z from another host in Z following when trying to access a host in Z from another host in Z
using the destination hosts&#39;s public address:</para> using the destination hosts&#39;s public address:</para>
@ -545,9 +545,9 @@
</note> </note>
<para><emphasis role="bold">Answer:</emphasis> This is another problem <para><emphasis role="bold">Answer:</emphasis> This is another problem
that is best solved using Bind Version 9 &#34;views&#34;. It allows that is best solved using Bind Version 9 <quote>views</quote>. It
both external and internal clients to access a NATed host using the allows both external and internal clients to access a NATed host using
host&#39;s DNS name.</para> the host&#39;s DNS name.</para>
<para>Another good way to approach this problem is to switch from <para>Another good way to approach this problem is to switch from
one-to-one NAT to Proxy ARP. That way, the hosts in Z have non-RFC1918 one-to-one NAT to Proxy ARP. That way, the hosts in Z have non-RFC1918
@ -572,7 +572,7 @@
<listitem> <listitem>
<para>Set the ALL INTERFACES column in the nat file to <para>Set the ALL INTERFACES column in the nat file to
&#34;Yes&#34;.</para> <quote>Yes</quote>.</para>
<warning> <warning>
<para>In this configuration, all Z-&#62;Z traffic will look to <para>In this configuration, all Z-&#62;Z traffic will look to
@ -673,8 +673,8 @@
</tgroup> </tgroup>
</informaltable> </informaltable>
<para>In /etc/shorewall/nat, be sure that you have &#34;Yes&#34; in <para>In /etc/shorewall/nat, be sure that you have <quote>Yes</quote>
the ALL INTERFACES column.</para> in the ALL INTERFACES column.</para>
</example> </example>
</section> </section>
</section> </section>
@ -765,7 +765,7 @@
through the firewall</title> through the firewall</title>
<para><emphasis role="bold">Answer:</emphasis> If you want your firewall <para><emphasis role="bold">Answer:</emphasis> If you want your firewall
to be totally open for &#34;ping&#34;,</para> to be totally open for <quote>ping</quote>,</para>
<orderedlist> <orderedlist>
<listitem> <listitem>
@ -773,8 +773,8 @@
</listitem> </listitem>
<listitem> <listitem>
<para>Be sure that the first command in the file is &#34;. <para>Be sure that the first command in the file is <quote>.
/etc/shorewall/common.def&#34;</para> /etc/shorewall/common.def</quote></para>
</listitem> </listitem>
<listitem> <listitem>
@ -792,10 +792,10 @@
<title>(FAQ 15) My local systems can&#39;t see out to the net</title> <title>(FAQ 15) My local systems can&#39;t see out to the net</title>
<para><emphasis role="bold">Answer:</emphasis> Every time I read <para><emphasis role="bold">Answer:</emphasis> Every time I read
&#34;systems can&#39;t see out to the net&#34;, I wonder where the <quote>systems can&#39;t see out to the net</quote>, I wonder where the
poster bought computers with eyes and what those computers will poster bought computers with eyes and what those computers will
&#34;see&#34; when things are working properly. That aside, the most <quote>see</quote> when things are working properly. That aside, the
common causes of this problem are:</para> most common causes of this problem are:</para>
<orderedlist> <orderedlist>
<listitem> <listitem>
@ -831,15 +831,16 @@
the destination?</title> the destination?</title>
<para><emphasis role="bold">Answer:</emphasis> NetFilter uses the <para><emphasis role="bold">Answer:</emphasis> NetFilter uses the
kernel&#39;s equivalent of syslog (see &#34;man syslog&#34;) to log kernel&#39;s equivalent of syslog (see <quote>man syslog</quote>) to log
messages. It always uses the LOG_KERN (kern) facility (see &#34;man messages. It always uses the LOG_KERN (kern) facility (see
openlog&#34;) and you get to choose the log level (again, see &#34;man <quote>man openlog</quote>) and you get to choose the log level (again,
syslog&#34;) in your <ulink url="Documentation.htm#Policy">policies</ulink> see <quote>man syslog</quote>) in your <ulink
and <ulink url="Documentation.htm#Rules">rules</ulink>. The destination url="Documentation.htm#Policy">policies</ulink> and <ulink
for messaged logged by syslog is controlled by /etc/syslog.conf (see url="Documentation.htm#Rules">rules</ulink>. The destination for
&#34;man syslog.conf&#34;). When you have changed /etc/syslog.conf, be messaged logged by syslog is controlled by /etc/syslog.conf (see
sure to restart syslogd (on a RedHat system, &#34;service syslog <quote>man syslog.conf</quote>). When you have changed /etc/syslog.conf,
restart&#34;).</para> be sure to restart syslogd (on a RedHat system, <quote>service syslog
restart</quote>).</para>
<para>By default, older versions of Shorewall ratelimited log messages <para>By default, older versions of Shorewall ratelimited log messages
through <ulink url="Documentation.htm#Conf">settings</ulink> in through <ulink url="Documentation.htm#Conf">settings</ulink> in
@ -961,10 +962,10 @@ run_iptables -A common -p udp --sport 53 -mstate --state NEW -j DROP</programlis
<para><emphasis role="bold">Answer:</emphasis> If you are running <para><emphasis role="bold">Answer:</emphasis> If you are running
Shorewall version 1.4.4 or 1.4.4a then check the <ulink url="errata.htm">errata</ulink>. Shorewall version 1.4.4 or 1.4.4a then check the <ulink url="errata.htm">errata</ulink>.
Otherwise, see the &#39;dmesg&#39; man page (&#34;man dmesg&#34;). You Otherwise, see the &#39;dmesg&#39; man page (<quote>man dmesg</quote>).
must add a suitable &#39;dmesg&#39; command to your startup scripts or You must add a suitable &#39;dmesg&#39; command to your startup scripts
place it in /etc/shorewall/start. Under RedHat, the max log level that or place it in /etc/shorewall/start. Under RedHat, the max log level
is sent to the console is specified in /etc/sysconfig/init in the that is sent to the console is specified in /etc/sysconfig/init in the
LOGLEVEL variable.</para> LOGLEVEL variable.</para>
</section> </section>
@ -1075,7 +1076,7 @@ run_iptables -A common -p udp --sport 53 -mstate --state NEW -j DROP</programlis
<listitem> <listitem>
<para>The packet has a source IP address that isn&#39;t in any of <para>The packet has a source IP address that isn&#39;t in any of
your defined zones (&#34;shorewall check&#34; and look at the your defined zones (<quote>shorewall check</quote> and look at the
printed zone definitions) or the chain is FORWARD and the printed zone definitions) or the chain is FORWARD and the
destination IP isn&#39;t in any of your defined zones. Also see destination IP isn&#39;t in any of your defined zones. Also see
<xref linkend="faq2a" /> for another cause of packets being logged <xref linkend="faq2a" /> for another cause of packets being logged
@ -1110,9 +1111,8 @@ run_iptables -A common -p udp --sport 53 -mstate --state NEW -j DROP</programlis
<listitem> <listitem>
<para>This packet was REJECTed out of the <emphasis role="bold">all2all</emphasis> <para>This packet was REJECTed out of the <emphasis role="bold">all2all</emphasis>
chain -- the packet was rejected under the chain -- the packet was rejected under the <quote>all</quote>-&#62;<quote>all</quote>
&#34;all&#34;-&#62;&#34;all&#34; REJECT policy (<xref REJECT policy (<xref linkend="all2all" /> above).</para>
linkend="all2all" /> above).</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -1121,8 +1121,8 @@ run_iptables -A common -p udp --sport 53 -mstate --state NEW -j DROP</programlis
<listitem> <listitem>
<para>the packet entered the firewall via eth2. If you see <para>the packet entered the firewall via eth2. If you see
&#34;IN=&#34; with no interface name, the packet originated on <quote>IN=</quote> with no interface name, the packet originated
the firewall itself.</para> on the firewall itself.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -1131,7 +1131,7 @@ run_iptables -A common -p udp --sport 53 -mstate --state NEW -j DROP</programlis
<listitem> <listitem>
<para>if accepted, the packet would be sent on eth1. If you see <para>if accepted, the packet would be sent on eth1. If you see
&#34;OUT=&#34; with no interface name, the packet would be <quote>OUT=</quote> with no interface name, the packet would be
processed by the firewall itself.</para> processed by the firewall itself.</para>
</listitem> </listitem>
</varlistentry> </varlistentry>
@ -1172,8 +1172,8 @@ run_iptables -A common -p udp --sport 53 -mstate --state NEW -j DROP</programlis
<para>For additional information about the log message, see <ulink <para>For additional information about the log message, see <ulink
url="http://logi.cc/linux/netfilter-log-format.php3">http://logi.cc/linux/netfilter-log-format.php3</ulink>.</para> url="http://logi.cc/linux/netfilter-log-format.php3">http://logi.cc/linux/netfilter-log-format.php3</ulink>.</para>
<para>In this case, 192.168.2.2 was in the &#34;dmz&#34; zone and <para>In this case, 192.168.2.2 was in the <quote>dmz</quote> zone and
192.168.1.3 is in the &#34;loc&#34; zone. I was missing the rule:</para> 192.168.1.3 is in the <quote>loc</quote> zone. I was missing the rule:</para>
<programlisting>ACCEPT dmz loc udp 53</programlisting> <programlisting>ACCEPT dmz loc udp 53</programlisting>
</example> </example>
@ -1486,8 +1486,7 @@ Hint: insmod errors can be caused by incorrect module parameters, including inva
/lib/modules/2.4.17/kernel/net/ipv4/netfilter/ip_tables.o failed /lib/modules/2.4.17/kernel/net/ipv4/netfilter/ip_tables.o failed
/lib/modules/2.4.17/kernel/net/ipv4/netfilter/ip_tables.o: insmod ip_tables failed /lib/modules/2.4.17/kernel/net/ipv4/netfilter/ip_tables.o: insmod ip_tables failed
iptables v1.2.3: can&#39;t initialize iptables table `nat&#39;: iptables who? (do you need to insmod?) iptables v1.2.3: can&#39;t initialize iptables table `nat&#39;: iptables who? (do you need to insmod?)
Perhaps iptables or your kernel needs to be upgraded. Perhaps iptables or your kernel needs to be upgraded.</programlisting>
</programlisting>
<para>This problem is usually corrected through the following sequence <para>This problem is usually corrected through the following sequence
of commands</para> of commands</para>
@ -1552,8 +1551,8 @@ Creating input Chains...
instructional material use the -A command which adds the rules to the instructional material use the -A command which adds the rules to the
end of the chain. Most chains that Shorewall constructs end with an end of the chain. Most chains that Shorewall constructs end with an
unconditional DROP, ACCEPT or REJECT rule and any rules that you add unconditional DROP, ACCEPT or REJECT rule and any rules that you add
after that will be ignored. Check &#34;man iptables&#34; and look at the after that will be ignored. Check <quote>man iptables</quote> and look
-I (--insert) command.</para> at the -I (--insert) command.</para>
</section> </section>
</section> </section>
@ -1583,14 +1582,14 @@ Creating input Chains...
</section> </section>
<section id="faq13"> <section id="faq13">
<title>(FAQ 13) Why do you call it &#34;Shorewall&#34;?</title> <title>(FAQ 13) Why do you call it <quote>Shorewall</quote>?</title>
<para><emphasis role="bold">Answer:</emphasis> Shorewall is a <para><emphasis role="bold">Answer:</emphasis> Shorewall is a
concatenation of &#34;<emphasis>Shore</emphasis>line&#34; (<ulink concatenation of <quote><emphasis>Shore</emphasis>line</quote> (<ulink
url="http://www.cityofshoreline.com">the city where I live</ulink>) and url="http://www.cityofshoreline.com">the city where I live</ulink>) and
&#34;Fire<emphasis>wall</emphasis>&#34;. The full name of the product is <quote>Fire<emphasis>wall</emphasis></quote>. The full name of the
actually &#34;Shoreline Firewall&#34; but &#34;Shorewall&#34; is must product is actually <quote>Shoreline Firewall</quote> but
more commonly used.</para> <quote>Shorewall</quote> is must more commonly used.</para>
</section> </section>
<section id="faq23"> <section id="faq23">
@ -1798,8 +1797,8 @@ Creating input Chains...
<title>(FAQ 24) How can I allow conections to let&#39;s say the ssh port <title>(FAQ 24) How can I allow conections to let&#39;s say the ssh port
only from specific IP Addresses on the internet?</title> only from specific IP Addresses on the internet?</title>
<para>In the SOURCE column of the rule, follow &#34;net&#34; by a colon <para>In the SOURCE column of the rule, follow <quote>net</quote> by a
and a list of the host/subnet addresses as a comma-separated list.</para> colon and a list of the host/subnet addresses as a comma-separated list.</para>
<programlisting>net:&#60;ip1&#62;,&#60;ip2&#62;,...</programlisting> <programlisting>net:&#60;ip1&#62;,&#60;ip2&#62;,...</programlisting>
@ -1812,17 +1811,16 @@ Creating input Chains...
<section id="faq26"> <section id="faq26">
<title>(FAQ 26) When I try to use any of the SYN options in nmap on or <title>(FAQ 26) When I try to use any of the SYN options in nmap on or
behind the firewall, I get &#34;operation not permitted&#34;. How can I behind the firewall, I get <quote>operation not permitted</quote>. How
use nmap with Shorewall?&#34;</title> can I use nmap with Shorewall?&#34;</title>
<para>Edit /etc/shorewall/shorewall.conf and change <para>Edit /etc/shorewall/shorewall.conf and change <quote>NEWNOTSYN=No</quote>
&#34;NEWNOTSYN=No&#34; to &#34;NEWNOTSYN=Yes&#34; then restart to <quote>NEWNOTSYN=Yes</quote> then restart Shorewall.</para>
Shorewall.</para>
<section id="faq26a"> <section id="faq26a">
<title>(FAQ 26a) When I try to use the &#34;-O&#34; option of nmap <title>(FAQ 26a) When I try to use the <quote>-O</quote> option of
from the firewall system, I get &#34;operation not permitted&#34;. How nmap from the firewall system, I get <quote>operation not permitted</quote>.
to I allow this option?</title> How to I allow this option?</title>
<para>Add this command to your /etc/shorewall/start file:</para> <para>Add this command to your /etc/shorewall/start file:</para>
@ -1836,8 +1834,8 @@ Creating input Chains...
<para>First take a look at the <ulink url="kernel.htm">Shorewall kernel <para>First take a look at the <ulink url="kernel.htm">Shorewall kernel
configuration page</ulink>. You probably also want to be sure that you configuration page</ulink>. You probably also want to be sure that you
have selected the &#34;<emphasis role="bold">NAT of local connections have selected the <quote><emphasis role="bold">NAT of local connections
(READ HELP)</emphasis>&#34; on the Netfilter Configuration menu. (READ HELP)</emphasis></quote> on the Netfilter Configuration menu.
Otherwise, DNAT rules with your firewall as the source zone won&#39;t Otherwise, DNAT rules with your firewall as the source zone won&#39;t
work with your new kernel.</para> work with your new kernel.</para>
</section> </section>
@ -1849,8 +1847,8 @@ Creating input Chains...
allow you to route bridge traffic through Netfilter, the environment is allow you to route bridge traffic through Netfilter, the environment is
so different from the Layer 3 firewalling environment that very little so different from the Layer 3 firewalling environment that very little
of Shorewall works. In fact, so much of Shorewall doesn&#39;t work that of Shorewall works. In fact, so much of Shorewall doesn&#39;t work that
my official position is that &#34;Shorewall doesn&#39;t work with Layer my official position is that <quote>Shorewall doesn&#39;t work with
2 Bridging&#34;.</para> Layer 2 Bridging</quote>.</para>
</section> </section>
</section> </section>