forked from extern/shorewall_code
fixed quotes
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@945 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
parent
78078fe878
commit
c2196d749c
@ -32,8 +32,8 @@
|
|||||||
document under the terms of the GNU Free Documentation License, Version
|
document under the terms of the GNU Free Documentation License, Version
|
||||||
1.2 or any later version published by the Free Software Foundation; with
|
1.2 or any later version published by the Free Software Foundation; with
|
||||||
no Invariant Sections, with no Front-Cover, and with no Back-Cover
|
no Invariant Sections, with no Front-Cover, and with no Back-Cover
|
||||||
Texts. A copy of the license is included in the section entitled "<ulink
|
Texts. A copy of the license is included in the section entitled
|
||||||
url="GnuCopyright.htm">GNU Free Documentation License</ulink>".</para>
|
<quote><ulink url="GnuCopyright.htm">GNU Free Documentation License</ulink></quote>.</para>
|
||||||
</legalnotice>
|
</legalnotice>
|
||||||
</articleinfo>
|
</articleinfo>
|
||||||
|
|
||||||
@ -227,8 +227,8 @@
|
|||||||
|
|
||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>As root, type "iptables -t nat -Z". This clears the
|
<para>As root, type <quote>iptables -t nat -Z</quote>. This clears
|
||||||
NetFilter counters in the nat table.</para>
|
the NetFilter counters in the nat table.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
@ -236,7 +236,7 @@
|
|||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>As root type "shorewall show nat"</para>
|
<para>As root type <quote>shorewall show nat</quote></para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
@ -268,7 +268,7 @@
|
|||||||
<para>you are trying to connect to a secondary IP address on
|
<para>you are trying to connect to a secondary IP address on
|
||||||
your firewall and your rule is only redirecting the primary IP
|
your firewall and your rule is only redirecting the primary IP
|
||||||
address (You need to specify the secondary IP address in the
|
address (You need to specify the secondary IP address in the
|
||||||
"ORIG. DEST." column in your DNAT rule); or</para>
|
<quote>ORIG. DEST.</quote> column in your DNAT rule); or</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
@ -373,7 +373,7 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>The accessibility problem is best solved using <ulink
|
<para>The accessibility problem is best solved using <ulink
|
||||||
url="shorewall_setup_guide.htm#DNS">Bind Version 9 "views"</ulink>
|
url="shorewall_setup_guide.htm#DNS">Bind Version 9 <quote>views</quote></ulink>
|
||||||
(or using a separate DNS server for local clients) such that
|
(or using a separate DNS server for local clients) such that
|
||||||
www.mydomain.com resolves to 130.141.100.69 externally and
|
www.mydomain.com resolves to 130.141.100.69 externally and
|
||||||
192.168.1.5 internally. That's what I do here at shorewall.net
|
192.168.1.5 internally. That's what I do here at shorewall.net
|
||||||
@ -526,15 +526,15 @@
|
|||||||
</itemizedlist>
|
</itemizedlist>
|
||||||
|
|
||||||
<section id="faq2a">
|
<section id="faq2a">
|
||||||
<title>(FAQ 2a) I have a zone "Z" with an RFC1918 subnet and I
|
<title>(FAQ 2a) I have a zone <quote>Z</quote> with an RFC1918 subnet
|
||||||
use one-to-one NAT to assign non-RFC1918 addresses to hosts in Z.
|
and I use one-to-one NAT to assign non-RFC1918 addresses to hosts in
|
||||||
Hosts in Z cannot communicate with each other using their external
|
Z. Hosts in Z cannot communicate with each other using their external
|
||||||
(non-RFC1918 addresses) so they can't access each other using
|
(non-RFC1918 addresses) so they can't access each other using
|
||||||
their DNS names.</title>
|
their DNS names.</title>
|
||||||
|
|
||||||
<note>
|
<note>
|
||||||
<para>If the ALL INTERFACES column in /etc/shorewall/nat is empty or
|
<para>If the ALL INTERFACES column in /etc/shorewall/nat is empty or
|
||||||
contains "Yes", you will also see log messages like the
|
contains <quote>Yes</quote>, you will also see log messages like the
|
||||||
following when trying to access a host in Z from another host in Z
|
following when trying to access a host in Z from another host in Z
|
||||||
using the destination hosts's public address:</para>
|
using the destination hosts's public address:</para>
|
||||||
|
|
||||||
@ -545,9 +545,9 @@
|
|||||||
</note>
|
</note>
|
||||||
|
|
||||||
<para><emphasis role="bold">Answer:</emphasis> This is another problem
|
<para><emphasis role="bold">Answer:</emphasis> This is another problem
|
||||||
that is best solved using Bind Version 9 "views". It allows
|
that is best solved using Bind Version 9 <quote>views</quote>. It
|
||||||
both external and internal clients to access a NATed host using the
|
allows both external and internal clients to access a NATed host using
|
||||||
host's DNS name.</para>
|
the host's DNS name.</para>
|
||||||
|
|
||||||
<para>Another good way to approach this problem is to switch from
|
<para>Another good way to approach this problem is to switch from
|
||||||
one-to-one NAT to Proxy ARP. That way, the hosts in Z have non-RFC1918
|
one-to-one NAT to Proxy ARP. That way, the hosts in Z have non-RFC1918
|
||||||
@ -572,7 +572,7 @@
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Set the ALL INTERFACES column in the nat file to
|
<para>Set the ALL INTERFACES column in the nat file to
|
||||||
"Yes".</para>
|
<quote>Yes</quote>.</para>
|
||||||
|
|
||||||
<warning>
|
<warning>
|
||||||
<para>In this configuration, all Z->Z traffic will look to
|
<para>In this configuration, all Z->Z traffic will look to
|
||||||
@ -673,8 +673,8 @@
|
|||||||
</tgroup>
|
</tgroup>
|
||||||
</informaltable>
|
</informaltable>
|
||||||
|
|
||||||
<para>In /etc/shorewall/nat, be sure that you have "Yes" in
|
<para>In /etc/shorewall/nat, be sure that you have <quote>Yes</quote>
|
||||||
the ALL INTERFACES column.</para>
|
in the ALL INTERFACES column.</para>
|
||||||
</example>
|
</example>
|
||||||
</section>
|
</section>
|
||||||
</section>
|
</section>
|
||||||
@ -765,7 +765,7 @@
|
|||||||
through the firewall</title>
|
through the firewall</title>
|
||||||
|
|
||||||
<para><emphasis role="bold">Answer:</emphasis> If you want your firewall
|
<para><emphasis role="bold">Answer:</emphasis> If you want your firewall
|
||||||
to be totally open for "ping",</para>
|
to be totally open for <quote>ping</quote>,</para>
|
||||||
|
|
||||||
<orderedlist>
|
<orderedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
@ -773,8 +773,8 @@
|
|||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Be sure that the first command in the file is ".
|
<para>Be sure that the first command in the file is <quote>.
|
||||||
/etc/shorewall/common.def"</para>
|
/etc/shorewall/common.def</quote></para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
@ -792,10 +792,10 @@
|
|||||||
<title>(FAQ 15) My local systems can't see out to the net</title>
|
<title>(FAQ 15) My local systems can't see out to the net</title>
|
||||||
|
|
||||||
<para><emphasis role="bold">Answer:</emphasis> Every time I read
|
<para><emphasis role="bold">Answer:</emphasis> Every time I read
|
||||||
"systems can't see out to the net", I wonder where the
|
<quote>systems can't see out to the net</quote>, I wonder where the
|
||||||
poster bought computers with eyes and what those computers will
|
poster bought computers with eyes and what those computers will
|
||||||
"see" when things are working properly. That aside, the most
|
<quote>see</quote> when things are working properly. That aside, the
|
||||||
common causes of this problem are:</para>
|
most common causes of this problem are:</para>
|
||||||
|
|
||||||
<orderedlist>
|
<orderedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
@ -831,15 +831,16 @@
|
|||||||
the destination?</title>
|
the destination?</title>
|
||||||
|
|
||||||
<para><emphasis role="bold">Answer:</emphasis> NetFilter uses the
|
<para><emphasis role="bold">Answer:</emphasis> NetFilter uses the
|
||||||
kernel's equivalent of syslog (see "man syslog") to log
|
kernel's equivalent of syslog (see <quote>man syslog</quote>) to log
|
||||||
messages. It always uses the LOG_KERN (kern) facility (see "man
|
messages. It always uses the LOG_KERN (kern) facility (see
|
||||||
openlog") and you get to choose the log level (again, see "man
|
<quote>man openlog</quote>) and you get to choose the log level (again,
|
||||||
syslog") in your <ulink url="Documentation.htm#Policy">policies</ulink>
|
see <quote>man syslog</quote>) in your <ulink
|
||||||
and <ulink url="Documentation.htm#Rules">rules</ulink>. The destination
|
url="Documentation.htm#Policy">policies</ulink> and <ulink
|
||||||
for messaged logged by syslog is controlled by /etc/syslog.conf (see
|
url="Documentation.htm#Rules">rules</ulink>. The destination for
|
||||||
"man syslog.conf"). When you have changed /etc/syslog.conf, be
|
messaged logged by syslog is controlled by /etc/syslog.conf (see
|
||||||
sure to restart syslogd (on a RedHat system, "service syslog
|
<quote>man syslog.conf</quote>). When you have changed /etc/syslog.conf,
|
||||||
restart").</para>
|
be sure to restart syslogd (on a RedHat system, <quote>service syslog
|
||||||
|
restart</quote>).</para>
|
||||||
|
|
||||||
<para>By default, older versions of Shorewall ratelimited log messages
|
<para>By default, older versions of Shorewall ratelimited log messages
|
||||||
through <ulink url="Documentation.htm#Conf">settings</ulink> in
|
through <ulink url="Documentation.htm#Conf">settings</ulink> in
|
||||||
@ -961,10 +962,10 @@ run_iptables -A common -p udp --sport 53 -mstate --state NEW -j DROP</programlis
|
|||||||
|
|
||||||
<para><emphasis role="bold">Answer:</emphasis> If you are running
|
<para><emphasis role="bold">Answer:</emphasis> If you are running
|
||||||
Shorewall version 1.4.4 or 1.4.4a then check the <ulink url="errata.htm">errata</ulink>.
|
Shorewall version 1.4.4 or 1.4.4a then check the <ulink url="errata.htm">errata</ulink>.
|
||||||
Otherwise, see the 'dmesg' man page ("man dmesg"). You
|
Otherwise, see the 'dmesg' man page (<quote>man dmesg</quote>).
|
||||||
must add a suitable 'dmesg' command to your startup scripts or
|
You must add a suitable 'dmesg' command to your startup scripts
|
||||||
place it in /etc/shorewall/start. Under RedHat, the max log level that
|
or place it in /etc/shorewall/start. Under RedHat, the max log level
|
||||||
is sent to the console is specified in /etc/sysconfig/init in the
|
that is sent to the console is specified in /etc/sysconfig/init in the
|
||||||
LOGLEVEL variable.</para>
|
LOGLEVEL variable.</para>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
@ -1075,7 +1076,7 @@ run_iptables -A common -p udp --sport 53 -mstate --state NEW -j DROP</programlis
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>The packet has a source IP address that isn't in any of
|
<para>The packet has a source IP address that isn't in any of
|
||||||
your defined zones ("shorewall check" and look at the
|
your defined zones (<quote>shorewall check</quote> and look at the
|
||||||
printed zone definitions) or the chain is FORWARD and the
|
printed zone definitions) or the chain is FORWARD and the
|
||||||
destination IP isn't in any of your defined zones. Also see
|
destination IP isn't in any of your defined zones. Also see
|
||||||
<xref linkend="faq2a" /> for another cause of packets being logged
|
<xref linkend="faq2a" /> for another cause of packets being logged
|
||||||
@ -1110,9 +1111,8 @@ run_iptables -A common -p udp --sport 53 -mstate --state NEW -j DROP</programlis
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>This packet was REJECTed out of the <emphasis role="bold">all2all</emphasis>
|
<para>This packet was REJECTed out of the <emphasis role="bold">all2all</emphasis>
|
||||||
chain -- the packet was rejected under the
|
chain -- the packet was rejected under the <quote>all</quote>-><quote>all</quote>
|
||||||
"all"->"all" REJECT policy (<xref
|
REJECT policy (<xref linkend="all2all" /> above).</para>
|
||||||
linkend="all2all" /> above).</para>
|
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -1121,8 +1121,8 @@ run_iptables -A common -p udp --sport 53 -mstate --state NEW -j DROP</programlis
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>the packet entered the firewall via eth2. If you see
|
<para>the packet entered the firewall via eth2. If you see
|
||||||
"IN=" with no interface name, the packet originated on
|
<quote>IN=</quote> with no interface name, the packet originated
|
||||||
the firewall itself.</para>
|
on the firewall itself.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
|
|
||||||
@ -1131,7 +1131,7 @@ run_iptables -A common -p udp --sport 53 -mstate --state NEW -j DROP</programlis
|
|||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>if accepted, the packet would be sent on eth1. If you see
|
<para>if accepted, the packet would be sent on eth1. If you see
|
||||||
"OUT=" with no interface name, the packet would be
|
<quote>OUT=</quote> with no interface name, the packet would be
|
||||||
processed by the firewall itself.</para>
|
processed by the firewall itself.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -1172,8 +1172,8 @@ run_iptables -A common -p udp --sport 53 -mstate --state NEW -j DROP</programlis
|
|||||||
<para>For additional information about the log message, see <ulink
|
<para>For additional information about the log message, see <ulink
|
||||||
url="http://logi.cc/linux/netfilter-log-format.php3">http://logi.cc/linux/netfilter-log-format.php3</ulink>.</para>
|
url="http://logi.cc/linux/netfilter-log-format.php3">http://logi.cc/linux/netfilter-log-format.php3</ulink>.</para>
|
||||||
|
|
||||||
<para>In this case, 192.168.2.2 was in the "dmz" zone and
|
<para>In this case, 192.168.2.2 was in the <quote>dmz</quote> zone and
|
||||||
192.168.1.3 is in the "loc" zone. I was missing the rule:</para>
|
192.168.1.3 is in the <quote>loc</quote> zone. I was missing the rule:</para>
|
||||||
|
|
||||||
<programlisting>ACCEPT dmz loc udp 53</programlisting>
|
<programlisting>ACCEPT dmz loc udp 53</programlisting>
|
||||||
</example>
|
</example>
|
||||||
@ -1486,8 +1486,7 @@ Hint: insmod errors can be caused by incorrect module parameters, including inva
|
|||||||
/lib/modules/2.4.17/kernel/net/ipv4/netfilter/ip_tables.o failed
|
/lib/modules/2.4.17/kernel/net/ipv4/netfilter/ip_tables.o failed
|
||||||
/lib/modules/2.4.17/kernel/net/ipv4/netfilter/ip_tables.o: insmod ip_tables failed
|
/lib/modules/2.4.17/kernel/net/ipv4/netfilter/ip_tables.o: insmod ip_tables failed
|
||||||
iptables v1.2.3: can't initialize iptables table `nat': iptables who? (do you need to insmod?)
|
iptables v1.2.3: can't initialize iptables table `nat': iptables who? (do you need to insmod?)
|
||||||
Perhaps iptables or your kernel needs to be upgraded.
|
Perhaps iptables or your kernel needs to be upgraded.</programlisting>
|
||||||
</programlisting>
|
|
||||||
|
|
||||||
<para>This problem is usually corrected through the following sequence
|
<para>This problem is usually corrected through the following sequence
|
||||||
of commands</para>
|
of commands</para>
|
||||||
@ -1552,8 +1551,8 @@ Creating input Chains...
|
|||||||
instructional material use the -A command which adds the rules to the
|
instructional material use the -A command which adds the rules to the
|
||||||
end of the chain. Most chains that Shorewall constructs end with an
|
end of the chain. Most chains that Shorewall constructs end with an
|
||||||
unconditional DROP, ACCEPT or REJECT rule and any rules that you add
|
unconditional DROP, ACCEPT or REJECT rule and any rules that you add
|
||||||
after that will be ignored. Check "man iptables" and look at the
|
after that will be ignored. Check <quote>man iptables</quote> and look
|
||||||
-I (--insert) command.</para>
|
at the -I (--insert) command.</para>
|
||||||
</section>
|
</section>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
@ -1583,14 +1582,14 @@ Creating input Chains...
|
|||||||
</section>
|
</section>
|
||||||
|
|
||||||
<section id="faq13">
|
<section id="faq13">
|
||||||
<title>(FAQ 13) Why do you call it "Shorewall"?</title>
|
<title>(FAQ 13) Why do you call it <quote>Shorewall</quote>?</title>
|
||||||
|
|
||||||
<para><emphasis role="bold">Answer:</emphasis> Shorewall is a
|
<para><emphasis role="bold">Answer:</emphasis> Shorewall is a
|
||||||
concatenation of "<emphasis>Shore</emphasis>line" (<ulink
|
concatenation of <quote><emphasis>Shore</emphasis>line</quote> (<ulink
|
||||||
url="http://www.cityofshoreline.com">the city where I live</ulink>) and
|
url="http://www.cityofshoreline.com">the city where I live</ulink>) and
|
||||||
"Fire<emphasis>wall</emphasis>". The full name of the product is
|
<quote>Fire<emphasis>wall</emphasis></quote>. The full name of the
|
||||||
actually "Shoreline Firewall" but "Shorewall" is must
|
product is actually <quote>Shoreline Firewall</quote> but
|
||||||
more commonly used.</para>
|
<quote>Shorewall</quote> is must more commonly used.</para>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
<section id="faq23">
|
<section id="faq23">
|
||||||
@ -1798,8 +1797,8 @@ Creating input Chains...
|
|||||||
<title>(FAQ 24) How can I allow conections to let's say the ssh port
|
<title>(FAQ 24) How can I allow conections to let's say the ssh port
|
||||||
only from specific IP Addresses on the internet?</title>
|
only from specific IP Addresses on the internet?</title>
|
||||||
|
|
||||||
<para>In the SOURCE column of the rule, follow "net" by a colon
|
<para>In the SOURCE column of the rule, follow <quote>net</quote> by a
|
||||||
and a list of the host/subnet addresses as a comma-separated list.</para>
|
colon and a list of the host/subnet addresses as a comma-separated list.</para>
|
||||||
|
|
||||||
<programlisting>net:<ip1>,<ip2>,...</programlisting>
|
<programlisting>net:<ip1>,<ip2>,...</programlisting>
|
||||||
|
|
||||||
@ -1812,17 +1811,16 @@ Creating input Chains...
|
|||||||
|
|
||||||
<section id="faq26">
|
<section id="faq26">
|
||||||
<title>(FAQ 26) When I try to use any of the SYN options in nmap on or
|
<title>(FAQ 26) When I try to use any of the SYN options in nmap on or
|
||||||
behind the firewall, I get "operation not permitted". How can I
|
behind the firewall, I get <quote>operation not permitted</quote>. How
|
||||||
use nmap with Shorewall?"</title>
|
can I use nmap with Shorewall?"</title>
|
||||||
|
|
||||||
<para>Edit /etc/shorewall/shorewall.conf and change
|
<para>Edit /etc/shorewall/shorewall.conf and change <quote>NEWNOTSYN=No</quote>
|
||||||
"NEWNOTSYN=No" to "NEWNOTSYN=Yes" then restart
|
to <quote>NEWNOTSYN=Yes</quote> then restart Shorewall.</para>
|
||||||
Shorewall.</para>
|
|
||||||
|
|
||||||
<section id="faq26a">
|
<section id="faq26a">
|
||||||
<title>(FAQ 26a) When I try to use the "-O" option of nmap
|
<title>(FAQ 26a) When I try to use the <quote>-O</quote> option of
|
||||||
from the firewall system, I get "operation not permitted". How
|
nmap from the firewall system, I get <quote>operation not permitted</quote>.
|
||||||
to I allow this option?</title>
|
How to I allow this option?</title>
|
||||||
|
|
||||||
<para>Add this command to your /etc/shorewall/start file:</para>
|
<para>Add this command to your /etc/shorewall/start file:</para>
|
||||||
|
|
||||||
@ -1836,8 +1834,8 @@ Creating input Chains...
|
|||||||
|
|
||||||
<para>First take a look at the <ulink url="kernel.htm">Shorewall kernel
|
<para>First take a look at the <ulink url="kernel.htm">Shorewall kernel
|
||||||
configuration page</ulink>. You probably also want to be sure that you
|
configuration page</ulink>. You probably also want to be sure that you
|
||||||
have selected the "<emphasis role="bold">NAT of local connections
|
have selected the <quote><emphasis role="bold">NAT of local connections
|
||||||
(READ HELP)</emphasis>" on the Netfilter Configuration menu.
|
(READ HELP)</emphasis></quote> on the Netfilter Configuration menu.
|
||||||
Otherwise, DNAT rules with your firewall as the source zone won't
|
Otherwise, DNAT rules with your firewall as the source zone won't
|
||||||
work with your new kernel.</para>
|
work with your new kernel.</para>
|
||||||
</section>
|
</section>
|
||||||
@ -1849,8 +1847,8 @@ Creating input Chains...
|
|||||||
allow you to route bridge traffic through Netfilter, the environment is
|
allow you to route bridge traffic through Netfilter, the environment is
|
||||||
so different from the Layer 3 firewalling environment that very little
|
so different from the Layer 3 firewalling environment that very little
|
||||||
of Shorewall works. In fact, so much of Shorewall doesn't work that
|
of Shorewall works. In fact, so much of Shorewall doesn't work that
|
||||||
my official position is that "Shorewall doesn't work with Layer
|
my official position is that <quote>Shorewall doesn't work with
|
||||||
2 Bridging".</para>
|
Layer 2 Bridging</quote>.</para>
|
||||||
</section>
|
</section>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user