forked from extern/shorewall_code
Shorewall 2.2.0 RC2
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@1851 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
parent
0671733256
commit
d6f9f805f1
@ -15,7 +15,7 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2004-08-15</pubdate>
|
<pubdate>2004-12-23</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2001-2004</year>
|
<year>2001-2004</year>
|
||||||
@ -47,6 +47,13 @@
|
|||||||
Shorewall.</para>
|
Shorewall.</para>
|
||||||
</warning>
|
</warning>
|
||||||
|
|
||||||
|
<section>
|
||||||
|
<title>Preliminary Reading</title>
|
||||||
|
|
||||||
|
<para>I recommend reading the <ulink url="VPNBasics.html">VPN
|
||||||
|
Basics</ulink> article if you plan to implement any type of VPN.</para>
|
||||||
|
</section>
|
||||||
|
|
||||||
<section>
|
<section>
|
||||||
<title>Configuring FreeS/Wan</title>
|
<title>Configuring FreeS/Wan</title>
|
||||||
|
|
||||||
|
@ -15,7 +15,7 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2004-12-16</pubdate>
|
<pubdate>2004-12-23</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2001-2004</year>
|
<year>2001-2004</year>
|
||||||
@ -81,11 +81,11 @@
|
|||||||
INTERFACE column should undergo NAT. If you leave this column empty,
|
INTERFACE column should undergo NAT. If you leave this column empty,
|
||||||
<quote>No</quote> is assumed (Shorewall 2.0.0 and later -- prior to
|
<quote>No</quote> is assumed (Shorewall 2.0.0 and later -- prior to
|
||||||
this, <quote>Yes</quote> was assumed). <emphasis role="bold">Specifying
|
this, <quote>Yes</quote> was assumed). <emphasis role="bold">Specifying
|
||||||
<quote>Yes</quote> in this column will not allow systems on the lower
|
<quote>Yes</quote> in this column will not by itself allow systems on
|
||||||
LAN to access each other using their public IP addresses.</emphasis> For
|
the lower LAN to access each other using their public IP
|
||||||
example, the lower left-hand system (10.1.1.2) cannot connect to
|
addresses.</emphasis> For example, the lower left-hand system (10.1.1.2)
|
||||||
130.252.100.19 and expect to be connected to the lower right-hand
|
cannot connect to 130.252.100.19 and expect to be connected to the lower
|
||||||
system. <ulink url="FAQ.htm#faq2a">See FAQ 2a</ulink>.</para>
|
right-hand system. <ulink url="FAQ.htm#faq2a">See FAQ 2a</ulink>.</para>
|
||||||
</note>
|
</note>
|
||||||
|
|
||||||
<note>
|
<note>
|
||||||
|
@ -8,27 +8,27 @@
|
|||||||
<title>OpenVPN Tunnels</title>
|
<title>OpenVPN Tunnels</title>
|
||||||
|
|
||||||
<authorgroup>
|
<authorgroup>
|
||||||
<author>
|
|
||||||
<firstname>Tom</firstname>
|
|
||||||
|
|
||||||
<surname>Eastep</surname>
|
|
||||||
</author>
|
|
||||||
|
|
||||||
<author>
|
<author>
|
||||||
<firstname>Simon</firstname>
|
<firstname>Simon</firstname>
|
||||||
|
|
||||||
<surname>Mater</surname>
|
<surname>Mater</surname>
|
||||||
</author>
|
</author>
|
||||||
|
|
||||||
|
<author>
|
||||||
|
<firstname>Tom</firstname>
|
||||||
|
|
||||||
|
<surname>Eastep</surname>
|
||||||
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2004-12-20</pubdate>
|
<pubdate>2004-12-23</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2003</year>
|
<year>2003</year>
|
||||||
|
|
||||||
<holder>Thomas M. Eastep</holder>
|
|
||||||
|
|
||||||
<holder>Simon Mater</holder>
|
<holder>Simon Mater</holder>
|
||||||
|
|
||||||
|
<holder>Thomas M. Eastep</holder>
|
||||||
</copyright>
|
</copyright>
|
||||||
|
|
||||||
<legalnotice>
|
<legalnotice>
|
||||||
@ -60,6 +60,13 @@
|
|||||||
version of Shorewall and OpenVPN that you are using.</para>
|
version of Shorewall and OpenVPN that you are using.</para>
|
||||||
</warning>
|
</warning>
|
||||||
|
|
||||||
|
<section>
|
||||||
|
<title>Preliminary Reading</title>
|
||||||
|
|
||||||
|
<para>I recommend reading the <ulink url="VPNBasics.html">VPN
|
||||||
|
Basics</ulink> article if you plan to implement any type of VPN.</para>
|
||||||
|
</section>
|
||||||
|
|
||||||
<section>
|
<section>
|
||||||
<title>Bridging two Masqueraded Networks</title>
|
<title>Bridging two Masqueraded Networks</title>
|
||||||
|
|
||||||
|
@ -15,7 +15,7 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2004-11-02</pubdate>
|
<pubdate>2004-12-23</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2001</year>
|
<year>2001</year>
|
||||||
@ -143,6 +143,13 @@
|
|||||||
current patches and <quote>roll their own</quote>.</para>
|
current patches and <quote>roll their own</quote>.</para>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
|
<section>
|
||||||
|
<title>Preliminary Reading</title>
|
||||||
|
|
||||||
|
<para>I recommend reading the <ulink url="VPNBasics.html">VPN
|
||||||
|
Basics</ulink> article if you plan to implement any type of VPN.</para>
|
||||||
|
</section>
|
||||||
|
|
||||||
<section id="ServerFW">
|
<section id="ServerFW">
|
||||||
<title>PPTP Server Running on your Firewall</title>
|
<title>PPTP Server Running on your Firewall</title>
|
||||||
|
|
||||||
|
@ -15,7 +15,7 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2004-12-18</pubdate>
|
<pubdate>2004-12-23</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2004</year>
|
<year>2004</year>
|
||||||
@ -187,7 +187,7 @@
|
|||||||
cases, remote zone definition is similar to zones that you have already
|
cases, remote zone definition is similar to zones that you have already
|
||||||
defined.</para>
|
defined.</para>
|
||||||
|
|
||||||
<para><filename>/etc/shorewall/zones</filename>: </para>
|
<para><filename>/etc/shorewall/zones</filename>:</para>
|
||||||
|
|
||||||
<programlisting>#ZONE DISPLAY COMMENT
|
<programlisting>#ZONE DISPLAY COMMENT
|
||||||
net Internet The big bad net
|
net Internet The big bad net
|
||||||
@ -245,7 +245,7 @@ loc eth1 detect
|
|||||||
rem2 tun+:10.0.1.0/24</emphasis></programlisting>
|
rem2 tun+:10.0.1.0/24</emphasis></programlisting>
|
||||||
|
|
||||||
<para>The <filename>/etc/shorewall/hosts</filename> file is also used with
|
<para>The <filename>/etc/shorewall/hosts</filename> file is also used with
|
||||||
<ulink url="IPSEC-2.6.html">kernel 2.6 native IPSEC</ulink>. </para>
|
<ulink url="IPSEC-2.6.html">kernel 2.6 native IPSEC</ulink>.</para>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
<section>
|
<section>
|
||||||
@ -284,7 +284,7 @@ ACCEPT $FW Z2:1.2.3.4 udp 500
|
|||||||
ACCEPT Z2:1.2.3.4 $FW udp 500</programlisting>
|
ACCEPT Z2:1.2.3.4 $FW udp 500</programlisting>
|
||||||
</blockquote>
|
</blockquote>
|
||||||
|
|
||||||
<para>The "noah" option causes the rules for protocol 50 to be
|
<para>The "noah" option causes the rules for protocol 51 to be
|
||||||
eliminated. The "ipsecnat" causes UDP port 4500 to be accepted in both
|
eliminated. The "ipsecnat" causes UDP port 4500 to be accepted in both
|
||||||
directions. If no GATEWAY ZONE is given then the last two rules above
|
directions. If no GATEWAY ZONE is given then the last two rules above
|
||||||
are omitted.</para>
|
are omitted.</para>
|
||||||
|
Loading…
Reference in New Issue
Block a user