diff --git a/manpages/shorewall-rules.xml b/manpages/shorewall-rules.xml index 450183824..a4932fd14 100644 --- a/manpages/shorewall-rules.xml +++ b/manpages/shorewall-rules.xml @@ -109,7 +109,27 @@ - ACTION + ACTION — {ACCEPT[+]|NONAT|DROP|REJECT|DNAT[-]|SAME[-]|REDIRECT[-]|CONTINUE|LOG|QUEUE|COMMENT|action|macro[/target}[:{log-level|none}[!][:tag]] Must be one of the following. @@ -291,7 +311,8 @@ macro accepts an action parameter (Look at the macro source to see if it has PARAM in the TARGET column) then the macro name is followed by "/" and the - action (ACCEPT, target (ACCEPT, DROP, REJECT, ...) to be substituted for the parameter. @@ -343,7 +364,14 @@ - SOURCE + SOURCE — + {zone|all[+][-]}[:interface][:{address-or-range[,address-or-range]...|+ipset} Source hosts to which the rule applies. May be a zone defined @@ -440,7 +468,14 @@ - DEST + DEST — + {zone|all[+][-]}[:interface][:{address-or-range[,address-or-range]...|+ipset}} Location of Server. May be a zone defined in @@ -520,17 +555,17 @@ - PROTO (Optional) + PROTO (Optional) — {-|tcp:syn|ipp2p|ipp2p:udp|ipp2p:all|protocol-number|protocol-name|all} - Protocol - Must be tcp, - tcp:syn, udp, icmp, - ipp2p, - ipp2p:udp, ipp2p:all a - number, or all. ipp2p* - requires ipp2p match support in your kernel and iptables. Protocol - ipp2p* requires + ipp2p match support in your kernel and iptables. tcp:syn implies tcp plus the SYN flag must be set and the RST,ACK and FIN flags must be reset. @@ -538,7 +573,10 @@ - DEST PORT(S) (Optional) + DEST PORT(S) (Optional) — + {-|port-name-number-or-range[,port-name-number-or-range]...} Destination Ports. A comma-separated list of Port names (from @@ -576,8 +614,10 @@ - SOURCE PORT(S) - (Optional) + SOURCE PORT(S) (Optional) — + {-|port-name-number-or-range[,port-name-number-or-range]...} Port(s) used by the client. If omitted, any source port is @@ -610,7 +650,9 @@ - ORIGINAL DEST (Optional) + ORIGINAL DEST (Optional) — + [-|address[,address]...] If ACTION is DNAT[ - RATE LIMIT (Optional) + RATE LIMIT (Optional) — + [-|rate/{sec|min}[:burst] You may rate-limit the rule by placing a value in this column: - rate/interval[:burst] - where rate is the number of connections per - interval (sec - or min) and - burst is the largest burst permitted. If no - burst is given, a value of 5 is assumed. There - may be no no whitespace embedded in the specification. + rate is the number of connections per + interval (sec or min) and burst is the + largest burst permitted. If no burst is given, + a value of 5 is assumed. There may be no no whitespace embedded in + the specification. Example: 10/sec:20 - USER/GROUP (Optional) + USER/GROUP (Optional) — + [!][user-name-or-number][:group-name-or-number][+program-name] This column may only be non-empty if the SOURCE is the firewall itself. - The column may contain: - - [!][user name or number][:group - name or number][+program - name] - When this column is non-empty, the rule applies only if the program generating the output is running under the effective user and/or group @@ -838,8 +881,7 @@ See ALSO http://shorewall.net/Documentation.htm#Rules - + url="http://shorewall.net/Documentation.htm#Rules">http://shorewall.net/Documentation.htm#Rules shorewall(8), shorewall-accounting(5), shorewall-actions(5), shorewall-blacklist(5), shorewall-hosts(5), shorewall-interfaces(5),