forked from extern/shorewall_code
b66929a65e
1) Elimination of the "shorewall monitor" command. 2) The /etc/shorewall/ipsec and /etc/shorewall/zones file are combined into a single /etc/shorewall/zones file. This is done in an upwardly-compatible way so that current users can continue to use their existing files. 3) Support has been added for the arp_ignore interface option. 4) DROPINVALID has been removed from shorewall.conf. Behavior is as if DROPINVALID=No was specified. 5) The 'nobogons' option and BOGON_LOG_LEVEL are removed. 6) Error and warning messages have been made easier to spot by using capitalization (e.g., ERROR: and WARNING:). 7) The /etc/shorewall/policy file now contains a new connection policy and a policy for ESTABLISHED packets. Useful for users of snort-inline who want to pass all packets to the QUEUE target. 8) A new 'critical' option has been added to /etc/shorewall/routestopped. Shorewall insures communication between the firewall and 'critical' hosts throughout start, restart, stop and clear. Useful for diskless firewall's with NFS-mounted file systems, LDAP servers, Crossbow, etc. 9) Macros. Macros are very similar to actions but are easier to use, allow parameter substitution and are more efficient. Almost all of the standard actions have been converted to macros in the EXPERIMENTAL branch. 10) The default value of ADD_IP_ALIASES in shorewall.conf is changed to No. 11) If you have 'make' installed on your firewall, then when you use the '-f' option to 'shorewall start' (as happens when you reboot), if your /etc/shorewall/ directory contains files that were modified after Shorewall was last restarted then Shorewall is started using the config files rather than using the saved configuration. git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@2409 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
57 lines
1.7 KiB
Plaintext
Executable File
57 lines
1.7 KiB
Plaintext
Executable File
#
|
|
# Shorewall 2.6 -- Blacklist File
|
|
#
|
|
# /etc/shorewall/blacklist
|
|
#
|
|
# This file contains a list of IP addresses, MAC addresses and/or subnetworks.
|
|
#
|
|
# Columns are:
|
|
#
|
|
# ADDRESS/SUBNET - Host address, subnetwork, MAC address, IP address
|
|
# range (if your kernel and iptables contain iprange
|
|
# match support) or ipset name prefaced by "+" (if
|
|
# your kernel supports ipset match).
|
|
#
|
|
# MAC addresses must be prefixed with "~" and use "-"
|
|
# as a separator.
|
|
#
|
|
# Example: ~00-A0-C9-15-39-78
|
|
#
|
|
# PROTOCOL - Optional. If specified, must be a protocol number
|
|
# or a protocol name from /etc/protocols.
|
|
#
|
|
# PORTS - Optional. May only be specified if the protocol
|
|
# is TCP (6) or UDP (17). A comma-separated list
|
|
# of port numbers or service names from /etc/services.
|
|
#
|
|
# When a packet arrives on an interface that has the 'blacklist' option
|
|
# specified in /etc/shorewall/interfaces, its source IP address is checked
|
|
# against this file and disposed of according to the BLACKLIST_DISPOSITION and
|
|
# BLACKLIST_LOGLEVEL variables in /etc/shorewall/shorewall.conf
|
|
#
|
|
# If PROTOCOL or PROTOCOL and PORTS are supplied, only packets matching
|
|
# the protocol (and one of the ports if PORTS supplied) are blocked.
|
|
#
|
|
# Example:
|
|
#
|
|
# To block DNS queries from address 192.0.2.126:
|
|
#
|
|
# ADDRESS/SUBNET PROTOCOL PORT
|
|
# 192.0.2.126 udp 53
|
|
#
|
|
# Example:
|
|
#
|
|
# To block DNS queries from addresses in the ipset 'dnsblack':
|
|
#
|
|
# ADDRESS/SUBNET PROTOCOL PORT
|
|
# +dnsblack udp 53
|
|
#
|
|
# Please see http://shorewall.net/blacklisting_support.htm for additional
|
|
# information.
|
|
#
|
|
###############################################################################
|
|
#ADDRESS/SUBNET PROTOCOL PORT
|
|
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE
|
|
|
|
|