1SHOREWALL-HOSTS(5)              [FIXME: manual]             SHOREWALL-HOSTS(5)
2
3
4

NAME

6       hosts - Shorewall file
7

SYNOPSIS

9       /etc/shorewall/hosts
10

DESCRIPTION

12       This file is used to define zones in terms of subnets and/or individual
13       IP addresses. Most simple setups don't need to (should not) place
14       anything in this file.
15
16       The order of entries in this file is not significant in determining
17       zone composition. Rather, the order that the zones are declared in
18       shorewall-zones[1](5) determines the order in which the records in this
19       file are interpreted.
20
21           Warning
22           The only time that you need this file is when you have more than
23           one zone connected through a single interface.
24
25           Warning
26           If you have an entry for a zone and interface in
27           shorewall-interfaces[2](5) then do not include any entries in this
28           file for that same (zone, interface) pair.
29
30       The columns in the file are as follows.
31
32       ZONE - zone-name
33           The name of a zone declared in shorewall-zones[1](5). You may not
34           list the firewall zone in this column.
35
36       HOST(S) -
37       interface:{[{address-or-range[,address-or-range]...|+ipset|dynamic}[exclusion]
38           The name of an interface defined in the shorewall-interfaces[2](5)
39           file followed by a colon (":") and a comma-separated list whose
40           elements are either:
41
42            1. The IP address of a host.
43
44            2. A network in CIDR format.
45
46            3. An IP address range of the form low.address-high.address. Your
47               kernel and iptables must have iprange match support.
48
49            4. The name of an ipset.
50
51            5. The word dynamic which makes the zone dynamic in that you can
52               use the shorewall add and shorewall delete commands to change
53               to composition of the zone.
54
55           You may also exclude certain hosts through use of an exclusion (see
56           shorewall-exclusion[3](5).
57
58       OPTIONS (Optional) - [option[,option]...]
59           A comma-separated list of options from the following list. The
60           order in which you list the options is not significant but the list
61           must have no embedded white space.
62
63           maclist
64               Connection requests from these hosts are compared against the
65               contents of shorewall-maclist[4](5). If this option is
66               specified, the interface must be an ethernet NIC or equivalent
67               and must be up before Shorewall is started.
68
69           routeback
70               Shorewall should set up the infrastructure to pass packets from
71               this/these address(es) back to themselves. This is necessary if
72               hosts in this group use the services of a transparent proxy
73               that is a member of the group or if DNAT is used to send
74               requests originating from this group to a server in the group.
75
76           blacklist
77               This option only makes sense for ports on a bridge. As of
78               Shoreawall 4.4.13, the option is no longer supported and is
79               ignored with a warning: WARNING: The "blacklist" host option is
80               no longer supported and will be ignored.  Check packets
81               arriving on this port against the shorewall-blacklist[5](5)
82               file.
83
84           tcpflags
85               Packets arriving from these hosts are checked for certain
86               illegal combinations of TCP flags. Packets found to have such a
87               combination of flags are handled according to the setting of
88               TCP_FLAGS_DISPOSITION after having been logged according to the
89               setting of TCP_FLAGS_LOG_LEVEL.
90
91           nosmurfs
92               This option only makes sense for ports on a bridge.
93
94               Filter packets for smurfs (packets with a broadcast address as
95               the source).
96
97               Smurfs will be optionally logged based on the setting of
98               SMURF_LOG_LEVEL in shorewall.conf[6](5). After logging, the
99               packets are dropped.
100
101           ipsec
102               The zone is accessed via a kernel 2.6 ipsec SA. Note that if
103               the zone named in the ZONE column is specified as an IPSEC zone
104               in the shorewall-zones[1](5) file then you do NOT need to
105               specify the 'ipsec' option here.
106
107           broadcast
108               Used when you want to include limited broadcasts (destination
109               IP address 255.255.255.255) from the firewall to this zone.
110               Only necessary when:
111
112                1. The network specified in the HOST(S) column does not
113                   include 255.255.255.255.
114
115                2. The zone does not have an entry for this interface in
116                   shorewall-interfaces[2](5).
117
118           destonly
119               Normally used with the Multi-cast IP address range
120               (224.0.0.0/4). Specifies that traffic will be sent to the
121               specified net(s) but that no traffic will be received from the
122               net(s).
123

EXAMPLES

125       Example 1
126           The firewall runs a PPTP server which creates a ppp interface for
127           each remote client. The clients are assigned IP addresses in the
128           network 192.168.3.0/24 and in a zone named 'vpn'.
129
130               #ZONE       HOST(S)               OPTIONS
131               vpn         ppp+:192.168.3.0/24
132

FILES

134       /etc/shorewall/hosts
135

SEE ALSO

137       shorewall(8), shorewall-accounting(5), shorewall-actions(5),
138       shorewall-blacklist(5), shorewall_interfaces(5), shorewall-ipsets(5),
139       shorewall-maclist(5), shorewall-masq(5), shorewall-nat(5),
140       shorewall-nesting(5), shorewall-netmap(5), shorewall-params(5),
141       shorewall-policy(5), shorewall-providers(5), shorewall-proxyarp(5),
142       shorewall-route_rules(5), shorewall-routestopped(5),
143       shorewall-rules(5), shorewall.conf(5), shorewall-secmarks(5),
144       shorewall-tcclasses(5), shorewall-tcdevices(5), shorewall-tcrules(5),
145       shorewall-tos(5), shorewall-tunnels(5), shorewall-zones(5)
146

NOTES

148        1. shorewall-zones
149           http://www.shorewall.net/manpages/shorewall-zones.html
150
151        2. shorewall-interfaces
152           http://www.shorewall.net/manpages/shorewall-interfaces.html
153
154        3. shorewall-exclusion
155           http://www.shorewall.net/manpages/shorewall-exclusion.html
156
157        4. shorewall-maclist
158           http://www.shorewall.net/manpages/shorewall-maclist.html
159
160        5. shorewall-blacklist
161           http://www.shorewall.net/manpages/shorewall-blacklist.html
162
163        6. shorewall.conf
164           http://www.shorewall.net/manpages/shorewall.conf.html
165
166
167
168[FIXME: source]                   09/16/2011                SHOREWALL-HOSTS(5)
Impressum