1shorewall-hosts(5)                                          shorewall-hosts(5)
2
3
4

NAME

6       hosts - Shorewall file
7

SYNOPSIS

9       /etc/shorewall/hosts
10

DESCRIPTION

12       This file is used to define zones in terms of subnets and/or individual
13       IP addresses. Most simple setups don't need to (should not) place  any‐
14       thing in this file.
15
16       The  order  of  entries  in this file is not significant in determining
17       zone composition. Rather, the order that the zones are declared in
18       shorewall-zones  ⟨shorewall-zones.html⟩  (5)  determines  the  order in
19       which the records in this file are interpreted.
20              Warning
21
22              The only time that you need this file is when you have more than
23              one zone connected through a single interface.
24              Warning
25
26              If you have an entry for a zone and interface in shorewall-in‐
27              terfaces ⟨shorewall-interfaces.html⟩ (5) then do not include any
28              entries in this file for that same (zone, interface) pair.
29
30       The columns in the file are as follows.
31
32       ZONE zone-name
33              The name of a zone declared in shorewall-zones
34              ⟨shorewall-zones.html⟩ (5). You may not list the  firewall  zone
35              in this column.
36
37       HOST(S)           interface:{[{address-or-range[,address-or-
38       range]...|+ipset}[exclusion]
39              The name of an interface defined in the shorewall-interfaces
40              ⟨shorewall-interfaces.html⟩  (5)  file followed by a colon (":")
41              and a comma-separated list whose elements are either:
42
43              1.  The IP address of a host.
44
45              2.  A network in CIDR format.
46
47              3.  An IP address range of  the  form  low.address-high.address.
48                  Your kernel and iptables must have iprange match support.
49
50              4.  The name of an ipset.
51              You  may  also exclude certain hosts through use of an exclusion
52              (see shorewall-exclusion ⟨shorewall-exclusion.html⟩ (5).
53
54       OPTIONS (Optional) — [option[,option]...]
55              A comma-separated list of options from the following  list.  The
56              order  in  which you list the options is not significant but the
57              list must have no embedded white space.
58
59              maclist
60                     Connection requests from these hosts are compared against
61                     the contents of shorewall-maclist
62                     ⟨shorewall-maclist.html⟩ (5). If this  option  is  speci‐
63                     fied, the interface must be an ethernet NIC or equivalent
64                     and must be up before Shorewall is started.
65
66              routeback
67                     Shorewall should set up the infrastructure to pass  pack‐
68                     ets  from this/these address(es) back to themselves. This
69                     is necessary if hosts in this group use the services of a
70                     transparent  proxy  that  is  a member of the group or if
71                     DNAT is used to send requests originating from this group
72                     to a server in the group.
73
74              blacklist
75                     This option only makes sense for ports on a bridge.
76
77                     Check packets arriving on this port against the shore‐
78                     wall-blacklist ⟨shorewall-blacklist.html⟩ (5) file.
79
80              tcpflags
81                     Packets arriving from these hosts are checked for certain
82                     illegal  combinations of TCP flags. Packets found to have
83                     such a combination of flags are handled according to  the
84                     setting of TCP_FLAGS_DISPOSITION after having been logged
85                     according to the setting of TCP_FLAGS_LOG_LEVEL.
86
87              nosmurfs
88                     This option only makes sense for ports on a bridge.
89
90                     Filter packets for smurfs (packets with a  broadcast  ad‐
91                     dress as the source).
92
93                     Smurfs  will be optionally logged based on the setting of
94                     SMURF_LOG_LEVEL in  shorewall.conf  ⟨shorewall.conf.html⟩
95                     (5). After logging, the packets are dropped.
96
97              ipsec  The zone is accessed via a kernel 2.6 ipsec SA. Note that
98                     if the zone named in the ZONE column is specified  as  an
99                     IPSEC  zone in the shorewall-zones ⟨shorewall-zones.html⟩
100                     (5) file then you do NOT need to specify the 'ipsec'  op‐
101                     tion here.
102
103              broadcast
104                     Used  when you want to include limited broadcasts (desti‐
105                     nation IP address 255.255.255.255) from the  firewall  to
106                     this zone. Only necessary when:
107
108                     1.  The  network specified in the HOST(S) column does not
109                         include 255.255.255.255.
110
111                     2.  The zone does not have an entry for this interface in
112                         shorewall-interfaces ⟨shorewall-interfaces.html⟩ (5).
113
114              destonly
115                     Normally  used  with  the  Multi-cast  IP  address  range
116                     (224.0.0.0/4). Specifies that traffic will be sent to the
117                     specified  net(s)  but  that  no traffic will be received
118                     from the net(s).
119

EXAMPLES

121       Example 1
122              The firewall runs a PPTP server which creates  a  ppp  interface
123              for each remote client. The clients are assigned IP addresses in
124              the network 192.168.3.0/24 and in a zone named 'vpn'.
125
126              #ZONE       HOST(S)               OPTIONS
127              vpn         ppp+:192.168.3.0/24
128
129              It is especially recommended to define such a  zone  using  this
130              file rather than shorewall-interfaces
131              ⟨shorewall-interfaces.html⟩ (8) if there is  another  zone  that
132              uses  a  fixed PPP interface (for example, if the 'net' zone al‐
133              ways interfaces through ppp0).
134

FILES

136       /etc/shorewall/hosts
137

SEE ALSO

139       shorewall(8), shorewall-accounting(5), shorewall-actions(5), shorewall-
140       blacklist(5),  shorewall-interfaces(5),  shorewall-ipsec(5), shorewall-
141       maclist(5), shorewall-masq(5),  shorewall-nat(5),  shorewall-netmap(5),
142       shorewall-params(5),    shorewall-policy(5),    shorewall-providers(5),
143       shorewall-proxyarp(5),      shorewall-route_routes(5),       shorewall-
144       routestopped(5),  shorewall-rules(5),  shorewall.conf(5), shorewall-tc‐
145       classes(5),  shorewall-tcdevices(5),  shorewall-tcrules(5),  shorewall-
146       tos(5), shorewall-tunnels(5), shorewall-zones(5)
147
148
149
150                                  19 May 2008               shorewall-hosts(5)
Impressum