{"id":4367,"date":"2022-12-20T17:49:05","date_gmt":"2022-12-20T20:49:05","guid":{"rendered":"http:\/\/lode.uno\/linux-man\/index.php\/2022\/12\/20\/shorewallstoppedru-man5\/"},"modified":"2022-12-20T17:49:05","modified_gmt":"2022-12-20T20:49:05","slug":"shorewallstoppedru-man5","status":"publish","type":"post","link":"https:\/\/lode.uno\/linux-man\/2022\/12\/20\/shorewallstoppedru-man5\/","title":{"rendered":"SHOREWALL&minus;STOPPEDRU (man5)"},"content":{"rendered":"<h1 align=\"center\">SHOREWALL\u2212STOPPEDRU<\/h1>\n<p> <a href=\"#NAME\">NAME<\/a><br \/> <a href=\"#SYNOPSIS\">SYNOPSIS<\/a><br \/> <a href=\"#DESCRIPTION\">DESCRIPTION<\/a><br \/> <a href=\"#FILES\">FILES<\/a><br \/> <a href=\"#SEE ALSO\">SEE ALSO<\/a><br \/> <a href=\"#NOTES\">NOTES<\/a> <\/p>\n<hr>\n<h2>NAME <a name=\"NAME\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">stoppedrules \u2212 The Shorewall file that governs what traffic flows through the firewall while it is in the &#8216;stopped&#8217; state.<\/p>\n<h2>SYNOPSIS <a name=\"SYNOPSIS\"><\/a> <\/h2>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"11%\"><\/td>\n<td width=\"46%\">\n<p style=\"margin-top: 1em\"><b>\/etc\/shorewall[6]\/stoppedrules<\/b><\/p>\n<\/td>\n<td width=\"43%\"> <\/td>\n<\/tr>\n<\/table>\n<h2>DESCRIPTION <a name=\"DESCRIPTION\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">This file is used to define the hosts that are accessible when the firewall is stopped or is being stopped.<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><b><big>Warning<\/big><\/b> <br \/> Changes to this file do not take effect until after the next <b>shorewall start<\/b>, <b>shorewall reload<\/b>, <b>shorewall restart<\/b>, or <b>shorewall compile<\/b> command.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\">The columns in the file are as follows (where the column name is followed by a different name in parentheses, the different name is used in the alternate specification syntax).<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>ACTION<\/b> \u2212 <b>ACCEPT|NOTRACK|DROP<\/b><\/p>\n<p style=\"margin-left:17%;\">Determines the disposition of the packet.<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><b>ACCEPT<\/b> means that the packet will be accepted.<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><b>NOTRACK<\/b> indicates that no conntrack entry should be created for the packet. <b>NOTRACK<\/b> does not imply <b>ACCEPT<\/b>.<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><b>DROP<\/b> was added in Shorewall 4.6.0 and causes the packet to be dropped in the raw table&#8217;s PREROUTING chain.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>SOURCE<\/b> \u2212 [<b>\u2212<\/b>|[$FW|<i>interface<\/i>]|[{$FW|interface}[<i>:address<\/i>[,<i>address<\/i>]&#8230;]]|[<i>address<\/i>[,<i>address<\/i>]&#8230;]<\/p>\n<p style=\"margin-left:17%;\"><b>$FW<\/b> matches packets originating on the firewall itself, while <i>interface<\/i> specifies packets arriving on the named interface.<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">This column may also include a comma\u2212separated list of IP\/subnet addresses. If your kernel and iptables include iprange match support, IP address ranges are also allowed. Ipsets and exclusion are also supported. When <b>$FW<\/b> or interface are specified, the list must be preceded by a colon (&#8220;:&#8221;).<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">If left empty or supplied as &#8220;\u2212&#8221;, 0.0.0.0\/0 is assumed.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>DEST<\/b> \u2212 [<b>\u2212<\/b>|[$FW|<i>interface<\/i>]|[{$FW|interface}[<i>:address<\/i>[,<i>address<\/i>]&#8230;]]|[<i>address<\/i>[,<i>address<\/i>]&#8230;]<\/p>\n<p style=\"margin-left:17%;\"><b>$FW<\/b> matches packets addressed the firewall itself, while <i>interface<\/i> specifies packets arriving on the named interface. Neither may be specified if the target is <b>NOTRACK<\/b> or <b>DROP<\/b>.<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">This column may also include a comma\u2212separated list of IP\/subnet addresses. If your kernel and iptables include iprange match support, IP address ranges are also allowed. Ipsets and exclusion are also supported. When <b>$FW<\/b> or interface are specified, the list must be preceded by a colon (&#8220;:&#8221;).<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">If left empty or supplied as &#8220;\u2212&#8221;, 0.0.0.0\/0 is assumed.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>PROTO (Optional)<\/b> \u2013 <i>protocol\u2212name\u2212or\u2212number<\/i>[,&#8230;]<\/p>\n<p style=\"margin-left:17%;\">Protocol.<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">Beginning with Shorewall 4.5.12, this column can accept a comma\u2212separated list of protocols.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>DPORT<\/b> \u2013 <i>service\u2212name\/port\u2212number\u2212list<\/i><\/p>\n<p style=\"margin-left:17%;\">Optional. A comma\u2212separated list of port numbers and\/or service names from \/etc\/services. May also include port ranges of the form <i>low\u2212port<\/i>:<i>high\u2212port<\/i> if your kernel and iptables include port range support.<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">This column was formerly labelled DEST PORT(S).<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>SPORT<\/b> \u2013 <i>service\u2212name\/port\u2212number\u2212list<\/i><\/p>\n<p style=\"margin-left:17%;\">Optional. A comma\u2212separated list of port numbers and\/or service names from \/etc\/services. May also include port ranges of the form <i>low\u2212port<\/i>:<i>high\u2212port<\/i> if your kernel and iptables include port range support.<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">Beginning with Shorewall 4.5.15, you may place &#8216;=&#8217; in this column, provided that the DPORT column is non\u2212empty. This causes the rule to match when either the source port or the destination port in a packet matches one of the ports specified in DEST PORTS(S). Use of &#8216;=&#8217; requires multi\u2212port match in your iptables and kernel.<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">This column was formerly labelled SOURCE PORT(S).<\/p>\n<h2>FILES <a name=\"FILES\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">\/etc\/shorewall\/stoppedrules<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\">\/etc\/shorewall6\/stoppedrules<\/p>\n<h2>SEE ALSO <a name=\"SEE ALSO\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\"><b><font color=\"#0000FF\">https:\/\/shorewall.org\/starting_and_stopping_shorewall.htm<\/font><\/b> <small><font color=\"#000000\">[1]<\/font><\/small><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b><font color=\"#0000FF\">https:\/\/shorewall.org\/configuration_file_basics.htm#Pairs<\/font><\/b> <small><font color=\"#000000\">[2]<\/font><\/small><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">shorewall(8)<\/font><\/p>\n<h2>NOTES <a name=\"NOTES\"><\/a> <\/h2>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"12%\"><\/td>\n<td width=\"3%\">\n<p style=\"margin-top: 1em\"><font color=\"#000000\">1.<\/font><\/p>\n<\/td>\n<td width=\"2%\"><\/td>\n<td width=\"83%\">\n<p style=\"margin-top: 1em\"><font color=\"#000000\">https:\/\/shorewall.org\/starting_and_stopping_shorewall.htm<\/font><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:17%;\"><font color=\"#000000\">https:\/\/shorewall.org\/starting_and_stopping_shorewall.htm<\/font><\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"12%\"><\/td>\n<td width=\"3%\">\n<p style=\"margin-top: 1em\"><font color=\"#000000\">2.<\/font><\/p>\n<\/td>\n<td width=\"2%\"><\/td>\n<td width=\"83%\">\n<p style=\"margin-top: 1em\"><font color=\"#000000\">https:\/\/shorewall.org\/configuration_file_basics.htm#Pairs<\/font><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:17%;\"><font color=\"#000000\">https:\/\/shorewall.org\/configuration_file_basics.htm#Pairs<\/font><\/p>\n<hr>\n","protected":false},"excerpt":{"rendered":"<p>  stoppedrules \u2212 The Shorewall file that governs what traffic flows through the firewall while it is in the &#8216;stopped&#8217; state. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[959],"tags":[961,1291,1376],"class_list":["post-4367","post","type-post","status-publish","format-standard","hentry","category-5-formatos-de-ficheros","tag-961","tag-man5","tag-shorewall-stoppedrules"],"gutentor_comment":0,"_links":{"self":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/posts\/4367","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/comments?post=4367"}],"version-history":[{"count":0,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/posts\/4367\/revisions"}],"wp:attachment":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/media?parent=4367"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/categories?post=4367"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/tags?post=4367"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}