{"id":4552,"date":"2022-12-20T18:09:02","date_gmt":"2022-12-20T21:09:02","guid":{"rendered":"http:\/\/lode.uno\/linux-man\/index.php\/2022\/12\/20\/shorewallinterface-man5\/"},"modified":"2022-12-20T18:09:02","modified_gmt":"2022-12-20T21:09:02","slug":"shorewallinterface-man5","status":"publish","type":"post","link":"https:\/\/lode.uno\/linux-man\/2022\/12\/20\/shorewallinterface-man5\/","title":{"rendered":"SHOREWALL&minus;INTERFACE (man5)"},"content":{"rendered":"<h1 align=\"center\">SHOREWALL\u2212INTERFACE<\/h1>\n<p> <a href=\"#NAME\">NAME<\/a><br \/> <a href=\"#SYNOPSIS\">SYNOPSIS<\/a><br \/> <a href=\"#DESCRIPTION\">DESCRIPTION<\/a><br \/> <a href=\"#EXAMPLE\">EXAMPLE<\/a><br \/> <a href=\"#FILES\">FILES<\/a><br \/> <a href=\"#SEE ALSO\">SEE ALSO<\/a><br \/> <a href=\"#NOTES\">NOTES<\/a> <\/p>\n<hr>\n<h2>NAME <a name=\"NAME\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">interfaces \u2212 Shorewall interfaces file<\/p>\n<h2>SYNOPSIS <a name=\"SYNOPSIS\"><\/a> <\/h2>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"11%\"><\/td>\n<td width=\"43%\">\n<p style=\"margin-top: 1em\"><b>\/etc\/shorewall[6]\/interfaces<\/b><\/p>\n<\/td>\n<td width=\"46%\"> <\/td>\n<\/tr>\n<\/table>\n<h2>DESCRIPTION <a name=\"DESCRIPTION\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">The interfaces file serves to define the firewall&#8217;s network interfaces to Shorewall. The order of entries in this file is not significant in determining zone composition.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\">Beginning with Shorewall 4.5.3, the interfaces file supports two different formats:<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\">FORMAT 1 (default \u2212 deprecated)<\/p>\n<p style=\"margin-left:17%;\">There is a BROADCAST column which can be used to specify the broadcast address associated with the interface.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\">FORMAT 2<\/p>\n<p style=\"margin-left:17%;\">The BROADCAST column is omitted.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\">The format is specified by a line as follows:<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>?FORMAT {1|2}<\/b><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\">The columns in the file are as follows.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>ZONE<\/b> \u2212 <i>zone\u2212name<\/i><\/p>\n<p style=\"margin-left:17%;\">Zone for this interface. Must match the name of a zone declared in \/etc\/shorewall\/zones. You may not list the firewall zone in this column.<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">If the interface serves multiple zones that will be defined in the <b><font color=\"#0000FF\">shorewall\u2212hosts<\/font><\/b> <small><font color=\"#000000\">[1]<\/font><\/small> <font color=\"#000000\">(5) file, you should place &#8220;\u2212&#8221; in this column.<\/font><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><font color=\"#000000\">If there are multiple interfaces to the same zone, you must list them in separate entries.<\/font><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><font color=\"#000000\">Example:<\/font><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><font color=\"#000000\">#ZONE INTERFACE BROADCAST <br \/> loc eth1 \u2212 <br \/> loc eth2 \u2212<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\"><b>INTERFACE<\/b> \u2212 <i>interface<\/i><b>[:<\/b><i>port<\/i><b>]<\/b><\/font><\/p>\n<p style=\"margin-left:17%;\"><font color=\"#000000\">Logical name of interface. Each interface may be listed only once in this file. You may NOT specify the name of a &#8220;virtual&#8221; interface (e.g., eth0:0) here; see<\/font> <b><font color=\"#0000FF\">https:\/\/shorewall.org\/FAQ.htm#faq18<\/font><\/b> <small><font color=\"#000000\">[2]<\/font><\/small> <font color=\"#000000\">. If the <b>physical<\/b> option is not specified, then the logical name is also the name of the actual interface.<\/font><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><font color=\"#000000\">You may use wildcards here by specifying a prefix followed by the plus sign (&#8220;+&#8221;). For example, if you want to make an entry that applies to all PPP interfaces, use &#8216;ppp+&#8217;; that would match ppp0, ppp1, ppp2, &#8230;<\/font><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><font color=\"#000000\">When using Shorewall versions before 4.1.4, care must be exercised when using wildcards where there is another zone that uses a matching specific interface. See<\/font> <b><font color=\"#0000FF\">shorewall\u2212nesting<\/font><\/b> <small><font color=\"#000000\">[3]<\/font><\/small> <font color=\"#000000\">(5) for a discussion of this problem.<\/font><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><font color=\"#000000\">Shorewall allows &#8216;+&#8217; as an interface name, but that usage is deprecated. A better approach is to specify &#8216;<b>physical<\/b>=+&#8217; in the OPTIONS column (see below).<\/font><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><font color=\"#000000\">There is no need to define the loopback interface (lo) in this file.<\/font><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><font color=\"#000000\">If a <i>port<\/i> is given, then the <i>interface<\/i> must have been defined previously with the <b>bridge<\/b> option. The OPTIONS column may not contain the following options when a <i>port<\/i> is given.<\/font><\/p>\n<p style=\"margin-left:23%;\"><font color=\"#000000\">arp_filter <br \/> arp_ignore <br \/> bridge <br \/> log_martians <br \/> mss <br \/> optional <br \/> proxyarp <br \/> required <br \/> routefilter <br \/> sourceroute <br \/> upnp <br \/> wait<\/font><\/p>\n<p style=\"margin-left:17%;\"><font color=\"#000000\">Beginning with Shorewall 4.5.17, if you specify a zone for the &#8216;lo&#8217; interface, then that zone must be defined as type <b>local<\/b> in<\/font> <b><font color=\"#0000FF\">shorewall6\u2212zones<\/font><\/b> <small><font color=\"#000000\">[4]<\/font><\/small> <font color=\"#000000\">(5).<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\"><b>BROADCAST<\/b> (Optional) \u2212 {<b>\u2212<\/b>|<b>detect<\/b>|<i>address<\/i>[,<i>address<\/i>]&#8230;}<\/font><\/p>\n<p style=\"margin-left:17%;\"><font color=\"#000000\">Only available if FORMAT 1.<\/font><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><font color=\"#000000\">If you use the special value <b>detect<\/b>, Shorewall will detect the broadcast address(es) for you if your iptables and kernel include Address Type Match support.<\/font><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><font color=\"#000000\">If your iptables and\/or kernel lack Address Type Match support then you may list the broadcast address(es) for the network(s) to which the interface belongs. For P\u2212T\u2212P interfaces, this column is left blank. If the interface has multiple addresses on multiple subnets then list the broadcast addresses as a comma\u2212separated list.<\/font><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><font color=\"#000000\">If you don&#8217;t want to give a value for this column but you want to enter a value in the OPTIONS column, enter <b>\u2212<\/b> in this column.<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\"><b>OPTIONS<\/b> (Optional) \u2212 [<i>option<\/i>[<b>,<\/b><i>option<\/i>]&#8230;]<\/font><\/p>\n<p style=\"margin-left:17%;\"><font color=\"#000000\">A comma\u2212separated list of options from the following list. The order in which you list the options is not significant but the list should have no embedded white\u2212space.<\/font><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><font color=\"#000000\"><b>accept_ra<\/b>[={0|1|2}]<\/font><\/p>\n<p style=\"margin-left:23%;\"><font color=\"#000000\">IPv6 only; added in Shorewall 4.5.16. Values are:<\/font><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><font color=\"#000000\">0<\/font><\/p>\n<p style=\"margin-left:29%;\"><font color=\"#000000\">Do not accept Router Advertisements.<\/font><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><font color=\"#000000\">1<\/font><\/p>\n<p style=\"margin-left:29%;\"><font color=\"#000000\">Accept Route Advertisements if forwarding is disabled.<\/font><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><font color=\"#000000\">2<\/font><\/p>\n<p style=\"margin-left:29%;\"><font color=\"#000000\">Overrule forwarding behavior. Accept Route Advertisements even if forwarding is enabled.<\/font><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><font color=\"#000000\">If the option is specified without a value, then the value 1 is assumed.<\/font><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><font color=\"#000000\"><b><big>Note<\/big><\/b> <br \/> This option does not work with a wild\u2212card <b>physical<\/b> name (e.g., eth0.+). Beginning with Shorewall 5.1.10, If this option is specified, a warning is issued and the option is ignored.<\/font><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><font color=\"#000000\"><b><big>arp_filter[={0|1}]<\/big><\/b><\/font><\/p>\n<p style=\"margin-left:23%;\"><font color=\"#000000\"><big>IPv4 only. If specified, this interface will only respond to ARP who\u2212has requests for IP addresses configured on the interface. If not specified, the interface can respond to ARP who\u2212has requests for IP addresses on any of the firewall&#8217;s interface. The interface must be up when Shorewall is started.<\/big><\/font><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><font color=\"#000000\"><big>Only those interfaces with the <b>arp_filter<\/b> option will have their setting changed; the value assigned to the setting will be the value specified (if any) or 1 if no value is given.<\/big><\/font><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><font color=\"#000000\"><big><b><big>Note<\/big><\/b> <br \/> This option does not work with a wild\u2212card <b>physical<\/b> name (e.g., eth0.+). Beginning with Shorewall 5.1.10, If this option is specified, a warning is issued and the option is ignored.<\/big><\/font><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><font color=\"#000000\"><big><b><big>arp_ignore<\/big><\/b><big>[=<i>number<\/i>]<\/big><\/big><\/font><\/p>\n<p style=\"margin-left:23%;\"><font color=\"#000000\"><big><big>IPv4 only. If specified, this interface will respond to arp requests based on the value of <i>number<\/i> (defaults to 1).<\/big><\/big><\/font><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><font color=\"#000000\"><big><big>1 \u2212 reply only if the target IP address is local address configured on the incoming interface<\/big><\/big><\/font><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><font color=\"#000000\"><big><big>2 \u2212 reply only if the target IP address is local address configured on the incoming interface and the sender&#8217;s IP address is part from same subnet on this interface&#8217;s address<\/big><\/big><\/font><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><font color=\"#000000\"><big><big>3 \u2212 do not reply for local addresses configured with scope host, only resolutions for global and link<\/big><\/big><\/font><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><font color=\"#000000\"><big><big>4\u22127 \u2212 reserved<\/big><\/big><\/font><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><font color=\"#000000\"><big><big>8 \u2212 do not reply for all local addresses<\/big><\/big><\/font><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><font color=\"#000000\"><big><big><b><big>Note<\/big><\/b> <br \/> This option does not work with a wild\u2212card <b>physical<\/b> name (e.g., eth0.+). Beginning with Shorewall 5.1.10, If this option is specified, a warning is issued and the option is ignored.<\/big><\/big><\/font><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><font color=\"#000000\"><big><big><b><big>Warning<\/big><\/b> <br \/> Do not specify <b>arp_ignore<\/b> for any interface involved in<\/big><\/big><\/font> <big><big><b><font color=\"#0000FF\">Proxy ARP<\/font><\/b><\/big> <font color=\"#000000\">[5] <big>.<\/big><\/font><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><font color=\"#000000\"><big><b><big>blacklist<\/big><\/b><\/big><\/font><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><font color=\"#000000\"><big><big>Checks packets arriving on this interface against the<\/big><\/big><\/font> <big><big><b><font color=\"#0000FF\">shorewall\u2212blacklist<\/font><\/b><\/big> <font color=\"#000000\">[6] <big>(5) file.<\/big><\/font><\/big><\/big><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><big><big><font color=\"#000000\"><big>Beginning with Shorewall 4.4.13:<\/big><\/font><\/big><\/big><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><big><big><font color=\"#000000\"><big>\u2022 If a <i>zone<\/i> is given in the ZONES column, then the behavior is as if <b>blacklist<\/b> had been specified in the IN_OPTIONS column of<\/big><\/font> <big><b><font color=\"#0000FF\">shorewall\u2212zones<\/font><\/b><\/big> <font color=\"#000000\">[4] <big>(5).<\/big><\/font><\/big><\/big><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><big><big><font color=\"#000000\"><big>\u2022 Otherwise, the option is ignored with a warning: <b>WARNING: The &#8216;blacklist&#8217; option is ignored on multi\u2212zone interfaces<\/b><\/big><\/font><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><font color=\"#000000\"><big><b>bridge<\/b><\/big><\/font><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><font color=\"#000000\"><big>Designates the interface as a bridge. Beginning with Shorewall 4.4.7, setting this option also sets <b>routeback<\/b>.<\/big><\/font><\/big><\/big><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><big><big><font color=\"#000000\"><big><b><big>Note<\/big><\/b> <br \/> If you have a bridge that you don&#8217;t intend to define bport zones on, then it is best to omit this option and simply specify <b>routeback<\/b>.<\/big><\/font><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><font color=\"#000000\"><big><b><big>dbl={none|src|dst|src\u2212dst}<\/big><\/b><\/big><\/font><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><font color=\"#000000\"><big><big>Added in Shorewall 5.0.10. This option defined whether or not dynamic blacklisting is applied to packets entering the firewall through this interface and whether the source address and\/or destination address is to be compared against the ipset\u2212based dynamic blacklist (DYNAMIC_BLACKLIST=ipset&#8230; in<\/big><\/big><\/font> <big><big><b><font color=\"#0000FF\">shorewall.conf(5)<\/font><\/b><\/big> <font color=\"#000000\">[7] <big>). The default is determine by the setting of DYNAMIC_BLACKLIST:<\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><big><big><big><font color=\"#000000\"><big>DYNAMIC_BLACKLIST=No<\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:29%;\"><big><big><big><font color=\"#000000\"><big>Default is <b>none<\/b> (e.g., no dynamic blacklist checking).<\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><big><big><big><font color=\"#000000\"><big>DYNAMIC_BLACKLIST=Yes<\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:29%;\"><big><big><big><font color=\"#000000\"><big>Default is <b>src<\/b> (e.g., the source IP address is checked).<\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><big><big><big><font color=\"#000000\"><big>DYNAMIC_BLACKLIST=ipset[\u2212only]<\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:29%;\"><big><big><big><font color=\"#000000\"><big>Default is <b>src<\/b>.<\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><big><big><big><font color=\"#000000\"><big>DYNAMIC_BLACKLIST=ipset[\u2212only],src\u2212dst&#8230;<\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:29%;\"><big><big><big><font color=\"#000000\"><big>Default is <b>src\u2212dst<\/b> (e.g., the source IP addresses in checked against the ipset on input and the destination IP address is checked against the ipset on packets originating from the firewall and leaving through this interface).<\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><big><big><big><font color=\"#000000\"><big>The normal setting for this option will be <b>dst<\/b> or <b>none<\/b> for internal interfaces and <b>src<\/b> or <b>src\u2212dst<\/b> for Internet\u2212facing interfaces.<\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><big><font color=\"#000000\"><big><b>destonly<\/b><\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><font color=\"#000000\"><big>Added in Shorewall 4.5.17. Causes the compiler to omit rules to handle traffic from this interface.<\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><big><font color=\"#000000\"><big><b>dhcp<\/b><\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><font color=\"#000000\"><big>Specify this option when any of the following are true:<\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><big><big><big><font color=\"#000000\"><big>1. the interface gets its IP address via DHCP<\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><big><big><big><font color=\"#000000\"><big>2. the interface is used by a DHCP server running on the firewall<\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><big><big><big><font color=\"#000000\"><big>3. the interface has a static IP but is on a LAN segment with lots of DHCP clients.<\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><big><big><big><font color=\"#000000\"><big>4. the interface is a<\/big><\/font> <big><b><font color=\"#0000FF\">simple bridge<\/font><\/b><\/big> <font color=\"#000000\">[8] <big>with a DHCP server on one port and DHCP clients on another port.<\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:35%; margin-top: 1em\"><big><big><big><font color=\"#000000\"><big><b><big>Note<\/big><\/b> <br \/> If you use<\/big><\/font> <big><b><font color=\"#0000FF\">Shorewall\u2212perl for firewall\/bridging<\/font><\/b><\/big> <font color=\"#000000\">[9] <big>, then you need to include DHCP\u2212specific rules in<\/big><\/font> <big><b><font color=\"#0000FF\">shorewall\u2212rules<\/font><\/b><\/big> <font color=\"#000000\">[10] <big>(5). DHCP uses UDP ports 67 and 68.<\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><big><big><big><font color=\"#000000\"><big>This option allows DHCP datagrams to enter and leave the interface.<\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><big><font color=\"#000000\"><big><b><big>forward<\/big><\/b><big>[={0|1}]<\/big><\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><font color=\"#000000\"><big><big>IPv6 only Sets the \/proc\/sys\/net\/ipv6\/conf\/interface\/forwarding option to the specified value. If no value is supplied, then 1 is assumed.<\/big><\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><big><big><big><font color=\"#000000\"><big><big><b><big>Note<\/big><\/b> <br \/> This option does not work with a wild\u2212card <b>physical<\/b> name (e.g., eth0.+). Beginning with Shorewall 5.1.10, If this option is specified, a warning is issued and the option is ignored.<\/big><\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><big><font color=\"#000000\"><big><big><b><big>ignore[=1]<\/big><\/b><\/big><\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><font color=\"#000000\"><big><big><big>When specified, causes the generated script to ignore up\/down events from Shorewall\u2212init for this device. Additionally, the option exempts the interface from hairpin filtering. When &#8216;=1&#8217; is omitted, the ZONE column must contain &#8216;\u2212&#8217; and <b>ignore<\/b> must be the only OPTION.<\/big><\/big><\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><big><big><big><font color=\"#000000\"><big><big><big>Beginning with Shorewall 4.5.5, may be specified as &#8216;<b>ignore=1<\/b>&#8216; which only causes the generated script to ignore up\/down events from Shorewall\u2212init; hairpin filtering is still applied. In this case, the above restrictions on the ZONE and OPTIONS columns are lifted.<\/big><\/big><\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><big><font color=\"#000000\"><big><big><big><b>loopback<\/b><\/big><\/big><\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><font color=\"#000000\"><big><big><big>Added in Shorewall 4.6.6. Designates the interface as the loopback interface. This option is assumed if the interface&#8217;s physical name is &#8216;lo&#8217;. Only one interface man have the <b>loopback<\/b> option specified.<\/big><\/big><\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><big><font color=\"#000000\"><big><big><big><b>logmartians[={0|1}]<\/b><\/big><\/big><\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><font color=\"#000000\"><big><big><big>IPv4 only. Turn on kernel martian logging (logging of packets with impossible source addresses. It is strongly suggested that if you set <b>routefilter<\/b> on an interface that you also set <b>logmartians<\/b>. Even if you do not specify the <b>routefilter<\/b> option, it is a good idea to specify <b>logmartians<\/b> because your distribution may have enabled route filtering without you knowing it.<\/big><\/big><\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><big><big><big><font color=\"#000000\"><big><big><big>Only those interfaces with the <b>logmartians<\/b> option will have their setting changed; the value assigned to the setting will be the value specified (if any) or 1 if no value is given.<\/big><\/big><\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><big><big><big><font color=\"#000000\"><big><big><big>To find out if route filtering is set on a given <i>interface<\/i>, check the contents of \/proc\/sys\/net\/ipv4\/conf\/<i>interface<\/i>\/rp_filter \u2212 a non\u2212zero value indicates that route filtering is enabled.<\/big><\/big><\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><big><big><big><font color=\"#000000\"><big><big><big>Example:<\/big><\/big><\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><big><big><big><font color=\"#000000\"><big><big><big>teastep@lists:~$ <b>cat \/proc\/sys\/net\/ipv4\/conf\/eth0\/rp_filter<\/b> <br \/> 1 <br \/> teastep@lists:~$<\/big><\/big><\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><big><big><big><font color=\"#000000\"><big><big><big><b><big>Note<\/big><\/b> <br \/> This option does not work with a wild\u2212card <b>physical<\/b> name (e.g., eth0.+). Beginning with Shorewall 5.1.10, If this option is specified, a warning is issued and the option is ignored.<\/big><\/big><\/big><\/font><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><font color=\"#000000\"><big><big><big>This option may also be enabled globally in the<\/big><\/big><\/big><\/font> <big><big><big><b><font color=\"#0000FF\">shorewall.conf<\/font><\/b><\/big> <font color=\"#000000\">[7] <big>(5) file.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><big><big><big><font color=\"#000000\"><big><b><big>maclist<\/big><\/b><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><big><big><font color=\"#000000\"><big><big>Connection requests from this interface are compared against the contents of<\/big><\/big><\/font> <big><big><b><font color=\"#0000FF\">shorewall\u2212maclist<\/font><\/b><\/big> <font color=\"#000000\">[11] <big>(5). If this option is specified, the interface must be an Ethernet NIC and must be up before Shorewall is started.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><big><big><big><big><font color=\"#000000\"><big><b>mss=<\/b><i>number<\/i><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><big><big><big><font color=\"#000000\"><big>Added in Shorewall 4.0.3. Causes forwarded TCP SYN packets entering or leaving on this interface to have their MSS field set to the specified <i>number<\/i>.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><big><big><big><big><font color=\"#000000\"><big><b>nets=(<\/b><i>net<\/i><b>[,&#8230;])<\/b><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><big><big><big><font color=\"#000000\"><big>Limit the zone named in the ZONE column to only the listed networks. The parentheses may be omitted if only a single <i>net<\/i> is given (e.g., nets=192.168.1.0\/24). Limited broadcast to the zone is supported. Beginning with Shorewall 4.4.1, multicast traffic to the zone is also supported.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><big><big><big><big><font color=\"#000000\"><big><b>nets=dynamic<\/b><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><big><big><big><font color=\"#000000\"><big>Defines the zone as dynamic. Requires ipset match support in your iptables and kernel. See<\/big><\/font> <big><b><font color=\"#0000FF\">https:\/\/shorewall.org\/Dynamic.html<\/font><\/b><\/big> <font color=\"#000000\">[12] <big>for further information.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><big><big><big><big><font color=\"#000000\"><big><b>nodbl<\/b><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><big><big><big><font color=\"#000000\"><big>Added in Shorewall 5.0.8. When specified, dynamic blacklisting is disabled on the interface. Beginning with Shorewall 5.0.10, <b>nodbl<\/b> is equivalent to <b>dbl=none<\/b>.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><big><big><big><big><font color=\"#000000\"><big><b>nosmurfs<\/b><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><big><big><big><font color=\"#000000\"><big>IPv4 only. Filter packets for smurfs (packets with a broadcast address as the source).<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><big><big><big><big><big><big><font color=\"#000000\"><big>Smurfs will be optionally logged based on the setting of SMURF_LOG_LEVEL in<\/big><\/font> <big><b><font color=\"#0000FF\">shorewall.conf<\/font><\/b><\/big> <font color=\"#000000\">[7] <big>(5). After logging, the packets are dropped.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><big><big><big><big><font color=\"#000000\"><big>omitanycast<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><big><big><big><font color=\"#000000\"><big>IPv6 only. Added in Shorewall 5.2.8.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><big><big><big><big><big><big><font color=\"#000000\"><big>Shorewall6 has traditionally generated rules for IPv6 <i>anycast<\/i> addresses. These rules include:<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><big><big><big><big><big><big><font color=\"#000000\"><big>1. Packets with these destination IP addresses are dropped by REJECT rules.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><big><big><big><big><big><big><font color=\"#000000\"><big>2. Packets with these source IP addresses are dropped by the &#8216;nosmurfs&#8217; interface option and by the &#8216;dropSmurfs&#8217; action.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><big><big><big><big><big><big><font color=\"#000000\"><big>3. Packets with these destination IP addresses are not logged during policy enforcement.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><big><big><big><big><big><big><font color=\"#000000\"><big>4. Packets with these destination IP addresses are processes by the &#8216;Broadcast&#8217; action.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><big><big><big><big><big><big><font color=\"#000000\"><big>This can be inhibited for individual interfaces by specifying <b>noanycast<\/b> for those interfaces.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><big><big><big><big><big><big><font color=\"#000000\"><big><b><big>Note<\/big><\/b> <br \/> RFC 2526 describes IPv6 subnet anycast addresses. The RFC makes a distinction between subnets with &#8220;IPv6 address types required to have 64\u2212bit interface identifiers in EUI\u221264 format&#8221; and all other subnets. When generating these anycast addresses, the Shorewall compiler does not make this distinction and unconditionally assumes that the last 128 addresses in the subnet are reserved as anycast addresses.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><big><big><big><big><font color=\"#000000\"><big><b><big>optional<\/big><\/b><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><big><big><big><font color=\"#000000\"><big><big>This option indicates that the firewall should be able to start, even if the interface is not usable for handling traffic. It allows use of the <b>enable<\/b> and <b>disable<\/b> commands on the interface.<\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><big><big><big><big><big><big><font color=\"#000000\"><big><big>When <b>optional<\/b> is specified for an interface, Shorewall will be silent when:<\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><big><big><big><big><big><big><font color=\"#000000\"><big><big>\u2022 a \/proc\/sys\/net\/ipv4\/conf\/ \/proc\/sys\/net\/ipv6\/conf\/ entry for the interface cannot be modified (including for proxy ARP or proxy NDP).<\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><big><big><big><big><big><big><font color=\"#000000\"><big><big>\u2022 The first address of the interface cannot be obtained.<\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><big><big><big><big><big><big><font color=\"#000000\"><big><big>\u2022 The gateway of the interface can not be obtained (provider interface).<\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><big><big><big><big><big><big><font color=\"#000000\"><big><big>\u2022 The interface has been disabled using the <b>disable<\/b> command.<\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><big><big><big><big><big><big><font color=\"#000000\"><big><big>May not be specified with <b>required<\/b>.<\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><big><big><big><big><font color=\"#000000\"><big><big><b>physical<\/b>=<i>name<\/i><\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><big><big><big><font color=\"#000000\"><big><big>Added in Shorewall 4.4.4. When specified, the interface or port name in the INTERFACE column is a logical name that refers to the name given in this option. It is useful when you want to specify the same wildcard port name on two or more bridges. See<\/big><\/big><\/font> <big><big><b><font color=\"#0000FF\">https:\/\/shorewall.org\/bridge\u2212Shorewall\u2212perl.html#Multiple<\/font><\/b><\/big> <font color=\"#000000\">[13] <big>.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><big><big><big><big><big><big><big><font color=\"#000000\"><big>If the <i>interface<\/i> name is a wildcard name (ends with &#8216;+&#8217;), then the physical <i>name<\/i> must also end in &#8216;+&#8217;. The physical <i>name<\/i> may end in &#8216;+&#8217; (or be exactly &#8216;+&#8217;) when the <i>interface<\/i> name is not a wildcard name.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><big><big><big><big><big><big><big><font color=\"#000000\"><big>If <b>physical<\/b> is not specified, then it&#8217;s value defaults to the <i>interface<\/i> name.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><big><big><big><big><big><font color=\"#000000\"><big><b>proxyarp[={0|1}]<\/b><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><big><big><big><big><font color=\"#000000\"><big>IPv4 only. Sets \/proc\/sys\/net\/ipv4\/conf\/<i>interface<\/i>\/proxy_arp. Do NOT use this option if you are employing Proxy ARP through entries in<\/big><\/font> <big><b><font color=\"#0000FF\">shorewall\u2212proxyarp<\/font><\/b><\/big> <font color=\"#000000\">[14] <big>(5). This option is intended solely for use with Proxy ARP sub\u2212networking as described at:<\/big><\/font> <big><b><font color=\"#0000FF\">http:\/\/tldp.org\/HOWTO\/Proxy\u2212ARP\u2212Subnet\/index.html.<\/font><\/b><\/big> <font color=\"#000000\">[15]<\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><big><big><big><big><big><big><big><font color=\"#000000\"><b><big><big>Note<\/big><\/big><\/b> <big><br \/> This option does not work with a wild\u2212card <b>physical<\/b> name (e.g., eth0.+). Beginning with Shorewall 5.1.10, If this option is specified, a warning is issued and the option is ignored.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><big><big><big><big><font color=\"#000000\"><big>Only those interfaces with the <b>proxyarp<\/b> option will have their setting changed; the value assigned to the setting will be the value specified (if any) or 1 if no value is given.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><big><big><big><big><big><font color=\"#000000\"><big><b><big>proxyndp<\/big><\/b><big>[={0|1}]<\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><big><big><big><big><font color=\"#000000\"><big><big>IPv6 only. Sets \/proc\/sys\/net\/ipv6\/conf\/<i>interface<\/i>\/proxy_ndp.<\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><big><big><big><big><big><big><big><font color=\"#000000\"><big><big><b><big>Note<\/big><\/b> <br \/> This option does not work with a wild\u2212card <b>physical<\/b> name (e.g., eth0.+). Beginning with Shorewall 5.1.10, If this option is specified, a warning is issued and the option is ignored.<\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><big><big><big><big><font color=\"#000000\"><big><big>Only those interfaces with the <b>proxyndp<\/b> option will have their setting changed; the value assigned to the setting will be the value specified (if any) or 1 if no value is given.<\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><big><big><big><big><big><font color=\"#000000\"><big><big><b><big>required<\/big><\/b><\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><big><big><big><big><font color=\"#000000\"><big><big><big>Added in Shorewall 4.4.10. If this option is set, the firewall will fail to start if the interface is not usable. May not be specified together with <b>optional<\/b>.<\/big><\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><big><big><big><big><big><font color=\"#000000\"><big><big><big><b>routeback[={0|1}]<\/b><\/big><\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><big><big><big><big><font color=\"#000000\"><big><big><big>If specified, indicates that Shorewall should include rules that allow traffic arriving on this interface to be routed back out that same interface. This option is also required when you have used a wildcard in the INTERFACE column if you want to allow traffic between the interfaces that match the wildcard.<\/big><\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><big><big><big><big><big><big><big><font color=\"#000000\"><big><big><big>Beginning with Shorewall 4.4.20, if you specify this option, then you should also specify either <b>sfilter<\/b> (see below) or <b>routefilter<\/b> on all interfaces (see below).<\/big><\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><big><big><big><big><big><big><big><font color=\"#000000\"><big><big><big>Beginning with Shorewall 4.5.18, you may specify this option to explicitly reset (e.g., <b>routeback=0<\/b>). This can be used to override Shorewall&#8217;s default setting for bridge devices which is <b>routeback=1<\/b>.<\/big><\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><big><big><big><big><big><font color=\"#000000\"><big><big><big><b>routefilter[={0|1|2}]<\/b><\/big><\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><big><big><big><big><font color=\"#000000\"><big><big><big>IPv4 only. Turn on kernel route filtering for this interface (anti\u2212spoofing measure).<\/big><\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><big><big><big><big><big><big><big><font color=\"#000000\"><big><big><big>Only those interfaces with the <b>routefilter<\/b> option will have their setting changes; the value assigned to the setting will be the value specified (if any) or 1 if no value is given.<\/big><\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><big><big><big><big><big><big><big><font color=\"#000000\"><big><big><big>The value 2 is only available with Shorewall 4.4.5.1 and later when the kernel version is 2.6.31 or later. It specifies a loose form of reverse path filtering.<\/big><\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><big><big><big><big><big><big><big><font color=\"#000000\"><big><big><big><b><big>Note<\/big><\/b> <br \/> This option does not work with a wild\u2212card <b>physical<\/b> name (e.g., eth0.+). Beginning with Shorewall 5.1.10, If this option is specified, a warning is issued and the option is ignored.<\/big><\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><big><big><big><big><font color=\"#000000\"><big><big><big>This option can also be enabled globally via the ROUTE_FILTER option in the<\/big><\/big><\/big><\/font> <big><big><big><b><font color=\"#0000FF\">shorewall.conf<\/font><\/b><\/big> <font color=\"#000000\">[7] <big>(5) file.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big><b><big>Important<\/big><\/b> <br \/> If ROUTE_FILTER=Yes in<\/big><\/font> <big><b><font color=\"#0000FF\">shorewall.conf<\/font><\/b><\/big> <font color=\"#000000\">[7] <big>(5), or if your distribution sets net.ipv4.conf.all.rp_filter=1 in \/etc\/sysctl.conf, then setting <b>routefilter<\/b>=0 in an <i>interface<\/i> entry will not disable route filtering on that <i>interface<\/i>! The effective setting for an <i>interface<\/i> is the maximum of the contents of \/proc\/sys\/net\/ipv4\/conf\/all\/rp_filter and the routefilter setting specified in this file (\/proc\/sys\/net\/ipv4\/conf\/<i>interface<\/i>\/rp_filter).<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big><b><big>Note<\/big><\/b> <br \/> There are certain cases where <b>routefilter<\/b> cannot be used on an interface:<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:35%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>\u2022 If USE_DEFAULT_RT=Yes in<\/big><\/font> <big><b><font color=\"#0000FF\">shorewall.conf<\/font><\/b><\/big> <font color=\"#000000\">[7] <big>(5) and the interface is listed in<\/big><\/font> <big><b><font color=\"#0000FF\">shorewall\u2212providers<\/font><\/b><\/big> <font color=\"#000000\">[16] <big>(5).<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:35%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>\u2022 If there is an entry for the interface in<\/big><\/font> <big><b><font color=\"#0000FF\">shorewall\u2212providers<\/font><\/b><\/big> <font color=\"#000000\">[16] <big>(5) that doesn&#8217;t specify the <b>balance<\/b> option.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:35%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>\u2022 If IPSEC is used to allow a road\u2212warrior to have a local address, then any interface through which the road\u2212warrior might connect cannot specify <b>routefilter<\/b>.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>Beginning with Shorewall 5.1.1, when <b>routefilter<\/b> is set to a non\u2212zero value, the <b>logmartians<\/b> option is also implicitly set. If you actually want route filtering without logging, then you must also specify <b>logmartians=0<\/b> after <b>routefilter<\/b>.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big><b><big>rpfilter<\/big><\/b><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big><big>Added in Shorewall 4.5.7. This is an anti\u2212spoofing measure that requires the &#8216;RPFilter Match&#8217; capability in your iptables and kernel. It provides a more efficient alternative to the <b>sfilter<\/b> option below. It performs a function similar to <b>routefilter<\/b> (see above) but works with Multi\u2212ISP configurations that do not use balanced routes.<\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big><big><b>sfilter=(<\/b><i>net<\/i><b>[,&#8230;])<\/b><\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big><big>Added in Shorewall 4.4.20. This option provides an anti\u2212spoofing alternative to <b>routefilter<\/b> on interfaces where that option cannot be used, but where the <b>routeback<\/b> option is required (on a bridge, for example). On these interfaces, <b>sfilter<\/b> should list those local networks that are connected to the firewall through other interfaces.<\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big><big><b>sourceroute[={0|1}]<\/b><\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big><big>If this option is not specified for an interface, then source\u2212routed packets will not be accepted from that interface unless it has been explicitly enabled via sysconf. Only set this option to 1 (enable source routing) if you know what you are doing. This might represent a security risk and is usually unneeded.<\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big><big>Only those interfaces with the <b>sourceroute<\/b> option will have their setting changed; the value assigned to the setting will be the value specified (if any) or 1 if no value is given.<\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big><big><b><big>Note<\/big><\/b> <br \/> This option does not work with a wild\u2212card <b>physical<\/b> name (e.g., eth0.+). Beginning with Shorewall 5.1.10, If this option is specified, a warning is issued and the option is ignored.<\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big><big><b><big>tcpflags[={0|1}]<\/big><\/b><\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big><big><big>Packets arriving on this interface are checked for certain illegal combinations of TCP flags. Packets found to have such a combination of flags are handled according to the setting of TCP_FLAGS_DISPOSITION after having been logged according to the setting of TCP_FLAGS_LOG_LEVEL.<\/big><\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big><big><big>Beginning with Shorewall 4.6.0, tcpflags=1 is the default. To disable this option, specify tcpflags=0.<\/big><\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big><big><big><b>unmanaged<\/b><\/big><\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big><big><big>Added in Shorewall 4.5.18. Causes all traffic between the firewall and hosts on the interface to be accepted. When this option is given:<\/big><\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big><big><big>\u2022 The ZONE column must contain &#8216;\u2212&#8217;.<\/big><\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:29%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big><big><big>\u2022 Only the following other options are allowed with <b>unmanaged<\/b>:<\/big><\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:35%;\"><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big><big><big><b>arp_filter <br \/> arp_ignore <br \/> ignore <br \/> routefilter <br \/> optional <br \/> physical <br \/> routefilter <br \/> proxyarp <br \/> proxyudp <br \/> sourceroute<\/b><\/big><\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big><big><big><b>upnp<\/b><\/big><\/big><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big><big><big>Incoming requests from this interface may be remapped via UPNP (upnpd). See<\/big><\/big><\/big><\/font> <big><big><big><b><font color=\"#0000FF\">https:\/\/shorewall.org\/UPnP.html<\/font><\/b><\/big> <font color=\"#000000\">[17] <big>. Supported in IPv4 and in IPv6 in Shorewall 5.1.4 and later.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big><b>upnpclient<\/b><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>This option is intended for laptop users who always run Shorewall on their system yet need to run UPnP\u2212enabled client apps such as Transmission (BitTorrent client). The option causes Shorewall to detect the default gateway through the interface and to accept UDP packets from that gateway. Note that, like all aspects of UPnP, this is a security hole so use this option at your own risk. Supported in IPv4 and in IPv6 in Shorewall 5.1.4 and later.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big><b>wait<\/b>=<i>seconds<\/i><\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%;\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>Added in Shorewall 4.4.10. Causes the generated script to wait up to <i>seconds<\/i> seconds for the interface to become usable before applying the <b>required<\/b> or <b>optional<\/b> options.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<h2>EXAMPLE <a name=\"EXAMPLE\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>IPv4 Example 1:<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%;\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>Suppose you have eth0 connected to a DSL modem and eth1 connected to your local network and that your local subnet is 192.168.1.0\/24. The interface gets its IP address via DHCP from subnet 206.191.149.192\/27. You have a DMZ with subnet 192.168.2.0\/24 using eth2. Your iptables and\/or kernel do not support &#8220;Address Type Match&#8221; and you prefer to specify broadcast addresses explicitly rather than having Shorewall detect them.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>Your entries for this setup would look like:<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>?FORMAT 1 <br \/> #ZONE INTERFACE BROADCAST OPTIONS <br \/> net eth0 206.191.149.223 dhcp <br \/> loc eth1 192.168.1.255 <br \/> dmz eth2 192.168.2.255<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>Example 2:<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%;\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>The same configuration without specifying broadcast addresses is:<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>?FORMAT 2 <br \/> #ZONE INTERFACE OPTIONS <br \/> net eth0 dhcp <br \/> loc eth1 <br \/> dmz eth2<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>Example 3:<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%;\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>You have a simple dial\u2212in system with no Ethernet connections.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>?FORMAT 2 <br \/> #ZONE INTERFACE OPTIONS <br \/> net ppp0 \u2212<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>Example 4 (Shorewall 4.4.9 and later):<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:17%;\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>You have a bridge with no IP address and you want to allow traffic through the bridge.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:23%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>?FORMAT 2 <br \/> #ZONE INTERFACE OPTIONS <br \/> \u2212 br0 bridge<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<h2>FILES <a name=\"FILES\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>\/etc\/shorewall\/interfaces<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>\/etc\/shorewall6\/interfaces<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<h2>SEE ALSO <a name=\"SEE ALSO\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><big><b><font color=\"#0000FF\">https:\/\/shorewall.org\/configuration_file_basics.htm#Pairs<\/font><\/b><\/big> <font color=\"#000000\">[18]<\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>shorewall(8)<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<h2>NOTES <a name=\"NOTES\"><\/a> <\/h2>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"12%\"><\/td>\n<td width=\"3%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>1.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"2%\"><\/td>\n<td width=\"23%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>shorewall-hosts<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"60%\"> <\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:17%;\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>https:\/\/shorewall.org\/manpages\/shorewall-hosts.html<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"12%\"><\/td>\n<td width=\"3%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>2.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"2%\"><\/td>\n<td width=\"54%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>https:\/\/shorewall.org\/FAQ.htm#faq18<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"29%\"> <\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:17%;\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>https:\/\/shorewall.org\/FAQ.htm#faq18<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"12%\"><\/td>\n<td width=\"3%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>3.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"2%\"><\/td>\n<td width=\"26%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>shorewall-nesting<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"57%\"> <\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:17%;\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>https:\/\/shorewall.org\/manpages\/shorewall-nesting.html<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"12%\"><\/td>\n<td width=\"3%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>4.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"2%\"><\/td>\n<td width=\"25%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>shorewall6-zones<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"58%\"> <\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:17%;\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>https:\/\/shorewall.org\/manpages\/shorewall-zones.html<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"12%\"><\/td>\n<td width=\"3%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>5.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"2%\"><\/td>\n<td width=\"14%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>Proxy ARP<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"69%\"> <\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:17%;\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>https:\/\/shorewall.org\/ProxyARP.htm<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"12%\"><\/td>\n<td width=\"3%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>6.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"2%\"><\/td>\n<td width=\"29%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>shorewall-blacklist<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"54%\"> <\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:17%;\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>https:\/\/shorewall.org\/manpages\/shorewall-blacklist.html<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"12%\"><\/td>\n<td width=\"3%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>7.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"2%\"><\/td>\n<td width=\"26%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>shorewall.conf(5)<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"57%\"> <\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:17%;\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>https:\/\/shorewall.org\/manpages\/shorewall.conf.html<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"12%\"><\/td>\n<td width=\"3%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>8.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"2%\"><\/td>\n<td width=\"20%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>simple bridge<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"63%\"> <\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:17%;\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>https:\/\/shorewall.org\/SimpleBridge.html<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"12%\"><\/td>\n<td width=\"3%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>9.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"2%\"><\/td>\n<td width=\"55%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>Shorewall-perl for firewall\/bridging<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"28%\"> <\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:17%;\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>https:\/\/shorewall.org\/bridge-Shorewall-perl.html<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"11%\"><\/td>\n<td width=\"4%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>10.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"2%\"><\/td>\n<td width=\"23%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>shorewall-rules<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"60%\"> <\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:17%;\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>https:\/\/shorewall.org\/manpages\/shorewall-rules.html<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"11%\"><\/td>\n<td width=\"4%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>11.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"2%\"><\/td>\n<td width=\"26%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>shorewall-maclist<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"57%\"> <\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:17%;\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>https:\/\/shorewall.org\/manpages\/shorewall-maclist.html<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"11%\"><\/td>\n<td width=\"4%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>12.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"2%\"><\/td>\n<td width=\"52%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>https:\/\/shorewall.org\/Dynamic.html<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"31%\"> <\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:17%;\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>https:\/\/shorewall.org\/Dynamic.html<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"11%\"><\/td>\n<td width=\"4%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>13.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"2%\"><\/td>\n<td width=\"83%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>https:\/\/shorewall.org\/bridge-Shorewall-perl.html#Multiple<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:17%;\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>https:\/\/shorewall.org\/bridge-Shorewall-perl.html#Multiple<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"11%\"><\/td>\n<td width=\"4%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>14.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"2%\"><\/td>\n<td width=\"28%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>shorewall-proxyarp<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"55%\"> <\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:17%;\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>https:\/\/shorewall.org\/manpages\/shorewall-proxyarp.html<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"11%\"><\/td>\n<td width=\"4%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>15.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"2%\"><\/td>\n<td width=\"77%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>http:\/\/tldp.org\/HOWTO\/Proxy-ARP-Subnet\/index.html.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"6%\"> <\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:17%;\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>http:\/\/tldp.org\/HOWTO\/Proxy-ARP-Subnet\/index.html<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"11%\"><\/td>\n<td width=\"4%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>16.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"2%\"><\/td>\n<td width=\"29%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>shorewall-providers<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"54%\"> <\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:17%;\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>https:\/\/shorewall.org\/manpages\/shorewall-providers.html<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"11%\"><\/td>\n<td width=\"4%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>17.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"2%\"><\/td>\n<td width=\"48%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>https:\/\/shorewall.org\/UPnP.html<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"35%\"> <\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:17%;\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>https:\/\/shorewall.org\/UPnP.html<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"11%\"><\/td>\n<td width=\"4%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>18.<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<td width=\"2%\"><\/td>\n<td width=\"83%\">\n<p style=\"margin-top: 1em\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>https:\/\/shorewall.org\/configuration_file_basics.htm#Pairs<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:17%;\"><big><big><big><big><big><big><big><big><big><big><big><font color=\"#000000\"><big>https:\/\/shorewall.org\/configuration_file_basics.htm#Pairs<\/big><\/font><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/big><\/p>\n<hr>\n","protected":false},"excerpt":{"rendered":"<p>  interfaces \u2212 Shorewall interfaces file <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[959],"tags":[961,1291,1511],"class_list":["post-4552","post","type-post","status-publish","format-standard","hentry","category-5-formatos-de-ficheros","tag-961","tag-man5","tag-shorewall-interfaces"],"gutentor_comment":0,"_links":{"self":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/posts\/4552","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/comments?post=4552"}],"version-history":[{"count":0,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/posts\/4552\/revisions"}],"wp:attachment":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/media?parent=4552"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/categories?post=4552"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/tags?post=4552"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}