{"id":4755,"date":"2022-12-20T18:36:51","date_gmt":"2022-12-20T21:36:51","guid":{"rendered":"http:\/\/lode.uno\/linux-man\/index.php\/2022\/12\/20\/shorewalllogging-man5\/"},"modified":"2022-12-20T18:36:51","modified_gmt":"2022-12-20T21:36:51","slug":"shorewalllogging-man5","status":"publish","type":"post","link":"https:\/\/lode.uno\/linux-man\/2022\/12\/20\/shorewalllogging-man5\/","title":{"rendered":"SHOREWALL&minus;LOGGING (man5)"},"content":{"rendered":"<h1 align=\"center\">SHOREWALL\u2212LOGGING<\/h1>\n<p> <a href=\"#NAME\">NAME<\/a><br \/> <a href=\"#SYNOPSIS\">SYNOPSIS<\/a><br \/> <a href=\"#DESCRIPTION\">DESCRIPTION<\/a><br \/> <a href=\"#DEFAULT LOGGING\">DEFAULT LOGGING<\/a><br \/> <a href=\"#SYSLOG LEVELS\">SYSLOG LEVELS<\/a><br \/> <a href=\"#CONFIGURING A SEPARATE LOG FOR SHOREWALL MESSAGES (ULOGD)\">CONFIGURING A SEPARATE LOG FOR SHOREWALL MESSAGES (ULOGD)<\/a><br \/> <a href=\"#UNDERSTANDING THE CONTENTS OF SHOREWALL LOG MESSAGES\">UNDERSTANDING THE CONTENTS OF SHOREWALL LOG MESSAGES<\/a><br \/> <a href=\"#CUSTOMIZING THE CONTENT OF SHOREWALL LOG MESSAGES\">CUSTOMIZING THE CONTENT OF SHOREWALL LOG MESSAGES<\/a><br \/> <a href=\"#LOG BACKENDS\">LOG BACKENDS<\/a><br \/> <a href=\"#SEE ALSO\">SEE ALSO<\/a><br \/> <a href=\"#NOTES\">NOTES<\/a> <\/p>\n<hr>\n<h2>NAME <a name=\"NAME\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">logging \u2212 Shorewall logging<\/p>\n<h2>SYNOPSIS <a name=\"SYNOPSIS\"><\/a> <\/h2>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"11%\"><\/td>\n<td width=\"35%\">\n<p style=\"margin-top: 1em\"><i>action<\/i><b>:<\/b><i>level<\/i><\/p>\n<\/td>\n<td width=\"54%\"> <\/td>\n<\/tr>\n<tr valign=\"top\" align=\"left\">\n<td width=\"11%\"><\/td>\n<td width=\"35%\">\n<p style=\"margin-top: 1em\"><b>NFLOG(<\/b><i>nflog\u2212parameters<\/i><b>)<\/b><\/p>\n<\/td>\n<td width=\"54%\"> <\/td>\n<\/tr>\n<tr valign=\"top\" align=\"left\">\n<td width=\"11%\"><\/td>\n<td width=\"35%\">\n<p style=\"margin-top: 1em\"><b>ULOG(<\/b><i>ulog\u2212parameters<\/i><b>)<\/b><\/p>\n<\/td>\n<td width=\"54%\"> <\/td>\n<\/tr>\n<\/table>\n<h2>DESCRIPTION <a name=\"DESCRIPTION\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">The disposition of packets entering a Shorewall firewall is determined by one of a number of Shorewall facilities. Only some of these facilities permit logging.<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">1. The packet is part of an established connection. While the packet can be logged using LOG rules in the ESTABLISHED section of <b><font color=\"#0000FF\">\/etc\/shorewall\/rules<\/font><\/b> <small><font color=\"#000000\">[1]<\/font><\/small> <font color=\"#000000\">, that is not recommended because of the large amount of information that may be logged.<\/font><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><font color=\"#000000\">2. The packet represents a connection request that is related to an established connection (such as a<\/font> <b><font color=\"#0000FF\">data connection associated with an FTP control connection<\/font><\/b> <small><font color=\"#000000\">[2]<\/font><\/small> <font color=\"#000000\">). These packets may be logged using LOG rules in the RELATED section of<\/font> <b><font color=\"#0000FF\">shorewall\u2212rules(5)<\/font><\/b> <small><font color=\"#000000\">[1]<\/font><\/small> <font color=\"#000000\">.<\/font><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><font color=\"#000000\">3. The packet is rejected because of an option in<\/font> <b><font color=\"#0000FF\">shorewall.conf<\/font><\/b> <small><font color=\"#000000\">[3]<\/font><\/small> <font color=\"#000000\">(5) or<\/font> <b><font color=\"#0000FF\">shorewall\u2212interfaces(5)<\/font><\/b> <small><font color=\"#000000\">[4]<\/font><\/small> <font color=\"#000000\">. These packets can be logged by setting the appropriate logging\u2212related option in<\/font> <b><font color=\"#0000FF\">\/etc\/shorewall\/shorewall.conf<\/font><\/b> <small><font color=\"#000000\">[3]<\/font><\/small> <font color=\"#000000\">.<\/font><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><font color=\"#000000\">4. The packet matches a rule in<\/font> <b><font color=\"#0000FF\">shorewall\u2212rules<\/font><\/b> <small><font color=\"#000000\">[1]<\/font><\/small> <font color=\"#000000\">(5). By including a syslog level (see below) in the ACTION column of a rule (e.g., \u201cACCEPT<b>:info<\/b> net $FW tcp 22\u201d), the connection attempt will be logged at that level.<\/font><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><font color=\"#000000\">5. The packet doesn&#8217;t match a rule so it is handled by a policy defined in<\/font> <b><font color=\"#0000FF\">shorewall\u2212policy(5)<\/font><\/b> <small><font color=\"#000000\">[5]<\/font><\/small> <font color=\"#000000\">. These may be logged by specifying a syslog level in the LOG LEVEL column of the policy&#8217;s entry (e.g., \u201cloc net ACCEPT <b>info<\/b>\u201d).<\/font><\/p>\n<h2>DEFAULT LOGGING <a name=\"DEFAULT LOGGING\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">By default, Shorewall directs Netfilter to log using syslog (8). Syslog classifies log messages by a <i>facility<\/i> and a <i>priority<\/i> (using the notation <i>facility.priority<\/i>).<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">The facilities defined by syslog are <i>auth, authpriv, cron, daemon, kern, lpr, mail, mark, news, syslog, user, uucp<\/i> and <i>local0<\/i> through <i>local7.<\/i><\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">Throughout the Shorewall documentation, the term <i>level<\/i> rather than <i>priority is used,<\/i> since <i>level<\/i> is the term used by Netfilter. The syslog documentation uses the term <i>priority<\/i>.<\/font><\/p>\n<h2>SYSLOG LEVELS <a name=\"SYSLOG LEVELS\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">Syslog levels are a method of describing to syslog (8) the importance of a message. A number of Shorewall parameters have a syslog level as their value.<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">Valid levels are:<\/font><\/p>\n<p style=\"margin-left:17%;\"><font color=\"#000000\">7 \u2212 <b>debug<\/b> (Debug\u2212level <br \/> messages) <br \/> 6 \u2212 <b>info<\/b> <br \/> (Informational) <br \/> 5 \u2212 <b>notice<\/b> (Normal but <br \/> significant Condition) <br \/> 4 \u2212 <b>warning<\/b> (Warning <br \/> Condition) <br \/> 3 \u2212 <b>err<\/b> (Error <br \/> Condition) <br \/> 2 \u2212 <b>crit<\/b> (Critical <br \/> Conditions) <br \/> 1 \u2212 <b>alert<\/b> (must be handled <br \/> immediately) <br \/> 0 \u2212 <b>emerg<\/b> (System is <br \/> unusable)<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">For most Shorewall logging, a level of 6 (info) is appropriate. Shorewall log messages are generated by Netfilter and are logged using the <i>kern<\/i> facility and the level that you specify. If you are unsure of the level to choose, 6 (info) is a safe bet. You may specify levels by name or by number.<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">Beginning with Shorewall 4.5.5, the <i>level<\/i> name or number may be optionally followed by a comma\u2212separated list of one or more <i>log options<\/i>. The list is enclosed in parentheses. Log options cause additional information to be included in each log message.<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">Valid log options are:<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\"><b>ip_options<\/b><\/font><\/p>\n<p style=\"margin-left:17%;\"><font color=\"#000000\">Log messages will include the option settings from the IP header.<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\"><b>macdecode<\/b><\/font><\/p>\n<p style=\"margin-left:17%;\"><font color=\"#000000\">Decode the MAC address and protocol.<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\"><b>tcp_sequence<\/b><\/font><\/p>\n<p style=\"margin-left:17%;\"><font color=\"#000000\">Include TCP sequence numbers.<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\"><b>tcp_options<\/b><\/font><\/p>\n<p style=\"margin-left:17%;\"><font color=\"#000000\">Include options from the TCP header.<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\"><b>uid<\/b><\/font><\/p>\n<p style=\"margin-left:17%;\"><font color=\"#000000\">Include the UID of the sending program; only valid for packets originating on the firewall itself.<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">Example: <b>info(tcp_options,tcp_sequence)<\/b><\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">Syslogd writes log messages to files (typically in \/var\/log\/*) based on their facility and level. The mapping of these facility\/level pairs to log files is done in \/etc\/syslog.conf (5). If you make changes to this file, you must restart syslogd before the changes can take effect.<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">Syslog may also write to your system console. See<\/font> <b><font color=\"#0000FF\">Shorewall FAQ 16<\/font><\/b> <small><font color=\"#000000\">[6]<\/font><\/small> <font color=\"#000000\">for ways to avoid having Shorewall messages written to the console.<\/font><\/p>\n<h2>CONFIGURING A SEPARATE LOG FOR SHOREWALL MESSAGES (ULOGD) <a name=\"CONFIGURING A SEPARATE LOG FOR SHOREWALL MESSAGES (ULOGD)\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">There are a couple of limitations to syslogd\u2212based logging:<\/font><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><font color=\"#000000\">1. If you give, for example, kern.info its own log destination then that destination will also receive all kernel messages of levels 5 (notice) through 0 (emerg).<\/font><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><font color=\"#000000\">2. All kernel.info messages will go to that destination and not just those from Netfilter.<\/font><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><font color=\"#000000\">3. Netfilter (Shorewall) messages show up in <b>dmesg<\/b>.<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">If your kernel has NFLOG target support (and most vendor\u2212supplied kernels do), you may also specify a log level of NFLOG (must be all caps). When NFLOG is used, Shorewall will direct Netfilter to log the related messages via the NFLOG target which will send them to a process called \u201culogd\u201d. The ulogd program is included in most distributions.<\/font><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><font color=\"#000000\"><b><big>Note<\/big><\/b> <br \/> The NFLOG logging mechanism is <i>completely separate<\/i> from syslog. Once you switch to NFLOG, the settings in \/etc\/syslog.conf have absolutely no effect on your Shorewall logging (except for Shorewall status messages which still go to syslog).<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">You will need to change all instances of log levels (usually \u201cinfo\u201d) in your Shorewall configuration files to \u201cNFLOG\u201d \u2212 this includes entries in the policy, rules and shorewall.conf files. If you initially installed using Shorewall 5.1.2 or later, you can simply change the setting of LOG_LEVEL in shorewall.conf.<\/font><\/p>\n<h2>UNDERSTANDING THE CONTENTS OF SHOREWALL LOG MESSAGES <a name=\"UNDERSTANDING THE CONTENTS OF SHOREWALL LOG MESSAGES\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">For general information on the contents of Netfilter log messages, see<\/font> <b><font color=\"#0000FF\">http:\/\/logi.cc\/en\/2010\/07\/netfilter\u2212log\u2212format\/<\/font><\/b><font color=\"#000000\">.<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">For Shorewall\u2212specific information, see<\/font> <b><font color=\"#0000FF\">FAQ #17<\/font><\/b> <small><font color=\"#000000\">[7]<\/font><\/small> <font color=\"#000000\">.<\/font><\/p>\n<h2>CUSTOMIZING THE CONTENT OF SHOREWALL LOG MESSAGES <a name=\"CUSTOMIZING THE CONTENT OF SHOREWALL LOG MESSAGES\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">In a Shorewall logging rule, the log level can be followed by a log tag as in &#8220;DROP:NFLOG:junk&#8221;. The generated log message will include &#8220;<i>chain\u2212name<\/i> junk DROP&#8221;.<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">By setting the LOGTAGONLY option to Yes in<\/font> <b><font color=\"#0000FF\">shorewall.conf(5)<\/font><\/b> <small><font color=\"#000000\">[8]<\/font><\/small> <font color=\"#000000\">or<\/font> <b><font color=\"#0000FF\">shorewall6.conf(5)<\/font><\/b> <small><font color=\"#000000\">[8]<\/font><\/small> <font color=\"#000000\">, the disposition (&#8216;DROP&#8217; in the above example) will be omitted. Consider the following rule:<\/font><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><font color=\"#000000\">#ACTION SOURCE DEST PROTO <br \/> REJECT(icmp\u2212proto\u2212unreachable):notice:IPv6 loc net 41 # who&#8217;s using IPv6 tunneling<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">This rule generates the following warning at compile time:<\/font><\/p>\n<p style=\"margin-left:17%;\"><font color=\"#000000\">WARNING: Log Prefix shortened to &#8220;Shorewall:IPv6:REJECT(icmp\u2212p &#8221; <br \/> \/etc\/shorewall\/rules (line 212)<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">and produces the rather ugly prefix &#8220;Shorewall:IPv6:REJECT(icmp\u2212p &#8220;.<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">Now consider this similar rule:<\/font><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><font color=\"#000000\">#ACTION SOURCE DEST PROTO <br \/> REJECT(icmp\u2212proto\u2212unreachable):notice:IPv6,tunneling loc net 41 # who&#8217;s using IPv6 tunneling<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">With LOGTAGONLY=Yes, no warning is generated and the prefix becomes &#8220;Shorewall:IPv6:tunneling:&#8221;<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">See the<\/font> <b><font color=\"#0000FF\">shorewall[6].conf man page<\/font><\/b> <small><font color=\"#000000\">[8]<\/font><\/small> <font color=\"#000000\">for further information about how LOGTAGONLY=Yes can be used.<\/font><\/p>\n<h2>LOG BACKENDS <a name=\"LOG BACKENDS\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">Netfilter logging allows configuration of multiple backends. Logging backends provide the The low\u2212level forward of log messages. There are currently three backends:<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">LOG (ipt_LOG and ip6t_LOG).<\/font><\/p>\n<p style=\"margin-left:17%;\"><font color=\"#000000\">Normal kernel\u2212based logging to a syslog daemon.<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">ULOG (ipt_ULOG)<\/font><\/p>\n<p style=\"margin-left:17%;\"><font color=\"#000000\">ULOG logging as described ablve. Only available for IPv4.<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">netlink (nfnetlink_log)<\/font><\/p>\n<p style=\"margin-left:17%;\"><font color=\"#000000\">The logging backend behind NFLOG, defined above.<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">The currently\u2212available and currently\u2212selected IPv4 and IPv6 backends are shown in \/proc\/sys\/net\/netfilter\/nf_log:<\/font><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><font color=\"#000000\">cat \/proc\/net\/netfilter\/nf_log <br \/> 0 NONE (nfnetlink_log) <br \/> 1 NONE (nfnetlink_log) <br \/> 2 ipt_ULOG (ipt_ULOG,ipt_LOG,nfnetlink_log) <br \/> 3 NONE (nfnetlink_log) <br \/> 4 NONE (nfnetlink_log) <br \/> 5 NONE (nfnetlink_log) <br \/> 6 NONE (nfnetlink_log) <br \/> 7 NONE (nfnetlink_log) <br \/> 8 NONE (nfnetlink_log) <br \/> 9 NONE (nfnetlink_log) <br \/> 10 ip6t_LOG (ip6t_LOG,nfnetlink_log) <br \/> 11 NONE (nfnetlink_log) <br \/> 12 NONE (nfnetlink_log)<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">The magic numbers (0\u221212) are Linux address family numbers (AF_INET is 2 and AF_INET6 is 10).<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">The name immediately following the number is the currently\u2212selected backend, and the ones in parentheses are the ones that are available. You can change the currently selected backend by echoing it&#8217;s name into \/proc\/net\/netfilter\/nf_log.<i>number<\/i>.<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">Example \u2212 change the IPv4 backend to LOG:<\/font><\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><font color=\"#000000\">sysctl net.netfilter.nf_log.2=ipt_LOG<\/font><\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><font color=\"#000000\">Beginning with Shorewall 4.6.4, you can configure the backend using the LOG_BACKEND option in<\/font> <b><font color=\"#0000FF\">shorewall.conf(5)<\/font><\/b> <small><font color=\"#000000\">[3]<\/font><\/small> <font color=\"#000000\">and<\/font> <b><font color=\"#0000FF\">shorewall6.conf(5)<\/font><\/b> <small><font color=\"#000000\">[3]<\/font><\/small> <font color=\"#000000\">.<\/font><\/p>\n<h2>SEE ALSO <a name=\"SEE ALSO\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\"><b><font color=\"#0000FF\">https:\/\/shorewall.org\/shorewall_logging.html<\/font><\/b> <small><font color=\"#000000\">[9]<\/font><\/small><\/p>\n<h2>NOTES <a name=\"NOTES\"><\/a> <\/h2>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"12%\"><\/td>\n<td width=\"3%\">\n<p style=\"margin-top: 1em\"><font color=\"#000000\">1.<\/font><\/p>\n<\/td>\n<td width=\"2%\"><\/td>\n<td width=\"31%\">\n<p style=\"margin-top: 1em\"><font color=\"#000000\">\/etc\/shorewall\/rules<\/font><\/p>\n<\/td>\n<td width=\"52%\"> <\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:17%;\"><font color=\"#000000\">https:\/\/shorewall.org\/manpages\/shorewall-rules.html<\/font><\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"12%\"><\/td>\n<td width=\"3%\">\n<p style=\"margin-top: 1em\"><font color=\"#000000\">2.<\/font><\/p>\n<\/td>\n<td width=\"2%\"><\/td>\n<td width=\"83%\">\n<p style=\"margin-top: 1em\"><font color=\"#000000\">data connection associated with an FTP control connection<\/font><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:17%;\"><font color=\"#000000\">https:\/\/shorewall.org\/manpages\/FTP.html<\/font><\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"12%\"><\/td>\n<td width=\"3%\">\n<p style=\"margin-top: 1em\"><font color=\"#000000\">3.<\/font><\/p>\n<\/td>\n<td width=\"2%\"><\/td>\n<td width=\"21%\">\n<p style=\"margin-top: 1em\"><font color=\"#000000\">shorewall.conf<\/font><\/p>\n<\/td>\n<td width=\"62%\"> <\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:17%;\"><font color=\"#000000\">https:\/\/shorewall.org\/manpages\/shorewall.conf.html<\/font><\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"12%\"><\/td>\n<td width=\"3%\">\n<p style=\"margin-top: 1em\"><font color=\"#000000\">4.<\/font><\/p>\n<\/td>\n<td width=\"2%\"><\/td>\n<td width=\"35%\">\n<p style=\"margin-top: 1em\"><font color=\"#000000\">shorewall-interfaces(5)<\/font><\/p>\n<\/td>\n<td width=\"48%\"> <\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:17%;\"><font color=\"#000000\">https:\/\/shorewall.org\/manpages\/shorewall-interfaces.html<\/font><\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"12%\"><\/td>\n<td width=\"3%\">\n<p style=\"margin-top: 1em\"><font color=\"#000000\">5.<\/font><\/p>\n<\/td>\n<td width=\"2%\"><\/td>\n<td width=\"29%\">\n<p style=\"margin-top: 1em\"><font color=\"#000000\">shorewall-policy(5)<\/font><\/p>\n<\/td>\n<td width=\"54%\"> <\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:17%;\"><font color=\"#000000\">https:\/\/shorewall.org\/manpages\/shorewall-policy.html<\/font><\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"12%\"><\/td>\n<td width=\"3%\">\n<p style=\"margin-top: 1em\"><font color=\"#000000\">6.<\/font><\/p>\n<\/td>\n<td width=\"2%\"><\/td>\n<td width=\"25%\">\n<p style=\"margin-top: 1em\"><font color=\"#000000\">Shorewall FAQ 16<\/font><\/p>\n<\/td>\n<td width=\"58%\"> <\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:17%;\"><font color=\"#000000\">https:\/\/shorewall.org\/manpages\/FAQ.htm#faq16<\/font><\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"12%\"><\/td>\n<td width=\"3%\">\n<p style=\"margin-top: 1em\"><font color=\"#000000\">7.<\/font><\/p>\n<\/td>\n<td width=\"2%\"><\/td>\n<td width=\"11%\">\n<p style=\"margin-top: 1em\"><font color=\"#000000\">FAQ #17<\/font><\/p>\n<\/td>\n<td width=\"72%\"> <\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:17%;\"><font color=\"#000000\">https:\/\/shorewall.org\/FAQ.htm#faq17<\/font><\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"12%\"><\/td>\n<td width=\"3%\">\n<p style=\"margin-top: 1em\"><font color=\"#000000\">8.<\/font><\/p>\n<\/td>\n<td width=\"2%\"><\/td>\n<td width=\"26%\">\n<p style=\"margin-top: 1em\"><font color=\"#000000\">shorewall.conf(5)<\/font><\/p>\n<\/td>\n<td width=\"57%\"> <\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:17%;\"><font color=\"#000000\">https:\/\/shorewall.org\/manpages\/shorewall.conf.html<\/font><\/p>\n<table width=\"100%\" border=\"0\" rules=\"none\" frame=\"void\" cellspacing=\"0\" cellpadding=\"0\">\n<tr valign=\"top\" align=\"left\">\n<td width=\"12%\"><\/td>\n<td width=\"3%\">\n<p style=\"margin-top: 1em\"><font color=\"#000000\">9.<\/font><\/p>\n<\/td>\n<td width=\"2%\"><\/td>\n<td width=\"68%\">\n<p style=\"margin-top: 1em\"><font color=\"#000000\">https:\/\/shorewall.org\/shorewall_logging.html<\/font><\/p>\n<\/td>\n<td width=\"15%\"> <\/td>\n<\/tr>\n<\/table>\n<p style=\"margin-left:17%;\"><font color=\"#000000\">https:\/\/shorewall.org\/shorewall_logging.htm<\/font><\/p>\n<hr>\n","protected":false},"excerpt":{"rendered":"<p>  logging \u2212 Shorewall logging <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[959],"tags":[961,1291,1673],"class_list":["post-4755","post","type-post","status-publish","format-standard","hentry","category-5-formatos-de-ficheros","tag-961","tag-man5","tag-shorewall-logging"],"gutentor_comment":0,"_links":{"self":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/posts\/4755","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/comments?post=4755"}],"version-history":[{"count":0,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/posts\/4755\/revisions"}],"wp:attachment":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/media?parent=4755"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/categories?post=4755"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/tags?post=4755"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}