Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

shorewall-tos(5) [debian man page]

SHOREWALL-TOS(5)						  [FIXME: manual]						  SHOREWALL-TOS(5)

NAME
tos - Shorewall Type of Service rules file SYNOPSIS
/etc/shorewall/tos DESCRIPTION
This file defines rules for setting Type Of Service (TOS). Its use is deprecated, beginning in Shorewall 4.5.1, in favor of the TOS target in shorewall-tcrules[1] (5). The columns in the file are as follows (where the column name is followed by a different name in parentheses, the different name is used in the alternate specification syntax). SOURCE - {all|address]|all:address|$FW} If all, may optionally be followed by ":" and an IP address, a MAC address, a subnet specification or the name of an interface. Example: all:192.168.2.3 MAC addresses must be prefixed with "~" and use "-" as a separator. Example: ~00-A0-C9-15-39-78 DEST - {all|address]|all:address} Example: 192.168.2.3 PROTOCOL (proto) - proto-name-or-number Protocol name or number. SOURCE PORT(S) (sport) - {-|port|lowport:highport} Source port or port range. If all ports, use "-". DEST PORT(S) (dport) - {-|port|lowport:highport} Destination port or port range. If all ports, use "-" TOS - tos Must be one of the following; tos-minimize-delay (16) tos-maximize-throughput (8) tos-maximize-reliability (4) tos-minimize-cost (2) tos-normal-service (0) MARK - [!]value[/mask][:C] If you don't want to define a test but need to specify anything in the following columns, place a "-" in this field. ! Inverts the test (not equal) value Value of the packet or connection mark. mask A mask to be applied to the mark before testing. :C Designates a connection mark. If omitted, the packet mark's value is tested. FILES
/etc/shorewall/tos SEE ALSO
http://shorewall.net/configuration_file_basics.htm#Pairs shorewall(8), shorewall-accounting(5), shorewall-actions(5), shorewall-blacklist(5), shorewall-hosts(5), shorewall_interfaces(5), shorewall-ipsets(5), shorewall-maclist(5), shorewall-masq(5), shorewall-nat(5), shorewall-netmap(5), shorewall-params(5), shorewall-policy(5), shorewall-providers(5), shorewall-proxyarp(5), shorewall-rtrules(5), shorewall-routestopped(5), shorewall-rules(5), shorewall.conf(5), shorewall-secmarks(5), shorewall-tcclasses(5), shorewall-tcdevices(5), shorewall-tcrules(5), shorewall-tunnels(5), shorewall-zones(5) NOTES
1. shorewall-tcrules http://www.shorewall.net/manpages/shorewall-tcrules.html [FIXME: source] 06/28/2012 SHOREWALL-TOS(5)

Check Out this Related Man Page

SHOREWALL-NAT(5)						  [FIXME: manual]						  SHOREWALL-NAT(5)

NAME
nat - Shorewall one-to-one NAT file SYNOPSIS
/etc/shorewall/nat DESCRIPTION
This file is used to define one-to-one Network Address Translation (NAT). Warning If all you want to do is simple port forwarding, do NOT use this file. See http://www.shorewall.net/FAQ.htm#faq1[1]. Also, in many cases, Proxy ARP (shorewall-proxyarp[2](5)) is a better solution that one-to-one NAT. The columns in the file are as follows (where the column name is followed by a different name in parentheses, the different name is used in the alternate specification syntax). EXTERNAL - {address|COMMENT} External IP Address - this should NOT be the primary IP address of the interface named in the next column and must not be a DNS Name. If you put COMMENT in this column, the rest of the line will be attached as a comment to the Netfilter rule(s) generated by the following entries in the file. The comment will appear delimited by "/* ... */" in the output of "shorewall show nat" To stop the comment from being attached to further rules, simply include COMMENT on a line by itself. INTERFACE - interfacelist[:[digit]] Interfaces that have the EXTERNAL address. If ADD_IP_ALIASES=Yes in shorewall.conf[3](5), Shorewall will automatically add the EXTERNAL address to this interface. Also if ADD_IP_ALIASES=Yes, you may follow the interface name with ":" and a digit to indicate that you want Shorewall to add the alias with this name (e.g., "eth0:0"). That allows you to see the alias with ifconfig. That is the only thing that this name is good for -- you cannot use it anwhere else in your Shorewall configuration. Each interface must match an entry in shorewall-interfaces[4](5). Shorewall allows loose matches to wildcard entries in shorewall-interfaces[4](5). For example, ppp0 in this file will match a shorewall-interfaces[4](5) entry that defines ppp+. If you want to override ADD_IP_ALIASES=Yes for a particular entry, follow the interface name with ":" and no digit (e.g., "eth0:"). INTERNAL - address Internal Address (must not be a DNS Name). ALL INTERFACES (allints) - [Yes|No] If Yes or yes, NAT will be effective from all hosts. If No or no (or left empty) then NAT will be effective only through the interface named in the INTERFACE column. LOCAL - [Yes|No] If Yes or yes, NAT will be effective from the firewall system FILES
/etc/shorewall/nat SEE ALSO
http://shorewall.net/NAT.htm http://shorewall.net/configuration_file_basics.htm#Pairs shorewall(8), shorewall-accounting(5), shorewall-actions(5), shorewall-blacklist(5), shorewall-hosts(5), shorewall_interfaces(5), shorewall-ipsets(5), shorewall-maclist(5), shorewall-masq(5), shorewall-netmap(5), shorewall-params(5), shorewall-policy(5), shorewall-providers(5), shorewall-proxyarp(5), shorewall-rtrules(5), shorewall-routestopped(5), shorewall-rules(5), shorewall.conf(5), shorewall-secmarks(5), shorewall-tcclasses(5), shorewall-tcdevices(5), shorewall-tcrules(5), shorewall-tos(5), shorewall-tunnels(5), shorewall-zones(5) NOTES
1. http://www.shorewall.net/FAQ.htm#faq1 http://www.shorewall.net/manpages/../FAQ.htm#faq1 2. shorewall-proxyarp http://www.shorewall.net/manpages/shorewall-proxyarp.html 3. shorewall.conf http://www.shorewall.net/manpages/shorewall.conf.html 4. shorewall-interfaces http://www.shorewall.net/manpages/shorewall-interfaces.html [FIXME: source] 06/28/2012 SHOREWALL-NAT(5)
Man Page