summaryrefslogtreecommitdiff
blob: 9954058dc05856143b88c58e75ce64872bd9bf6f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
msgid ""
msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"POT-Creation-Date: 2010-10-22 00:23+0600\n"
"PO-Revision-Date: 2009-10-12 06:16+0400\n"
"Last-Translator: Automatically generated\n"
"Language-Team: none\n"
"Language: \n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
"Plural-Forms: nplurals=3; plural=(n%10==1 && n%100!=11 ? 0 : n%10>=2 && n"
"%10<=4 && (n%100<10 || n%100>=20) ? 1 : 2);\n"

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(guide:link):5
msgid "/doc/en/articles/linux-24-stateful-fw-design.xml"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):6
msgid "Linux 2.4 stateful firewall design"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(author:title):8
msgid "Author"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(mail:link):9
msgid "drobbins@gentoo.org"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(mail):9
msgid "Daniel Robbins"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(abstract):12
msgid ""
"This tutorial shows you how to use netfilter to set up a powerful Linux "
"stateful firewall."
msgstr ""

#. The original version of this article was published on IBM developerWorks,
#. and is property of Westtech Information Services. This document is an updated
#. version of the original article, and contains various improvements made by the
#. Gentoo Linux Documentation team
#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(version):22
msgid "1.3"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(date):23
msgid "2005-10-09"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):26
msgid "About this tutorial"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):28
msgid "Should I take this tutorial?"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):31
msgid ""
"This tutorial shows you how to use netfilter to set up a powerful Linux "
"stateful firewall. All you need is an existing Linux system that's currently "
"using a Linux 2.4 kernel. A laptop, workstation, router or server with a "
"Linux 2.4 kernel will do."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):38
msgid ""
"You should be reasonably familiar with standard network terminology like IP "
"addresses, source and destination port numbers, TCP, UDP and ICMP, etc. By "
"the end of the tutorial, you'll understand how Linux stateful firewalls are "
"put together and you'll have several example configurations to use in your "
"own projects."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):49
msgid "About the author"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):52
msgid ""
"For technical questions about the content of this tutorial, contact the "
"author, Daniel Robbins, at <mail link=\"drobbins@gentoo.org"
"\">drobbins@gentoo.org</mail>."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):57
msgid ""
"Residing in Albuquerque, New Mexico, Daniel Robbins was the President/CEO of "
"Gentoo Technologies, Inc., the creator of Gentoo Linux, an advanced Linux "
"for the PC, and the Portage system, a next-generation ports system for "
"Linux. He has also served as a contributing author for the Macmillan books "
"Caldera OpenLinux Unleashed, SuSE Linux Unleashed, and Samba Unleashed. "
"Daniel has been involved with computers in some fashion since the second "
"grade, when he was first exposed to the Logo programming language as well as "
"a potentially dangerous dose of Pac Man. This probably explains why he has "
"since served as a Lead Graphic Artist at SONY Electronic Publishing/"
"Psygnosis. Daniel enjoys spending time with his wife, Mary, and his new baby "
"daughter, Hadassah."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):75
msgid "First steps"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):77
msgid "Defining our goal"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):80
msgid ""
"In this tutorial, we're going to put together a Linux stateful firewall. Our "
"firewall is going to run on a Linux laptop, workstation, server, or router; "
"its primary goal is to allow only certain types of network traffic to pass "
"through. To increase security, we're going to configure the firewall to drop "
"or reject traffic that we're not interested in, as well as traffic that "
"could pose a security threat."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):92
msgid "Getting the tools"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):95
msgid ""
"Before we start designing a firewall, we need to do two things. First, we "
"need to make sure that the <c>iptables</c> command is available. As root, "
"type <c>iptables</c> and see if it exists. If it doesn't, then we'll need to "
"get it installed first. Here's how we do that:"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre:caption):102
msgid "Installing necessary tools"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre):102
#, no-wrap
msgid ""
"\n"
"# <i>emerge iptables</i>\n"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):109
msgid "Kernel configuration"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):112
msgid ""
"Once installed, you should have an <c>iptables</c> command available for "
"use, as well as the handy iptables man page (<c>man iptables</c>). Great; "
"now all we need is to make sure that we have the necessary functionality "
"built into the kernel. This tutorial assumes that you compile your own "
"kernels. Head over to <path>/usr/src/linux</path>, and type <c>make "
"menuconfig</c> or <c>make xconfig</c>; we're going to enable some kernel "
"network functionality."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):121
msgid ""
"Under the \"Networking options\" section, make sure that you enable at least "
"the following options:"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre:caption):126
msgid "Necessary kernel options"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre):126
#, no-wrap
msgid ""
"\n"
"&lt;*&gt; Packet socket\n"
"[*] Network packet filtering (replaces ipchains)\n"
"&lt;*&gt; Unix domain sockets\n"
"[*] TCP/IP networking\n"
"[*]   IP: advanced router\n"
"[*]   IP: policy routing\n"
"[*]    IP: use netfilter MARK value as routing key\n"
"[*]    IP: fast network address translation\n"
"[*]   IP: use TOS value as routing key\n"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):138
msgid ""
"Then, under the \"IP: Netfilter Configuration -&gt;\" menu, enable every "
"option so that we'll have full netfilter functionality. We won't use all the "
"netfilter features, but it's good to enable them so that you can do some "
"experimentation later on."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):145
msgid ""
"There's one networking option under the \"Networking options\" category that "
"you <e>shouldn't</e> enable: explicit congestion notification. Leave this "
"option disabled:"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre:caption):151
msgid "Option we have to disable"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre):151
#, no-wrap
msgid ""
"\n"
"[ ]   IP: TCP Explicit Congestion Notification support\n"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):155
msgid ""
"If this option is enabled, your Linux machine won't be able to carry on "
"network communications with 8% of the Internet. When ECN is enabled, some "
"packets that your Linux box sends out will have the ECN bit set; however, "
"this bit freaks out a number of Internet routers, so it's very important "
"that ECN is disabled."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):162
msgid ""
"OK, now that the kernel's configured correctly for our needs, compile a new "
"one, install it, and reboot. Time to start playing with netfilter :)"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):170
msgid "Firewall design basics"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):173
msgid ""
"In putting together our firewall, the <c>iptables</c> command is our friend. "
"It's what we use to interact with the network packet filtering rules in the "
"kernel. We'll use the <c>iptables</c> command to create new rules, list "
"existing rules, flush rules, and set default packet handling policies. This "
"means that to create our firewall, we're going to enter a series of iptables "
"commands, and here's the first one we're going to take a look at (please "
"don't type this in just yet!)..."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre:caption):183
msgid "Changing chain policy to DROP"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre):183
#, no-wrap
msgid ""
"\n"
"# <i>iptables -P INPUT DROP</i>\n"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):187
msgid ""
"You're looking at an almost \"perfect\" firewall. If you type in this "
"command, you'll be incredibly well protected against any form of incoming "
"malicious attack. That's because this command tells the kernel to drop all "
"incoming network packets. While this firewall is extremely secure, it's a "
"bit silly. But before moving on, let's take a look at exactly how this "
"command does what it does."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):199
msgid "Setting chain policy"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):202
msgid ""
"An <c>iptables -P</c> command is used to set the default policy for a chain "
"of packet filtering rules. In this example, <c>iptables -P</c> is used to "
"set the default policy for the INPUT chain, a built-in chain of rules that's "
"applied to every incoming packet. By setting the default policy to DROP, we "
"tell the kernel that any packets that reach the end of the INPUT rule chain "
"should be dropped (that is, discarded). And, since we haven't added any "
"rules to the INPUT chain, all packets reach the end of the chain, and all "
"packets are dropped."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):212
msgid ""
"Again, by itself this command is totally useless. However, it demonstrates a "
"good strategy for firewall design. We'll start by dropping all packets by "
"default, and then gradually start opening up our firewall so that it meets "
"our needs. This will ensure that our firewall is as secure as possible."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):224
msgid "Defining rules"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):226
msgid "A (small) improvement"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):229
msgid ""
"In this example, let's assume that we're designing a firewall for a machine "
"with two network interfaces, eth0 and eth1. The eth0 network card is "
"connected to our LAN, while the eth1 network card is attached to our DSL "
"router, our connection to the Internet. For such a situation, we could "
"improve our \"ultimate firewall\" by adding one more line:"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre:caption):237
msgid "Improving our ultimate firewall"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre):237
#, no-wrap
msgid ""
"\n"
"# <i>iptables -P INPUT DROP</i>\n"
"# <i>iptables -A INPUT -i ! eth1 -j ACCEPT</i>\n"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):242
msgid ""
"This additional <c>iptables -A</c> line adds a new packet filtering rule to "
"the end of our INPUT chain. After this rule is added, our INPUT chain "
"consists of a single rule and a drop-by-default policy. Now, let's take a "
"look at what our semi-complete firewall does."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):252
msgid "Following the INPUT chain"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):255
msgid ""
"When a packet comes in on any interface (lo, eth0, or eth1), the netfilter "
"code directs it to the INPUT chain and checks to see if the packet matches "
"the first rule. If it does, the packet is accepted, and no further "
"processing is performed. If not, the INPUT chain's default policy is "
"enforced, and the packet is discarded (dropped)."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):263
msgid ""
"That's the conceptual overview. Specifically, our first rule matches all "
"packets coming in from eth0 and lo, immediately allowing them in. Any "
"packets coming in from eth1 are dropped. So, if we enable this firewall on "
"our machine, it'll be able to interact with our LAN but be effectively "
"disconnected from the Internet. Let's look at a couple of ways to enable "
"Internet traffic."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):274
msgid "Traditional firewalls"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):277
msgid ""
"Obviously, for our firewall to be useful, we need to selectively allow some "
"incoming packets to reach our machine via the Internet. There are two "
"approaches to opening up our firewall to the point where it is useful: one "
"uses static rules, and the other uses dynamic, stateful rules."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):284
msgid ""
"Let's take downloading Web pages as an example. If we want our machine to be "
"able to download Web pages from the Internet, we can add a static rule that "
"will always be true for every incoming http packet, regardless of origin:"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre:caption):290
msgid "Accepting all the incoming http packets"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre):290
#, no-wrap
msgid ""
"\n"
"# <i>iptables -A INPUT --sport 80 -j ACCEPT</i>\n"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):294
msgid ""
"Since all standard Web traffic originates from a source port of 80, this "
"rule effectively allows our machine to download Web pages. However, this "
"traditional approach, while marginally acceptable, suffers from a bunch of "
"problems."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):303
msgid "Traditional firewall bummers"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):306
msgid ""
"Here's a problem: while most Web traffic originates from port 80, some "
"doesn't. So, while this rule would work most of the time, there would be "
"rare instances where this rule wouldn't work. For example, maybe you've seen "
"a URL that looks like this: \"http://www.foo.com:81\". This example URL "
"points to a Web site on port 81 rather than the default port 80, and would "
"be unviewable from behind our current firewall. Taking into account all "
"these special cases can quickly turn a fairly secure firewall into swiss "
"cheese and quickly fill our INPUT chain with a bunch of rules to handle the "
"occasional oddball Web site."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):317
msgid ""
"However, the major problem with this rule is security related. Sure, it's "
"true that only traffic with a source port of 80 will be allowed through our "
"firewall. But the source port of a packet is not something that we have any "
"control over, and it can be easily altered by an intruder. For example, if "
"an intruder knew how our firewall were designed, he could bypass our "
"firewall by simply making sure that all his incoming connections originated "
"from port 80 on one of his machines! Because this static firewall rule is so "
"easy to exploit, a more secure dynamic approach is needed. Thankfully, "
"iptables and kernel 2.4 provide everything we need to enable dynamic, "
"stateful filtering."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):334
msgid "Stateful firewalls"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):336
msgid "State basics"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):339
msgid ""
"Rather than opening up holes in our firewall based on static protocol "
"characteristics, we can use Linux's new connection tracking functionality to "
"make firewall decisions based on the dynamic connection state of packets. "
"Conntrack works by associating every packet with an individual bidirectional "
"communications channel, or connection."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):347
msgid ""
"For example, consider what happens when you use telnet or ssh to connect to "
"a remote machine. If you view your network traffic at the packet level, all "
"you see is a bunch of packets zipping from one machine to another. However, "
"at a higher level, this exchange of packets is actually a bidirectional "
"communications channel between your local machine and a remote machine. "
"Traditional (old-fashioned) firewalls only look at the individual packets, "
"not recognizing that they're actually part of a larger whole, a connection."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):360
msgid "Inside conntrack"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):363
msgid ""
"That's where connection tracking technology comes in. Linux's conntrack "
"functionality can \"see\" the higher-level connections that are taking "
"place, recognizing your ssh session as a single logical entity. Conntrack "
"can even recognize UDP and ICMP packet exchanges as logical \"connections\", "
"even though UDP and ICMP are connectionless in nature; this is very helpful "
"because it allows us to use conntrack to handle ICMP and UDP packet "
"exchanges."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):372
msgid ""
"If you've already rebooted and are using your new netfilter-enabled kernel, "
"you can view a list of active network connections that your machine is "
"participating in by typing <c>cat /proc/net/ip_conntrack</c>. Even with no "
"firewall configured, Linux's conntrack functionality is working behind the "
"scenes, keeping track of the connections that your machine is participating "
"in."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):383
msgid "The NEW connection state"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):386
msgid ""
"Conntrack doesn't just recognize connections, it also classifies every "
"packet that it sees into one of four connection states. The first state that "
"we're going to talk about is called NEW. When you type <c>ssh remote.host."
"com</c>, the initial packet or burst of packets that originate from your "
"machine and are destined for remote.host.com are in the NEW state. However, "
"as soon as you receive even just a single reply packet from remote.host.com, "
"any further packets you send to remote.host.com as part of this connection "
"aren't considered NEW packets anymore. So, a packet is only considered NEW "
"when it's involved in establishing a new connection, and no traffic has yet "
"been received from the remote host (as part of this particular connection, "
"of course)."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):399
msgid ""
"I've described outgoing NEW packets, but it's also very possible (and "
"common) to have incoming NEW packets. Incoming NEW packets generally "
"originate from a remote machine, and are involved in initiating a connection "
"with you. The initial packet(s) your Web server receives as part of a HTTP "
"request would be considered incoming NEW packets; however, once you reply to "
"just a single incoming NEW packet, any additional packets you receive that "
"are related to this particular connection are no longer in the NEW state."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):412
msgid "The ESTABLISHED state"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):415
msgid ""
"Once a connection has seen traffic in both directions, additional packets "
"relating to this connection are considered to be in an ESTABLISHED state. "
"The distinction between NEW and ESTABLISHED is an important one, as we'll "
"see in a minute."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):425
msgid "The RELATED state"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):428
msgid ""
"The third connection state category is called RELATED. RELATED packets are "
"those that are starting a new connection, but are related to another "
"currently existing connection. The RELATED state can be used to regulate "
"connections that are part of a multi-connection protocol, such as ftp, as "
"well as error packets related to existing connections (such as ICMP error "
"packets related to an existing connection)."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):440
msgid "The INVALID state"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):443
msgid ""
"Finally, there are INVALID packets: those that can't be classified into one "
"of the above three categories. It's important to note that if a packet is "
"considered INVALID, it isn't automatically discarded; it's still up to you "
"to insert the appropriate rules and set chain policy so that they're handled "
"correctly."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):454
#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre:caption):463
msgid "Adding a stateful rule"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):457
msgid ""
"OK, now that we have a good understanding of connection tracking, it's time "
"to take a look at a single additional rule that transforms our non-"
"functional firewall into something quite useful:"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre):463
#, no-wrap
msgid ""
"\n"
"# <i>iptables -P INPUT DROP</i>\n"
"# <i>iptables -A INPUT -i ! eth1 -j ACCEPT</i>\n"
"# <i>iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT</i>\n"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):472
msgid "How the rule works"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):475
msgid ""
"This single rule, when inserted at the end of our existing INPUT chain, will "
"allow us to establish connections with remote machines. It works as follows. "
"Let's say we want to ssh over to remote.host.com. After typing <c>ssh remote."
"host.com</c>, our machine sends out a packet to initiate the connection. "
"This particular packet is in the NEW state, and our firewall allows it out, "
"because we're only blocking packets coming in to our firewall, not going out."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):484
msgid ""
"When we get a reply packet from remote.host.com, this packet trickles "
"through our INPUT chain. It doesn't match our first rule (since it comes in "
"on eth1), so it moves on to our next, and final rule. If it matches this "
"rule, it will be accepted, and if it doesn't, it will fall off the end of "
"the INPUT chain and the default policy will be applied to the packet (DROP). "
"So, is this incoming reply packet accepted or dropped on the floor?"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):493
msgid ""
"Answer: accepted. When the kernel inspects this incoming packet, it first "
"recognizes that it's part of an already existing connection. Then, the "
"kernel needs to decide whether this is a NEW or ESTABLISHED packet. Since "
"this is an incoming packet, it checks to see if this connection has had any "
"outgoing traffic, and finds that it has (our initial NEW packet that we sent "
"out). Therefore, this incoming packet is categorized as ESTABLISHED, as are "
"any further packets we receive or send that are associated with this "
"connection."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):506
msgid "Incoming NEW packets"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):509
msgid ""
"Now, let's consider what happens if someone on a remote machine tries to ssh "
"in to us. The initial packet we receive is classified as NEW, and doesn't "
"match rule 1, so it advances to rule 2. Because this packet isn't in an "
"ESTABLISHED or RELATED state, it falls off the end of the INPUT chain and "
"the default policy, DROP, is applied. Our incoming ssh connection request is "
"dropped to the floor without so much as a reply (or TCP reset) from us."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):521
msgid "A near-perfect firewall"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):524
msgid ""
"So, what kind of firewall do we have so far? An excellent one for a laptop "
"or a workstation where you don't want anyone from the Internet connecting to "
"you, but where you need to connect to sites on the Internet. You'll be able "
"to use Netscape, konqueror, ftp, ping, perform DNS lookups, and more. Any "
"connection that you initiate will get back in through the firewall. However, "
"any unsolicited connection that comes in from the Internet will be dropped, "
"unless it's related to an existing connection that you initiated. As long as "
"you don't need to provide any network services to the outside, this is a "
"near-perfect firewall."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):539
#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre:caption):547
msgid "A basic firewall script"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):542
msgid ""
"Here's a simple script that can be used to set up/tear down our first basic "
"workstation firewall:"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre):547
#, no-wrap
msgid ""
"\n"
"#!/bin/bash\n"
"<comment># A basic stateful firewall for a workstation or laptop that isn't running any</comment>\n"
"<comment># network services like a web server, SMTP server, ftp server, etc.</comment>\n"
"\n"
"if [ \"$1\" = \"start\" ]\n"
"then\n"
"        echo \"Starting firewall...\"\n"
"        iptables -P INPUT DROP\n"
"        iptables -A INPUT -i ! eth1 -j ACCEPT\n"
"        iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT\n"
"elif [ \"$1\" = \"stop\" ]\n"
"then\n"
"        echo \"Stopping firewall...\"\n"
"        iptables -F INPUT\n"
"        iptables -P INPUT ACCEPT\n"
"fi\n"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):569
msgid "Using the script"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):572
msgid ""
"Using this script, you can bring down the firewall by typing <c>./firewall "
"stop</c>, and bring it back up again by typing <c>./firewall start</c>. To "
"bring down the firewall, we flush our rules out of the INPUT chain with a "
"<c>iptables -F INPUT</c>, and then switch the default INPUT policy back to "
"ACCEPT with a <c>iptables -P INPUT ACCEPT</c> command. Now, let's look at a "
"bunch of improvements that we can make to our existing workstation firewall. "
"Once I've explained every improvement, I'll present a final workstation "
"firewall script. Then, we'll start customizing our firewall for servers."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):588
msgid "Stateful improvements"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):590
#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre:caption):602
msgid "Explicitly turn off ECN"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):593
msgid ""
"I mentioned earlier that it's important to turn off ECN (explicit congestion "
"notification) so that Internet communications will work properly. While you "
"may have disabled ECN in the kernel per my suggestion, it's possible that in "
"the future, you'll forget to do so. Or, possibly, you'll pass your firewall "
"script along to someone who has ECN enabled. For these reasons, it's a good "
"idea to use the <path>/proc</path> interface to explicitly disable ECN, as "
"follows:"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre):602
#, no-wrap
msgid ""
"\n"
"if [ -e /proc/sys/net/ipv4/tcp_ecn ]\n"
"then\n"
"        echo 0 &gt; /proc/sys/net/ipv4/tcp_ecn\n"
"fi\n"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):612
#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre:caption):624
msgid "Forwarding"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):615
msgid ""
"If you're using your Linux machine as a router, then you'll want to enable "
"IP forwarding, which will give the kernel permission to allow packets to "
"travel between eth0 and eth1, and vice versa. In our example configuration, "
"where eth0 is connected to our LAN, and eth1 is connected to the Internet, "
"enabling IP forwarding is a necessary step in allowing our LAN to connect to "
"the Internet via our Linux box. To enable IP forwarding, use this line:"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre):624
#, no-wrap
msgid ""
"\n"
"# <i>echo 1 &gt; /proc/sys/net/ipv4/ip_forward</i>\n"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):631
#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre:caption):652
msgid "Handling rejection"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):634
msgid ""
"So far, we've been dropping all unsolicited traffic coming in from the "
"Internet. While this is an effective way to deter unwanted network activity, "
"it does have some drawbacks. The biggest problem with this approach is that "
"it's easy for an intruder to detect that we're running a firewall, since our "
"machine isn't replying with the standard TCP reset and ICMP port-unreachable "
"responses: the responses that a normal machine would send back to indicate a "
"failed connection attempt to a non-existent service."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):644
msgid ""
"Rather than let potential intruders know that we're running a firewall (and "
"thus tip them off to the fact that we may be running some valuable services "
"that they can't get to), it would be to our advantage to make it appear as "
"if we aren't running any services at all. By adding these two rules to the "
"end of our INPUT chain, we can successfully accomplish this task:"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre):652
#, no-wrap
msgid ""
"\n"
"# <i>iptables -A INPUT -p tcp -i eth1 -j REJECT --reject-with tcp-reset</i>\n"
"# <i>iptables -A INPUT -p udp -i eth1 -j REJECT --reject-with icmp-port-unreachable</i>\n"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):657
msgid ""
"Our first rule takes care of correctly zapping TCP connections, while the "
"second handles UDP. With these two rules in place, it becomes very difficult "
"for an intruder to detect that we're actually running a firewall; hopefully, "
"this will cause the intruder to leave our machine and search for other "
"targets with more potential for abuse."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):665
msgid ""
"In addition to making our firewall more \"stealthy\", these rules also "
"eliminate the delay involved in connecting to certain ftp and irc servers. "
"This delay is caused by the server performing an ident lookup to your "
"machine (connecting to port 113) and eventually (after about 15 seconds) "
"timing out. Now, our firewall will return a TCP reset and the ident lookup "
"will fail immediately instead of retrying for 15 seconds (while you're "
"patiently waiting for a response from the server)."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):678
#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre:caption):693
msgid "Spoof protection"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):681
msgid ""
"In many distributions, when the network interface(s) are brought up, several "
"old ipchains rules are also added to the system. These special rules were "
"added by the creators of the distribution to deal with a problem called "
"spoofing, in which the source address of packets have been tweaked so that "
"they contains an invalid value (something that script kiddies do). While we "
"can create similar iptables rules that will also block spoofed packets, "
"there's an easier way. These days, the kernel has the built-in ability to "
"dropped spoofed packets; all we need to do is enable it via a simple <path>/"
"proc</path> interface. Here's how."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre):693
#, no-wrap
msgid ""
"\n"
"for x in lo eth0 eth1\n"
"do\n"
"        echo 1 &gt; /proc/sys/net/ipv4/conf/${x}/rp_filter\n"
"done\n"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):700
msgid ""
"This shell script will tell the kernel to drop any spoofed packets on "
"interfaces lo, eth0, and eth1. You can either add these lines to your "
"firewall script, or add them to the script that brings up your lo, eth0, and "
"eth1 interfaces."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):709
#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre:caption):720
msgid "Masquerading"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):712
msgid ""
"NAT (network address translation) and IP masquerading, while not directly "
"related to firewalls, are often used in conjunction with them. We're going "
"to look at two common NAT/masquerading configurations that you may need to "
"use. This first rule would take care of situations where you have a dialup "
"link to the Internet (ppp0) that uses a dynamic IP:"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre):720
#, no-wrap
msgid ""
"\n"
"# <i>iptables -t nat -A POSTROUTING -o ppp0 -j MASQUERADE</i>\n"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):724
msgid ""
"If you're in this situation, you'll also want to convert my firewall scripts "
"so that all references to \"eth1\" (our example DSL router) are changed to "
"\"ppp0\". And it's perfectly fine to add firewalling rules that refer to "
"\"ppp0\" when the ppp0 interface doesn't yet exist. As soon as ppp0 is up, "
"everything will work perfectly. Make sure you enable IP forwarding as well."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):735
#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre:caption):762
msgid "SNAT"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):738
msgid ""
"If you're using DSL to connect to the Internet, you probably have one of two "
"possible configurations. One possibility is that your DSL router or modem "
"has its own IP number and performs network address translation for you. If "
"you're in this situation, you don't need Linux to perform NAT for you since "
"your DSL router is taking care of it already."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):746
msgid ""
"However, if you want to have more control over your NAT functionality, you "
"may want to talk to your ISP about configuring your DSL connection so that "
"your DSL router is in \"bridged mode\". In bridged mode, your firewall "
"becomes an official part of your ISP's network, and your DSL router "
"transparently forwards IP traffic back and forth between your ISP and your "
"Linux box without letting anyone know that it's there. It no longer has an "
"IP number; instead, eth1 (in our example) sports the IP. If someone pings "
"your IP from the Internet, they get a reply back from your Linux box, rather "
"than your router."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):757
msgid ""
"With this kind of setup, you'll want to use SNAT (source NAT) rather than "
"masquerading. Here's the line you should add to your firewall:"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre):762
#, no-wrap
msgid ""
"\n"
"# <i>iptables -t nat -A POSTROUTING -o eth1 -j SNAT --to 1.2.3.4</i>\n"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):766
msgid ""
"In this example, eth1 should be changed to the ethernet interface connected "
"directly to your DSL router, and 1.2.3.4 should be changed to your static IP "
"(the IP of your ethernet interface). Again, remember to enable IP forwarding."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):775
msgid "NAT issues"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):778
msgid ""
"Fortunately for us, NAT and masquerading get along just fine with a "
"firewall. When writing your firewall filtering rules, just ignore the fact "
"that you're using NAT. Your rules should accept, drop, or reject packets "
"based on their \"real\" source and destination addresses. The firewall "
"filtering code sees the original source address for a packet, and the final "
"destination address. This is great for us, because it allows our firewall to "
"continue working properly even if we temporarily disable NAT or masquerading."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):791
msgid "Understanding tables"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):794
msgid ""
"In the above NAT/masquerading examples, we're appending rules to a chain, "
"but we're also doing something a bit different. Notice the \"-t\" option. "
"The \"-t\" option allows us to specify the table that our chain belongs to. "
"When omitted, the default table defaults to \"filter\". So, all our previous "
"non-NAT related commands were modifying the INPUT chain that's part of the "
"\"filter\" table. The \"filter\" table contains all the rules associated "
"with accepting or rejecting packets, while the \"nat\" table (as you would "
"assume) contains rules relating to network address translation. There are "
"also other built-in iptables chains and they are described in detail in the "
"iptables man page, as well as in Rusty's HOWTOs (see the <uri link="
"\"#resources\">Resources</uri> section at the end of this tutorial for "
"links)."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):811
#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre:caption):819
msgid "Our enhanced script"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):814
msgid ""
"Now that we've taken a look at a bunch of possible enhancements, it's time "
"to take a look at a second more flexible firewall up/down script:"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre):819
#, no-wrap
msgid ""
"\n"
"\n"
"#!/bin/bash\n"
"\n"
"<comment># An enhanced stateful firewall for a workstation, laptop or router that isn't</comment>\n"
"<comment># running any network services like a web server, SMTP server, ftp server, etc.</comment>\n"
"\n"
"<comment># Change this to the name of the interface that provides your \"uplink\"</comment>\n"
"<comment># (connection to the Internet)</comment>\n"
"\n"
"UPLINK=\"eth1\"\n"
"\n"
"<comment># If you're a router (and thus should forward IP packets between interfaces),</comment>\n"
"<comment># you want ROUTER=\"yes\"; otherwise, ROUTER=\"no\"</comment>\n"
"\n"
"ROUTER=\"yes\"\n"
"\n"
"<comment># Change this next line to the static IP of your uplink interface for static SNAT, or</comment>\n"
"<comment># \"dynamic\" if you have a dynamic IP.  If you don't need any NAT, set NAT to \"\" to</comment>\n"
"<comment># disable it.</comment>\n"
"\n"
"NAT=\"1.2.3.4\"\n"
"\n"
"<comment># Change this next line so it lists all your network interfaces, including lo</comment>\n"
"\n"
"INTERFACES=\"lo eth0 eth1\"\n"
"\n"
"if [ \"$1\" = \"start\" ]\n"
"then\n"
"        echo \"Starting firewall...\"\n"
"        iptables -P INPUT DROP\n"
"        iptables -A INPUT -i ! ${UPLINK} -j ACCEPT\n"
"        iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT\n"
"        iptables -A INPUT -p tcp -i ${UPLINK} -j REJECT --reject-with tcp-reset\n"
"        iptables -A INPUT -p udp -i ${UPLINK} -j REJECT --reject-with icmp-port-unreachable\n"
"\n"
"        <comment># Explicitly disable ECN</comment>\n"
"        if [ -e /proc/sys/net/ipv4/tcp_ecn ]\n"
"        then\n"
"                echo 0 &gt; /proc/sys/net/ipv4/tcp_ecn\n"
"        fi\n"
"\n"
"        <comment># Disable spoofing on all interfaces</comment>\n"
"        for x in ${INTERFACES}\n"
"        do\n"
"                echo 1 &gt; /proc/sys/net/ipv4/conf/${x}/rp_filter\n"
"        done\n"
"\n"
"        if [ \"$ROUTER\" = \"yes\" ]\n"
"        then\n"
"                <comment># We're a router of some kind, enable IP forwarding</comment>\n"
"                echo 1 &gt; /proc/sys/net/ipv4/ip_forward\n"
"                if [ \"$NAT\" = \"dynamic\" ]\n"
"                then\n"
"                        <comment># Dynamic IP address, use masquerading</comment>\n"
"                        echo \"Enabling masquerading (dynamic ip)...\"\n"
"                        iptables -t nat -A POSTROUTING -o ${UPLINK} -j MASQUERADE\n"
"                elif [ \"$NAT\" != \"\" ]\n"
"                then\n"
"                        <comment># Static IP, use SNAT</comment>\n"
"                        echo \"Enabling SNAT (static ip)...\"\n"
"                        iptables -t nat -A POSTROUTING -o ${UPLINK} -j SNAT --to ${UPIP}\n"
"                fi\n"
"        fi\n"
"\n"
"elif [ \"$1\" = \"stop\" ]\n"
"then\n"
"        echo \"Stopping firewall...\"\n"
"        iptables -F INPUT\n"
"        iptables -P INPUT ACCEPT\n"
"        <comment># Turn off NAT/masquerading, if any</comment>\n"
"        iptables -t nat -F POSTROUTING\n"
"fi\n"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):899
msgid "Stateful servers"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):901
#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre:caption):910
msgid "Viewing rules"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):904
msgid ""
"Before we start making customizations to our firewall so that it can be used "
"on a server, I need to show you how to list your currently active firewall "
"rules. To view the rules in the filter table's INPUT chain, type:"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre):910
#, no-wrap
msgid ""
"\n"
"# <i>iptables -v -L INPUT</i>\n"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):914
msgid ""
"The -v option gives us a verbose output, so that we can see the total "
"packets and bytes transferred per rule. We can also look at our nat "
"POSTROUTING table with the following command:"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre:caption):920
msgid "Viewing POSTROUTING table rules"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre):920
#, no-wrap
msgid ""
"\n"
"# <i>iptables -t nat -v -L POSTROUTING</i>\n"
"Chain POSTROUTING (policy ACCEPT 399 packets, 48418 bytes)\n"
"pkts bytes target     prot opt in     out     source               destination\n"
"2728  170K SNAT       all  --  any    eth1    anywhere             anywhere\n"
"to:215.218.215.2\n"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):931
msgid "Getting ready for service"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):934
msgid ""
"Right now, our firewall doesn't allow the general public to connect to "
"services on our machine because it only accepts incoming ESTABLISHED or "
"RELATED packets. Because it drops any incoming NEW packets, any connection "
"attempt is rejected unconditionally. However, by selectively allowing some "
"incoming traffic to cross our firewall, we can allow the general public to "
"connect to the services that we specify."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):946
msgid "Stateful HTTP"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):949
msgid ""
"While we want to accept some incoming connections, we probably don't want to "
"accept every kind of incoming connection. It makes sense to start with a "
"\"deny by default\" policy (as we have now) and begin opening up access to "
"those services that we'd like people to be able to connect to. For example, "
"if we're running a Web server, we'll allow NEW packets into our machine, as "
"long as they are headed for port 80 (HTTP). That's all we need to do. Once "
"we allow the NEW packets in, we've allowed a connection to be established. "
"Once the connection is established, our existing rule allowing incoming "
"ESTABLISHED and RELATED packets kicks in, allowing the HTTP connection to "
"proceed unhindered."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):964
#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre:caption):972
msgid "Stateful HTTP example"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):967
msgid ""
"Let's take a look at the \"heart\" of our firewall and the new rule that "
"allows incoming HTTP connections:"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre):972
#, no-wrap
msgid ""
"\n"
"iptables -P INPUT DROP\n"
"iptables -A INPUT -i ! ${UPLINK} -j ACCEPT\n"
"iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT\n"
"<comment># Our new rule follows</comment>\n"
"iptables -A INPUT -p tcp --dport http -m state --state NEW -j ACCEPT\n"
"iptables -A INPUT -p tcp -i ${UPLINK} -j REJECT --reject-with tcp-reset\n"
"iptables -A INPUT -p udp -i ${UPLINK} -j REJECT --reject-with\n"
"icmp-port-unreachable\n"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):983
msgid ""
"This new rule allows incoming NEW TCP packets destined for our machine's "
"port 80 (http) to come in. Notice the placement of this rule. It's important "
"that it appears before our REJECT rules. Since iptables will apply the first "
"matching rule, putting it after our REJECT lines would cause this rule to "
"have no effect."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):993
#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre:caption):1001
msgid "Our final firewall script"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):996
msgid ""
"Now, let's take a look at our final firewall script, one that can be used on "
"a laptop, workstation, router, or server (or some combination thereof!)."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre):1001
#, no-wrap
msgid ""
"\n"
"\n"
"#!/bin/bash\n"
"\n"
"<comment># Our complete stateful firewall script.  This firewall can be customized for</comment>\n"
"<comment># a laptop, workstation, router or even a server. :)</comment>\n"
"\n"
"<comment># Change this to the name of the interface that provides your \"uplink\"</comment>\n"
"<comment># (connection to the Internet)</comment>\n"
"\n"
"UPLINK=\"eth1\"\n"
"\n"
"<comment># If you're a router (and thus should forward IP packets between interfaces),</comment>\n"
"<comment># you want ROUTER=\"yes\"; otherwise, ROUTER=\"no\"</comment>\n"
"\n"
"ROUTER=\"yes\"\n"
"\n"
"<comment># Change this next line to the static IP of your uplink interface for static SNAT, or</comment>\n"
"<comment># \"dynamic\" if you have a dynamic IP.  If you don't need any NAT, set NAT to \"\" to</comment>\n"
"<comment># disable it.</comment>\n"
"\n"
"NAT=\"1.2.3.4\"\n"
"\n"
"<comment># Change this next line so it lists all your network interfaces, including lo</comment>\n"
"\n"
"INTERFACES=\"lo eth0 eth1\"\n"
"\n"
"<comment># Change this line so that it lists the assigned numbers or symbolic names (from</comment>\n"
"<comment># /etc/services) of all the services that you'd like to provide to the general</comment>\n"
"<comment># public. If you don't want any services enabled, set it to \"\"</comment>\n"
"\n"
"SERVICES=\"http ftp smtp ssh rsync\"\n"
"\n"
"if [ \"$1\" = \"start\" ]\n"
"then\n"
"        echo \"Starting firewall...\"\n"
"        iptables -P INPUT DROP\n"
"        iptables -A INPUT -i ! ${UPLINK} -j ACCEPT\n"
"        iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT\n"
"\n"
"        <comment># Enable public access to certain services</comment>\n"
"        for x in ${SERVICES}\n"
"        do\n"
"                iptables -A INPUT -p tcp --dport ${x} -m state --state NEW -j ACCEPT\n"
"        done\n"
"\n"
"        iptables -A INPUT -p tcp -i ${UPLINK} -j REJECT --reject-with tcp-reset\n"
"        iptables -A INPUT -p udp -i ${UPLINK} -j REJECT --reject-with icmp-port-unreachable\n"
"\n"
"        <comment># Explicitly disable ECN</comment>\n"
"        if [ -e /proc/sys/net/ipv4/tcp_ecn ]\n"
"        then\n"
"                echo 0 &gt; /proc/sys/net/ipv4/tcp_ecn\n"
"        fi\n"
"\n"
"        <comment># Disable spoofing on all interfaces</comment>\n"
"        for x in ${INTERFACES}\n"
"        do\n"
"        echo 1 &gt; /proc/sys/net/ipv4/conf/${x}/rp_filter\n"
"        done\n"
"\n"
"        if [ \"$ROUTER\" = \"yes\" ]\n"
"        then\n"
"                <comment># We're a router of some kind, enable IP forwarding</comment>\n"
"                echo 1 &gt; /proc/sys/net/ipv4/ip_forward\n"
"                if [ \"$NAT\" = \"dynamic\" ]\n"
"                then\n"
"                <comment># Dynamic IP address, use masquerading</comment>\n"
"                echo \"Enabling masquerading (dynamic ip)...\"\n"
"                        iptables -t nat -A POSTROUTING -o ${UPLINK} -j MASQUERADE\n"
"                elif [ \"$NAT\" != \"\" ]\n"
"                then\n"
"                        <comment># Static IP, use SNAT</comment>\n"
"                        echo \"Enabling SNAT (static ip)...\"\n"
"                        iptables -t nat -A POSTROUTING -o ${UPLINK} -j SNAT --to ${UPIP}\n"
"                fi\n"
"        fi\n"
"\n"
"elif [ \"$1\" = \"stop\" ]\n"
"then\n"
"        echo \"Stopping firewall...\"\n"
"        iptables -F INPUT\n"
"        iptables -P INPUT ACCEPT\n"
"        <comment># Turn off NAT/masquerading, if any</comment>\n"
"        iptables -t nat -F POSTROUTING\n"
"fi\n"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):1094
msgid "Building a better server firewall"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):1096
msgid "Server improvements"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):1099
msgid ""
"It's often possible to make a firewall just an eensy bit \"better\". Of "
"course, what \"better\" means depends on your specific needs. Our existing "
"script could meet yours exactly, or maybe some additional tweaking is in "
"order. This section is intended to serve as a cookbook of ideas, "
"demonstrating ways to enhance your existing stateful firewall."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):1110
msgid "Logging techniques"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):1113
msgid ""
"So far, we haven't discussed how to go about logging anything. There's a "
"special target called LOG that you can use to log things. Along with LOG, "
"there's a special option called <c>--log-prefix</c> that allows you to "
"specify some text that will appear alongside the packet dump in the system "
"logs. Here's an example log rule:"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre:caption):1121
msgid "Example log rule"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre):1121
#, no-wrap
msgid ""
"\n"
"# <i> iptables -A INPUT -j LOG --log-prefix \"bad input:\"</i>\n"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):1125
msgid ""
"You wouldn't want to add this as the first rule in your INPUT chain, as it "
"would cause a log entry to be recorded for every packet that you receive! "
"Instead, place log rules further down in your INPUT chain with the intention "
"of logging strange packets and other anomalies."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):1132
msgid ""
"Here's an important note about the LOG target. Normally, when a rule "
"matches, a packet is either accepted, rejected, or dropped, and no further "
"rules are processed. However, when a log rule matches, the packet is logged. "
"However, it is not accepted, rejected, or dropped. Instead, the packet "
"continues on to the next rule, or the default chain policy is applied if the "
"log rule is the last on the chain."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):1141
msgid ""
"The LOG target can also be combined with the \"limit\" module (described in "
"the iptables man page) to minimize duplicate log entries. Here's an example:"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre:caption):1146
msgid "Limiting log entries"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(pre):1146
#, no-wrap
msgid ""
"\n"
"# <i>iptables -A INPUT -m state --state INVALID -m limit --limit 5/minute -j LOG --log-prefix \"INVALID STATE:\"</i>\n"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):1153
msgid "Creating your own chains"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):1156
msgid ""
"<c>iptables</c> allows you to create your own user-defined chains that can "
"be specified as targets in your rules. If you want to learn how to do this, "
"spend some time going through the Packet filtering HOWTO at the netfilter/"
"iptables project home page (<uri>http://www.netfilter.org/</uri>)."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):1166
msgid "Enforcing network usage policy"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):1169
msgid ""
"Firewalls offer a lot of power for those who want to enforce a network usage "
"policy for a corporate or academic LAN. You can control what packets your "
"machine forwards by adding rules to and setting policy for the FORWARD "
"chain. By adding rules to the OUTPUT chain, you can also control what "
"happens to packets that are generated locally, by users on the Linux box "
"itself. iptables also has the incredible ability to filter locally-created "
"packets based on owner (uid or gid). For more information on this, search "
"for \"owner\" in the iptables man page."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):1182
msgid "Other security angles"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):1185
msgid ""
"In our example firewall, we've assumed that all internal LAN traffic is "
"trustworthy, and that only incoming Internet traffic must be carefully "
"monitored. Depending on your particular network, that may or may not be the "
"case. There's certainly nothing stopping you from configuring your firewall "
"to provide protection from incoming LAN traffic. Consider other \"angles\" "
"of your network that you may want to protect. It may also be appropriate to "
"configure two separate LAN security \"zones\", each with its own security "
"policy."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):1200
msgid "Resources"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):1202
msgid "tcpdump"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):1205
msgid ""
"In this section, I'll point out a number of resources that you'll find "
"helpful as you put together your own stateful firewall. Let's start with an "
"important tool..."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):1211
msgid ""
"<uri link=\"http://www.tcpdump.org/\">tcpdump</uri> is an essential tool for "
"exploring low-level packet exchanges and verifying that your firewall is "
"working correctly. If you don't have it, get it. If you've got it, start "
"using it."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):1220
msgid "netfilter.kernelnotes.org"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):1223
msgid ""
"Visit the netfilter/iptables project home page (<uri>http://www.netfilter."
"org</uri>). You'll find many resources at this site, including the iptables "
"sources and a <uri link=\"http://www.netfilter.org/documentation/index."
"html#documentation-faq\">netfilter FAQ</uri>. Also <uri link=\"http://people."
"netfilter.org/~rusty/unreliable-guides/index.html\">Rusty's Remarkably "
"Guides</uri> are excellent, and include a basic networking concepts HOWTO, a "
"netfilter (iptables) HOWTO, a NAT HOWTO, and a netfilter hacking HOWTO for "
"developers."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):1238
msgid "iptables man page"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):1241
msgid ""
"Thankfully, there are a lot of good online netfilter resources; however, "
"don't forget the basics. The iptables man page is very detailed and is a "
"shining example of what a man page should be. It's actually an enjoyable "
"read."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):1250
msgid "Advanced Linux routing and traffic control HOWTO"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):1253
msgid ""
"There's now an <uri link=\"http://www.ds9a.nl/2.4Routing/\">Advanced Linux "
"Routing and Traffic Control HOWTO</uri> available. There's a good section "
"that shows how to use iptables to mark packets, and then use Linux routing "
"functionality to route the packets based on these marks."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(note):1260
msgid ""
"This HOWTO contains references to Linux's traffic control (quality of "
"service) functionality (accessed through the new <c>tc</c> command). This "
"new functionality, although very cool, is very poorly documented, and "
"attempting to figure out all aspects of Linux traffic control can be a very "
"frustrating task at this point."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):1270
msgid "Mailing lists"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):1273
msgid ""
"Users who have questions on netfilter/iptables usage, setup, or "
"configuration, or who want to help other users by sharing their experience "
"and knowledge, can contact the <uri link=\"http://www.netfilter.org/"
"mailinglists.html#ml-user\">netfilter user mailing list</uri>."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):1281
msgid ""
"Netfilter/iptables developers who have questions, suggestions, or "
"contributions to netfilter/iptables development can contact the <uri link="
"\"http://www.netfilter.org/mailinglists.html#ml-devel\">netfilter developer "
"mailing list</uri>."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):1288
msgid "You can also browse the list archives at these URLs."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):1295
msgid "Building Internet Firewalls, Second Edition"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):1298
msgid ""
"In June 2000, O'Reilly released an excellent book -- <uri link=\"http://www."
"oreilly.com/catalog/fire2/\">Building Internet Firewalls, Second Edition</"
"uri>. It's great reference book, especially for those times when you want to "
"configure your firewall to accept (or flat-out reject) a little-known "
"protocol that you're unfamiliar with."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):1306
msgid ""
"Well, that's it for our resources list, and our tutorial is complete. I hope "
"that this tutorial has been helpful to you, and I look forward to your "
"feedback."
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(title):1314
msgid "Your feedback"
msgstr ""

#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(p):1317
msgid ""
"We look forward to getting your feedback on this tutorial. Additionally, you "
"are welcome to contact the author, Daniel Robbins, at <mail link="
"\"drobbins@gentoo.org\">drobbins@gentoo.org</mail>."
msgstr ""

#. Place here names of translator, one per line. Format should be NAME; ROLE; E-MAIL
#: ../../gentoo/xml/htdocs/doc/en/articles/linux-24-stateful-fw-design.xml(None):0
msgid "translator-credits"
msgstr ""