Am 19.11.18 um 18:13 schrieb Tom Eastep:
> On 11/16/18 1:31 PM, Boris wrote:
>> Am 14.11.18 um 19:01 schrieb Tom Eastep:
>>>
>>> You can assign a zone (call it 'hack') to eth0 then add these policies:
>>>
>>> hack        all     ACCEPT
>>> all hack    REJECT  <log level>
>>>
>>
>> Hej Tom,
>>
>> thank you VERY much for this!
>> I will try this the next days and give report.
>>
> I have thought a bit more about this, and I think that a better idea is
> to just add an entry in /etc/shorewall/interfaces that associates eth0
> with the same zone as the ppp interface (probably 'net' or 'wan'). You
> don't have to worry about output traffic on eth0 because it has no IP
> address; hence, there can be no routes out of the interface and no IP
> traffic will be sent there.

Hej Tom,


thanks again for spending time and brain for my trouble!

I was just working on the idea with the dedicated inbound zone that you
suggested to be named 'hack'. I did not yet have good success when your
new idea reaches me. So I stepped back with plan one and followed the
new plan, what is obviously very much easier.

I added

net     eth0

to /etc/shorewall/interfaces and changed

all     all    ACCEPT

back to

all     all    REJECT     NFLOG(4)

in /etc/shorewall/polcy.

In short words: It works!!
Mostly the best solutions are simple. This is a perfect proof for that.

I will now spend some time in checking the behaviour because still I
find all that to be extremely strange.

But on that point it's time to give you many thanks!! I will open a beer
and drink on you!

Boris


_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to