Hi Timo,

On 7/23/2019 11:52 AM, Timo Sigurdsson wrote:
> Hi Matt,
> 
> Matt Darfeuille schrieb am 22.07.2019 14:00:
> 
>> On 7/22/2019 12:39 PM, Timo Sigurdsson wrote:
>>> Hi,
>>>
>>> some of you may be aware of the new default firewall backend in Debian 10
>>> alias Buster, i.e. Buster defaults to nftables and all of xtables programs
>>> (iptables, ip6tables, etc.) are merely symlinks to iptables-nft,
>>> ip6tables-nft, etc. This means you can use the iptables syntax, but will
>>> actually get nftables rules. As I am planning to upgrade my router machine 
>>> to
>>> Debian 10 in the near future, I was wondering whether I should take any
>>> precautions prior or during the upgrade with regards to shorewall. I use
>>> shorewall in a dual-stack setup with one WAN interface and several LAN-side
>>> interfaces and zones.
>>>
>>
>> To air on the side of caution, I would test Shorewall and the desired
>> configuration using a VM or a chroot when moving away from Iptables and
>> report back any issues you might encounter.
>>
> thanks for the tip. Replicating the exact configuration in a VM would be a 
> bit tedious
> since that machine has about 12 interfaces. What I could start with, though, 
> is testing
> the migration of my small VPN server which only has two interfaces and a much 
> simpler
> shorewall configuration.
> 

To avoid creating all interfaces in the VM, one approach could be to
make them 'optional' (1) in the interfaces file.


Whenever possible, I try to take full advantage of the params (2) file.


1)  http://shorewall.org/manpages/shorewall-interfaces.html
2)  http://shorewall.org/manpages/shorewall-params.html

-Matt
-- 
Matt Darfeuille


_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to