shorewall6-blacklist man page on Mageia

Man page or keyword search:  
man Server   17783 pages
apropos Keyword Search (all sections)
Output format
Mageia logo
[printable version]

SHOREWALL6-BLACKLIS(5)		[FIXME: manual]		SHOREWALL6-BLACKLIS(5)

NAME
       blacklist - shorewall6 Blacklist file

SYNOPSIS
       /etc/shorewall6/blacklist

DESCRIPTION
       The blacklist file is used to perform static blacklisting by source
       address (IP or MAC), or by application. The use of this file is
       deprecated in favor of shorewall6-blrules[1](5), and beginning with
       Shorewall 4.5.7, the blacklist file is no longer installed. Existing
       blacklist files can be converted to a corresponding blrules file using
       the shorewall6 update -b command.

       The columns in the file are as follows (where the column name is
       followed by a different name in parentheses, the different name is used
       in the alternate specification syntax).

       ADDRESS/SUBNET - {-|~mac-address|ip-address|address-range|+ipset}
	   Host address, network address, MAC address, IP address range (if
	   your kernel and ip6tables contain iprange match support) or ipset
	   name prefaced by "+" (if your kernel supports ipset match).
	   Exclusion (shorewall6-exclusion[2](5)) is supported.

	   MAC addresses must be prefixed with "~" and use "-" as a separator.

	   Example: ~00-A0-C9-15-39-78

	   A dash ("-") in this column means that any source address will
	   match. This is useful if you want to blacklist a particular
	   application using entries in the PROTOCOL and PORTS columns.

       PROTOCOL (proto) - {-|protocol-number|protocol-name}
	   Optional - if specified, must be a protocol number or a protocol
	   name from protocols(5).

       PORTS (port) - {-|port-name-or-number[,port-name-or-number]...}
	   May only be specified if the protocol is TCP (6), UDP (17), DCCP
	   (33), SCTP (132) or UDPLITE (136). A comma-separated list of
	   destination port numbers or service names from services(5).

       OPTIONS - {-|{dst|src|whitelist|audit}[,...]}
	   Optional - added in 4.4.12. If specified, indicates whether traffic
	   from ADDRESS/SUBNET (src) or traffic to ADDRESS/SUBNET (dst) should
	   be blacklisted. The default is src. If the ADDRESS/SUBNET column is
	   empty, then this column has no effect on the generated rule.

	       Note
	       In Shorewall 4.4.12, the keywords from and to were used in
	       place of src and dst respectively. Blacklisting was still
	       restricted to traffic arriving on an interface that has the
	       'blacklist' option set. So to block traffic from your local
	       network to an internet host, you had to specify blacklist on
	       your internal interface in shorewall6-interfaces[3] (5).

	       Note
	       Beginning with Shorewall 4.4.13, entries are applied based on
	       the blacklist setting in shorewall6-zones[4](5):

		1. 'blacklist' in the OPTIONS or IN_OPTIONS column. Traffic
		   from this zone is passed against the entries in this file
		   that have the src option (specified or defaulted).

		2. 'blacklist' in the OPTIONS or OUT_OPTIONS column. Traffic
		   to this zone is passed against the entries in this file
		   that have the dst option.
	   In Shorewall 4.4.20, the whitelist option was added. When whitelist
	   is specified, packets/connections that match the entry are not
	   matched against the remaining entries in the file.

	   The audit option was also added in 4.4.20 and causes packets
	   matching the entry to be audited. The audit option may not be
	   specified in whitelist entries and require AUDIT_TARGET support in
	   the kernel and ip6tables.

       When a packet arrives on an interface that has the blacklist option
       specified in shorewall6-interfaces[5](5), its source IP address and MAC
       address is checked against this file and disposed of according to the
       BLACKLIST_DISPOSITION and BLACKLIST_LOGLEVEL variables in
       shorewall6.conf[6](5). If PROTOCOL or PROTOCOL and PORTS are supplied,
       only packets matching the protocol (and one of the ports if PORTS
       supplied) are blocked.

EXAMPLE
       Example 1:
	   To block DNS queries from address fe80::2a0:ccff:fedb:31c4:

		       #ADDRESS/SUBNET		  PROTOCOL	  PORT
		       fe80::2a0:ccff:fedb:31c4/  udp		  53

       Example 2:
	   To block some of the nuisance applications:

		       #ADDRESS/SUBNET	       PROTOCOL	       PORT
		       -		       udp	       1024:1033,1434
		       -		       tcp	       57,1433,1434,2401,2745,3127,3306,3410,4899,5554,6101,8081,9898

FILES
       /etc/shorewall6/blacklist

SEE ALSO
       http://shorewall.net/blacklisting_support.htm

       http://shorewall.net/configuration_file_basics.htm#Pairs

       shorewall6(8), shorewall6-accounting(5), shorewall6-actions(5),
       shorewall6-hosts(5), shorewall6-interfaces(5), shorewall6-maclist(5),
       shorewall6-netmap(5),shorewall6-params(5), shorewall6-policy(5),
       shorewall6-providers(5), shorewall6-rtrules(5),
       shorewall6-routestopped(5), shorewall6-rules(5), shorewall6.conf(5),
       shorewall6-secmarks(5), shorewall6-tcclasses(5),
       shorewall6-tcdevices(5), shorewall6-tcrules(5), shorewall6-tos(5),
       shorewall6-tunnels(5), shorewall6-zones(5)

NOTES
	1. shorewall6-blrules
	   http://www.shorewall.net/manpages6/shorewall6-blrules.html

	2. shorewall6-exclusion
	   http://www.shorewall.net/manpages6/shorewall6-exclusion.html

	3. shorewall6-interfaces
	   http://www.shorewall.net/manpages6/shorewall6-interfaces.html

	4. shorewall6-zones
	   http://www.shorewall.net/manpages6/shorewall-zones.html

	5. shorewall6-interfaces
	   http://www.shorewall.net/manpages6/shorewall-interfaces.html

	6. shorewall6.conf
	   http://www.shorewall.net/manpages6/shorewall.conf.html

[FIXME: source]			  12/19/2013		SHOREWALL6-BLACKLIS(5)
[top]

List of man pages available for Mageia

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net