Shoreline Firewall is an iptables-based firewall for Linux systems

Edit Package shorewall

The Shoreline Firewall, more commonly known as "Shorewall", is a Netfilter
(iptables) based firewall that can be used on a dedicated firewall system,
a multi-function gateway/ router/server or on a standalone GNU/Linux system.

Refresh
Refresh
Source Files
Filename Size Changed
README.openSUSE 0000000879 879 Bytes
init-4.4.14.patch 0000000966 966 Bytes
shorewall-4.4.22.rpmlintrc 0000000682 682 Bytes
shorewall-4.5.4.1.tar.bz2 0000394571 385 KB
shorewall-core-4.5.4.1.tar.bz2 0000049713 48.5 KB
shorewall-docs-html-4.5.4.1.tar.bz2 0003808654 3.63 MB
shorewall-init-4.4.21_init_sh.patch 0000000656 656 Bytes
shorewall-init-4.5.2-install.patch 0000000838 838 Bytes
shorewall-init-4.5.4.1.tar.bz2 0000032063 31.3 KB
shorewall-lite-4.5.2-init.patch 0000001016 1016 Bytes
shorewall-lite-4.5.4.1.tar.bz2 0000045812 44.7 KB
shorewall.changes 0000050053 48.9 KB
shorewall.spec 0000018169 17.7 KB
shorewall6-4.5.2-init.patch 0000001049 1.02 KB
shorewall6-4.5.4.1.tar.bz2 0000188675 184 KB
shorewall6-lite-4.5.2-init.patch 0000001023 1023 Bytes
shorewall6-lite-4.5.4.1.tar.bz2 0000045241 44.2 KB
Revision 23 (latest revision is 125)
Stephan Kulow's avatar Stephan Kulow (coolo) accepted request 123172 from Togan Muftuoglu's avatar Togan Muftuoglu (toganm) (revision 23)
- Update to 4.5.4.1 For more details see changelog.txt and
  releasenotes.txt
  * Beginning with Shorewall 4.4.22, the 'pptpserver' tunnel type
    has been configured as a PPTP client running on the firewall
    rather than as a server on the firewall. It is now correctly
    configured as  a server.
  * The shorewall-accounting (5) and shorewall6-accounting (5)
    documentation for the IPSEC column is incorrect. Rather than
    'accountin' and 'accountout', the chain names should be
    'accipsecin' and 'accipsecout'.
  *  IPSEC accounting did not work if the accounting file was
     sectioned. Beginning with this release, the IPSEC column can
     be specified in any section. As always, the IPSEC column
     contains a comma-separated  list of items. In the FORWARD
     chain, the first (or only) item in the list must be either
     'in' or 'out' to indicate whether the rule  matches incoming
     packets that have been decrypted ('in') or outgoing packets
     that will be encrypted ('out'). There are no restrictions with
     respect to which chain IPSEC rules can appear in  a sectioned
     file.
Comments 0
openSUSE Build Service is sponsored by