add filtering chains and ipset explanation to intro.html

This commit is contained in:
Kay Marquardt (Gnadelwartz)
2017-07-01 18:34:43 +02:00
parent 04e2830793
commit 895d7bfecd
9 changed files with 165 additions and 6 deletions

View File

@@ -69,6 +69,24 @@ prendre la configuraci
disposició de l'editor. Finalment, si la distribució ho suporta, hi ha
un botó per canviar si el tallafocs s'activa en engegar el sistema o no. <p>
<h3>Filtering chains</h3>
For better collaboration with external iptables scripts you can exclude individual
chains from the processing by the firewall. To do this, you must select direct
processing of rules in the settings and enter a filter list, which excludes
the appropriate chains from processing.
Chains that are not exculded from editing are flagged with a "not managed by firewall" message.
<p>
<h3>IP Sets</h3>
Newer versions of ip(6)table support the ipset extension.
IP sets are lists of IP addresses in the main memory, which can be searched very efficiently
and used as a condition in rules. On the main page, existing IP sets that can be used by
rules are displayed. Currently, however, it is not possible to manage these in the firewall.
<p>
<hr>

View File

@@ -69,5 +69,20 @@ Schlie&szlig;lich gibt noch eine Schaltfl&auml;che, um zu einzustellen ob die Fi
Bootens aktiviert wird oder nicht.
<p>
<h3>Filtern von Ketten</h3>
F&uuml;r die bessere Zusammenarbeit mit exernen IPtables Scripten kann man einzelne Ketten von
der Bearbeitung durch die Firewall ausnehmen. Dazu m&uuml;ssen sie in den Einstellungen die direkte
Bearbeitung von Regeln ausw&auml;hlen und eine Filterliste
eingeben, welche die passenden Ketten von der Bearbeitung ausnimmt.
Ketten die nicht bearbeitet werden mit dem Hinweis "nichit von Firewall verwaltet" angezeigt<p>
<h3>IP-Sets</h3>
Neuere Versionen von IPtable unterst&uuml;tzen die Erweiterung ipset. IP-Sets sind Listen von IP-Adressen
im Hauptspeicher, die sehr effizient durchsucht und als Bedingung in Regeln verwendet werden k&ouml;nnen.
Auf der Hauptseite werden vorhandene IP-Sets die von der Regeln verwendet werden k&ouml;nnen angezeigt.
Derzeit ist es allerdings nicht m&ouml;glich diese in der Firewall zu verwalten.
<hr>

View File

@@ -68,5 +68,22 @@ taking the configuration that is currently in the kernel and making it
available for editing. Finally, if your distribution supports it, there is
a button to change whether the firewall is activated at boot time or not. <p>
<h3>Filtering chains</h3>
For better collaboration with external iptables scripts you can exclude individual
chains from the processing by the firewall. To do this, you must select direct
processing of rules in the settings and enter a filter list, which excludes
the appropriate chains from processing.
Chains that are not exculded from editing are flagged with a "not managed by firewall" message.
<p>
<h3>IP Sets</h3>
Newer versions of ip(6)table support the ipset extension.
IP sets are lists of IP addresses in the main memory, which can be searched very efficiently
and used as a condition in rules. On the main page, existing IP sets that can be used by
rules are displayed. Currently, however, it is not possible to manage these in the firewall.
<p>
<hr>

View File

@@ -75,5 +75,23 @@ vervolgens kunt bewerken.
Tot slot, indien uw distributie dit ondersteund is er ook een knop waarmee u kunt
wijzigen of de firewall wel of niet tijdens het booten geactiveerd moet worden. <p>
<hr>
<h3>Filtering chains</h3>
For better collaboration with external iptables scripts you can exclude individual
chains from the processing by the firewall. To do this, you must select direct
processing of rules in the settings and enter a filter list, which excludes
the appropriate chains from processing.
Chains that are not exculded from editing are flagged with a "not managed by firewall" message.
<p>
<h3>IP Sets</h3>
Newer versions of ip(6)table support the ipset extension.
IP sets are lists of IP addresses in the main memory, which can be searched very efficiently
and used as a condition in rules. On the main page, existing IP sets that can be used by
rules are displayed. Currently, however, it is not possible to manage these in the firewall.
<p>
<hr>

View File

@@ -68,5 +68,23 @@ edycj
funkcję znajduje się przycisk umożliwiający wybranie, czy firewall
ma być aktywowany w momencie uruchamiania systemu czy nie. <p>
<hr>
<h3>Filtering chains</h3>
For better collaboration with external iptables scripts you can exclude individual
chains from the processing by the firewall. To do this, you must select direct
processing of rules in the settings and enter a filter list, which excludes
the appropriate chains from processing.
Chains that are not exculded from editing are flagged with a "not managed by firewall" message.
<p>
<h3>IP Sets</h3>
Newer versions of ip(6)table support the ipset extension.
IP sets are lists of IP addresses in the main memory, which can be searched very efficiently
and used as a condition in rules. On the main page, existing IP sets that can be used by
rules are displayed. Currently, however, it is not possible to manage these in the firewall.
<p>
<hr>

View File

@@ -35,5 +35,23 @@ Voc
Na parte de baixo da página está um botão para tornar a configuração atual do firewall ativa, carregando-a através do comando <tt>ipi(6)tables-restore</tt>. A seguir está um botão para fazer o inverso - pegar a configuração que está corrente no kernel e torná-la disponível para edição. Finalmente, se sua distribuição suportar, existe um botão para indicar se o firewall será ativado durante o boot ou não. <p>
<hr>
<h3>Filtering chains</h3>
For better collaboration with external iptables scripts you can exclude individual
chains from the processing by the firewall. To do this, you must select direct
processing of rules in the settings and enter a filter list, which excludes
the appropriate chains from processing.
Chains that are not exculded from editing are flagged with a "not managed by firewall" message.
<p>
<h3>IP Sets</h3>
Newer versions of ip(6)table support the ipset extension.
IP sets are lists of IP addresses in the main memory, which can be searched very efficiently
and used as a condition in rules. On the main page, existing IP sets that can be used by
rules are displayed. Currently, however, it is not possible to manage these in the firewall.
<p>
<hr>

View File

@@ -40,5 +40,23 @@
При попытке добавить или отредактировать правило, откроется новая страница на которой вы сможете выбрать <tt>Действие</tt> для правила, а так же <tt>Условие</tt>, при котором это Действие должно выполняться. <p>
В самом низу главной страницы находятся несколько кнопок: <tt>Применить конфигурацию</tt> - активирует текущие настройки брандмауэра, загружая их в ядро командой <tt>ipi(6)tables-restore</tt>. <tt>Вернуть конфигурацию</tt> действует наоборот - загружает в окно для конфигурирования настройки, активные в данный момент в ядре. <tt>Включать при запуске</tt> позволяет настроить автозапуск брандмауэра (если поддерживается вашим дистрибутивом). <tt>Сбросить конфигурацию</tt> - очищает все цепочки и таблицы, чтобы начать настройку с нуля.<p>
<hr>
<h3>Filtering chains</h3>
For better collaboration with external iptables scripts you can exclude individual
chains from the processing by the firewall. To do this, you must select direct
processing of rules in the settings and enter a filter list, which excludes
the appropriate chains from processing.
Chains that are not exculded from editing are flagged with a "not managed by firewall" message.
<p>
<h3>IP Sets</h3>
Newer versions of ip(6)table support the ipset extension.
IP sets are lists of IP addresses in the main memory, which can be searched very efficiently
and used as a condition in rules. On the main page, existing IP sets that can be used by
rules are displayed. Currently, however, it is not possible to manage these in the firewall.
<p>
<hr>

View File

@@ -63,5 +63,23 @@ vezme konfigur
podporuje, je tu ešte tlačidlo, ktoré nastaví, či sa má firewall aktivovať pri zavádzaní
systému alebo nie. <p>
<hr>
<h3>Filtering chains</h3>
For better collaboration with external iptables scripts you can exclude individual
chains from the processing by the firewall. To do this, you must select direct
processing of rules in the settings and enter a filter list, which excludes
the appropriate chains from processing.
Chains that are not exculded from editing are flagged with a "not managed by firewall" message.
<p>
<h3>IP Sets</h3>
Newer versions of ip(6)table support the ipset extension.
IP sets are lists of IP addresses in the main memory, which can be searched very efficiently
and used as a condition in rules. On the main page, existing IP sets that can be used by
rules are displayed. Currently, however, it is not possible to manage these in the firewall.
<p>
<hr>

19
firewall/help/ipset.txt Normal file
View File

@@ -0,0 +1,19 @@
<h3>Filtering chains</h3>
For better collaboration with external iptables scripts you can exclude individual
chains from the processing by the firewall. To do this, you must select direct
processing of rules in the settings and enter a filter list, which excludes
the appropriate chains from processing.
Chains that are not exculded from editing are flagged with a "not managed by firewall" message.
<p>
<h3>IP Sets</h3>
Newer versions of ip(6)table support the ipset extension.
IP sets are lists of IP addresses in the main memory, which can be searched very efficiently
and used as a condition in rules. On the main page, existing IP sets that can be used by
rules are displayed. Currently, however, it is not possible to manage these in the firewall.
<p>
<hr>