shorewall-tcfilters(5)


NAME

   tcfilters - Shorewall u32/basic classifier rules file

SYNOPSIS

   /etc/shorewall/tcfilters

DESCRIPTION

   Entries in this file cause packets to be classified for traffic
   shaping.

   Beginning with Shorewall 4.4.15, the file may contain entries for both
   IPv4 and IPv6. By default, all rules apply to IPv4 but that can be
   changed by inserting a line as follows:

   IPV4
       Following entries apply to IPv4.

   IPV6
       Following entries apply to IPv6

   ALL
       Following entries apply to both IPv4 and IPv6. Each entry is
       processed twice; once for IPv4 and once for IPv6.

   The columns in the file are as follows (where the column name is
   followed by a different name in parentheses, the different name is used
   in the alternate specification syntax).

   CLASS - interface:class
       The name or number of an interface defined in
       shorewall-tcdevices[1](5) followed by a class number defined for
       that interface in shorewall-tcclasses[2](5).

   SOURCE - {-|address|+ipset}
       Source of the packet. May be a host or network address. DNS names
       are not allowed. Beginning with Shorewall 4.6.0, an ipset name
       (prefixed with '+') may be used if your kernel and ip6tables have
       the Basic Ematch capability and you set BASIC_FILTERS=Yes in
       shorewall.conf (5)[3]. The ipset name may optionally be followed by
       a number or a comma separated list of src and/or dst enclosed in
       square brackets ([...]). See shorewall-ipsets(5)[4] for details.

   DEST - {-|address|+ipset}
       Destination of the packet. May be a host or network address. DNS
       names are not allowed. Beginning with Shorewall 4.6.0, an ipset
       name (prefixed with '+') may be used if your kernel and ip6tables
       have the Basic Ematch capability and you set BASIC_FILTERS=Yes in
       shorewall.conf (5)[3]. The ipset name may optionally be followed by
       a number or a comma separated list of src and/or dst enclosed in
       square brackets ([...]). See shorewall-ipsets(5)[4] for details.

       You may exclude certain hosts from the set already defined through
       use of an exclusion (see shorewall-exclusion[5](5)).

   PROTO - {-|{protocol-number|protocol-name|all}[,...]}
       Protocol.

       Beginning with Shorewall 4.5.12, this column can accept a
       comma-separated list of protocols.

   DPORT - [-|port-name-or-number]
       Optional destination Ports. A Port name (from services(5)) or a
       port number; if the protocol is icmp, this column is interpreted as
       the destination icmp-type(s).

       This column was previously labelled DEST PORT(S).

   SPORT - [-|port-name-or-number]
       Optional source port.

       This column was previously labelled SOURCE PORT(S).

   TOS (Optional) - [-|tos]
       Specifies the value of the TOS field. The tos value can be any of
       the following:

       *   tos-minimize-delay

       *   tos-maximize-throughput

       *   tos-maximize-reliability

       *   tos-minimize-cost

       *   tos-normal-service

       *   hex-number

       *   hex-number/hex-number

       The hex-numbers must be exactly two digits (e.g., 0x04)x.

   LENGTH - [-|number]
       Optional - Must be a power of 2 between 32 and 8192 inclusive.
       Packets with a total length that is strictly less than the
       specified number will match the rule.

   PRIORITY - [-|priority]
       Added in Shorewall 4.5.8. Specifies the rule priority. The priority
       value must be > 0 and <= 65535.

       When a priority is not given:

       *   For Shorewall versions prior to 4.5.8 - all filters have
           priority 10.

       *   For Shorewall 4.5.8 and later - for each device, the compiler
           maintains a high-water priority with an initial value of 0.
           When a filter has no priority, the high-water priority is
           incremented by 1 and assigned to the filter. When a priority
           greater than the high-water priority is entered in this column,
           the high-water priority is set to the specified priority. An
           attempt to assign a priority value greater than 65535
           (explicitly or implicitly) raises an error.

       The default priority values used by other Shorewall-generated
       filters are as follows:

       *   Classify by packet mark - ( class priority << 8 ) | 20.

       *   Ingress policing - 10

       *   Simple TC ACK packets - 1

       *   Complex TC ACK packets - ( class priority << 8 ) | 10.

       *   Classify by TOS - ( class priority << 8 ) | 15.

       *   Class with 'occurs' - 65535

EXAMPLE

   Example 1:
       Place all 'ping' traffic on interface 1 in class 10. Note that ALL
       cannot be used because IPv4 ICMP and IPv6 ICMP are two different
       protocols.

                  #CLASS    SOURCE    DEST         PROTO   DPORT

                  IPV4

                  1:10      0.0.0.0/0 0.0.0.0/0    icmp    echo-request
                  1:10      0.0.0.0/0 0.0.0.0/0    icmp    echo-reply

                  IPV6

                  1:10      ::/0      ::/0         icmp6   echo-request
                  1:10      ::/0      ::/0         icmp6   echo-reply

   Example 2:
       Add two filters with priority 10 (Shorewall 4.5.8 or later).

                  #CLASS    SOURCE    DEST         PROTO   DPORT           PRIORITY

                  IPV4

                  1:10      0.0.0.0/0 0.0.0.0/0    icmp    echo-request    10
                  1:10      0.0.0.0/0 0.0.0.0/0    icmp    echo-reply      10

FILES

   /etc/shorewall/tcfilters

SEE ALSO

   http://www.shorewall.net/traffic_shaping.htm[6]

   http://www.shorewall.net/MultiISP.html[7]

   http://www.shorewall.net/PacketMarking.html[8]

   http://www.shorewall.net/configuration_file_basics.htm#Pairs[9]

   shorewall(8), shorewall-accounting(5), shorewall-actions(5),
   shorewall-blacklist(5), shorewall-ecn(5), shorewall-exclusion(5),
   shorewall-hosts(5), shorewall_interfaces(5), shorewall-ipsets(5),
   shorewall-maclist(5), shorewall-masq(5), shorewall-nat(5),
   shorewall-netmap(5), shorewall-params(5), shorewall-policy(5),
   shorewall-providers(5), shorewall-proxyarp(5), shorewall-rtrules(5),
   shorewall-routestopped(5), shorewall-rules(5), shorewall.conf(5),
   shorewall-secmarks(5), shorewall-tcclasses(5), shorewall-tcdevices(5),
   shorewall-tos(5), shorewall-tunnels(5), shorewall-zones(5)

NOTES

    1. shorewall-tcdevices
       http://www.shorewall.net/manpages/shorewall-tcdevices.html

    2. shorewall-tcclasses
       http://www.shorewall.net/manpages/shorewall-tcclasses.html

    3. shorewall.conf (5)
       http://www.shorewall.netshorewall.conf.html

    4. shorewall-ipsets(5)
       http://www.shorewall.netshorewall-ipsets.html

    5. shorewall-exclusion
       http://www.shorewall.net/manpages/shorewall-exclusion.html

    6. http://www.shorewall.net/traffic_shaping.htm
       http://www.shorewall.net/traffic_shaping.htm

    7. http://www.shorewall.net/MultiISP.html
       http://www.shorewall.net/MultiISP.html

    8. http://www.shorewall.net/PacketMarking.html
       http://www.shorewall.net/PacketMarking.html

    9. http://www.shorewall.net/configuration_file_basics.htm#Pairs
       http://www.shorewall.net/configuration_file_basics.htm#Pairs





Opportunity


Personal Opportunity - Free software gives you access to billions of dollars of software at no cost. Use this software for your business, personal use or to develop a profitable skill. Access to source code provides access to a level of capabilities/information that companies protect though copyrights. Open source is a core component of the Internet and it is available to you. Leverage the billions of dollars in resources and capabilities to build a career, establish a business or change the world. The potential is endless for those who understand the opportunity.

Business Opportunity - Goldman Sachs, IBM and countless large corporations are leveraging open source to reduce costs, develop products and increase their bottom lines. Learn what these companies know about open source and how open source can give you the advantage.





Free Software


Free Software provides computer programs and capabilities at no cost but more importantly, it provides the freedom to run, edit, contribute to, and share the software. The importance of free software is a matter of access, not price. Software at no cost is a benefit but ownership rights to the software and source code is far more significant.


Free Office Software - The Libre Office suite provides top desktop productivity tools for free. This includes, a word processor, spreadsheet, presentation engine, drawing and flowcharting, database and math applications. Libre Office is available for Linux or Windows.





Free Books


The Free Books Library is a collection of thousands of the most popular public domain books in an online readable format. The collection includes great classical literature and more recent works where the U.S. copyright has expired. These books are yours to read and use without restrictions.


Source Code - Want to change a program or know how it works? Open Source provides the source code for its programs so that anyone can use, modify or learn how to write those programs themselves. Visit the GNU source code repositories to download the source.





Education


Study at Harvard, Stanford or MIT - Open edX provides free online courses from Harvard, MIT, Columbia, UC Berkeley and other top Universities. Hundreds of courses for almost all major subjects and course levels. Open edx also offers some paid courses and selected certifications.


Linux Manual Pages - A man or manual page is a form of software documentation found on Linux/Unix operating systems. Topics covered include computer programs (including library and system calls), formal standards and conventions, and even abstract concepts.