{"id":1840,"date":"2011-11-28T17:55:05","date_gmt":"2011-11-28T23:55:05","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=1840"},"modified":"2011-11-28T17:55:05","modified_gmt":"2011-11-28T23:55:05","slug":"shoreline-firewall-2","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=1840","title":{"rendered":"Shoreline Firewall"},"content":{"rendered":"<p><a href=\"http:\/\/www.shorewall.net\/\">Shoreline Firewall<\/a>.<\/p>\n<blockquote><p>The Shoreline Firewall, more commonly known as <span class=\"quote\">\u201c<span class=\"quote\">Shorewall<\/span>\u201d<\/span>, is high-level tool for configuring Netfilter. You describe your firewall\/gateway requirements using entries in a set of configuration files. Shorewall reads those configuration files and with the help of the iptables, iptables-restore, ip and tc utilities, Shorewall configures Netfilter and the Linux networking subsystem to match your requirements. Shorewall can be used on a dedicated firewall system, a multi-function gateway\/router\/server or on a standalone GNU\/Linux system. Shorewall does not use Netfilter&#8217;s ipchains compatibility mode and can thus take advantage of Netfilter&#8217;s connection state tracking capabilities.<\/p>\n<p>Shorewall is not a daemon. Once Shorewall has configured the Linux networking subsystem, its job is complete and there is no <span class=\"quote\">\u201c<span class=\"quote\">Shorewall process<\/span>\u201d<\/span> left running in your system. The <a class=\"ulink\" href=\"http:\/\/www.shorewall.net\/starting_and_stopping_shorewall.htm\" target=\"_self\">\/sbin\/shorewall program can be used at any time to monitor the Netfilter firewall<\/a>.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Shoreline Firewall. The Shoreline Firewall, more commonly known as \u201cShorewall\u201d, is high-level tool for configuring Netfilter. You describe your firewall\/gateway requirements using entries in a set of configuration files. Shorewall reads those configuration files and with the help of the &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=1840\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[110],"tags":[238],"class_list":["post-1840","post","type-post","status-publish","format-standard","hentry","category-networking","tag-firewall"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/1840","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1840"}],"version-history":[{"count":1,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/1840\/revisions"}],"predecessor-version":[{"id":1841,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/1840\/revisions\/1841"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1840"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1840"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1840"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}