>    Each "zone2zone" chain (e.g., net2fw) that has blacklist rules has
>    a companion blacklisting chain with the same name but prefaced by
>    "~". For example, 'net2fw' blacklist rules appear in the chain
>    ~net2fw. 

Actually, the '~' follows the name.

>    The 'maclist' interface option can also generate rules that are
>    traversed prior to those in the BLACKLIST section. If you want them
>    to come after the the blacklist rules, simply recode your maclist
>    rules in the NEW section of the rules file.

This isn't a very satisfactory solution. I'll work on it some more.

-Tom
------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2dcopy1
_______________________________________________
Shorewall-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-devel

Reply via email to