This is an Open Source Software project with no ties to Seawall, Incorporated.
The Seattle firewall is an ipchains based firewall that can be used on a dedicated masquerading firewall machine (including LRP), a multi-function masquerade gateway/server or on a standalone system.
- Customizable using configuration files and with explicit ipchains rules without modifying the released Seattle Firewall scripts.
- Supports status monitoring with an audible alarm when an "interesting" packet is detected.
- Supports VPN via ipip tunnels and PPTP (ipip tunnels require iproute2 and PPTP masquerading requires John Hardin's VPN Masquerade patches).
- Supports masqueraded PPTP servers, including PoPToP (requires John Hardin's patch, ipmasqadm and ipfwd).
- Beginning with release 3.0, Seattle Firewall supports masqueraded servers (requires ipmasqadm).
- Beginning with release 3.0, Seattle Firewall support running PoPToP on a Linux gateway/firewall.
- In release 3.0, Seattle Firewall includes limited support for a DMZ.
- Version 3.0 and later include an easy installation script.
I have personally used Seattle Firewall with RedHat 6.0, 6.1 and 6.2, with Slackware 7.0 and with LRP. The only real requirement is that your kernel supports ipchains.
I strongly urge you to read and print a copy of the Seattle Firewall Documentation. Once you've done that go to the Seattle Firewall project page at Sourceforge to download the code. If you run LRP, download the seawall-lrp module and see the Seattle Firewall LRP documentation. Otherwise, download the seawall module and...
If you haven't done so already, please read and print a copy of the Seattle Firewall Documentation.
With versions 3.0 and later, to install Seattle Firewall:
- unpack the tarball
- cd to the seawall directory
- Edit the files seawall.conf, apps and servers to fit your environment
- If you are using Caldera, RedHat, Mandrake, Corel, Slackware, SuSe or Debian then type "./install.sh"
- If your distribution has directory /etc/rc.d/init.d or /etc/init.d then type "./install.sh"
- For other distributions, determine where your distribution installs init scripts and type "./install.sh <init script directory>
- Start the firewall by typing "seawall start"
- If the install script was unable to configure Seattle Firewall be started automatically at boot, see these instructions.
Most firewall parameters can be set by editing the file /etc/seawall.conf and by modifying the files /etc/seawall/apps and /etc/seawall/servers. For customization beyond what is provided by editing these files, additional rules can be defined in other files in the /etc/seawall directory.
You should begin by taking a look at the differences between 2.x and 3.0. If you have no extra files in /etc/seawall/*, simply run the install script as described above (it won't overwrite your /etc/seawall.conf file), edit your /etc/seawall.conf file and remove the firewall variable assignment (it's no longer used), and "seawall restart". If you've added files in /etc/seawall, you will need to review the documentation regarding /etc/seawall/apps and /etc/seawall/servers to see if you need to delete files in /etc/seawall/ and add entries to these new files.
There's a mailing list at seawall-user@lists.sourceforge.net (the author regularly monitors this list).
Updated 5/7/2000 - Tom Eastep