summaryrefslogtreecommitdiff
path: root/docs/configuration/firewall/ipv6.rst
diff options
context:
space:
mode:
authorNicolas Vollmar <nvo@scaling.ch>2024-05-14 07:02:48 +0200
committerMergify <37929162+mergify[bot]@users.noreply.github.com>2024-05-15 05:03:48 +0000
commit0c8dc509d96631b7a6c77058e6e72080efe00be9 (patch)
treea52d8229aaf3257682e8494a8630b00717655899 /docs/configuration/firewall/ipv6.rst
parentc43393e01c791aae069c478ca7b604f733419e4f (diff)
downloadvyos-documentation-0c8dc509d96631b7a6c77058e6e72080efe00be9.tar.gz
vyos-documentation-0c8dc509d96631b7a6c77058e6e72080efe00be9.zip
Fix lint issues
(cherry picked from commit c432da682bf117184729c36e84850d384ea34f49)
Diffstat (limited to 'docs/configuration/firewall/ipv6.rst')
-rw-r--r--docs/configuration/firewall/ipv6.rst25
1 files changed, 17 insertions, 8 deletions
diff --git a/docs/configuration/firewall/ipv6.rst b/docs/configuration/firewall/ipv6.rst
index 29cbe097..ce8c5ccf 100644
--- a/docs/configuration/firewall/ipv6.rst
+++ b/docs/configuration/firewall/ipv6.rst
@@ -16,7 +16,8 @@ Configuration commands covered in this section:
.. cfgcmd:: set firewall ipv6 ...
-From main structure defined in :doc:`Firewall Overview</configuration/firewall/index>`
+From main structure defined in
+:doc:`Firewall Overview</configuration/firewall/index>`
in this section you can find detailed information only for the next part
of the general structure:
@@ -373,10 +374,12 @@ There are a lot of matching criteria against which the packet can be tested.
remain valid if the IPv6 prefix changes and the host
portion of systems IPv6 address is static (for example, with SLAAC or
`tokenised IPv6 addresses
- <https://datatracker.ietf.org/doc/id/draft-chown-6man-tokenised-ipv6-identifiers-02.txt>`_)
+ <https://datatracker.ietf.org
+ /doc/id/draft-chown-6man-tokenised-ipv6-identifiers-02.txt>`_)
This functions for both individual addresses and address groups.
+ .. stop_vyoslinter
.. code-block:: none
# Match any IPv6 address with the suffix ::0000:0000:0000:beef
@@ -388,6 +391,8 @@ There are a lot of matching criteria against which the packet can be tested.
set firewall ipv6 forward filter rule 200 source group address-group WEBSERVERS
set firewall ipv6 forward filter rule 200 source address-mask ::ffff:ffff:ffff:ffff
+ .. start_vyoslinter
+
.. cfgcmd:: set firewall ipv6 forward filter rule <1-999999>
source fqdn <fqdn>
.. cfgcmd:: set firewall ipv6 input filter rule <1-999999>
@@ -941,13 +946,17 @@ Synproxy
********
Synproxy connections
-.. cfgcmd:: set firewall ipv6 [input | forward] filter rule <1-999999> action synproxy
-.. cfgcmd:: set firewall ipv6 [input | forward] filter rule <1-999999> protocol tcp
-.. cfgcmd:: set firewall ipv6 [input | forward] filter rule <1-999999> synproxy tcp mss <501-65535>
+.. cfgcmd:: set firewall ipv6 [input | forward] filter rule <1-999999>
+ action synproxy
+.. cfgcmd:: set firewall ipv6 [input | forward] filter rule <1-999999>
+ protocol tcp
+.. cfgcmd:: set firewall ipv6 [input | forward] filter rule <1-999999>
+ synproxy tcp mss <501-65535>
Set TCP-MSS (maximum segment size) for the connection
-.. cfgcmd:: set firewall ipv6 [input | forward] filter rule <1-999999> synproxy tcp window-scale <1-14>
+.. cfgcmd:: set firewall ipv6 [input | forward] filter rule <1-999999>
+ synproxy tcp window-scale <1-14>
Set the window scale factor for TCP window scaling
@@ -1167,8 +1176,8 @@ Show Firewall log
.. opcmd:: show log firewall ipv6 name <name> rule <rule>
Show the logs of all firewall; show all ipv6 firewall logs; show all logs
- for particular hook; show all logs for particular hook and priority; show all logs
- for particular custom chain; show logs for specific Rule-Set.
+ for particular hook; show all logs for particular hook and priority;
+ show all logs for particular custom chain; show logs for specific Rule-Set.
Example Partial Config
======================