diff options
author | Ginko (Giggum) <152240782+Giggum@users.noreply.github.com> | 2024-03-07 11:56:17 -0500 |
---|---|---|
committer | Ginko (Giggum) <152240782+Giggum@users.noreply.github.com> | 2024-03-07 11:56:17 -0500 |
commit | 5a6d1fd06294f84799a4103df0aa4b69c026533b (patch) | |
tree | 2857a2d86d6974f8444a7e73b07a822df7a4d7eb /docs/configuration | |
parent | 8d410c0843f7d8b88a5a20ccb778ae149c6fc098 (diff) | |
download | vyos-documentation-5a6d1fd06294f84799a4103df0aa4b69c026533b.tar.gz vyos-documentation-5a6d1fd06294f84799a4103df0aa4b69c026533b.zip |
Added conntrack-helper rules from T5614 to ipv4 rules documentation
Diffstat (limited to 'docs/configuration')
-rw-r--r-- | docs/configuration/firewall/ipv4.rst | 23 |
1 files changed, 23 insertions, 0 deletions
diff --git a/docs/configuration/firewall/ipv4.rst b/docs/configuration/firewall/ipv4.rst index 9a683d22..ff739418 100644 --- a/docs/configuration/firewall/ipv4.rst +++ b/docs/configuration/firewall/ipv4.rst @@ -325,6 +325,29 @@ There are a lot of matching criteria against which the packet can be tested. Match criteria based on connection mark. .. cfgcmd:: set firewall ipv4 forward filter rule <1-999999> + conntrack-helper <module> +.. cfgcmd:: set firewall ipv4 input filter rule <1-999999> + conntrack-helper <module> +.. cfgcmd:: set firewall ipv4 output filter rule <1-999999> + conntrack-helper <module> +.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> + conntrack-helper <module> + + Match based on connection tracking protocol helper module to secure use of + that helper module. See below for possible completions `<module>`. + + .. code-block:: none + + Possible completions: + ftp Related traffic from FTP helper + h323 Related traffic from H.323 helper + pptp Related traffic from PPTP helper + nfs Related traffic from NFS helper + sip Related traffic from SIP helper + tftp Related traffic from TFTP helper + sqlnet Related traffic from SQLNet helper + +.. cfgcmd:: set firewall ipv4 forward filter rule <1-999999> source address [address | addressrange | CIDR] .. cfgcmd:: set firewall ipv4 input filter rule <1-999999> source address [address | addressrange | CIDR] |