diff options
author | Nicolas Fort <nicolasfort1988@gmail.com> | 2023-11-01 11:09:42 -0300 |
---|---|---|
committer | Nicolas Fort <nicolasfort1988@gmail.com> | 2023-11-01 11:09:42 -0300 |
commit | ece28ce8097f4835ff2e6fb55bc6ca13f0d1ffc0 (patch) | |
tree | dc5e53ba0e0481239b55f1f4a4073f2d647824d1 /docs/configuration | |
parent | 7625a30f2b9a73d0747ef7f146cc4f36b50c7c52 (diff) | |
download | vyos-documentation-ece28ce8097f4835ff2e6fb55bc6ca13f0d1ffc0.tar.gz vyos-documentation-ece28ce8097f4835ff2e6fb55bc6ca13f0d1ffc0.zip |
Update nat and firewall docs. Re-add zone and update several things.
Diffstat (limited to 'docs/configuration')
-rw-r--r-- | docs/configuration/firewall/general.rst | 331 | ||||
-rw-r--r-- | docs/configuration/firewall/index.rst | 6 | ||||
-rw-r--r-- | docs/configuration/firewall/zone.rst | 25 | ||||
-rw-r--r-- | docs/configuration/nat/nat66.rst | 8 |
4 files changed, 145 insertions, 225 deletions
diff --git a/docs/configuration/firewall/general.rst b/docs/configuration/firewall/general.rst index 3fe876f2..523215ec 100644 --- a/docs/configuration/firewall/general.rst +++ b/docs/configuration/firewall/general.rst @@ -22,6 +22,12 @@ Main structure is shown next: .. code-block:: none - set firewall + * bridge + - forward + + filter + * flowtable + - custom_flow_table + + ... * global-options + all-ping + broadcast-ping @@ -53,6 +59,9 @@ Main structure is shown next: + filter - ipv6-name + custom_name + * zone + - custom_zone_name + + ... Where, main key words and configuration paths that needs to be understood: @@ -75,7 +84,7 @@ Where, main key words and configuration paths that needs to be understood: the default action is set to **drop**. Custom firewall chains can be created, with commands -``set firewall [ipv4 | ipv6] [name | ipv6-name] <name> ...``. In order to use +``set firewall [ipv4 | ipv6] name <name> ...``. In order to use such custom chain, a rule with **action jump**, and the appropiate **target** should be defined in a base chain. @@ -313,9 +322,9 @@ A **domain group** represents a collection of domains. Provide a domain group description. -************** -Firewall Rules -************** +****************************** +Firewall - IPv4 and IPv6 Rules +****************************** For firewall filtering, firewall rules needs to be created. Each rule is numbered, has an action to apply if the rule is matched, and the ability @@ -333,6 +342,8 @@ The action can be : * ``accept``: accept the packet. + * ``continue``: continue parsing next rule. + * ``drop``: drop the packet. * ``reject``: reject the packet. @@ -347,15 +358,13 @@ The action can be : * ``synproxy``: synproxy the packet. .. cfgcmd:: set firewall [ipv4 | ipv6] forward filter rule <1-999999> action - [accept | drop | jump | queue | reject | return | synproxy] + [accept | continue | drop | jump | queue | reject | return | synproxy] .. cfgcmd:: set firewall [ipv4 | ipv6] input filter rule <1-999999> action - [accept | drop | jump | queue | reject | return | synproxy] + [accept | continue | drop | jump | queue | reject | return | synproxy] .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> action - [accept | drop | jump | queue | reject | return] -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> action - [accept | drop | jump | queue | reject | return] -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> action - [accept | drop | jump | queue | reject | return] + [accept | continue | drop | jump | queue | reject | return] +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> action + [accept | continue | drop | jump | queue | reject | return] This required setting defines the action of the current rule. If action is set to jump, then jump-target is also needed. @@ -366,9 +375,7 @@ The action can be : jump-target <text> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> jump-target <text> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - jump-target <text> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> jump-target <text> To be used only when action is set to jump. Use this command to specify @@ -379,15 +386,13 @@ not match any rule in it's chain. For base chains, possible options for **default-action** are **accept** or **drop**. .. cfgcmd:: set firewall [ipv4 | ipv6] forward filter default-action - [accept | drop] + [accept | drop] .. cfgcmd:: set firewall [ipv4 | ipv6] input filter default-action - [accept | drop] + [accept | drop] .. cfgcmd:: set firewall [ipv4 | ipv6] output filter default-action - [accept | drop] -.. cfgcmd:: set firewall ipv4 name <name> default-action - [accept | drop | jump | queue | reject | return] -.. cfgcmd:: set firewall ipv6 ipv6-name <name> default-action - [accept | drop | jump | queue | reject | return] + [accept | drop] +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> default-action + [accept | drop | jump | queue | reject | return] This set the default action of the rule-set if no rule matched a packet criteria. If defacult-action is set to ``jump``, then @@ -395,8 +400,7 @@ not match any rule in it's chain. For base chains, possible options for action can only be set to ``accept`` or ``drop``, while on custom chain, more actions are available. -.. cfgcmd:: set firewall name <name> default-jump-target <text> -.. cfgcmd:: set firewall ipv6-name <name> default-jump-target <text> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> default-jump-target <text> To be used only when ``defult-action`` is set to ``jump``. Use this command to specify jump target for default rule. @@ -418,18 +422,18 @@ log options can be defined. [disable | enable] .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> log [disable | enable] -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> log - [disable | enable] -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> log +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> log [disable | enable] Enable or disable logging for the matched packet. -.. cfgcmd:: set firewall ipv4 name <name> enable-default-log -.. cfgcmd:: set firewall ipv6 ipv6-name <name> enable-default-log +.. cfgcmd:: set firewall [ipv4 | ipv6] forward filter enable-default-log +.. cfgcmd:: set firewall [ipv4 | ipv6] input filter enable-default-log +.. cfgcmd:: set firewall [ipv4 | ipv6] output filter enable-default-log +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> enable-default-log Use this command to enable the logging of the default action on - custom chains. + the specified chain. .. cfgcmd:: set firewall [ipv4 | ipv6] forward filter rule <1-999999> log-options level [emerg | alert | crit | err | warn | notice @@ -440,10 +444,7 @@ log options can be defined. .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> log-options level [emerg | alert | crit | err | warn | notice | info | debug] -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - log-options level [emerg | alert | crit | err | warn | notice - | info | debug] -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> log-options level [emerg | alert | crit | err | warn | notice | info | debug] @@ -455,9 +456,7 @@ log options can be defined. log-options group <0-65535> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> log-options group <0-65535> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - log-options group <0-65535> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> log-options group <0-65535> Define log group to send message to. Only applicable if rule log is enable. @@ -468,9 +467,7 @@ log options can be defined. log-options snapshot-length <0-9000> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> log-options snapshot-length <0-9000> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - log-options snapshot-length <0-9000> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> log-options snapshot-length <0-9000> Define length of packet payload to include in netlink message. Only @@ -482,9 +479,7 @@ log options can be defined. log-options queue-threshold <0-65535> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> log-options queue-threshold <0-65535> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - log-options queue-threshold <0-65535> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> log-options queue-threshold <0-65535> Define number of packets to queue inside the kernel before sending them to @@ -497,8 +492,7 @@ Firewall Description For reference, a description can be defined for every single rule, and for every defined custom chain. -.. cfgcmd:: set firewall ipv4 name <name> description <text> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> description <text> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> description <text> Provide a rule-set description to a custom firewall chain. @@ -508,9 +502,7 @@ every defined custom chain. description <text> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> description <text> - -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> description <text> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> description <text> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> description <text> Provide a description for each rule. @@ -524,8 +516,7 @@ just disable the rule, rather than removing it. .. cfgcmd:: set firewall [ipv4 | ipv6] forward filter rule <1-999999> disable .. cfgcmd:: set firewall [ipv4 | ipv6] input filter rule <1-999999> disable .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> disable -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> disable -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> disable +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> disable Command for disabling a rule but keep it in the configuration. @@ -541,9 +532,7 @@ There are a lot of matching criteria against which the package can be tested. connection-status nat [destination | source] .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> connection-status nat [destination | source] -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - connection-status nat [destination | source] -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> connection-status nat [destination | source] Match criteria based on nat connection status. @@ -554,9 +543,7 @@ There are a lot of matching criteria against which the package can be tested. connection-mark <1-2147483647> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> connection-mark <1-2147483647> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - connection-mark <1-2147483647> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> connection-mark <1-2147483647> Match criteria based on connection mark. @@ -567,9 +554,7 @@ There are a lot of matching criteria against which the package can be tested. source address [address | addressrange | CIDR] .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> source address [address | addressrange | CIDR] -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - source address [address | addressrange | CIDR] -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> source address [address | addressrange | CIDR] .. cfgcmd:: set firewall [ipv4 | ipv6] forward filter rule <1-999999> @@ -578,9 +563,7 @@ There are a lot of matching criteria against which the package can be tested. destination address [address | addressrange | CIDR] .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> destination address [address | addressrange | CIDR] -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - destination address [address | addressrange | CIDR] -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> destination address [address | addressrange | CIDR] Match criteria based on source and/or destination address. This is similar @@ -592,7 +575,7 @@ There are a lot of matching criteria against which the package can be tested. set firewall ipv4 name FOO rule 50 source address 192.0.2.10-192.0.2.11 # with a '!' the rule match everything except the specified subnet set firewall ipv4 input filter FOO rule 51 source address !203.0.113.0/24 - set firewall ipv6 ipv6-name FOO rule 100 source address 2001:db8::202 + set firewall ipv6 name FOO rule 100 source address 2001:db8::202 .. cfgcmd:: set firewall [ipv4 | ipv6] forward filter rule <1-999999> source address-mask [address] @@ -600,9 +583,7 @@ There are a lot of matching criteria against which the package can be tested. source address-mask [address] .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> source address-mask [address] -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - source address-mask [address] -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> source address-mask [address] .. cfgcmd:: set firewall [ipv4 | ipv6] forward filter rule <1-999999> @@ -611,9 +592,7 @@ There are a lot of matching criteria against which the package can be tested. destination address-mask [address] .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> destination address-mask [address] -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - destination address-mask [address] -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> destination address-mask [address] An arbitrary netmask can be applied to mask addresses to only match against @@ -645,9 +624,7 @@ There are a lot of matching criteria against which the package can be tested. source fqdn <fqdn> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> source fqdn <fqdn> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - source fqdn <fqdn> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> source fqdn <fqdn> .. cfgcmd:: set firewall [ipv4 | ipv6] forward filter rule <1-999999> destination fqdn <fqdn> @@ -655,9 +632,7 @@ There are a lot of matching criteria against which the package can be tested. destination fqdn <fqdn> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> destination fqdn <fqdn> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - destination fqdn <fqdn> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> destination fqdn <fqdn> Specify a Fully Qualified Domain Name as source/destination matcher. Ensure @@ -669,9 +644,7 @@ There are a lot of matching criteria against which the package can be tested. source geoip country-code <country> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> source geoip country-code <country> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - source geoip country-code <country> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> source geoip country-code <country> .. cfgcmd:: set firewall [ipv4 | ipv6] forward filter rule <1-999999> @@ -680,9 +653,7 @@ There are a lot of matching criteria against which the package can be tested. destination geoip country-code <country> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> destination geoip country-code <country> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - destination geoip country-code <country> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> destination geoip country-code <country> .. cfgcmd:: set firewall [ipv4 | ipv6] forward filter rule <1-999999> @@ -691,9 +662,7 @@ There are a lot of matching criteria against which the package can be tested. source geoip inverse-match .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> source geoip inverse-match -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - source geoip inverse-match -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> source geoip inverse-match .. cfgcmd:: set firewall [ipv4 | ipv6] forward filter rule <1-999999> @@ -702,9 +671,7 @@ There are a lot of matching criteria against which the package can be tested. destination geoip inverse-match .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> destination geoip inverse-match -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - destination geoip inverse-match -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> destination geoip inverse-match Match IP addresses based on its geolocation. More info: `geoip matching @@ -723,9 +690,7 @@ geoip) to keep database and rules updated. source mac-address <mac-address> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> source mac-address <mac-address> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - source mac-address <mac-address> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> source mac-address <mac-address> Only in the source criteria, you can specify a mac-address. @@ -742,9 +707,7 @@ geoip) to keep database and rules updated. source port [1-65535 | portname | start-end] .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> source port [1-65535 | portname | start-end] -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - source port [1-65535 | portname | start-end] -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> source port [1-65535 | portname | start-end] .. cfgcmd:: set firewall [ipv4 | ipv6] forward filter rule <1-999999> @@ -753,9 +716,7 @@ geoip) to keep database and rules updated. destination port [1-65535 | portname | start-end] .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> destination port [1-65535 | portname | start-end] -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - destination port [1-65535 | portname | start-end] -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> destination port [1-65535 | portname | start-end] A port can be set with a port number or a name which is here @@ -780,9 +741,7 @@ geoip) to keep database and rules updated. source group address-group <name | !name> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> source group address-group <name | !name> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - source group address-group <name | !name> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> source group address-group <name | !name> .. cfgcmd:: set firewall [ipv4 | ipv6] forward filter rule <1-999999> @@ -791,9 +750,7 @@ geoip) to keep database and rules updated. destination group address-group <name | !name> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> destination group address-group <name | !name> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - destination group address-group <name | !name> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> destination group address-group <name | !name> Use a specific address-group. Prepend character ``!`` for inverted matching @@ -805,9 +762,7 @@ geoip) to keep database and rules updated. source group network-group <name | !name> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> source group network-group <name | !name> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - source group network-group <name | !name> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> source group network-group <name | !name> .. cfgcmd:: set firewall [ipv4 | ipv6] forward filter rule <1-999999> @@ -816,9 +771,7 @@ geoip) to keep database and rules updated. destination group network-group <name | !name> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> destination group network-group <name | !name> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - destination group network-group <name | !name> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> destination group network-group <name | !name> Use a specific network-group. Prepend character ``!`` for inverted matching @@ -841,9 +794,7 @@ geoip) to keep database and rules updated. destination group port-group <name | !name> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> destination group port-group <name | !name> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - destination group port-group <name | !name> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> destination group port-group <name | !name> Use a specific port-group. Prepend character ``!`` for inverted matching @@ -855,9 +806,7 @@ geoip) to keep database and rules updated. source group domain-group <name | !name> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> source group domain-group <name | !name> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - source group domain-group <name | !name> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> source group domain-group <name | !name> .. cfgcmd:: set firewall [ipv4 | ipv6] forward filter rule <1-999999> @@ -866,9 +815,7 @@ geoip) to keep database and rules updated. destination group domain-group <name | !name> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> destination group domain-group <name | !name> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - destination group domain-group <name | !name> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> destination group domain-group <name | !name> Use a specific domain-group. Prepend character ``!`` for inverted matching @@ -880,9 +827,7 @@ geoip) to keep database and rules updated. source group mac-group <name | !name> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> source group mac-group <name | !name> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - source group mac-group <name | !name> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> source group mac-group <name | !name> .. cfgcmd:: set firewall [ipv4 | ipv6] forward filter rule <1-999999> @@ -891,9 +836,7 @@ geoip) to keep database and rules updated. destination group mac-group <name | !name> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> destination group mac-group <name | !name> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - destination group mac-group <name | !name> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> destination group mac-group <name | !name> Use a specific mac-group. Prepend character ``!`` for inverted matching @@ -905,9 +848,7 @@ geoip) to keep database and rules updated. dscp [0-63 | start-end] .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> dscp [0-63 | start-end] -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - dscp [0-63 | start-end] -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> dscp [0-63 | start-end] .. cfgcmd:: set firewall [ipv4 | ipv6] forward filter rule <1-999999> @@ -916,9 +857,7 @@ geoip) to keep database and rules updated. dscp-exclude [0-63 | start-end] .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> dscp-exclude [0-63 | start-end] -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - dscp-exclude [0-63 | start-end] -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> dscp-exclude [0-63 | start-end] Match based on dscp value. @@ -929,9 +868,7 @@ geoip) to keep database and rules updated. fragment [match-frag | match-non-frag] .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> fragment [match-frag | match-non-frag] -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - fragment [match-frag | match-non-frag] -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> fragment [match-frag | match-non-frag] Match based on fragment criteria. @@ -950,7 +887,7 @@ geoip) to keep database and rules updated. icmpv6 [code | type] <0-255> .. cfgcmd:: set firewall ipv6 output filter rule <1-999999> icmpv6 [code | type] <0-255> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall ipv6 name <name> rule <1-999999> icmpv6 [code | type] <0-255> Match based on icmp|icmpv6 code and type. @@ -969,35 +906,53 @@ geoip) to keep database and rules updated. icmpv6 type-name <text> .. cfgcmd:: set firewall ipv6 output filter rule <1-999999> icmpv6 type-name <text> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall ipv6 name <name> rule <1-999999> icmpv6 type-name <text> Match based on icmp|icmpv6 type-name criteria. Use tab for information about what **type-name** criteria are supported. .. cfgcmd:: set firewall [ipv4 | ipv6] forward filter rule <1-999999> - inbound-interface <iface> + inbound-interface name <iface> .. cfgcmd:: set firewall [ipv4 | ipv6] input filter rule <1-999999> - inbound-interface <iface> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - inbound-interface <iface> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> - inbound-interface <iface> + inbound-interface name <iface> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> + inbound-interface name <iface> Match based on inbound interface. Wilcard ``*`` can be used. - For example: ``eth2*`` + For example: ``eth2*``. Prepending character ``!`` for inverted matching + criteria is also supportd. For example ``!eth2`` + +.. cfgcmd:: set firewall [ipv4 | ipv6] forward filter rule <1-999999> + inbound-interface group <iface_group> +.. cfgcmd:: set firewall [ipv4 | ipv6] input filter rule <1-999999> + inbound-interface group <iface_group> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> + inbound-interface group <iface_group> + + Match based on inbound interface group. Prepending character ``!`` for + inverted matching criteria is also supportd. For example ``!IFACE_GROUP`` .. cfgcmd:: set firewall [ipv4 | ipv6] forward filter rule <1-999999> - outbound-interface <iface> + outbound-interface name <iface> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> - outbound-interface <iface> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - outbound-interface <iface> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> - outbound-interface <iface> + outbound-interface name <iface> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> + outbound-interface name <iface> Match based on outbound interface. Wilcard ``*`` can be used. - For example: ``eth2*`` + For example: ``eth2*``. Prepending character ``!`` for inverted matching + criteria is also supportd. For example ``!eth2`` + +.. cfgcmd:: set firewall [ipv4 | ipv6] forward filter rule <1-999999> + outbound-interface group <iface_group> +.. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> + outbound-interface group <iface_group> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> + outbound-interface group <iface_group> + + Match based on outbound interface group. Prepending character ``!`` for + inverted matching criteria is also supportd. For example ``!IFACE_GROUP`` .. cfgcmd:: set firewall [ipv4 | ipv6] forward filter rule <1-999999> ipsec [match-ipsec | match-none] @@ -1005,9 +960,7 @@ geoip) to keep database and rules updated. ipsec [match-ipsec | match-none] .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> ipsec [match-ipsec | match-none] -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - ipsec [match-ipsec | match-none] -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> ipsec [match-ipsec | match-none] Match based on ipsec criteria. @@ -1018,9 +971,7 @@ geoip) to keep database and rules updated. limit burst <0-4294967295> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> limit burst <0-4294967295> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - limit burst <0-4294967295> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> limit burst <0-4294967295> Match based on the maximum number of packets to allow in excess of rate. @@ -1031,9 +982,7 @@ geoip) to keep database and rules updated. limit rate <text> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> limit rate <text> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - limit rate <text> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> limit rate <text> Match based on the maximum average rate, specified as **integer/unit**. @@ -1045,9 +994,7 @@ geoip) to keep database and rules updated. packet-length <text> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> packet-length <text> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - packet-length <text> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> packet-length <text> .. cfgcmd:: set firewall [ipv4 | ipv6] forward filter rule <1-999999> @@ -1056,9 +1003,7 @@ geoip) to keep database and rules updated. packet-length-exclude <text> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> packet-length-exclude <text> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - packet-length-exclude <text> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> packet-length-exclude <text> Match based on packet length criteria. Multiple values from 1 to 65535 @@ -1070,9 +1015,7 @@ geoip) to keep database and rules updated. packet-type [broadcast | host | multicast | other] .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> packet-type [broadcast | host | multicast | other] -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - packet-type [broadcast | host | multicast | other] -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> packet-type [broadcast | host | multicast | other] Match based on packet type criteria. @@ -1083,9 +1026,7 @@ geoip) to keep database and rules updated. protocol [<text> | <0-255> | all | tcp_udp] .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> protocol [<text> | <0-255> | all | tcp_udp] -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - protocol [<text> | <0-255> | all | tcp_udp] -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> protocol [<text> | <0-255> | all | tcp_udp] Match a protocol criteria. A protocol number or a name which is here @@ -1105,9 +1046,7 @@ geoip) to keep database and rules updated. recent count <1-255> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> recent count <1-255> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - recent count <1-255> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> recent count <1-255> .. cfgcmd:: set firewall [ipv4 | ipv6] forward filter rule <1-999999> @@ -1116,9 +1055,7 @@ geoip) to keep database and rules updated. recent time [second | minute | hour] .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> recent time [second | minute | hour] -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - recent time [second | minute | hour] -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> recent time [second | minute | hour] Match bases on recently seen sources. @@ -1129,9 +1066,7 @@ geoip) to keep database and rules updated. tcp flags <text> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> tcp flags <text> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - tcp flags <text> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> tcp flags <text> Allowed values fpr TCP flags: ``SYN``, ``ACK``, ``FIN``, ``RST``, ``URG``, @@ -1150,9 +1085,7 @@ geoip) to keep database and rules updated. state [established | invalid | new | related] [enable | disable] .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> state [established | invalid | new | related] [enable | disable] -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - state [established | invalid | new | related] [enable | disable] -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> state [established | invalid | new | related] [enable | disable] Match against the state of a packet. @@ -1163,9 +1096,7 @@ geoip) to keep database and rules updated. time startdate <text> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> time startdate <text> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - time startdate <text> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> time startdate <text> .. cfgcmd:: set firewall [ipv4 | ipv6] forward filter rule <1-999999> time starttime <text> @@ -1173,9 +1104,7 @@ geoip) to keep database and rules updated. time starttime <text> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> time starttime <text> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - time starttime <text> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> time starttime <text> .. cfgcmd:: set firewall [ipv4 | ipv6] forward filter rule <1-999999> time stopdate <text> @@ -1183,9 +1112,7 @@ geoip) to keep database and rules updated. time stopdate <text> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> time stopdate <text> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - time stopdate <text> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> time stopdate <text> .. cfgcmd:: set firewall [ipv4 | ipv6] forward filter rule <1-999999> time stoptime <text> @@ -1193,9 +1120,7 @@ geoip) to keep database and rules updated. time stoptime <text> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> time stoptime <text> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - time stoptime <text> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> time stoptime <text> .. cfgcmd:: set firewall [ipv4 | ipv6] forward filter rule <1-999999> time weekdays <text> @@ -1203,9 +1128,7 @@ geoip) to keep database and rules updated. time weekdays <text> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> time weekdays <text> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - time weekdays <text> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> time weekdays <text> Time to match the defined rule. @@ -1228,7 +1151,7 @@ geoip) to keep database and rules updated. hop-limit <eq | gt | lt> <0-255> .. cfgcmd:: set firewall ipv6 output filter rule <1-999999> hop-limit <eq | gt | lt> <0-255> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall ipv6 name <name> rule <1-999999> hop-limit <eq | gt | lt> <0-255> Match hop-limit parameter, where 'eq' stands for 'equal'; 'gt' stands for @@ -1240,9 +1163,7 @@ geoip) to keep database and rules updated. recent count <1-255> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> recent count <1-255> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - recent count <1-255> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> recent count <1-255> .. cfgcmd:: set firewall [ipv4 | ipv6] forward filter rule <1-999999> @@ -1251,14 +1172,20 @@ geoip) to keep database and rules updated. recent time <second | minute | hour> .. cfgcmd:: set firewall [ipv4 | ipv6] output filter rule <1-999999> recent time <second | minute | hour> -.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999> - recent time <second | minute | hour> -.. cfgcmd:: set firewall ipv6 ipv6-name <name> rule <1-999999> +.. cfgcmd:: set firewall [ipv4 | ipv6] name <name> rule <1-999999> recent time <second | minute | hour> Match when 'count' amount of connections are seen within 'time'. These matching criteria can be used to block brute-force attempts. +***************** +Firewall - Bridge +***************** + +********************* +Firewall - Flowtables +********************* + ******** Synproxy ******** diff --git a/docs/configuration/firewall/index.rst b/docs/configuration/firewall/index.rst index 4b923143..651886f7 100644 --- a/docs/configuration/firewall/index.rst +++ b/docs/configuration/firewall/index.rst @@ -1,4 +1,4 @@ -:lastproofread: 2023-09-17 +:lastproofread: 2023-11-01 ######## Firewall @@ -8,10 +8,6 @@ Firewall Starting from VyOS 1.4-rolling-202308040557, a new firewall structure can be found on all vyos installations. -.. note:: - The legacy and zone-based firewall configuration options is not longer - supported. They are here for reference purposes only. - Netfilter based ^^^^^^^^^^^^^^^ .. toctree:: diff --git a/docs/configuration/firewall/zone.rst b/docs/configuration/firewall/zone.rst index 38869c32..0ae9ceef 100644 --- a/docs/configuration/firewall/zone.rst +++ b/docs/configuration/firewall/zone.rst @@ -1,25 +1,22 @@ -:lastproofread: 2022-09-14 +:lastproofread: 2023-11-01 .. _firewall-zone: -################################ -Zone Based Firewall (Deprecated) -################################ +################### +Zone Based Firewall +################### .. note:: Starting from VyOS 1.4-rolling-202308040557, a new firewall - structure can be found on all vyos instalations, and zone based firewall is - no longer supported. Documentation for most of the new firewall CLI can be + structure can be found on all vyos instalations. Zone based firewall was + removed in that version, but re introduced in VyOS 1.4 and 1.5. All + versions built after 2023-10-22 has this feature. + Documentation for most of the new firewall CLI can be found in the `firewall <https://docs.vyos.io/en/latest/configuration/firewall/general.html>`_ chapter. The legacy firewall is still available for versions before - 1.4-rolling-202308040557 and can be found in the :ref:`firewall-legacy` - chapter. The examples in this section use the legacy firewall configuration - commands, since this feature has been removed in earlier releases. - -.. note:: For latest releases, refer the `firewall (interface-groups) - <https://docs.vyos.io/en/latest/configuration/firewall/general.html#interface-groups>`_ - main page to configure zone based rules. New syntax was introduced here - :vytask:`T5160` + 1.4-rolling-202308040557 and can be found in the + :doc:`legacy firewall configuration </configuration/firewall/general-legacy>` + chapter. In zone-based policy, interfaces are assigned to zones, and inspection policy is applied to traffic moving between the zones and acted on according to diff --git a/docs/configuration/nat/nat66.rst b/docs/configuration/nat/nat66.rst index 93dd3353..66cceb0a 100644 --- a/docs/configuration/nat/nat66.rst +++ b/docs/configuration/nat/nat66.rst @@ -82,7 +82,7 @@ Example: .. code-block:: none - set nat66 source rule 1 outbound-interface 'eth0' + set nat66 source rule 1 outbound-interface name 'eth0' set nat66 source rule 1 source prefix 'fc01::/64' set nat66 source rule 1 translation address 'fc00::/64' @@ -101,7 +101,7 @@ Example: .. code-block:: none - set nat66 destination rule 1 inbound-interface 'eth0' + set nat66 destination rule 1 inbound-interface name 'eth0' set nat66 destination rule 1 destination address 'fc00::/64' set nat66 destination rule 1 translation address 'fc01::/64' @@ -122,9 +122,9 @@ R1: set interfaces ethernet eth0 ipv6 address autoconf set interfaces ethernet eth1 address 'fc01::1/64' set nat66 destination rule 1 destination address 'fc00:470:f1cd:101::/64' - set nat66 destination rule 1 inbound-interface 'eth0' + set nat66 destination rule 1 inbound-interface name 'eth0' set nat66 destination rule 1 translation address 'fc01::/64' - set nat66 source rule 1 outbound-interface 'eth0' + set nat66 source rule 1 outbound-interface name 'eth0' set nat66 source rule 1 source prefix 'fc01::/64' set nat66 source rule 1 translation address 'fc00:470:f1cd:101::/64' |