summaryrefslogtreecommitdiff
path: root/docs
diff options
context:
space:
mode:
authorGinko (Giggum) <152240782+Giggum@users.noreply.github.com>2024-03-07 11:56:17 -0500
committerGinko (Giggum) <152240782+Giggum@users.noreply.github.com>2024-03-07 11:56:17 -0500
commit5a6d1fd06294f84799a4103df0aa4b69c026533b (patch)
tree2857a2d86d6974f8444a7e73b07a822df7a4d7eb /docs
parent8d410c0843f7d8b88a5a20ccb778ae149c6fc098 (diff)
downloadvyos-documentation-5a6d1fd06294f84799a4103df0aa4b69c026533b.tar.gz
vyos-documentation-5a6d1fd06294f84799a4103df0aa4b69c026533b.zip
Added conntrack-helper rules from T5614 to ipv4 rules documentation
Diffstat (limited to 'docs')
-rw-r--r--docs/configuration/firewall/ipv4.rst23
1 files changed, 23 insertions, 0 deletions
diff --git a/docs/configuration/firewall/ipv4.rst b/docs/configuration/firewall/ipv4.rst
index 9a683d22..ff739418 100644
--- a/docs/configuration/firewall/ipv4.rst
+++ b/docs/configuration/firewall/ipv4.rst
@@ -325,6 +325,29 @@ There are a lot of matching criteria against which the packet can be tested.
Match criteria based on connection mark.
.. cfgcmd:: set firewall ipv4 forward filter rule <1-999999>
+ conntrack-helper <module>
+.. cfgcmd:: set firewall ipv4 input filter rule <1-999999>
+ conntrack-helper <module>
+.. cfgcmd:: set firewall ipv4 output filter rule <1-999999>
+ conntrack-helper <module>
+.. cfgcmd:: set firewall ipv4 name <name> rule <1-999999>
+ conntrack-helper <module>
+
+ Match based on connection tracking protocol helper module to secure use of
+ that helper module. See below for possible completions `<module>`.
+
+ .. code-block:: none
+
+ Possible completions:
+ ftp Related traffic from FTP helper
+ h323 Related traffic from H.323 helper
+ pptp Related traffic from PPTP helper
+ nfs Related traffic from NFS helper
+ sip Related traffic from SIP helper
+ tftp Related traffic from TFTP helper
+ sqlnet Related traffic from SQLNet helper
+
+.. cfgcmd:: set firewall ipv4 forward filter rule <1-999999>
source address [address | addressrange | CIDR]
.. cfgcmd:: set firewall ipv4 input filter rule <1-999999>
source address [address | addressrange | CIDR]