diff options
author | Nicolas Fort <nicolasfort1988@gmail.com> | 2024-06-14 11:14:53 -0300 |
---|---|---|
committer | Nicolas Fort <nicolasfort1988@gmail.com> | 2024-06-14 11:14:53 -0300 |
commit | fe416b56cfa30494172a0310c16fd2787330c7bb (patch) | |
tree | e478be5e535decf7eaee62eaa6f0dd0ea6e6d0dc /docs/configuration/firewall/ipv4.rst | |
parent | f1eb14c7e97e79dbaeac67c31e3d2b8737c6e2df (diff) | |
download | vyos-documentation-fe416b56cfa30494172a0310c16fd2787330c7bb.tar.gz vyos-documentation-fe416b56cfa30494172a0310c16fd2787330c7bb.zip |
Configuration Blueprints: add new example for firewall+vrf. Also, add note about usage of inbound and outbound interface when interface is attached to a non-default vrf.
Diffstat (limited to 'docs/configuration/firewall/ipv4.rst')
-rw-r--r-- | docs/configuration/firewall/ipv4.rst | 8 |
1 files changed, 8 insertions, 0 deletions
diff --git a/docs/configuration/firewall/ipv4.rst b/docs/configuration/firewall/ipv4.rst index e53f2480..39370c86 100644 --- a/docs/configuration/firewall/ipv4.rst +++ b/docs/configuration/firewall/ipv4.rst @@ -732,6 +732,10 @@ geoip) to keep database and rules updated. For example: ``eth2*``. Prepending character ``!`` for inverted matching criteria is also supported. For example ``!eth2`` +.. note:: If an interface is attached to a non-default vrf, when using + **inbound-interface**, vrf name must be used. For example ``set firewall + ipv4 forward filter rule 10 inbound-interface name MGMT`` + .. cfgcmd:: set firewall ipv4 forward filter rule <1-999999> inbound-interface group <iface_group> .. cfgcmd:: set firewall ipv4 input filter rule <1-999999> @@ -753,6 +757,10 @@ geoip) to keep database and rules updated. For example: ``eth2*``. Prepending character ``!`` for inverted matching criteria is also supported. For example ``!eth2`` +.. note:: If an interface is attached to a non-default vrf, when using + **outbound-interface**, real interface name must be used. For example + ``set firewall ipv4 forward filter rule 10 outbound-interface name eth0`` + .. cfgcmd:: set firewall ipv4 forward filter rule <1-999999> outbound-interface group <iface_group> .. cfgcmd:: set firewall ipv4 output filter rule <1-999999> |