]> git.proxmox.com Git - pve-docs.git/blob - pve-firewall-host-opts.adoc
network: override device names: suggest running update-initramfs
[pve-docs.git] / pve-firewall-host-opts.adoc
1 `enable`: `<boolean>` ::
2
3 Enable host firewall rules.
4
5 `log_level_in`: `<alert | crit | debug | emerg | err | info | nolog | notice | warning>` ::
6
7 Log level for incoming traffic.
8
9 `log_level_out`: `<alert | crit | debug | emerg | err | info | nolog | notice | warning>` ::
10
11 Log level for outgoing traffic.
12
13 `log_nf_conntrack`: `<boolean>` ('default =' `0`)::
14
15 Enable logging of conntrack information.
16
17 `ndp`: `<boolean>` ('default =' `0`)::
18
19 Enable NDP (Neighbor Discovery Protocol).
20
21 `nf_conntrack_allow_invalid`: `<boolean>` ('default =' `0`)::
22
23 Allow invalid packets on connection tracking.
24
25 `nf_conntrack_helpers`: `<string>` ('default =' ``)::
26
27 Enable conntrack helpers for specific protocols. Supported protocols: amanda, ftp, irc, netbios-ns, pptp, sane, sip, snmp, tftp
28
29 `nf_conntrack_max`: `<integer> (32768 - N)` ('default =' `262144`)::
30
31 Maximum number of tracked connections.
32
33 `nf_conntrack_tcp_timeout_established`: `<integer> (7875 - N)` ('default =' `432000`)::
34
35 Conntrack established timeout.
36
37 `nf_conntrack_tcp_timeout_syn_recv`: `<integer> (30 - 60)` ('default =' `60`)::
38
39 Conntrack syn recv timeout.
40
41 `nftables`: `<boolean>` ('default =' `0`)::
42
43 Enable nftables based firewall (tech preview)
44
45 `nosmurfs`: `<boolean>` ::
46
47 Enable SMURFS filter.
48
49 `protection_synflood`: `<boolean>` ('default =' `0`)::
50
51 Enable synflood protection
52
53 `protection_synflood_burst`: `<integer>` ('default =' `1000`)::
54
55 Synflood protection rate burst by ip src.
56
57 `protection_synflood_rate`: `<integer>` ('default =' `200`)::
58
59 Synflood protection rate syn/sec by ip src.
60
61 `smurf_log_level`: `<alert | crit | debug | emerg | err | info | nolog | notice | warning>` ::
62
63 Log level for SMURFS filter.
64
65 `tcp_flags_log_level`: `<alert | crit | debug | emerg | err | info | nolog | notice | warning>` ::
66
67 Log level for illegal tcp flags filter.
68
69 `tcpflags`: `<boolean>` ('default =' `0`)::
70
71 Filter illegal combinations of TCP flags.
72