Compile and print firewall rules. This is useful for testing.
-
-
-
-*pve-firewall help* `[<cmd>]` `[OPTIONS]`
+*pve-firewall help* `[OPTIONS]`
Get help about specified command.
-`<cmd>`: `<string>` ::
+`--extra-args` `<array>` ::
-Command name
+Shows help for a specific command
`--verbose` `<boolean>` ::
Verbose output format.
-
-
-
*pve-firewall localnet*
Print information about local network.
-
-
*pve-firewall restart*
Restart the Proxmox VE firewall service.
-
-
*pve-firewall simulate* `[OPTIONS]`
-Simulate firewall rules. This does not simulate kernel 'routing' table.
-Instead, this simply assumes that routing from source zone to destination
-zone is possible.
+Simulate firewall rules. This does not simulates the kernel 'routing'
+table, but simply assumes that routing from source zone to destination zone
+is possible.
`--dest` `<string>` ::
Verbose output.
-
-
*pve-firewall start* `[OPTIONS]`
Start the Proxmox VE firewall service.
Debug mode - stay in foreground
-
-
*pve-firewall status*
Get firewall status.
-
-
*pve-firewall stop*
-Stop firewall. This removes all Proxmox VE related iptable rules. The host
-is unprotected afterwards.
-
-
+Stop the Proxmox VE firewall service. Note, stopping actively removes all
+Proxmox VE related iptable rules rendering the host potentially
+unprotected.