]> git.proxmox.com Git - pve-docs.git/blame_incremental - pve-firewall-host-opts.adoc
totp: fix copy/paste mistake
[pve-docs.git] / pve-firewall-host-opts.adoc
... / ...
CommitLineData
1`enable`: `<boolean>` ::
2
3Enable host firewall rules.
4
5`log_level_in`: `<alert | crit | debug | emerg | err | info | nolog | notice | warning>` ::
6
7Log level for incoming traffic.
8
9`log_level_out`: `<alert | crit | debug | emerg | err | info | nolog | notice | warning>` ::
10
11Log level for outgoing traffic.
12
13`log_nf_conntrack`: `<boolean>` ('default =' `0`)::
14
15Enable logging of conntrack information.
16
17`ndp`: `<boolean>` ('default =' `0`)::
18
19Enable NDP (Neighbor Discovery Protocol).
20
21`nf_conntrack_allow_invalid`: `<boolean>` ('default =' `0`)::
22
23Allow invalid packets on connection tracking.
24
25`nf_conntrack_helpers`: `<string>` ('default =' ``)::
26
27Enable conntrack helpers for specific protocols. Supported protocols: amanda, ftp, irc, netbios-ns, pptp, sane, sip, snmp, tftp
28
29`nf_conntrack_max`: `<integer> (32768 - N)` ('default =' `262144`)::
30
31Maximum number of tracked connections.
32
33`nf_conntrack_tcp_timeout_established`: `<integer> (7875 - N)` ('default =' `432000`)::
34
35Conntrack established timeout.
36
37`nf_conntrack_tcp_timeout_syn_recv`: `<integer> (30 - 60)` ('default =' `60`)::
38
39Conntrack syn recv timeout.
40
41`nftables`: `<boolean>` ('default =' `0`)::
42
43Enable nftables based firewall (tech preview)
44
45`nosmurfs`: `<boolean>` ::
46
47Enable SMURFS filter.
48
49`protection_synflood`: `<boolean>` ('default =' `0`)::
50
51Enable synflood protection
52
53`protection_synflood_burst`: `<integer>` ('default =' `1000`)::
54
55Synflood protection rate burst by ip src.
56
57`protection_synflood_rate`: `<integer>` ('default =' `200`)::
58
59Synflood protection rate syn/sec by ip src.
60
61`smurf_log_level`: `<alert | crit | debug | emerg | err | info | nolog | notice | warning>` ::
62
63Log level for SMURFS filter.
64
65`tcp_flags_log_level`: `<alert | crit | debug | emerg | err | info | nolog | notice | warning>` ::
66
67Log level for illegal tcp flags filter.
68
69`tcpflags`: `<boolean>` ('default =' `0`)::
70
71Filter illegal combinations of TCP flags.
72