]> git.proxmox.com Git - pve-docs.git/blob - pve-firewall-host-opts.adoc
fix #5429: network: override device names: include Type=ether
[pve-docs.git] / pve-firewall-host-opts.adoc
1 `enable`: `<boolean>` ::
2
3 Enable host firewall rules.
4
5 `log_level_in`: `<alert | crit | debug | emerg | err | info | nolog | notice | warning>` ::
6
7 Log level for incoming traffic.
8
9 `log_level_out`: `<alert | crit | debug | emerg | err | info | nolog | notice | warning>` ::
10
11 Log level for outgoing traffic.
12
13 `log_nf_conntrack`: `<boolean>` ('default =' `0`)::
14
15 Enable logging of conntrack information.
16
17 `ndp`: `<boolean>` ('default =' `0`)::
18
19 Enable NDP (Neighbor Discovery Protocol).
20
21 `nf_conntrack_allow_invalid`: `<boolean>` ('default =' `0`)::
22
23 Allow invalid packets on connection tracking.
24
25 `nf_conntrack_helpers`: `<string>` ('default =' ``)::
26
27 Enable conntrack helpers for specific protocols. Supported protocols: amanda, ftp, irc, netbios-ns, pptp, sane, sip, snmp, tftp
28
29 `nf_conntrack_max`: `<integer> (32768 - N)` ('default =' `262144`)::
30
31 Maximum number of tracked connections.
32
33 `nf_conntrack_tcp_timeout_established`: `<integer> (7875 - N)` ('default =' `432000`)::
34
35 Conntrack established timeout.
36
37 `nf_conntrack_tcp_timeout_syn_recv`: `<integer> (30 - 60)` ('default =' `60`)::
38
39 Conntrack syn recv timeout.
40
41 `nosmurfs`: `<boolean>` ::
42
43 Enable SMURFS filter.
44
45 `protection_synflood`: `<boolean>` ('default =' `0`)::
46
47 Enable synflood protection
48
49 `protection_synflood_burst`: `<integer>` ('default =' `1000`)::
50
51 Synflood protection rate burst by ip src.
52
53 `protection_synflood_rate`: `<integer>` ('default =' `200`)::
54
55 Synflood protection rate syn/sec by ip src.
56
57 `smurf_log_level`: `<alert | crit | debug | emerg | err | info | nolog | notice | warning>` ::
58
59 Log level for SMURFS filter.
60
61 `tcp_flags_log_level`: `<alert | crit | debug | emerg | err | info | nolog | notice | warning>` ::
62
63 Log level for illegal tcp flags filter.
64
65 `tcpflags`: `<boolean>` ('default =' `0`)::
66
67 Filter illegal combinations of TCP flags.
68