X-Git-Url: https://git.proxmox.com/?p=pve-docs.git;a=blobdiff_plain;f=pve-firewall.adoc;h=1c94636cc245a16da53b6eb627effa27344a3028;hp=a7c9d240807a8c94dd482a7d20079956d317df95;hb=1600c60a4cc298ffa414f67ec50411056d5dd270;hpb=b6ee2d0ebc20351173a698477e54324e055f1ed0 diff --git a/pve-firewall.adoc b/pve-firewall.adoc index a7c9d24..1c94636 100644 --- a/pve-firewall.adoc +++ b/pve-firewall.adoc @@ -1,7 +1,8 @@ +[[chapter_pve_firewall]] ifdef::manvolnum[] -PVE({manvolnum}) -================ -include::attributes.txt[] +pve-firewall(8) +=============== +:pve-toplevel: NAME ---- @@ -9,7 +10,7 @@ NAME pve-firewall - PVE Firewall Daemon -SYNOPSYS +SYNOPSIS -------- include::pve-firewall.8-synopsis.adoc[] @@ -18,12 +19,14 @@ include::pve-firewall.8-synopsis.adoc[] DESCRIPTION ----------- endif::manvolnum[] - ifndef::manvolnum[] {pve} Firewall ============== -include::attributes.txt[] +:pve-toplevel: endif::manvolnum[] +ifdef::wiki[] +:title: Firewall +endif::wiki[] {pve} Firewall provides an easy way to protect your IT infrastructure. You can setup firewall rules for all hosts @@ -77,6 +80,7 @@ comments. Sections starts with a header line containing the section name enclosed in `[` and `]`. +[[pve_firewall_cluster_wide_setup]] Cluster Wide Setup ~~~~~~~~~~~~~~~~~~ @@ -139,6 +143,7 @@ To simplify that task, you can instead create an IPSet called firewall rules to access the GUI from remote. +[[pve_firewall_host_specific_configuration]] Host Specific Configuration ~~~~~~~~~~~~~~~~~~~~~~~~~~~ @@ -160,7 +165,7 @@ include::pve-firewall-host-opts.adoc[] This sections contains host specific firewall rules. - +[[pve_firewall_vm_container_configuration]] VM/Container Configuration ~~~~~~~~~~~~~~~~~~~~~~~~~~ @@ -242,6 +247,7 @@ OUT ACCEPT # accept all outgoing packages ---- +[[pve_firewall_security_groups]] Security Groups --------------- @@ -266,7 +272,7 @@ Then, you can add this group to a VM's firewall GROUP webserver ---- - +[[pve_firewall_ip_aliases]] IP Aliases ---------- @@ -304,7 +310,7 @@ explicitly assign the local IP address local_network 1.2.3.4 # use the single ip address ---- - +[[pve_firewall_ip_sets]] IP Sets ------- @@ -352,7 +358,7 @@ Traffic from these IPs is dropped by every host's and VM's firewall. ---- -[[ipfilter-section]] +[[pve_firewall_ipfilter_section]] Standard IP set `ipfilter-net*` ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ @@ -481,7 +487,7 @@ As for the link local addresses required for NDP, there's also an ``IP Filter'' (`ipfilter: 1`) option which can be enabled which has the same effect as adding an `ipfilter-net*` ipset for each of the VM's network interfaces containing the corresponding link local addresses. (See the -<> section for details.) +<> section for details.) Ports used by {pve}