change rule format: use named parameters
[pve-firewall.git] / debian / example / 100.fw
1 # Example VM firewall configuration
2
3 # VM specific firewall options
4 [OPTIONS]
5
6 # disable/enable the whole thing
7 enable: 1
8
9 # disable/enable MAC address filter
10 macfilter: 0
11
12 # default policy
13 policy_in: DROP
14 policy_out: REJECT
15
16 # log dropped incoming connection
17 log_level_in: info
18
19 # disable log for outgoing connections
20 log_level_out: nolog
21
22 # enable DHCP
23 dhcp: 1
24
25 # enable ips
26 ips: 1
27
28 # specify nfqueue queues (optionnal)
29 #ips_queues: 0
30 ips_queues: 0:3
31
32
33 [RULES]
34
35 #TYPE ACTION [OPTIONS]
36 # -i <INTERFACE>
37 # -source <SOURCE>
38 # -dest <DEST>
39 # -p <PROTOCOL>
40 # -dport <DESTINATION_PORT>
41 # -sport <SOURCE_PORT>
42
43 IN SSH(ACCEPT) -i net0
44 IN SSH(ACCEPT) -i net0 # a comment
45 IN SSH(ACCEPT) -i net0 -source 192.168.2.192 # only allow SSH from 192.168.2.192
46 IN SSH(ACCEPT) -i net0 -source 10.0.0.1-10.0.0.10 #accept SSH for ip in range 10.0.0.1 to 10.0.0.10
47 IN SSH(ACCEPT) -i net0 -source 10.0.0.1,10.0.0.2,10.0.0.3 #accept ssh for 10.0.0.1 or 10.0.0.2 or 10.0.0.3
48 IN SSH(ACCEPT) -i net0 -source +mynetgroup #accept ssh for netgroup mynetgroup
49 IN SSH(ACCEPT) -i net0 -source myserveralias #accept ssh for alias myserveralias
50
51 |IN SSH(ACCEPT) -i net0 # disabled rule
52
53 # add a security group
54 GROUP group1 -i net0
55
56 OUT DNS(ACCEPT) -i net0
57 OUT Ping(ACCEPT) -i net0
58 OUT SSH(ACCEPT)
59
60
61