1FIREWALLD.CONF(5)               firewalld.conf               FIREWALLD.CONF(5)
2
3
4

NAME

6       firewalld.conf - firewalld configuration file
7

SYNOPSIS

9       /etc/firewalld/firewalld.conf
10
11
12

DESCRIPTION

14       firewalld.conf is loaded by firewalld during the initialization
15       process. The file contains the basic configuration options for
16       firewalld.
17

OPTIONS

19       These are the options that can be set in the config file:
20
21       DefaultZone
22           This sets the default zone for connections or interfaces if the
23           zone is not selected or specified by NetworkManager, initscripts or
24           command line tool. The default zone is public.
25
26       MinimalMark
27           Deprecated. This option is ignored and no longer used. Marks are no
28           longer used internally.
29
30       CleanupOnExit
31           If firewalld stops, it cleans up all firewall rules. Setting this
32           option to no or false leaves the current firewall rules untouched.
33           The default value is yes or true.
34
35       Lockdown
36           If this option is enabled, firewall changes with the D-Bus
37           interface will be limited to applications that are listed in the
38           lockdown whitelist (see firewalld.lockdown-whitelist(5)). The
39           default value is no or false.
40
41       IPv6_rpfilter
42           If this option is enabled (it is by default), reverse path filter
43           test on a packet for IPv6 is performed. If a reply to the packet
44           would be sent via the same interface that the packet arrived on,
45           the packet will match and be accepted, otherwise dropped. For IPv4
46           the rp_filter is controlled using sysctl.
47
48       IndividualCalls
49           If this option is disabled (it is by default), combined -restore
50           calls are used and not individual calls to apply changes to the
51           firewall. The use of individiual calls increases the time that is
52           needed to apply changes and to start the daemon, but is good for
53           debugging as error messages are more specific.
54
55       LogDenied
56           Add logging rules right before reject and drop rules in the INPUT,
57           FORWARD and OUTPUT chains for the default rules and also final
58           reject and drop rules in zones for the configured link-layer packet
59           type. The possible values are: all, unicast, broadcast, multicast
60           and off. The default setting is off, which disables the logging.
61
62       AutomaticHelpers
63           Deprecated. This option is ignored and no longer used.
64
65       FirewallBackend
66           Selects the firewall backend implementation. Possible values are;
67           nftables (default), or iptables. This applies to all firewalld
68           primitives. The only exception is direct and passthrough rules
69           which always use the traditional iptables, ip6tables, and ebtables
70           backends.
71
72       FlushAllOnReload
73           Flush all runtime rules on a reload. In previous releases some
74           runtime configuration was retained during a reload, namely;
75           interface to zone assignment, and direct rules. This was confusing
76           to users. To get the old behavior set this to "no". Defaults to
77           "yes".
78
79       RFC3964_IPv4
80           As per RFC 3964, filter IPv6 traffic with 6to4 destination
81           addresses that correspond to IPv4 addresses that should not be
82           routed over the public internet. Defaults to "yes".
83
84       AllowZoneDrifting
85           Older versions of firewalld had undocumented behavior known as
86           "zone drifting". This allowed packets to ingress multiple zones -
87           this is a violation of zone based firewalls. However, some users
88           rely on this behavior to have a "catch-all" zone, e.g. the default
89           zone. You can enable this if you desire such behavior. It's
90           disabled by default for security reasons. Note: If "yes" packets
91           will only drift from source based zones to interface based zones
92           (including the default zone). Packets never drift from interface
93           based zones to other interfaces based zones (including the default
94           zone). Valid values; "yes", "no". Defaults to "no".
95

SEE ALSO

97       firewall-applet(1), firewalld(1), firewall-cmd(1), firewall-config(1),
98       firewalld.conf(5), firewalld.direct(5), firewalld.dbus(5),
99       firewalld.icmptype(5), firewalld.lockdown-whitelist(5), firewall-
100       offline-cmd(1), firewalld.richlanguage(5), firewalld.service(5),
101       firewalld.zone(5), firewalld.zones(5), firewalld.ipset(5),
102       firewalld.helper(5)
103

NOTES

105       firewalld home page:
106           http://firewalld.org
107
108       More documentation with examples:
109           http://fedoraproject.org/wiki/FirewallD
110

AUTHORS

112       Thomas Woerner <twoerner@redhat.com>
113           Developer
114
115       Jiri Popelka <jpopelka@redhat.com>
116           Developer
117
118       Eric Garver <eric@garver.life>
119           Developer
120
121
122
123firewalld 0.8.6                                              FIREWALLD.CONF(5)
Impressum