.\" Man page generated from reStructuredText. . .TH "CDIST-TYPE__FIREWALLD_RULE" "7" "Jun 23, 2019" "5.1.2" "cdist" . .nr rst2man-indent-level 0 . .de1 rstReportMargin \\$1 \\n[an-margin] level \\n[rst2man-indent-level] level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] - \\n[rst2man-indent0] \\n[rst2man-indent1] \\n[rst2man-indent2] .. .de1 INDENT .\" .rstReportMargin pre: . RS \\$1 . nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] . nr rst2man-indent-level +1 .\" .rstReportMargin post: .. .de UNINDENT . RE .\" indent \\n[an-margin] .\" old: \\n[rst2man-indent\\n[rst2man-indent-level]] .nr rst2man-indent-level -1 .\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] .in \\n[rst2man-indent\\n[rst2man-indent-level]]u .. .SH NAME .sp cdist\-type__firewalld_rule \- Configure firewalld rules .SH DESCRIPTION .sp This cdist type allows you to manage rules in firewalld using the \fIdirect\fP way (i.e. no zone support). .SH REQUIRED PARAMETERS .INDENT 0.0 .TP .B rule The rule to apply. Essentially an firewalld command line without firewalld in front of it. .TP .B protocol Either ipv4, ipv4 or eb. See firewall\-cmd(1) .TP .B table The table to use (like filter or nat). See firewall\-cmd(1). .TP .B chain The chain to use (like INPUT_direct or FORWARD_direct). See firewall\-cmd(1). .TP .B priority The priority to use (0 is topmost). See firewall\-cmd(1). .UNINDENT .SH OPTIONAL PARAMETERS .INDENT 0.0 .TP .B state \(aqpresent\(aq or \(aqabsent\(aq, defaults to \(aqpresent\(aq .UNINDENT .SH EXAMPLES .INDENT 0.0 .INDENT 3.5 .sp .nf .ft C # Allow access from entrance.place4.ungleich.ch __firewalld_rule entrance \e \-\-protocol ipv4 \e \-\-table filter \e \-\-chain INPUT_direct \e \-\-priority 0 \e \-\-rule \(aq\-s entrance.place4.ungleich.ch \-j ACCEPT\(aq # Allow forwarding of traffic from br0 __firewalld_rule vm\-forward \-\-protocol ipv4 \e \-\-table filter \e \-\-chain FORWARD_direct \e \-\-priority 0 \e \-\-rule \(aq\-i br0 \-j ACCEPT\(aq # Ensure old rule is absent \- warning, the rule part must stay the same! __firewalld_rule vm\-forward \-\-protocol ipv4 \e \-\-table filter \e \-\-chain FORWARD_direct \e \-\-priority 0 \e \-\-rule \(aq\-i br0 \-j ACCEPT\(aq \e \-\-state absent .ft P .fi .UNINDENT .UNINDENT .SH SEE ALSO .sp \fBcdist\-type__iptables_rule\fP(7), \fBfirewalld\fP(8) .SH AUTHORS .sp Nico Schottelius <\fI\%nico\-cdist\-\-@\-\-schottelius.org\fP> .SH COPYING .sp Copyright (C) 2015 Nico Schottelius. You can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. .SH COPYRIGHT ungleich GmbH 2019 .\" Generated by docutils manpage writer. .