Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix lint issues #1447

Merged
merged 1 commit into from
May 15, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 2 additions & 1 deletion docs/configuration/firewall/flowtables.rst
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,8 @@ can be done regarding flowtables.

.. cfgcmd:: set firewall flowtables ...

From main structure defined in :doc:`Firewall Overview</configuration/firewall/index>`
From main structure defined in
:doc:`Firewall Overview</configuration/firewall/index>`
in this section you can find detailed information only for the next part
of the general structure:

Expand Down
19 changes: 12 additions & 7 deletions docs/configuration/firewall/ipv4.rst
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,8 @@ Configuration commands covered in this section:

.. cfgcmd:: set firewall ipv4 ...

From main structure defined in :doc:`Firewall Overview</configuration/firewall/index>`
From main structure defined in
:doc:`Firewall Overview</configuration/firewall/index>`
in this section you can find detailed information only for the next part
of the general structure:

Expand Down Expand Up @@ -955,13 +956,17 @@ Synproxy
********
Synproxy connections

.. cfgcmd:: set firewall ipv4 [input | forward] filter rule <1-999999> action synproxy
.. cfgcmd:: set firewall ipv4 [input | forward] filter rule <1-999999> protocol tcp
.. cfgcmd:: set firewall ipv4 [input | forward] filter rule <1-999999> synproxy tcp mss <501-65535>
.. cfgcmd:: set firewall ipv4 [input | forward] filter rule <1-999999>
action synproxy
.. cfgcmd:: set firewall ipv4 [input | forward] filter rule <1-999999>
protocol tcp
.. cfgcmd:: set firewall ipv4 [input | forward] filter rule <1-999999>
synproxy tcp mss <501-65535>

Set TCP-MSS (maximum segment size) for the connection

.. cfgcmd:: set firewall ipv4 [input | forward] filter rule <1-999999> synproxy tcp window-scale <1-14>
.. cfgcmd:: set firewall ipv4 [input | forward] filter rule <1-999999>
synproxy tcp window-scale <1-14>

Set the window scale factor for TCP window scaling

Expand Down Expand Up @@ -1167,8 +1172,8 @@ Show Firewall log
.. opcmd:: show log firewall ipv4 name <name> rule <rule>

Show the logs of all firewall; show all ipv4 firewall logs; show all logs
for particular hook; show all logs for particular hook and priority; show all logs
for particular custom chain; show logs for specific Rule-Set.
for particular hook; show all logs for particular hook and priority;
show all logs for particular custom chain; show logs for specific Rule-Set.

Example Partial Config
======================
Expand Down
25 changes: 17 additions & 8 deletions docs/configuration/firewall/ipv6.rst
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,8 @@ Configuration commands covered in this section:

.. cfgcmd:: set firewall ipv6 ...

From main structure defined in :doc:`Firewall Overview</configuration/firewall/index>`
From main structure defined in
:doc:`Firewall Overview</configuration/firewall/index>`
in this section you can find detailed information only for the next part
of the general structure:

Expand Down Expand Up @@ -373,10 +374,12 @@ There are a lot of matching criteria against which the packet can be tested.
remain valid if the IPv6 prefix changes and the host
portion of systems IPv6 address is static (for example, with SLAAC or
`tokenised IPv6 addresses
<https://datatracker.ietf.org/doc/id/draft-chown-6man-tokenised-ipv6-identifiers-02.txt>`_)
<https://datatracker.ietf.org
/doc/id/draft-chown-6man-tokenised-ipv6-identifiers-02.txt>`_)

This functions for both individual addresses and address groups.

.. stop_vyoslinter
.. code-block:: none

# Match any IPv6 address with the suffix ::0000:0000:0000:beef
Expand All @@ -388,6 +391,8 @@ There are a lot of matching criteria against which the packet can be tested.
set firewall ipv6 forward filter rule 200 source group address-group WEBSERVERS
set firewall ipv6 forward filter rule 200 source address-mask ::ffff:ffff:ffff:ffff

.. start_vyoslinter

.. cfgcmd:: set firewall ipv6 forward filter rule <1-999999>
source fqdn <fqdn>
.. cfgcmd:: set firewall ipv6 input filter rule <1-999999>
Expand Down Expand Up @@ -941,13 +946,17 @@ Synproxy
********
Synproxy connections

.. cfgcmd:: set firewall ipv6 [input | forward] filter rule <1-999999> action synproxy
.. cfgcmd:: set firewall ipv6 [input | forward] filter rule <1-999999> protocol tcp
.. cfgcmd:: set firewall ipv6 [input | forward] filter rule <1-999999> synproxy tcp mss <501-65535>
.. cfgcmd:: set firewall ipv6 [input | forward] filter rule <1-999999>
action synproxy
.. cfgcmd:: set firewall ipv6 [input | forward] filter rule <1-999999>
protocol tcp
.. cfgcmd:: set firewall ipv6 [input | forward] filter rule <1-999999>
synproxy tcp mss <501-65535>

Set TCP-MSS (maximum segment size) for the connection

.. cfgcmd:: set firewall ipv6 [input | forward] filter rule <1-999999> synproxy tcp window-scale <1-14>
.. cfgcmd:: set firewall ipv6 [input | forward] filter rule <1-999999>
synproxy tcp window-scale <1-14>

Set the window scale factor for TCP window scaling

Expand Down Expand Up @@ -1167,8 +1176,8 @@ Show Firewall log
.. opcmd:: show log firewall ipv6 name <name> rule <rule>

Show the logs of all firewall; show all ipv6 firewall logs; show all logs
for particular hook; show all logs for particular hook and priority; show all logs
for particular custom chain; show logs for specific Rule-Set.
for particular hook; show all logs for particular hook and priority;
show all logs for particular custom chain; show logs for specific Rule-Set.

Example Partial Config
======================
Expand Down
Loading
Loading