firewalld.dbus — firewalld D-Bus interface description
This is the basic firewalld object path structure. The used interfaces are explained below in the section called “Interfaces”.
/org/fedoraproject/FirewallD1 Interfaces org.fedoraproject.FirewallD1 org.fedoraproject.FirewallD1.direct org.fedoraproject.FirewallD1.ipset org.fedoraproject.FirewallD1.policies org.fedoraproject.FirewallD1.zone org.freedesktop.DBus.Introspectable org.freedesktop.DBus.Properties /org/fedoraproject/FirewallD1/config Interfaces org.fedoraproject.FirewallD1.config org.fedoraproject.FirewallD1.config.direct org.fedoraproject.FirewallD1.config.policies org.freedesktop.DBus.Introspectable org.freedesktop.DBus.Properties /org/fedoraproject/FirewallD1/config/zone/i Interfaces org.fedoraproject.FirewallD1.config.zone org.freedesktop.DBus.Introspectable org.freedesktop.DBus.Properties /org/fedoraproject/FirewallD1/config/service/i Interfaces: org.fedoraproject.FirewallD1.config.service org.freedesktop.DBus.Introspectable org.freedesktop.DBus.Properties /org/fedoraproject/FirewallD1/config/ipset/i Interfaces org.fedoraproject.FirewallD1.config.ipset org.freedesktop.DBus.Introspectable org.freedesktop.DBus.Properties /org/fedoraproject/FirewallD1/config/icmptype/i Interfaces org.fedoraproject.FirewallD1.config.icmptype org.freedesktop.DBus.Introspectable org.freedesktop.DBus.Properties
This interface contains general runtime operations, like: reloading, panic mode, default zone handling, getting services and icmp types and their settings.
authorizeAll
() → NothingInitiate authorization for the complete firewalld D-Bus interface. This method it mostly useful for configuration applications.
completeReload
() → NothingReload firewall completely, even netfilter kernel modules. This will most likely terminate active connections, because state information is lost. This option should only be used in case of severe firewall problems. For example if there are state information problems that no connection can be established with correct firewall rules.
disablePanicMode
() → NothingDisable panic mode. After disabling panic mode established connections might work again, if panic mode was enabled for a short period of time.
Possible errors: NOT_ENABLED, COMMAND_FAILED
enablePanicMode
() → NothingEnable panic mode. All incoming and outgoing packets are dropped, active connections will expire. Enable this only if there are serious problems with your network environment.
Possible errors: ALREADY_ENABLED, COMMAND_FAILED
getDefaultZone
() → sReturn default zone.
getIcmpTypeSettings
(s: icmptype
) → (sssas)
Return runtime settings of given icmptype
.
For getting permanent settings see org.fedoraproject.FirewallD1.config.icmptype.Methods.getSettings.
Settings are in format: version
, name
, description
, array of destinations
.
version (s)
: see version
attribute of icmptype
tag in firewalld.icmptype(5).name (s)
: see short
tag in firewalld.icmptype(5).description (s)
: see description
tag in firewalld.icmptype(5).destinations (as)
: array, either empty or containing strings 'ipv4' or 'ipv6', see destination
tag in firewalld.icmptype(5).
Possible errors: INVALID_ICMPTYPE
getLogDenied
() → s
Retruns the LogDenied value.
If LogDenied is enabled, then logging rules are added right before reject and drop rules in the INPUT, FORWARD and OUTPUT chains for the default rules and also final reject and drop rules in zones.
Possible values are: all
, unicast
, broadcast
, multicast
and off
.
The default value is off
getServiceSettings
(s: service
) → (sssa(ss)asa{ss}asa(ss))
Return runtime settings of given service
.
For getting permanent settings see org.fedoraproject.FirewallD1.config.service.Methods.getSettings.
Settings are in format: version
, name
, description
, array of ports
(port, protocol), array of module names
, dictionary of destinations
, array of protocols
and array of source-ports
(port, protocol).
version (s)
: see version
attribute of service
tag in firewalld.service(5).name (s)
: see short
tag in firewalld.service(5).description (s)
: see description
tag in firewalld.service(5).ports (a(ss))
: array of port and protocol pairs. See port
tag in firewalld.service(5).module names (as)
: array of kernel netfilter helpers, see module
tag in firewalld.service(5).destinations (a{ss})
: dictionary of {IP family : IP address} where 'IP family' key can be either 'ipv4' or 'ipv6'. See destination
tag in firewalld.service(5).protocols (as)
: array of protocols, see protocol
tag in firewalld.service(5).source-ports (a(ss))
: array of port and protocol pairs. See source-port
tag in firewalld.service(5).
Possible errors: INVALID_SERVICE
getZoneSettings
(s: zone
) → (sssbsasa(ss)asba(ssss)asasasasa(ss))
Return runtime settings of given zone
.
For getting permanent settings see org.fedoraproject.FirewallD1.config.zone.Methods.getSettings.
Settings are in format: version
, name
, description
, UNUSED
, target
, array of services
, array of ports
(port, protocol), array of icmp-blocks
, masquerade
, array of forward-ports
(port, protocol, to-port, to-addr), array of interfaces
, array of sources
, array of rich rules
, array of protocols
and array of source-ports
(port, protocol).
version (s)
: see version
attribute of zone
tag in firewalld.zone(5).name (s)
: see short
tag in firewalld.zone(5).description (s)
: see description
tag in firewalld.zone(5).UNUSED (b)
: this boolean value is no longer used for anything.target (s)
: see target
attribute of zone
tag in firewalld.zone(5).services (as)
: array of service names, see service
tag in firewalld.zone(5).ports (a(ss))
: array of port and protocol pairs. See port
tag in firewalld.zone(5).icmp-blocks (as)
: array of icmp-blocks. See icmp-block
tag in firewalld.zone(5).masquerade (b)
: see masquerade
tag in firewalld.zone(5).forward-ports (a(ssss))
: array of (port, protocol, to-port, to-addr). See forward-port
tag in firewalld.zone(5).interfaces (as)
: array of interfaces. See interface
tag in firewalld.zone(5).source addresses (as)
: array of source addresses. See source
tag in firewalld.zone(5).rich rules (as)
: array of rich-language rules. See rule
tag in firewalld.zone(5).protocols (as)
: array of protocols, see protocol
tag in firewalld.zone(5).source-ports (a(ss))
: array of port and protocol pairs. See source-port
tag in firewalld.zone(5).
Possible errors: INVALID_ZONE
listIcmpTypes
() → asReturn array of names (s) of icmp types in runtime configuration. For permanent configuration see org.fedoraproject.FirewallD1.config.Methods.listIcmpTypes.
listServices
() → asReturn array of service names (s) in runtime configuration. For permanent configuration see org.fedoraproject.FirewallD1.config.Methods.listServices.
queryPanicMode
() → bReturn true if panic mode is enabled, false otherwise. In panic mode all incoming and outgoing packets are dropped.
reload
() → NothingReload firewall rules and keep state information. Current permanent configuration will become new runtime configuration, i.e. all runtime only changes done until reload are lost with reload if they have not been also in permanent configuration.
runtimeToPermanent
() → NothingMake runtime settings permanent. Replaces permanent settings with runtime settings for zones, services, icmptypes, direct and policies (lockdown whitelist).
Possible errors: RT_TO_PERM_FAILED
setDefaultZone
(s: zone
) → Nothing
Set default zone for connections and interfaces where no zone has been selected to zone
.
Setting the default zone changes the zone for the connections or interfaces, that are using the default zone.
This is a runtime and permanent change.
Possible errors: ZONE_ALREADY_SET, COMMAND_FAILED
setLogDenied
(s: value
) → Nothing
Set LogDenied value to value
.
If LogDenied is enabled, then logging rules are added right before reject and drop rules in the INPUT, FORWARD and OUTPUT chains for the default rules and also final reject and drop rules in zones.
Possible values are: all
, unicast
, broadcast
, multicast
and off
.
The default value is off
This is a runtime and permanent change.
Possible errors: ALREADY_SET, INVALID_VALUE
DefaultZoneChanged
(s: zone
)
Emitted when default zone has been changed to zone
.
LogDeniedChanged
(s: value
)Emitted when LogDenied value has been changed.
PanicModeDisabled
()Emitted when panic mode has been deactivated.
PanicModeEnabled
()Emitted when panic mode has been activated.
Reloaded
()Emitted when firewalld has been reloaded. Also emitted for a complete reload.
BRIDGE
- b - (ro)Indicates whether the firewall has ethernet bridge support.
IPSet
- b - (ro)Indicates whether the firewall has IPSet support.
IPSetTypes
- as - (ro)The supported IPSet types by ipset and firewalld.
IPv4
- b - (ro)Indicates whether the firewall has IPv4 support.
IPv6
- b - (ro)Indicates whether the firewall has IPv6 support.
IPv6_rpfilter
- b - (ro)Indicates whether the reverse path filter test on a packet for IPv6 is enabled. If a reply to the packet would be sent via the same interface that the packet arrived on, the packet will match and be accepted, otherwise dropped.
interface_version
- s - (ro)firewalld D-Bus interface version string.
state
- s - (ro)firewalld state. This can be either INIT
or RUNNING
. In INIT
state, firewalld is starting up and initializing.
version
- s - (ro)firewalld version string.
Operations in this interface allows to get, add, remove and query runtime ipset settings. For permanent configuration see org.fedoraproject.FirewallD1.config.ipset interface.
addEntry
(s: ipset, s: entry) → as
Add a new entry
to ipset
.
The entry must match the type of the ipset. If the ipset is using the timeout option, it is not possible to see the entries, as they are timing out automatically in the kernel.
For permanent operation see org.fedoraproject.FirewallD1.config.ipset.Methods.addEntry.
Possible errors: INVALID_IPSET, IPSET_WITH_TIMEOUT
getEntries
(s: ipset) → Nothing
Get all entries added to the ipset
.
If the ipset is using the timeout option, it is not possible to see the entries, as they are timing out automatically in the kernel.
Return value is a array of entry
.
For permanent operation see org.fedoraproject.FirewallD1.config.ipset.Methods.getEntries.
Possible errors: INVALID_IPSET, IPSET_WITH_TIMEOUT
getSettings
(s: ipset) → (ssssa{ss}as)
Return runtime settings of given ipset
.
For getting permanent settings see org.fedoraproject.FirewallD1.config.ipset.Methods.getSettings.
Settings are in format: version
, name
, description
, type
, dictionary of options
and array of entries
.
version (s)
: see version
attribute of ipset
tag in firewalld.ipset(5).name (s)
: see short
tag in firewalld.ipset(5).description (s)
: see description
tag in firewalld.ipset(5).type (s)
: see type
attribute of ipset
tag in firewalld.ipset(5).options (a{ss})
: dictionary of {option : value} . See options
tag in firewalld.ipset(5).entries (as)
: array of entries, see entry
tag in firewalld.ipset(5).
Possible errors: INVALID_IPSET
getIPSets
() → asReturn array of ipset names (s) in runtime configuration. For permanent configuration see org.fedoraproject.FirewallD1.config.Methods.listIPSets.
queryService
(s: ipset, s: entry) → b
Return whether entry
has been added to ipset
.
For permanent operation see org.fedoraproject.FirewallD1.config.ipset.Methods.queryEntry.
Possible errors: INVALID_IPSET
queryService
(s: ipset) → b
Return whether ipset
is defined in runtime configuration.
removeEntry
(s: ipset, s: entry) → as
Removes an entry
from ipset
.
For permanent operation see org.fedoraproject.FirewallD1.config.ipset.Methods.removeEntry.
Possible errors: INVALID_IPSET, IPSET_WITH_TIMEOUT
setEntries
(as: entries) → Nothing
Permanently set list of entries to entries
.
For permanent operation see org.fedoraproject.FirewallD1.config.ipset.Methods.setEntries.
See entry
tag in firewalld.ipset(5).
This interface enables more direct access to the firewall. It enables runtime manipulation with chains and rules. For permanent configuration see org.fedoraproject.FirewallD1.config.direct interface.
addChain
(s: ipv, s: table, s: chain) → Nothing
Add a new chain
to table
for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
Make sure there's no other chain with this name already.
There already exist basic chains to use with direct methods, for example INPUT_direct
chain.
These chains are jumped into before chains for zones, i.e. every rule put into INPUT_direct
will be checked before rules in zones.
For permanent operation see org.fedoraproject.FirewallD1.config.direct.Methods.addChain.
Possible errors: INVALID_IPV, INVALID_TABLE, ALREADY_ENABLED, COMMAND_FAILED
addPassthrough
(s: ipv, as: args) → Nothing
Add a tracked passthrough rule with the arguments args
for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
Valid commands in args are only -A/--append
, -I/--insert
and -N/--new-chain
.
This method is (unlike passthrough method) tracked, i.e. firewalld remembers it. It's useful with org.fedoraproject.FirewallD1.Methods.runtimeToPermanent
For permanent operation see org.fedoraproject.FirewallD1.config.direct.Methods.addPassthrough.
Possible errors: INVALID_IPV, ALREADY_ENABLED, COMMAND_FAILED
addRule
(s: ipv, s: table, s: chain, i: priority, as: args) → Nothing
Add a rule with the arguments args
to chain
in table
with priority
for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
The priority is used to order rules. Priority 0 means add rule on top of the chain, with a higher priority the rule will be added further down.
Rules with the same priority are on the same level and the order of these rules is not fixed and may change.
If you want to make sure that a rule will be added after another one, use a low priority for the first and a higher for the following.
For permanent operation see org.fedoraproject.FirewallD1.config.direct.Methods.addRule.
Possible errors: INVALID_IPV, INVALID_TABLE, ALREADY_ENABLED, COMMAND_FAILED
getAllChains
() → a(sss)
Get all chains added to all tables in format: ipv, table, chain.
This concerns only chains previously added with addChain
.
Return value is a array of (ipv
, table
, chain
).
For permanent operation see org.fedoraproject.FirewallD1.config.direct.Methods.getAllChains.
ipv (s)
: either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).table (s)
: one of filter
, mangle
, nat
, raw
, security
chain (s)
: name of a chain.
getAllPassthroughs
() → a(sas)
Get all tracked passthrough rules added in all ipv types in format: ipv, rule.
This concerns only rules previously added with addPassthrough
.
Return value is a array of (ipv
, array of arguments
).
For permanent operation see org.fedoraproject.FirewallD1.config.direct.Methods.getAllPassthroughs.
ipv (s)
: either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).arguments (as)
: array of commands, parameters and other iptables/ip6tables/ebtables command line options.
getAllRules
() → a(sssias)
Get all rules added to all chains in all tables in format: ipv, table, chain, priority, rule.
This concerns only rules previously added with addRule
.
Return value is a array of (ipv
, table
, chain
, priority
, array of arguments
).
For permanent operation see org.fedoraproject.FirewallD1.config.direct.Methods.getAllRules.
ipv (s)
: either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).table (s)
: one of filter
, mangle
, nat
, raw
, security
chain (s)
: name of a chain.priority (i)
: used to order rules.arguments (as)
: array of commands, parameters and other iptables/ip6tables/ebtables command line options.
getChains
(s: ipv, s: table) → as
Return an array of chains (s) added to table
for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
This concerns only chains previously added with addChain
.
For permanent operation see org.fedoraproject.FirewallD1.config.direct.Methods.getChains.
Possible errors: INVALID_IPV, INVALID_TABLE
getPassthroughs
(s: ipv) → aas
Get tracked passthrough rules added in either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
This concerns only rules previously added with addPassthrough
.
Return value is a array of (array of arguments
).
For permanent operation see org.fedoraproject.FirewallD1.config.direct.Methods.getPassthroughs.
arguments (as)
: array of commands, parameters and other iptables/ip6tables/ebtables command line options.
getRules
(s: ipv, s: table, s: chain) → a(ias)
Get all rules added to chain
in table
for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
This concerns only rules previously added with addRule
.
Return value is a array of (priority
, array of arguments
).
For permanent operation see org.fedoraproject.FirewallD1.config.direct.Methods.getRules.
priority (i)
: used to order rules.arguments (as)
: array of commands, parameters and other iptables/ip6tables/ebtables command line options.
Possible errors: INVALID_IPV, INVALID_TABLE
passthrough
(s: ipv, as: args) → s
Pass a command through to the firewall.
ipv
can be either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables). args
can be all iptables, ip6tables and ebtables command line arguments.
args
can be all iptables, ip6tables and ebtables command line arguments.
This command is untracked, which means that firewalld is not able to provide information about this command later on.
Possible errors: COMMAND_FAILED
queryChain
(s: ipv, s: table, s: chain) → b
Return whether a chain
exists in table
for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
This concerns only chains previously added with addChain
.
For permanent operation see org.fedoraproject.FirewallD1.config.direct.Methods.queryChain.
Possible errors: INVALID_IPV, INVALID_TABLE
queryPassthrough
(s: ipv, as: args) → b
Return whether a tracked passthrough rule with the arguments args
exists for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
This concerns only rules previously added with addPassthrough
.
For permanent operation see org.fedoraproject.FirewallD1.config.direct.Methods.queryPassthrough.
Possible errors: INVALID_IPV
queryRule
(s: ipv, s: table, s: chain, i: priority, as: args) → b
Return whether a rule with priority
and the arguments args
exists in chain
in table
for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
This concerns only rules previously added with addRule
.
For permanent operation see org.fedoraproject.FirewallD1.config.direct.Methods.queryRule.
Possible errors: INVALID_IPV, INVALID_TABLE
removeAllPassthroughs
() → Nothing
Remove all passthrough rules previously added with addPassthrough
.
removeChain
(s: ipv, s: table, s: chain) → Nothing
Remove a chain
from table
for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
Only chains previously added with addChain
can be removed this way.
For permanent operation see org.fedoraproject.FirewallD1.config.direct.Methods.removeChain.
Possible errors: INVALID_IPV, INVALID_TABLE, NOT_ENABLED, COMMAND_FAILED
removePassthrough
(s: ipv, as: args) → Nothing
Remove a tracked passthrough rule with arguments args
for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
Only rules previously added with addPassthrough
can be removed this way.
For permanent operation see org.fedoraproject.FirewallD1.config.direct.Methods.removePassthrough.
Possible errors: INVALID_IPV, NOT_ENABLED, COMMAND_FAILED
removeRule
(s: ipv, s: table, s: chain, i: priority, as: args) → Nothing
Remove a rule with priority
and arguments args
from chain
in table
for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
Only rules previously added with addRule
can be removed this way.
For permanent operation see org.fedoraproject.FirewallD1.config.direct.Methods.removeRule.
Possible errors: INVALID_IPV, INVALID_TABLE, NOT_ENABLED, COMMAND_FAILED
removeRules
(s: ipv, s: table, s: chain) → Nothing
Remove all rules from chain
in table
for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
This concerns only rules previously added with addRule
.
For permanent operation see org.fedoraproject.FirewallD1.config.direct.Methods.removeRules.
Possible errors: INVALID_IPV, INVALID_TABLE
Emitted when chain
has been added into table
for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
Emitted when chain
has been removed from table
for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
Emitted when a tracked passthruogh rule with args
has been added for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
Emitted when a tracked passthrough rule with args
has been removed for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
Emitted when a rule with args
has been added to chain
in table
with priority
for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
Emitted when a rule with args
has been removed from chain
in table
with priority
for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
Enables firewalld to be able to lock down configuration changes from local applications. Local applications or services are able to change the firewall configuration if they are running as root (example: libvirt). With these operations administrator can lock the firewall configuration so that either none or only applications that are in the whitelist are able to request firewall changes. For permanent configuration see org.fedoraproject.FirewallD1.config.policies interface.
addLockdownWhitelistCommand
(s: command) → Nothing
Add command
to whitelist.
See command
option in firewalld.lockdown-whitelist(5).
For permanent operation see org.fedoraproject.FirewallD1.config.policies.Methods.addLockdownWhitelistCommand.
Possible errors: ALREADY_ENABLED, INVALID_COMMAND
addLockdownWhitelistContext
(s: context) → Nothing
Add context
to whitelist.
See selinux
option in firewalld.lockdown-whitelist(5).
For permanent operation see org.fedoraproject.FirewallD1.config.policies.Methods.addLockdownWhitelistContext.
Possible errors: ALREADY_ENABLED, INVALID_COMMAND
addLockdownWhitelistUid
(i: uid) → Nothing
Add user id uid
to whitelist.
See user
option in firewalld.lockdown-whitelist(5).
For permanent operation see org.fedoraproject.FirewallD1.config.policies.Methods.addLockdownWhitelistUid.
Possible errors: ALREADY_ENABLED, INVALID_COMMAND
addLockdownWhitelistUser
(s: user) → Nothing
Add user
name to whitelist.
See user
option in firewalld.lockdown-whitelist(5).
For permanent operation see org.fedoraproject.FirewallD1.config.policies.Methods.addLockdownWhitelistUser.
Possible errors: ALREADY_ENABLED, INVALID_COMMAND
disableLockdown
() → NothingDisable lockdown. This is a runtime and permanent change.
Possible errors: NOT_ENABLED
enableLockdown
() → NothingEnable lockdown. Be careful - if the calling application/user is not on lockdown whitelist when you enable lockdown you won't be able to disable it again with the application, you would need to edit firewalld.conf. This is a runtime and permanent change.
Possible errors: ALREADY_ENABLED
getLockdownWhitelistCommands
() → asList all command lines (s) that are on whitelist. For permanent operation see org.fedoraproject.FirewallD1.config.policies.Methods.getLockdownWhitelistCommands.
getLockdownWhitelistContexts
() → asList all contexts (s) that are on whitelist. For permanent operation see org.fedoraproject.FirewallD1.config.policies.Methods.getLockdownWhitelistContexts.
getLockdownWhitelistUids
() → aiList all user ids (i) that are on whitelist. For permanent operation see org.fedoraproject.FirewallD1.config.policies.Methods.getLockdownWhitelistUids.
getLockdownWhitelistUsers
() → asList all users (s) that are on whitelist. For permanent operation see org.fedoraproject.FirewallD1.config.policies.Methods.getLockdownWhitelistUsers.
queryLockdown
() → bQuery whether lockdown is enabled.
queryLockdownWhitelistCommand
(s: command) → b
Query whether command
is on whitelist.
For permanent operation see org.fedoraproject.FirewallD1.config.policies.Methods.queryLockdownWhitelistCommand.
queryLockdownWhitelistContext
(s: context) → b
Query whether context
is on whitelist.
For permanent operation see org.fedoraproject.FirewallD1.config.policies.Methods.queryLockdownWhitelistContext.
queryLockdownWhitelistUid
(i: uid) → b
Query whether user id uid
is on whitelist.
For permanent operation see org.fedoraproject.FirewallD1.config.policies.Methods.queryLockdownWhitelistUid.
queryLockdownWhitelistUser
(s: user) → b
Query whether user
is on whitelist.
For permanent operation see org.fedoraproject.FirewallD1.config.policies.Methods.queryLockdownWhitelistUser.
removeLockdownWhitelistCommand
(s: command) → Nothing
Remove command
from whitelist.
For permanent operation see org.fedoraproject.FirewallD1.config.policies.Methods.removeLockdownWhitelistCommand.
Possible errors: NOT_ENABLED
removeLockdownWhitelistContext
(s: context) → Nothing
Remove context
from whitelist.
For permanent operation see org.fedoraproject.FirewallD1.config.policies.Methods.removeLockdownWhitelistContext.
Possible errors: NOT_ENABLED
removeLockdownWhitelistUid
(i: uid) → Nothing
Remove user id uid
from whitelist.
For permanent operation see org.fedoraproject.FirewallD1.config.policies.Methods.removeLockdownWhitelistUid.
Possible errors: NOT_ENABLED
removeLockdownWhitelistUser
(s: user) → Nothing
Remove user
from whitelist.
For permanent operation see org.fedoraproject.FirewallD1.config.policies.Methods.removeLockdownWhitelistUser.
Possible errors: NOT_ENABLED
Emitted when lockdown has been disabled.
Emitted when lockdown has been enabled.
Emitted when command
has been added to whitelist.
Emitted when command
has been removed from whitelist.
Emitted when context
has been added to whitelist.
Emitted when context
has been removed from whitelist.
Emitted when user id uid
has been added to whitelist.
Emitted when user id uid
has been removed from whitelist.
Emitted when user
has been added to whitelist.
Emitted when user
has been removed from whitelist.
Operations in this interface allows to get, add, remove and query runtime zone's settings. For permanent settings see org.fedoraproject.FirewallD1.config.zone interface.
addForwardPort
(s: zone, s: port, s: protocol, s: toport, s: toaddr, i: timeout) → s
Add the IPv4 forward port into zone
.
If zone
is empty, use default zone.
The port can either be a single port number portid
or a port range portid
-portid
.
The protocol can either be tcp
or udp
.
The destination address is a simple IP address.
If timeout
is non-zero, the operation will be active only for the amount of seconds.
For permanent settings see org.fedoraproject.FirewallD1.config.zone.Methods.addForwardPort.
Returns name of zone to which the forward port was added.
Possible errors: INVALID_ZONE, INVALID_PORT, MISSING_PROTOCOL, INVALID_PROTOCOL, INVALID_ADDR, INVALID_FORWARD, ALREADY_ENABLED, INVALID_COMMAND
addIcmpBlock
(s: zone, s: icmp, i: timeout) → s
Add an ICMP block icmp
into zone
.
The icmp
is the one of the icmp types firewalld supports.
To get a listing of supported icmp types use org.fedoraproject.FirewallD1.Methods.listIcmpTypes
If zone
is empty, use default zone.
If timeout
is non-zero, the operation will be active only for the amount of seconds.
For permanent settings see org.fedoraproject.FirewallD1.config.zone.Methods.addIcmpBlock.
Returns name of zone to which the ICMP block was added.
Possible errors: INVALID_ZONE, INVALID_ICMPTYPE, ALREADY_ENABLED, INVALID_COMMAND
addIcmpBlockInversion
(s: zone) → s
Add ICMP block inversion to zone
.
If zone
is empty, use default zone.
For permanent settings see org.fedoraproject.FirewallD1.config.zone.Methods.addIcmpBlockInversion.
Returns name of zone to which the ICMP block inversion was added.
Possible errors: INVALID_ZONE, ALREADY_ENABLED, INVALID_COMMAND
addInterface
(s: zone, s: interface) → s
Bind interface
with zone
.
From now on all traffic going through the interface
will respect the zone
's settings.
If zone
is empty, use default zone.
For permanent settings see org.fedoraproject.FirewallD1.config.zone.Methods.addInterface.
Returns name of zone to which the interface was bound.
Possible errors: INVALID_ZONE, INVALID_INTERFACE, ALREADY_ENABLED, INVALID_COMMAND
addMasquerade
(s: zone, i: timeout) → s
Enable IPv4 masquerade in zone
.
If zone
is empty, use default zone.
If timeout
is non-zero, masquerading will be active for the amount of seconds.
For permanent settings see org.fedoraproject.FirewallD1.config.zone.Methods.addMasquerade.
Returns name of zone in which the masquerade was enabled.
Possible errors: INVALID_ZONE, ALREADY_ENABLED, INVALID_COMMAND
addPort
(s: zone, s: port, s: protocol, i: timeout) → s
Add port into zone
.
If zone
is empty, use default zone.
The port can either be a single port number or a port range portid
-portid
.
The protocol can either be tcp
or udp
.
If timeout
is non-zero, the operation will be active only for the amount of seconds.
For permanent settings see org.fedoraproject.FirewallD1.config.zone.Methods.addPort.
Returns name of zone to which the port was added.
Possible errors: INVALID_ZONE, INVALID_PORT, MISSING_PROTOCOL, INVALID_PROTOCOL, ALREADY_ENABLED, INVALID_COMMAND
addProtocol
(s: zone, s: protocol, i: timeout) → s
Add protocol into zone
.
If zone
is empty, use default zone.
The protocol can be any protocol supported by the system. Please have a look at /etc/protocols
for supported protocols.
If timeout
is non-zero, the operation will be active only for the amount of seconds.
For permanent settings see org.fedoraproject.FirewallD1.config.zone.Methods.addProtocol.
Returns name of zone to which the protocol was added.
Possible errors: INVALID_ZONE, INVALID_PROTOCOL, ALREADY_ENABLED, INVALID_COMMAND
addRichRule
(s: zone, s: rule, i: timeout) → s
Add rich language rule
into zone
.
For the rich language rule syntax, please have a look at firewalld.direct(5).
If zone
is empty, use default zone.
If timeout
is non-zero, the operation will be active only for the amount of seconds.
For permanent settings see org.fedoraproject.FirewallD1.config.zone.Methods.addRichRule.
Returns name of zone to which the rich language rule was added.
Possible errors: INVALID_ZONE, INVALID_RULE, ALREADY_ENABLED, INVALID_COMMAND
addService
(s: zone, s: service, i: timeout) → s
Add service
into zone
.
If zone
is empty, use default zone.
If timeout
is non-zero, the operation will be active only for the amount of seconds.
To get a list of supported services, use org.fedoraproject.FirewallD1.Methods.listServices.
For permanent settings see org.fedoraproject.FirewallD1.config.zone.Methods.addService.
Returns name of zone to which the service was added.
Possible errors: INVALID_ZONE, INVALID_SERVICE, ALREADY_ENABLED, INVALID_COMMAND
addSource
(s: zone, s: source) → s
Bind source
with zone
.
From now on all traffic going from this source
will respect the zone
's settings.
A source address or address range is either an IP address or a network IP address with a mask for IPv4 or IPv6.
For IPv4, the mask can be a network mask or a plain number.
For IPv6 the mask is a plain number. Use of host names is not supported.
If zone
is empty, use default zone.
For permanent settings see org.fedoraproject.FirewallD1.config.zone.Methods.addSource.
Returns name of zone to which the source was bound.
Possible errors: INVALID_ZONE, INVALID_ADDR, ALREADY_ENABLED, INVALID_COMMAND
addSourcePort
(s: zone, s: port, s: protocol, i: timeout) → s
Add source port into zone
.
If zone
is empty, use default zone.
The port can either be a single port number or a port range portid
-portid
.
The protocol can either be tcp
or udp
.
If timeout
is non-zero, the operation will be active only for the amount of seconds.
For permanent settings see org.fedoraproject.FirewallD1.config.zone.Methods.addSourcePort.
Returns name of zone to which the port was added.
Possible errors: INVALID_ZONE, INVALID_PORT, MISSING_PROTOCOL, INVALID_PROTOCOL, ALREADY_ENABLED, INVALID_COMMAND
changeZone
(s: zone, s: interface) → sThis function is deprecated, use org.fedoraproject.FirewallD1.zone.Methods.changeZoneOfInterface instead.
changeZoneOfInterface
(s: zone, s: interface) → s
Change a zone an interface
is bound to to zone
.
It's basically removeInterface(interface
) followed by addInterface(zone
, interface
).
If interface
has not been bound to a zone before, it behaves like addInterface
.
If zone
is empty, use default zone.
Returns name of zone to which the interface was bound.
Possible errors: INVALID_ZONE, ZONE_ALREADY_SET, ZONE_CONFLICT
changeZoneOfSource
(s: zone, s: source) → s
Change a zone an source
is bound to to zone
.
It's basically removeSource(source
) followed by addSource(zone
, source
).
If source
has not been bound to a zone before, it behaves like addSource
.
If zone
is empty, use default zone.
Returns name of zone to which the source was bound.
Possible errors: INVALID_ZONE, ZONE_ALREADY_SET, ZONE_CONFLICT
getActiveZones
() → a{sa{sas}}Return dictionary of currently active zones altogether with interfaces and sources used in these zones. Active zones are zones, that have a binding to an interface or source.
Return value is a dictionary where keys are zone names (s) and values are again dictionaries where keys are either 'interfaces' or 'sources' and values are arrays of interface names (s) or sources (s).
getForwardPorts
(s: zone) → aas
Return array of IPv4 forward ports previously added into zone
.
If zone
is empty, use default zone.
For getting permanent settings see org.fedoraproject.FirewallD1.config.zone.Methods.getForwardPorts.
Return value is array of 4-tuples, where each 4-tuple consists of (port, protocol, to-port, to-addr). to-addr might be empty in case of local forwarding.
Possible errors: INVALID_ZONE
getIcmpBlocks
(s: zone) → as
Return array of ICMP type (s) blocks previously added into zone
.
If zone
is empty, use default zone.
For getting permanent settings see org.fedoraproject.FirewallD1.config.zone.Methods.getIcmpBlocks.
Possible errors: INVALID_ZONE
getIcmpBlockInversion
(s: zone) → b
Return whether ICMP block inversion was previously added to zone
.
If zone
is empty, use default zone.
For getting permanent settings see org.fedoraproject.FirewallD1.config.zone.Methods.getIcmpBlockInversion.
Possible errors: INVALID_ZONE
getInterfaces
(s: zone) → as
Return array of interfaces (s) previously bound with zone
.
If zone
is empty, use default zone.
For getting permanent settings see org.fedoraproject.FirewallD1.config.zone.Methods.getInterfaces.
Possible errors: INVALID_ZONE
getPorts
(s: zone) → aas
Return array of ports (2-tuple of port and protocol) previously enabled in zone
.
If zone
is empty, use default zone.
For getting permanent settings see org.fedoraproject.FirewallD1.config.zone.Methods.getPorts.
Possible errors: INVALID_ZONE
getProtocols
(s: zone) → as
Return array of protocols (s) previously enabled in zone
.
If zone
is empty, use default zone.
For getting permanent settings see org.fedoraproject.FirewallD1.config.zone.Methods.getProtocols.
Possible errors: INVALID_ZONE
getRichRules
(s: zone) → as
Return array of rich language rules (s) previously added into zone
.
If zone
is empty, use default zone.
For getting permanent settings see org.fedoraproject.FirewallD1.config.zone.Methods.getRichRules.
Possible errors: INVALID_ZONE
getServices
(s: zone) → as
Return array of services (s) previously enabled in zone
.
If zone
is empty, use default zone.
For getting permanent settings see org.fedoraproject.FirewallD1.config.zone.Methods.getServices.
Possible errors: INVALID_ZONE
getSourcePorts
(s: zone) → aas
Return array of source ports (2-tuple of port and protocol) previously enabled in zone
.
If zone
is empty, use default zone.
For getting permanent settings see org.fedoraproject.FirewallD1.config.zone.Methods.getSourcePorts.
Possible errors: INVALID_ZONE
getSources
(s: zone) → as
Return array of sources (s) previously bound with zone
.
If zone
is empty, use default zone.
For getting permanent settings see org.fedoraproject.FirewallD1.config.zone.Methods.getSources.
Possible errors: INVALID_ZONE
getZoneOfInterface
(s: interface) → s
Return name (s) of zone the interface
is bound to or empty string.
getZoneOfSource
(s: source) → s
Return name (s) of zone the source
is bound to or empty string.
getZones
() → asReturn array of names (s) of predefined zones known to current runtime environment. For list of zones known to permanent environment see org.fedoraproject.FirewallD1.config.Methods.listZones. The lists (of zones known to runtime and permanent environment) will contain same zones in most cases, but might differ for example if org.fedoraproject.FirewallD1.config.Methods.addZone has been called recently, but firewalld has not been reloaded since then.
isImmutable
(s: zone) → bDeprecated.
queryForwardPort
(s: zone, s: port, s: protocol, s: toport, s: toaddr) → b
Return whether the IPv4 forward port (port
, protocol
, toport
, toaddr
) has been added into zone
.
If zone
is empty, use default zone.
For permanent operation see org.fedoraproject.FirewallD1.config.zone.Methods.queryForwardPort.
Possible errors: INVALID_ZONE, INVALID_PORT, MISSING_PROTOCOL, INVALID_PROTOCOL, INVALID_ADDR, INVALID_FORWARD
queryIcmpBlock
(s: zone, s: icmp) → b
Return whether an ICMP block for icmp
has been added into zone
.
If zone
is empty, use default zone.
For permanent operation see org.fedoraproject.FirewallD1.config.zone.Methods.queryIcmpBlock.
Possible errors: INVALID_ZONE, INVALID_ICMPTYPE
queryIcmpBlockInversion
(s: zone) → b
Return whether ICMP block inversion has been added to zone
.
If zone
is empty, use default zone.
For permanent operation see org.fedoraproject.FirewallD1.config.zone.Methods.queryIcmpBlockInversion.
Possible errors: INVALID_ZONE, INVALID_ICMPTYPE
queryInterface
(s: zone, s: interface) → b
Query whether interface
has been bound to zone
.
If zone
is empty, use default zone.
For permanent operation see org.fedoraproject.FirewallD1.config.zone.Methods.queryInterface.
Possible errors: INVALID_ZONE, INVALID_INTERFACE
queryMasquerade
(s: zone) → b
Return whether IPv4 masquerading has been enabled in zone
If zone
is empty, use default zone.
For permanent operation see org.fedoraproject.FirewallD1.config.zone.Methods.queryMasquerade.
Possible errors: INVALID_ZONE
queryPort
(s: zone, s: port, s: protocol) → b
Return whether port
/protocol
has been added in zone
.
If zone
is empty, use default zone.
For permanent operation see org.fedoraproject.FirewallD1.config.zone.Methods.queryPort.
Possible errors: INVALID_ZONE, INVALID_PORT, MISSING_PROTOCOL, INVALID_PROTOCOL
queryProtocol
(s: zone, s: protocol) → b
Return whether protocol
has been added in zone
.
If zone
is empty, use default zone.
For permanent operation see org.fedoraproject.FirewallD1.config.zone.Methods.queryProtocol.
Possible errors: INVALID_ZONE, INVALID_PROTOCOL
queryRichRule
(s: zone, s: rule) → b
Return whether rich rule rule
has been added in zone
.
If zone
is empty, use default zone.
For permanent operation see org.fedoraproject.FirewallD1.config.zone.Methods.queryRichRule.
Possible errors: INVALID_ZONE, INVALID_RULE
queryService
(s: zone, s: service) → b
Return whether service
has been added for zone
.
If zone
is empty, use default zone.
For permanent operation see org.fedoraproject.FirewallD1.config.zone.Methods.queryService.
Possible errors: INVALID_ZONE, INVALID_SERVICE
querySource
(s: zone, s: source) → b
Query whether source
has been bound to zone
.
If zone
is empty, use default zone.
For permanent operation see org.fedoraproject.FirewallD1.config.zone.Methods.querySource.
Possible errors: INVALID_ZONE, INVALID_ADDR
querySourcePort
(s: zone, s: port, s: protocol) → b
Return whether port
/protocol
has been added in zone
.
If zone
is empty, use default zone.
For permanent operation see org.fedoraproject.FirewallD1.config.zone.Methods.querySourcePort.
Possible errors: INVALID_ZONE, INVALID_PORT, MISSING_PROTOCOL, INVALID_PROTOCOL
removeForwardPort
(s: zone, s: port, s: protocol, s: toport, s: toaddr) → s
Remove IPv4 forward port ((port
, protocol
, toport
, toaddr
)) from zone
.
If zone
is empty, use default zone.
For permanent operation see org.fedoraproject.FirewallD1.config.zone.Methods.removeForwardPort.
Returns name of zone from which the forward port was removed.
Possible errors: INVALID_ZONE, INVALID_PORT, MISSING_PROTOCOL, INVALID_PROTOCOL, INVALID_ADDR, INVALID_FORWARD, NOT_ENABLED, INVALID_COMMAND
removeIcmpBlock
(s: zone, s: icmp) → s
Remove ICMP block icmp
from zone
.
If zone
is empty, use default zone.
For permanent operation see org.fedoraproject.FirewallD1.config.zone.Methods.removeIcmpBlock.
Returns name of zone from which the ICMP block was removed.
Possible errors: INVALID_ZONE, INVALID_ICMPTYPE, NOT_ENABLED, INVALID_COMMAND
removeIcmpBlockInversion
(s: zone) → s
Remove ICMP block inversion from zone
.
If zone
is empty, use default zone.
For permanent operation see org.fedoraproject.FirewallD1.config.zone.Methods.removeIcmpBlockInversion.
Returns name of zone from which the ICMP block inversion was removed.
Possible errors: INVALID_ZONE, NOT_ENABLED, INVALID_COMMAND
removeInterface
(s: zone, s: interface) → s
Remove binding of interface
from zone
.
If zone
is empty, the interface will be removed from zone it belongs to.
For permanent operation see org.fedoraproject.FirewallD1.config.zone.Methods.removeInterface.
Returns name of zone from which the interface
was removed.
Possible errors: INVALID_ZONE, INVALID_INTERFACE, NOT_ENABLED, INVALID_COMMAND
removeMasquerade
(s: zone) → s
Disable IPv4 masquerade for zone
.
If zone
is empty, use default zone.
For permanent operation see org.fedoraproject.FirewallD1.config.zone.Methods.removeMasquerade.
Returns name of zone for which the masquerade was disabled.
Possible errors: INVALID_ZONE, NOT_ENABLED, INVALID_COMMAND
removePort
(s: zone, s: port, s: protocol) → s
Remove port
/protocol
from zone
.
If zone
is empty, use default zone.
For permanent operation see org.fedoraproject.FirewallD1.config.zone.Methods.removePort.
Returns name of zone from which the port was removed.
Possible errors: INVALID_ZONE, INVALID_PORT, MISSING_PROTOCOL, INVALID_PROTOCOL, NOT_ENABLED, INVALID_COMMAND
removeProtocol
(s: zone, s: protocol) → s
Remove protocol from zone
.
If zone
is empty, use default zone.
For permanent operation see org.fedoraproject.FirewallD1.config.zone.Methods.removeProtocol.
Returns name of zone from which the protocol was removed.
Possible errors: INVALID_ZONE, INVALID_PROTOCOL, NOT_ENABLED, INVALID_COMMAND
removeRichRule
(s: zone, s: rule) → s
Remove rich language rule
from zone
.
If zone
is empty, use default zone.
For permanent operation see org.fedoraproject.FirewallD1.config.zone.Methods.removeRichRule.
Returns name of zone from which the rich language rule was removed.
Possible errors: INVALID_ZONE, INVALID_RULE, NOT_ENABLED, INVALID_COMMAND
removeService
(s: zone, s: service) → s
Remove service
from zone
.
If zone
is empty, use default zone.
For permanent operation see org.fedoraproject.FirewallD1.config.zone.Methods.removeService.
Returns name of zone from which the service was removed.
Possible errors: INVALID_ZONE, INVALID_SERVICE, NOT_ENABLED, INVALID_COMMAND
removeSource
(s: zone, s: source) → s
Remove binding of source
from zone
.
If zone
is empty, the source will be removed from zone it belongs to.
For permanent operation see org.fedoraproject.FirewallD1.config.zone.Methods.removeSource.
Returns name of zone from which the source
was removed.
Possible errors: INVALID_ZONE, INVALID_ADDR, NOT_ENABLED, INVALID_COMMAND
removeSourcePort
(s: zone, s: port, s: protocol) → s
Remove port
/protocol
from zone
.
If zone
is empty, use default zone.
For permanent operation see org.fedoraproject.FirewallD1.config.zone.Methods.removeSourcePort.
Returns name of zone from which the source port was removed.
Possible errors: INVALID_ZONE, INVALID_PORT, MISSING_PROTOCOL, INVALID_PROTOCOL, NOT_ENABLED, INVALID_COMMAND
Emitted when forward port has been added to zone
with timeout
.
Emitted when forward port has been removed from zone
.
Emitted when ICMP block for icmp
has been added to zone
with timeout
.
Emitted when ICMP block inversion has been added to zone
.
Emitted when ICMP block inversion has been removed from zone
.
Emitted when ICMP block for icmp
has been removed from zone
.
Emitted when interface
has been added to zone
.
Emitted when interface
has been removed from zone
.
Emitted when IPv4 masquerade has been enabled for zone
.
Emitted when IPv4 masquerade has been disabled for zone
.
Emitted when port
/protocol
has been added to zone
with timeout
.
Emitted when port
/protocol
has been removed from zone
.
Emitted when protocol
has been added to zone
with timeout
.
Emitted when protocol
has been removed from zone
.
Emitted when rich language rule
has been added to zone
with timeout
.
Emitted when rich language rule
has been removed from zone
.
Emitted when service
has been added to zone
with timeout
.
Emitted when service
has been removed from zone
.
Emitted when source
has been added to zone
.
Emitted when source-port
/protocol
has been added to zone
with timeout
.
Emitted when source-port
/protocol
has been removed from zone
.
Emitted when source
has been removed from zone
.
Deprecated
Emitted when a zone an interface
is part of has been changed to zone
.
Emitted when a zone an source
is part of has been changed to zone
.
Allows to permanently add, remove and query zones, services and icmp types.
addIPSet
(s: ipset, (ssssa{ss}as): settings) → o
Add ipset
with given settings
into permanent configuration.
Settings are in format: version
, name
, description
, type
, dictionary of options
and array of entries
.
version (s)
: see version
attribute of ipset
tag in firewalld.ipset(5).name (s)
: see short
tag in firewalld.ipset(5).description (s)
: see description
tag in firewalld.ipset(5).type (s)
: see type
attribute of ipset
tag in firewalld.ipset(5).options (a{ss})
: dictionary of {option : value} . See options
tag in firewalld.ipset(5).entries (as)
: array of entries, see entry
tag in firewalld.ipset(5).
Possible errors: NAME_CONFLICT, INVALID_NAME, INVALID_TYPE
addIcmpType
(s: icmptype, (sssas): settings) → o
Add icmptype
with given settings
into permanent configuration.
Settings are in format: version
, name
, description
, array of destinations
.
Returns object path of the new icmp type.
version (s)
: see version
attribute of icmptype
tag in firewalld.icmptype(5).name (s)
: see short
tag in firewalld.icmptype(5).description (s)
: see description
tag in firewalld.icmptype(5).destinations (as)
: array, either empty or containing strings 'ipv4' or 'ipv6', see destination
tag in firewalld.icmptype(5).
Possible errors: NAME_CONFLICT, INVALID_NAME, INVALID_TYPE
addService
(s: service, (sssa(ss)asa{ss}asa(ss)): settings) → o
Add service
with given settings
into permanent configuration.
Settings are in format: version
, name
, description
, array of ports
(port, protocol), array of module names
, dictionary of destinations
, array of protocols
and array of source-ports
(port, protocol).
Returns object path of the new icmp type.
version (s)
: see version
attribute of service
tag in firewalld.service(5).name (s)
: see short
tag in firewalld.service(5).description (s)
: see description
tag in firewalld.service(5).ports (a(ss))
: array of port and protocol pairs. See port
tag in firewalld.service(5).module names (as)
: array of kernel netfilter helpers, see module
tag in firewalld.service(5).destinations (a{ss})
: dictionary of {IP family : IP address} where 'IP family' key can be either 'ipv4' or 'ipv6'. See destination
tag in firewalld.service(5).protocols (as)
: array of protocols. See protocol
tag in firewalld.service(5).source-ports (a(ss))
: array of port and protocol pairs. See source-port
tag in firewalld.service(5).
Possible errors: NAME_CONFLICT, INVALID_NAME, INVALID_TYPE
addZone
(s: zone, (sssbsasa(ss)asba(ssss)asasasasa(ss)): settings) → o
Add zone
with given settings
into permanent configuration.
Settings are in format: version
, name
, description
, UNUSED
, target
, array of services
, array of ports
(port, protocol), array of icmp-blocks
, masquerade
, array of forward-ports
(port, protocol, to-port, to-addr), array of interfaces
, array of sources
, array of rich rules
, array of protocols
and array of source-ports
(port, protocol).
version (s)
: see version
attribute of zone
tag in firewalld.zone(5).name (s)
: see short
tag in firewalld.zone(5).description (s)
: see description
tag in firewalld.zone(5).UNUSED (b)
: this boolean value is no longer used for anything.target (s)
: see target
attribute of zone
tag in firewalld.zone(5).services (as)
: array of service names, see service
tag in firewalld.zone(5).ports (a(ss))
: array of port and protocol pairs. See port
tag in firewalld.zone(5).icmp-blocks (as)
: array of icmp-blocks. See icmp-block
tag in firewalld.zone(5).masquerade (b)
: see masquerade
tag in firewalld.zone(5).forward-ports (a(ssss))
: array of (port, protocol, to-port, to-addr). See forward-port
tag in firewalld.zone(5).interfaces (as)
: array of interfaces. See interface
tag in firewalld.zone(5).source addresses (as)
: array of source addresses. See source
tag in firewalld.zone(5).rich rules (as)
: array of rich-language rules. See rule
tag in firewalld.zone(5).protocols (as)
: array of protocols. See protocol
tag in firewalld.zone(5).source-ports (a(ss))
: array of port and protocol pairs. See source-port
tag in firewalld.zone(5).
Possible errors: NAME_CONFLICT, INVALID_NAME, INVALID_TYPE
getIPSetByName
(s: ipset) → o
Return object path (permanent configuration) of ipset
with given name.
Possible errors: INVALID_IPSET
getIPSetNames
() → as
Return list of ipset
names (permanent configuration).
getIcmpTypeByName
(s: icmptype) → o
Return object path (permanent configuration) of icmptype
with given name.
Possible errors: INVALID_ICMPTYPE
getIcmpTypeNames
() → as
Return list of icmptype
names (permanent configuration).
getServiceByName
(s: service) → o
Return object path (permanent configuration) of service
with given name.
Possible errors: INVALID_SERVICE
getServiceNames
() → as
Return list of service
names (permanent configuration).
getZoneByName
(s: zone) → o
Return object path (permanent configuration) of zone
with given name.
Possible errors: INVALID_ZONE
getZoneNames
() → as
Return list of zone
names (permanent configuration) of.
getZoneOfInterface
(s: iface) → s
Return name of zone the iface
is bound to or empty string.
getZoneOfSource
(s: source) → s
Return name of zone the source
is bound to or empty string.
listIPSets
() → aoReturn array of object paths (o) of ipset in permanent configuration. For runtime configuration see org.fedoraproject.FirewallD1.ipset.Methods.getIPSets.
listIcmpTypes
() → aoReturn array of object paths (o) of icmp types in permanent configuration. For runtime configuration see org.fedoraproject.FirewallD1.Methods.listIcmpTypes.
listServices
() → aoReturn array of objects paths (o) of services in permanent configuration. For runtime configuration see org.fedoraproject.FirewallD1.Methods.listServices.
listZones
() → aoList object paths of zones known to permanent environment. For list of zones known to runtime environment see org.fedoraproject.FirewallD1.zone.Methods.getZones. The lists (of zones known to runtime and permanent environment) will contain same zones in most cases, but might differ for example if org.fedoraproject.FirewallD1.config.Methods.addZone has been called recently, but firewalld has not been reloaded since then.
If firewalld stops, it cleans up all firewall rules. Setting this option to no or false leaves the current firewall rules untouched.
Default zone for connections or interfaces if the zone is not selected or specified by NetworkManager, initscripts or command line tool.
IPv6_rpfilter
- s - (rw)Indicates whether the reverse path filter test on a packet for IPv6 is enabled. If a reply to the packet would be sent via the same interface that the packet arrived on, the packet will match and be accepted, otherwise dropped.
IndividualCalls
- s - (ro)Indicates whether individual calls combined -restore calls are used. If enabled, this increases the time that is needed to apply changes and to start the daemon, but is good for debugging.
If this property is enabled, firewall changes with the D-Bus interface will be limited to applications that are listed in the lockdown whitelist.
If LogDenied is enabled, then logging rules are added right before reject and drop rules in the INPUT, FORWARD and OUTPUT chains for the default rules and also final reject and drop rules in zones.
Possible values are: all
, unicast
, broadcast
, multicast
and off
.
For some firewall settings several rules are needed in different tables to be able to handle packets in the correct way. To achieve that these packets are marked using the MARK target. With the MinimalMark property a block of marks can be reserved for private use; only marks over this value are used.
Interface for permanent direct configuration, see also firewalld.direct(5). For runtime direct configuration see org.fedoraproject.FirewallD1.direct interface.
addChain
(s: ipv, s: table, s: chain) → Nothing
Add a new chain
to table
for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
Make sure there's no other chain with this name already.
There already exist basic chains to use with direct methods, for example INPUT_direct
chain.
These chains are jumped into before chains for zones, i.e. every rule put into INPUT_direct
will be checked before rules in zones.
For runtime operation see org.fedoraproject.FirewallD1.direct.Methods.addChain.
Possible errors: INVALID_IPV, INVALID_TABLE, ALREADY_ENABLED
addPassthrough
(s: ipv, as: args) → Nothing
Add a passthrough rule with the arguments args
for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
For runtime operation see org.fedoraproject.FirewallD1.direct.Methods.addPassthrough.
Possible errors: INVALID_IPV, ALREADY_ENABLED
addRule
(s: ipv, s: table, s: chain, i: priority, as: args) → Nothing
Add a rule with the arguments args
to chain
in table
with priority
for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
The priority is used to order rules. Priority 0 means add rule on top of the chain, with a higher priority the rule will be added further down.
Rules with the same priority are on the same level and the order of these rules is not fixed and may change.
If you want to make sure that a rule will be added after another one, use a low priority for the first and a higher for the following.
For runtime operation see org.fedoraproject.FirewallD1.direct.Methods.addRule.
Possible errors: INVALID_IPV, INVALID_TABLE, ALREADY_ENABLED
getAllChains
() → a(sss)
Get all chains added to all tables in format: ipv, table, chain.
This concerns only chains previously added with addChain
.
Return value is a array of (ipv
, table
, chain
).
For runtime operation see org.fedoraproject.FirewallD1.direct.Methods.getAllChains.
ipv (s)
: either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).table (s)
: one of filter
, mangle
, nat
, raw
, security
chain (s)
: name of a chain.
getAllPassthroughs
() → a(sas)
Get all passthrough rules added in all ipv types in format: ipv, rule.
This concerns only rules previously added with addPassthrough
.
Return value is a array of (ipv
, array of arguments
).
For runtime operation see org.fedoraproject.FirewallD1.direct.Methods.getAllPassthroughs.
ipv (s)
: either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).arguments (as)
: array of commands, parameters and other iptables/ip6tables/ebtables command line options.
getAllRules
() → a(sssias)
Get all rules added to all chains in all tables in format: ipv, table, chain, priority, rule.
This concerns only rules previously added with addRule
.
Return value is a array of (ipv
, table
, chain
, priority
, array of arguments
).
For runtime operation see org.fedoraproject.FirewallD1.direct.Methods.getAllRules.
ipv (s)
: either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).table (s)
: one of filter
, mangle
, nat
, raw
, security
chain (s)
: name of a chain.priority (i)
: used to order rules.arguments (as)
: array of commands, parameters and other iptables/ip6tables/ebtables command line options.
getChains
(s: ipv, s: table) → as
Return an array of chains (s) added to table
for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
This concerns only chains previously added with addChain
.
For runtime operation see org.fedoraproject.FirewallD1.direct.Methods.getChains.
Possible errors: INVALID_IPV, INVALID_TABLE
getPassthroughs
(s: ipv) → aas
Get tracked passthrough rules added in either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
This concerns only rules previously added with addPassthrough
.
Return value is a array of (array of arguments
).
For runtime operation see org.fedoraproject.FirewallD1.direct.Methods.getPassthroughs.
arguments (as)
: array of commands, parameters and other iptables/ip6tables/ebtables command line options.
getRules
(s: ipv, s: table, s: chain) → a(ias)
Get all rules added to chain
in table
for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
This concerns only rules previously added with addRule
.
Return value is a array of (priority
, array of arguments
).
For runtime operation see org.fedoraproject.FirewallD1.direct.Methods.getRules.
priority (i)
: used to order rules.arguments (as)
: array of commands, parameters and other iptables/ip6tables/ebtables command line options.
Possible errors: INVALID_IPV, INVALID_TABLE
getSettings
() → (a(sss)a(sssias)a(sas))
Get settings of permanent direct configuration in format: array of chains
, array of rules
, array of passthroughs
.
chains (a(sss))
: array of (ipv
, table
, chain
), see 'chain' in firewalld.direct(5).rules (a(sssias))
: array of (ipv
, table
, chain
, priority
, array of arguments
), see 'rule' in firewalld.direct(5).passthroughs (a(sas))
: array of (ipv
, array of arguments
), see passthrough in firewalld.direct(5).
queryChain
(s: ipv, s: table, s: chain) → b
Return whether a chain
exists in table
for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
This concerns only chains previously added with addChain
.
For runtime operation see org.fedoraproject.FirewallD1.direct.Methods.queryChain.
Possible errors: INVALID_IPV, INVALID_TABLE
queryPassthrough
(s: ipv, as: args) → b
Return whether a tracked passthrough rule with the arguments args
exists for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
This concerns only rules previously added with addPassthrough
.
For runtime operation see org.fedoraproject.FirewallD1.direct.Methods.queryPassthrough.
Possible errors: INVALID_IPV
queryRule
(s: ipv, s: table, s: chain, i: priority, as: args) → b
Return whether a rule with priority
and the arguments args
exists in chain
in table
for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
This concerns only rules previously added with addRule
.
For runtime operation see org.fedoraproject.FirewallD1.direct.Methods.queryRule.
Possible errors: INVALID_IPV, INVALID_TABLE
removeChain
(s: ipv, s: table, s: chain) → Nothing
Remove a chain
from table
for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
Only chains previously added with addChain
can be removed this way.
For runtime operation see org.fedoraproject.FirewallD1.direct.Methods.removeChain.
Possible errors: INVALID_IPV, INVALID_TABLE, NOT_ENABLED
removePassthrough
(s: ipv, as: args) → Nothing
Remove a passthrough rule with arguments args
for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
Only rules previously added with addPassthrough
can be removed this way.
For runtime operation see org.fedoraproject.FirewallD1.direct.Methods.removePassthrough.
Possible errors: INVALID_IPV, NOT_ENABLED
removeRule
(s: ipv, s: table, s: chain, i: priority, as: args) → Nothing
Remove a rule with priority
and arguments args
from chain
in table
for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
Only rules previously added with addRule
can be removed this way.
For runtime operation see org.fedoraproject.FirewallD1.direct.Methods.removeRule.
Possible errors: INVALID_IPV, INVALID_TABLE, NOT_ENABLED
removeRules
(s: ipv, s: table, s: chain) → Nothing
Remove all rules from chain
in table
for ipv
being either ipv4
(iptables) or ipv6
(ip6tables) or eb
(ebtables).
This concerns only rules previously added with addRule
.
For runtime operation see org.fedoraproject.FirewallD1.direct.Methods.removeRules.
Possible errors: INVALID_IPV, INVALID_TABLE
update
((a(sss)a(sssias)a(sas)): settings) → Nothing
Update permanent direct configuration with given settings
.
Settings are in format: array of chains
, array of rules
, array of passthroughs
.
chains (a(sss))
: array of (ipv
, table
, chain
), see 'chain' in firewalld.direct(5).rules (a(sssias))
: array of (ipv
, table
, chain
, priority
, array of arguments
), see 'rule' in firewalld.direct(5).passthroughs (a(sas))
: array of (ipv
, array of arguments
), see passthrough in firewalld.direct(5).
Possible errors: INVALID_TYPE
Interface for permanent lockdown-whitelist configuration, see also firewalld.lockdown-whitelist(5). For runtime configuration see org.fedoraproject.FirewallD1.policies interface.
addLockdownWhitelistCommand
(s: command) → Nothing
Add command
to whitelist.
See command
option in firewalld.lockdown-whitelist(5).
For runtime operation see org.fedoraproject.FirewallD1.policies.Methods.addLockdownWhitelistCommand.
Possible errors: ALREADY_ENABLED, INVALID_TYPE
addLockdownWhitelistContext
(s: context) → Nothing
Add context
to whitelist.
See selinux
option in firewalld.lockdown-whitelist(5).
For runtime operation see org.fedoraproject.FirewallD1.policies.Methods.addLockdownWhitelistContext.
Possible errors: ALREADY_ENABLED, INVALID_TYPE
addLockdownWhitelistUid
(i: uid) → Nothing
Add user id uid
to whitelist.
See user
option in firewalld.lockdown-whitelist(5).
For runtime operation see org.fedoraproject.FirewallD1.policies.Methods.addLockdownWhitelistUid.
Possible errors: ALREADY_ENABLED, INVALID_TYPE
addLockdownWhitelistUser
(s: user) → Nothing
Add user
name to whitelist.
See user
option in firewalld.lockdown-whitelist(5).
For runtime operation see org.fedoraproject.FirewallD1.policies.Methods.addLockdownWhitelistUser.
Possible errors: ALREADY_ENABLED, INVALID_TYPE
getLockdownWhitelist
() → (asasasai)
Get settings of permanent lockdown-whitelist configuration in format: commands
, selinux contexts
, users
, uids
commands (as)
: see command
option in firewalld.lockdown-whitelist(5).selinux contexts (as)
: see selinux
option in firewalld.lockdown-whitelist(5).users (as)
: see name
attribute of user
option in firewalld.lockdown-whitelist(5).uids (ai)
: see id
attribute of user
option in firewalld.lockdown-whitelist(5).
getLockdownWhitelistCommands
() → asList all command lines (s) that are on whitelist. For runtime operation see org.fedoraproject.FirewallD1.policies.Methods.getLockdownWhitelistCommands.
getLockdownWhitelistContexts
() → asList all contexts (s) that are on whitelist. For runtime operation see org.fedoraproject.FirewallD1.policies.Methods.getLockdownWhitelistContexts.
getLockdownWhitelistUids
() → aiList all user ids (i) that are on whitelist. For runtime operation see org.fedoraproject.FirewallD1.policies.Methods.getLockdownWhitelistUids.
getLockdownWhitelistUsers
() → asList all users (s) that are on whitelist. For runtime operation see org.fedoraproject.FirewallD1.policies.Methods.getLockdownWhitelistUsers.
queryLockdownWhitelistCommand
(s: command) → b
Query whether command
is on whitelist.
For runtime operation see org.fedoraproject.FirewallD1.policies.Methods.queryLockdownWhitelistCommand.
queryLockdownWhitelistContext
(s: context) → b
Query whether context
is on whitelist.
For runtime operation see org.fedoraproject.FirewallD1.policies.Methods.queryLockdownWhitelistContext.
queryLockdownWhitelistUid
(i: uid) → b
Query whether user id uid
is on whitelist.
For runtime operation see org.fedoraproject.FirewallD1.policies.Methods.queryLockdownWhitelistUid.
queryLockdownWhitelistUser
(s: user) → b
Query whether user
is on whitelist.
For runtime operation see org.fedoraproject.FirewallD1.policies.Methods.queryLockdownWhitelistUser.
removeLockdownWhitelistCommand
(s: command) → Nothing
Remove command
from whitelist.
For runtime operation see org.fedoraproject.FirewallD1.policies.Methods.removeLockdownWhitelistCommand.
Possible errors: NOT_ENABLED
removeLockdownWhitelistContext
(s: context) → Nothing
Remove context
from whitelist.
For runtime operation see org.fedoraproject.FirewallD1.policies.Methods.removeLockdownWhitelistContext.
Possible errors: NOT_ENABLED
removeLockdownWhitelistUid
(i: uid) → Nothing
Remove user id uid
from whitelist.
For runtime operation see org.fedoraproject.FirewallD1.policies.Methods.removeLockdownWhitelistUid.
Possible errors: NOT_ENABLED
removeLockdownWhitelistUser
(s: user) → Nothing
Remove user
from whitelist.
For runtime operation see org.fedoraproject.FirewallD1.policies.Methods.removeLockdownWhitelistUser.
Possible errors: NOT_ENABLED
setLockdownWhitelist
((asasasai): settings) → Nothing
Set permanent lockdown-whitelist configuration to settings
.
Settings are in format: commands
, selinux contexts
, users
, uids
commands (as)
: see command
option in firewalld.lockdown-whitelist(5).selinux contexts (as)
: see selinux
option in firewalld.lockdown-whitelist(5).users (as)
: see name
attribute of user
option in firewalld.lockdown-whitelist(5).uids (ai)
: see id
attribute of user
option in firewalld.lockdown-whitelist(5).
Possible errors: INVALID_TYPE
Interface for permanent ipset configuration, see also firewalld.ipset(5).
addEntry
(s: entry) → Nothing
Permanently add entry
to list of entries of ipset.
See entry
tag in firewalld.ipset(5).
For runtime operation see org.fedoraproject.FirewallD1.ipset.Methods.addEntry.
Possible errors: ALREADY_ENABLED
addOption
(s: key, s: value) → Nothing
Permanently add (key
, value
) to the ipset.
See option
tag in firewalld.ipset(5).
Possible errors: ALREADY_ENABLED
getDescription
() → s
Get description of ipset.
See description
tag in firewalld.ipset(5).
getEntries
() → as
Get list of entries added to ipset.
See entry
tag in firewalld.ipset(5).
For runtime operation see org.fedoraproject.FirewallD1.ipset.Methods.getEntries.
Possible errors: IPSET_WITH_TIMEOUT
getOptions
() → a{ss}
Get dictionary of options
set for ipset.
See option
tag in firewalld.ipset(5).
getSettings
() → (ssssa{ss}as)
Return permament settings of the ipset.
For getting runtime settings see org.fedoraproject.FirewallD1.ipset.Methods.getIPSetSettings.
Settings are in format: version
, name
, description
, type
, dictionary of options
and array of entries
.
version (s)
: see version
attribute of ipset
tag in firewalld.ipset(5).name (s)
: see short
tag in firewalld.ipset(5).description (s)
: see description
tag in firewalld.ipset(5).type (s)
: see type
attribute of ipset
tag in firewalld.ipset(5).options (a{ss})
: dictionary of {option : value} . See options
tag in firewalld.ipset(5).entries (as)
: array of entries, see entry
tag in firewalld.ipset(5).
getShort
() → s
Get name of ipset.
See short
tag in firewalld.ipset(5).
getType
() → s
Get type of ipset.
See type
attribute of ipset
tag in firewalld.ipset(5).
getVersion
() → s
Get version of ipset.
See version
attribute of ipset
tag in firewalld.ipset(5).
loadDefaults
() → NothingLoad default settings for built-in ipset.
Possible errors: NO_DEFAULTS
queryEntry
(s: entry) → b
Return whether entry
has been added to ipset
.
For runtime operation see org.fedoraproject.FirewallD1.ipset.Methods.queryEntry.
queryOption
(s: key, s: value) → b
Return whether (key
, value
) has been added to options of the ipset
.
remove
() → NothingRemove not built-in ipset.
Possible errors: BUILTIN_IPSET
removeEntry
(s: entry) → Nothing
Permanently remove entry
from ipset.
See entry
tag in firewalld.ipset(5).
For runtime operation see org.fedoraproject.FirewallD1.ipset.Methods.removeEntry.
Possible errors: NOT_ENABLED
removeOption
(s: key) → Nothing
Permanently remove key
from the ipset.
See option
tag in firewalld.ipset(5).
Possible errors: NOT_ENABLED
rename
(s: name) → Nothing
Rename not built-in ipset to name
.
Possible errors: BUILTIN_IPSET
setDescription
(s: description) → Nothing
Permanently set description of ipset to description
.
See description
tag in firewalld.ipset(5).
setEntries
(as: entries) → Nothing
Permanently set list of entries to entries
.
See entry
tag in firewalld.ipset(5).
setOptions
(a{ss}: options) → Nothing
Permanently set dict of options to options
.
See option
tag in firewalld.ipset(5).
setShort
(s: short) → Nothing
Permanently set name of ipset to short
.
See short
tag in firewalld.ipset(5).
setType
(s: ipset_type) → Nothing
Permanently set type of ipset to ipset_type
.
See type
attribute of ipset
tag in firewalld.ipset(5).
setVersion
(s: version) → Nothing
Permanently set version of ipset to version
.
See version
attribute of ipset
tag in firewalld.ipset(5).
update
((ssssa{ss}as): settings) → Nothing
Update settings of ipset to settings
.
Settings are in format: version
, name
, description
, type
, dictionary of options
and array of entries
.
version (s)
: see version
attribute of ipset
tag in firewalld.ipset(5).name (s)
: see short
tag in firewalld.ipset(5).description (s)
: see description
tag in firewalld.ipset(5).type (s)
: see type
attribute of ipset
tag in firewalld.ipset(5).options (a{ss})
: dictionary of {option : value} . See options
tag in firewalld.ipset(5).entries (as)
: array of entries, see entry
tag in firewalld.ipset(5).
Possible errors: INVALID_TYPE
True if ipset is build-in, false else.
True if build-in ipset has default settings. False if it has been modified. Always False for not build-in ipsets.
Name (including .xml extension) of file where the configuration is stored.
Name of ipset.
Path to directory where the ipset configuration is stored. Should be either /usr/lib/firewalld/ipsets or /etc/firewalld/ipsets.
Interface for permanent zone configuration, see also firewalld.zone(5).
addForwardPort
(s: port, s: protocol, s: toport, s: toaddr) → Nothing
Permanently add (port
, protocol
, toport
, toaddr
) to list of forward ports of zone.
See forward-port
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.addForwardPort.
Possible errors: ALREADY_ENABLED
addIcmpBlock
(s: icmptype) → Nothing
Permanently add icmptype
to list of icmp types blocked in zone.
See icmp-block
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.addIcmpBlock.
Possible errors: ALREADY_ENABLED
addIcmpBlock
(s: icmptype) → Nothing
Permanently add icmp block inversion to zone.
See icmp-block-inversion
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.addIcmpBlockInversion.
Possible errors: ALREADY_ENABLED
addInterface
(s: interface) → Nothing
Permanently add interface
to list of interfaces bound to zone.
See interface
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.addInterface.
Possible errors: ALREADY_ENABLED
addMasquerade
() → Nothing
Permanently enable masquerading in zone.
See masquerade
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.addMasquerade.
Possible errors: ALREADY_ENABLED
addPort
(s: port, s: protocol) → Nothing
Permanently add (port
, protocol
) to list of ports of zone.
See port
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.addPort.
Possible errors: ALREADY_ENABLED
addProtocol
(s: protocol) → Nothing
Permanently add protocol into zone
.
The protocol can be any protocol supported by the system. Please have a look at /etc/protocols
for supported protocols.
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.addProtocol.
Possible errors: INVALID_PROTOCOL, ALREADY_ENABLED
addRichRule
(s: rule) → Nothing
Permanently add rule
to list of rich-language rules in zone.
See rule
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.addRichRule.
Possible errors: ALREADY_ENABLED
addService
(s: service) → Nothing
Permanently add service
to list of services used in zone.
See service
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.addService.
Possible errors: ALREADY_ENABLED
addSource
(s: source) → Nothing
Permanently add source
to list of source addresses bound to zone.
See source
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.addSource.
Possible errors: ALREADY_ENABLED
addSourcePort
(s: port, s: protocol) → Nothing
Permanently add (port
, protocol
) to list of source ports of zone.
See source-port
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.addSourcePort.
Possible errors: ALREADY_ENABLED
getDescription
() → s
Get description of zone.
See description
tag in firewalld.zone(5).
getForwardPorts
() → a(ssss)
Get list of (port
, protocol
, toport
, toaddr
) defined in zone.
See forward-port
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.getForwardPorts.
getIcmpBlockInversion
() → b
Get icmp block inversion flag of zone.
See icmp-block-inversion
tag in firewalld.zone(5).
getIcmpBlocks
() → as
Get list of icmp type names blocked in zone.
See icmp-block
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.getIcmpBlocks.
getInterfaces
() → as
Get list of interfaces bound to zone.
See interface
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.getInterfaces.
getMasquerade
() → b
Return whether masquerade
is enabled in zone.
This is the same as queryMasquerade() method.
See masquerade
tag in firewalld.zone(5).
getPorts
() → a(ss)
Get list of (port
, protocol
) defined in zone.
See port
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.getPorts.
getProtocols
() → as
Return array of protocols (s) previously enabled in zone
.
For getting runtime settings see org.fedoraproject.FirewallD1.zone.Methods.getProtocols.
getRichRules
() → as
Get list of rich-language rules in zone.
See rule
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.getRichRules.
getServices
() → as
Get list of service names used in zone.
See service
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.getServices.
getSettings
() → (sssbsasa(ss)asba(ssss)asasasasa(ss))
Return permanent settings of given zone
.
For getting runtime settings see org.fedoraproject.FirewallD1.Methods.getZoneSettings.
Settings are in format: version
, name
, description
, UNUSED
, target
, array of services
, array of ports
(port, protocol), array of icmp-blocks
, masquerade
, array of forward-ports
(port, protocol, to-port, to-addr), array of interfaces
, array of sources
, array of rich rules
, array of protocols
and array of source-ports
(port, protocol).
version (s)
: see version
attribute of zone
tag in firewalld.zone(5).name (s)
: see short
tag in firewalld.zone(5).description (s)
: see description
tag in firewalld.zone(5).UNUSED (b)
: this boolean value is no longer used for anything.target (s)
: see target
attribute of zone
tag in firewalld.zone(5).services (as)
: array of service names, see service
tag in firewalld.zone(5).ports (a(ss))
: array of port and protocol pairs. See port
tag in firewalld.zone(5).icmp-blocks (as)
: array of icmp-blocks. See icmp-block
tag in firewalld.zone(5).masquerade (b)
: see masquerade
tag in firewalld.zone(5).forward-ports (a(ssss))
: array of (port, protocol, to-port, to-addr). See forward-port
tag in firewalld.zone(5).interfaces (as)
: array of interfaces. See interface
tag in firewalld.zone(5).source addresses (as)
: array of source addresses. See source
tag in firewalld.zone(5).rich rules (as)
: array of rich-language rules. See rule
tag in firewalld.zone(5).protocols (as)
: array of protocols. See protocol
tag in firewalld.zone(5).source-ports (a(ss))
: array of port and protocol pairs. See source-port
tag in firewalld.zone(5).
getShort
() → s
Get name of zone.
See short
tag in firewalld.zone(5).
getSourcePorts
() → a(ss)
Get list of (port
, protocol
) defined in zone.
See source-port
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.getSourcePorts.
getSources
() → as
Get list of source addresses bound to zone.
See source
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.getSources.
getTarget
() → s
Get target of zone.
See target
attribute of zone
tag in firewalld.zone(5).
getVersion
() → s
Get version of zone.
See version
attribute of zone
tag in firewalld.zone(5).
loadDefaults
() → NothingLoad default settings for built-in zone.
Possible errors: NO_DEFAULTS
queryForwardPort
(s: port, s: protocol, s: toport, s: toaddr) → b
Return whether (port
, protocol
, toport
, toaddr
) is in list of forward ports of zone.
See forward-port
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.queryForwardPort.
queryIcmpBlock
(s: icmptype) → b
Return whether icmptype
is in list of icmp types blocked in zone.
See icmp-block
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.queryIcmpBlock.
queryIcmpBlockInversion
() → b
Return whether icmp block inversion
is in enabled in zone.
See icmp-block-inversion
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.queryIcmpBlockInversion.
queryInterface
(s: interface) → b
Return whether interface
is in list of interfaces bound to zone.
See interface
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.queryInterface.
queryMasquerade
() → b
Return whether masquerade
is enabled in zone.
This is the same as getMasquerade() method.
See masquerade
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.queryMasquerade.
queryPort
(s: port, s: protocol) → b
Return whether (port
, protocol
) is in list of ports of zone.
See port
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.queryPort.
queryProtocol
(s: protocol) → b
Return whether protocol
has been added in zone
.
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.queryProtocol.
Possible errors: INVALID_PROTOCOL
queryRichRule
(s: rule) → b
Return whether rule
is in list of rich-language rules in zone.
See rule
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.queryRichRule.
queryService
(s: service) → b
Return whether service
is in list of services used in zone.
See service
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.queryService.
querySource
(s: source) → b
Return whether source
is in list of source addresses bound to zone.
See source
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.querySource.
querySourcePort
(s: port, s: protocol) → b
Return whether (port
, protocol
) is in list of source ports of zone.
See source-port
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.querySourcePort.
remove
() → NothingRemove not built-in zone.
Possible errors: BUILTIN_ZONE
removeForwardPort
(s: port, s: protocol, s: toport, s: toaddr) → Nothing
Permanently remove (port
, protocol
, toport
, toaddr
) from list of forward ports of zone.
See forward-port
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.removeForwardPort.
Possible errors: NOT_ENABLED
removeIcmpBlock
(s: icmptype) → Nothing
Permanently remove icmptype
from list of icmp types blocked in zone.
See icmp-block
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.removeIcmpBlock.
Possible errors: NOT_ENABLED
removeIcmpBlockInversion
() → Nothing
Permanently remove icmp block inversion
from the zone.
See icmp-block-inversion
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.removeIcmpBlockInversion.
Possible errors: NOT_ENABLED
removeInterface
(s: interface) → Nothing
Permanently remove interface
from list of interfaces bound to zone.
See interface
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.removeInterface.
Possible errors: NOT_ENABLED
removeMasquerade
() → Nothing
Permanently disable masquerading in zone.
See masquerade
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.removeMasquerade.
Possible errors: NOT_ENABLED
removePort
(s: port, s: protocol) → Nothing
Permanently remove (port
, protocol
) from list of ports of zone.
See port
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.removePort.
Possible errors: NOT_ENABLED
removeProtocol
(s: protocol) → Nothing
Permanently remove protocol from zone
.
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.removeProtocol.
Possible errors: INVALID_PROTOCOL, NOT_ENABLED
removeRichRule
(s: rule) → Nothing
Permanently remove rule
from list of rich-language rules in zone.
See rule
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.removeRichRule.
Possible errors: NOT_ENABLED
removeService
(s: service) → Nothing
Permanently remove service
from list of services used in zone.
See service
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.removeService.
Possible errors: NOT_ENABLED
removeSource
(s: source) → Nothing
Permanently remove source
from list of source addresses bound to zone.
See source
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.removeSource.
Possible errors: NOT_ENABLED
removeSourcePort
(s: port, s: protocol) → Nothing
Permanently remove (port
, protocol
) from list of source ports of zone.
See source-port
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.removeSourcePort.
Possible errors: NOT_ENABLED
rename
(s: name) → Nothing
Rename not built-in zone to name
.
Possible errors: BUILTIN_ZONE
setDescription
(s: description) → Nothing
Permanently set description of zone to description
.
See description
tag in firewalld.zone(5).
setForwardPorts
(a(ssss): ports) → Nothing
Permanently set forward ports of zone to list of (port
, protocol
, toport
, toaddr
).
See forward-port
tag in firewalld.zone(5).
setIcmpBlockInversion
(b: flag) → Nothing
Permanently set icmp block inversion flag of zone to flag
.
See icmp-block-inversion
tag in firewalld.zone(5).
setIcmpBlocks
(as: icmptypes) → Nothing
Permanently set list of icmp types blocked in zone to icmptypes
.
See icmp-block
tag in firewalld.zone(5).
setInterfaces
(as: interfaces) → Nothing
Permanently set list of interfaces bound to zone to interfaces
.
See interface
tag in firewalld.zone(5).
setMasquerade
(b: masquerade) → Nothing
Permanently set masquerading in zone to masquerade
.
See masquerade
tag in firewalld.zone(5).
setPorts
(a(ss): ports) → Nothing
Permanently set ports of zone to list of (port
, protocol
).
See port
tag in firewalld.zone(5).
setProtocols
(as: protocols) → Nothing
Permanently set list of protocols used in zone to protocols
.
See protocol
tag in firewalld.zone(5).
setRichRules
(as: rules) → Nothing
Permanently set list of rich-language rules to rules
.
See rule
tag in firewalld.zone(5).
setServices
(as: services) → Nothing
Permanently set list of services used in zone to services
.
See service
tag in firewalld.zone(5).
setShort
(s: short) → Nothing
Permanently set name of zone to short
.
See short
tag in firewalld.zone(5).
setSourcePorts
(a(ss): ports) → Nothing
Permanently set source-ports of zone to list of (port
, protocol
).
See source-port
tag in firewalld.zone(5).
For runtime operation see org.fedoraproject.FirewallD1.zone.Methods.setSourcePorts.
setSources
(as: sources) → Nothing
Permanently set list of source addresses bound to zone to sources
.
See source
tag in firewalld.zone(5).
setTarget
(s: target) → Nothing
Permanently set target of zone to target
.
See target
attribute of zone
tag in firewalld.zone(5).
setVersion
(s: version) → Nothing
Permanently set version of zone to version
.
See version
attribute of zone
tag in firewalld.zone(5).
update
((sssbsasa(ss)asba(ssss)asasasasa(ss)): settings) → Nothing
Update settings of zone to settings
.
Settings are in format: version
, name
, description
, UNUSED
, target
, array of services
, array of ports
(port, protocol), array of icmp-blocks
, masquerade
, array of forward-ports
(port, protocol, to-port, to-addr), array of interfaces
, array of sources
, array of rich rules
, array of protocols
and array of source-ports
(port, protocol).
version (s)
: see version
attribute of zone
tag in firewalld.zone(5).name (s)
: see short
tag in firewalld.zone(5).description (s)
: see description
tag in firewalld.zone(5).UNUSED (b)
: this boolean value is no longer used for anything.target (s)
: see target
attribute of zone
tag in firewalld.zone(5).services (as)
: array of service names, see service
tag in firewalld.zone(5).ports (a(ss))
: array of port and protocol pairs. See port
tag in firewalld.zone(5).icmp-blocks (as)
: array of icmp-blocks. See icmp-block
tag in firewalld.zone(5).masquerade (b)
: see masquerade
tag in firewalld.zone(5).forward-ports (a(ssss))
: array of (port, protocol, to-port, to-addr). See forward-port
tag in firewalld.zone(5).interfaces (as)
: array of interfaces. See interface
tag in firewalld.zone(5).source addresses (as)
: array of source addresses. See source
tag in firewalld.zone(5).rich rules (as)
: array of rich-language rules. See rule
tag in firewalld.zone(5).protocols (as)
: array of protocols. See protocol
tag in firewalld.zone(5).source-ports (a(ss))
: array of port and protocol pairs. See source-port
tag in firewalld.zone(5).
Possible errors: INVALID_TYPE
True if zone is build-in, false else.
True if build-in zone has default settings. False if it has been modified. Always False for not build-in zones.
Name (including .xml extension) of file where the configuration is stored.
Name of zone.
Path to directory where the zone configuration is stored. Should be either /usr/lib/firewalld/zones or /etc/firewalld/zones.
Interface for permanent service configuration, see also firewalld.service(5).
addModule
(s: module) → Nothing
Permanently add module
to list of modules (netfilter kernel helpers) used in service.
See module
tag in firewalld.service(5).
Possible errors: ALREADY_ENABLED
addPort
(s: port, s: protocol) → Nothing
Permanently add (port
, protocol
) to list of ports in service.
See port
tag in firewalld.service(5).
Possible errors: ALREADY_ENABLED
addProtocol
(s: protocol) → Nothing
Permanently add protocol into zone
.
The protocol can be any protocol supported by the system. Please have a look at /etc/protocols
for supported protocols.
See protocol
tag in firewalld.service(5).
Possible errors: INVALID_PROTOCOL, ALREADY_ENABLED
addSourcePort
(s: port, s: protocol) → Nothing
Permanently add (port
, protocol
) to list of source ports in service.
See source-port
tag in firewalld.service(5).
Possible errors: ALREADY_ENABLED
getDescription
() → s
Get description of service.
See description
tag in firewalld.service(5).
getDestination
(s: family) → s
Get destination for IP family being either 'ipv4' or 'ipv6'.
See destination
tag in firewalld.service(5).
Possible errors: ALREADY_ENABLED
getDestinations
() → a{ss}
Get list of destinations.
Return value is a dictionary of {IP family : IP address} where 'IP family' key can be either 'ipv4' or 'ipv6'.
See destination
tag in firewalld.service(5).
getModules
() → as
Get list of modules (netfilter kernel helpers) used in service.
See module
tag in firewalld.service(5).
getPorts
() → a(ss)
Get list of (port
, protocol
) defined in service.
See port
tag in firewalld.service(5).
getProtocols
() → as
Return array of protocols (s) defined in service
.
See protocol
tag in firewalld.service(5).
getSettings
() → (sssa(ss)asa{ss}asa(ss))
Return permanent settings of a service
.
For getting runtime settings see org.fedoraproject.FirewallD1.Methods.getServiceSettings.
Settings are in format: version
, name
, description
, array of ports
(port, protocol), array of module names
, dictionary of destinations
, array of protocols
and array of source-ports
(port, protocol).
version (s)
: see version
attribute of service
tag in firewalld.service(5).name (s)
: see short
tag in firewalld.service(5).description (s)
: see description
tag in firewalld.service(5).ports (a(ss))
: array of port and protocol pairs. See port
tag in firewalld.service(5).module names (as)
: array of kernel netfilter helpers, see module
tag in firewalld.service(5).destinations (a{ss})
: dictionary of {IP family : IP address} where 'IP family' key can be either 'ipv4' or 'ipv6'. See destination
tag in firewalld.service(5).protocols (as)
: array of protocols. See protocol
tag in firewalld.service(5).source-ports (a(ss))
: array of port and protocol pairs. See source-port
tag in firewalld.service(5).
getShort
() → s
Get name of service.
See short
tag in firewalld.service(5).
getSourcePorts
() → a(ss)
Get list of (port
, protocol
) defined in service.
See source-port
tag in firewalld.service(5).
getVersion
() → s
Get version of service.
See version
attribute of service
tag in firewalld.service(5).
loadDefaults
() → NothingLoad default settings for built-in service.
Possible errors: NO_DEFAULTS
queryDestination
(s: family, s: address) → b
Return whether a destination
is in dictionary of destinations of this service.
destination is in format: (IP family
, IP address
) where IP family
can be either 'ipv4' or 'ipv6'.
See destination
tag in firewalld.service(5).
queryModule
(s: module) → b
Return whether module
is in list of modules (netfilter kernel helpers) used in service.
See module
tag in firewalld.service(5).
queryPort
(s: port, s: protocol) → b
Return whether (port
, protocol
) is in list of ports in service.
See port
tag in firewalld.service(5).
queryProtocol
(s: protocol) → b
Return whether protocol
is in list of protocols in service.
See protocol
tag in firewalld.service(5).
querySourcePort
(s: port, s: protocol) → b
Return whether (port
, protocol
) is in list of source ports in service.
See source-port
tag in firewalld.service(5).
remove
() → NothingRemove not built-in service.
Possible errors: BUILTIN_SERVICE
removeDestination
(s: family) → Nothing
Permanently remove a destination with family
('ipv4' or 'ipv6') from service.
See destination
tag in firewalld.service(5).
Possible errors: NOT_ENABLED
removeModule
(s: module) → Nothing
Permanently remove module
from list of modules (netfilter kernel helpers) used in service.
See module
tag in firewalld.service(5).
Possible errors: NOT_ENABLED
removePort
(s: port, s: protocol) → Nothing
Permanently remove (port
, protocol
) from list of ports in service.
See port
tag in firewalld.service(5).
Possible errors: NOT_ENABLED
removeProtocol
(s: protocol) → Nothing
Permanently remove protocol
from list of protocols in service.
See protocol
tag in firewalld.service(5).
Possible errors: NOT_ENABLED
removeSourcePort
(s: port, s: protocol) → Nothing
Permanently remove (port
, protocol
) from list of source ports in service.
See source-port
tag in firewalld.service(5).
Possible errors: NOT_ENABLED
rename
(s: name) → Nothing
Rename not built-in service to name
.
Possible errors: BUILTIN_SERVICE
setDescription
(s: description) → Nothing
Permanently set description of service to description
.
See description
tag in firewalld.service(5).
setDestination
(s: family, s: address) → Nothing
Permanently set a destination address.
destination is in format: (IP family
, IP address
) where IP family
can be either 'ipv4' or 'ipv6'.
See destination
tag in firewalld.service(5).
Possible errors: ALREADY_ENABLED
setDestinations
(a{ss}: destinations) → Nothing
Permanently set destinations of service to destinations
, which is a dictionary of {IP family : IP address} where 'IP family' key can be either 'ipv4' or 'ipv6'.
See destination
tag in firewalld.service(5).
setModules
(as: modules) → Nothing
Permanently set list of modules (netfilter kernel helpers) used in service to modules
.
See module
tag in firewalld.service(5).
setPorts
(a(ss): ports) → Nothing
Permanently set ports of service to list of (port
, protocol
).
See port
tag in firewalld.service(5).
setProtocols
(as: protocols) → Nothing
Permanently set protocols of service to list of protocols
.
See protocol
tag in firewalld.service(5).
setShort
(s: short) → Nothing
Permanently set name of service to short
.
See short
tag in firewalld.service(5).
setSourcePorts
(a(ss): ports) → Nothing
Permanently set source-ports of service to list of (port
, protocol
).
See source-port
tag in firewalld.service(5).
setVersion
(s: version) → Nothing
Permanently set version of service to version
.
See version
attribute of service
tag in firewalld.service(5).
update
((sssa(ss)asa{ss}asa(ss)): settings) → Nothing
Update settings of service to settings
.
Settings are in format: version
, name
, description
, array of ports
(port, protocol), array of module names
, dictionary of destinations
, array of protocols
and array of source-ports
(port, protocol).
version (s)
: see version
attribute of service
tag in firewalld.service(5).name (s)
: see short
tag in firewalld.service(5).description (s)
: see description
tag in firewalld.service(5).ports (a(ss))
: array of port and protocol pairs. See port
tag in firewalld.service(5).module names (as)
: array of kernel netfilter helpers, see module
tag in firewalld.service(5).destinations (a{ss})
: dictionary of {IP family : IP address} where 'IP family' key can be either 'ipv4' or 'ipv6'. See destination
tag in firewalld.service(5).protocols (as)
: array of protocols. See protocol
tag in firewalld.service(5).
Possible errors: INVALID_TYPE
True if service is build-in, false else.
True if build-in service has default settings. False if it has been modified. Always False for not build-in services.
Name (including .xml extension) of file where the configuration is stored.
Name of service.
Path to directory where the configuration is stored. Should be either /usr/lib/firewalld/services or /etc/firewalld/services.
Interface for permanent icmp type configuration, see also firewalld.icmptype(5).
addDestination
(s: destination) → Nothing
Permanently add a destination
('ipv4' or 'ipv6') to list of destinations of this icmp type.
See destination
tag in firewalld.icmptype(5).
Possible errors: ALREADY_ENABLED
getDescription
() → s
Get description of icmp type.
See description
tag in firewalld.icmptype(5).
getDestinations
() → as
Get list of destinations.
See destination
tag in firewalld.icmptype(5).
getSettings
() → (sssas)
Return permanent settings of icmp type
.
For getting runtime settings see org.fedoraproject.FirewallD1.Methods.getIcmpTypeSettings.
Settings are in format: version
, name
, description
, array of destinations
.
version (s)
: see version
attribute of icmptype
tag in firewalld.icmptype(5).name (s)
: see short
tag in firewalld.icmptype(5).description (s)
: see description
tag in firewalld.icmptype(5).destinations (as)
: array, either empty or containing strings 'ipv4' and/or 'ipv6', see destination tag in firewalld.icmptype(5).
getShort
() → s
Get name of icmp type.
See short
tag in firewalld.icmptype(5).
getVersion
() → s
Get version of icmp type.
See version
attribute of icmptype
tag in firewalld.icmptype(5).
loadDefaults
() → NothingLoad default settings for built-in icmp type.
Possible errors: NO_DEFAULTS
queryDestination
(s: destination) → b
Return whether a destination
('ipv4' or 'ipv6') is in list of destinations of this icmp type.
See destination
tag in firewalld.icmptype(5).
remove
() → NothingRemove not built-in icmp type.
Possible errors: BUILTIN_ICMPTYPE
removeDestination
(s: destination) → Nothing
Permanently remove a destination
('ipv4' or 'ipv6') from list of destinations of this icmp type.
See destination
tag in firewalld.icmptype(5).
Possible errors: NOT_ENABLED
rename
(s: name) → Nothing
Rename not built-in icmp type to name
.
Possible errors: BUILTIN_ICMPTYPE
setDescription
(s: description) → Nothing
Permanently set description of icmp type to description
.
See description
tag in firewalld.icmptype(5).
setDestinations
(as: destinations) → Nothing
Permanently set destinations of icmp type to destinations
, which is array, either empty or containing strings 'ipv4' and/or 'ipv6'.
See destination
tag in firewalld.icmptype(5).
setShort
(s: short) → Nothing
Permanently set name of icmp type to short
.
See short
tag in firewalld.icmptype(5).
setVersion
(s: version) → Nothing
Permanently set version of icmp type to version
.
See version
attribute of icmptype
tag in firewalld.icmptype(5).
update
((sssas): settings) → Nothing
Update permanent settings of icmp type to settings
.
Settings are in format: version
, name
, description
, array of destinations
.
version (s)
: see version
attribute of icmptype
tag in firewalld.icmptype(5).name (s)
: see short
tag in firewalld.icmptype(5).description (s)
: see description
tag in firewalld.icmptype(5).destinations (as)
: array, either empty or containing strings 'ipv4' and/or 'ipv6', see destination tag in firewalld.icmptype(5).
True if icmptype is build-in, false else.
True if build-in icmp type has default settings. False if it has been modified. Always False for not build-in zones.
Name (including .xml extension) of file where the configuration is stored.
Name of icmp type.
Path to directory where the icmp type configuration is stored. Should be either /usr/lib/firewalld/icmptypes or /etc/firewalld/icmptypes.