Projet

Général

Profil

Révision eac19d14

IDeac19d1481b56748c6d89c47bc961f51dfdaccde
Parent e5a1eb78
Enfant 839ee136

Ajouté par Tim Meusel il y a plus d'un an

Make "dropping invalid packets" configureable

It doesn't make sense to explicitly drop those pakets when the default
policy is already `DROP`. Also some applications, like ceph, are known
to send packets that might be marked as invalid.

Voir les différences:

REFERENCE.md
168 168
* [`log_limit`](#-nftables--log_limit)
169 169
* [`reject_with`](#-nftables--reject_with)
170 170
* [`in_out_conntrack`](#-nftables--in_out_conntrack)
171
* [`in_out_drop_invalid`](#-nftables--in_out_drop_invalid)
171 172
* [`fwd_conntrack`](#-nftables--fwd_conntrack)
173
* [`fwd_drop_invalid`](#-nftables--fwd_drop_invalid)
172 174
* [`firewalld_enable`](#-nftables--firewalld_enable)
173 175
* [`noflush_tables`](#-nftables--noflush_tables)
174 176
* [`rules`](#-nftables--rules)
......
324 326

  
325 327
Default value: `true`
326 328

  
329
##### <a name="-nftables--in_out_drop_invalid"></a>`in_out_drop_invalid`
330

  
331
Data type: `Boolean`
332

  
333
Drops invalid packets in INPUT and OUTPUT
334

  
335
Default value: `$in_out_conntrack`
336

  
327 337
##### <a name="-nftables--fwd_conntrack"></a>`fwd_conntrack`
328 338

  
329 339
Data type: `Boolean`
......
333 343

  
334 344
Default value: `false`
335 345

  
346
##### <a name="-nftables--fwd_drop_invalid"></a>`fwd_drop_invalid`
347

  
348
Data type: `Boolean`
349

  
350
Drops invalid packets in FORWARD
351

  
352
Default value: `$fwd_conntrack`
353

  
336 354
##### <a name="-nftables--firewalld_enable"></a>`firewalld_enable`
337 355

  
338 356
Data type: `Variant[Boolean[false], Enum['mask']]`

Formats disponibles : Unified diff