source: archive/firewalld.xml

trunk
Last change on this file was 3f2db3a6, checked in by Pierre Labastie <pierre.labastie@…>, 17 months ago

Remove sect1info tags

They only contain a date tag that is nowhere used.

  • Property mode set to 100644
File size: 10.8 KB
Line 
1<?xml version="1.0" encoding="ISO-8859-1"?>
2<!DOCTYPE sect1 PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
3 "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
4 <!ENTITY % general-entities SYSTEM "../../general.ent">
5 %general-entities;
6
7 <!ENTITY firewalld-download-http "https://github.com/firewalld/firewalld/releases/download/v&firewalld-version;/firewalld-&firewalld-version;.tar.gz">
8 <!ENTITY firewalld-download-ftp " ">
9 <!ENTITY firewalld-md5sum "644a8970b43fcf875178ae3bec640db4">
10 <!ENTITY firewalld-size "1.6 MB">
11 <!ENTITY firewalld-buildsize "19 MB (additionall 2 MB for tests)">
12 <!ENTITY firewalld-time "less than 0.1 SBU (add 6.2 SBU for tests)">
13]>
14
15<sect1 id="firewalld" xreflabel="firewalld-&firewalld-version;">
16 <?dbhtml filename="firewalld.html"?>
17
18
19 <title>firewalld-&firewalld-version;</title>
20
21 <indexterm zone="firewalld">
22 <primary sortas="a-firewalld">firewalld</primary>
23 </indexterm>
24
25 <sect2 role="package">
26 <title>Introduction to firewalld</title>
27
28 <para>
29 The <application>firewalld</application> package provides a dynamically
30 managed firewall with support for network or firewall zones to define the
31 trust level of network connections or interfaces. It has support for
32 IPv4, IPv6 firewall settings and for ethernet bridges and a separation of
33 runtime and permanent configuration options. It also provides an
34 interface for services or applications to add nftables or iptables and
35 ebtables rules directly.
36 </para>
37
38 &lfs90_checked;
39
40 <bridgehead renderas="sect3">Package Information</bridgehead>
41 <itemizedlist spacing="compact">
42 <listitem>
43 <para>
44 Download (HTTP): <ulink url="&firewalld-download-http;"/>
45 </para>
46 </listitem>
47 <listitem>
48 <para>
49 Download (FTP): <ulink url="&firewalld-download-ftp;"/>
50 </para>
51 </listitem>
52 <listitem>
53 <para>
54 Download MD5 sum: &firewalld-md5sum;
55 </para>
56 </listitem>
57 <listitem>
58 <para>
59 Download size: &firewalld-size;
60 </para>
61 </listitem>
62 <listitem>
63 <para>
64 Estimated disk space required: &firewalld-buildsize;
65 </para>
66 </listitem>
67 <listitem>
68 <para>
69 Estimated build time: &firewalld-time;
70 </para>
71 </listitem>
72 </itemizedlist>
73
74 <bridgehead renderas="sect3">firewalld Dependencies</bridgehead>
75
76 <bridgehead renderas="sect4">Required</bridgehead>
77 <para role="required">
78 <xref linkend="nftables"/>,
79 and <xref linkend="python-slip"/>
80 </para>
81
82 <bridgehead renderas="sect4">Recommended</bridgehead>
83 <para role="recommended">
84 <xref linkend="DocBook"/>,
85 <xref linkend="iptables"/>, and
86 <xref linkend="libxslt"/> (for building the manual pages)
87 </para>
88
89 <bridgehead renderas="sect4">Optional</bridgehead>
90 <para role="optional">
91 <xref linkend="gtk3" role="runtime"/> (runtime only, required for
92 <application>fireall-config</application>),
93 <xref linkend="qt5" role="runtime"/> (runtime only, required for
94 <application>fireall-applet</application>), and
95 <ulink url="https://netfilter.org/projects/ipset/index.html">ipset</ulink>
96 for ipset support (only when used with iptables)
97 </para>
98
99 <para condition="html" role="usernotes">User Notes:
100 <ulink url="&blfs-wiki;/firewalld"/>
101 </para>
102 </sect2>
103
104 <sect2 role="installation">
105 <title>Installation of firewalld</title>
106
107 <para>
108 Install <application>firewalld</application> by
109 running the following commands:
110 </para>
111
112<screen revision="systemd"><userinput>PYTHON=/usr/bin/python3 \
113 ./configure --sysconfdir=/etc \
114 --without-ipset &amp;&amp;
115make</userinput></screen>
116
117<screen revision="sysv"><userinput>PYTHON=/usr/bin/python3 \
118 ./configure --sysconfdir=/etc \
119 --without-ipset \
120 --disable-systemd &amp;&amp;
121make</userinput></screen>
122
123 <para>
124 The testsuite for <application>firewalld</application> is very dependent
125 on the running kernel and system configuration. It requires
126 <application>ipset</application> as well as both backends, and all
127 supported kernel options available.
128 </para>
129
130 <para>
131 If the above conditions are met, run the testsuite as the
132 <systemitem class="username">root</systemitem> user with the command
133 <command>make -C src check</command>. Any test failures are likely the
134 result of an incomplete configuration. Failed tests will give a detailed
135 failure status at
136 <filename>src/test/testsuite.dir/&lt;###&gt;/testsuite.log</filename>.
137 </para>
138
139 <para revision="sysv">
140 Prevent installation of the distributed firewalld init script with the
141 following command:
142 </para>
143
144<screen revision="sysv"><userinput>sed '/^am__append_3/,+1d' -i config/Makefile</userinput></screen>
145
146 <para>
147 Now, as the <systemitem class="username">root</systemitem> user:
148 </para>
149
150<screen role="root"><userinput>make install</userinput></screen>
151
152 </sect2>
153
154 <sect2 role="commands">
155 <title>Command Explanations</title>
156
157 <para>
158 <parameter>--without-ipset</parameter>: This switch disables use of the
159 <command>ipset</command> utility. Omit if it is installed.
160 </para>
161
162 <para revision="sysv">
163 <parameter>--disable-systemd</parameter>: This command prevents
164 installation of <application>systemd</application> services.
165 </para>
166
167 <para>
168 <option>--without-{ip{,6},eb}tables{,-restore}</option>: These switches
169 disable <application>iptables</application> support and are required if
170 you wish to build without iptables support.
171 </para>
172
173 </sect2>
174
175 <sect2 role="configuration">
176 <title>Configuring firewalld</title>
177
178 <sect3 id="firewalld-conf">
179 <title>Config Files</title>
180
181 <para>
182 <filename>/etc/firewall/applet.conf</filename>,
183 <filename>/etc/firewalld/firewalld.conf</filename>,
184 and <filename>/etc/sysconfig/firewalld</filename>
185 </para>
186
187 <indexterm zone="firewalld firewalld-conf">
188 <primary sortas="e-etc-firewalld.conf">/etc/firewalld/firewalld.conf</primary>
189 </indexterm>
190
191 <para>
192 Configuration of <application>firewalld</application> is generally done
193 without modification of the above configuration files using the
194 <command>firewall-cmd</command> command. Within the above configuration
195 files you can set daemon behavior only. E.g.: whether runtime rules are
196 retained on restart, which firewall backend to use (default is
197 nftables), or whether to turn on debugging.
198 </para>
199
200 <para>
201 Detailed documentation is provided by the
202 <application>firewalld</application> developers at
203 <ulink url="https://firewalld.org/documentation/"/>.
204 </para>
205
206 </sect3>
207
208 <sect3 id="firewalld-init">
209 <title><phrase revision="sysv">Init Script</phrase>
210 <phrase revision="systemd">Systemd Unit</phrase></title>
211
212 <para revision="sysv">
213 If you need to run the <command>firewalld</command> daemon at system
214 startup, install the <filename>/etc/rc.d/init.d/firewalld</filename>
215 init script included in the
216 <xref linkend="bootscripts"/> package using the following command:
217 </para>
218
219 <para revision="systemd">
220 If you need to run the <command>firewalld</command> daemon at system
221 startup, enable the previously installed
222 <filename>firewalld.service</filename> unit with the following command:
223 </para>
224
225 <indexterm zone="firewalld firewalld-init">
226 <primary sortas="f-firewalld">firewalld</primary>
227 </indexterm>
228
229<screen role="root" revision="sysv"><userinput>make install-firewalld</userinput></screen>
230
231<screen role="root" revision="systemd"><userinput>systemctl enable firewalld</userinput></screen>
232
233 </sect3>
234
235 </sect2>
236
237 <sect2 role="content">
238 <title>Contents</title>
239
240 <segmentedlist>
241 <segtitle>Installed Programs</segtitle>
242 <segtitle>Installed Libraries</segtitle>
243 <segtitle>Installed Directories</segtitle>
244
245 <seglistitem>
246 <seg>
247 firewall-applet, firewall-cmd, firewall-config, firewall-offline-cmd,
248 and firewalld
249 </seg>
250 <seg>
251 None
252 </seg>
253 <seg>
254 /etc/firewalld,
255 /etc/firewall,
256 /usr/lib/firewalld, and
257 /usr/lib/python-&python3-version;/site-packages/firewall
258 </seg>
259 </seglistitem>
260 </segmentedlist>
261
262 <variablelist>
263 <bridgehead renderas="sect3">Short Descriptions</bridgehead>
264 <?dbfo list-presentation="list"?>
265 <?dbhtml list-presentation="table"?>
266
267 <varlistentry id="firewall-applet">
268 <term><command>firewall-applet</command></term>
269 <listitem>
270 <para>
271 is a tray applet using QSettings backend.
272 </para>
273 <indexterm zone="firewalld firewall-applet">
274 <primary sortas="b-firewall-applet">firwall-applet</primary>
275 </indexterm>
276 </listitem>
277 </varlistentry>
278
279 <varlistentry id="firewall-cmd">
280 <term><command>firewall-cmd</command></term>
281 <listitem>
282 <para>
283 is the primary command line frontend.
284 </para>
285 <indexterm zone="firewalld firewall-cmd">
286 <primary sortas="b-firewall-cmd">firewall-cmd</primary>
287 </indexterm>
288 </listitem>
289 </varlistentry>
290
291 <varlistentry id="firewall-config">
292 <term><command>firewall-config</command></term>
293 <listitem>
294 <para>
295 is a GUI configuration tool using GTK+-3.
296 </para>
297 <indexterm zone="firewalld firewall-config">
298 <primary sortas="b-firewall-config">firewall-config</primary>
299 </indexterm>
300 </listitem>
301 </varlistentry>
302
303 <varlistentry id="firewall-offline-cmd">
304 <term><command>firewall-offline-cmd</command></term>
305 <listitem>
306 <para>
307 is a command line client used for permanent configuration while
308 firewalld is not running.
309 </para>
310 <indexterm zone="firewalld firewall-offline-cmd">
311 <primary sortas="b-firewall-offline-cmd">firewall-offline-cmd</primary>
312 </indexterm>
313 </listitem>
314 </varlistentry>
315
316 <varlistentry id="firewalld-daemon">
317 <term><command>firewalld</command></term>
318 <listitem>
319 <para>
320 is the Dynamic Firewall Manager daemon.
321 </para>
322 <indexterm zone="firewalld firewalld-daemon">
323 <primary sortas="b-firewalld">firewalld</primary>
324 </indexterm>
325 </listitem>
326 </varlistentry>
327
328 </variablelist>
329
330 </sect2>
331
332</sect1>
Note: See TracBrowser for help on using the repository browser.