source: postlfs/security/firewalld.xml@ b24abc9

10.0 10.1 11.0 11.1 11.2 11.3 12.0 12.1 9.1 kea ken/TL2024 ken/inkscape-core-mods ken/tuningfonts lazarus lxqt plabs/newcss plabs/python-mods python3.11 qt5new rahul/power-profiles-daemon renodr/vulkan-addition trunk upgradedb xry111/intltool xry111/llvm18 xry111/soup3 xry111/test-20220226 xry111/xf86-video-removal
Last change on this file since b24abc9 was 9413f73, checked in by DJ Lucas <dj@…>, 5 years ago

Update to blfs-systemd-units-20191026.
Fix download url for firewalld.

git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@22308 af4574ff-66df-0310-9fd7-8a98e5e911e0

  • Property mode set to 100644
File size: 10.5 KB
Line 
1<?xml version="1.0" encoding="ISO-8859-1"?>
2<!DOCTYPE sect1 PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
3 "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
4 <!ENTITY % general-entities SYSTEM "../../general.ent">
5 %general-entities;
6
7 <!ENTITY firewalld-download-http "https://github.com/firewalld/firewalld/releases/download/v&firewalld-version;/firewalld-&firewalld-version;.tar.gz">
8 <!ENTITY firewalld-download-ftp " ">
9 <!ENTITY firewalld-md5sum "2549c2006def07a19b4c77ec960e5aab">
10 <!ENTITY firewalld-size "1.6 MB">
11 <!ENTITY firewalld-buildsize "26 MB">
12 <!ENTITY firewalld-time "0.2 SBU">
13]>
14
15<sect1 id="firewalld" xreflabel="firewalld-&firewalld-version;">
16 <?dbhtml filename="firewalld.html"?>
17
18 <sect1info>
19 <othername>$LastChangedBy$</othername>
20 <date>$Date$</date>
21 </sect1info>
22
23 <title>firewalld-&firewalld-version;</title>
24
25 <indexterm zone="firewalld">
26 <primary sortas="a-firewalld">firewalld</primary>
27 </indexterm>
28
29 <sect2 role="package">
30 <title>Introduction to firewalld</title>
31
32 <para>
33 The <application>firewalld</application> package provides a dynamically
34 managed firewall with support for network or firewall zones to define the
35 trust level of network connections or interfaces. It has support for
36 IPv4, IPv6 firewall settings and for ethernet bridges and a separation of
37 runtime and permanent configuration options. It also provides an
38 interface for services or applications to add nftables or iptables and
39 ebtables rules directly.
40 </para>
41
42 &lfs90_checked;
43
44 <bridgehead renderas="sect3">Package Information</bridgehead>
45 <itemizedlist spacing="compact">
46 <listitem>
47 <para>
48 Download (HTTP): <ulink url="&firewalld-download-http;"/>
49 </para>
50 </listitem>
51 <listitem>
52 <para>
53 Download (FTP): <ulink url="&firewalld-download-ftp;"/>
54 </para>
55 </listitem>
56 <listitem>
57 <para>
58 Download MD5 sum: &firewalld-md5sum;
59 </para>
60 </listitem>
61 <listitem>
62 <para>
63 Download size: &firewalld-size;
64 </para>
65 </listitem>
66 <listitem>
67 <para>
68 Estimated disk space required: &firewalld-buildsize;
69 </para>
70 </listitem>
71 <listitem>
72 <para>
73 Estimated build time: &firewalld-time;
74 </para>
75 </listitem>
76 </itemizedlist>
77
78 <bridgehead renderas="sect3">Additional Downloads</bridgehead>
79 <itemizedlist spacing="compact">
80 <listitem>
81 <para>
82 Required patch:
83 <ulink url="&patch-root;/firewalld-&firewalld-version;-builtin-1.patch"/>
84 </para>
85 </listitem>
86 </itemizedlist>
87
88 <bridgehead renderas="sect3">firewalld Dependencies</bridgehead>
89
90 <bridgehead renderas="sect4">Required</bridgehead>
91 <para role="required">
92 <xref linkend="nftables"/> or <xref linkend="iptables" role="nodump"/>,
93 and <xref linkend="python-slip"/>
94 </para>
95
96 <bridgehead renderas="sect4">Recommended</bridgehead>
97 <para role="recommended">
98 <xref linkend="DocBook"/> and <xref linkend="libxslt"/> (for building
99 the manual pages), and
100 <ulink url="https://netfilter.org/projects/ipset/index.html">ipset</ulink>
101 for ipset support (only when used with iptables)
102 </para>
103
104 <bridgehead renderas="sect4">Optional</bridgehead>
105 <para role="optional">
106 <xref linkend="qt5" role="runtime"/> (runtime only, required for
107 <application>fireall-applet</application>) and
108 <xref linkend="gtk3" role="runtime"/> (runtime only, required for
109 <application>fireall-config</application>)
110 </para>
111
112 <para condition="html" role="usernotes">User Notes:
113 <ulink url="&blfs-wiki;/firewalld"/>
114 </para>
115 </sect2>
116
117 <sect2 role="installation">
118 <title>Installation of firewalld</title>
119
120 <para>
121 Fix an issue with use of built-in kernel modules:
122 </para>
123
124<screen><userinput>patch -Np1 -i ../firewalld-&firewalld-version;-builtin-1.patch</userinput></screen>
125
126 <para>
127 Install <application>firewalld</application> by
128 running the following commands:
129 </para>
130
131<screen revision="systemd"><userinput>PYTHON=/usr/bin/python3 \
132 ./configure --sysconfdir=/etc \
133 --without-ipset &amp;&amp;
134make</userinput></screen>
135
136<screen revision="sysv"><userinput>PYTHON=/usr/bin/python3 \
137 ./configure --sysconfdir=/etc \
138 --without-ipset \
139 --disable-systemd &amp;&amp;
140make</userinput></screen>
141
142 <para>
143 To run the testsuite, isssue the command <command>make test</command>.
144 </para>
145
146
147 <para revision="sysv">
148 Prevent installation of the distributed firewalld init script with the
149 following command:
150 </para>
151
152<screen revision="sysv"><userinput>sed '/^am__append_3/,+1d' -i config/Makefile</userinput></screen>
153
154 <para>
155 Now, as the <systemitem class="username">root</systemitem> user:
156 </para>
157
158<screen role="root"><userinput>make install</userinput></screen>
159
160 </sect2>
161
162 <sect2 role="commands">
163 <title>Command Explanations</title>
164
165 <para>
166 <parameter>--without-ipset</parameter>: This switch disables use of the
167 <command>ipset</command> utility. Omit if it is installed.
168 </para>
169
170 <para revision="sysv">
171 <parameter>--without-systemd</parameter>: This command prevents
172 installation of <application>systemd</application> services.
173 </para>
174
175 </sect2>
176
177 <sect2 role="configuration">
178 <title>Configuring firewalld</title>
179
180 <sect3 id="firewalld-conf">
181 <title>Config Files</title>
182
183 <para>
184 <filename>/etc/firewall/applet.conf</filename>,
185 <filename>/etc/firewalld/firewalld.conf</filename>,
186 and <filename>/etc/sysconfig/firewalld</filename>
187 </para>
188
189 <indexterm zone="firewalld firewalld-conf">
190 <primary sortas="e-etc-firewalld.conf">/etc/firewalld/firewalld.conf</primary>
191 </indexterm>
192
193 <para>
194 Configuration of <application>firewalld</application> is generally done
195 without modification of the above configuration files using the
196 <command>firewall-cmd</command> command. Within the above configuration
197 files you can set daemon behavior only. E.g.: whether runtime rules are
198 retained on restart, which firewall backend to use (default is
199 nftables), or whether to turn on debugging.
200 </para>
201
202 <para>
203 Detailed documentation is provided by the
204 <application>firewalld</application> developers at
205 <ulink url="https://firewalld.org/documentation/"/>.
206 </para>
207
208 </sect3>
209
210 <sect3 id="firewalld-init">
211 <title><phrase revision="sysv">Init Script</phrase>
212 <phrase revision="systemd">Systemd Unit</phrase></title>
213
214 <para revision="sysv">
215 If you need to run the <command>firewalld</command> daemon at system
216 startup, install the <filename>/etc/rc.d/init.d/firewalld</filename>
217 init script included in the
218 <xref linkend="bootscripts"/> package using the following command:
219 </para>
220
221 <para revision="systemd">
222 If you need to run the <command>firewalld</command> daemon at system
223 startup, enable the previously installed
224 <filename>firewalld.service</filename> unit with the following command:
225 </para>
226
227 <indexterm zone="firewalld firewalld-init">
228 <primary sortas="f-firewalld">firewalld</primary>
229 </indexterm>
230
231<screen role="root" revision="sysv"><userinput>make install-firewalld</userinput></screen>
232
233<screen role="root" revision="systemd"><userinput>systemctl enable firewalld</userinput></screen>
234
235 </sect3>
236
237 </sect2>
238
239 <sect2 role="content">
240 <title>Contents</title>
241
242 <segmentedlist>
243 <segtitle>Installed Programs</segtitle>
244 <segtitle>Installed Libraries</segtitle>
245 <segtitle>Installed Directories</segtitle>
246
247 <seglistitem>
248 <seg>
249 firewall-applet, firewall-cmd, firewall-config, firewall-offline-cmd,
250 and firewalld
251 </seg>
252 <seg>
253 None
254 </seg>
255 <seg>
256 /etc/firewalld,
257 /etc/firewall,
258 /usr/lib/firewalld, and
259 /usr/lib/python-&python3-version;/site-packages/firewall
260 </seg>
261 </seglistitem>
262 </segmentedlist>
263
264 <variablelist>
265 <bridgehead renderas="sect3">Short Descriptions</bridgehead>
266 <?dbfo list-presentation="list"?>
267 <?dbhtml list-presentation="table"?>
268
269 <varlistentry id="firewall-applet">
270 <term><command>firewall-applet</command></term>
271 <listitem>
272 <para>
273 is a tray applet using QSettings backend.
274 </para>
275 <indexterm zone="firewalld firewall-applet">
276 <primary sortas="b-firewall-applet">firwall-applet</primary>
277 </indexterm>
278 </listitem>
279 </varlistentry>
280
281 <varlistentry id="firewall-cmd">
282 <term><command>firewall-cmd</command></term>
283 <listitem>
284 <para>
285 is the primary command line frontend.
286 </para>
287 <indexterm zone="firewalld firewall-cmd">
288 <primary sortas="b-firewall-cmd">firewall-cmd</primary>
289 </indexterm>
290 </listitem>
291 </varlistentry>
292
293 <varlistentry id="firewall-config">
294 <term><command>firewall-config</command></term>
295 <listitem>
296 <para>
297 is a GUI configuration tool using GTK+-3.
298 </para>
299 <indexterm zone="firewalld firewall-config">
300 <primary sortas="b-firewall-config">firewall-config</primary>
301 </indexterm>
302 </listitem>
303 </varlistentry>
304
305 <varlistentry id="firewall-offline-cmd">
306 <term><command>firewall-offline-cmd</command></term>
307 <listitem>
308 <para>
309 is a command line client used for permanent configuration while
310 firewalld is not running.
311 </para>
312 <indexterm zone="firewalld firewall-offline-cmd">
313 <primary sortas="b-firewall-offline-cmd">firewall-offline-cmd</primary>
314 </indexterm>
315 </listitem>
316 </varlistentry>
317
318 <varlistentry id="firewalld-daemon">
319 <term><command>firewalld</command></term>
320 <listitem>
321 <para>
322 is the Dynamic Firewall Manager daemon.
323 </para>
324 <indexterm zone="firewalld firewalld-daemon">
325 <primary sortas="b-firewalld">firewalld</primary>
326 </indexterm>
327 </listitem>
328 </varlistentry>
329
330 </variablelist>
331
332 </sect2>
333
334</sect1>
Note: See TracBrowser for help on using the repository browser.