6 # ferm, a firewall setup program that makes firewall rules easy!
8 # Copyright (C) 2001-2012 Max Kellermann, Auke Kok
10 # Bug reports and patches for this program may be sent to the GitHub
11 # repository: L<https://github.com/MaxKellermann/ferm>
15 # This program is free software; you can redistribute it and/or modify
16 # it under the terms of the GNU General Public License as published by
17 # the Free Software Foundation; either version 2 of the License, or
18 # (at your option) any later version.
20 # This program is distributed in the hope that it will be useful,
21 # but WITHOUT ANY WARRANTY; without even the implied warranty of
22 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
23 # GNU General Public License for more details.
25 # You should have received a copy of the GNU General Public License
26 # along with this program; if not, write to the Free Software
27 # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
33 B<ferm> - a firewall rule parser for linux
37 B<ferm> I<options> I<inputfile>
41 B<ferm> is a frontend for B<iptables>. It reads the rules from a
42 structured configuration file and calls iptables(8) to insert them
43 into the running kernel.
45 B<ferm>'s goal is to make firewall rules easy to write and easy to
46 read. It tries to reduce the tedious task of writing down rules, thus
47 enabling the firewall administrator to spend more time on developing
48 good rules than the proper implementation of the rule.
50 To achieve this, B<ferm> uses a simple but powerful configuration
51 language, which allows variables, functions, arrays, blocks. It also
52 allows you to include other files, allowing you to create libraries of
53 commonly used structures and functions.
55 B<ferm>, pronounced "firm", stands for "For Easy Rule Making".
60 This manual page does I<not> indend to teach you how firewalling works
61 and how to write good rules. There is already enough documentation on
67 Let's start with a simple example:
73 This will add a rule to the predefined input chain, matching and
74 accepting all tcp packets. Ok, let's make it more complicated:
76 chain (INPUT OUTPUT) {
77 proto (udp tcp) ACCEPT;
80 This will insert 4 rules, namely 2 in chain input, and 2 in chain
81 output, matching and accepting both udp and tcp packets. Normally you
84 iptables -A INPUT -p tcp -j ACCEPT
85 iptables -A OUTPUT -p tcp -j ACCEPT
86 iptables -A INPUT -p udp -j ACCEPT
87 iptables -A OUTPUT -p udp -j ACCEPT
89 Note how much less typing we need to do? :-)
91 Basically, this is all there is to it, although you can make it quite
92 more complex. Something to look at:
96 daddr 10.0.0.0/8 proto tcp dport ! ftp jump mychain sport :1023 TOS 4 settos 8 mark 2;
97 daddr 10.0.0.0/8 proto tcp dport ftp REJECT;
100 My point here is, that *you* need to make nice rules, keep
101 them readable to you and others, and not make it into a mess.
103 It would aid the reader if the resulting firewall rules were placed
104 here for reference. Also, you could include the nested version with
107 Try using comments to show what you are doing:
109 # this line enables transparent http-proxying for the internal network:
110 proto tcp if eth0 daddr ! 192.168.0.0/255.255.255.0
111 dport http REDIRECT to-ports 3128;
113 You will be thankful for it later!
117 interface (eth0 ppp0) {
118 # deny access to notorius hackers, return here if no match
119 # was found to resume normal firewalling
122 protocol tcp jump fw_tcp;
123 protocol udp jump fw_udp;
127 The more you nest, the better it looks. Make sure the order you
128 specify is correct, you would not want to do this:
132 proto tcp dport ftp ACCEPT;
135 because the second rule will never match. Best way is to specify
136 first everyting that is allowed, and then deny everything else.
137 Look at the examples for more good snapshots. Most people do
144 dport 1024:65535 ! syn ACCEPT;
148 =head1 STRUCTURE OF A FIREWALL FILE
150 The structure of a proper firewall file looks like simplified
151 C-code. Only a few syntactic characters are used in ferm-
152 configuration files. Besides these special caracters, ferm
153 uses 'keys' and 'values', think of them as options and
154 parameters, or as variables and values, whatever.
156 With these words, you define the characteristics of your firewall.
157 Every firewall consists of two things: First, look if network
158 traffic matches certain conditions, and second, what to do
161 You may specify conditions that are valid for the kernel
162 interface program you are using, probably iptables(8). For
163 instance, in iptables, when you are trying to match tcp
164 packets, you would say:
166 iptables --protocol tcp
168 In ferm, this will become:
172 Just typing this in ferm doesn't do anything, you need to tell
173 ferm (actually, you need to tell iptables(8) and the kernel) what
174 to do with any traffic that matches this condition:
176 iptables --protocol tcp -j ACCEPT
178 Or, translated to B<ferm>:
182 The B<;> character is at the end of every ferm rule. Ferm ignores line
183 breaks, meaning the above example is identical to the following:
188 Here's a list of the special characters:
194 This character finalizes a rule.
196 Separated by semicolons, you may write multiple rules in one line,
197 although this decreases readability:
199 protocol tcp ACCEPT; protocol udp DROP;
203 The nesting symbol defines a 'block' of rules.
205 The curly brackets contain any number of nested rules. All matches
206 before the block are carried forward to these.
208 The closing curly bracket finalizes the rule set. You should not write
209 a ';' after that, because that would be an empty rule.
213 chain INPUT proto icmp {
214 icmp-type echo-request ACCEPT;
218 This block shows two rules inside a block, which will both be merged
219 with anything in front of it, so you will get two rules:
221 iptables -A INPUT -p icmp --icmp-type echo-request -j ACCEPT
222 iptables -A INPUT -p icmp -j DROP
224 There can be multiple nesting levels:
228 icmp-type echo-request ACCEPT;
231 daddr 172.16.0.0/12 REJECT;
234 Note that the 'REJECT' rule is not affected by 'proto icmp', although
235 there is no ';' after the closing curly brace. Translated to iptables:
237 iptables -A INPUT -p icmp --icmp-type echo-request -j ACCEPT
238 iptables -A INPUT -p icmp -j DROP
239 iptables -A INPUT -d 172.16.0.0/12 -j REJECT
243 Variable expansion. Replaces '$FOO' by the value of the variable. See
244 the section I<VARIABLES> for details.
248 Function call. See the section I<FUNCTIONS> for details.
252 The array symbol. Using the parentheses, you can define
253 a 'list' of values that should be applied for the key to the
258 protocol ( tcp udp icmp )
260 this will result in three rules:
266 Only values can be 'listed', so you cannot do something like this:
268 proto tcp ( ACCEPT LOG );
272 chain (INPUT OUTPUT FORWARD) proto (icmp udp tcp) DROP;
274 (which will result in nine rules!)
276 Values are separated by spaces. The array symbol is both left- and
277 right-associative, in contrast with the nesting block, which is
278 left-associative only.
282 The comment symbol. Anything that follows this symbol up to
283 the end of line is ignored.
287 Execute the command in a shell, and insert the process output. See the
288 section I<backticks> for details.
292 Quote a string which may contain whitespaces, the dollar sign etc.
294 LOG log-prefix ' hey, this is my log prefix!';
298 Quote a string (see above), but variable references with a dollar sign
301 DNAT to "$myhost:$myport";
308 In the previous section, we already introduced some basic keywords
309 like "chain", "protocol" and "ACCEPT". Let's explore their nature.
311 There are three kinds of keywords:
317 B<location> keywords define where a rule will be created. Example:
322 B<match> keywords perform a test on all passing packets. The current
323 rule is without effect if one (or more) of the matches does not
324 pass. Example: "proto", "daddr".
326 Most matches are followed by a parameter: "proto tcp", "daddr
331 B<target> keywords state what to do with a packet. Example: "ACCEPT",
334 Some targets define more keywords to specify details: "REJECT
335 reject-with icmp-net-unreachable".
339 Every rule consists of a B<location> and a B<target>, plus any number
342 table filter # location
343 proto tcp dport (http https) # match
346 Strictly speaking, there is a fourth kind: B<ferm> keywords (which
347 control ferm's internal behaviour), but they will be explained later.
352 Many keywords take parameters. These can be specified as literals,
353 variable references or lists (arrays):
356 saddr $TRUSTED_HOSTS;
357 proto tcp dport (http https ssh);
358 LOG log-prefix "funky wardriver alert: ";
360 Some of them can be negated (lists cannot be negated):
363 proto udp dport !domain;
365 Keywords which take no parameters are negated by a prefixed '!':
369 Read iptables(8) to see where the B<!> can be used.
372 =head1 BASIC KEYWORDS
375 =head2 Location keywords
379 =item B<domain [ip|ip6]>
381 Set the domain. "ip" is default and means "IPv4" (iptables). "ip6" is
382 for IPv6 support, using "ip6tables".
384 =item B<table [filter|nat|mangle]>
386 Specifies which netfilter table this rule will be inserted to:
387 "filter" (default), "nat" or "mangle".
389 =item B<chain [chain-name]>
391 Specifies the netfilter chain (within the current table) this rule
392 will be inserted to. Common predefined chain names are "INPUT",
393 "OUTPUT", "FORWARD", "PREROUTING", "POSTROUTING", depending on the
394 table. See the netfilter documentation for details.
396 If you specify a non-existing chain here, ferm will add the rule to a
397 custom chain with that name.
399 =item B<policy [ACCEPT|DROP|..]>
401 Specifies the default policy for the current chain (built-in
402 only). Can be one of the built-in targets (ACCEPT, DROP, REJECT,
403 ...). A packet that matches no rules in a chain will be treated as
404 specified by the policy.
406 To avoid ambiguity, always specify the policies of all predefined
409 =item B<@subchain ["CHAIN-NAME"] { ... }>
411 Works like the normal block operators (i.e. without the I<@subchain>
412 keyword), except that B<ferm> moves rules within the curly braces into
413 a new custom chain. The name for this chain is chosen automatically by
416 In many cases, this is faster than just a block, because the kernel
417 may skip a huge block of rules when a precondition is false. Imagine
418 the following example:
420 table filter chain INPUT {
421 saddr (1.2.3.4 2.3.4.5 3.4.5.6 4.5.6.7 5.6.7.8) {
422 proto tcp dport (http https ssh) ACCEPT;
423 proto udp dport domain ACCEPT;
427 This generates 20 rules. When a packet arrives which does not pass the
428 B<saddr> match, it nonetheless checks all 20 rules. With B<@subchain>,
429 this check is done once, resulting in faster network filtering and
432 table filter chain INPUT {
433 saddr (1.2.3.4 2.3.4.5 3.4.5.6 4.5.6.7 5.6.7.8) @subchain {
434 proto tcp dport (http https ssh) ACCEPT;
435 proto udp dport domain ACCEPT;
439 Optionally, you may define the name of the sub chain:
441 saddr (1.2.3.4 2.3.4.5 3.4.5.6) @subchain "foobar" {
442 proto tcp dport (http https ssh) ACCEPT;
443 proto udp dport domain ACCEPT;
446 The name can either be a quoted string literal, or an expanded ferm
447 expression such as @cat("interface_", $iface) or @substr($var,0,20).
449 You can achieve the same by explicitly declaring a custom chain, but
450 you may feel that using B<@subchain> requires less typing.
452 =item B<@gotosubchain ["CHAIN-NAME"] { ... }>
454 Works like B<@subchain> except that instead of using B<jump> target it
455 uses B<goto> target. See discussion below for the difference between
461 =head2 Basic iptables match keywords
465 =item B<interface [interface-name]>
467 Define the interface name, your outside network card, like eth0,
468 or dialup like ppp1, or whatever device you want to match for
469 passing packets. It is equivalent to the C<-i> switch in
472 =item B<outerface [interface-name]>
474 Same as interface, only for matching the outgoing interface
475 for a packet, as in iptables(8).
477 =item B<protocol [protocol-name|protocol-number]>
479 Currently supported by the kernel are tcp, udp and icmp, or
480 their respective numbers.
482 =item B<saddr|daddr [address-spec]>
484 Matches on packets originating from the specified address (saddr) or
485 targeted at the address (daddr).
489 saddr 192.168/8 ACCEPT; # (identical to the next one:)
490 saddr 192.168.0.0/255.255.255.0 ACCEPT;
491 daddr my.domain.com ACCEPT;
495 Specify that only fragmented IP packets should be matched.
496 When packets are larger that the maximum packet size your
497 system can handle (called Maximum Transmission Unit or MTU)
498 they will be chopped into bits and sent one by one as single
499 packets. See ifconfig(8) if you want to find the MTU for
500 your system (the default is usually 1500 bytes).
502 Fragments are frequently used in DOS attacks, because there
503 is no way of finding out the origin of a fragment packet.
505 =item B<sport|dport [port-spec]>
507 Matches on packets on the specified TCP or UDP port. "sport" matches
508 the source port, and dport matches the destination port.
510 This match can be used only after you specified "protocol tcp" or
511 "protocol udp", because only these two protocols actually have ports.
513 And some examples of valid ports/ranges:
517 dport ssh:http ACCEPT;
518 dport 0:1023 ACCEPT; # equivalent to :1023
519 dport 1023:65535 ACCEPT;
523 Specify that the SYN flag in a tcp package should be matched,
524 which are used to build new tcp connections. You can identify
525 incoming connections with this, and decide whether you want
526 to allow it or not. Packets that do not have this flag are
527 probably from an already established connection, so it's
528 considered reasonably safe to let these through.
530 =item B<module [module-name]>
532 Load an iptables module. Most modules provide more match
533 keywords. We'll get to that later.
538 =head2 Basic target keywords
542 =item B<jump [custom-chain-name]>
544 Jumps to a custom chain. If no rule in the custom chain matched,
545 netfilter returns to the next rule in the previous chain.
547 =item B<goto [custom-chain-name]>
549 Go to a custom chain. Unlike the B<jump> option, B<RETURN> will not
550 continue processing in this chain but instead in the chain that called
555 Accepts matching packets.
559 Drop matching packets without further notice.
563 Rejects matching packets, i.e. send an ICMP packet to the sender,
564 which is port-unreachable by default. You may specify another ICMP
567 REJECT; # default to icmp-port-unreachable
568 REJECT reject-with icmp-net-unreachable;
570 Type "iptables -j REJECT -h" for details.
574 Finish the current chain and return to the calling chain (if "jump
575 [custom-chain-name]" was used).
584 =head1 ADDITIONAL KEYWORDS
586 Netfilter is modular. Modules may provide additional targets and match
587 keywords. The list of netfilter modules is constantly growing, and
588 ferm tries to keep up with supporting them all. This chapter describes
589 modules which are currently supported.
592 =head2 iptables match modules
598 Account traffic for all hosts in defined network/netmask. This is one
599 of the match modules which behave like a target, i.e. you will mostly
600 have to use the B<NOP> target.
602 mod account aname mynetwork aaddr 192.168.1.0/24 ashort NOP;
606 Check the address type; either source address or destination address.
608 mod addrtype src-type BROADCAST;
609 mod addrtype dst-type LOCAL;
611 Type "iptables -m addrtype -h" for details.
615 Checks the SPI header in an AH packet.
618 mod ah ahspi ! 0x200:0x2ff;
620 Additional arguments for IPv6:
622 mod ah ahlen 32 ACCEPT;
623 mod ah ahlen !32 ACCEPT;
628 Match using Linux Socket Filter.
630 mod bpf bytecode "4,48 0 0 9,21 0 1 6,6 0 0 1,6 0 0 0";
634 Adds a comment of up to 256 characters to a rule, without an effect.
635 Note that unlike ferm comments ('#'), this one will show up in
638 mod comment comment "This is my comment." ACCEPT;
642 Matches if a value in /proc/net/ipt_condition/NAME is 1 (path is
643 /proc/net/ip6t_condition/NAME for the ip6 domain).
645 mod condition condition (abc def) ACCEPT;
646 mod condition condition !foo ACCEPT;
650 Match by how many bytes or packets a connection (or one of the two
651 flows constituting the connection) have tranferred so far, or by
652 average bytes per packet.
654 mod connbytes connbytes 65536: connbytes-dir both connbytes-mode bytes ACCEPT;
655 mod connbytes connbytes !1024:2048 connbytes-dir reply connbytes-mode packets ACCEPT;
657 Valid values for I<connbytes-dir>: I<original>, I<reply>, I<both>; for
658 I<connbytes-mode>: I<packets>, I<bytes>, I<avgpkt>.
662 Module matches or adds connlabels to a connection.
664 mod connlabel label "name";
665 mod connlabel label "name" set;
669 Allows you to restrict the number of parallel TCP connections to a
670 server per client IP address (or address block).
672 mod connlimit connlimit-above 4 REJECT;
673 mod connlimit connlimit-above !4 ACCEPT;
674 mod connlimit connlimit-above 4 connlimit-mask 24 REJECT;
675 mod connlimit connlimit-upto 4 connlimit-saddr REJECT;
676 mod connlimit connlimit-above 4 connlimit-daddr REJECT;
680 Check the mark field associated with the connection, set by the
683 mod connmark mark 64;
684 mod connmark mark 6/7;
688 Check connection tracking information.
690 mod conntrack ctstate (ESTABLISHED RELATED);
691 mod conntrack ctproto tcp;
692 mod conntrack ctorigsrc 192.168.0.2;
693 mod conntrack ctorigdst 1.2.3.0/24;
694 mod conntrack ctorigsrcport 67;
695 mod conntrack ctorigdstport 22;
696 mod conntrack ctreplsrc 2.3.4.5;
697 mod conntrack ctrepldst ! 3.4.5.6;
698 mod conntrack ctstatus ASSURED;
699 mod conntrack ctexpire 60;
700 mod conntrack ctexpire 180:240;
702 Type "iptables -m conntrack -h" for details.
706 Match cpu handling this packet.
712 Check DCCP (Datagram Congestion Control Protocol) specific attributes.
713 This module is automatically loaded when you use "protocol dccp".
715 proto dccp sport 1234 dport 2345 ACCEPT;
716 proto dccp dccp-types (SYNCACK ACK) ACCEPT;
717 proto dccp dccp-types !REQUEST DROP;
718 proto dccp dccp-option 2 ACCEPT;
722 Match the 6 bit DSCP field within the TOS field.
725 mod dscp dscp-class AF41;
729 Match the parameters in Destination Options header (IPv6).
732 mod dst dst-opts (type1 type2 ...);
736 Match the ECN bits of an IPv4 TCP header.
740 mod ecn ecn-ip-ect 2;
742 Type "iptables -m ecn -h" for details.
746 Checks the SPI header in an ESP packet.
748 mod esp espspi 0x101;
749 mod esp espspi ! 0x200:0x2ff;
753 "This module matches the EUI-64 part of a stateless autoconfigured
754 IPv6 address. It compares the EUI-64 derived from the source MAC
755 address in Ehternet frame with the lower 64 bits of the IPv6 source
756 address. But "Universal/Local" bit is not compared. This module
757 doesn't match other link layer frame, and is only valid in the
758 PREROUTING, INPUT and FORWARD chains."
764 "This module matches a rate limit based on a fuzzy logic controller [FLC]."
766 mod fuzzy lower-limit 10 upper-limit 20 ACCEPT;
770 Matches packets based on their geological location. (Needs an installed
773 mod geoip src-cc "CN,VN,KR,BH,BR,AR,TR,IN,HK" REJECT;
774 mod geoip dst-cc "DE,FR,CH,AT" ACCEPT;
778 Matches the Hop-by-Hop Options header (ip6).
780 mod hbh hbh-len 8 ACCEPT;
781 mod hbh hbh-len !8 ACCEPT;
782 mod hbh hbh-opts (1:4 2:8) ACCEPT;
786 Matches the Hop Limit field (ip6).
788 mod hl hl-eq (8 10) ACCEPT;
789 mod hl hl-eq !5 ACCEPT;
790 mod hl hl-gt 15 ACCEPT;
791 mod hl hl-lt 2 ACCEPT;
795 Checks which conntrack helper module tracks this connection. The port
796 may be specified with "-portnr".
798 mod helper helper irc ACCEPT;
799 mod helper helper ftp-21 ACCEPT;
803 Check ICMP specific attributes. This module is automatically loaded
804 when you use "protocol icmp".
806 proto icmp icmp-type echo-request ACCEPT;
808 This option can also be used in be I<ip6> domain, although this is
809 called B<icmpv6> in F<ip6tables>.
811 Use "iptables -p icmp C<-h>" to obtain a list of valid ICMP types.
815 Match a range of IPv4 addresses.
817 mod iprange src-range 192.168.2.0-192.168.3.255;
818 mod iprange dst-range ! 192.168.6.0-192.168.6.255;
822 Match on IPv4 header options like source routing, record route,
823 timestamp and router-alert.
825 mod ipv4options ssrr ACCEPT;
826 mod ipv4options lsrr ACCEPT;
827 mod ipv4options no-srr ACCEPT;
828 mod ipv4options !rr ACCEPT;
829 mod ipv4options !ts ACCEPT;
830 mod ipv4options !ra ACCEPT;
831 mod ipv4options !any-opt ACCEPT;
835 Matches the IPv6 extension header (ip6).
837 mod ipv6header header !(hop frag) ACCEPT;
838 mod ipv6header header (auth dst) ACCEPT;
842 Similar to 'mod limit', but adds the ability to add per-destination or
843 per-port limits managed in a hash table.
845 mod hashlimit hashlimit 10/minute hashlimit-burst 30/minute
846 hashlimit-mode dstip hashlimit-name foobar ACCEPT;
848 Possible values for hashlimit-mode: dstip dstport srcip srcport (or a
849 list with more than one of these).
851 There are more possible settings, type "iptables -m hashlimit -h" for
856 Match IPVS connection properties.
858 mod ipvs ipvs ACCEPT; # packet belongs to an IPVS connection
859 mod ipvs vproto tcp ACCEPT; # VIP protocol to match; by number or name, e.g. "tcp
860 mod ipvs vaddr 1.2.3.4/24 ACCEPT; # VIP address to match
861 mod ipvs vport http ACCEPT; # VIP port to match
862 mod ipvs vdir ORIGINAL ACCEPT; # flow direction of packet
863 mod ipvs vmethod GATE ACCEPT; # IPVS forwarding method used
864 mod ipvs vportctl 80; # VIP port of the controlling connection to match
868 Check the package length.
870 mod length length 128; # exactly 128 bytes
871 mod length length 512:768; # range
872 mod length length ! 256; # negated
876 Limits the packet rate.
878 mod limit limit 1/second;
879 mod limit limit 15/minute limit-burst 10;
881 Type "iptables -m limit -h" for details.
885 Match the source MAC address.
887 mod mac mac-source 01:23:45:67:89;
891 Matches packets based on their netfilter mark field. This may be a 32
892 bit integer between 0 and 4294967295.
898 Matches the mobility header (domain I<ip6>).
900 proto mh mh-type binding-update ACCEPT;
904 Match a set of source or destination ports (UDP and TCP only).
906 mod multiport source-ports (https ftp);
907 mod multiport destination-ports (mysql domain);
909 This rule has a big advantage over "dport" and "sport": it generates
910 only one rule for up to 15 ports instead of one rule for every port.
914 Match every 'n'th packet.
917 mod nth counter 5 every 2;
918 mod nth start 2 every 3;
919 mod nth start 5 packet 2 every 6;
921 Type "iptables -m nth -h" for details.
925 Match packets depending on the operating system of the sender.
928 mod osf ! genre FreeBSD ttl 1 log 1;
930 Type "iptables -m osf -h" for details.
934 Check information about the packet creator, namely user id, group id,
935 process id, session id and command name.
937 mod owner uid-owner 0;
938 mod owner gid-owner 1000;
939 mod owner pid-owner 5432;
940 mod owner sid-owner 6543;
941 mod owner cmd-owner "sendmail";
943 ("cmd-owner", "pid-owner" and "sid-owner" require special kernel
944 patches not included in the vanilla Linux kernel)
948 Matches the physical device on which a packet entered or is about to
949 leave the machine. This is useful for bridged interfaces.
951 mod physdev physdev-in ppp1;
952 mod physdev physdev-out eth2;
953 mod physdev physdev-is-in;
954 mod physdev physdev-is-out;
955 mod physdev physdev-is-bridged;
959 Check the link-layer packet type.
961 mod pkttype pkt-type unicast;
962 mod pkttype pkt-type broadcase;
963 mod pkttype pkt-type multicast;
967 Matches IPsec policy being applied to this packet.
969 mod policy dir out pol ipsec ACCEPT;
970 mod policy strict reqid 23 spi 0x10 proto ah ACCEPT;
971 mod policy mode tunnel tunnel-src 192.168.1.2 ACCEPT;
972 mod policy mode tunnel tunnel-dst 192.168.2.1 ACCEPT;
973 mod policy strict next reqid 24 spi 0x11 ACCEPT;
975 Note that the keyword I<proto> is also used as a shorthand version of
976 I<protocol> (built-in match module). You can fix this conflict by
977 always using the long keyword I<protocol>.
981 Detect TCP/UDP port scans.
983 mod psd psd-weight-threshold 21 psd-delay-threshold 300
984 psd-lo-ports-weight 3 psd-hi-ports-weight 1 DROP;
988 Implements network quotas by decrementing a byte counter with each packet.
990 mod quota quota 65536 ACCEPT;
994 Match a random percentage of all packets.
996 mod random average 70;
1000 Match the routing realm. Useful in environments using BGP.
1006 Temporarily mark source IP addresses.
1009 mod recent rcheck seconds 60;
1010 mod recent set rsource name "badguy";
1011 mod recent set rdest;
1012 mod recent rcheck rsource name "badguy" seconds 60;
1013 mod recent update seconds 120 hitcount 3 rttl;
1015 This netfilter module has a design flaw: although it is implemented as
1016 a match module, it has target-like behaviour when using the "set"
1019 L<http://snowman.net/projects/ipt_recent/>
1023 Checks a reply to the packet would be sent via the same interface it arrived on.
1024 Packets from the loopback interface are always permitted.
1026 mod rpfilter proto tcp loose RETURN;
1027 mod rpfilter validmark accept-local RETURN;
1028 mod rpfilter invert DROP;
1030 This netfilter module is the preferred way to perform reverse path filtering for
1031 IPv6, and a powerful alternative to checks controlled by sysctl
1032 I<net.ipv4.conf.*.rp_filter>.
1036 Match the IPv6 routing header (ip6 only).
1038 mod rt rt-type 2 rt-len 20 ACCEPT;
1039 mod rt rt-type !2 rt-len !20 ACCEPT;
1040 mod rt rt-segsleft 2:3 ACCEPT;
1041 mod rt rt-segsleft !4:5 ACCEPT;
1042 mod rt rt-0-res rt-0-addrs (::1 ::2) rt-0-not-strict ACCEPT;
1046 Check SCTP (Stream Control Transmission Protocol) specific attributes.
1047 This module is automatically loaded when you use "protocol sctp".
1049 proto sctp sport 1234 dport 2345 ACCEPT;
1050 proto sctp chunk-types only DATA:Be ACCEPT;
1051 proto sctp chunk-types any (INIT INIT_ACK) ACCEPT;
1052 proto sctp chunk-types !all (HEARTBEAT) ACCEPT;
1054 Use "iptables -p sctp C<-h>" to obtain a list of valid chunk types.
1058 Checks the source or destination IP/Port/MAC against a set.
1060 mod set set badguys src DROP;
1062 See L<http://ipset.netfilter.org/> for more information.
1066 Checks the connection tracking state.
1068 mod state state INVALID DROP;
1069 mod state state (ESTABLISHED RELATED) ACCEPT;
1071 Type "iptables -m state -h" for details.
1075 Successor of B<nth> and B<random>, currently undocumented in the
1076 iptables(8) man page.
1078 mod statistic mode random probability 0.8 ACCEPT;
1079 mod statistic mode nth every 5 packet 0 DROP;
1085 mod string string "foo bar" ACCEPT;
1086 mod string algo kmp from 64 to 128 hex-string "deadbeef" ACCEPT;
1090 Checks TCP specific attributes. This module is automatically loaded
1091 when you use "protocol tcp".
1093 proto tcp sport 1234;
1094 proto tcp dport 2345;
1095 proto tcp tcp-flags (SYN ACK) SYN;
1096 proto tcp tcp-flags ! (SYN ACK) SYN;
1097 proto tcp tcp-flags ALL (RST ACK);
1099 proto tcp tcp-option 2;
1102 Type "iptables -p tcp -h" for details.
1106 Check the TCP MSS field of a SYN or SYN/ACK packet.
1108 mod tcpmss mss 123 ACCEPT;
1109 mod tcpmss mss 234:567 ACCEPT;
1113 Check if the time a packet arrives is in given range.
1115 mod time timestart 12:00;
1116 mod time timestop 13:30;
1117 mod time days (Mon Wed Fri);
1118 mod time datestart 2005:01:01;
1119 mod time datestart 2005:01:01:23:59:59;
1120 mod time datestop 2005:04:01;
1121 mod time monthday (30 31);
1122 mod time weekdays (Wed Thu);
1123 mod time timestart 12:00 utc;
1124 mod time timestart 12:00 localtz;
1126 Type "iptables -m time -h" for details.
1130 Matches a packet on the specified TOS-value.
1132 mod tos tos Minimize-Cost ACCEPT;
1133 mod tos tos !Normal-Service ACCEPT;
1135 Type "iptables -m tos -h" for details.
1139 Matches the ttl (time to live) field in the IP header.
1141 mod ttl ttl-eq 12; # ttl equals
1142 mod ttl ttl-gt 10; # ttl greater than
1143 mod ttl ttl-lt 16; # ttl less than
1147 Compares raw data from the packet. You can specify more than one
1148 filter in a ferm list; these are not expanded into multiple rules.
1150 mod u32 u32 '6&0xFF=1' ACCEPT;
1151 mod u32 u32 ('27&0x8f=7' '31=0x527c4833') DROP;
1155 Matches packets which seem malformed or unusual. This match has no
1161 =head2 iptables target modules
1163 The following additional targets are available in ferm, provided that
1164 you enabled them in your kernel:
1170 Compute packet checksum.
1172 CHECKSUM checksum-fill;
1178 CLASSIFY set-class 3:50;
1182 Configure a simple cluster of nodes that share a certain IP and MAC
1183 address. Connections are statically distributed between the nodes.
1185 CLUSTERIP new hashmode sourceip clustermac 00:12:34:45:67:89
1186 total-nodes 4 local-node 2 hash-init 12345;
1190 Sets the netfilter mark value associated with a connection.
1192 CONNMARK set-xmark 42/0xff;
1193 CONNMARK set-mark 42;
1195 CONNMARK restore-mark;
1196 CONNMARK save-mark nfmask 0xff ctmask 0xff;
1197 CONNMARK save-mark mask 0x7fff;
1198 CONNMARK restore-mark mask 0x8000;
1199 CONNMARK and-mark 0x7;
1200 CONNMARK or-mark 0x4;
1201 CONNMARK xor-mark 0x7;
1202 CONNMARK and-mark 0x7;
1204 =item B<CONNSECMARK>
1206 This module copies security markings from packets to connections (if
1207 unlabeled), and from connections back to packets (also only if
1208 unlabeled). Typically used in conjunction with SECMARK, it is only
1209 valid in the mangle table.
1212 CONNSECMARK restore;
1214 =item B<DNAT to [ip-address|ip-range|ip-port-range]>
1216 Change the destination address of the packet.
1219 DNAT to 10.0.0.4:80;
1220 DNAT to 10.0.0.4:1024-2048;
1221 DNAT to 10.0.1.1-10.0.1.20;
1225 Provides stateless destination IPv6-to-IPv6 Network Prefix Translation.
1227 DNPT src-pfx 2001:42::/16 dst-pfx 2002:42::/16;
1231 This target allows to selectively work around known ECN blackholes.
1232 It can only be used in the mangle table.
1238 Modify the IPv6 Hop Limit field (ip6/mangle only).
1246 Like MARK, i.e. set the fwmark, but the mark is calculated from
1247 hashing packet selector at choice.
1249 HMARK hmark-tuple "src" hmark-mod "1" hmark-offset "1"
1250 hmark-src-prefix 192.168.1.0/24 hmark-dst-prefix 192.168.2.0/24
1251 hmark-sport-mask 0x1234 hmark-dport-mask 0x2345
1252 hmark-spi-mask 0xdeadbeef hmark-proto-mask 0x42 hmark-rnd 0xcoffee;
1256 This target can be used to identify when interfaces have been idle for
1257 a certain period of time.
1259 IDLETIMER timeout 60 label "foo";
1261 =item B<IPV4OPTSSTRIP>
1263 Strip all the IP options from a packet. This module does not take any
1270 This creates an LED-trigger that can then be attached to system
1271 indicator lights, to blink or illuminate them when certain packets
1272 pass through the system.
1274 LED led-trigger-id "foo" led-delay 100 led-always-blink;
1278 Log all packets that match this rule in the kernel log. Be carefull
1279 with log flooding. Note that this is a "non-terminating target",
1280 i.e. rule traversal continues at the next rule.
1282 LOG log-level warning log-prefix "Look at this: ";
1283 LOG log-tcp-sequence log-tcp-options;
1288 Sets the netfilter mark field for the packet (a 32 bit integer between
1299 Masquerades matching packets. Optionally followed by a port or
1300 port-range for iptables. Specify as "123", "123-456" or "123:456".
1301 The port range parameter specifies what local ports masqueraded
1302 connections should originate from.
1305 MASQUERADE to-ports 1234:2345;
1306 MASQUERADE to-ports 1234:2345 random;
1310 Experimental demonstration target which inverts the source and
1311 destination fields in the IP header.
1317 Map a whole network onto another network in the B<nat> table.
1319 NETMAP to 192.168.2.0/24;
1323 Disable connection tracking for all packets matching that rule.
1325 proto tcp dport (135:139 445) NOTRACK;
1329 RATEEST rateest-name "foo" rateest-interval 60s rateest-ewmalog 100;
1331 proto tcp dport (135:139 445) NOTRACK;
1335 Log packets over netlink; this is the successor of I<ULOG>.
1337 NFLOG nflog-group 5 nflog-prefix "Look at this: ";
1338 NFLOG nflog-range 256;
1339 NFLOG nflog-threshold 10;
1343 Userspace queueing, requires nfnetlink_queue kernel support.
1345 proto tcp dport ftp NFQUEUE queue-num 20;
1349 Userspace queueing, the predecessor to B<NFQUEUE>. All packets go to
1352 proto tcp dport ftp QUEUE;
1354 =item B<REDIRECT to-ports [ports]>
1356 Transparent proxying: alter the destination IP of the packet to the
1359 proto tcp dport http REDIRECT to-ports 3128;
1360 proto tcp dport http REDIRECT to-ports 3128 random;
1364 Similar to SNAT, but a client is mapped to the same source IP for all
1367 SAME to 1.2.3.4-1.2.3.7;
1368 SAME to 1.2.3.8-1.2.3.15 nodst;
1369 SAME to 1.2.3.16-1.2.3.31 random;
1373 This is used to set the security mark value associated with the packet
1374 for use by security subsystems such as SELinux. It is only valid in
1377 SECMARK selctx "system_u:object_r:httpd_packet_t:s0";
1379 =item B<SET [add-set|del-set] [setname] [flag(s)]>
1381 Add the IP to the specified set. See L<http://ipset.netfilter.org/>
1383 proto icmp icmp-type echo-request SET add-set badguys src;
1384 SET add-set "foo" timeout 60 exist;
1386 =item B<SNAT to [ip-address|ip-range|ip-port-range]>
1388 Change the source address of the packet.
1391 SNAT to 1.2.3.4:20000-30000;
1392 SNAT to 1.2.3.4 random;
1396 Provides stateless source IPv6-to-IPv6 Network Prefix Translation.
1398 SNPT src-pfx 2001:42::/16 dst-pfx 2002:42::/16;
1402 TCP 3-way handshake proxy: let the firewall handle the TCP 3-way handshake and
1403 only establish connection with the server socket once the client handshake has
1406 SYNPROXY wscale 7 mss 1460 timestamp sack-perm
1410 Alter the MSS value of TCP SYN packets.
1412 TCPMSS set-mss 1400;
1413 TCPMSS clamp-mss-to-pmtu;
1415 =item B<TCPOPTSTRIP>
1417 This target will strip TCP options off a TCP packet.
1419 TCPOPTSTRIP strip-options (option1 option2 ...);
1421 =item B<TOS set-tos [value]>
1423 Set the tcp package Type Of Service bit to this value. This will be
1424 used by whatever traffic scheduler is willing to, mostly your own
1425 linux-machine, but maybe more. The original tos-bits are blanked and
1426 overwritten by this value.
1428 TOS set-tos Maximize-Throughput;
1433 Type "iptables -j TOS -h" for details.
1437 Modify the TTL header field.
1440 TTL ttl-dec 1; # decrease by 1
1441 TTL ttl-inc 4; # increase by 4
1445 Log packets to a userspace program.
1447 ULOG ulog-nlgroup 5 ulog-prefix "Look at this: ";
1448 ULOG ulog-cprange 256;
1449 ULOG ulog-qthreshold 10;
1453 =head1 OTHER DOMAINS
1455 Since version 2.0, B<ferm> supports not only I<ip> and I<ip6>, but
1456 also I<arp> (ARP tables) and I<eb> (ethernet bridging tables). The
1457 concepts are similar to I<iptables>.
1459 =head2 arptables keywords
1463 =item B<source-ip>, B<destination-ip>
1465 Matches the source or destination IPv4 address. Same as B<saddr> and
1466 B<daddr> in the I<ip> domain.
1468 =item B<source-mac>, B<destination-mac>
1470 Matches the source or destination MAC address.
1472 =item B<interface>, B<outerface>
1474 Input and output interface.
1478 Hardware length of the packet.
1480 chain INPUT h-length 64 ACCEPT;
1484 Operation code, for details see the iptables(8).
1498 proto-type 0x800 ACCEPT;
1502 The keywords B<mangle-ip-s>, B<mangle-ip-d>, B<mangle-mac-s>,
1503 B<mangle-mac-d>, B<mangle-target> may be used for ARP mangling. See
1504 iptables(8) for details.
1508 =head2 ebtables keywords
1514 Matches the protocol which created the frame, e.g. I<IPv4> or B<PPP>.
1515 For a list, see F</etc/ethertypes>.
1517 =item B<interface>, B<outerface>
1519 Physical input and output interface.
1521 =item B<logical-in>, B<logical-out>
1523 The logical bridge interface.
1525 =item B<saddr>, B<daddr>
1527 Matches source or destination MAC address.
1529 =item B<Match modules>
1531 The following match modules are supported: 802.3, arp, ip, mark_m,
1532 pkttype, stp, vlan, log.
1534 =item B<Target extensions>
1536 The following target extensions are supported: arpreply, dnat, mark,
1539 Please note that there is a conflict between I<--mark> from the
1540 I<mark_m> match module and I<-j mark>. Since both would be
1541 implemented with the ferm keyword B<mark>, we decided to solve this by
1542 writing the target's name in uppercase, like in the other domains.
1543 The following example rewrites mark 1 to 2:
1549 =head1 ADVANCED FEATURES
1553 In complex firewall files, it is helpful to use variables, e.g. to
1554 give a network interface a meaningful name.
1556 To set variables, write:
1558 @def $DEV_INTERNET = eth0;
1559 @def $PORTS = (http ftp);
1560 @def $MORE_PORTS = ($PORTS 8080);
1562 In the real ferm code, variables are used like any other keyword
1565 chain INPUT interface $DEV_INTERNET proto tcp dport $MORE_PORTS ACCEPT;
1567 Note that variables can only be used in keyword parameters
1568 ("192.168.1.1", "http"); they cannot contain ferm keywords like
1569 "proto" or "interface".
1571 Variables are only valid in the current block:
1573 @def $DEV_INTERNET = eth1;
1576 @def $DEV_INTERNET = ppp0;
1577 interface $DEV_INTERNET dport http ACCEPT;
1579 interface $DEV_INTERNET DROP;
1582 will be expanded to:
1586 interface ppp0 dport http ACCEPT;
1588 interface eth1 DROP;
1591 The "def $DEV_INTERNET = ppp0" is only valid in the "proto tcp" block;
1592 the parent block still knows "set $DEV_INTERNET = eth1".
1594 Include files are special - variables declared in an included file are
1595 still available in the calling block. This is useful when you include
1596 a file which only declares variables.
1598 =head2 Automatic variables
1600 Some variables are set internally by ferm. Ferm scripts can use them
1601 just like any other variable.
1607 The name of the configuration file relative to the directory ferm was
1612 The base name of the configuration file.
1616 The directory of the configuration file.
1620 The current domain. One of I<ip>, I<ip6>, I<arp>, I<eb>.
1624 The current netfilter table.
1628 The current netfilter chain.
1632 The line of the current script. It can be used like this:
1635 LOG log-prefix "rule=$msg:$LINE ";
1640 &log("log message");
1646 Functions are similar to variables, except that they may have
1647 parameters, and they provide ferm commands, not values.
1649 @def &FOO() = proto (tcp udp) dport domain;
1652 @def &TCP_TUNNEL($port, $dest) = {
1653 table filter chain FORWARD interface ppp0 proto tcp dport $port daddr $dest outerface eth0 ACCEPT;
1654 table nat chain PREROUTING interface ppp0 proto tcp dport $port daddr 1.2.3.4 DNAT to $dest;
1657 &TCP_TUNNEL(http, 192.168.1.33);
1658 &TCP_TUNNEL(ftp, 192.168.1.30);
1659 &TCP_TUNNEL((ssh smtp), 192.168.1.2);
1661 A function call which contains a block (like '{...}') must be the last
1662 command in a ferm rule, i.e. it must be followed by ';'. The '&FOO()'
1663 example does not contain a block, thus you may write 'ACCEPT' after
1664 the call. To circumvent this, you can reorder the keywords:
1666 @def &IPSEC() = { proto (esp ah); proto udp dport 500; }
1667 chain INPUT ACCEPT &IPSEC();
1671 With backticks, you may use the output of an external command:
1673 @def $DNSSERVERS = `grep nameserver /etc/resolv.conf | awk '{print $2}'`;
1674 chain INPUT proto tcp saddr $DNSSERVERS ACCEPT;
1676 The command is executed with the shell (F</bin/sh>), just like
1677 backticks in perl. ferm does not do any variable expansion here.
1679 The output is then tokenized, and saved as a ferm list (array). Lines
1680 beginning with '#' are ignored; the other lines may contain any number
1681 of values, separated by whitespace.
1685 The B<@include> keyword allows you to include external files:
1687 @include 'vars.ferm';
1689 The file name is relative to the calling file, e.g. when including
1690 from F</etc/ferm/ferm.conf>, the above statement includes
1691 F</etc/ferm/vars.ferm>. Variables and functions declared in an
1692 included file are still available in the calling file.
1694 B<include> works within a block:
1697 @include 'input.ferm';
1700 If you specify a directory (with a trailing '/'), all files in this
1701 directory are included, sorted alphabetically:
1705 The function @glob can be used to expand wild cards:
1707 @include @glob('*.include');
1709 With a trailing pipe symbol, B<ferm> executes a shell command and
1712 @include "/root/generate_ferm_rules.sh $HOSTNAME|"
1714 B<ferm> aborts, if return code is not 0.
1718 The keyword B<@if> introduces a conditional expression:
1720 @if $condition DROP;
1722 A value is evaluated true just like in Perl: zero, empty list, empty
1723 string are false, everything else is true. Examples for true values:
1725 (a b); 1; 'foo'; (0 0)
1727 Examples for false values:
1731 There is also B<@else>:
1733 @if $condition DROP; @else REJECT;
1735 Note the semicolon before the B<@else>.
1737 It is possible to use curly braces after either B<@if> or B<@else>:
1746 Since the closing curly brace also finishes the command, there is no
1749 There is no B<@elsif>, use B<@else @if> instead.
1753 @def $have_ipv6 = `test -f /proc/net/ip6_tables_names && echo 1 || echo`;
1762 To run custom commands, you may install hooks:
1764 @hook pre "echo 0 >/proc/sys/net/ipv4/conf/eth0/forwarding";
1765 @hook post "echo 1 >/proc/sys/net/ipv4/conf/eth0/forwarding";
1766 @hook flush "echo 0 >/proc/sys/net/ipv4/conf/eth0/forwarding";
1768 The specified command is executed using the shell. "pre" means run
1769 the command before applying the firewall rules, and "post" means run
1770 the command afterwards. "flush" hooks are run after ferm has flushed
1771 the firewall rules (option --flush). You may install any number of
1774 =head1 BUILT-IN FUNCTIONS
1776 There are several built-in functions which you might find useful.
1778 =head2 @defined($name), @defined(&name)
1780 Tests if the variable or function is defined.
1783 @if @defined($a) good;
1784 @if @not(@defined($a)) bad;
1785 @if @defined(&funcname) good;
1789 Tests two values for equality. Example:
1791 @if @eq($DOMAIN, ip6) DROP;
1795 Similar to @eq, this tests for non-equality.
1799 Negates a boolean value.
1801 =head2 @resolve((hostname1 hostname2 ...), [type])
1803 Usually, host names are resolved by iptables. To let ferm resolve
1804 host names, use the function @resolve:
1806 saddr @resolve(my.host.foo) proto tcp dport ssh ACCEPT;
1807 saddr @resolve((another.host.foo third.host.foo)) proto tcp dport openvpn ACCEPT;
1808 daddr @resolve(ipv6.google.com, AAAA) proto tcp dport http ACCEPT;
1810 Note the double parentheses in the second line: the inner pair for
1811 creating a ferm list, and the outer pair as function parameter
1814 The second parameter is optional, and specifies the DNS record type.
1817 Be careful with resolved host names in firewall configuration. DNS
1818 requests may block the firewall configuration for a long time, leaving
1819 the machine vulnerable, or they may fail.
1821 =head2 @cat(a, b, ...)
1823 Concatenate all parameters into one string.
1825 =head2 @substr(expression, offset, length)
1827 Extracts a substring out of expression and returns it. First
1828 character is at offset 0. If OFFSET is negative, starts that far from
1829 the end of the string.
1831 =head2 @length(expression)
1833 Returns the length in characters of the value of EXPR.
1835 =head2 @basename(path)
1837 Return the base name of the file for a given path
1838 (File::Spec::splitpath).
1840 =head2 @dirname(path)
1842 Return the name of the last directory for a given path, assuming the
1843 last component is a file name (File::Spec::splitpath).
1847 Expand shell wildcards in the given paths (assumed to be relative to
1848 the current script). Returns a list of matching files. This function
1849 is useful as parameter of @include.
1851 =head2 @ipfilter(list)
1853 Filters out the IP addresses that obviously do not match the current
1854 domain. That is useful to create common variables and rules for IPv4
1857 @def $TRUSTED_HOSTS = (192.168.0.40 2001:abcd:ef::40);
1859 domain (ip ip6) chain INPUT {
1860 saddr @ipfilter($TRUSTED_HOSTS) proto tcp dport ssh ACCEPT;
1865 The F<./examples/> directory contains numerous ferm configuration
1866 which can be used to begin a new firewall. This sections contains more
1867 samples, recipes and tricks.
1869 =head2 Easy port forwarding
1871 Ferm function make routine tasks quick and easy:
1873 @def &FORWARD_TCP($proto, $port, $dest) = {
1874 table filter chain FORWARD interface $DEV_WORLD outerface $DEV_DMZ daddr $dest proto $proto dport $port ACCEPT;
1875 table nat chain PREROUTING interface $DEV_WORLD daddr $HOST_STATIC proto $proto dport $port DNAT to $dest;
1878 &FORWARD_TCP(tcp, http, 192.168.1.2);
1879 &FORWARD_TCP(tcp, smtp, 192.168.1.3);
1880 &FORWARD_TCP((tcp udp), domain, 192.168.1.4);
1882 =head2 Remote B<ferm>
1884 If the target machine is not able to run B<ferm> for some reason
1885 (maybe an embedded device without Perl), you can edit the B<ferm>
1886 configuration file on another computer and let B<ferm> generate a
1889 Example for OpenWRT:
1891 ferm --remote --shell mywrt/ferm.conf >mywrt/firewall.user
1892 chmod +x mywrt/firewall.user
1893 scp mywrt/firewall.user mywrt.local.net:/etc/
1894 ssh mywrt.local.net /etc/firewall.user
1902 Do not execute the iptables(8) commands, but skip instead. This way
1903 you can parse your data, use B<--lines> to view the output.
1907 Clears the firewall rules and sets the policy of all chains to ACCEPT.
1908 B<ferm> needs a configuration file for that to determine which domains
1909 and tables are affected.
1913 Show the firewall lines that were generated from the rules. They
1914 will be shown just before they are executed, so if you get error
1915 messages from iptables(8) etc., you can see which rule caused
1918 =item B<--interactive>
1920 Apply the firewall rules and ask the user for confirmation. Reverts
1921 to the previous ruleset if there is no valid user response within 30
1922 seconds (see B<--timeout>). This is useful for remote firewall
1923 administration: you can test the rules without fearing to lock
1926 =item B<--timeout S>
1928 If B<--interactive> is used, then roll back if there is no valid user
1929 response after this number of seconds. The default is 30.
1933 Show a brief list of available commandline options.
1937 Shows the version number of the program.
1941 Enable fast mode: ferm generates an iptables-save(8) file, and
1942 installs it with iptables-restore(8). This is much faster, because
1943 ferm calls iptables(8) once for every rule by default.
1945 Fast mode is enabled by default since B<ferm> 2.0, deprecating this
1950 Disable fast mode, i.e. run iptables(8) for every rule, and don't use
1951 iptables-restore(8).
1955 Generate a shell script which calls iptables-restore(8) and prints it.
1956 Implies --fast --lines.
1960 Generate rules for a remote machine. Implies B<--noexec> and
1961 B<--lines>. Can be combined with B<--shell>.
1963 =item B<--domain {ip|ip6}>
1965 Handle only the specified domain. B<ferm> output may be empty if the
1966 domain is not configured in the input file.
1968 =item B<--def '$name=value'>
1970 Override a variable defined in the configuration file.
1982 =head2 Operating system
1984 Linux 2.4 or newer, with netfilter support and all netfilter modules
1985 used by your firewall script
1989 iptables and perl 5.6
1995 If you find a bug, please report it on GitHub:
1996 L<https://github.com/MaxKellermann/ferm/issues>
2000 Copyright (C) 2001-2012 Max Kellermann <max@foo-projects.org>, Auke
2001 Kok <sofar@foo-projects.org>
2003 This program is free software; you can redistribute it and/or modify
2004 it under the terms of the GNU General Public License as published by
2005 the Free Software Foundation; either version 2 of the License, or (at
2006 your option) any later version.
2008 This program is distributed in the hope that it will be useful, but
2009 WITHOUT ANY WARRANTY; without even the implied warranty of
2010 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
2011 General Public License for more details.
2013 You should have received a copy of the GNU General Public License
2014 along with this program; if not, write to the Free Software
2015 Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
2020 Max Kellermann <max@foo-projects.org>, Auke Kok
2021 <sofar@foo-projects.org>