@@ -41,28 +41,33 @@ Remote Groups
41
41
==============
42
42
43
43
A **remote-group ** takes an argument of a URL hosting a linebreak-deliminated
44
- list of IPv4s addresses, CIDRs and ranges. VyOS will pull this list periodicity
44
+ list of IPv4 and/or IPv6 addresses, CIDRs and ranges. VyOS will pull this list periodicity
45
45
according to the frequency defined in the firewall **resolver-interval ** and load
46
46
matching entries into the group for use in rules. The list will be cached in
47
47
persistent storage, so in cases of update failure rules will still function.
48
48
49
49
.. cfgcmd :: set firewall group remote-group <name> url <http(s) url>
50
50
51
- Define remote list of IPv4 addresses/ranges/CIDRs to fetch
51
+ Define remote list of IPv4 and/or IPv6 addresses/ranges/CIDRs to fetch
52
52
53
53
.. cfgcmd :: set firewall group remote-group <name> description <text>
54
54
55
- Set a description for a remote group
55
+ Set a description for a remote group
56
56
57
57
The format of the remote list is very flexible. VyOS will attempt to parse the
58
58
first word of each line as an entry, and will skip if it cannot find a valid
59
- match. Below is a list of acceptable matches that would be parsed correctly:
59
+ match. Lines that begin with an alphanumeric character but do not match valid IPv4
60
+ or IPv6 addresses, ranges, or CIDRs will be logged to the system log. Below is a
61
+ list of acceptable matches that would be parsed correctly:
60
62
61
63
.. code-block :: none
62
64
63
65
127.0.0.1
64
66
127.0.0.0/24
65
67
127.0.0.1-127.0.0.254
68
+ 2001:db8::1
69
+ 2001:db8:cafe::/48
70
+ 2001:db8:cafe::1-2001:db8:cafe::ffff
66
71
67
72
Network Groups
68
73
==============
@@ -258,7 +263,7 @@ As any other firewall group, dynamic firewall groups can be used in firewall
258
263
rules as matching options. For example:
259
264
260
265
.. code-block :: none
261
-
266
+
262
267
set firewall ipv4 input filter rule 10 source group dynamic-address-group FOO
263
268
set firewall ipv4 input filter rule 10 destination group dynamic-address-group BAR
264
269
@@ -272,10 +277,10 @@ General example
272
277
As said before, once firewall groups are created, they can be referenced
273
278
either in firewall, nat, nat66 and/or policy-route rules.
274
279
275
- Here is an example were multiple groups are created:
280
+ Here is an example were multiple groups are created:
276
281
277
282
.. code-block :: none
278
-
283
+
279
284
set firewall group address-group SERVERS address 198.51.100.101
280
285
set firewall group address-group SERVERS address 198.51.100.102
281
286
set firewall group network-group TRUSTEDv4 network 192.0.2.0/30
@@ -290,7 +295,7 @@ Here is an example were multiple groups are created:
290
295
And next, some configuration example where groups are used:
291
296
292
297
.. code-block :: none
293
-
298
+
294
299
set firewall ipv4 output filter rule 10 action accept
295
300
set firewall ipv4 output filter rule 10 outbound-interface group !LAN
296
301
set firewall ipv4 forward filter rule 20 action accept
@@ -453,4 +458,4 @@ Here is an example of such command:
453
458
PORT-SERVERS port_group route-PBR-201 443
454
459
route-PBR-201 5000-5010
455
460
nat-destination-101 http
456
- vyos@vyos:~$
461
+ vyos@vyos:~$
0 commit comments