Man page - shorewall-arprules(5)
Packages contas this manual
- shorewall-tcinterfaces(5)
- shorewall-proxyndp(5)
- shorewall-blrules(5)
- shorewall-nesting(5)
- shorewall-files(5)
- shorewall-tcfilters(5)
- shorewall-stoppedrules(5)
- shorewall-actions(5)
- shorewall-routes(5)
- shorewall-logging(5)
- shorewall-names(5)
- shorewall-interfaces(5)
- shorewall-rtrules(5)
- shorewall-arprules(5)
- shorewall-params(5)
- shorewall-proxyarp(5)
- shorewall-addresses(5)
- shorewall-maclist(5)
- shorewall-tcpri(5)
- shorewall-nat(5)
- shorewall-ipsets(5)
- shorewall-zones(5)
- shorewall-providers(5)
- shorewall-vardir(5)
- shorewall-accounting(5)
- shorewall-policy(5)
- shorewall-tcdevices(5)
- shorewall-rules(5)
- shorewall-tunnels(5)
- shorewall-conntrack(5)
- shorewall-exclusion(5)
- shorewall-ecn(5)
- shorewall-modules(5)
- shorewall-snat(5)
- shorewall-tcclasses(5)
- shorewall-mangle(5)
- shorewall-secmarks(5)
- shorewall-netmap(5)
- shorewall.conf(5)
- shorewall-init(8)
- shorewall-hosts(5)
apt-get install shorewall
Manual
| SHOREWALL-ARPRULES(5) | Configuration Files | SHOREWALL-ARPRULES(5) |
NAME
arprules - Shorewall ARP rules file
SYNOPSIS
/etc/shorewall/arprules
DESCRIPTION
IPv4 only.
This file was added in Shorewall 4.5.12 and is used to describe low-level rules managed by arptables (8). These rules only affect Address Resolution Protocol (ARP), Reverse Address Resolution Protocol (RARP) and Dynamic Reverse Address Resolution Protocol (DRARP) frames.
The columns in the file are as shown below. MAC addresses are specified normally (6 hexadecimal numbers separated by colons).
ACTION
ACCEPT
DROP
SNAT:ip-address
DNAT:ip-address
SMAT:mac-address
DMAT:mac-address
SNATC:ip-address
DNATC:ip-address
SMATC:mac-address
DMATC:mac-address
SOURCE - [interface[:[!]ipaddress[/ipmask][:[!]macaddress[/macmask]]]]
interface
ipaddress
ipmask
macaddress
macmask
When '!' is specified, the test is inverted.
If not specified, matches only frames originating on the firewall itself.
Caution
Either SOURCE or DEST must be specified.
DEST - [interface[:[!]ipaddress[/ipmask][:[!]macaddress[/macmask]]]]
interface
ipaddress
ipmask
macaddress
macmask
When '!' is specified, the test is inverted and the rule matches frames which do not match the specified address/mask.
If not specified, matches only frames originating on the firewall itself.
If both SOURCE and DEST are specified, then both interfaces must be bridge ports on the same bridge.
Caution
Either SOURCE or DEST must be specified.
OPCODE - [[!]opcode]
1
2
3
4
5
6
7
8
9
When '!' is specified, the test is inverted and the rule matches frames which do not match the specified opcode.
EXAMPLE
The eth1 interface has both a public IP address and a private address (10.1.10.11/24). When sending ARP requests to 10.1.10.0/24, use the private address as the IP source:
#ACTION SOURCE DEST ARP OPCODE SNAT:10.1.10.11 - eth1:10.1.10.0/24 1
FILES
/etc/shorewall/arprules
SEE ALSO
shorewall(8)
| 09/24/2020 | Configuration Files |