SHOREWALL-ARPRULES(5) | Configuration Files | SHOREWALL-ARPRULES(5) |
NAME¶
arprules - Shorewall ARP rules file
SYNOPSIS¶
/etc/shorewall/arprules
DESCRIPTION¶
IPv4 only.
This file was added in Shorewall 4.5.12 and is used to describe low-level rules managed by arptables (8). These rules only affect Address Resolution Protocol (ARP), Reverse Address Resolution Protocol (RARP) and Dynamic Reverse Address Resolution Protocol (DRARP) frames.
The columns in the file are as shown below. MAC addresses are specified normally (6 hexadecimal numbers separated by colons).
ACTION
ACCEPT
DROP
SNAT:ip-address
DNAT:ip-address
SMAT:mac-address
DMAT:mac-address
SNATC:ip-address
DNATC:ip-address
SMATC:mac-address
DMATC:mac-address
SOURCE - [interface[:[!]ipaddress[/ipmask][:[!]macaddress[/macmask]]]]
interface
ipaddress
ipmask
macaddress
macmask
When '!' is specified, the test is inverted.
If not specified, matches only frames originating on the firewall itself.
Caution
Either SOURCE or DEST must be specified.
DEST - [interface[:[!]ipaddress[/ipmask][:[!]macaddress[/macmask]]]]
interface
ipaddress
ipmask
macaddress
macmask
When '!' is specified, the test is inverted and the rule matches frames which do not match the specified address/mask.
If not specified, matches only frames originating on the firewall itself.
If both SOURCE and DEST are specified, then both interfaces must be bridge ports on the same bridge.
Caution
Either SOURCE or DEST must be specified.
OPCODE - [[!]opcode]
1
2
3
4
5
6
7
8
9
When '!' is specified, the test is inverted and the rule matches frames which do not match the specified opcode.
EXAMPLE¶
The eth1 interface has both a public IP address and a private address (10.1.10.11/24). When sending ARP requests to 10.1.10.0/24, use the private address as the IP source:
#ACTION SOURCE DEST ARP OPCODE SNAT:10.1.10.11 - eth1:10.1.10.0/24 1
FILES¶
/etc/shorewall/arprules
SEE ALSO¶
09/24/2020 | Configuration Files |