Skip to content

Commit 33e3aac

Browse files
enhance: add new iptables opts
1 parent 39b1aea commit 33e3aac

File tree

1 file changed

+27
-1
lines changed

1 file changed

+27
-1
lines changed

crowdsec-docs/unversioned/bouncers/firewall.mdx

Lines changed: 27 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -342,6 +342,11 @@ Skip verification of the API certificate, typical for self-signed certificates
342342

343343
disable interacting with ipv6 chains/sets, defaults to `false`
344344

345+
### `disable_ipv4`
346+
> `true` | `false`
347+
348+
disable interacting with ipv4 chains/sets, defaults to `false`
349+
345350
### `deny_action`
346351
> `DROP` | `REJECT`
347352

@@ -362,7 +367,7 @@ if logging is true, this sets the log prefix, defaults to "crowdsec: "
362367
### `iptables_chains`
363368
> []string
364369
365-
specify a list of chains to insert rules
370+
specify a list of chains to insert rules into both ipv4 and ipv6
366371
367372
```yaml
368373
iptables_chains:
@@ -375,6 +380,27 @@ iptables_chains:
375380
If you are using a dockerized application and allow remote connections to the exposed port, you need to add the `DOCKER-USER` chain to the list of chains.
376381
:::
377382
383+
### `iptables_v4_chains`
384+
> []string
385+
386+
Specify a list of chains to insert rules into ipv4 only
387+
388+
```yaml
389+
iptables_v4_chains:
390+
- INPUT
391+
- DOCKER-USER
392+
```
393+
394+
### `iptables_v6_chains`
395+
> []string
396+
397+
Specify a list of chains to insert rules into ipv6 only
398+
399+
```yaml
400+
iptables_v6_chains:
401+
- INPUT
402+
```
403+
378404
### `blacklists_ipv4`
379405
> string
380406

0 commit comments

Comments
 (0)