@@ -44,7 +44,7 @@ Do not modify Docker's tables directly as the modifications are likely to
44
44
be lost, Docker expects to have full ownership of its tables.
45
45
46
46
> [ !NOTE]
47
- >
47
+ >
48
48
> Because iptables has a fixed set of chains, equivalent to nftables base
49
49
> chains, all rules are included in those chains. The ` DOCKER-USER ` chain
50
50
> is supplied as a way to insert rules into the ` filter ` table's ` FORWARD `
@@ -81,7 +81,7 @@ publishing, communication between bridge networks, and direct routing from
81
81
outside the host to containers in bridge networks.
82
82
83
83
When running with iptables, depending on network and daemon configuration,
84
- Docker may enable IPv4 and IPv6 forwarding on the host.
84
+ Docker may enable IPv4 and IPv6 forwarding on the host.
85
85
86
86
With its nftables firewall backend enabled, Docker will not enable IP forwarding
87
87
itself. It will report an error if forwarding is needed, but not already enabled.
@@ -90,7 +90,7 @@ when it determines that forwarding is disabled, use Daemon option `--ip-forward=
90
90
or ` "ip-forward": false ` in its configuration file.
91
91
92
92
> [ !WARNING]
93
- >
93
+ >
94
94
> When enabling IP forwarding, make sure you have firewall rules to block
95
95
> unwanted forwarding between non-Docker interfaces.
96
96
@@ -103,16 +103,16 @@ or `"ip-forward": false` in its configuration file.
103
103
If Docker is in a VM that has a single network interface and no other
104
104
software running, there is probably no unwanted forwarding to block.
105
105
But, on a physical host with multiple network interfaces, forwarding
106
- between those interfaces should probably be blocked unless the host
107
- is acting as a router.
106
+ between those interfaces should probably be blocked with nftables rules
107
+ unless the host is acting as a router.
108
108
109
109
To enable IP forwarding on the host, set the following sysctls:
110
110
111
111
- ` net.ipv4.ip_forward=1 `
112
112
- ` net.ipv6.conf.all.forwarding=1 `
113
113
114
114
If your host uses ` systemd ` , you may be able to use ` systemd-sysctl ` . For
115
- example, by editing ` /etc/sysctl.d/99-sysctl.conf ` .
115
+ example, by editing ` /etc/sysctl.d/99-sysctl.conf ` .
116
116
117
117
If the host is running ` firewalld ` , you may be able to use it to block
118
118
unwanted forwarding. Docker's bridges are in a firewalld zone called
0 commit comments