firewalld.dbus man page on OpenMandriva

Man page or keyword search:  
man Server   8135 pages
apropos Keyword Search (all sections)
Output format
OpenMandriva logo
[printable version]

FIREWALLD.DBUS(5)		firewalld.dbus		     FIREWALLD.DBUS(5)

NAME
       firewalld.dbus - firewalld D-Bus interface description

OBJECT PATHS
       This is the basic firewalld object path structure. The used interfaces
       are explained below in the INTERFACES section.

	   /org/fedoraproject/FirewallD1
	     Interfaces
	       org.fedoraproject.FirewallD1
	       org.fedoraproject.FirewallD1.direct
	       org.fedoraproject.FirewallD1.policies
	       org.fedoraproject.FirewallD1.zone
	       org.freedesktop.DBus.Introspectable
	       org.freedesktop.DBus.Properties

	   /org/fedoraproject/FirewallD1/config
	     Interfaces
	       org.fedoraproject.FirewallD1.config
	       org.fedoraproject.FirewallD1.config.direct
	       org.fedoraproject.FirewallD1.config.policies
	       org.freedesktop.DBus.Introspectable
	       org.freedesktop.DBus.Properties

	   /org/fedoraproject/FirewallD1/config/icmptype/i
	     Interfaces
	       org.fedoraproject.FirewallD1.config.icmptype
	       org.freedesktop.DBus.Introspectable
	       org.freedesktop.DBus.Properties

	   /org/fedoraproject/FirewallD1/config/service/i
	     Interfaces:
	       org.fedoraproject.FirewallD1.config.service
	       org.freedesktop.DBus.Introspectable
	       org.freedesktop.DBus.Properties

	   /org/fedoraproject/FirewallD1/config/zone/i
	     Interfaces
	       org.fedoraproject.FirewallD1.config.zone
	       org.freedesktop.DBus.Introspectable
	       org.freedesktop.DBus.Properties

INTERFACES
   org.fedoraproject.FirewallD1
       This interface contains general runtime operations, like: reloading,
       panic mode, default zone, getting services and icmp types and their
       settings.

       Methods
	   completeReload() → Nothing
	       Reload firewall completely, even netfilter kernel modules.

	   disablePanicMode() → Nothing
	       Disable panic mode.

	   enablePanicMode() → Nothing
	       Enable panic mode.

	   getDefaultZone() → s
	       Return default zone.

	   getIcmpTypeSettings(s: icmptype) → (sssas)
	       Return icmptype settings in format: version, name, description,
	       array of destinations

	   getServiceSettings(s: service) → (sssa(ss)asa{ss})
	       Return service settings in format: version, name, description,
	       array of ports (port, protocol), array of module names,
	       destinations {IP family : IP address}

	   getZoneSettings(s: zone) → (sssbsasa(ss)asba(ssss)asasas)
	       Return zone settings in format: version, name, description,
	       UNUSED boolean, target, array of services, array of ports
	       (port, protocol), array of icmp-blocks, masquerade boolean,
	       array of forward-ports (port, protocol, to-port, to-addr),
	       array of interfaces, array of sources, array of rich rules

	   listIcmpTypes() → as
	       Return list of icmptype names.

	   listServices() → as
	       Return list of service names.

	   queryPanicMode() → b
	       Return true if panic mode is enabled, false otherwise.

	   reload() → Nothing
	       Reload firewall rules and keep state information.

	   setDefaultZone(s: zone) → Nothing
	       Set default zone to zone.

       Signals
	   DefaultZoneChanged(s: zone)
	       Emitted when default zone has been changed to zone.

	   PanicModeDisabled()
	       Emitted when panic mode has been deactivated.

	   PanicModeEnabled()
	       Emitted when panic mode has been activated.

	   Reloaded()
	       Emitted when firewalld has been reloaded. Also emitted for a
	       complete reload.

       Properties
	   BRIDGE - b - (ro)
	       Indicates whether the firewall has ethernet bridge support.

	   IPv4 - b - (ro)
	       Indicates whether the firewall has IPv4 support.

	   IPv6 - b - (ro)
	       Indicates whether the firewall has IPv6 support.

	   interface_version - s - (ro)
	       firewalld D-Bus interface version string.

	   state - s - (ro)
	       firewalld state. This can be either INIT or RUNNING. In INIT
	       state, firewalld is starting up and initializing.

	   version - s - (ro)
	       firewalld version string.

   org.fedoraproject.FirewallD1.direct
       This interface enables more direct access to the firewall. It enables
       runtime manipulation with chains and rules. For permanent configuration
       see org.fedoraproject.FirewallD1.config.direct interface.

       Methods
	   addChain(s: ipv, s: table, s: chain) → Nothing
	       Add a new chain to table for ipv being either ipv4 or ipv6 or
	       eb.

	   addRule(s: ipv, s: table, s: chain, i: priority, as: args) →
	   Nothing
	       Add a rule with the arguments args to chain in table with
	       priority for ipv being either ipv4 or ipv6 or eb.

	   getAllChains()a(sss)
	       Get all chains added to all tables in format: ipv, table,
	       chain.

	   getAllRules()a(sssias)
	       Get all rules added to all chains in all tables in format: ipv,
	       table, chain, priority, rule

	   getChains(s: ipv, s: table) → as
	       Get all chains added to table for ipv being either ipv4 or ipv6
	       or eb.

	   getRules(s: ipv, s: table, s: chain) → a(ias)
	       Get all rules added to chain in table for ipv being either ipv4
	       or ipv6 or eb.

	   passthrough(s: ipv, as: args) → s
	       Pass a command through to the firewall.	ipv can be either ipv4
	       or ipv6 or eb.  args can be all iptables, ip6tables and
	       ebtables command line arguments.

	   queryChain(s: ipv, s: table, s: chain) → b
	       Return whether a chain exists in table for ipv being either
	       ipv4 or ipv6.

	   queryRule(s: ipv, s: table, s: chain, i: priority, as: args) → b
	       Return whether a rule with priority and the arguments args
	       exists in chain in table for ipv being either ipv4 or ipv6 or
	       eb.

	   removeChain(s: ipv, s: table, s: chain) → Nothing
	       Remove a chain from table for ipv being either ipv4 or ipv6.

	   removeRule(s: ipv, s: table, s: chain, i: priority, as: args) →
	   Nothing
	       Remove a rule with priority and arguments args from chain in
	       table for ipv being either ipv4 or ipv6.

	   removeRules(s: ipv, s: table, s: chain) → Nothing
	       Remove all rules from chain in table for ipv being either ipv4
	       or ipv6.

       Signals
	   ChainAdded(s: ipv, s: table, s: chain)
	       Emitted when chain has been changed into table for ipv being
	       either ipv4 or ipv6.

	   ChainRemoved(s: ipv, s: table, s: chain)
	       Emitted when chain has been changed from table for ipv being
	       either ipv4 or ipv6.

	   RuleAdded(s: ipv, s: table, s: chain, i: priority, as: args)
	       Emitted when a rule with args has been added to chain in table
	       with priority for ipv being either ipv4 or ipv6 or eb.

	   RuleRemoved(s: ipv, s: table, s: chain, i: priority, as: args)
	       Emitted when a rule with args has been removed from chain in
	       table with priority for ipv being either ipv4 or ipv6 or eb.

   org.fedoraproject.FirewallD1.policies
       Enables firewalld to be able to lock down configuration changes from
       local applications. Local applications or services are able to change
       the firewall configuration if they are running as root (example:
       libvirt). With these operations administrator can lock the firewall
       configuration so that either none or only applications that are in the
       whitelist are able to request firewall changes. For permanent
       configuration see org.fedoraproject.FirewallD1.config.policies
       interface.

       Methods
	   addLockdownWhitelistCommand(s: command) → Nothing
	       Add command to whitelist.

	   addLockdownWhitelistContext(s: context) → Nothing
	       Add context to whitelist.

	   addLockdownWhitelistUid(i: uid) → Nothing
	       Add user id uid to whitelist.

	   addLockdownWhitelistUser(s: user) → Nothing
	       Add user to whitelist.

	   disableLockdown() → Nothing
	       Disable lockdown.

	   enableLockdown() → Nothing
	       Enable lockdown.

	   getLockdownWhitelistCommands() → as
	       List all command lines that are on whitelist.

	   getLockdownWhitelistContexts() → as
	       List all contexts that are on whitelist.

	   getLockdownWhitelistUids() → ai
	       List all user ids that are on whitelist.

	   getLockdownWhitelistUsers() → as
	       List all users that are on whitelist.

	   queryLockdown() → b
	       Query whether lockdown is enabled.

	   queryLockdownWhitelistCommand(s: command) → b
	       Query whether command is on whitelist.

	   queryLockdownWhitelistContext(s: context) → b
	       Query whether context is on whitelist.

	   queryLockdownWhitelistUid(i: uid) → b
	       Query whether user id uid is on whitelist.

	   queryLockdownWhitelistUser(s: user) → b
	       Query whether user is on whitelist.

	   removeLockdownWhitelistCommand(s: command) → Nothing
	       Remove command from whitelist.

	   removeLockdownWhitelistContext(s: context) → Nothing
	       Remove context from whitelist.

	   removeLockdownWhitelistUid(i: uid) → Nothing
	       Remove user id uid from whitelist.

	   removeLockdownWhitelistUser(s: user) → Nothing
	       Remove user from whitelist.

       Signals
	   LockdownDisabled()
	       Emitted when lockdown has been disabled.

	   LockdownEnabled()
	       Emitted when lockdown has been enabled.

	   LockdownWhitelistCommandAdded(s: command)
	       Emitted when command has been added to whitelist.

	   LockdownWhitelistCommandRemoved(s: command)
	       Emitted when command has been removed from whitelist.

	   LockdownWhitelistContextAdded(s: context)
	       Emitted when context has been added to whitelist.

	   LockdownWhitelistContextRemoved(s: context)
	       Emitted when context has been removed from whitelist.

	   LockdownWhitelistUidAdded(i: uid)
	       Emitted when user id uid has been added to whitelist.

	   LockdownWhitelistUidRemoved(i: uid)
	       Emitted when user id uid has been removed from whitelist.

	   LockdownWhitelistUserAdded(s: user)
	       Emitted when user has been added to whitelist.

	   LockdownWhitelistUserRemoved(s: user)
	       Emitted when user has been removed from whitelist.

   org.fedoraproject.FirewallD1.zone
       Operations in this interface allows to get, add, remove and query
       runtime zone's settings. For permanent configuration see
       org.fedoraproject.FirewallD1.config.zone interface.

       Methods
	   addForwardPort(s: zone, s: port, s: protocol, s: toport, s: toaddr,
	   i: timeout) → s
	       Add the IPv4 forward port for zone. If zone is empty, use
	       default zone. The port can either be a single port number
	       portid or a port range portid-portid. The protocol can either
	       be tcp or udp. The destination address is a simple IP address.
	       If timeout is non-zero, the operation will be active only for
	       the amount of seconds.

	       Returns name of zone to which the forward port was added.

	   addIcmpBlock(s: zone, s: icmp, i: timeout) → s
	       Add an ICMP block icmp for zone. If zone is empty, use default
	       zone. If timeout is non-zero, the operation will be active only
	       for the amount of seconds.

	       Returns name of zone to which the ICMP block was added.

	   addInterface(s: zone, s: interface) → s
	       Bind interface to zone. If zone is empty, use default zone.

	       Returns name of zone to which the interface was bound.

	   addMasquerade(s: zone, i: timeout) → s
	       Enable IPv4 masquerade for zone. If zone is empty, use default
	       zone. If timeout is non-zero, masquerading will be active for
	       the amount of seconds.

	       Returns name of zone in which the masquerade was enabled.

	   addPort(s: zone, s: port, s: protocol, i: timeout) → s
	       Add port for zone. If zone is empty, use default zone. The port
	       can either be a single port number or a port range
	       portid-portid. The protocol can either be tcp or udp. If
	       timeout is non-zero, the operation will be active only for the
	       amount of seconds.

	       Returns name of zone to which the port was added.

	   addRichRule(s: zone, s: rule, i: timeout) → s
	       Add rich language rule for zone. If zone is empty, use default
	       zone. If timeout is non-zero, the operation will be active only
	       for the amount of seconds.

	       Returns name of zone to which the rich language rule was added.

	   addService(s: zone, s: service, i: timeout) → s
	       Add service for zone. If zone is empty, use default zone. If
	       timeout is non-zero, the operation will be active only for the
	       amount of seconds.

	       Returns name of zone to which the service was added.

	   addSource(s: zone, s: source) → s
	       Bind source to zone. If zone is empty, use default zone.

	       Returns name of zone to which the source was bound.

	   changeZone(s: zone, s: interface) → s
	       This function is deprecated, use changeZoneOfInterface instead.

	   changeZoneOfInterface(s: zone, s: interface) → s
	       Change a zone an interface is part of to zone. If zone is
	       empty, use default zone.

	       Returns name of zone.

	   changeZoneOfSource(s: zone, s: source) → s
	       Change a zone an source is part of to zone. If zone is empty,
	       use default zone.

	       Returns name of zone.

	   getActiveZones() → a{sa{sas}}
	       Return dictionary of currently active zones altogether with
	       interfaces and sources used in these zones. Active zones are
	       zones, that have a binding to an interface or source.

	   getForwardPorts(s: zone) → aas
	       Return list of IPv4 forward ports added for zone. If zone is
	       empty, use default zone.

	   getIcmpBlocks(s: zone) → as
	       Return list of Internet Control Message Protocol (ICMP) type
	       blocks added for zone. If zone is empty, use default zone.

	   getInterfaces(s: zone) → as
	       Return list of interfaces of a zone. If zone is empty, use
	       default zone.

	   getPorts(s: zone) → aas
	       Return list of enabled ports in a zone. If zone is empty, use
	       default zone.

	   getRichRules(s: zone) → as
	       Return list of rich language rules added for zone. If zone is
	       empty, use default zone.

	   getServices(s: zone) → as
	       Return list of enabled services in a zone. If zone is empty,
	       use default zone.

	   getSources(s: zone) → as
	       Return list of sources of a zone. If zone is empty, use default
	       zone.

	   getZoneOfInterface(s: interface) → s
	       Return name of zone the interface is bound to or empty string.

	   getZoneOfSource(s: source) → s
	       Return name of zone the source is bound to or empty string.

	   getZones() → as
	       Return names of predefined zones.

	   isImmutable(s: zone) → b
	       Deprecated.

	   queryForwardPort(s: zone, s: port, s: protocol, s: toport, s:
	   toaddr) → b
	       Return whether the IPv4 forward port has been added for zone.
	       If zone is empty, use default zone.

	   queryIcmpBlock(s: zone, s: icmp) → b
	       Return whether an ICMP block for icmp has been added for zone.
	       If zone is empty, use default zone.

	   queryInterface(s: zone, s: interface) → b
	       Query whether interface has been bound to zone. If zone is
	       empty, use default zone.

	   queryMasquerade(s: zone) → b
	       Return whether IPv4 masquerading has been enabled for zone If
	       zone is empty, use default zone.

	   queryPort(s: zone, s: port, s: protocol) → b
	       Return whether port/protocol has been added for zone. If zone
	       is empty, use default zone.

	   queryRichRule(s: zone, s: rule) → b
	       Return whether rich rule rule has been added for zone. If zone
	       is empty, use default zone.

	   queryService(s: zone, s: service) → b
	       Return whether service has been added for zone. If zone is
	       empty, use default zone.

	   querySource(s: zone, s: source) → b
	       Query whether sourcehas been bound to zone. If zone is empty,
	       use default zone.

	   removeForwardPort(s: zone, s: port, s: protocol, s: toport, s:
	   toaddr) → s
	       Remove IPv4 forward port from zone. If zone is empty, use
	       default zone.

	       Returns name of zone from which the forward port was removed.

	   removeIcmpBlock(s: zone, s: icmp) → s
	       Remove ICMP block icmp from zone. If zone is empty, use default
	       zone.

	       Returns name of zone from which the ICMP block was removed.

	   removeInterface(s: zone, s: interface) → s
	       Remove binding of interface from zone. If zone is empty, use
	       default zone.

	       Returns name of zone.

	   removeMasquerade(s: zone) → s
	       Disable IPv4 masquerade for zone. If zone is empty, use default
	       zone.

	       Returns name of zone for which the masquerade was disabled.

	   removePort(s: zone, s: port, s: protocol) → s
	       Remove port from zone. If zone is empty, use default zone.

	       Returns name of zone from which the port was removed.

	   removeRichRule(s: zone, s: rule) → s
	       Remove rich language rule from zone. If zone is empty, use
	       default zone.

	       Returns name of zone from which the rich language rule was
	       removed.

	   removeService(s: zone, s: service) → s
	       Remove service from zone. If zone is empty, use default zone.

	       Returns name of zone from which the service was removed.

	   removeSource(s: zone, s: source) → s
	       Remove binding of source from zone. If zone is empty, use
	       default zone.

	       Returns name of zone.

       Signals
	   ForwardPortAdded(s: zone, s: port, s: protocol, s: toport, s:
	   toaddr, i: timeout)
	       Emitted when forward port has been added to zone with timeout.

	   ForwardPortRemoved(s: zone, s: port, s: protocol, s: toport, s:
	   toaddr)
	       Emitted when forward port has been removed from zone.

	   IcmpBlockAdded(s: zone, s: icmp, i: timeout)
	       Emitted when ICMP block for icmp has been added to zone with
	       timeout.

	   IcmpBlockRemoved(s: zone, s: icmp)
	       Emitted when ICMP block for icmp has been removed from zone.

	   InterfaceAdded(s: zone, s: interface)
	       Emitted when interface has been added to zone.

	   InterfaceRemoved(s: zone, s: interface)
	       Emitted when interface has been removed from zone.

	   MasqueradeAdded(s: zone, i: timeout)
	       Emitted when IPv4 masquerade has been enabled for zone.

	   MasqueradeRemoved(s: zone)
	       Emitted when IPv4 masquerade has been disabled for zone.

	   PortAdded(s: zone, s: port, s: protocol, i: timeout)
	       Emitted when port/protocol has been added to zone with timeout.

	   PortRemoved(s: zone, s: port, s: protocol)
	       Emitted when port/protocol has been removed from zone.

	   RichRuleAdded(s: zone, s: rule, i: timeout)
	       Emitted when rich language rule has been added to zone with
	       timeout.

	   RichRuleRemoved(s: zone, s: rule)
	       Emitted when rich language rule has been removed from zone.

	   ServiceAdded(s: zone, s: service, i: timeout)
	       Emitted when service has been added to zone with timeout.

	   ServiceRemoved(s: zone, s: service)
	       Emitted when service has been removed from zone.

	   SourceAdded(s: zone, s: source)
	       Emitted when source has been added to zone.

	   SourceRemoved(s: zone, s: source)
	       Emitted when source has been removed from zone.

	   ZoneChanged(s: zone, s: interface)
	       Deprecated

	   ZoneOfInterfaceChanged(s: zone, s: interface)
	       Emitted when a zone an interface is part of has been changed to
	       zone.

	   ZoneOfSourceChanged(s: zone, s: source)
	       Emitted when a zone an source is part of has been changed to
	       zone.

   org.fedoraproject.FirewallD1.config
       Allows to permanently add, remove and query zones, services and icmp
       types.

       Methods
	   addIcmpType(s: icmptype, (sssas): settings) → o
	       Add icmptype with given settings.

	   addService(s: service, (sssa(ss)asa{ss}): settings) → o
	       Add service with given settings.

	   addZone(s: zone, (sssbsasa(ss)asba(ssss)asasas): settings) → o
	       Add zone with given settings.

	   getIcmpTypeByName(s: icmptype) → o
	       Return object path of icmptype.

	   getServiceByName(s: service) → o
	       Return object path of service.

	   getZoneByName(s: zone) → o
	       Return object path of zone.

	   getZoneOfInterface(s: iface) → s
	       Return name of zone the iface is bound to or empty string.

	   getZoneOfSource(s: source) → s
	       Return name of zone the source is bound to or empty string.

	   listIcmpTypes() → ao
	       List icmptypes objects paths.

	   listServices() → ao
	       List services objects paths.

	   listZones() → ao
	       List zones object paths.

       Signals
	   IcmpTypeAdded(s: icmptype)
	       Emitted when icmptype has been added.

	   ServiceAdded(s: service)
	       Emitted when service has been added.

	   ZoneAdded(s: zone)
	       Emitted when zone has been added.

       Properties
	   CleanupOnExit - s - (rw)
	       If firewalld stops, it cleans up all firewall rules. Setting
	       this option to no or false leaves the current firewall rules
	       untouched.

	   DefaultZone - s - (ro)
	       Default zone for connections or interfaces if the zone is not
	       selected or specified by NetworkManager, initscripts or command
	       line tool.

	   Lockdown - s - (ro)
	       If this property is enabled, firewall changes with the D-Bus
	       interface will be limited to applications that are listed in
	       the lockdown whitelist.

	   MinimalMark - i - (rw)
	       For some firewall settings several rules are needed in
	       different tables to be able to handle packets in the correct
	       way. To achieve that these packets are marked using the MARK
	       target. With the MinimalMark property a block of marks can be
	       reserved for private use; only marks over this value are used.

   org.fedoraproject.FirewallD1.config.direct
       Interface for permanent direct configuration firewalld.direct(5). For
       runtime direct configuration see org.fedoraproject.FirewallD1.direct
       interface.

       Methods
	   getSettings() → (a(sss)a(sssias)a(sas))
	       Get settings of permanent direct configuration.

	   update((a(sss)a(sssias)a(sas)): settings) → Nothing
	       Update permanent direct configuration with given settings.

       Signals
	   Updated()
	       Emitted when configuration has been updated.

   org.fedoraproject.FirewallD1.config.policies
       Interface for permanent lockdown-whitelist configuration
       firewalld.lockdown(5). For runtime configuration see
       org.fedoraproject.FirewallD1.policies interface.

       Methods
	   getLockdownWhitelist() → (asasasai)
	       Get settings of permanent lockdown-whitelist configuration.

	   setLockdownWhitelist((asasasai): settings) → Nothing
	       Set permanent lockdown-whitelist configuration to settings.

       Signals
	   LockdownWhitelistUpdated()
	       Emitted when permanent lockdown-whitelist configuration has
	       been updated.

   org.fedoraproject.FirewallD1.config.zone
       Interface for permanent zone configuration firewalld.zone(5).

       Methods
	   getSettings() → (sssbsasa(ss)asba(ssss)asasas)
	       Return permanent settings of a zone.

	   loadDefaults() → Nothing
	       Load default settings for built-in zone.

	   remove() → Nothing
	       Remove not built-in zone.

	   rename(s: name) → Nothing
	       Rename not built-in zone to name.

	   update((sssbsasa(ss)asba(ssss)asasas): settings) → Nothing
	       Update settings of zone to settings.

       Signals
	   Removed(s: name)
	       Emitted when zone with name has been removed.

	   Renamed(s: name)
	       Emitted when zone has been renamed to name.

	   Updated(s: name)
	       Emitted when zone with name has been updated.

       Properties
	   default - b - (ro)
	       True if build-in zone has default settings. False if it has
	       been modified. Always False for not build-in zones.

	   filename - s - (ro)
	       Name (including .xml extension) of file where the configuration
	       is stored.

	   name - s - (ro)
	       Name of zone.

	   path - s - (ro)
	       Path to directory where the zone configuration is stored.
	       Should be either /usr/lib/firewalld/zones or
	       /etc/firewalld/zones.

   org.fedoraproject.FirewallD1.config.service
       Interface for permanent service configuration firewalld.service(5).

       Methods
	   getSettings() → (sssa(ss)asa{ss})
	       Return permanent settings of a service.

	   loadDefaults() → Nothing
	       Load default settings for built-in service.

	   remove() → Nothing
	       Remove not built-in zone.

	   rename(s: name) → Nothing
	       Rename not built-in service to name.

	   update((sssa(ss)asa{ss}): settings) → Nothing
	       Update settings of service to settings.

       Signals
	   Removed(s: name)
	       Emitted when service with name has been removed.

	   Renamed(s: name)
	       Emitted when service has been renamed to name.

	   Updated(s: name)
	       Emitted when service with name has been updated.

       Properties
	   default - b - (ro)
	       True if build-in service has default settings. False if it has
	       been modified. Always False for not build-in services.

	   filename - s - (ro)
	       Name (including .xml extension) of file where the configuration
	       is stored.

	   name - s - (ro)
	       Name of service.

	   path - s - (ro)
	       Path to directory where the configuration is stored. Should be
	       either /usr/lib/firewalld/services or /etc/firewalld/services.

   org.fedoraproject.FirewallD1.config.icmptype
       Interface for permanent icmp type configuration firewalld.icmptype(5).

       Methods
	   getSettings() → (sssas)
	       Return permanent settings of a icmp type.

	   loadDefaults() → Nothing
	       Load default settings for built-in icmp type.

	   remove() → Nothing
	       Remove not built-in icmp type.

	   rename(s: name) → Nothing
	       Rename not built-in icmp type to name.

	   update((sssas): settings) → Nothing
	       Update settings of icmp type to settings.

       Signals
	   Removed(s: name)
	       Emitted when icmp type with name has been removed.

	   Renamed(s: name)
	       Emitted when icmp type has been renamed to name.

	   Updated(s: name)
	       Emitted when icmp type with name has been updated.

       Properties
	   default - b - (ro)
	       True if build-in icmp type has default settings. False if it
	       has been modified. Always False for not build-in zones.

	   filename - s - (ro)
	       Name (including .xml extension) of file where the configuration
	       is stored.

	   name - s - (ro)
	       Name of icmp type.

	   path - s - (ro)
	       Path to directory where the icmp type configuration is stored.
	       Should be either /usr/lib/firewalld/icmptypes or
	       /etc/firewalld/icmptypes.

SEE ALSO
       firewall-applet(1), firewalld(1), firewall-cmd(1), firewall-config(1),
       firewalld.conf(5), firewalld.direct(5), firewalld.icmptype(5),
       firewalld.lockdown-whitelist(5), firewall-offline-cmd(1),
       firewalld.richlanguage(5), firewalld.service(5), firewalld.zone(5),
       firewalld.zones(5)

NOTES
       firewalld home page at fedorahosted.org:
	   https://fedorahosted.org/firewalld/

       More documentation with examples:
	   http://fedoraproject.org/wiki/FirewallD

AUTHORS
       Thomas Woerner <twoerner@redhat.com>
	   Developer

       Jiri Popelka <jpopelka@redhat.com>
	   Developer

firewalld 0.3.10					     FIREWALLD.DBUS(5)
[top]

List of man pages available for OpenMandriva

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net