summary refs log tree commit diff
path: root/nixos/doc/manual/from_md/configuration/firewall.section.xml
blob: 24c19bb1c66d75300399178eee08abc4a5cc20c6 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
<section xmlns="http://docbook.org/ns/docbook" xmlns:xlink="http://www.w3.org/1999/xlink" xml:id="sec-firewall">
  <title>Firewall</title>
  <para>
    NixOS has a simple stateful firewall that blocks incoming
    connections and other unexpected packets. The firewall applies to
    both IPv4 and IPv6 traffic. It is enabled by default. It can be
    disabled as follows:
  </para>
  <programlisting language="bash">
networking.firewall.enable = false;
</programlisting>
  <para>
    If the firewall is enabled, you can open specific TCP ports to the
    outside world:
  </para>
  <programlisting language="bash">
networking.firewall.allowedTCPPorts = [ 80 443 ];
</programlisting>
  <para>
    Note that TCP port 22 (ssh) is opened automatically if the SSH
    daemon is enabled
    (<literal>services.openssh.enable = true</literal>). UDP ports can
    be opened through
    <xref linkend="opt-networking.firewall.allowedUDPPorts" />.
  </para>
  <para>
    To open ranges of TCP ports:
  </para>
  <programlisting language="bash">
networking.firewall.allowedTCPPortRanges = [
  { from = 4000; to = 4007; }
  { from = 8000; to = 8010; }
];
</programlisting>
  <para>
    Similarly, UDP port ranges can be opened through
    <xref linkend="opt-networking.firewall.allowedUDPPortRanges" />.
  </para>
</section>