| Server IP : 172.67.206.42 / Your IP : 104.23.197.33 Web Server : Apache System : Linux server.localhost.com 6.8.0-85-generic #85-Ubuntu SMP PREEMPT_DYNAMIC Thu Sep 18 15:26:59 UTC 2025 x86_64 User : pahana ( 1029) PHP Version : 7.4.33 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare, MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : OFF Directory : /usr/lib/python3/dist-packages/firewall/core/ |
Upload File : |
# SPDX-License-Identifier: GPL-2.0-or-later
#
# Copyright (C) 2011-2016 Red Hat, Inc.
#
# Authors:
# Thomas Woerner <[email protected]>
"""Base firewall settings"""
DEFAULT_ZONE_TARGET = "{chain}_{zone}"
DEFAULT_POLICY_TARGET = "CONTINUE"
DEFAULT_POLICY_PRIORITY = -1
DEFAULT_ZONE_PRIORITY = 0
ZONE_TARGETS = ["ACCEPT", "%%REJECT%%", "DROP", DEFAULT_ZONE_TARGET, "default"]
POLICY_TARGETS = ["ACCEPT", "REJECT", "DROP", "CONTINUE"]
SHORTCUTS = {
"PREROUTING": "PRE",
"POSTROUTING": "POST",
"INPUT": "IN",
"FORWARD": "FWD",
"OUTPUT": "OUT",
}
REJECT_TYPES = {
"ipv4": [
"icmp-host-prohibited",
"host-prohib",
"icmp-net-unreachable",
"net-unreach",
"icmp-host-unreachable",
"host-unreach",
"icmp-port-unreachable",
"port-unreach",
"icmp-proto-unreachable",
"proto-unreach",
"icmp-net-prohibited",
"net-prohib",
"tcp-reset",
"tcp-rst",
"icmp-admin-prohibited",
"admin-prohib",
],
"ipv6": [
"icmp6-adm-prohibited",
"adm-prohibited",
"icmp6-no-route",
"no-route",
"icmp6-addr-unreachable",
"addr-unreach",
"icmp6-port-unreachable",
"port-unreach",
"tcp-reset",
],
}
# ipset types that can be used as a source in zones
# The match-set option will be src or src,src according to the
# dimension of the ipset.
SOURCE_IPSET_TYPES = [
"hash:ip",
"hash:ip,port",
"hash:ip,mark",
"hash:net",
"hash:net,port",
"hash:net,iface",
"hash:mac",
]