'\" t .\" Title: firewalld.policy-sets .\" Author: Thomas Woerner .\" Generator: DocBook XSL Stylesheets vsnapshot .\" Date: .\" Manual: Firewalld Policy Sets .\" Source: firewalld 2.4.0 .\" Language: English .\" .TH "FIREWALLD\&.POLICY\-" "5" "" "firewalld 2.4.0" "Firewalld Policy Sets" .\" ----------------------------------------------------------------- .\" * Define some portability stuff .\" ----------------------------------------------------------------- .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ .\" http://bugs.debian.org/507673 .\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ .ie \n(.g .ds Aq \(aq .el .ds Aq ' .\" ----------------------------------------------------------------- .\" * set default formatting .\" ----------------------------------------------------------------- .\" disable hyphenation .nh .\" disable justification (adjust text to left margin only) .ad l .\" ----------------------------------------------------------------- .\" * MAIN CONTENT STARTS HERE * .\" ----------------------------------------------------------------- .SH "NAME" firewalld.policy-sets \- Policy Sets .SH "DESCRIPTION" .SS "What Are Policy Sets?" .PP Policy sets are collections of policies that serve as starting configuration for specific use cases, e\&.g\&. a home router\&. They provide an easy way to get started\&. Users may then fine tune the configuration for their environment\&. Every policy set has a dedicated man page to explain its use case\&. .PP All policy sets shipped by firewalld are administratively disabled by default\&. Using them is a matter of adding your interfaces to zones and removing the disable\&. .SS "Enabling a Policy Set" .PP Below is a complete example for using the gateway policy set\&. In this example: eth0 is the LAN interface, and eth1 is the uplink to the internet\&. .sp .if n \{\ .RS 4 .\} .nf # firewall\-cmd \-\-permanent \-\-zone internal eth0 # firewall\-cmd \-\-permanent \-\-zone external eth1 # firewall\-cmd \-\-permanent \-\-policy\-set gateway \-\-remove\-disable # firewall\-cmd \-\-reload .fi .if n \{\ .RE .\} .SS "Enabling Multiple Policy Sets" .PP Policy sets are guaranteed to interoperate\&. Multiple policy sets may be enabled simultaneously\&. .SS "Existing Policy Sets" .PP gateway .RS 4 Provides basic functionality for a gateway, e\&.g\&. a home router\&. See \fBfirewalld.policy-set-gateway\fR(5)\&. .RE .SH "SEE ALSO" \fBfirewall-applet\fR(1), \fBfirewalld\fR(1), \fBfirewall-cmd\fR(1), \fBfirewall-config\fR(1), \fBfirewalld.conf\fR(5), \fBfirewalld.direct\fR(5), \fBfirewalld.dbus\fR(5), \fBfirewalld.icmptype\fR(5), \fBfirewall-offline-cmd\fR(1), \fBfirewalld.richlanguage\fR(5), \fBfirewalld.service\fR(5), \fBfirewalld.zone\fR(5), \fBfirewalld.zones\fR(5), \fBfirewalld.policy\fR(5), \fBfirewalld.policies\fR(5), \fBfirewalld.ipset\fR(5), \fBfirewalld.helper\fR(5) .SH "NOTES" .PP firewalld home page: .RS 4 \m[blue]\fB\%http://firewalld.org\fR\m[] .RE .SH "AUTHORS" .PP \fBThomas Woerner\fR <\&twoerner@redhat\&.com\&> .RS 4 Developer .RE .PP \fBJiri Popelka\fR <\&jpopelka@redhat\&.com\&> .RS 4 Developer .RE .PP \fBEric Garver\fR <\&eric@garver\&.life\&> .RS 4 Developer .RE