| services.opengfw.rules | Rules passed to OpenGFW. Example rules
|
| security.audit.rules | The ordered audit rules, with each string appearing as one line of the audit.rules file.
|
| services.opensnitch.rules | Declarative configuration of firewall rules
|
| boot.initrd.services.udev.rules | udev rules to include in the initrd
only
|
| systemd.tmpfiles.rules | Rules for creation, deletion and cleaning of volatile and temporary files
automatically
|
| services.vmalert.rules | A list of the given alerting or recording rules against configured "datasource.url" compatible with
Prometheus HTTP API for vmalert to execute
|
| programs.rush.rules | The rule statement configures a GNU Rush rule
|
| systemd.user.tmpfiles.rules | Global user rules for creation, deletion and cleaning of volatile and
temporary files automatically
|
| services.opengfw.rulesFile | Path to file containing OpenGFW rules.
|
| services.opengfw.rules.*.log | Whether to enable logging for the rule.
|
| services.opengfw.rules.*.name | Name of the rule.
|
| services.prometheus.rules | Alerting and/or Recording rules to evaluate at runtime.
|
| services.opengfw.rules.*.expr | Expr Language expression using analyzers and functions.
|
| services.firewalld.zones.<name>.rules | Rich rules for the zone.
|
| systemd.user.tmpfiles.users.<name>.rules | Per-user rules for creation, deletion and cleaning of volatile and
temporary files automatically
|
| services.usbguard.rules | The USBGuard daemon will load this as the policy rule set
|
| services.xserver.imwheel.rules | Window class translation rules.
/etc/X11/imwheelrc is generated based on this config
which means this config is global for all users
|
| services.opengfw.rules.*.action | Action of the rule. Supported actions
|
| services.ananicy.rulesProvider | Which package to copy default rules,types,cgroups from.
|
| services.ndppd.proxies.<name>.rules | This is a rule that the target address is to match against
|
| services.ndppd.proxies.<name>.rules.<name>.network | This is the target address is to match against
|
| services.vmalert.instances.<name>.rules | A list of the given alerting or recording rules against configured "datasource.url" compatible with
Prometheus HTTP API for vmalert to execute
|
| services.opengfw.rules.*.modifier | Modification of specified packets when using the modify action. Available modifiers
|
| services.opengfw.rules.*.modifier.name | Name of the modifier.
|
| services.opengfw.rules.*.modifier.args | Arguments passed to the modifier.
|
| services.networkd-dispatcher.rules | Declarative configuration of networkd-dispatcher rules
|
| services.grafana.provision.alerting.rules.path | Path to YAML rules configuration
|
| services.ndppd.proxies.<name>.rules.<name>.interface | Interface to use when method is iface.
|
| services.ndppd.proxies.<name>.rules.<name>.method | static: Immediately answer any Neighbor Solicitation Messages
(if they match the IP rule).
iface: Forward the Neighbor Solicitation Message through the specified
interface and only respond if a matching Neighbor Advertisement
Message is received.
auto: Same as iface, but instead of manually specifying the outgoing
interface, check for a matching route in /proc/net/ipv6_route.
|
| services.grafana.provision.alerting.rules.settings | Grafana rules configuration in Nix
|
| services.networkd-dispatcher.rules.<name>.script | Shell commands executed on specified operational states.
|
| services.opengfw.settings.ruleset | The path to load specific local geoip/geosite db files
|
| services.networkd-dispatcher.rules.<name>.onState | List of names of the systemd-networkd operational states which
should trigger the script
|
| networking.nftables.rulesetFile | The ruleset file to be used with nftables
|
| services.grafana.provision.alerting.rules.settings.groups | List of rule groups to import or update.
|
| services.grafana.provision.alerting.rules.settings.groups.*.name | Name of the rule group
|
| services.grafana.provision.alerting.rules.settings.apiVersion | Config file version.
|
| services.grafana.provision.alerting.rules.settings.deleteRules | List of alert rule UIDs that should be deleted.
|
| services.grafana.provision.alerting.rules.settings.deleteRules.*.uid | Unique identifier for the rule
|
| services.grafana.provision.alerting.rules.settings.deleteRules.*.orgId | Organization ID, default = 1
|
| services.grafana.provision.alerting.rules.settings.groups.*.folder | Name of the folder the rule group will be stored in
|
| services.anubis.defaultOptions.policy.extraBots | Additional bot rules appended to the policy
|
| services.anubis.instances.<name>.policy.extraBots | Additional bot rules appended to the policy
|
| services.grafana.provision.alerting.rules.settings.groups.*.interval | Interval that the rule group should be evaluated at
|
| services.firewalld.settings.LogDenied | Add logging rules right before reject and drop rules in the INPUT, FORWARD and OUTPUT chains for the default rules and also final reject and drop rules in zones for the configured link-layer packet type.
|
| services.udev.extraRules | Additional udev rules
|
| services.opengfw.settings.ruleset.geoip | Path to geoip.dat.
|
| networking.nftables.ruleset | The ruleset to be used with nftables
|
| services.opengfw.settings.ruleset.geosite | Path to geosite.dat.
|
| programs.pay-respects.runtimeRules | List of rules to be added to /etc/xdg/pay-respects/rules.
pay-respects will read the contents of these generated rules to recommend command corrections
|
| security.sudo.extraRules | Define specific rules to be in the sudoers file
|
| security.sudo-rs.extraRules | Define specific rules to be in the sudoers file
|
| services.mediatomb.openFirewall | If false (the default), this is up to the user to declare the firewall rules
|
| security.doas.extraRules | Define specific rules to be set in the
/etc/doas.conf file
|
| services.vmalert.instances.<name>.settings.rule | Path to the files with alerting and/or recording rules.
|
| services.vmalert.settings.rule | Path to the files with alerting and/or recording rules.
Consider using the services.vmalert.rules option as a convenient alternative for declaring rules
directly in the nix language.
|
| services.thanos.query.query.replica-labels | Labels to treat as a replica indicator along which data is
deduplicated
|
| systemd.tmpfiles.packages | List of packages containing systemd-tmpfiles rules
|
| hardware.uni-sync.enable | Whether to enable udev rules and software for Lian Li Uni Controllers.
|
| services.udev.path | Packages added to the PATH environment variable when
executing programs from Udev rules.
coreutils, gnu{sed,grep}, util-linux and config.systemd.package are
automatically included.
|
| hardware.ledger.enable | Whether to enable udev rules for Ledger devices.
|
| power.ups.schedulerRules | File which contains the rules to handle UPS events.
|
| services.crowdsec.hub | Hub collections, parsers, AppSec rules, etc.
|
| services.lvm.enable | Whether to enable lvm2.
The lvm2 package contains device-mapper udev rules and without those tools like cryptsetup do not fully function!
|
| services.cloudflared.tunnels.<name>.ingress | Ingress rules
|
| programs.light.enable | Whether to install Light backlight control command
and udev rules granting access to members of the "video" group.
|
| hardware.nfc-nci.enable | Whether to enable PN5xx kernel module with udev rules, libnfc-nci userland, and optional ifdnfc-nci PC/SC driver.
|
| services.picom.wintypes | Rules for specific window types.
|
| services.ndppd.network | Network that we proxy.
(Legacy option, use services.ndppd.proxies.<interface>.rules.<network> instead)
|
| hardware.libftdi.enable | Whether to enable udev rules for devices supported by libftdi.
|
| services.ferm.enable | Whether to enable Ferm Firewall.
Warning: Enabling this service WILL disable the existing NixOS
firewall! Default firewall rules provided by packages are not
considered at the moment.
|
| services.ndppd.proxies | This sets up a listener, that will listen for any Neighbor Solicitation
messages, and respond to them according to a set of rules.
|
| services.miredo.bindPort | Depending on the local firewall/NAT rules, you might need to force
Miredo to use a fixed UDP port and or IPv4 address.
|
| services.udev.packages | List of packages containing udev rules
|
| services.postgresql.authentication | Defines how users authenticate themselves to the server
|
| hardware.bladeRF.enable | Enables udev rules for BladeRF devices
|
| hardware.saleae-logic.enable | Whether to enable udev rules for Saleae Logic devices.
|
| services.ananicy.extraRules | Rules to write in 'nixRules.rules'
|
| hardware.cpu.x86.msr.enable | Whether to enable the msr (Model-Specific Registers) kernel module and configure udev rules for its devices (usually /dev/cpu/*/msr).
|
| security.polkit.extraConfig | Any polkit rules to be added to config (in JavaScript ;-)
|
| services.picom.opacityRules | Rules that control the opacity of windows, in format PERCENT:PATTERN.
|
| services.openssh.authorizedKeysFiles | Specify the rules for which files to read on the host
|
| hardware.nitrokey.enable | Enables udev rules for Nitrokey devices.
|
| services.rspamd.localLuaRules | Path of file to link to /etc/rspamd/rspamd.local.lua for local
rules written in Lua
|
| services.logcheck.ignore | This option defines extra ignore rules.
|
| services.anubis.defaultOptions.policy.useDefaultBotRules | Whether to include Anubis's default bot detection rules via the
(data)/meta/default-config.yaml import
|
| services.anubis.instances.<name>.policy.useDefaultBotRules | Whether to include Anubis's default bot detection rules via the
(data)/meta/default-config.yaml import
|
| programs.regreet.extraCss | Extra CSS rules to apply on top of the GTK theme
|
| systemd.user.tmpfiles.users | Per-user rules for creation, deletion and cleaning of volatile and
temporary files automatically.
|
| hardware.ubertooth.group | Group for Ubertooth's udev rules.
|
| hardware.glasgow.enable | Enables Glasgow udev rules and ensures 'plugdev' group exists
|
| programs.minipro.enable | Whether to enable minipro and its udev rules
|
| services.vmalert.enable | Wether to enable VictoriaMetrics's vmalert.
vmalert evaluates alerting and recording rules against a data source, sends notifications via Alertmanager.
|
| services.crowdsec.hub.appSecRules | List of hub appsec rules to install
|
| nix.firewall.allowLoopback | Whether to allow traffic on the loopback interface
|
| services.logcheck.ignoreCron | This option defines extra ignore rules for cronjobs.
|
| services.logcheck.extraRulesDirs | Directories with extra rules.
|
| nix.firewall.extraNftablesRules | Extra nftables rules to prepend to the generated ones
|
| services.opengfw.pcapReplay | Path to PCAP replay file
|
| hardware.rtl-sdr.enable | Enables rtl-sdr udev rules, ensures 'plugdev' group exists, and blacklists DVB kernel modules
|
| programs.flashrom.enable | Installs flashrom and configures udev rules for programmers
used by flashrom
|
| hardware.ubertooth.enable | Whether to enable Ubertooth software and its udev rules.
|
| services.miredo.bindAddress | Depending on the local firewall/NAT rules, you might need to force
Miredo to use a fixed UDP port and or IPv4 address.
|
| services.thanos.rule.enable | Whether to enable the Thanos ruler service which evaluates Prometheus rules against given Query nodes, exposing Store API and storing old blocks in bucket.
|
| programs.quark-goldleaf.enable | Whether to enable quark-goldleaf with udev rules applied.
|
| security.sudo.defaultOptions | Options used for the default rules, granting root and the
wheel group permission to run any command as any user.
|
| programs.flexoptix-app.enable | Whether to enable FLEXOPTIX app + udev rules.
|
| services.ndppd.interface | Interface which is on link-level with router.
(Legacy option, use services.ndppd.proxies.<interface>.rules.<network> instead)
|
| security.sudo-rs.defaultOptions | Options used for the default rules, granting root and the
wheel group permission to run any command as any user.
|
| programs.mouse-actions.enable | Whether to install and set up mouse-actions and it's udev rules
|
| programs.ns-usbloader.enable | Whether to enable ns-usbloader application with udev rules applied.
|
| hardware.hackrf.enable | Enables hackrf udev rules and ensures 'plugdev' group exists
|
| programs.flashprog.enable | Whether to enable configuring flashprog udev rules and
installing flashprog as system package
.
|
| hardware.steam-hardware.enable | Enable udev rules for Steam hardware such as the Steam Controller, other supported controllers and the HTC Vive
|
| services.sdrplayApi.enable | Whether to enable the SDRplay API service and udev rules.
To enable integration with SoapySDR and GUI applications like gqrx create an overlay containing
soapysdr-with-plugins = super.soapysdr.override { extraPackages = [ super.soapysdrplay ]; };
|
| hardware.sheep_net.enable | Enables sheep_net udev rules, ensures 'sheep_net' group exists, and adds
sheep-net to boot.kernelModules and boot.extraModulePackages
|
| services.prometheus.ruleFiles | Any additional rules files to include in this configuration.
|
| programs.feedbackd.enable | Whether to enable the feedbackd D-BUS service and udev rules
|
| services.suricata.disabledRules | List of rules that should be disabled.
|
| services.dokuwiki.sites.<name>.aclFile | Location of the dokuwiki acl rules
|
| services.suricata.settings.vars | Variables to be used within the suricata rules.
|
| hardware.kryoflux.enable | Enables kryoflux udev rules, ensures 'floppy' group exists
|
| services.usbguard.deviceRulesWithPort | Generate device specific rules including the "via-port" attribute.
|
| hardware.gpgSmartcards.enable | Whether to enable udev rules for gnupg smart cards.
|
| services.graphite.carbon.relayRules | Relay rules are used to send certain metrics to a certain backend.
|
| services.firewalld.zones.<name>.target | Action for packets that doesn't match any rules.
|
| boot.initrd.services.udev.packages | This will only be used when systemd is used in stage 1.
List of packages containing udev rules that will be copied to stage 1
|
| services.shorewall.enable | Whether to enable Shorewall IPv4 Firewall.
Enabling this service WILL disable the existing NixOS
firewall! Default firewall rules provided by packages are not
considered at the moment.
|
| systemd.tmpfiles.settings | Declare systemd-tmpfiles rules to create, delete, and clean up volatile
and temporary files and directories
|
| hardware.libjaylink.enable | Whether to enable udev rules for devices supported by libjaylink
|
| programs.dmrconfig.enable | Whether to configure system to enable use of dmrconfig
|
| hardware.flipperzero.enable | Whether to enable udev rules and software for Flipper Zero devices.
|
| security.doas.extraRules.*.setEnv | Keep or set the specified variables
|
| boot.initrd.services.udev.binPackages | This will only be used when systemd is used in stage 1.
Packages to search for binaries that are referenced by the udev rules in stage 1
|
| services.input-remapper.enableUdevRules | Whether to enable udev rules added by input-remapper to handle hotplugged devices
|
| hardware.keyboard.zsa.enable | Whether to enable udev rules for keyboards from ZSA like the ErgoDox EZ, Planck EZ and Moonlander Mark I
|
| services.earlyoom.killHook | An absolute path to an executable to be run for each process killed
|
| services.suricata.settings.rule-files | Files to load suricata-update managed rules, relative to 'default-rule-path'.
|
| services.shorewall6.enable | Whether to enable Shorewall IPv6 Firewall.
Enabling this service WILL disable the existing NixOS
firewall! Default firewall rules provided by packages are not
considered at the moment.
|
| nix.firewall.allowPrivateNetworks | Whether to allow traffic to local networks
|
| services.pcscd.ignoreReaderNames | List of reader name patterns for the PCSC daemon to ignore
|
| hardware.block.scheduler | Assign block I/O scheduler by device name pattern
|
| networking.firewall.extraInputRules | Additional nftables rules to be appended to the input-allow
chain
|
| services.ndppd.proxies.<name>.interface | Listen for any Neighbor Solicitation messages on this interface,
and respond to them according to a set of rules
|
| boot.initrd.systemd.tmpfiles.settings | Similar to systemd.tmpfiles.settings but the rules are
only applied by systemd-tmpfiles before initrd-switch-root.target
|
| services.nextcloud.webfinger | Enable this option if you plan on using the webfinger plugin
|
| hardware.keyboard.qmk.keychronSupport | Whether to enable udev rules for keychron QMK based keyboards.
|
| services.mirakurun.allowSmartCardAccess | Install polkit rules to allow Mirakurun to access smart card readers
which is commonly used along with tuner devices.
|
| programs.wireshark.usbmon.enable | Whether to allow users in the 'wireshark' group to capture USB traffic
|
| services.dovecot2.imapsieve.mailbox | Configure Sieve filtering rules on IMAP actions
|
| networking.jool.siit.<name>.framework | The framework to use for attaching Jool's translation to the exist
kernel packet processing rules
|
| networking.vswitches.<name>.openFlowRules | OpenFlow rules to insert into the Open vSwitch
|
| networking.jool.nat64.<name>.framework | The framework to use for attaching Jool's translation to the exist
kernel packet processing rules
|
| services.suricata.settings.default-rule-path | Path in which suricata-update managed rules are stored by default.
|
| services.vmalert.instances.<name>.enable | Wether to enable VictoriaMetrics's vmalert.
vmalert evaluates alerting and recording rules against a data source, sends notifications via Alertmanager.
|
| services.reaction.runAsRoot | Whether to run reaction as root
|
| services.firewalld.settings.FlushAllOnReload | Whether to flush all runtime rules on a reload.
|
| networking.firewall.extraForwardRules | Additional nftables rules to be appended to the forward-allow
chain
|
| programs.tsmClient.servers | Server definitions ("stanzas")
for the client system-options file
|
| services.firewalld.settings.CleanupOnExit | Whether to clean up firewall rules when firewalld stops.
|
| services.logrotate.settings.<name>.files | Single or list of files for which rules are defined
|
| services.nebula.networks.<name>.firewall.inbound | Firewall rules for inbound traffic.
|
| services.tinyproxy.settings.Filter | Tinyproxy supports filtering of web sites based on URLs or domains
|
| hardware.digitalbitbox.enable | Enables udev rules for Digital Bitbox devices.
|
| systemd.network.networks.<name>.routingPolicyRules | A list of routing policy rules sections to be added to the unit
|
| services.trafficserver.remap | URL remapping rules used by Traffic Server
|
| services.trafficserver.cache | Caching rules that overrule the origin's caching policy
|
| services.opensnitch.settings.Rules.Path | Path to the directory where firewall rules can be found and will
get stored by the NixOS module.
|
| security.pki.useCompatibleBundle | Whether to enable usage of a compatibility bundle
|
| services.nebula.networks.<name>.firewall.outbound | Firewall rules for outbound traffic.
|
| hardware.digitalbitbox.package | The digitalbitbox package to use
|
| programs.digitalbitbox.package | The digitalbitbox package to use
|
| networking.firewall.extraReversePathFilterRules | Additional nftables rules to be appended to the rpfilter-allow
chain
|
| networking.getaddrinfo.scopev4 | Adds custom rules to the IPv4 scope table
|
| services.uvcvideo.dynctrl.packages | List of packages containing uvcvideo dynamic controls
rules
|
| services.crossfire-server.configFiles | Text to append to the corresponding configuration files
|
| services.firezone.server.settingsSecret | This is a convenience option which allows you to set secret values for
environment variables by specifying a file which will contain the value
at runtime
|
| services.prometheus.exporters.nut.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nut.openFirewall is true.
|
| services.prometheus.exporters.lnd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.lnd.openFirewall is true.
|
| services.prometheus.exporters.sql.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.sql.openFirewall is true.
|
| services.prometheus.exporters.frr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.frr.openFirewall is true.
|
| services.prometheus.exporters.pve.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.pve.openFirewall is true.
|
| services.prometheus.exporters.zfs.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.zfs.openFirewall is true.
|
| services.prometheus.exporters.kea.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.kea.openFirewall is true.
|
| services.firewalld.settings.NftablesTableOwner | If enabled, the generated nftables rule set will be owned exclusively by firewalld
|
| services.prometheus.exporters.nats.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nats.openFirewall is true.
|
| services.prometheus.exporters.bind.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.bind.openFirewall is true.
|
| services.prometheus.exporters.ping.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.ping.openFirewall is true.
|
| services.prometheus.exporters.flow.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.flow.openFirewall is true.
|
| services.prometheus.exporters.json.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.json.openFirewall is true.
|
| services.prometheus.exporters.ipmi.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.ipmi.openFirewall is true.
|
| services.prometheus.exporters.bird.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.bird.openFirewall is true.
|
| services.prometheus.exporters.mail.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.mail.openFirewall is true.
|
| services.prometheus.exporters.ebpf.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.ebpf.openFirewall is true.
|
| services.prometheus.exporters.knot.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.knot.openFirewall is true.
|
| services.prometheus.exporters.node.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.node.openFirewall is true.
|
| services.prometheus.exporters.snmp.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.snmp.openFirewall is true.
|
| services.prometheus.exporters.mqtt.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.mqtt.openFirewall is true.
|
| services.prometheus.exporters.php-fpm.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.php-fpm.openFirewall is true.
|
| services.prometheus.exporters.nginx.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nginx.openFirewall is true.
|
| services.prometheus.exporters.redis.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.redis.openFirewall is true.
|
| services.prometheus.exporters.kafka.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.kafka.openFirewall is true.
|
| services.prometheus.exporters.idrac.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.idrac.openFirewall is true.
|
| services.prometheus.exporters.v2ray.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.v2ray.openFirewall is true.
|
| services.prometheus.exporters.jitsi.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.jitsi.openFirewall is true.
|
| services.prometheus.exporters.fritz.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.fritz.openFirewall is true.
|
| services.prometheus.exporters.dmarc.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.dmarc.openFirewall is true.
|
| services.firewalld.settings.FirewallBackend | The firewall backend implementation
|
| virtualisation.restrictNetwork | If this option is enabled, the guest will be isolated, i.e. it will
not be able to contact the host and no guest IP packets will be
routed over the host to the outside
|
| services.armagetronad.servers.<name>.settings | Armagetron Advanced server rules configuration
|
| services.prometheus.exporters.node-cert.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.node-cert.openFirewall is true.
|
| services.prometheus.exporters.fastly.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.fastly.openFirewall is true.
|
| services.prometheus.exporters.shelly.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.shelly.openFirewall is true.
|
| services.prometheus.exporters.statsd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.statsd.openFirewall is true.
|
| services.prometheus.exporters.domain.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.domain.openFirewall is true.
|
| services.prometheus.exporters.tibber.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.tibber.openFirewall is true.
|
| services.prometheus.exporters.rspamd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.rspamd.openFirewall is true.
|
| services.prometheus.exporters.deluge.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.deluge.openFirewall is true.
|
| services.prometheus.exporters.chrony.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.chrony.openFirewall is true.
|
| services.prometheus.exporters.pihole.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.pihole.openFirewall is true.
|
| services.prometheus.exporters.script.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.script.openFirewall is true.
|
| services.prometheus.exporters.dnssec.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.dnssec.openFirewall is true.
|
| services.prometheus.exporters.restic.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.restic.openFirewall is true.
|
| services.prometheus.exporters.mysqld.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.mysqld.openFirewall is true.
|
| networking.interfaces.<name>.proxyARP | Turn on proxy_arp for this device
|
| services.prometheus.exporters.nvidia-gpu.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nvidia-gpu.openFirewall is true.
|
| services.firewalld.settings.StrictForwardPorts | If enabled, the generated destination NAT (DNAT) rules will NOT accept traffic that was DNAT'd by other entities, e.g. docker
|
| services.prometheus.exporters.bitcoin.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.bitcoin.openFirewall is true.
|
| services.prometheus.exporters.dnsmasq.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.dnsmasq.openFirewall is true.
|
| services.prometheus.exporters.unbound.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.unbound.openFirewall is true.
|
| services.prometheus.exporters.apcupsd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.apcupsd.openFirewall is true.
|
| services.prometheus.exporters.libvirt.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.libvirt.openFirewall is true.
|
| services.prometheus.exporters.rtl_433.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.rtl_433.openFirewall is true.
|
| services.prometheus.exporters.varnish.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.varnish.openFirewall is true.
|
| services.prometheus.exporters.postfix.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.postfix.openFirewall is true.
|
| services.prometheus.exporters.sabnzbd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.sabnzbd.openFirewall is true.
|
| services.prometheus.exporters.ecoflow.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.ecoflow.openFirewall is true.
|
| services.prometheus.exporters.klipper.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.klipper.openFirewall is true.
|
| services.prometheus.exporters.systemd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.systemd.openFirewall is true.
|
| services.prometheus.exporters.dovecot.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.dovecot.openFirewall is true.
|
| services.prometheus.exporters.mongodb.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.mongodb.openFirewall is true.
|
| services.prometheus.exporters.process.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.process.openFirewall is true.
|
| virtualisation.libvirtd.firewallBackend | The backend used to setup virtual network firewall rules.
|
| hardware.opentabletdriver.enable | Enable OpenTabletDriver udev rules, user service and blacklist kernel
modules known to conflict with OpenTabletDriver.
|
| services.prometheus.exporters.py-air-control.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.py-air-control.openFirewall is true.
|
| services.prometheus.exporters.unpoller.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.unpoller.openFirewall is true.
|
| services.prometheus.exporters.blackbox.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.blackbox.openFirewall is true.
|
| services.prometheus.exporters.influxdb.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.influxdb.openFirewall is true.
|
| services.prometheus.exporters.collectd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.collectd.openFirewall is true.
|
| services.prometheus.exporters.mikrotik.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.mikrotik.openFirewall is true.
|
| services.prometheus.exporters.fritzbox.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.fritzbox.openFirewall is true.
|
| services.prometheus.exporters.graphite.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.graphite.openFirewall is true.
|
| services.prometheus.exporters.nginxlog.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nginxlog.openFirewall is true.
|
| services.prometheus.exporters.mailman3.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.mailman3.openFirewall is true.
|
| services.prometheus.exporters.postgres.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.postgres.openFirewall is true.
|
| services.prometheus.exporters.keylight.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.keylight.openFirewall is true.
|
| services.prometheus.exporters.opnsense.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.opnsense.openFirewall is true.
|
| services.prometheus.exporters.smartctl.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.smartctl.openFirewall is true.
|
| services.prometheus.exporters.imap-mailstat.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.imap-mailstat.openFirewall is true.
|
| services.prometheus.exporters.pgbouncer.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.pgbouncer.openFirewall is true.
|
| services.prometheus.exporters.nextcloud.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nextcloud.openFirewall is true.
|
| services.prometheus.exporters.surfboard.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.surfboard.openFirewall is true.
|
| services.prometheus.exporters.smokeping.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.smokeping.openFirewall is true.
|
| services.prometheus.exporters.wireguard.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.wireguard.openFirewall is true.
|
| services.prometheus.exporters.rasdaemon.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.rasdaemon.openFirewall is true.
|
| services.prometheus.exporters.borgmatic.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.borgmatic.openFirewall is true.
|
| services.prometheus.exporters.tailscale.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.tailscale.openFirewall is true.
|
| services.prometheus.exporters.junos-czerwonk.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.junos-czerwonk.openFirewall is true.
|
| services.prometheus.exporters.scaphandre.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.scaphandre.openFirewall is true.
|
| services.prometheus.exporters.storagebox.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.storagebox.openFirewall is true.
|
| services.prometheus.exporters.buildkite-agent.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.buildkite-agent.openFirewall is true.
|
| services.prometheus.exporters.exportarr-sonarr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.exportarr-sonarr.openFirewall is true.
|
| services.prometheus.exporters.exportarr-lidarr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.exportarr-lidarr.openFirewall is true.
|
| services.prometheus.exporters.exportarr-bazarr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.exportarr-bazarr.openFirewall is true.
|
| services.prometheus.exporters.exportarr-radarr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.exportarr-radarr.openFirewall is true.
|
| services.prometheus.exporters.exportarr-readarr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.exportarr-readarr.openFirewall is true.
|
| services.prometheus.exporters.artifactory.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.artifactory.openFirewall is true.
|
| services.prometheus.exporters.exportarr-prowlarr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.exportarr-prowlarr.openFirewall is true.
|
| services.prometheus.exporters.modemmanager.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.modemmanager.openFirewall is true.
|
| services.strongswan-swanctl.swanctl.connections.<name>.local | Section for a local authentication round
|
| services.hostapd.radios.<name>.networks.<name>.authentication.wpaPasswordFile | Sets the password for WPA-PSK
|
| services.postfix.settings.main.recipient_delimiter | Set of characters used as the delimiters for address extensions
|
| services.prometheus.globalConfig.evaluation_interval | How frequently to evaluate rules by default
|
| services.hostapd.radios.<name>.networks.<name>.authentication.saePasswordsFile | Sets the password for WPA3-SAE
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_out | Netfilter mark and mask for output traffic
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_in | Netfilter mark and mask for input traffic
|
| services.hostapd.radios.<name>.networks.<name>.authentication.wpaPskFile | Sets the password(s) for WPA-PSK
|
| networking.nftables.preCheckRuleset | This script gets run before the ruleset is checked
|
| services.usbguard.ruleFile | This tells the USBGuard daemon which file to load as policy rule set
|
| networking.nftables.checkRuleset | Run nft check on the ruleset to spot syntax errors during build
|
| services.bluemap.defaultWorld | The world used by the default map ruleset
|
| networking.nftables.tables | Tables to be added to ruleset
|
| networking.nftables.flushRuleset | Whether to enable flushing the entire ruleset on each reload.
|
| networking.nftables.checkRulesetRedirects | Set of paths that should be intercepted and rewritten while checking the ruleset
using pkgs.buildPackages.libredirect.
|