GSP
Quick Navigator

Search Site

Unix VPS
A - Starter
B - Basic
C - Preferred
D - Commercial
MPS - Dedicated
Previous VPSs
* Sign Up! *

Support
Contact Us
Online Help
Handbooks
Domain Status
Man Pages

FAQ
Virtual Servers
Pricing
Billing
Technical

Network
Facilities
Connectivity
Topology Map

Miscellaneous
Server Agreement
Year 2038
Credits
 

USA Flag

 

 

Man Pages
APPJAIL-NAT(1) FreeBSD General Commands Manual APPJAIL-NAT(1)

appjail-natMapping local IPv4 address to an external IPv4 address

appjail nat add jail -n network [-e interface] [-I address] [-l [-|options]] [-o interface] jail

appjail nat add jail -N -n network [-e interface] [-o interface] jail

appjail nat get jail [-eHIpt] -n network jail [keyword ...]

appjail nat list jail [-eHIpt] [-n network] jail [keyword ...]

appjail nat off jail jail

appjail nat on jail jail

appjail nat remove jail -n network jail

appjail nat status jail jail


appjail nat add network [-e interface] [-I address] [-l [-|options]] [-o interface] network

appjail nat boot [off|on] network network

appjail nat get network [-eHIpt] network [keyword ...]

appjail nat list network [-eHIpt] [-n network] [keyword ...]

appjail nat off network network

appjail nat on network network

appjail nat remove network network

appjail nat status network network

The utility performs NAT for jails and networks. It uses virtual networks to do this, that is, it performs NAT to allow jails to communicate with the outside. The difference between per-jail NAT and per-network NAT is how it is applied: in the first case, NAT is only applied to one jail and the second case is applied to the entire network, which includes all jails that have an IPv4 address assigned from the network the NAT rule is applied. For those cases where you want to apply a per-network NAT rule but do not want to apply NAT to a particular jail, you can apply a rule known as (NO)NAT.

The options are as follows:

jail -n network [-e interface] [-I address] [-l [-|options]] [-o interface] jail
Configure a new rule to perform NAT.
network
Use the IPv4 address assigned from this network address pool as the local IPv4 address.
interface
Interface to obtain the external IPv4 address. If not set, the interface specified by the parameter is used.
address
Use address as the external IPv4 address instead of the first matching IPv4 address. The IPv4 address must exist on the specified external interface before executing this command.
[-|options]
Firewall-specific logging options. Use a minus sign to enable logging, but without options.
interface
Apply rules to packets coming in on, or going out through, this interface. If not set, the interface specified by the parameter is used.
jail -N -n network [-e interface] [-o interface] jail
Perform (NO)NAT.
Configure a new rule to perform (NO)NAT.

Useful when NAT is applied per network and you don't want to apply NAT for a particular jail.

, -e, -o
All of these options perform the same task as the options described in add jail.
jail [-eHIpt] [-n network] jail [keyword ...]
Get information about current rules, that is, the keyword that represent the information to be obtained. Multiple keywords can be specified, which are displayed as a table-like interface in the order in which they are specified. If no keyword is specified, the defaults are name, network and rule.

See KEYWORDS for a list of available keywords.

Not required when using -p. The \t character is used to delimit columns, so as not to show strange values, this option shows instead of \t in the case that a value contains the latter.
Shows the name of the columns.
Include empty values. By default, a minus sign is displayed when a value is empty.
Columnate the list.
Tabulate columns and values.
network
Identifier.
jail [-eHIpt] [-n network] jail [keyword ...]
get jail but shows each keyword for each rule in a nice table.
, -H, -I, -p, -t
get jail.
network
network.
jail jail
Flush the rules currently in use.
jail jail
Load enabled rules configured by add jail.
jail -n network jail
Remove the given rule.
jail jail
Shows the rule that is currently in use or an error if it is not yet applied.
network [-e interface] [-I address] [-l [-|options]] [-o interface] network
Same as add jail but for networks.
[off|on] network network
Enable (on) or disable (off) NAT per-network using appjail-startup(1).
network [-eHIpt] network [keyword ...]
Same as get jail but for networks.
network [-eHIpt] [-n network] [keyword ...]
Same as get jail but for networks.
network network
Same as off jail but for networks.
network network
Same as on jail but for networks.
network network
Same as remove jail but for networks.
network network
Same as status jail but for networks.

Target (jail or network) name.
The rule that will be applied.

Network to obtain the local IPv4 address.

Shows if the rule will be applied by appjail-startup(1), otherwise.

The appjail nat utility exits 0 on success, and >0 if an error occurs.

appjail-network(1) appjail-startup(1) sysexits(3)

Jesús Daniel Colmenares Oviedo <DtxdF@disroot.org>

April 21, 2024 FreeBSD 14.3-RELEASE

Search for    or go to Top of page |  Section 1 |  Main Index

Powered by GSP Visit the GSP FreeBSD Man Page Interface.
Output converted with ManDoc.