Home Explore Blog Models CI



nixpkgs

nixos/doc/manual/configuration/firewall.section.md
3d14031729263d48a1276a5abe3fca16e1231c4796d1cf8600000003000003ad
# Firewall {#sec-firewall}

NixOS has a simple stateful firewall that blocks incoming connections
and other unexpected packets. The firewall applies to both IPv4 and IPv6
traffic. It is enabled by default. It can be disabled as follows:

```nix
{ networking.firewall.enable = false; }
```

If the firewall is enabled, you can open specific TCP ports to the
outside world:

```nix
{
  networking.firewall.allowedTCPPorts = [
    80
    443
  ];
}
```

Note that TCP port 22 (ssh) is opened automatically if the SSH daemon is
enabled (`services.openssh.enable = true`). UDP ports can be opened through
[](#opt-networking.firewall.allowedUDPPorts).

To open ranges of TCP ports:

```nix
{
  networking.firewall.allowedTCPPortRanges = [
    {
      from = 4000;
      to = 4007;
    }
    {
      from = 8000;
      to = 8010;
    }
  ];
}
```

Similarly, UDP port ranges can be opened through
[](#opt-networking.firewall.allowedUDPPortRanges).

Chunks
0604bcf5 (1st chunk of `nixos/doc/manual/configuration/firewall.section.md`)
Title: NixOS Firewall Configuration
Summary
This section details the configuration of the NixOS stateful firewall, which is enabled by default for both IPv4 and IPv6 traffic. It explains how to disable the firewall and how to open specific TCP ports using `networking.firewall.allowedTCPPorts`. TCP port 22 for SSH is automatically opened if the SSH daemon is enabled. The text also covers opening ranges of TCP ports with `networking.firewall.allowedTCPPortRanges`, and mentions similar options for configuring UDP ports and UDP port ranges.