Apkawa / ansible-role-firewall

Ansible Role - iptables Firewall configuration.

Home Page:https://galaxy.ansible.com/geerlingguy/firewall/

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Ansible Role: Firewall (iptables)

Build Status

Ansible role Ansible role downloads Ansible role quality

Installs an iptables-based firewall for Linux. Supports both IPv4 (iptables) and IPv6 (ip6tables).

This firewall aims for simplicity over complexity, and only opens a few specific ports for incoming traffic (configurable through Ansible variables). If you have a rudimentary knowledge of iptables and/or firewalls in general, this role should be a good starting point for a secure system firewall.

After the role is run, a firewall init service will be available on the server. You can use service firewall [start|stop|restart|status] to control the firewall.

Requirements

None.

Role Variables

Available variables are listed below, along with default values (see defaults/main.yml):

firewall_state: started
firewall_enabled_at_boot: true

Controls the state of the firewall service; whether it should be running (firewall_state) and/or enabled on system boot (firewall_enabled_at_boot).

firewall_allowed_tcp_ports:
  - "22" # important: keep opened ssh port!
  - "80"
  - port: 1042
    # default is 0.0.0.0/0
    allow: 8.8.8.8
    # or
    allow: 8.8.8.0/24
    # or 
    allow: ['8.8.8.1', '8.8.8.2']
    # default is false
    deny: yes # 0.0.0.0/0
    # or
    deny: 8.8.4.0/24
    # or
    deny: ['8.8.4.4', '0.0.0.0/0']
 ...  
firewall_allowed_udp_ports: []

A list of TCP or UDP ports (respectively) to open to incoming traffic.

firewall_forwarded_tcp_ports:
  - { src: "22", dest: "2222" }
  - { src: "80", dest: "8080" }
firewall_forwarded_udp_ports: []

Forward src port to dest port, either TCP or UDP (respectively).

firewall_additional_rules: []
firewall_ip6_additional_rules: []

Any additional (custom) rules to be added to the firewall (in the same format you would add them via command line, e.g. iptables [rule]/ip6tables [rule]). A few examples of how this could be used:

# Allow only the IP 167.89.89.18 to access port 4949 (Munin).
firewall_additional_rules:
  - "iptables -A INPUT -p tcp --dport 4949 -s 167.89.89.18 -j ACCEPT"

# Allow only the IP 214.192.48.21 to access port 3306 (MySQL).
firewall_additional_rules:
  - "iptables -A INPUT -p tcp --dport 3306 -s 214.192.48.21 -j ACCEPT"

See Iptables Essentials: Common Firewall Rules and Commands for more examples.

firewall_log_dropped_packets: true

Whether to log dropped packets to syslog (messages will be prefixed with "Dropped by firewall: ").

firewall_disable_firewalld: false
firewall_disable_ufw: false

Set to true to disable firewalld (installed by default on RHEL/CentOS) or ufw (installed by default on Ubuntu), respectively.

Docker

For use custom rule firewall and keep auto generated docker rules

firewall_keep_docker_rules: true

And run dockerd before firewall rule

Dependencies

None.

Example Playbook

- hosts: server
  vars_files:
    - vars/main.yml
  roles:
    - { role: apkawa.firewall }

Inside vars/main.yml:

firewall_allowed_tcp_ports:
  - port: 22
    allow: 10.10.5.0/24
    deny: yes
  - "25"
  - "80"

TODO

  • Make outgoing ports more configurable.
  • Make other firewall features (like logging) configurable.

License

MIT / BSD

Author Information

This role was created in 2014 by Jeff Geerling, author of Ansible for DevOps.

Forked by Apkawa

About

Ansible Role - iptables Firewall configuration.

https://galaxy.ansible.com/geerlingguy/firewall/

License:MIT License


Languages

Language:Python 62.6%Language:Shell 37.4%