sitefirewall
A module to provide the nessasary classes required by puppetlabs/firewall
Version information
released Feb 17th 2015
This version is compatible with:
- , , , , , ,
Start using this module
Add this module to your Puppetfile:
mod 'danfoster-sitefirewall', '0.1.2'
Learn more about managing modules with a PuppetfileDocumentation
danfoster/sitefirewall — version 0.1.2 Feb 17th 2015
sitefirewall
Table of Contents
- Overview
- Module Description - What the module does and why it is useful
- Setup - The basics of getting started with sitefirewall
- Usage - Configuration options and additional functionality
- Reference - An under-the-hood peek at what the module is doing and how
- Limitations - OS compatibility, etc.
- Development - Guide for contributing to the module
Overview
This module provides sensible defaults for extra classes as required for puppetlabs/firewall
.
Module Description
This module defines defeaults for pre
and post
firewall rules. These are:
- Allow IMCP
- Allow all traffic to local (
lo
) interface - Allow RELATED and ESTABLISHED connections
- Drop all other traffic
Setup
What sitefirewall affects
This module depends on puppet/firewall
and therefore affects the following:
- Every node running a firewall
- Firewall settings in your system
- Connection settings for managed nodes
- Unmanaged resources (get purged)
Usage
Include sitefirewall
to get started:
class { '::sitefirewall' }
Then you are able to use firewall
rules as described on the (puppetlabs/firewall
)[https://forge.puppetlabs.com/puppetlabs/firewall#usage] page.
Hiera
Firewall rules can also be defined in hiera using the firewall
key .e.g.:
firewall:
'10 accept SSH':
port: 22
proto: tcp
action: accept
Development
Pull requests are gratefully received.
Dependencies
- puppetlabs-firewall (>= 1.2.0 < 2.0.0)