Forge Home


This module is build to manage custom firewall ports and services via firewall-cmd (Redhat 7 & above)


485 latest version

3.1 quality score

Version information

  • 1.0.0 (latest)
  • 0.1.0 (deleted)
released Sep 22nd 2021
This version is compatible with:
  • Puppet Enterprise 2021.6.x, 2021.5.x, 2021.4.x, 2021.3.x, 2021.2.x, 2021.1.x, 2021.0.x, 2019.8.x
  • Puppet >= 6.21.0 < 8.0.0
  • , , ,

Start using this module

  • r10k or Code Manager
  • Bolt
  • Manual installation
  • Direct download

Add this module to your Puppetfile:

mod 'hemantgangwar-firewallcustom', '1.0.0'
Learn more about managing modules with a Puppetfile

Add this module to your Bolt project:

bolt module add hemantgangwar-firewallcustom
Learn more about using this module with an existing project

Manually install this module globally with Puppet module tool:

puppet module install hemantgangwar-firewallcustom --version 1.0.0

Direct download is not typically how you would use a Puppet module to manage your infrastructure, but you may want to download the module in order to inspect the code.



hemantgangwar/firewallcustom — version 1.0.0 Sep 22nd 2021


Welcome custom FIREWALL module. This is aiming towards managing system firewall rules by puppet

The README template below provides a starting point with details about what information to include in your README.

Table of Contents

  1. Description
  2. Pre-requisites
  3. ResourceTypes


Starting point to manage your Linux firewall.


  1. Install Stdlib module version less than 5

puppet module install puppet-firewalld --version 4.4.0

  1. Install this module only on systemd based systems where one want to manage firewall using firewall-cmd command.


This module supports a number of resource types:

Firewalld Ports

Firewalld ports can be managed with the firewalld_port resource type.

firewalld_port will autorequire the firewalld_zone specified in the zone parameter so there is no need to add dependencies for this


  firewalld_port { 'Open TCP port 30000-32767 for Kubernetes':
    ensure   => present,
    port     => 30000-32767,
    protocol => 'tcp',

Example in Hiera:

  'Open TCP port 30000-32767 for Kubernetes':
    ensure: present
    port: 30000-32767
    protocol: 'tcp'