Version information
This version is compatible with:
- Puppet 3.x
- OpenSuSE
Start using this module
Add this module to your Puppetfile:
mod 'sharumpe-susefirewall2', '0.3.0'
Learn more about managing modules with a PuppetfileDocumentation
susefirewall2
This module is intended to perform the "most common" settings in SuSEfirewall2 on OpenSuSE 13.1.
These include:
"Allowed Services": both pre-defined and advanced (as referenced in YaST2 - firewall) "Custom Rules": See YaST2's help for allowed values.
All rules are done for the "Ext" zone.
This is provided as-is, YMMV. If you're in Vagrant, make sure to include at least "sshd" in the services.
Examples
Allow a pre-defined service such as "sshd":
susefirewall2::ext_service { 'allow_sshd': service => 'sshd' }
Allow non-standard tcp or udp ports:
susefirewall2::ext_port { 'allow_tcp_8080': type => 'tcp', port => '8080', } susefirewall2::ext_port { 'allow_udp_1234': type => 'udp', port => '1234', }
Allow tcp port 8443 from 192.168.1.*:
susefirewall2::custom { 'allow_tcp_to_8443_from_192.168.1.*': source => '192.168.1.0/24', type => 'tcp', destport => '8443', }
Allow traffic from udp port 25 on 192.168.2.*:
susefirewall2::custom { 'allow_udp_from_25_from_192.168.2.*': source => '192.168.2.0/255.255.255.0', type => 'udp', srcport => '25', }
Contact
If you send email, please include "sharumpe-susefirewall2" in the subject line.
Dependencies
- puppetlabs/stdlib (>= 4.0.0)
- puppetlabs/concat (>= 1.0.4)