- Overview
- Module Description - What the module does and why it is useful
- Setup - The basics of getting started with sitefirewall
- Usage - Configuration options and additional functionality
- Reference - An under-the-hood peek at what the module is doing and how
- Limitations - OS compatibility, etc.
- Development - Guide for contributing to the module
This module provides sensible defaults for extra classes as required for puppetlabs/firewall
.
This module defines defeaults for pre
and post
firewall rules. These are:
- Allow IMCP
- Allow all traffic to local (
lo
) interface - Allow RELATED and ESTABLISHED connections
- Drop all other traffic
This module depends on puppet/firewall
and therefore affects the following:
- Every node running a firewall
- Firewall settings in your system
- Connection settings for managed nodes
- Unmanaged resources (get purged)
Include sitefirewall
to get started:
class { '::sitefirewall' }
Then you are able to use firewall
rules as described on the (puppetlabs/firewall
)[https://forge.puppetlabs.com/puppetlabs/firewall#usage] page.
Firewall rules can also be defined in hiera using the firewall
key .e.g.:
firewall:
'10 accept SSH':
port: 22
proto: tcp
action: accept
Pull requests are gratefully received.