1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
|
# File 'manifests/firewall/pre.pp', line 1
class toughen::firewall::pre {
Firewall {
require => undef,
}
firewall { '000 accept all icmp':
proto => 'icmp',
action => 'accept',
}
-> firewall { '001 accept all on loopback':
proto => 'all',
iniface => 'lo',
action => 'accept',
}
-> firewall { '002 reject local not on loopback':
iniface => '! lo',
proto => 'all',
destination => '127.0.0.1/8',
action => 'reject',
}
-> firewall { '003 accept rel/est':
proto => 'all',
state => ['RELATED', 'ESTABLISHED'],
action => 'accept',
}
-> firewall { '004 accept SSH':
proto => 'tcp',
dport => 22,
action => 'accept',
}
-> firewall { '005 accept DHCP':
proto => 'udp',
dport => 68,
action => 'accept',
}
-> firewall { '006 accept NTP':
proto => 'udp',
dport => 123,
action => 'accept',
}
firewallchain { 'INPUT:filter:IPv4':
ensure => present,
policy => drop,
before => undef,
}
firewallchain { 'OUTPUT:filter:IPv4':
ensure => present,
policy => accept,
before => undef,
}
firewallchain { 'FORWARD:filter:IPv4':
ensure => present,
policy => drop,
before => undef,
}
firewallchain { 'INPUT:filter:IPv6':
ensure => present,
policy => drop,
before => undef,
}
firewallchain { 'OUTPUT:filter:IPv6':
ensure => present,
policy => accept,
before => undef,
}
firewallchain { 'FORWARD:filter:IPv6':
ensure => present,
policy => drop,
before => undef,
}
}
|