add firewall-ruleset-deploy playbook and gard's ruleset

This commit is contained in:
staticsafe 2019-08-21 21:52:12 -04:00
parent de780e0254
commit f1623be2e9
3 changed files with 57 additions and 0 deletions

View File

@ -0,0 +1,10 @@
*filter
:INPUT DROP
:FORWARD DROP
:OUTPUT ACCEPT
-A INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -p icmp --icmp-type ping -j ACCEPT
-A INPUT -p tcp --dport 22 -j ACCEPT
-A INPUT -p tcp --dport 5665 -j ACCEPT
COMMIT

View File

@ -0,0 +1,18 @@
*filter
:INPUT DROP
:FORWARD DROP
:OUTPUT ACCEPT
:icmp_in -
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -p tcp --dport 22 -j ACCEPT
-A INPUT -p tcp --dport 5665 -j ACCEPT
-A icmp_in -p ipv6-icmp -m icmp6 -j ACCEPT
-A icmp_in -p ipv6-icmp -m icmp6 --icmpv6-type 134 -j ACCEPT
-A icmp_in -p ipv6-icmp -m icmp6 --icmpv6-type 135 -j ACCEPT
-A icmp_in -p ipv6-icmp -m icmp6 --icmpv6-type 136 -j ACCEPT
-A icmp_in -p ipv6-icmp -m icmp6 --icmpv6-type 1 -j ACCEPT
-A icmp_in -p ipv6-icmp -m icmp6 --icmpv6-type 2 -j ACCEPT
-A icmp_in -p ipv6-icmp -m icmp6 --icmpv6-type 3 -j ACCEPT
-A icmp_in -p ipv6-icmp -m icmp6 --icmpv6-type 4 -j ACCEPT
COMMIT

View File

@ -0,0 +1,29 @@
---
# This role deploys firewall rulesets to Ubuntu hosts
- name: Make sure iptables and netfilter-persistent are installed
apt:
name: "{{ packages }}"
state: latest
vars:
packages:
- iptables-persistent
- netfilter-persistent
- name: Copy IPv4 ruleset
copy:
src: {{ ansible_fqdn }}.rules.v4
dest: /etc/iptables/rules.v4
backup: yes
- name: Copy IPv6 ruleset
copy:
src: {{ ansible_fqdn }}.rules.v6
dest: /etc/iptables/rules.v6
backup: yes
- name: Restart netfilter-persistent service to load rulesets
service:
name: netfilter-persistent
state: restarted
enabled: yes