ferm.conf.j2 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119
  1. {% if ansible_prolog -%}
  2. {% from 'templates/ansible/prolog.j2' import prolog with context %}
  3. {{ prolog() }}
  4. {% endif -%}
  5. #
  6. # Configuration file for ferm(1).
  7. #
  8. @def $PORTS = ({{ firewall_public | join(' ') }}); # Services running worldwide
  9. table filter {
  10. chain INPUT {
  11. policy DROP;
  12. # connection tracking
  13. mod state state INVALID DROP;
  14. mod state state (ESTABLISHED RELATED) ACCEPT;
  15. # allow local packet
  16. interface lo ACCEPT;
  17. # respond to ping
  18. proto icmp icmp-type echo-request ACCEPT;
  19. # standard ports we allow from the outside
  20. proto (udp tcp) dport $PORTS ACCEPT;
  21. {% if firewall_private is defined %}
  22. # Private networks configuration
  23. {% for fwconf in firewall_private %}
  24. interface {{ fwconf.interface }}{% if fwconf.networks is defined %} saddr ({{ fwconf.networks | join(' ') }}){% endif %} {
  25. proto (udp tcp) dport ({{ fwconf.ports | join(' ') }}) ACCEPT;
  26. }
  27. {% endfor %}
  28. {% endif %}
  29. {% if firewall_debug %}
  30. LOG log-prefix "ferm INPUT REJECT: " log-level warning;
  31. {% endif %}
  32. }
  33. chain OUTPUT {
  34. policy ACCEPT;
  35. # connection tracking
  36. #mod state state INVALID DROP;
  37. mod state state (ESTABLISHED RELATED) ACCEPT;
  38. {% if firewall_private is defined %}
  39. {% for fwconf in firewall_private %}
  40. {% if fwconf.users is defined %}
  41. # Private networks configuration
  42. mod owner uid-owner ({{ fwconf.users | join(' ') }}) outerface {{ fwconf.interface }} ACCEPT;
  43. outerface {{ fwconf.interface }} DROP;
  44. {% endif %}
  45. {% endfor %}
  46. {% endif %}
  47. {% if firewall_debug %}
  48. LOG log-prefix "ferm OUTPUT REJECT: " log-level warning;
  49. {% endif %}
  50. }
  51. chain FORWARD {
  52. policy DROP;
  53. # connection tracking
  54. mod state state INVALID DROP;
  55. mod state state (ESTABLISHED RELATED) ACCEPT;
  56. {% if firewall_debug %}
  57. LOG log-prefix "ferm FORWARD REJECT: " log-level warning;
  58. {% endif %}
  59. }
  60. }
  61. domain ip6 table filter {
  62. chain INPUT {
  63. policy DROP;
  64. # connection tracking
  65. mod state state INVALID DROP;
  66. mod state state (ESTABLISHED RELATED) ACCEPT;
  67. # allow local packet
  68. interface lo ACCEPT;
  69. # allow ICMP (for neighbor solicitation, like ARP for IPv4)
  70. proto ipv6-icmp ACCEPT;
  71. # standard ports we allow from the outside
  72. proto (udp tcp) dport $PORTS ACCEPT;
  73. {% if firewall_debug %}
  74. LOG log-prefix "ferm (ip6) INPUT REJECT: " log-level warning;
  75. {% endif %}
  76. }
  77. chain OUTPUT {
  78. policy ACCEPT;
  79. # connection tracking
  80. #mod state state INVALID DROP;
  81. mod state state (ESTABLISHED RELATED) ACCEPT;
  82. {% if firewall_debug %}
  83. LOG log-prefix "ferm (ip6) OUTPUT REJECT: " log-level warning;
  84. {% endif %}
  85. }
  86. chain FORWARD {
  87. policy DROP;
  88. # connection tracking
  89. mod state state INVALID DROP;
  90. mod state state (ESTABLISHED RELATED) ACCEPT;
  91. {% if firewall_debug %}
  92. LOG log-prefix "ferm (ip6) FOWARD REJECT: " log-level warning;
  93. {% endif %}
  94. }
  95. }