diff options
author | Niklas Yann Wettengel <niyawe@niyawe.de> | 2017-03-18 15:27:21 +0100 |
---|---|---|
committer | Niklas Yann Wettengel <niyawe@niyawe.de> | 2017-03-18 15:27:21 +0100 |
commit | 710a210ae6f165c2e3ce165d30d27f189311656b (patch) | |
tree | b8c25058e1653b6b6088d7eda80956210f0e4acc /roles/configure_iptables | |
parent | 0fbee3f86b0f92f55193556945b82d51cde6d5a7 (diff) |
updated setup_fastd
added features:
- configure_iptables
Diffstat (limited to 'roles/configure_iptables')
-rw-r--r-- | roles/configure_iptables/files/ip6tables.rules | 31 | ||||
-rw-r--r-- | roles/configure_iptables/files/iptables.rules | 55 | ||||
-rw-r--r-- | roles/configure_iptables/tasks/main.yml | 26 |
3 files changed, 112 insertions, 0 deletions
diff --git a/roles/configure_iptables/files/ip6tables.rules b/roles/configure_iptables/files/ip6tables.rules new file mode 100644 index 0000000..635b748 --- /dev/null +++ b/roles/configure_iptables/files/ip6tables.rules @@ -0,0 +1,31 @@ +# Generated by ip6tables-save v1.4.21 on Mon Feb 22 00:25:52 2016 +*filter +:INPUT DROP [0:0] +:FORWARD ACCEPT [0:0] +:OUTPUT ACCEPT [0:0] +:LOGGING - [0:0] +-A INPUT -i lo -j ACCEPT +-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT +-A INPUT -p icmpv6 -j ACCEPT + +# SSH-Server +-A INPUT -p tcp -m tcp --dport 22 -j ACCEPT +# dns +-A INPUT -p tcp -m tcp --dport 53 -j ACCEPT +-A INPUT -p udp -m udp --dport 53 -j ACCEPT +# http +-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT +# ntp +-A INPUT -p udp -m udp --dport 123 -j ACCEPT +# munin +-A INPUT -p tcp -m tcp --dport 4949 -j ACCEPT +# fastd +-A INPUT -p udp -m udp --dport 10000 -j ACCEPT +# MOSH +-A INPUT -p udp -m udp --dport 60000:61000 -j ACCEPT +# LOG +-A INPUT -j LOGGING +-A LOGGING -m limit --limit 2/min -j LOG --log-prefix "IP6Tables-Dropped: " --log-level 4 +-A LOGGING -j DROP +COMMIT +# Completed on Mon Feb 22 00:25:52 2016 diff --git a/roles/configure_iptables/files/iptables.rules b/roles/configure_iptables/files/iptables.rules new file mode 100644 index 0000000..30fef33 --- /dev/null +++ b/roles/configure_iptables/files/iptables.rules @@ -0,0 +1,55 @@ +# Generated by iptables-save v1.4.21 on Tue Sep 8 21:44:08 2015 +*mangle +:PREROUTING ACCEPT [0:0] +:INPUT ACCEPT [0:0] +:FORWARD ACCEPT [0:0] +:OUTPUT ACCEPT [0:0] +:POSTROUTING ACCEPT [0:0] +-A PREROUTING -i bat0 -j MARK --set-xmark 0x1/0xffffffff +COMMIT +# Completed on Tue Sep 8 21:44:08 2015 +# Generated by iptables-save v1.4.21 on Tue Sep 8 21:44:08 2015 +*filter +:INPUT DROP [0:0] +:FORWARD ACCEPT [0:0] +:OUTPUT ACCEPT [0:0] +:LOGGING - [0:0] +-A INPUT -s 127.0.0.1/32 -j ACCEPT +-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT +-A INPUT -p icmp -j ACCEPT +# SSH-Server +-A INPUT -p tcp -m tcp --dport 22 -j ACCEPT +# dns +-A INPUT -p tcp -m tcp --dport 53 -j ACCEPT +-A INPUT -p udp -m udp --dport 53 -j ACCEPT +#dhcp +-I INPUT -i bat0 -p udp --dport 67:68 --sport 67:68 -j ACCEPT +# http +-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT +-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT +# ntp +-A INPUT -p udp -m udp --dport 123 -j ACCEPT +# munin +-A INPUT -p tcp -m tcp --dport 4949 -j ACCEPT +# iperf +-A INPUT -i bat0 -p tcp -m tcp --dport 5001 -j ACCEPT +# fastd +-A INPUT -p udp -m udp --dport 10000 -j ACCEPT +# MOSH +-A INPUT -p udp -m udp --dport 60000:61000 -j ACCEPT +# LOG +-A INPUT -j LOGGING +-A LOGGING -m limit --limit 2/min -j LOG --log-prefix "IPTables-Dropped: " --log-level 4 +-A LOGGING -j DROP +COMMIT +# Completed on Tue Sep 8 21:44:08 2015 +# Generated by iptables-save v1.4.21 on Tue Sep 8 21:44:08 2015 +*nat +:PREROUTING ACCEPT [0:0] +:INPUT ACCEPT [0:0] +:OUTPUT ACCEPT [0:0] +:POSTROUTING ACCEPT [0:0] +-A POSTROUTING -o mullvad -j MASQUERADE +COMMIT +# Completed on Tue Sep 8 21:44:08 2015 + diff --git a/roles/configure_iptables/tasks/main.yml b/roles/configure_iptables/tasks/main.yml new file mode 100644 index 0000000..34f6c27 --- /dev/null +++ b/roles/configure_iptables/tasks/main.yml @@ -0,0 +1,26 @@ +--- +- name: copy iptables.rules + copy: + src: iptables.rules + dest: /etc/iptables/iptables.rules + register: iptables_rules + +- name: start and enable iptables service + when: iptables_rules.changed + systemd: + name: iptables.service + enabled: yes + state: reloaded + +- name: copy ip6tables.rules + copy: + src: ip6tables.rules + dest: /etc/iptables/ip6tables.rules + register: ip6tables_rules + +- name: start and enable ip6tables service + when: ip6tables_rules.changed + systemd: + name: ip6tables.service + enabled: yes + state: reloaded |