-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
I5520 ip tables #5559
I5520 ip tables #5559
Conversation
the order of rules matters in ufw. We add the new defaults for ssh we create a template file that can allow users to place these rules and have predictable implementation Closes #5520
we are using abid-staging2 for our firewall rules add the ssh subnets to the group_vars Co-authored-by: Vickie Karasic <[email protected]>
in order to make modifications to the firewall we need to disable it then reload the new configuration Co-authored-by: Alicia Cozine <[email protected]>
we swap out ufw to the user.rules the preferred way is to use the before and after rules
7585e1a
to
5185f50
Compare
25e065b
to
6392784
Compare
6392784
to
f970d6c
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Oops, I left this in draft form. . . .
- protocol: tcp | ||
source: 10.249.64.0/18 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Now that we have the functionality we want, can we add descriptive names? Something like this:
- protocol: tcp | |
source: 10.249.64.0/18 | |
- rule: SSH from libnet | |
protocol: tcp | |
source: 10.249.64.0/18 |
- service: http | ||
action: ACCEPT | ||
- protocol: tcp | ||
source: 10.249.0.0/18 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Does this CIDR range include 10.249.64.0/18?
@@ -15,21 +15,16 @@ the examples below allow ssh, http, and redis to those CIDR subnets. For ssh mak | |||
|
|||
```yaml | |||
ufw_firewall_rules: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Whatever we do in the group vars about adding name/description to the rules, let's do it here too.
roles/ufw_firewall/handlers/main.yml
Outdated
state: restarted | ||
- name: Reload UFW | ||
ansible.builtin.command: ufw reload | ||
changed_when: false |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We shouldn't need changed_when: false
on the handler. The handler only runs when some other task reports a change.
Co-authored-by: Alicia Cozine <[email protected]>
My remaining review comments will be addressed in the next PR. This is a step forward. |
we have elected to define networks in IT-Handbook added clearer examples that use this #5559 Our previous values matched a format that is no longer true Co-authored-by: Vickie Karasic <[email protected]>
we have elected to define networks in IT-Handbook added clearer examples that use this #5559 Our previous values matched a format that is no longer true Co-authored-by: Vickie Karasic <[email protected]>
we have elected to define networks in IT-Handbook added clearer examples that use this #5559 Our previous values matched a format that is no longer true Co-authored-by: Vickie Karasic <[email protected]>
we have elected to define networks in IT-Handbook added clearer examples that use this #5559 Our previous values matched a format that is no longer true Co-authored-by: Vickie Karasic <[email protected]>
we have elected to define networks in IT-Handbook added clearer examples that use this #5559 Our previous values matched a format that is no longer true Co-authored-by: Vickie Karasic <[email protected]>
we have elected to define networks in IT-Handbook added clearer examples that use this #5559 Our previous values matched a format that is no longer true Co-authored-by: Vickie Karasic <[email protected]>
* adding dev-friendly ufw variables for our networks Co-authored-by: Alicia Cozine <[email protected]> Co-authored-by: Francis Kayiwa <[email protected]> * adding variables to ufw readme and default files Co-authored-by: Alicia Cozine <[email protected]> Co-authored-by: Francis Kayiwa <[email protected]> * improve documentation we have elected to define networks in IT-Handbook added clearer examples that use this #5559 Our previous values matched a format that is no longer true Co-authored-by: Vickie Karasic <[email protected]> * add ability to loop over campus network * add a template that will dynamically assign networks include documentation on how to use the role --------- Co-authored-by: Alicia Cozine <[email protected]> Co-authored-by: Francis Kayiwa <[email protected]> Co-authored-by: Francis Kayiwa <[email protected]> Co-authored-by: Vickie Karasic <[email protected]>
use a iptables template to set firewall rules.
the order of the in your configuration matter