+++ /dev/null
-firewall { '000 allow foo':
- dport => [7061, 7062],
- action => accept,
- proto => 'tcp',
- provider => 'ip6tables'
-}
-
-firewall { '001 allow boo':
- action => accept,
- iniface => 'eth0',
- sport => 123,
- dport => 123,
- proto => 'tcp',
- destination => '::1/128',
- provider => 'ip6tables'
-}
-
-firewall { '002 foo':
- dport => 1233,
- proto => 'tcp',
- action => drop,
- provider => 'ip6tables'
-}
-
-firewall { '005 INPUT disregard DHCP':
- dport => ['bootpc', 'bootps'],
- action => drop,
- proto => 'udp',
- provider => 'ip6tables'
-}
-
-firewall { '006 INPUT disregard netbios':
- port => ['netbios-ns', 'netbios-dgm', 'netbios-ssn'],
- action => drop,
- proto => 'udp',
- provider => 'ip6tables'
-}
-
-firewall { '006 Disregard CIFS':
- dport => 'microsoft-ds',
- action => drop,
- proto => 'tcp',
- provider => 'ip6tables'
-}
-
-firewall { '010 icmp':
- proto => 'ipv6-icmp',
- icmp => 'echo-reply',
- action => accept,
- provider => 'ip6tables'
-}
-
-firewall { '010 INPUT allow loopback':
- iniface => 'lo',
- chain => 'INPUT',
- action => accept,
- provider => 'ip6tables'
-}
-
-firewall { '050 INPUT drop invalid':
- state => 'INVALID',
- action => drop,
- provider => 'ip6tables'
-}
-
-firewall { '051 INPUT allow related and established':
- state => ['RELATED', 'ESTABLISHED'],
- action => accept,
- provider => 'ip6tables'
-}
-
-firewall { '053 INPUT allow ICMP':
- icmp => '8',
- proto => 'ipv6-icmp',
- action => accept,
- provider => 'ip6tables'
-}
-
-firewall { '055 INPUT allow DNS':
- sport => 'domain',
- proto => 'udp',
- action => accept,
- provider => 'ip6tables'
-}
-
-firewall { '999 FORWARD drop':
- chain => 'FORWARD',
- action => drop,
- provider => 'ip6tables'
-}
-
-firewall { '001 OUTPUT allow loopback':
- chain => 'OUTPUT',
- outiface => 'lo',
- action => accept,
- provider => 'ip6tables'
-}
-
-firewall { '100 OUTPUT drop invalid':
- chain => 'OUTPUT',
- state => 'INVALID',
- action => drop,
- provider => 'ip6tables'
-}
+++ /dev/null
- firewall { '000 allow packets with valid state':
- state => ['RELATED', 'ESTABLISHED'],
- action => 'accept',
- }
- firewall { '001 allow icmp':
- proto => 'icmp',
- action => 'accept',
- }
- firewall { '002 allow all to lo interface':
- iniface => 'lo',
- action => 'accept',
- }
- firewall { '100 allow http':
- proto => 'tcp',
- dport => '80',
- action => 'accept',
- }
- firewall { '100 allow ssh':
- proto => 'tcp',
- dport => '22',
- action => 'accept',
- }
- firewall { '100 allow mysql from internal':
- proto => 'tcp',
- dport => '3036',
- source => '10.5.5.0/24',
- action => 'accept',
- }
- firewall { '999 drop everything else':
- action => 'drop',
- }
-
- resources { 'firewall':
- purge => true,
- }
+++ /dev/null
-#!/bin/bash
-
-puppet apply --debug --libdir ../../lib readme.pp
+++ /dev/null
-firewall { '000 allow foo':
- dport => [7061, 7062],
- action => accept,
- proto => 'tcp',
-}
-
-firewall { '975 log test':
- state => 'NEW',
- log_level => 'panic',
- jump => 'LOG'
-}
-
-firewall { '001 allow boo':
- action => accept,
- iniface => 'eth0',
- sport => '123',
- dport => '123',
- proto => 'tcp',
- destination => '1.1.1.0/24',
- source => '2.2.2.0/24',
-}
-
-firewall { '100 snat for network foo2':
- chain => 'POSTROUTING',
- jump => 'MASQUERADE',
- proto => 'all',
- outiface => 'eth0',
- source => '10.1.2.0/24',
- table => 'nat'
-}
-
-firewall { '999 bar':
- action => accept,
- dport => '1233',
- proto => 'tcp',
-}
-
-firewall { '002 foo':
- action => drop,
- dport => '1233',
- proto => 'tcp',
-}
-
-firewall { '010 icmp':
- action => accept,
- proto => 'icmp',
- icmp => 'echo-reply',
-}
-
-firewall { '010 INPUT allow loopback':
- action => accept,
- iniface => 'lo',
- chain => 'INPUT',
-}
-
-firewall { '005 INPUT disregard DHCP':
- action => drop,
- dport => ['bootpc', 'bootps'],
- proto => 'udp'
-}
-
-firewall { '006 INPUT disregard netbios':
- action => drop,
- proto => 'udp',
- dport => ['netbios-ns', 'netbios-dgm', 'netbios-ssn'],
-}
-
-firewall { '006 Disregard CIFS':
- action => drop,
- dport => 'microsoft-ds',
- proto => 'tcp'
-}
-
-firewall { '050 INPUT drop invalid':
- action => drop,
- state => 'INVALID',
-}
-
-firewall { '051 INPUT allow related and established':
- action => accept,
- state => ['RELATED', 'ESTABLISHED'],
-}
-
-firewall { '053 INPUT allow ICMP':
- action => accept,
- icmp => '8',
- proto => 'icmp',
-}
-
-firewall { '055 INPUT allow DNS':
- action => accept,
- proto => 'udp',
- sport => 'domain'
-}
-
-firewall { '056 INPUT allow web in and out':
- action => accept,
- proto => 'tcp',
- port => 80
-}
-
-firewall { '057 INPUT limit NTP':
- action => accept,
- proto => 'tcp',
- dport => ntp,
- limit => '15/hour'
-}
-
-firewall { '999 FORWARD drop':
- action => drop,
- chain => 'FORWARD',
-}
-
-firewall { '001 OUTPUT allow loopback':
- action => accept,
- chain => 'OUTPUT',
- outiface => 'lo',
-}
-
-firewall { '100 OUTPUT drop invalid':
- action => drop,
- chain => 'OUTPUT',
- state => 'INVALID',
-}
-
-resources { 'firewall':
- purge => true
-}