From: Jonathan Boyett Date: Tue, 16 Aug 2011 17:06:22 +0000 (-0700) Subject: create ip6tables test manifest X-Git-Tag: v0.0.1~8 X-Git-Url: https://review.fuel-infra.org/gitweb?a=commitdiff_plain;h=9be9ccb7bb8a8aad790912b7efbe03035adb2f35;p=puppet-modules%2Fpuppetlabs-firewall.git create ip6tables test manifest --- diff --git a/examples/ip6tables/test.pp b/examples/ip6tables/test.pp new file mode 100644 index 0000000..2d3e06c --- /dev/null +++ b/examples/ip6tables/test.pp @@ -0,0 +1,104 @@ +firewall { '000 allow foo': + dport => [7061, 7062], + jump => 'ACCEPT', + proto => 'tcp', + provider => 'ip6tables' +} + +firewall { '001 allow boo': + jump => 'ACCEPT', + iniface => 'eth0', + sport => 123, + dport => 123, + proto => 'tcp', + destination => '::1/128', + provider => 'ip6tables' +} + +firewall { '002 foo': + dport => 1233, + proto => 'tcp', + jump => 'DROP', + provider => 'ip6tables' +} + +firewall { '005 INPUT disregard DHCP': + dport => ['bootpc', 'bootps'], + jump => 'DROP', + proto => 'udp', + provider => 'ip6tables' +} + +firewall { '006 INPUT disregard netbios': + dport => ['netbios-ns', 'netbios-dgm', 'netbios-ssn'], + jump => 'DROP', + proto => 'udp', + provider => 'ip6tables' +} + +firewall { '006 Disregard CIFS': + dport => 'microsoft-ds', + jump => 'DROP', + proto => 'tcp', + provider => 'ip6tables' +} + +firewall { '010 icmp': + proto => 'ipv6-icmp', + icmp => 'echo-reply', + jump => 'ACCEPT', + provider => 'ip6tables' +} + +firewall { '010 INPUT allow loopback': + iniface => 'lo', + chain => 'INPUT', + jump => 'ACCEPT', + provider => 'ip6tables' +} + +firewall { '050 INPUT drop invalid': + state => 'INVALID', + jump => 'DROP', + provider => 'ip6tables' +} + +firewall { '051 INPUT allow related and established': + state => ['RELATED', 'ESTABLISHED'], + jump => 'ACCEPT', + provider => 'ip6tables' +} + +firewall { '053 INPUT allow ICMP': + icmp => '8', + proto => 'ipv6-icmp', + jump => 'ACCEPT', + provider => 'ip6tables' +} + +firewall { '055 INPUT allow DNS': + sport => 'domain', + proto => 'udp', + jump => 'ACCEPT', + provider => 'ip6tables' +} + +firewall { '999 FORWARD drop': + chain => 'FORWARD', + jump => 'DROP', + provider => 'ip6tables' +} + +firewall { '001 OUTPUT allow loopback': + chain => 'OUTPUT', + outiface => 'lo', + jump => 'ACCEPT', + provider => 'ip6tables' +} + +firewall { '100 OUTPUT drop invalid': + chain => 'OUTPUT', + state => 'INVALID', + jump => 'DROP', + provider => 'ip6tables' +}