Set up ufw in Debian-like systems.
None
-
ufw_default_incoming_policy[default:deny]: Default (incoming) policy -
ufw_default_outgoing_policy[default:allow]: Default (outgoing) policy -
ufw_logging[default:off]: Log level -
ufw_rules[default: seedefaults/main.yml]: Rules to apply -
ufw_etc_default_ipv6[default:true]: Set to yes to apply rules to support IPv6 -
ufw_etc_default_default_input_policy[default:DROP]: Set the default input policy toACCEPT,DROP, orREJECT. Please note that if you change this you will most likely want to adjust your rules -
ufw_etc_default_default_output_policy[default:ACCEPT]: Set the default output policy toACCEPT,DROP, orREJECT. Please note that if you change this you will most likely want to adjust your rules -
ufw_etc_default_default_forward_policy[default:DROP]: Set the default forward policy toACCEPT,DROPorREJECT. Please note that if you change this you will most likely want to adjust your rules -
ufw_etc_default_default_application_policy[default:SKIP]: Set the default application policy toACCEPT,DROP,REJECTorSKIP. Please note that setting this toACCEPTmay be a security risk -
ufw_etc_default_manage_builtins[default:false]: By default, ufw only touches its own chains. Set this to 'yes' to have ufw manage the built-in chains too. Warning: setting this to 'yes' will break non-ufw managed firewall rules -
ufw_etc_default_ipt_sysctl[default:/etc/ufw/sysctl.conf]: IPT backend, only enable if using iptables backend -
ufw_etc_default_ipt_modules[default:[nf_conntrack_ftp, nf_nat_ftp, nf_conntrack_netbios_ns]]: Extra connection tracking modules to load. Complete list can be found innet/netfilter/Kconfigof your kernel source
None
---
- hosts: all
roles:
- oefenweb.ufw- hosts: all
roles:
- oefenweb.ufw
vars:
ufw_rules:
- rule: allow
to_port: 22
protocol: tcp
comment: 'allow incoming connection on standard ssh port'- hosts: all
roles:
- oefenweb.ufw
vars:
ufw_rules:
- rule: allow
interface: eth1
to_port: ''
comment: 'allow all traffic on interface eth1'- hosts: all
roles:
- oefenweb.ufw
vars:
ufw_rules:
- rule: allow
interface: eth0
from_ip: 1.2.3.4
to_port: 161
protocol: udpMIT
Mischa ter Smitten (based on work of weareinteractive)
Are welcome!