All Projects → Oefenweb → ansible-ufw

Oefenweb / ansible-ufw

Licence: MIT license
Ansible role to set up ufw in Debian-like systems

Programming Languages

Jinja
831 projects
Dockerfile
14818 projects

Projects that are alternatives of or similar to ansible-ufw

ufw-docker-automated
Manage docker containers firewall with UFW!
Stars: ✭ 114 (+185%)
Mutual labels:  debian, firewall, ufw
Ansible Role Firewall
Ansible Role - iptables Firewall configuration.
Stars: ✭ 343 (+757.5%)
Mutual labels:  debian, firewall
scutum
Linux Automatic ARP (TCP / UDP / ICMP) Firewall
Stars: ✭ 79 (+97.5%)
Mutual labels:  firewall, ufw
Ufw Docker
To fix the Docker and UFW security flaw without disabling iptables
Stars: ✭ 878 (+2095%)
Mutual labels:  debian, firewall
Pc Engines Apu Router Guide
Guide to building a Linux or BSD router on the PC Engines APU platform
Stars: ✭ 101 (+152.5%)
Mutual labels:  debian, firewall
Easywall
Web interface for easy use of the IPTables firewall on Linux systems written in Python3.
Stars: ✭ 172 (+330%)
Mutual labels:  debian, firewall
Piadvanced
This started as a custom install for my pihole!
Stars: ✭ 144 (+260%)
Mutual labels:  debian, firewall
Iptables Boilerplate
rock solid default firewall-rules for webhosts
Stars: ✭ 249 (+522.5%)
Mutual labels:  debian, firewall
piu
Cross platform package manager wrapper
Stars: ✭ 33 (-17.5%)
Mutual labels:  debian
xtrix
xtrix OS repo
Stars: ✭ 23 (-42.5%)
Mutual labels:  debian
Linux-Active-Directory-join-script
Active directory Join script for Ubuntu, Debian, CentOS, Linux Mint, Fedora, Kali, Elementary OS and Raspbian with built in failchcheck and debugmode for Ubuntu. "The most advanced and updated AD join script on GITHUB for Linux"
Stars: ✭ 97 (+142.5%)
Mutual labels:  debian
docker-dolibarr
🐳 🐘 Docker image for Dolibarr.
Stars: ✭ 58 (+45%)
Mutual labels:  debian
CyberSecurity-Box
Firewall-System based on OpenWRT or Pi-Hole with UnBound, TOR, optional Privoxy, opt. ntopng and opt. Configuration of the AVM FRITZ!Box with Presets for Security and Port-List. Please visit:
Stars: ✭ 20 (-50%)
Mutual labels:  firewall
uppersafe-osfw
UPPERSAFE Open Source Firewall
Stars: ✭ 21 (-47.5%)
Mutual labels:  firewall
solr role
Ansible role to install an Apache Solr (Cloud) server/cluster
Stars: ✭ 21 (-47.5%)
Mutual labels:  debian
LinuxMirrors
Linux 一键更换国内软件源
Stars: ✭ 623 (+1457.5%)
Mutual labels:  debian
packiffer
lightweight cross-platform networking toolkit
Stars: ✭ 52 (+30%)
Mutual labels:  firewall
defense-matrix
Express security essentials deployment for Linux Servers
Stars: ✭ 61 (+52.5%)
Mutual labels:  firewall
XDP-Firewall
An XDP firewall that is capable of filtering specific packets based off of filtering rules specified in a config file. IPv6 is supported!
Stars: ✭ 129 (+222.5%)
Mutual labels:  firewall
cozy-debian
Cozy Debian package
Stars: ✭ 13 (-67.5%)
Mutual labels:  debian

ufw

CI Ansible Galaxy

Set up ufw in Debian-like systems.

Requirements

None

Variables

  • ufw_default_incoming_policy [default: deny]: Default (incoming) policy

  • ufw_default_outgoing_policy [default: allow]: Default (outgoing) policy

  • ufw_logging [default: off]: Log level

  • ufw_rules [default: see defaults/main.yml]: Rules to apply

  • ufw_etc_default_ipv6 [default: true]: Set to yes to apply rules to support IPv6

  • ufw_etc_default_default_input_policy [default: DROP]: Set the default input policy to ACCEPT, DROP, or REJECT. Please note that if you change this you will most likely want to adjust your rules

  • ufw_etc_default_default_output_policy [default: ACCEPT]: Set the default output policy to ACCEPT, DROP, or REJECT. Please note that if you change this you will most likely want to adjust your rules

  • ufw_etc_default_default_forward_policy [default: DROP]: Set the default forward policy to ACCEPT, DROP or REJECT. Please note that if you change this you will most likely want to adjust your rules

  • ufw_etc_default_default_application_policy [default: SKIP]: Set the default application policy to ACCEPT, DROP, REJECT or SKIP. Please note that setting this to ACCEPT may be a security risk

  • ufw_etc_default_manage_builtins [default: false]: By default, ufw only touches its own chains. Set this to 'yes' to have ufw manage the built-in chains too. Warning: setting this to 'yes' will break non-ufw managed firewall rules

  • ufw_etc_default_ipt_sysctl [default: /etc/ufw/sysctl.conf]: IPT backend, only enable if using iptables backend

  • ufw_etc_default_ipt_modules [default: [nf_conntrack_ftp, nf_nat_ftp, nf_conntrack_netbios_ns]]: Extra connection tracking modules to load. Complete list can be found in net/netfilter/Kconfig of your kernel source

Dependencies

None

Example

---
- hosts: all
  roles:
    - ufw
Allow ssh
- hosts: all
  roles:
    - ufw
  vars:
    ufw_rules:
      - rule: allow
        to_port: 22
        protocol: tcp
        comment: 'allow incoming connection on standard ssh port'
Allow all traffic on eth1
- hosts: all
  roles:
    - ufw
  vars:
    ufw_rules:
      - rule: allow
        interface: eth1
        to_port: ''
        comment: 'allow all traffic on interface eth1'
Allow snmp traffic from 1.2.3.4 on eth0
- hosts: all
  roles:
    - ufw
  vars:
    ufw_rules:
      - rule: allow
        interface: eth0
        from_ip: 1.2.3.4
        to_port: 161
        protocol: udp

License

MIT

Author Information

Mischa ter Smitten (based on work of weareinteractive)

Feedback, bug-reports, requests, ...

Are welcome!

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].