Use 'ip' family as default for the firewall table.
This commit is contained in:
parent
7a36fddf38
commit
6b6a3a1794
22
README.md
22
README.md
|
@ -22,14 +22,14 @@ Highly inspired by [Mike Gleason firewall role][mikegleasonjr firewall github] (
|
|||
* **nft_pkg_state** : State of new `nftables` package(s) [default : `installed`].
|
||||
* **nft_main_conf_path** : Main configuration file loaded by systemd unit [default : `/etc/nftables.conf`].
|
||||
* **nft_main_conf_content** : Template used to generate the previous main configuration file [default : `etc/nftables.conf.j2`].
|
||||
* **nft_input_conf_path** : Input configuration file include in main configuration file [default : `/etc/nftables.d/inet-input.nft`].
|
||||
* **nft_input_conf_content** : Template used to generate the previous input configuration file [default : `etc/nftables.d/inet-input.nft.j2`].
|
||||
* **nft_output_conf_content** : Template used to generate the previous output configuration file [default : `etc/nftables.d/inet-output.nft.j2`].
|
||||
* **nft_output_conf_path** : Output configuration file include in main configuration file [default : `/etc/nftables.d/inet-output.nft`].
|
||||
* **nft_input_conf_path** : Input configuration file include in main configuration file [default : `/etc/nftables.d/filter-input.nft`].
|
||||
* **nft_input_conf_content** : Template used to generate the previous input configuration file [default : `etc/nftables.d/filter-input.nft.j2`].
|
||||
* **nft_output_conf_content** : Template used to generate the previous output configuration file [default : `etc/nftables.d/filter-output.nft.j2`].
|
||||
* **nft_output_conf_path** : Output configuration file include in main configuration file [default : `/etc/nftables.d/filter-output.nft`].
|
||||
* **nft_define_conf_path** : Vars definition file include in main configuration file [default : `/etc/nftables.d/defines.nft`].
|
||||
* **nft_define_conf_content** : Template used to generate the previous vars definition file [default : `etc/nftables.d/defines.nft.j2`].
|
||||
* **nft_sets_conf_path** : Sets and maps definition file include in main configuration file [default : `/etc/nftables.d/inet-sets.nft`].
|
||||
* **nft_sets_conf_content** : Template used to generate the previous sets and maps definition file [default : `etc/nftables.d/inet-sets.nft.j2`].
|
||||
* **nft_sets_conf_path** : Sets and maps definition file include in main configuration file [default : `/etc/nftables.d/sets.nft`].
|
||||
* **nft_sets_conf_content** : Template used to generate the previous sets and maps definition file [default : `etc/nftables.d/sets.nft.j2`].
|
||||
* **nft_global_default_rules** : Set default rules for `global` chain. Other chains will jump to `global` before apply their specific rules.
|
||||
* **nft_global_group_rules** : You can add `global` rules or override those defined by **nft_global_default_rules** for a group.
|
||||
* **nft_global_host_rules:** : Hosts can also add or override `global` rules.
|
||||
|
@ -125,22 +125,22 @@ flush ruleset
|
|||
|
||||
include "/etc/nftables.d/defines.nft"
|
||||
|
||||
table inet firewall {
|
||||
table ip firewall {
|
||||
chain global {
|
||||
# 000 state management
|
||||
ct state established,related accept
|
||||
ct state invalid drop
|
||||
}
|
||||
include "/etc/nftables.d/inet-sets.nft"
|
||||
include "/etc/nftables.d/inet-input.nft"
|
||||
include "/etc/nftables.d/inet-output.nft"
|
||||
include "/etc/nftables.d/sets.nft"
|
||||
include "/etc/nftables.d/filter-input.nft"
|
||||
include "/etc/nftables.d/filter-output.nft"
|
||||
}
|
||||
```
|
||||
|
||||
And you get the same result by displaying the ruleset on the host : `$ nft list ruleset` :
|
||||
|
||||
```
|
||||
table inet firewall {
|
||||
table ip firewall {
|
||||
set blackhole {
|
||||
type ipv4_addr
|
||||
elements = { 255.255.255.255, 224.0.0.1, 224.0.0.251 }
|
||||
|
|
|
@ -8,14 +8,14 @@ nft_pkg_state: 'installed'
|
|||
# conf
|
||||
nft_main_conf_path: '/etc/nftables.conf'
|
||||
nft_main_conf_content: 'etc/nftables.conf.j2'
|
||||
nft_input_conf_path: '/etc/nftables.d/inet-input.nft'
|
||||
nft_input_conf_content: 'etc/nftables.d/inet-input.nft.j2'
|
||||
nft_output_conf_path: '/etc/nftables.d/inet-output.nft'
|
||||
nft_output_conf_content: 'etc/nftables.d/inet-output.nft.j2'
|
||||
nft_input_conf_path: '/etc/nftables.d/filter-input.nft'
|
||||
nft_input_conf_content: 'etc/nftables.d/filter-input.nft.j2'
|
||||
nft_output_conf_path: '/etc/nftables.d/filter-output.nft'
|
||||
nft_output_conf_content: 'etc/nftables.d/filter-output.nft.j2'
|
||||
nft_define_conf_path: '/etc/nftables.d/defines.nft'
|
||||
nft_define_conf_content: 'etc/nftables.d/defines.nft.j2'
|
||||
nft_set_conf_path: '/etc/nftables.d/inet-sets.nft'
|
||||
nft_set_conf_content: 'etc/nftables.d/inet-sets.nft.j2'
|
||||
nft_set_conf_path: '/etc/nftables.d/sets.nft'
|
||||
nft_set_conf_content: 'etc/nftables.d/sets.nft.j2'
|
||||
|
||||
# rules
|
||||
nft_global_default_rules:
|
||||
|
|
|
@ -9,7 +9,7 @@ flush ruleset
|
|||
|
||||
include "/etc/nftables.d/defines.nft"
|
||||
|
||||
table inet firewall {
|
||||
table ip firewall {
|
||||
chain global {
|
||||
{% for group, rules in globalmerged|dictsort %}
|
||||
# {{ group }}
|
||||
|
|
Loading…
Reference in New Issue