Set up ufw in Debian-like systems.
None
-
ufw_default_incoming_policy
[default:deny
]: Default (incoming) policy -
ufw_default_outgoing_policy
[default:allow
]: Default (outgoing) policy -
ufw_logging
[default:off
]: Log level -
ufw_rules
[default: seedefaults/main.yml
]: Rules to apply -
ufw_etc_default_ipv6
[default:true
]: Set to yes to apply rules to support IPv6 -
ufw_etc_default_default_input_policy
[default:DROP
]: Set the default input policy toACCEPT
,DROP
, orREJECT
. Please note that if you change this you will most likely want to adjust your rules -
ufw_etc_default_default_output_policy
[default:ACCEPT
]: Set the default output policy toACCEPT
,DROP
, orREJECT
. Please note that if you change this you will most likely want to adjust your rules -
ufw_etc_default_default_forward_policy
[default:DROP
]: Set the default forward policy toACCEPT
,DROP
orREJECT
. Please note that if you change this you will most likely want to adjust your rules -
ufw_etc_default_default_application_policy
[default:SKIP
]: Set the default application policy toACCEPT
,DROP
,REJECT
orSKIP
. Please note that setting this toACCEPT
may be a security risk -
ufw_etc_default_manage_builtins
[default:false
]: By default, ufw only touches its own chains. Set this to 'yes' to have ufw manage the built-in chains too. Warning: setting this to 'yes' will break non-ufw managed firewall rules -
ufw_etc_default_ipt_sysctl
[default:/etc/ufw/sysctl.conf
]: IPT backend, only enable if using iptables backend -
ufw_etc_default_ipt_modules
[default:[nf_conntrack_ftp, nf_nat_ftp, nf_conntrack_netbios_ns]
]: Extra connection tracking modules to load. Complete list can be found innet/netfilter/Kconfig
of your kernel source
None
---
- hosts: all
roles:
- ufw
- hosts: all
roles:
- ufw
vars:
ufw_rules:
- rule: allow
to_port: 22
protocol: tcp
comment: 'allow incoming connection on standard ssh port'
- hosts: all
roles:
- ufw
vars:
ufw_rules:
- rule: allow
interface: eth1
to_port: ''
comment: 'allow all traffic on interface eth1'
- hosts: all
roles:
- ufw
vars:
ufw_rules:
- rule: allow
interface: eth0
from_ip: 1.2.3.4
to_port: 161
protocol: udp
MIT
Mischa ter Smitten (based on work of weareinteractive)
Are welcome!