Management of firewalld
New in version 2015.8.0.
The following example applies changes to the public zone, blocks echo-reply and echo-request packets, does not set the zone to be the default, enables masquerading, and allows ports 22/tcp and 25/tcp. It will be applied permanently and directly before restart/reload.
public: firewalld.present: - name: public - block_icmp: - echo-reply - echo-request - default: False - masquerade: True - ports: - 22/tcp - 25/tcp
The following example applies changes to the public zone, enables masquerading and configures port forwarding TCP traffic from port 22 to 2222, and forwards TCP traffic from port 80 to 443 at 192.168.0.1.
my_zone: firewalld.present: - name: public - masquerade: True - port_fwd: - 22:2222:tcp - 80:443:tcp:192.168.0.1
The following example binds the public zone to interface eth0 and to all packets coming from the 192.168.1.0/24 subnet. It also removes the zone from all other interfaces or sources.
public: firewalld.present: - name: public - interfaces: - eth0 - sources: - 192.168.1.0/24
Here, we define a new service that encompasses TCP ports 4505 4506:
saltmaster: firewalld.service: - name: saltmaster - ports: - 4505/tcp - 4506/tcp
To make this new service available in a zone, the following can be used, which would allow access to the salt master from the 10.0.0.0/8 subnet:
saltzone: firewalld.present: - name: saltzone - services: - saltmaster - sources: - 10.0.0.0/8
ForwardingMapping(srcport, destport, protocol, destaddr)¶
Represents a port forwarding statement mapping a local port to a remote port for a specific protocol (TCP or UDP)
Returns a pretty dictionary meant for command line output.
present(name, block_icmp=None, default=None, masquerade=False, ports=None, port_fwd=None, services=None, prune_services=True, interfaces=None, sources=None, rich_rules=None)¶
Ensure a zone has specific attributes.
service(name, ports=None, protocols=None)¶
Ensure the service exists and encompasses the specified ports and protocols.
New in version 2016.11.0.