ansible/roles/base/templates/iptables/iptables.storinator01.fedorainfracloud.org

2.2 KiB
Raw Blame History

*filter :INPUT ACCEPT [0:0] :FORWARD ACCEPT [0:0] :OUTPUT ACCEPT [0:0]

-A INPUT -p icmp -j ACCEPT

-A INPUT -i lo -j ACCEPT

-A INPUT -m state state RELATED,ESTABLISHED -j ACCEPT -A OUTPUT -m state state RELATED,ESTABLISHED -j ACCEPT

{% if blocked_ips is defined %} {% for ip in blocked_ips %} -A INPUT -s {{ ip }} -j DROP {% endfor %} {% endif %}

-A INPUT -m conntrack ctstate NEW -m tcp -p tcp dport 22 -j ACCEPT

-A INPUT -p tcp -m tcp dport 5666 -s 192.168.1.10 -j ACCEPT -A INPUT -p tcp -m tcp dport 5666 -s 192.168.1.166 -j ACCEPT

-A INPUT -p tcp -m tcp dport 5666 -s 209.132.181.102 -j ACCEPT -A INPUT -p tcp -m tcp dport 5666 -s 209.132.181.35 -j ACCEPT

{% if tcp_ports_eth0 is defined %} {% for port in tcp_ports_eth0 %} -A INPUT -p tcp -m tcp -i eth0 dport {{ port }} -j ACCEPT {% endfor %} {% endif %}

{% if udp_ports_eth0 is defined %} {% for port in udp_ports_eth0 %} -A INPUT -p udp -m udp -i eth0 dport {{ port }} -j ACCEPT {% endfor %} {% endif %}

{% if tcp_ports_eth1 is defined %} {% for port in tcp_ports_eth1 %} -A INPUT -p tcp -m tcp -i eth1 dport {{ port }} -j ACCEPT {% endfor %} {% endif %}

{% if udp_ports_eth1 is defined %} {% for port in udp_ports_eth1 %} -A INPUT -p udp -m udp -i eth1 dport {{ port }} -j ACCEPT {% endfor %} {% endif %}

{% if custom_rules is defined %} {% for rule in custom_rules %} {{ rule }} {% endfor %} {% endif %}

-A INPUT -j REJECT reject-with icmp-host-prohibited -A FORWARD -j REJECT reject-with icmp-host-prohibited COMMIT

{% if nat_rules %} *nat :PREROUTING ACCEPT [0:] :INPUT ACCEPT [0:] :OUTPUT ACCEPT [0:0] :POSTROUTING ACCEPT [0:0]

{% for rule in nat_rules %} {{ rule }} {% endfor %} COMMIT {% endif %}