Server firewall setup re-configuration
This commit is contained in:
parent
836384d474
commit
04ef639f55
|
|
@ -15,13 +15,16 @@
|
||||||
replace: 'nopass'
|
replace: 'nopass'
|
||||||
|
|
||||||
# Telnet/SSH Configuration
|
# Telnet/SSH Configuration
|
||||||
- name: Accept inbound SSH only on internal network
|
- name: Accept inbound SSH only on internal and VM network
|
||||||
ansible.builtin.iptables:
|
ansible.builtin.iptables:
|
||||||
chain: INPUT
|
chain: INPUT
|
||||||
protocol: tcp
|
protocol: tcp
|
||||||
source: 192.168.1.0/24
|
source: "{{ item }}/24"
|
||||||
destination_port: 22
|
destination_port: 22
|
||||||
jump: ACCEPT
|
jump: ACCEPT
|
||||||
|
loop:
|
||||||
|
- 192.168.1.0
|
||||||
|
- 192.168.122.0
|
||||||
- name: Allow all outbound telnet, SSH on default port and SSH proxy server port
|
- name: Allow all outbound telnet, SSH on default port and SSH proxy server port
|
||||||
ansible.builtin.iptables:
|
ansible.builtin.iptables:
|
||||||
chain: OUTPUT
|
chain: OUTPUT
|
||||||
|
|
@ -100,32 +103,6 @@
|
||||||
protocol: icmp
|
protocol: icmp
|
||||||
jump: ACCEPT
|
jump: ACCEPT
|
||||||
|
|
||||||
# SMB/SAMBA Service
|
|
||||||
- name: Accept inbound SMB/NETBIOS SSN/NETBIOS DGM/NETBIOS NS only from internal network
|
|
||||||
ansible.builtin.iptables:
|
|
||||||
chain: INPUT
|
|
||||||
protocol: tcp
|
|
||||||
source: 192.168.1.0/24
|
|
||||||
destination_port: "{{ item }}"
|
|
||||||
jump: ACCEPT
|
|
||||||
loop:
|
|
||||||
- 445
|
|
||||||
- 139
|
|
||||||
- 138
|
|
||||||
- 137
|
|
||||||
- name: Allow outbound SMB/NETBIOS SSN/NETBIOS DGM/NETBIOS NS only to internal network
|
|
||||||
ansible.builtin.iptables:
|
|
||||||
chain: OUTPUT
|
|
||||||
protocol: tcp
|
|
||||||
destination: 192.168.1.0/24
|
|
||||||
destination_port: "{{ item }}"
|
|
||||||
jump: ACCEPT
|
|
||||||
loop:
|
|
||||||
- 445
|
|
||||||
- 139
|
|
||||||
- 138
|
|
||||||
- 137
|
|
||||||
|
|
||||||
# VPN to Proxy Server Configuration
|
# VPN to Proxy Server Configuration
|
||||||
- name: Accept inbound Wireguard connections only from proxy server
|
- name: Accept inbound Wireguard connections only from proxy server
|
||||||
ansible.builtin.iptables:
|
ansible.builtin.iptables:
|
||||||
|
|
@ -146,150 +123,17 @@
|
||||||
ansible.builtin.iptables:
|
ansible.builtin.iptables:
|
||||||
chain: INPUT
|
chain: INPUT
|
||||||
protocol: tcp
|
protocol: tcp
|
||||||
source: 140.82.121.34
|
source: 140.82.121.33
|
||||||
destination_port: 443
|
destination_port: 443
|
||||||
jump: ACCEPT
|
jump: ACCEPT
|
||||||
- name: Allow outbound HTTPS only to Github Container Registry
|
- name: Allow all outbound HTTPS
|
||||||
ansible.builtin.iptables:
|
ansible.builtin.iptables:
|
||||||
chain: OUTPUT
|
chain: OUTPUT
|
||||||
protocol: tcp
|
protocol: tcp
|
||||||
destination: 140.82.121.34
|
destination: 140.82.121.33
|
||||||
destination_port: 443
|
destination_port: 443
|
||||||
jump: ACCEPT
|
jump: ACCEPT
|
||||||
|
|
||||||
# SERVICES FIREWALL CONFIGURATION NOW HANDLED ON A PER CONTAINER BASIS VIA GLUTUN VPN CLIENT (as now using VPNs within in the containers)
|
|
||||||
# # Mail Service
|
|
||||||
# - name: Allow source (Inbound) local network traffic to the Mail service ports
|
|
||||||
# ansible.builtin.iptables:
|
|
||||||
# chain: DOCKER-USER
|
|
||||||
# source: 192.168.1.0/24
|
|
||||||
# protocol: tcp
|
|
||||||
# destination_port: "{{ item }}"
|
|
||||||
# jump: ACCEPT
|
|
||||||
# loop:
|
|
||||||
# - 25 # SMTP Cleartext 25
|
|
||||||
# - 465 # ESMTP Implicit TLS 465
|
|
||||||
# - 587 # SMTP+STARTTLS Explicit TLS 587
|
|
||||||
# - 993 # IMAPS Implicit TLS 993
|
|
||||||
# - 143 # IMAPS IMAP+STARTTLS Explicit TLS 143
|
|
||||||
#
|
|
||||||
# - name: Allow source (Inbound) proxy server traffic to the Mail service ports
|
|
||||||
# ansible.builtin.iptables:
|
|
||||||
# chain: DOCKER-USER
|
|
||||||
# source: "{{ proxy_server_ip }}"
|
|
||||||
# protocol: tcp
|
|
||||||
# destination_port: "{{ item }}"
|
|
||||||
# jump: ACCEPT
|
|
||||||
# loop:
|
|
||||||
# - 25 # SMTP Cleartext 25
|
|
||||||
# - 465 # ESMTP Implicit TLS 465
|
|
||||||
# - 587 # SMTP+STARTTLS Explicit TLS 587
|
|
||||||
# - 993 # IMAPS Implicit TLS 993
|
|
||||||
# - 143 # IMAPS IMAP+STARTTLS Explicit TLS 143
|
|
||||||
# - name: Allow destination (Outbound) proxy server Mail container traffic to the Mail service ports
|
|
||||||
# ansible.builtin.iptables:
|
|
||||||
# chain: DOCKER-USER
|
|
||||||
# destination: "{{ proxy_server_ip }}"
|
|
||||||
# protocol: tcp
|
|
||||||
# destination_port: "{{ item }}"
|
|
||||||
# jump: ACCEPT
|
|
||||||
# loop:
|
|
||||||
# - 25 # SMTP Cleartext 25
|
|
||||||
# - 465 # ESMTP Implicit TLS 465
|
|
||||||
# - 587 # SMTP+STARTTLS Explicit TLS 587
|
|
||||||
# - 993 # IMAPS Implicit TLS 993
|
|
||||||
# - 143 # IMAPS IMAP+STARTTLS Explicit TLS 143
|
|
||||||
#
|
|
||||||
# - name: Deny any other traffic on Mail service ports
|
|
||||||
# ansible.builtin.iptables:
|
|
||||||
# chain: DOCKER-USER
|
|
||||||
# protocol: tcp
|
|
||||||
# destination_port: "{{ item }}"
|
|
||||||
# jump: DROP
|
|
||||||
# loop:
|
|
||||||
# - 25 # SMTP Cleartext 25
|
|
||||||
# - 465 # ESMTP Implicit TLS 465
|
|
||||||
# - 587 # SMTP+STARTTLS Explicit TLS 587
|
|
||||||
# - 993 # IMAPS Implicit TLS 993
|
|
||||||
# - 143 # IMAPS IMAP+STARTTLS Explicit TLS 143
|
|
||||||
#
|
|
||||||
# # Invidious Service
|
|
||||||
# - name: Allow source (Inbound) local network traffic to the Invidious service only on service port 3000
|
|
||||||
# ansible.builtin.iptables:
|
|
||||||
# chain: DOCKER-USER
|
|
||||||
# source: 192.168.1.0/24
|
|
||||||
# protocol: tcp
|
|
||||||
# destination_port: 3000
|
|
||||||
# jump: ACCEPT
|
|
||||||
# - name: Allow destination (Outbound) local network traffic to the Invidious service only on service port 3000
|
|
||||||
# ansible.builtin.iptables:
|
|
||||||
# chain: DOCKER-USER
|
|
||||||
# destination: 192.168.1.0/24
|
|
||||||
# protocol: tcp
|
|
||||||
# destination_port: 3000
|
|
||||||
# jump: ACCEPT
|
|
||||||
#
|
|
||||||
# - name: Allow source (Inbound) proxy server traffic to the Invidious service only on service port 3000
|
|
||||||
# ansible.builtin.iptables:
|
|
||||||
# chain: DOCKER-USER
|
|
||||||
# source: "{{ proxy_server_ip }}"
|
|
||||||
# protocol: tcp
|
|
||||||
# destination_port: 3000
|
|
||||||
# jump: ACCEPT
|
|
||||||
# - name: Allow destination (Outbound) proxy server traffic to the Invidious service only on service port 3000
|
|
||||||
# ansible.builtin.iptables:
|
|
||||||
# chain: DOCKER-USER
|
|
||||||
# destination: "{{ proxy_server_ip }}"
|
|
||||||
# protocol: tcp
|
|
||||||
# destination_port: 3000
|
|
||||||
# jump: ACCEPT
|
|
||||||
#
|
|
||||||
# - name: Deny any other traffic on Invidious port 3000
|
|
||||||
# ansible.builtin.iptables:
|
|
||||||
# chain: DOCKER-USER
|
|
||||||
# protocol: tcp
|
|
||||||
# destination_port: 3000
|
|
||||||
# jump: DROP
|
|
||||||
#
|
|
||||||
# # Minecraft Service
|
|
||||||
# - name: Allow source (Inbound) local network traffic to the Invidious service only on service port 25565
|
|
||||||
# ansible.builtin.iptables:
|
|
||||||
# chain: DOCKER-USER
|
|
||||||
# source: 192.168.1.0/24
|
|
||||||
# protocol: tcp
|
|
||||||
# destination_port: 25565
|
|
||||||
# jump: ACCEPT
|
|
||||||
# - name: Allow destination (Outbound) local network traffic to the Invidious service only on service port 25565
|
|
||||||
# ansible.builtin.iptables:
|
|
||||||
# chain: DOCKER-USER
|
|
||||||
# destination: 192.168.1.0/24
|
|
||||||
# protocol: tcp
|
|
||||||
# destination_port: 25565
|
|
||||||
# jump: ACCEPT
|
|
||||||
#
|
|
||||||
# - name: Allow source (Inbound) proxy server traffic to the Invidious service only on service port 25565
|
|
||||||
# ansible.builtin.iptables:
|
|
||||||
# chain: DOCKER-USER
|
|
||||||
# source: "{{ proxy_server_ip }}"
|
|
||||||
# protocol: tcp
|
|
||||||
# destination_port: 25565
|
|
||||||
# jump: ACCEPT
|
|
||||||
# - name: Allow destination (Outbound) proxy server traffic to the Invidious service only on service port 25565
|
|
||||||
# ansible.builtin.iptables:
|
|
||||||
# chain: DOCKER-USER
|
|
||||||
# destination: "{{ proxy_server_ip }}"
|
|
||||||
# protocol: tcp
|
|
||||||
# destination_port: 25565
|
|
||||||
# jump: ACCEPT
|
|
||||||
#
|
|
||||||
# - name: Deny any other traffic on Minecraft port 25565
|
|
||||||
# ansible.builtin.iptables:
|
|
||||||
# chain: DOCKER-USER
|
|
||||||
# protocol: tcp
|
|
||||||
# destination_port: 25565
|
|
||||||
# jump: DROP
|
|
||||||
#
|
|
||||||
|
|
||||||
- name: Reset doas configuration back to default
|
- name: Reset doas configuration back to default
|
||||||
become: yes
|
become: yes
|
||||||
template:
|
template:
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue