瀏覽代碼

add updated firewalld.conf from 0.7.1

tags/v0.6.2
Niels Abspoel 5 年之前
父節點
當前提交
ae1f2453d3
共有 2 個文件被更改,包括 25 次插入0 次删除
  1. +19
    -0
      firewalld/files/firewalld.conf
  2. +6
    -0
      pillar.example

+ 19
- 0
firewalld/files/firewalld.conf 查看文件

@@ -76,3 +76,22 @@ AutomaticHelpers={{ firewalld.AutomaticHelpers|default('sytem') }}
# - iptables (iptables, ip6tables, ebtables and ipset)
FirewallBackend={{ firewalld.FirewallBackend|default('nftables') }}
{%- endif %}
{%- if firewalld.get('FlushAllOnReload', False) %}

# FlushAllOnReload
# Flush all runtime rules on a reload. In previous releases some runtime
# configuration was retained during a reload, namely; interface to zone
# assignment, and direct rules. This was confusing to users. To get the old
# behavior set this to "no".
# Default: yes
FlushAllOnReload={{ firewalld.FlushAllOnReload|default('yes') }}
{%- endif %}
{%- if firewalld.get('RFC3964_IPv4', False) %}

# RFC3964_IPv4
# As per RFC 3964, filter IPv6 traffic with 6to4 destination addresses that
# correspond to IPv4 addresses that should not be routed over the public
# internet.
# Defaults to "yes".
RFC3964_IPv4={{ firewalld.RFC3964_IPv4|default('yes') }}
{%- endif %}

+ 6
- 0
pillar.example 查看文件

@@ -1,6 +1,12 @@
# FirewallD pillar examples:
firewalld:
enabled: True
IndividualCalls: 'no'
LogDenied: 'off'
AutomaticHelpers: 'system'
FirewallBackend: 'nftables'
FlushAllOnReload: 'yes'
RFC3964_IPv4: 'yes'

ipset:
manage: True

Loading…
取消
儲存