Saltstack Official IPTables Formula
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

преди 9 години
преди 8 години
преди 9 години
преди 8 години
преди 9 години
преди 7 години
преди 8 години
преди 9 години
преди 8 години
преди 9 години
преди 8 години
преди 9 години
преди 8 години
преди 7 години
преди 8 години
преди 9 години
преди 8 години
преди 7 години
преди 8 години
преди 9 години
преди 7 години
преди 9 години
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201
  1. ================
  2. iptables formula
  3. ================
  4. Iptables is used to set up, maintain, and inspect the tables of IPv4 packet
  5. filter rules in the Linux kernel. Several different tables may be defined.
  6. Each table contains a number of built-in chains and may also contain
  7. user-defined chains. Each chain is a list of rules which can match a set of
  8. packets. Each rule specifies what to do with a packet that matches. This is
  9. called a `target`, which may be a jump to a user-defined chain in the same
  10. table.
  11. Sample pillars
  12. ==============
  13. Most common rules - allow traffic on localhost, accept related,established and
  14. ping
  15. .. code-block:: yaml
  16. parameters:
  17. iptables:
  18. service:
  19. enabled: True
  20. chain:
  21. INPUT:
  22. rules:
  23. - in_interface: lo
  24. jump: ACCEPT
  25. - connection_state: RELATED,ESTABLISHED
  26. match: state
  27. jump: ACCEPT
  28. - protocol: icmp
  29. jump: ACCEPT
  30. Accept connections on port 22
  31. .. code-block:: yaml
  32. parameters:
  33. iptables:
  34. service:
  35. chain:
  36. INPUT:
  37. rules:
  38. - destination_port: 22
  39. protocol: tcp
  40. jump: ACCEPT
  41. Set drop policy on INPUT chain:
  42. .. code-block:: yaml
  43. parameters:
  44. iptables:
  45. service:
  46. chain:
  47. INPUT:
  48. policy: DROP
  49. Redirect privileged port 443 to 8081
  50. .. code-block:: yaml
  51. parameters:
  52. iptables:
  53. service:
  54. chain:
  55. PREROUTING:
  56. filter: nat
  57. destination_port: 443
  58. to_port: 8081
  59. protocol: tcp
  60. jump: REDIRECT
  61. Allow access from local network
  62. .. code-block:: yaml
  63. parameters:
  64. iptables:
  65. service:
  66. chain:
  67. INPUT:
  68. rules:
  69. - protocol: tcp
  70. destination_port: 22
  71. source_network: 192.168.1.0/24
  72. jump: ACCEPT
  73. comment: Blah
  74. Support logging with custom prefix and log level
  75. .. code-block:: yaml
  76. parameters:
  77. iptables:
  78. service:
  79. chain:
  80. POSTROUTING:
  81. rules:
  82. - table: nat
  83. protocol: tcp
  84. match: multiport
  85. destination_ports:
  86. - 21
  87. - 80
  88. - 443
  89. - 2220
  90. source_network: '10.20.30.0/24'
  91. log_level: 7
  92. log_prefix: 'iptables-logging: '
  93. jump: LOG
  94. IPv6 is supported as well
  95. .. code-block:: yaml
  96. parameters:
  97. iptables:
  98. service:
  99. enabled: True
  100. ipv6: True
  101. chain:
  102. INPUT:
  103. rules:
  104. - protocol: tcp
  105. family: ipv6
  106. destination_port: 22
  107. source_network: 2001:DB8::/32
  108. jump: ACCEPT
  109. You may set policy for chain in specific table
  110. If 'table' key is omitted, 'filter' table is assumed
  111. .. code-block:: yaml
  112. parameters:
  113. iptables:
  114. service:
  115. enabled: true
  116. chain:
  117. OUTPUT:
  118. policy: ACCEPT
  119. Specify policy directly
  120. .. code-block:: yaml
  121. parameters:
  122. iptables:
  123. service:
  124. enabled: true
  125. chain:
  126. FORWARD:
  127. policy:
  128. - table: mangle
  129. policy: DROP
  130. Read more
  131. =========
  132. * http://docs.saltstack.com/en/latest/ref/states/all/salt.states.iptables.html
  133. * https://help.ubuntu.com/community/IptablesHowTo
  134. * http://wiki.centos.org/HowTos/Network/IPTables
  135. Documentation and Bugs
  136. ======================
  137. To learn how to install and update salt-formulas, consult the documentation
  138. available online at:
  139. http://salt-formulas.readthedocs.io/
  140. In the unfortunate event that bugs are discovered, they should be reported to
  141. the appropriate issue tracker. Use Github issue tracker for specific salt
  142. formula:
  143. https://github.com/salt-formulas/salt-formula-iptables/issues
  144. For feature requests, bug reports or blueprints affecting entire ecosystem,
  145. use Launchpad salt-formulas project:
  146. https://launchpad.net/salt-formulas
  147. You can also join salt-formulas-users team and subscribe to mailing list:
  148. https://launchpad.net/~salt-formulas-users
  149. Developers wishing to work on the salt-formulas projects should always base
  150. their work on master branch and submit pull request against specific formula.
  151. https://github.com/salt-formulas/salt-formula-iptables
  152. Any questions or feedback is always welcome so feel free to join our IRC
  153. channel:
  154. #salt-formulas @ irc.freenode.net