You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* block_nomatch: With non-strict mode adds in a "REJECT" rule below the accept rules, otherwise other traffic to that service is still allowed. Can be defined per-service or globally, defaults to False.
119
-
* Service names can be either port numbers or service names (e.g. ssh, zabbix-agent, http) and are available for viewing/configuring in `/etc/services`
120
-
* If no `ips_allow` stanza is provided for any particular ruleset instead of not adding the rule the addition itself is scoped globally (0.0.0.0/0)
119
+
* Service names can be either port numbers or service names (e.g. ssh, zabbix-agent, http) and are available for viewing/configuring in ``/etc/services``
120
+
* If no ``ips_allow`` stanza is provided for any particular ruleset instead of not adding the rule the addition itself is scoped globally (0.0.0.0/0)
121
121
122
122
Using iptables.service
123
123
^^^^^^^^^^^^^^^^^^^^^^
124
124
125
-
Salt can't merge pillars, so you can only define `firewall:services` in once place. With the firewall.service state and stateconf, you can define pillars for different services and include and extend the iptables.service state with the `parent` parameter to enable a default firewall configuration with special rules for different services.
125
+
Salt can't merge pillars, so you can only define ``firewall:services`` in once place. With the firewall.service state and stateconf, you can define pillars for different services and include and extend the iptables.service state with the ``parent`` parameter to enable a default firewall configuration with special rules for different services.
126
126
127
-
`pillars/otherservice.sls`
127
+
``pillars/otherservice.sls``
128
128
129
-
```yaml
130
-
otherservice:
131
-
firewall:
132
-
services:
133
-
http:
134
-
block_nomatch: False
135
-
ips_allow:
136
-
- 0.0.0.0/0
137
-
```
129
+
.. code-block:: yaml
138
130
139
-
`states/otherservice.sls`
131
+
otherservice:
132
+
firewall:
133
+
services:
134
+
http:
135
+
block_nomatch: False
136
+
ips_allow:
137
+
- 0.0.0.0/0
140
138
141
-
```yaml
142
-
#!stateconf yaml . jinja
139
+
``states/otherservice.sls``
143
140
144
-
include:
145
-
- iptables.service
141
+
.. code-block:: yaml
146
142
147
-
extend:
148
-
iptables.service::sls_params:
149
-
stateconf.set:
150
-
- parent: otherservice
151
-
```
143
+
#!stateconf yaml . jinja
144
+
145
+
include:
146
+
- iptables.service
147
+
148
+
extend:
149
+
iptables.service::sls_params:
150
+
stateconf.set:
151
+
- parent: otherservice
152
152
153
153
Using iptables.nat
154
154
^^^^^^^^^^^^^^^^^^
155
155
156
156
You can use nat for interface. This is supported for IPv4 alone. IPv6 deployments should not use NAT.
0 commit comments