This role configures firewalld for use in a dual VM deployment (web app VM + database VM) of XNAT or OMERO.
See defaults/main.yml
for the full list.
allow_public_access
: Allow access from an IP address. Defaults tofalse
.internal_zone_open_services
: A list of services to allow in theinternal
zone. Defaults to:- http - https - ssh
public_zone_open_services
: A list of services to allow in thepublic
zone. Defaults to:- http - https
work_zone_open_services
: A list of services to allow in thework
zone. Defaults to:- http - https
internal_zone_closed_services
: A list of services to not allow in theinternal
zone. Defaults to:- samba-client
public_zone_closed_services
: A list of services to not allow in thepublic
zone. Defaults to:- ssh
work_zone_closed_services
: A list of services to not allow in thework
zone. Defaults to:- ssh
internal_zone_sources
: A list of IP addresses to allow ininternal
zone. Defaults to[]
.public_zone_sources
: A list of IP addresses to allow inpublic
zone. Defaults to[]
.work_zone_sources
: A list of IP addresses to allow inwork
zone. Defaults to[]
.internal_zone_ports
: A list of ports to allow ininternal
zone. Defaults to[]
.work_zone_ports
: A list of ports to allow inpublic
zone. Defaults to[]
.public_zone_ports
: A list of ports to allow inwork
zone. Defaults to[]
.rich_rules
: A list of hashes defining rich rules to apply. The zone to apply the rule to should be a key in the hash.
Include in a requirements.yml
file as follows:
- src: https://github.com/UCL-MIRSG/ansible-role-dual-vm-firewalld.git
version: 2022.12.22.0
name: mirsg.firewalld
- hosts: servers
roles:
- { role: mirsg.firewalld }
This role was created by the Medical Imaging Research Software Group at UCL.