ansible/playbooks/firewalld/srvdoc01.rules.firewalld.yaml

84 lines
2.1 KiB
YAML
Raw Permalink Normal View History

2021-12-06 09:45:41 +01:00
---
- name: "IApply Custom Firewall Rules to SRVDOC01 "
hosts: srvdoc01
tasks:
- name: "Create Firewall Rule [SRVDOC01]- HTTP"
ansible.posix.firewalld:
zone: public
service: http
permanent: yes
state: enabled
- name: "Create Firewall Rule [SRVDOC01]- HTTPS"
ansible.posix.firewalld:
zone: public
service: https
permanent: yes
state: enabled
- name: "Create Firewall Rule [SRVDOC01]- SMTP"
ansible.posix.firewalld:
zone: public
port: 25/tcp
permanent: yes
state: enabled
- name: "Create Firewall Rule [SRVDOC01]- POP3"
ansible.posix.firewalld:
zone: public
port: 110/tcp
permanent: yes
state: enabled
- name: "Create Firewall Rule [SRVDOC01]- IMAP"
ansible.posix.firewalld:
zone: public
port: 143/tcp
permanent: yes
state: enabled
- name: "Create Firewall Rule [SRVDOC01]- SMTPs"
ansible.posix.firewalld:
zone: public
port: 465/tcp
permanent: yes
state: enabled
- name: "Create Firewall Rule [SRVDOC01]- SMTP"
ansible.posix.firewalld:
zone: public
port: 587/tcp
permanent: yes
state: enabled
- name: "Create Firewall Rule [SRVDOC01]- IMAPs"
ansible.posix.firewalld:
zone: public
port: 993/tcp
permanent: yes
state: enabled
- name: "Create Firewall Rule [SRVDOC01]- POP3s"
ansible.posix.firewalld:
zone: public
port: 995/tcp
permanent: yes
state: enabled
- name: "Create Firewall Rule [SRVDOC01]- DNS"
ansible.posix.firewalld:
zone: public
port: 53/tcp
permanent: yes
state: enabled
- name: "Create Firewall Rule [SRVDOC01]- DNS"
ansible.posix.firewalld:
zone: public
port: 53/udp
permanent: yes
state: enabled
- name: "Create Firewall Rule [SRVDOC01]- DNSs"
ansible.posix.firewalld:
zone: public
port: 853/tcp
permanent: yes
state: enabled
- name: "Create Firewall Rule [SRVDOC01]- DNSs"
ansible.posix.firewalld:
zone: public
port: 853/udp
permanent: yes
state: enabled
...