--- - name: "IApply Custom Firewall Rules to SRVDOC01 " hosts: srvdoc01 tasks: - name: "Create Firewall Rule [SRVDOC01]- HTTP" ansible.posix.firewalld: zone: public service: http permanent: yes state: enabled - name: "Create Firewall Rule [SRVDOC01]- HTTPS" ansible.posix.firewalld: zone: public service: https permanent: yes state: enabled - name: "Create Firewall Rule [SRVDOC01]- SMTP" ansible.posix.firewalld: zone: public port: 25/tcp permanent: yes state: enabled - name: "Create Firewall Rule [SRVDOC01]- POP3" ansible.posix.firewalld: zone: public port: 110/tcp permanent: yes state: enabled - name: "Create Firewall Rule [SRVDOC01]- IMAP" ansible.posix.firewalld: zone: public port: 143/tcp permanent: yes state: enabled - name: "Create Firewall Rule [SRVDOC01]- SMTPs" ansible.posix.firewalld: zone: public port: 465/tcp permanent: yes state: enabled - name: "Create Firewall Rule [SRVDOC01]- SMTP" ansible.posix.firewalld: zone: public port: 587/tcp permanent: yes state: enabled - name: "Create Firewall Rule [SRVDOC01]- IMAPs" ansible.posix.firewalld: zone: public port: 993/tcp permanent: yes state: enabled - name: "Create Firewall Rule [SRVDOC01]- POP3s" ansible.posix.firewalld: zone: public port: 995/tcp permanent: yes state: enabled - name: "Create Firewall Rule [SRVDOC01]- DNS" ansible.posix.firewalld: zone: public port: 53/tcp permanent: yes state: enabled - name: "Create Firewall Rule [SRVDOC01]- DNS" ansible.posix.firewalld: zone: public port: 53/udp permanent: yes state: enabled - name: "Create Firewall Rule [SRVDOC01]- DNSs" ansible.posix.firewalld: zone: public port: 853/tcp permanent: yes state: enabled - name: "Create Firewall Rule [SRVDOC01]- DNSs" ansible.posix.firewalld: zone: public port: 853/udp permanent: yes state: enabled ...