Giter Site home page Giter Site logo

wesmarcum / ansible-collection-firewall Goto Github PK

View Code? Open in Web Editor NEW
7.0 1.0 1.0 141 KB

A collection of roles to build a dedicated open source firewall based on FreeBSD.

Home Page: https://galaxy.ansible.com/wesmarcum/firewall

License: MIT License

Jinja 97.98% Shell 2.02%
freebsd ansible firewall nsd openvpn-client pf security unbound wireguard

ansible-collection-firewall's Introduction

Ansible Collection - Firewall

Galaxy Collection MIT licensed CI

This collection of roles builds a dedicated open source firewall based on FreeBSD. Functionality similar to open source projects PFSense and OPNSense is provided, while maintaining a minimal management layer.

Advantages:

  • Build a simple configuration on vanilla FreeBSD.
  • Leverage ZFS on FreeBSD with boot environments.
  • No web interface for management, only OpenSSH.
  • Configuration management with Ansible and Git.
  • Run your configuration on the latest version of FreeBSD and 3rd party packages.

Roles included in this collection:

The base role is responsible for setting up network interfaces, routing, and the PF firewall. At a minimum, you should use the following roles in your playbook:

  • wesmarcum.firewall.base
  • wesmarcum.firewall.unbound (Recursive DNS resolver)
  • wesmarcum.firewall.kea (DHCPv4/DHCPv6 server)

See individual role documentation for all configuration parameters. Sample playbooks and configuration are provided in the playbooks and playbooks/vars directories.

Installation

Install via Ansible Galaxy:

ansible-galaxy collection install wesmarcum.firewall

Alternatively, you can include this collection in your playbook's requirements.yml file:

---
collections:
  - name: wesmarcum.firewall

This collection uses the ipaddr filter from ansible.utils. This requires the Python netaddr library on the Ansible controller. This can be installed via pip:

pip install netaddr

Requirements

It is recommended to use this collection on a dedicated hardware appliance or VM running FreeBSD. The base role modifies /etc/rc.conf when needed, but keeps most of the service configuration in separate files located in /etc/rc.conf.d.

Before starting, you should have:

  • A supported version of FreeBSD. A fresh install is recommended.
  • Python 3.
  • Sudo or another method to become root.

Compatibility

OS Version
FreeBSD 13, 13.1, 13.2, 14

Usage

A simple configuration is provided below. In order to keep the main playbook minimal, you can read all vars from a file. This allows you to keep your entire firewall configuration in one yaml file. Your main playbook can be as simple as the following:

---
- name: Set up firewall
  hosts: firewall
  become: false
  vars_files:
    - vars/firewall_simple.yml

  roles:
    - wesmarcum.firewall.base
    - wesmarcum.firewall.unbound
    - wesmarcum.firewall.kea

In the file vars/firewall_simple.yml, you can then define all variables for the role:

---
firewall_interfaces:
  em0:
    name: "outside"
    external: true
    ipv4_address: "dhcp"
    ipv6_address: "dhcp"
    ipv6_cpe_wanif: true
  em1:
    name: "inside"
    ipv4_address: "10.0.0.1/24"
    ipv6_address: "fd00:0001:0002::1/64"
    domain: "lan.local"
    mtu: 1500

# Define a list of local zones and zone types.
# DNSSEC will be disabled for these zones.
firewall_unbound_local_zones:
  - zone: lan.local.
    type: nodefault

# Define a list of local zones for reverse lookups.
firewall_unbound_local_zones_rev:
  - zone: "10.in-addr.arpa."
  - zone: "d.f.ip6.arpa."

# Disable DHCPv6.  SLAAC can be used instead.
firewall_kea_dhcp6_enable: false

# DHCPv4 configuration.
firewall_kea_dhcp4_config:
  Dhcp4:
    # interfaces to activate for Kea
    interfaces-config:
      interfaces:
        - em1
      # dhcp socket type is 'raw' by default.  Change to 'udp' for relays.
      dhcp-socket-type: raw
  # control socket - uncomment if api is enabled
  # control-socket:
    # socket-type: unix
    # socket-name: "/tmp/kea4-ctrl-socket"
    lease-database:
      type: memfile
      persist: true
      lfc-interval: 3600
      name: /usr/local/var/lib/kea/dhcp4.leases
    expired-leases-processing:
      reclaim-timer-wait-time: 10
      flush-reclaimed-timer-wait-time: 25
      hold-reclaimed-time: 3600
      max-reclaim-leases: 100
      max-reclaim-time: 250
      unwarned-reclaim-cycles: 5
    # global timers
    renew-timer: 10800
    rebind-timer: 21600
    valid-lifetime: 43200
    max-valid-lifetime: 86400
    min-valid-lifetime: 3600
    # Pools
    subnet4:
      - subnet: 10.0.0.0/24
        interface: em1
        pools:
          - pool: 10.0.0.100 - 10.0.0.200
        option-data:
          - name: routers
            data: 10.0.0.1
          - name: domain-name
            data: lan.local
          - name: domain-name-servers
            data: 10.0.0.1
    loggers:
      - name: kea-dhcp4
        output_options:
          - output: /var/log/kea-dhcp4.log
            pattern: |
              {% raw %}%d{%j %H:%M:%S.%q} %c %m{% endraw %}
            flush: true
            maxsize: 10240000
            maxver: 8
        severity: INFO
        debuglevel: 0

Uninstalling roles/features

Roles have one or more enable variables that can be set to true or false. These variables are usually set to true by default, which will enable the role and run the tasks. If set to false, tasks intended to uninstall packages and remove configuration files will run. For example, to uninstall NSD and remove configuration files:

  1. Set firewall_nsd_enable to false in your vars file.
  2. Run your playbook to run the uninstall tasks.
  3. Remove the wesmarcum.firewall.nsd role from your playbook.

License

MIT

Author Information

https://github.com/wesmarcum/

Changelog

1.1.1: Add trippy to monitoring role.
1.1.0: Migrate MTA to dma for FreeBSD 14. Breaking change: read monitoring documentation and update vars.
1.0.3: Update cpu-microcode package.
1.0.2: FreeBSD 13.2 support. Use Wireguard kernel module by default.
1.0.1: Add support for smartd, microcode updates.
1.0.0: Initial release.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.