windows_firewall
: == Class: windows_firewall Module to manage the windows firewall and its configured exceptions === Requirements/Dependencies Currently ree
windows_firewall::exception
: == Define: windows_firewall::exception This defined type manages exceptions in the windows firewall === Requirements/Dependencies Currentl
windowsfirewall
: Puppet type that models Windows Firewall rules
== Class: windows_firewall
Module to manage the windows firewall and its configured exceptions
=== Requirements/Dependencies
Currently reequires the puppetlabs/stdlib module on the Puppet Forge in order to validate much of the the provided configuration.
=== Parameters
[ensure] Control the state of the windows firewall application
[exceptions] Hash of exceptions to be created.
=== Examples
To ensure that windows_firwall is running:
include windows_firewall
The following parameters are available in the windows_firewall
class:
Data type: Stdlib::Ensure::Service
Default value: 'running'
Data type: Hash
Default value: {}
== Define: windows_firewall::exception
This defined type manages exceptions in the windows firewall
=== Requirements/Dependencies
Currently reequires the puppetlabs/stdlib module on the Puppet Forge in order to validate much of the the provided configuration.
=== Parameters
[ensure] Control the existence of a rule
[direction] Specifies whether this rule matches inbound or outbound network traffic.
[action] Specifies what Windows Firewall with Advanced Security does to filter network packets that match the criteria specified in this rule.
[enabled] Specifies whether the rule is currently enabled.
[protocol] Specifies that network packets with a matching IP protocol match this rule.
[remote_ip] Specifies remote hosts that can use this rule.
[local_port] Specifies that network packets with matching local IP port numbers matched by this rule.
[remote_port] Specifies that network packets with matching remote IP port numbers matched by this rule.
[display_name] Specifies the rule name assigned to the rule that you want to display. Defaults to the title of the resource.
[description] Provides information about the firewall rule.
[allow_edge_traversal] Specifies that the traffic for this exception traverses an edge device
=== Examples
Exception for protocol/port:
windows_firewall::exception { 'WINRM-HTTP-In-TCP': ensure => present, direction => 'in', action => 'allow', enabled => true, protocol => 'TCP', local_port => 5985, remote_port => 'any', remote_ip => '10.0.0.1,10.0.0.2' program => undef, display_name => 'Windows Remote Management HTTP-In', description => 'Inbound rule for Windows Remote Management via WS-Management. [TCP 5985]', }
Exception for program path:
windows_firewall::exception { 'myapp': ensure => present, direction => 'in', action => 'allow', enabled => true, program => 'C:\myapp.exe', display_name => 'My App', description => 'Inbound rule for My App', }
The following parameters are available in the windows_firewall::exception
defined type:
ensure
direction
action
enabled
protocol
local_port
remote_port
remote_ip
program
display_name
description
allow_edge_traversal
Data type: Enum['present', 'absent']
Default value: 'present'
Data type: Enum['in', 'out']
Default value: 'in'
Data type: Enum['allow', 'block']
Default value: 'allow'
Data type: Boolean
Default value: true
Data type: Optional[Enum['TCP', 'UDP', 'ICMPv4', 'ICMPv6']]
Default value: undef
Data type: Windows_firewall::Port
Default value: undef
Data type: Windows_firewall::Port
Default value: undef
Data type: Optional[String]
Default value: undef
Data type: Optional[Stdlib::Windowspath]
Default value: undef
Data type: String[0, 255]
Default value: $title
Data type: Optional[String[1, 255]]
Default value: undef
Data type: Boolean
Default value: false
Puppet type that models Windows Firewall rules
The following properties are available in the windowsfirewall
type.
Allow inbound rules
Allow local firewall rules
Allow local IPsec rules
Allow unicast response to multicast
Allow user apps
Allow user ports
Default inbound rules for the zone
Default outbound rules for the zone
Disabled interface aliases
Enable stealth mode for IPsec
Valid values: present
, absent
The basic property that the resource should be in.
Default value: present
Log allowed
Log blocked
Log file name
Log ignored
Log max size - in kilobytes
Notify on listen
The following parameters are available in the windowsfirewall
type.
Valid values: domain
, public
, private
namevar
Windows firewall zones - either 'domain', 'public', or 'private'
The specific backend to use for this windowsfirewall
resource. You will seldom need to specify this --- Puppet will
usually discover the appropriate provider for your platform.
The Windows_firewall::Port data type.
Alias of Optional[Variant[Stdlib::Port, Enum['any'], Pattern[/\A[1-9]{1}\Z|[1-9]{1}[0-9,-]*[0-9]{1}\Z/]]]