El lunes, 15 de diciembre de 2014 13:30:48 UTC-3, Juan Sierra Pons escribió:
>
> 2014-12-15 17:19 GMT+01:00 Ciro Iriarte <ciro.i...@gmail.com <javascript:>>: 
>
> > Hi!, anybody know if it's possible to create a rule equivalent to this 
> with 
> > puppetlabs' firewall module?: 
> > 
> > iptables -I INPUT -i eth0 -p <PROTO> --dport <PORT> -m hashlimit 
> > --hashlimit-mode srcip \ 
> >   --hashlimit-srcmask 32 --hashlimit-above 100/s                       
>  \ 
> >   --hashlimit-burst 100 --hashlimit-name=bad -j DROP 
> > 
> > I've seen some references of rate limiting, but no example on the 
> > documentation. 
> > 
> > Regards, 
> > Ciro 
> > 
> > -- 
> > You received this message because you are subscribed to the Google 
> Groups 
> > "Puppet Users" group. 
> > To unsubscribe from this group and stop receiving emails from it, send 
> an 
> > email to puppet-users...@googlegroups.com <javascript:>. 
> > To view this discussion on the web visit 
> > 
> https://groups.google.com/d/msgid/puppet-users/49ede11f-80b9-468f-82fa-403ae63f5b21%40googlegroups.com.
>  
>
> > For more options, visit https://groups.google.com/d/optout. 
>
> Hi, 
>
> In this cases what I usually do is create the desired state manually 
> and then use Puppet RAL to get the puppetized version. 
>
> 1.- Create the iptables rules you want on the command line 
> 2.- use "puppet resource firewall" to get the puppet code 
>
> Eg: 
> [...] 
> puppet resource firewall 
> firewall { '000 accept all icmp': 
>   ensure     => 'present', 
>   action     => 'accept', 
>   chain      => 'INPUT', 
>   isfragment => 'false', 
>   proto      => 'icmp', 
>   random     => 'false', 
>   rdest      => 'false', 
>   reap       => 'false', 
>   rsource    => 'false', 
>   rttl       => 'false', 
>   socket     => 'false', 
>   table      => 'filter', 
> } 
> firewall { '103 allow https': 
>   ensure     => 'present', 
>   action     => 'accept', 
>   chain      => 'INPUT', 
>   isfragment => 'false', 
>   port       => ['443'], 
>   proto      => 'tcp', 
>   random     => 'false', 
>   rdest      => 'false', 
>   reap       => 'false', 
>   rsource    => 'false', 
>   rttl       => 'false', 
>   socket     => 'false', 
>   table      => 'filter', 
> } 
> [...] 
>
> Best regards 
> --------------------------------------------------------------------------------------
>  
>
> Juan Sierra Pons                                 ju...@elsotanillo.net 
> <javascript:> 
>
>
Thanks for the suggestion!, seems to be working as the resource was 
created, but the rule seems little weird, would that be correct? O_o

Command:

iptables -I INPUT -i eth0 -p udp --dport 53 -m hashlimit --hashlimit-mode 
srcip --hashlimit-srcmask 32 --hashlimit-above 100/s --hashlimit-burst 100 
--hashlimit-name=bad-client -j DROP

Resource generated:

firewall { '9001 b869ac85751524ce9edb979d29058969':
  ensure     => 'present',
  action     => 'drop',
  chain      => '--hashlimit-mode',
  dport      => ['bad-client'],
  iniface    => 'srcip',
  isfragment => 'false',
  proto      => '--hashlimit-name',
  random     => 'false',
  rdest      => 'false',
  reap       => 'false',
  rsource    => 'false',
  rttl       => 'false',
  socket     => 'false',
  table      => 'filter',
} 

-- 
You received this message because you are subscribed to the Google Groups 
"Puppet Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to puppet-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/puppet-users/904d190b-fccf-42fe-8401-5e9795c239a5%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to