--- title: iptables type: docs --- [![Source Code](https://img.shields.io/badge/gitea-source%20code-blue?logo=gitea&logoColor=white)](https://gitea.rknet.org/ansible/xoxys.logrotate) [![Build Status](https://img.shields.io/drone/build/ansible/xoxys.logrotate?logo=drone&server=https%3A%2F%2Fdrone.rknet.org)](https://drone.rknet.org/ansible/xoxys.logrotate) [![License: MIT](https://img.shields.io/badge/license-MIT-blue.svg)](LICENSE) Role to manage iptables firewall. * [Default Variables](#default-variables) * [iptables_app_rules](#iptables_app_rules) * [iptables_app_rules_extra](#iptables_app_rules_extra) * [iptables_custom_rules](#iptables_custom_rules) * [iptables_default_head](#iptables_default_head) * [iptables_default_tail](#iptables_default_tail) * [iptables_keep_unmanaged](#iptables_keep_unmanaged) * [Dependencies](#dependencies) --- ## Default Variables ### iptables_app_rules #### Default value ```YAML iptables_app_rules: [] ``` ### iptables_app_rules_extra #### Default value ```YAML iptables_app_rules_extra: [] ``` ### iptables_custom_rules #### Default value ```YAML iptables_custom_rules: [] ``` ### iptables_default_head Default head (allow) rules. #### Default value ```YAML iptables_default_head: "-P INPUT ACCEPT\n-P FORWARD ACCEPT\n-P OUTPUT ACCEPT\n-A INPUT\ \ -m state --state RELATED,ESTABLISHED -j ACCEPT\n-A INPUT -i lo -j ACCEPT\n-A INPUT\ \ -p icmp --icmp-type echo-request -j ACCEPT\n-A INPUT -p tcp -m tcp --dport 22\ \ -j ACCEPT\n" ``` ### iptables_default_tail Default tail (deny) rules. #### Default value ```YAML iptables_default_tail: "-A INPUT -j REJECT\n-A FORWARD -j REJECT\n" ``` ### iptables_keep_unmanaged By default this role deletes all iptables rules which are not managed by Ansible. Set this to 'yes', if you want the role to keep unmanaged rules. #### Default value ```YAML iptables_keep_unmanaged: no ``` ## Dependencies None.