Resource types
windows_firewall_global
: Manage windows global firewall settingswindows_firewall_group
: Enable/Disable windows firewall groupwindows_firewall_profile
: Enable/Disable windows firewall profilewindows_firewall_rule
: Manage Windows Firewall with Puppet
Manage windows global firewall settings
The following properties are available in the windows_firewall_global
type.
Configures how CRL checking is enforced
Configures the security association idle time in minutes.
Valid values: none, neighbordiscovery, icmp, dhcp, notconfigured
Configures the default IPsec exemptions. Default is to exempt IPv6 neighbordiscovery protocol and DHCP from IPsec.
Valid values: never, serverbehindnat, serverandclientbehindnat, notconfigured
Configures when security associations can be established with a computer behind a network address translator
Configures the users that are authorized to establish tunnel mode connections.
Configures the computers that are authorized to establish tunnel mode connections
Authz user group transport
Authz computer transport
Valid values: enable, disable, notconfigured
Stateful FTP
Valid values: enable, disable, notconfigured
Stateful PPTP
Sets main mode key lifetime in minutes and sessions
configures the main mode list of proposals
Valid values: yes, no
configures the option to use DH to secure key exchange
Boot time rule category
Firewall rule category
Stealth rule category
con sec rule category
The following parameters are available in the windows_firewall_global
type.
namevar
Not used (reference only)
Enable/Disable windows firewall group
The following properties are available in the windows_firewall_group
type.
Valid values: true
, false
Whether the rule group is enabled (true
or false
)
Default value: true
The following parameters are available in the windows_firewall_group
type.
namevar
Name of the rule group to enable/disable
Enable/Disable windows firewall profile
The following properties are available in the windows_firewall_profile
type.
Valid values: on, off
State of this firewall profile
Configures default inbound and outbound behavior
Valid values: enable, disable, notconfigured
Merge local firewall rules with Group Policy rules. Valid when configuring a Group Policy store
Valid values: enable, disable, notconfigured
Merge local connection security rules with Group Policy rules. Valid when configuring a Group Policy store
Valid values: enable, disable, notconfigured
Notify user when a program listens for inbound connections.
Valid values: enable, disable, notconfigured
Allow remote management of Windows Firewall
Valid values: enable, disable, notconfigured
Control stateful unicast response to multicast.
Valid values: enable, disable, notconfigured
log allowed connections
Valid values: enable, disable, notconfigured
log dropped connections
maximum size of log file in KB
Name and location of the firewall log
The following parameters are available in the windows_firewall_profile
type.
namevar
Name of the profile to work on
Manage Windows Firewall with Puppet
The following properties are available in the windows_firewall_rule
type.
Valid values: present, absent
How to ensure this firewall rule (present
or absent
)
Default value: present
Valid values: true
, false
Whether the rule is enabled (true
or false
)
Default value: true
Display name for this rule
Description of this rule
Valid values: inbound, outbound
Direction the rule applies to (inbound
/outbound
)
Valid values: domain, private, public, any
Which profile(s) this rule belongs to, use an array to pass more then one
group that the rule belongs to (read-only)
the local IP the rule targets (hostname not allowed)
the remote IP the rule targets (hostname not allowed)
Valid values: tcp, udp, icmpv4, icmpv6
the protocol the rule targets
Protocol type to use (with ICMPv4/ICMPv6)"
Values should be:
- Just the type (3) ICMP type code: 0 through 255.
- ICMP type code pairs: 3:4 (type 3, code 4)
any
the local port the rule targets
the remote port the rule targets
Valid values: block, allow, defer_to_user, defer_to_app
Apply rule to encapsulated traffic (?) - see: https://serverfault.com/questions/89824/windows-advanced-firewall-what-does-edge-traversal-mean#89846
Default value: block
Valid values: block, allow
What to do when this rule matches (Accept/Reject)
Path to program this rule applies to
Valid values: any, wired, wireless, remote_access
Interface types this rule applies to
Default value: any
The following parameters are available in the windows_firewall_rule
type.
namevar
Name of this rule