This is an nftables-specific module designed to manage Linux firewalls. It is expected that this state module, and other system-specific firewall states, may at some point be deprecated in favor of a more generic firewall state.
httpd:
nftables.append:
- table: filter
- chain: input
- jump: accept
- match: state
- connstate: new
- dport: 80
- proto: tcp
- sport: 1025:65535
- save: True
httpd:
nftables.append:
- table: filter
- family: ipv6
- chain: INPUT
- jump: ACCEPT
- match: state
- connstate: NEW
- dport: 80
- proto: tcp
- sport: 1025:65535
- save: True
httpd:
nftables.insert:
- position: 1
- table: filter
- chain: INPUT
- jump: ACCEPT
- match: state
- connstate: NEW
- dport: 80
- proto: tcp
- sport: 1025:65535
- save: True
httpd:
nftables.insert:
- position: 1
- table: filter
- family: ipv6
- chain: INPUT
- jump: ACCEPT
- match: state
- connstate: NEW
- dport: 80
- proto: tcp
- sport: 1025:65535
- save: True
httpd:
nftables.delete:
- table: filter
- chain: INPUT
- jump: ACCEPT
- match: state
- connstate: NEW
- dport: 80
- proto: tcp
- sport: 1025:65535
- save: True
httpd:
nftables.delete:
- position: 1
- table: filter
- chain: INPUT
- jump: ACCEPT
- match: state
- connstate: NEW
- dport: 80
- proto: tcp
- sport: 1025:65535
- save: True
httpd:
nftables.delete:
- table: filter
- family: ipv6
- chain: INPUT
- jump: ACCEPT
- match: state
- connstate: NEW
- dport: 80
- proto: tcp
- sport: 1025:65535
- save: True
output:
nftables.chain_present:
- family: ip
- table: filter
output:
nftables.chain_absent:
- family: ip
- table: filter
New in version 0.17.0.
Append a rule to a chain
A user-defined name to call this rule by in another part of a state or formula. This should not be an actual rule.
Network family, ipv4 or ipv6.
All other arguments are passed in with the same name as the long option that would normally be used for nftables, with one exception: --state is specified as connstate instead of state (not to be confused with ctstate).
New in version 2014.7.0.
Verify the chain is absent.
Networking family, either ipv4 or ipv6
New in version 2014.7.0.
Changed in version 3002.
Verify a chain exists in a table.
A user-defined chain name.
The table to own the chain.
Networking family, either ipv4 or ipv6
New in version 2014.7.0.
Delete a rule to a chain
A user-defined name to call this rule by in another part of a state or formula. This should not be an actual rule.
Networking family, either ipv4 or ipv6
All other arguments are passed in with the same name as the long option that would normally be used for nftables, with one exception: --state is specified as connstate instead of state (not to be confused with ctstate).
New in version 2014.7.0.
Changed in version 3002.
Flush current nftables state
Networking family, either ipv4 or ipv6
If set to True, attempts to flush a non-existent table will not result in a failed state.
New in version 3002.
New in version 2014.7.0.
Insert a rule into a chain
A user-defined name to call this rule by in another part of a state or formula. This should not be an actual rule.
Networking family, either ipv4 or ipv6
All other arguments are passed in with the same name as the long option that would normally be used for nftables, with one exception: --state is specified as connstate instead of state (not to be confused with ctstate).
New in version 3002.
Sets the default policy for nftables chains
The table that owns the chain that should be modified
Networking family, either ipv4 or ipv6
The requested table policy (accept or drop)
Boolean to save the in-memory nftables settings to a file.
The filename to save the nftables settings (default: /etc/nftables or /etc/nftables/salt-all-in-one.nft if the former is a directory)
New in version 3002.
Ensure an nftables table is absent
Name of the table to ensure is absent
Networking family, either ipv4 or ipv6
New in version 3002.
Ensure an nftables table is present
A user-defined table name.
Networking family, either ipv4 or ipv6