-
Notifications
You must be signed in to change notification settings - Fork 210
/
sample_gce.pol
117 lines (102 loc) · 2.48 KB
/
sample_gce.pol
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
#
# This is an example policy for capirca
# Target defaults to INGRESS is not specified in the header
#
header {
comment:: "this is a sample policy to generate GCE filter"
target:: gce global/networks/default inet
}
term test-ssh {
comment:: "Allow SSH access to all instances from company."
source-address:: PUBLIC_NAT
protocol:: tcp
destination-port:: SSH
action:: accept
}
term test-web {
comment:: "Allow HTTP/S to instances with webserver tag."
source-address:: ANY
protocol:: tcp
destination-port:: HTTP
destination-tag:: webserver
action:: accept
}
term test-icmp {
comment:: "Allow ICMP from company."
source-address:: PUBLIC_NAT
protocol:: icmp
action:: accept
}
term test-icmpv6 {
comment:: "Allow ICMPv6 from company. This should not be rendered."
source-address:: PUBLIC_NAT
protocol:: icmpv6
action:: accept
}
term test-igmp {
comment:: "Allow IGMP from company."
source-address:: PUBLIC_NAT
protocol:: igmp
action:: accept
}
term test-multiple-protocols {
comment:: "Allow TCP/UDP access to all instances from company."
source-address:: PUBLIC_NAT
protocol:: tcp udp
destination-port:: HIGH_PORTS
action:: accept
}
term test-multiple-protocols-tcp-icmpv6 {
comment:: "Allow all tcp and icmpv6. This should only render tcp."
source-address:: PUBLIC_NAT
protocol:: tcp icmpv6
action:: accept
}
term test-multiple-protocols-tcp-icmp {
comment:: "Allow all tcp and icmp."
source-address:: PUBLIC_NAT
protocol:: tcp icmp
action:: accept
}
term test-internal {
comment:: "Allow all GCE network internal traffic."
source-address:: RFC1918
protocol:: tcp udp
action:: accept
}
term default-deny {
action:: deny
}
#
# Sample EGRESS policy
# If source-tag is included, it maps to targetTags in the GCP Egress rule
#
header {
comment:: "this is a sample policy to generate EGRESS GCE filter"
target:: gce EGRESS global/networks/default inet
}
term test-egress-address {
comment:: "Outbound to Mail Server"
protocol:: tcp
destination-port:: SMTP
destination-address:: MAIL_SERVERS
action:: accept
}
term test-egress-tag {
comment:: "Outbound to RFC1918"
protocol:: tcp
destination-port:: SSH
destination-address:: PUBLIC_NAT
source-tag:: webserver
action:: accept
}
term test-egress-address-v6-only {
comment:: "Outbound to IPv6 Server. This should not be rendered."
protocol:: tcp
destination-port:: SMTP
destination-address:: PUBLIC_IPV6_SERVERS
action:: accept
}
term default-deny {
action:: deny
}