This collection of roles builds a dedicated open source firewall based on FreeBSD. Functionality similar to open source projects PFSense and OPNSense is provided, while maintaining a minimal management layer.
Advantages:
- Build a simple configuration on vanilla FreeBSD.
- Leverage ZFS on FreeBSD with boot environments.
- No web interface for management, only OpenSSH.
- Configuration management with Ansible and Git.
- Run your configuration on the latest version of FreeBSD and 3rd party packages.
Roles included in this collection:
The base
role is responsible for setting up network interfaces, routing, and the PF firewall. At a minimum, you should use the following roles in your playbook:
wesmarcum.firewall.base
wesmarcum.firewall.unbound
(Recursive DNS resolver)wesmarcum.firewall.kea
(DHCPv4/DHCPv6 server)
See individual role documentation for all configuration parameters. Sample playbooks and configuration are provided in the playbooks
and playbooks/vars
directories.
Install via Ansible Galaxy:
ansible-galaxy collection install wesmarcum.firewall
Alternatively, you can include this collection in your playbook's requirements.yml
file:
---
collections:
- name: wesmarcum.firewall
This collection uses the ipaddr
filter from ansible.utils
. This requires the Python netaddr
library on the Ansible controller. This can be installed via pip:
pip install netaddr
It is recommended to use this collection on a dedicated hardware appliance or VM running FreeBSD. The base
role modifies /etc/rc.conf
when needed, but keeps most of the service configuration in separate files located in /etc/rc.conf.d
.
Before starting, you should have:
- A supported version of FreeBSD. A fresh install is recommended.
- Python 3.
- Sudo or another method to become root.
OS | Version |
---|---|
FreeBSD | 13, 14 |
A simple configuration is provided below. In order to keep the main playbook minimal, you can read all vars from a file. This allows you to keep your entire firewall configuration in one yaml file. Your main playbook can be as simple as the following:
---
- name: Set up firewall
hosts: firewall
become: false
vars_files:
- vars/firewall_simple.yml
roles:
- wesmarcum.firewall.base
- wesmarcum.firewall.unbound
- wesmarcum.firewall.kea
In the file vars/firewall_simple.yml
, you can then define all variables for the role:
---
firewall_interfaces:
em0:
name: "outside"
external: true
ipv4_address: "dhcp"
ipv6_address: "dhcp"
ipv6_cpe_wanif: true
em1:
name: "inside"
ipv4_address: "10.0.0.1/24"
ipv6_address: "fd00:0001:0002::1/64"
domain: "lan.local"
mtu: 1500
# Define a list of local zones and zone types.
# DNSSEC will be disabled for these zones.
firewall_unbound_local_zones:
- zone: lan.local.
type: nodefault
# Define a list of local zones for reverse lookups.
firewall_unbound_local_zones_rev:
- zone: "10.in-addr.arpa."
- zone: "d.f.ip6.arpa."
# Disable DHCPv6. SLAAC can be used instead.
firewall_kea_dhcp6_enable: false
# DHCPv4 configuration.
firewall_kea_dhcp4_config:
Dhcp4:
# interfaces to activate for Kea
interfaces-config:
interfaces:
- em1
# dhcp socket type is 'raw' by default. Change to 'udp' for relays.
dhcp-socket-type: raw
# control socket - uncomment if api is enabled
# control-socket:
# socket-type: unix
# socket-name: "/tmp/kea4-ctrl-socket"
lease-database:
type: memfile
persist: true
lfc-interval: 3600
name: /usr/local/var/lib/kea/dhcp4.leases
expired-leases-processing:
reclaim-timer-wait-time: 10
flush-reclaimed-timer-wait-time: 25
hold-reclaimed-time: 3600
max-reclaim-leases: 100
max-reclaim-time: 250
unwarned-reclaim-cycles: 5
# global timers
renew-timer: 10800
rebind-timer: 21600
valid-lifetime: 43200
max-valid-lifetime: 86400
min-valid-lifetime: 3600
# Pools
subnet4:
- subnet: 10.0.0.0/24
id: 1000
interface: em1
pools:
- pool: 10.0.0.100 - 10.0.0.200
option-data:
- name: routers
data: 10.0.0.1
- name: domain-name
data: lan.local
- name: domain-name-servers
data: 10.0.0.1
loggers:
- name: kea-dhcp4
output_options:
- output: /var/log/kea-dhcp4.log
pattern: |
{% raw %}%d{%j %H:%M:%S.%q} %c %m{% endraw %}
flush: true
maxsize: 10240000
maxver: 8
severity: INFO
debuglevel: 0
Roles have one or more enable
variables that can be set to true
or false
. These variables are usually set to true
by default, which will enable the role and run the tasks. If set to false
, tasks intended to uninstall packages and remove configuration files will run. For example, to uninstall NSD and remove configuration files:
- Set
firewall_nsd_enable
tofalse
in your vars file. - Run your playbook to run the uninstall tasks.
- Remove the
wesmarcum.firewall.nsd
role from your playbook.
MIT
https://github.com/wesmarcum/
1.1.3: Add validation for Kea configuration.
1.1.2: Add subnet IDs for Kea 2.6.
1.1.1: Add trippy
to monitoring role.
1.1.0: Migrate MTA to dma
for FreeBSD 14. Breaking change: read monitoring documentation and update vars.
1.0.3: Update cpu-microcode package.
1.0.2: FreeBSD 13.2 support. Use Wireguard kernel module by default.
1.0.1: Add support for smartd, microcode updates.
1.0.0: Initial release.