-
Notifications
You must be signed in to change notification settings - Fork 210
/
Copy pathsample_gcp_hf.pol
102 lines (88 loc) · 2.12 KB
/
sample_gcp_hf.pol
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
header {
comment:: "This is sample policy for GCP HF"
target:: gcp_hf testhf INGRESS inet beta 200
}
term folder-ssh{
comment:: "Allow SSH into folder-test"
source-address:: PUBLIC_NAT
protocol:: tcp
destination-port:: SSH
action:: next
}
term folder-rdp {
comment:: "Allow RDP to targetResources. Making long comment to show truncation."
source-address:: PUBLIC_NAT
protocol:: tcp
destination-port:: RDP
target-resources:: (proj-1,vpc1)
action:: next
}
term test-icmp {
comment:: "Allow ICMP from company."
source-address:: PUBLIC_NAT
protocol:: icmp
action:: accept
}
term test-icmpv6 {
comment:: "Allow ICMPv6 from company. This should not be rendered."
source-address:: PUBLIC_NAT
protocol:: icmpv6
action:: accept
}
term test-igmp {
comment:: "Allow IGMP from company."
source-address:: PUBLIC_NAT
protocol:: igmp
action:: accept
}
term test-multiple-protocols {
comment:: "Allow TCP/UDP access to all instances from company."
source-address:: PUBLIC_NAT
protocol:: tcp udp
destination-port:: HIGH_PORTS
action:: accept
}
term test-multiple-protocols-tcp-icmpv6 {
comment:: "Allow all tcp and icmpv6. This should only render tcp."
source-address:: PUBLIC_NAT
protocol:: tcp icmpv6
action:: accept
}
term test-multiple-protocols-tcp-icmp {
comment:: "Allow all tcp and icmp."
source-address:: PUBLIC_NAT
protocol:: tcp icmp
action:: accept
}
term default-deny {
action:: deny
}
header {
comment:: "This is sample policy for GCP HF"
target:: gcp_hf testhf EGRESS inet 200
}
term folder-smtp{
comment:: "Allow egress to mail servers"
protocol:: tcp
destination-port:: SMTP
destination-address:: MAIL_SERVERS
action:: next
}
term folder-ssh-nat{
comment:: "Allow egress ssh to RFC1918"
protocol:: tcp
destination-port:: SSH
destination-address:: PUBLIC_NAT
target-resources:: (proj-2,vpc2)
action:: next
}
term test-egress-address-v6-only {
comment:: "Outbound to IPv6 Server. This should not be rendered."
protocol:: tcp
destination-port:: SMTP
destination-address:: PUBLIC_IPV6_SERVERS
action:: accept
}
term default-deny {
action:: deny
}