# Firewall Policies This module allows creation and management of two different firewall policy types: - a [hierarchical policy](https://cloud.google.com/firewall/docs/firewall-policies) in a folder or organization, or - a [global](https://cloud.google.com/vpc/docs/network-firewall-policies) or [regional](https://cloud.google.com/vpc/docs/regional-firewall-policies) network policy The module also manages policy rules via code or a factory, and optional policy attachments. The interface deviates slightly from the [`net-vpc-firewall`](../net-vpc-firewall/) module since the underlying resources and API objects are different. The module also makes fewer assumptions about implicit defaults, only using one to set `match.layer4_configs` to `[{ protocol = "all" }]` if no explicit set of protocols and ports has been specified. ## Examples ### Hierarchical Policy ```hcl module "firewall-policy" { source = "./fabric/modules/net-vpc-firewall-policy" name = "test-1" parent_id = "folders/1234567890" attachments = { test = "folders/4567890123" } egress_rules = { smtp = { priority = 900 match = { destination_ranges = ["0.0.0.0/0"] layer4_configs = [{ protocol = "tcp", ports = ["25"] }] } } } ingress_rules = { icmp = { priority = 1000 match = { source_ranges = ["0.0.0.0/0"] layer4_configs = [{ protocol = "icmp" }] } } mgmt = { priority = 1001 match = { source_ranges = ["10.1.1.0/24"] } } ssh = { priority = 1002 match = { source_ranges = ["10.0.0.0/8"] # source_tags = ["tagValues/123456"] layer4_configs = [{ protocol = "tcp", ports = ["22"] }] } } } } # tftest modules=1 resources=6 inventory=hierarchical.yaml ``` ### Global Network policy ```hcl module "vpc" { source = "./fabric/modules/net-vpc" project_id = "my-project" name = "my-network" } module "firewall-policy" { source = "./fabric/modules/net-vpc-firewall-policy" name = "test-1" parent_id = "my-project" attachments = { my-vpc = module.vpc.self_link } egress_rules = { smtp = { priority = 900 match = { destination_ranges = ["0.0.0.0/0"] layer4_configs = [{ protocol = "tcp", ports = ["25"] }] } } } ingress_rules = { icmp = { priority = 1000 match = { source_ranges = ["0.0.0.0/0"] layer4_configs = [{ protocol = "icmp" }] } } mgmt = { priority = 1001 match = { source_ranges = ["10.1.1.0/24"] } } ssh = { priority = 1002 match = { source_ranges = ["10.0.0.0/8"] # source_tags = ["tagValues/123456"] layer4_configs = [{ protocol = "tcp", ports = ["22"] }] } } } } # tftest modules=2 resources=9 inventory=global-net.yaml ``` ### Regional Network policy ```hcl module "vpc" { source = "./fabric/modules/net-vpc" project_id = "my-project" name = "my-network" } module "firewall-policy" { source = "./fabric/modules/net-vpc-firewall-policy" name = "test-1" parent_id = "my-project" region = "europe-west8" attachments = { my-vpc = module.vpc.self_link } egress_rules = { smtp = { priority = 900 match = { destination_ranges = ["0.0.0.0/0"] layer4_configs = [{ protocol = "tcp", ports = ["25"] }] } } } ingress_rules = { icmp = { priority = 1000 match = { source_ranges = ["0.0.0.0/0"] layer4_configs = [{ protocol = "icmp" }] } } } } # tftest modules=2 resources=7 inventory=regional-net.yaml ``` ### Factory Similarly to other modules, a rules factory (see [Resource Factories](../../blueprints/factories/)) is also included here to allow route management via descriptive configuration files. Factory configuration is via three optional attributes in the `rules_factory_config` variable: - `cidr_file_path` specifying the path to a mapping of logical names to CIDR ranges, used for source and destination ranges in rules when available - `egress_rules_file_path` specifying the path to the egress rules file - `ingress_rules_file_path` specifying the path to the ingress rules file Factory rules are merged with rules declared in code, with the latter taking precedence where both use the same key. This is an example of a simple factory: ```hcl module "firewall-policy" { source = "./fabric/modules/net-vpc-firewall-policy" name = "test-1" parent_id = "folders/1234567890" attachments = { test = "folders/4567890123" } ingress_rules = { ssh = { priority = 1002 match = { source_ranges = ["10.0.0.0/8"] layer4_configs = [{ protocol = "tcp", ports = ["22"] }] } } } rules_factory_config = { cidr_file_path = "configs/cidrs.yaml" egress_rules_file_path = "configs/egress.yaml" ingress_rules_file_path = "configs/ingress.yaml" } } # tftest modules=1 resources=5 files=cidrs,egress,ingress inventory=factory.yaml ``` ```yaml # tftest-file id=cidrs path=configs/cidrs.yaml rfc1918: - 10.0.0.0/8 - 172.16.0.0/12 - 192.168.0.0/24 ``` ```yaml # tftest-file id=egress path=configs/egress.yaml smtp: priority: 900 match: destination_ranges: - rfc1918 layer4_configs: - protocol: tcp ports: - 25 ``` ```yaml # tftest-file id=ingress path=configs/ingress.yaml icmp: priority: 1000 match: source_ranges: - 10.0.0.0/8 layer4_configs: - protocol: icmp ``` ## Variables | name | description | type | required | default | |---|---|:---:|:---:|:---:| | [name](variables.tf#L113) | Policy name. | string | ✓ | | | [parent_id](variables.tf#L119) | Parent node where the policy will be created, `folders/nnn` or `organizations/nnn` for hierarchical policy, project id for a network policy. | string | ✓ | | | [attachments](variables.tf#L17) | Ids of the resources to which this policy will be attached, in descriptive name => self link format. Specify folders or organization for hierarchical policy, VPCs for network policy. | map(string) | | {} | | [description](variables.tf#L24) | Policy description. | string | | null | | [egress_rules](variables.tf#L30) | List of egress rule definitions, action can be 'allow', 'deny', 'goto_next'. The match.layer4configs map is in protocol => optional [ports] format. | map(object({…})) | | {} | | [ingress_rules](variables.tf#L71) | List of ingress rule definitions, action can be 'allow', 'deny', 'goto_next'. | map(object({…})) | | {} | | [region](variables.tf#L125) | Policy region. Leave null for hierarchical policy, or global network policy. | string | | null | | [rules_factory_config](variables.tf#L131) | Configuration for the optional rules factory. | object({…}) | | {} | ## Outputs | name | description | sensitive | |---|---|:---:| | [id](outputs.tf#L17) | Fully qualified firewall policy id. | |