diff --git a/.gitignore b/.gitignore
index fdcf9b4..22f433d 100644
--- a/.gitignore
+++ b/.gitignore
@@ -21,4 +21,4 @@ tags
# ---> Ansible
*.retry
-
+.ansible
diff --git a/README.md b/README.md
index 3edfbf7..8110d0f 100644
--- a/README.md
+++ b/README.md
@@ -1,3 +1,65 @@
-# role_modele
+# role_nftables
-Modèle
\ No newline at end of file
+Allow to install, enable and manage nftables.
+
+## Variables
+
+### nftables_conf_template
+
+Template deployed as nftables configuration.
+
+*Default value: false*
+
+### nftables_conf_path
+
+Configuration fullpath of nftables.
+
+*Default value: false*
+
+### nftables_rules_*
+
+List of dicts containing rules to deploy with comment and associated rules.
+
+*Default value: none*
+
+## Usages
+
+### inventory.yml
+
+```yaml
+---
+
+all:
+ hosts:
+ host1.ykn.local:
+ host2.ykn.local:
+ children:
+ dnsservers:
+ hosts:
+ host1.ykn.local:
+ host2.ykn.local:
+```
+
+### group_vars/dnsservers.yml
+
+```yaml
+---
+
+nftables_rules_dnsservers:
+ - comment: Allow LAN to dns
+ rules:
+ - "ip saddr 192.168.93.0/24 meta l4proto {tcp, udp} th dport 53 accept"
+ - "ip6 saddr abcd:ef9:8765:895::/64 meta l4proto {tcp, udp} th dport 53 accept"
+ - "ip6 saddr fe80::/64 meta l4proto {tcp, udp} th dport 53 accept"
+```
+
+### host_vars/host1.ykn.local.yml
+
+```yaml
+---
+
+nftables_rules_host:
+ - comment: Allow ANY to https
+ rules:
+ - "tcp dport 443 accept"
+```
diff --git a/defaults/main.yml b/defaults/main.yml
new file mode 100644
index 0000000..0a884ba
--- /dev/null
+++ b/defaults/main.yml
@@ -0,0 +1,11 @@
+---
+# defaults file for nftables
+
+# Template used to configure nftables
+nftables_conf_template: nftables.conf.j2
+
+# Default configuration path
+nftables_conf_path: /etc/nftables.conf
+
+# List of rules to deploy
+nftables_rules: []
diff --git a/handlers/main.yml b/handlers/main.yml
new file mode 100644
index 0000000..1747910
--- /dev/null
+++ b/handlers/main.yml
@@ -0,0 +1,10 @@
+---
+# handlers file for nftables
+
+- name: Restart nftables.service
+ ansible.builtin.systemd:
+ name: nftables.service
+ state: restarted
+ enabled: true
+ masked: false
+ become: true
diff --git a/meta/main.yml b/meta/main.yml
index c58bebf..23a4d0c 100644
--- a/meta/main.yml
+++ b/meta/main.yml
@@ -1,7 +1,7 @@
galaxy_info:
namespace: ykn
author: pulsar89.5
- description: Rôle modèle
+ description: Rôle de déploiement de nftables (pare-feu)
license: GPL-3.0-or-later
diff --git a/tasks/configuration.yml b/tasks/configuration.yml
new file mode 100644
index 0000000..55cb9ec
--- /dev/null
+++ b/tasks/configuration.yml
@@ -0,0 +1,20 @@
+---
+# tasks file for nftables
+
+- name: Build rules list
+ ansible.builtin.set_fact:
+ nftables_rules: "{{ nftables_rules + specific }}"
+ when: specific | length > 0
+ loop: "{{ lookup('ansible.builtin.varnames', '^nftables_rules_.+', wantlist=True) }}"
+ vars:
+ specific: "{{ lookup('ansible.builtin.vars', item, default='') }}"
+
+- name: Deploy configuration file
+ ansible.builtin.template:
+ src: "{{ nftables_conf_template }}"
+ dest: "{{ nftables_conf_path }}"
+ owner: root
+ group: root
+ mode: u=rw,g=,o=
+ become: true
+ notify: Restart nftables.service
diff --git a/tasks/installation.yml b/tasks/installation.yml
new file mode 100644
index 0000000..9abded0
--- /dev/null
+++ b/tasks/installation.yml
@@ -0,0 +1,8 @@
+---
+# tasks file for nftables
+
+- name: Install nftables
+ ansible.builtin.apt:
+ state: present
+ name: nftables
+ when: ansible_facts['pkg_mgr'] == "apt"
diff --git a/tasks/main.yml b/tasks/main.yml
new file mode 100644
index 0000000..9c2cef1
--- /dev/null
+++ b/tasks/main.yml
@@ -0,0 +1,10 @@
+---
+# tasks file for nftables
+
+- name: Include installation tasks
+ ansible.builtin.include_tasks:
+ file: installation.yml
+
+- name: Import configuration tasks
+ ansible.builtin.import_tasks:
+ file: configuration.yml
diff --git a/templates/nftables.conf.j2 b/templates/nftables.conf.j2
new file mode 100644
index 0000000..060239a
--- /dev/null
+++ b/templates/nftables.conf.j2
@@ -0,0 +1,31 @@
+#!/usr/sbin/nft -f
+# {{ ansible_managed }}
+
+flush ruleset
+
+table inet filter {
+ chain input {
+ type filter hook input priority 0;
+
+ # Accept any localhost traffic
+ iif lo accept
+
+ # Accept traffic originated from us
+ ct state established,related accept
+
+ # Accept neighbour discovery otherwise IPv6 connectivity breaks.
+ ip6 nexthdr icmpv6 icmpv6 type {nd-neighbor-solicit, nd-router-advert, nd-neighbor-advert} accept
+
+ # Specific rules
+{% for infos in nftables_rules %}
+ ## {{ infos.comment }}
+ {{ infos.rules | join('\n') | indent(width=4, first=false) }}
+{% if not loop.last %}
+
+{% endif %}
+{% endfor %}
+
+ # Count and drop any other traffic
+ counter drop
+ }
+}