milanollo: {
$client_range = '172.29.122.0/24'
}
+ buxtehude,glinka: {
+ $client_range = '192.168.2.0/24'
+ }
default: {
- $client_range = '0.0.0.0/0'
+ # Better than 0.0.0.0/0 - we really ought to configure a
+ # client range for them all instead of exporting to the world.
+ $client_range = '127.0.0.0/8'
}
}
@ferm::rule { 'dsa-portmap':
description => 'Allow portmap access',
- rule => '&TCP_UDP_SERVICE_RANGE(111, $client_range)'
+ rule => "&TCP_UDP_SERVICE_RANGE(111, $client_range)"
}
@ferm::rule { 'dsa-nfs':
description => 'Allow nfsd access',
- rule => '&TCP_UDP_SERVICE_RANGE(2049, $client_range)'
+ rule => "&TCP_UDP_SERVICE_RANGE(2049, $client_range)"
}
@ferm::rule { 'dsa-status':
description => 'Allow statd access',
- rule => '&TCP_UDP_SERVICE_RANGE(10000, $client_range)'
+ rule => "&TCP_UDP_SERVICE_RANGE(10000, $client_range)"
}
@ferm::rule { 'dsa-mountd':
description => 'Allow mountd access',
- rule => '&TCP_UDP_SERVICE_RANGE(10002, $client_range)'
+ rule => "&TCP_UDP_SERVICE_RANGE(10002, $client_range)"
}
@ferm::rule { 'dsa-lockd':
description => 'Allow lockd access',
- rule => '&TCP_UDP_SERVICE_RANGE(10003, $client_range)'
+ rule => "&TCP_UDP_SERVICE_RANGE(10003, $client_range)"
}
file { '/etc/default/nfs-common':