+ scelsi: {
+ @ferm::rule { "dc11-icecast":
+ domain => "(ip ip6)",
+ description => "Allow icecast access",
+ rule => "&SERVICE(tcp, 8000)"
+ }
+ }
+ }
+
+ case $hostname { rautavaara,luchesi: {
+ @ferm::rule { "dsa-to-kfreebsd":
+ description => "Traffic routed to kfreebsd hosts",
+ chain => 'to-kfreebsd',
+ rule => 'proto icmp ACCEPT;
+ source ($FREEBSD_SSH_ACCESS $HOST_NAGIOS_V4) proto tcp dport 22 ACCEPT;
+ source ($HOST_MAILRELAY_V4 $HOST_NAGIOS_V4) proto tcp dport 25 ACCEPT;
+ source ($HOST_MUNIN_V4 $HOST_NAGIOS_V4) proto tcp dport 4949 ACCEPT;
+ source ($HOST_NAGIOS_V4) proto tcp dport 5666 ACCEPT;
+ source ($HOST_NAGIOS_V4) proto udp dport ntp ACCEPT
+ '
+ }
+ @ferm::rule { "dsa-from-kfreebsd":
+ description => "Traffic routed from kfreebsd vlan/bridge",
+ chain => 'from-kfreebsd',
+ rule => 'proto icmp ACCEPT;
+ proto tcp dport (21 22 80 53 443) ACCEPT;
+ proto udp dport (53 123) ACCEPT;
+ proto tcp dport 8140 daddr 82.195.75.104 ACCEPT; # puppethost
+ proto tcp dport 5140 daddr (82.195.75.98 206.12.19.121) ACCEPT; # loghost
+ proto tcp dport 11371 daddr 82.195.75.107 ACCEPT; # keyring host
+ proto tcp dport (25 submission) daddr ($HOST_MAILRELAY_V4) ACCEPT
+ '
+ }
+ }}
+ case $hostname {
+ rautavaara: {
+ @ferm::rule { "dsa-routing":
+ description => "forward chain",
+ chain => "FORWARD",
+ rule => '
+ def $ADDRESS_FASCH=194.177.211.201;
+ def $ADDRESS_FIELD=194.177.211.210;
+ def $FREEBSD_HOSTS=($ADDRESS_FASCH $ADDRESS_FIELD);
+
+ policy ACCEPT;
+ mod state state (ESTABLISHED RELATED) ACCEPT;
+ interface vlan11 outerface eth0 jump from-kfreebsd;
+ interface eth0 destination ($FREEBSD_HOSTS) jump to-kfreebsd;
+ ULOG ulog-prefix "REJECT FORWARD: ";
+ REJECT reject-with icmp-admin-prohibited
+ '
+ }
+ }
+ luchesi: {
+ @ferm::rule { "dsa-routing":
+ description => "forward chain",
+ chain => "FORWARD",
+ rule => '
+ def $ADDRESS_FANO=206.12.19.110;
+ def $ADDRESS_FINZI=206.12.19.111;
+ def $FREEBSD_HOSTS=($ADDRESS_FANO $ADDRESS_FINZI);
+
+ policy ACCEPT;
+ mod state state (ESTABLISHED RELATED) ACCEPT;
+ interface br0 outerface br0 ACCEPT;
+
+ interface br2 outerface br0 jump from-kfreebsd;
+ interface br0 destination ($FREEBSD_HOSTS) jump to-kfreebsd;
+ ULOG ulog-prefix "REJECT FORWARD: ";
+ REJECT reject-with icmp-admin-prohibited
+ '
+ }
+ }
+ }
+
+ # redirect snapshot into varnish
+ case $::hostname {
+ sibelius: {
+ @ferm::rule { "dsa-snapshot-varnish":
+ rule => '&SERVICE(tcp, 6081)',
+ }
+ @ferm::rule { "dsa-nat-snapshot-varnish":
+ table => 'nat',
+ chain => 'PREROUTING',
+ rule => 'proto tcp daddr 193.62.202.30 dport 80 REDIRECT to-ports 6081',
+ }
+ }
+ stabile: {
+ @ferm::rule { "dsa-snapshot-varnish":
+ rule => '&SERVICE(tcp, 6081)',
+ }
+ @ferm::rule { "dsa-nat-snapshot-varnish":
+ table => 'nat',
+ chain => 'PREROUTING',
+ rule => 'proto tcp daddr 206.12.19.150 dport 80 REDIRECT to-ports 6081',
+ }
+ }
+ }
+
+ if $::rsyncd == 'true' {
+ include ferm::rsync