+ if $::hostname in [ancina,zandonai,zelenka] {
+ include ferm::zivit
+ }
+
+ if $::hostname in [chopin,franck,gluck,kassia,klecker,lobos,morricone,ravel,ries,rietz,saens,schein,santoro,steffani,valente,villa,wieck,stabile,bizet] {
+ include ferm::ftp
+ }
+
+ case $::hostname {
+ piatti,samosa: {
+ @ferm::rule { 'dsa-udd-stunnel':
+ description => 'port 8080 for udd stunnel',
+ rule => '&SERVICE_RANGE(tcp, http-alt, ( 192.25.206.16 70.103.162.29 217.196.43.134 ))'
+ }
+ }
+ danzi: {
+ @ferm::rule { 'dsa-postgres-danzi':
+ description => 'Allow postgress access',
+ rule => '&SERVICE_RANGE(tcp, 5433, ( 206.12.19.0/24 ))'
+ }
+ @ferm::rule { 'dsa-postgres2-danzi':
+ description => 'Allow postgress access2',
+ rule => '&SERVICE_RANGE(tcp, 5437, ( 206.12.19.0/24 ))'
+ }
+ @ferm::rule { 'dsa-postgres3-danzi':
+ description => 'Allow postgress access2',
+ rule => '&SERVICE_RANGE(tcp, 5436, ( 206.12.19.0/24 ))'
+ }
+ }
+ abel,alwyn,rietz: {
+ @ferm::rule { 'dsa-tftp':
+ description => 'Allow tftp access',
+ rule => '&SERVICE(udp, 69)'
+ }
+ }
+ paganini: {
+ @ferm::rule { 'dsa-dhcp':
+ description => 'Allow dhcp access',
+ rule => '&SERVICE(udp, 67)'
+ }
+ @ferm::rule { 'dsa-tftp':
+ description => 'Allow tftp access',
+ rule => '&SERVICE(udp, 69)'
+ }
+ }
+ handel: {
+ @ferm::rule { 'dsa-puppet':
+ description => 'Allow puppet access',
+ rule => '&SERVICE_RANGE(tcp, 8140, \$HOST_DEBIAN_V4)'
+ }
+ @ferm::rule { 'dsa-puppet-v6':
+ domain => 'ip6',
+ description => 'Allow puppet access',
+ rule => '&SERVICE_RANGE(tcp, 8140, \$HOST_DEBIAN_V6)'
+ }
+ }
+ powell: {
+ @ferm::rule { 'dsa-powell-v6-tunnel':
+ description => 'Allow powell to use V6 tunnel broker',
+ rule => 'proto ipv6 saddr 212.227.117.6 jump ACCEPT'
+ }
+ @ferm::rule { 'dsa-powell-btseed':
+ domain => '(ip ip6)',
+ description => 'Allow powell to seed BT',
+ rule => 'proto tcp dport 8000:8100 jump ACCEPT'
+ }
+ }
+ heininen,lotti: {
+ @ferm::rule { 'dsa-syslog':
+ description => 'Allow syslog access',
+ rule => '&SERVICE_RANGE(tcp, 5140, \$HOST_DEBIAN_V4)'
+ }
+ @ferm::rule { 'dsa-syslog-v6':
+ domain => 'ip6',
+ description => 'Allow syslog access',
+ rule => '&SERVICE_RANGE(tcp, 5140, \$HOST_DEBIAN_V6)'
+ }
+ }
+ kaufmann: {
+ @ferm::rule { 'dsa-hkp':
+ domain => '(ip ip6)',
+ description => 'Allow hkp access',
+ rule => '&SERVICE(tcp, 11371)'
+ }
+ }
+ gombert: {
+ @ferm::rule { 'dsa-infinoted':
+ domain => '(ip ip6)',
+ description => 'Allow infinoted access',
+ rule => '&SERVICE(tcp, 6523)'
+ }
+ }
+ bendel,liszt: {
+ @ferm::rule { 'smtp':
+ domain => '(ip ip6)',
+ description => 'Allow smtp access',
+ rule => '&SERVICE(tcp, 25)'
+ }
+ }
+ draghi: {
+ #@ferm::rule { 'dsa-bind':
+ # domain => '(ip ip6)',
+ # description => 'Allow nameserver access',
+ # rule => '&TCP_UDP_SERVICE(53)'
+ #}
+ @ferm::rule { 'dsa-finger':
+ domain => '(ip ip6)',
+ description => 'Allow finger access',
+ rule => '&SERVICE(tcp, 79)'
+ }
+ @ferm::rule { 'dsa-ldap':
+ domain => '(ip ip6)',
+ description => 'Allow ldap access',
+ rule => '&SERVICE(tcp, 389)'
+ }
+ @ferm::rule { 'dsa-ldaps':
+ domain => '(ip ip6)',
+ description => 'Allow ldaps access',
+ rule => '&SERVICE(tcp, 636)'
+ }
+ }
+ cilea: {
+ file {
+ '/etc/ferm/conf.d/load_sip_conntrack.conf':
+ source => 'puppet:///modules/ferm/conntrack_sip.conf',
+ require => Package['ferm'],
+ notify => Exec['ferm restart'];
+ }
+ @ferm::rule { 'dsa-sip':
+ domain => '(ip ip6)',
+ description => 'Allow sip access',
+ rule => '&TCP_UDP_SERVICE(5060)'
+ }
+ @ferm::rule { 'dsa-sipx':
+ domain => '(ip ip6)',
+ description => 'Allow sipx access',
+ rule => '&TCP_UDP_SERVICE(5080)'
+ }
+ }
+ scelsi: {
+ @ferm::rule { 'dc11-icecast':
+ domain => '(ip ip6)',
+ description => 'Allow icecast access',
+ rule => '&SERVICE(tcp, 8000)'
+ }
+ }
+ default: {}
+ }