handel: {
@ferm::rule { 'dsa-puppet':
description => 'Allow puppet access',
- rule => '&SERVICE_RANGE(tcp, 8140, \$HOST_DEBIAN_V4)'
+ rule => '&SERVICE_RANGE(tcp, 8140, $HOST_DEBIAN_V4)'
}
@ferm::rule { 'dsa-puppet-v6':
domain => 'ip6',
description => 'Allow puppet access',
- rule => '&SERVICE_RANGE(tcp, 8140, \$HOST_DEBIAN_V6)'
+ rule => '&SERVICE_RANGE(tcp, 8140, $HOST_DEBIAN_V6)'
}
}
powell: {
heininen,lotti: {
@ferm::rule { 'dsa-syslog':
description => 'Allow syslog access',
- rule => '&SERVICE_RANGE(tcp, 5140, \$HOST_DEBIAN_V4)'
+ rule => '&SERVICE_RANGE(tcp, 5140, $HOST_DEBIAN_V4)'
}
@ferm::rule { 'dsa-syslog-v6':
domain => 'ip6',
description => 'Allow syslog access',
- rule => '&SERVICE_RANGE(tcp, 5140, \$HOST_DEBIAN_V6)'
+ rule => '&SERVICE_RANGE(tcp, 5140, $HOST_DEBIAN_V6)'
}
}
kaufmann: {
rule => '&SERVICE(tcp, 6523)'
}
}
- bendel,liszt: {
- @ferm::rule { 'smtp':
- domain => '(ip ip6)',
- description => 'Allow smtp access',
- rule => '&SERVICE(tcp, 25)'
- }
- }
draghi: {
#@ferm::rule { 'dsa-bind':
# domain => '(ip ip6)',
}
}
cilea: {
- file {
- '/etc/ferm/conf.d/load_sip_conntrack.conf':
- source => 'puppet:///modules/ferm/conntrack_sip.conf',
- require => Package['ferm'],
- notify => Exec['ferm restart'];
- }
+ ferm::module { 'nf_conntrack_sip': }
+ ferm::module { 'nf_conntrack_h323': }
+
@ferm::rule { 'dsa-sip':
domain => '(ip ip6)',
description => 'Allow sip access',
policy ACCEPT;
mod state state (ESTABLISHED RELATED) ACCEPT;
interface br0 outerface br0 ACCEPT;
+interface br1 outerface br1 ACCEPT;
interface br2 outerface br0 jump from-kfreebsd;
interface br0 destination ($FREEBSD_HOSTS) jump to-kfreebsd;
default: {}
}
- if $::rsyncd == true {
+ if $::rsyncd {
include ferm::rsync
}
}