handel: {
@ferm::rule { 'dsa-puppet':
description => 'Allow puppet access',
- rule => '&SERVICE_RANGE(tcp, 8140, \$HOST_DEBIAN_V4)'
+ rule => '&SERVICE_RANGE(tcp, 8140, $HOST_DEBIAN_V4)'
}
@ferm::rule { 'dsa-puppet-v6':
domain => 'ip6',
description => 'Allow puppet access',
- rule => '&SERVICE_RANGE(tcp, 8140, \$HOST_DEBIAN_V6)'
+ rule => '&SERVICE_RANGE(tcp, 8140, $HOST_DEBIAN_V6)'
}
}
powell: {
heininen,lotti: {
@ferm::rule { 'dsa-syslog':
description => 'Allow syslog access',
- rule => '&SERVICE_RANGE(tcp, 5140, \$HOST_DEBIAN_V4)'
+ rule => '&SERVICE_RANGE(tcp, 5140, $HOST_DEBIAN_V4)'
}
@ferm::rule { 'dsa-syslog-v6':
domain => 'ip6',
description => 'Allow syslog access',
- rule => '&SERVICE_RANGE(tcp, 5140, \$HOST_DEBIAN_V6)'
+ rule => '&SERVICE_RANGE(tcp, 5140, $HOST_DEBIAN_V6)'
}
}
kaufmann: {
'/etc/ferm/conf.d/load_sip_conntrack.conf':
source => 'puppet:///modules/ferm/conntrack_sip.conf',
require => Package['ferm'],
- notify => Exec['ferm restart'];
+ notify => Service['ferm'],
}
@ferm::rule { 'dsa-sip':
domain => '(ip ip6)',
policy ACCEPT;
mod state state (ESTABLISHED RELATED) ACCEPT;
interface br0 outerface br0 ACCEPT;
+interface br1 outerface br1 ACCEPT;
interface br2 outerface br0 jump from-kfreebsd;
interface br0 destination ($FREEBSD_HOSTS) jump to-kfreebsd;
default: {}
}
- if $::rsyncd == true {
+ if $::rsyncd {
include ferm::rsync
}
}