X-Git-Url: https://git.donarmstrong.com/?a=blobdiff_plain;f=modules%2Fferm%2Fmanifests%2Fper-host.pp;h=ec082c385b0eb440b6338caee28317ce6dcc2d85;hb=5f9b6e60800eeff29318662b84404dc0d23283dc;hp=d7db488590bc55afb66644a637f26d07e4b92312;hpb=889e06467b0aecabf1b753c64f5ef61ee5d4114e;p=dsa-puppet.git diff --git a/modules/ferm/manifests/per-host.pp b/modules/ferm/manifests/per-host.pp index d7db4885..ec082c38 100644 --- a/modules/ferm/manifests/per-host.pp +++ b/modules/ferm/manifests/per-host.pp @@ -6,7 +6,7 @@ class ferm::per-host { } } case $hostname { - franck,gluck,kaufmann,kassia,klecker,lobos,morricone,raff,ries,rietz,saens,schein,senfl,steffani,valente,villa,wieck: { + chopin,franck,gluck,kaufmann,kassia,klecker,lobos,merikanto,morricone,raff,ravel,ries,rietz,saens,schein,senfl,stabile,steffani,valente,villa,wieck: { include ferm::rsync } } @@ -18,19 +18,23 @@ class ferm::per-host { } case $hostname { - ravel: { - include ferm::nfs-server - } - } - - case $hostname { - piatti: { + piatti,samosa: { @ferm::rule { "dsa-udd-stunnel": description => "port 8080 for udd stunnel", rule => "&SERVICE_RANGE(tcp, http-alt, ( 192.25.206.16 70.103.162.29 217.196.43.134 ))" } } + paganini: { + @ferm::rule { "dsa-dhcp": + description => "Allow dhcp access", + rule => "&SERVICE(udp, 67)" + } + @ferm::rule { "dsa-tftp": + description => "Allow tftp access", + rule => "&SERVICE(udp, 69)" + } + } handel: { @ferm::rule { "dsa-puppet": description => "Allow puppet access", @@ -57,12 +61,6 @@ class ferm::per-host { rule => "&SERVICE_RANGE(tcp, rsync, ( 195.20.242.90 192.25.206.33 82.195.75.106 206.12.19.118 ))" } } - beethoven: { - @ferm::rule { "dsa-merikanto-beethoven": - description => "Allow merikanto", # for nfs, and that uses all kind of ports by default. - rule => "source 172.22.127.147 interface bond0 jump ACCEPT", - } - } heininen: { @ferm::rule { "dsa-syslog": description => "Allow syslog access", @@ -110,5 +108,119 @@ class ferm::per-host { rule => "&SERVICE(tcp, 636)" } } + cilea: { + file { + "/etc/ferm/conf.d/load_sip_conntrack.conf": + source => "puppet:///modules/ferm/conntrack_sip.conf", + require => Package["ferm"], + notify => Exec["ferm restart"]; + } + @ferm::rule { "dsa-sip": + domain => "(ip ip6)", + description => "Allow sip access", + rule => "&TCP_UDP_SERVICE(5060)" + } + @ferm::rule { "dsa-sipx": + domain => "(ip ip6)", + description => "Allow sipx access", + rule => "&TCP_UDP_SERVICE(5080)" + } + } + } + + + + + case $hostname { rautavaara,luchesi: { + @ferm::rule { "dsa-to-kfreebsd": + description => "Traffic routed to kfreebsd hosts", + chain => 'to-kfreebsd', + rule => 'proto icmp ACCEPT; + source ($FREEBSD_SSH_ACCESS $HOST_NAGIOS_V4) proto tcp dport 22 ACCEPT; + source ($HOST_MAILRELAY_V4 $HOST_NAGIOS_V4) proto tcp dport 25 ACCEPT; + source ($HOST_MUNIN_V4 $HOST_NAGIOS_V4) proto tcp dport 4949 ACCEPT; + source ($HOST_NAGIOS_V4) proto tcp dport 5666 ACCEPT; + source ($HOST_NAGIOS_V4) proto udp dport ntp ACCEPT; + ' + } + @ferm::rule { "dsa-from-kfreebsd": + description => "Traffic routed from kfreebsd vlan/bridge", + chain => 'from-kfreebsd', + rule => 'proto icmp ACCEPT; + proto tcp dport (21 22 80 53 443) ACCEPT; + proto udp dport (53 123) ACCEPT; + proto tcp dport 8140 daddr 82.195.75.104 ACCEPT; # puppethost + proto tcp dport 5140 daddr 82.195.75.98 ACCEPT; # loghost + proto tcp dport (25 submission) daddr ($HOST_MAILRELAY_V4) ACCEPT; + ' + } + }} + case $hostname { + rautavaara: { + @ferm::rule { "dsa-routing": + description => "forward chain", + chain => "FORWARD", + rule => ' + def $ADDRESS_FASCH=194.177.211.201; + def $ADDRESS_FIELD=194.177.211.210; + def $FREEBSD_HOSTS=($ADDRESS_FASCH $ADDRESS_FIELD); + + policy ACCEPT; + mod state state (ESTABLISHED RELATED) ACCEPT; + interface vlan11 outerface eth0 jump from-kfreebsd; + interface eth0 destination ($FREEBSD_HOSTS) jump to-kfreebsd; + ULOG ulog-prefix "REJECT FORWARD: "; + REJECT reject-with icmp-admin-prohibited; + ' + } + } + luchesi: { + @ferm::rule { "dsa-routing": + description => "forward chain", + chain => "FORWARD", + rule => ' + def $ADDRESS_FANO=206.12.19.110; + def $ADDRESS_FINZI=206.12.19.111; + def $FREEBSD_HOSTS=($ADDRESS_FANO $ADDRESS_FINZI); + + policy ACCEPT; + mod state state (ESTABLISHED RELATED) ACCEPT; + interface br0 outerface br0 ACCEPT; + + interface br2 outerface br0 jump from-kfreebsd; + interface br0 destination ($FREEBSD_HOSTS) jump to-kfreebsd; + ULOG ulog-prefix "REJECT FORWARD: "; + REJECT reject-with icmp-admin-prohibited; + ' + } + } + } + + # redirect snapshot into varnish + case $hostname { + sibelius: { + @ferm::rule { "dsa-snapshot-varnish": + rule => '&SERVICE(tcp, 6081)', + } + @ferm::rule { "dsa-nat-snapshot-varnish": + table => 'nat', + chain => 'PREROUTING', + rule => 'proto tcp daddr 193.62.202.28 dport 80 REDIRECT to-ports 6081', + } + } + stabile: { + @ferm::rule { "dsa-snapshot-varnish": + rule => '&SERVICE(tcp, 6081)', + } + @ferm::rule { "dsa-nat-snapshot-varnish": + table => 'nat', + chain => 'PREROUTING', + rule => 'proto tcp daddr 206.12.19.150 dport 80 REDIRECT to-ports 6081', + } + } } } + +# vim:set et: +# vim:set sts=4 ts=4: +# vim:set shiftwidth=4: