1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
|
class site_shorewall::eip {
# be safe for development
$shorewall_startup='0'
include site_shorewall::defaults
shorewall::interface {'tun0':
zone => 'eip',
rfc1918 => $shorewall_rfc1918_maineth,
options => 'tcpflags,blacklist,nosmurfs'; }
shorewall::interface {'tun1':
zone => 'eip',
rfc1918 => $shorewall_rfc1918_maineth,
options => 'tcpflags,blacklist,nosmurfs'; }
shorewall::zone {'eip':
type => 'ipv4'; }
shorewall::routestopped {'eth0':
interface => 'eth0'; }
shorewall::masq {'eth0':
interface => 'eth0',
source => ''; }
shorewall::policy {
'all-to-all':
sourcezone => 'all',
destinationzone => 'all',
policy => 'DROP',
order => 200;
}
shorewall::rule {
'all2all-ping':
source => 'all',
destination => 'all',
action => 'Ping(ACCEPT)',
order => 200;
'all2all-ssh':
source => 'all',
destination => 'all',
action => 'SSH(ACCEPT)',
order => 200;
'all2all-openvpn':
source => 'all',
destination => 'all',
action => 'OpenVPN(ACCEPT)',
order => 200;
'fw2all-http':
source => '$FW',
destination => 'all',
action => 'HTTP(ACCEPT)',
order => 200;
'fw2all-DNS':
source => '$FW',
destination => 'all',
action => 'DNS(ACCEPT)',
order => 200;
'eip2fw-https':
source => 'eip',
destination => '$FW',
action => 'HTTPS(ACCEPT)',
order => 200;
}
}
|