diff options
author | Silvio Rhatto <rhatto@riseup.net> | 2015-09-11 21:43:49 -0300 |
---|---|---|
committer | Silvio Rhatto <rhatto@riseup.net> | 2015-09-11 21:43:49 -0300 |
commit | 279c52185ec96cd1f8b0c25a1a14b0e537c1c11a (patch) | |
tree | 58a7c463029738804df3650e33ada7ed814b728d /manifests/vm/mail.pp | |
parent | 303e2cfcb14fb9dcec2fcda13608389f84bfb307 (diff) | |
download | puppet-firewall-279c52185ec96cd1f8b0c25a1a14b0e537c1c11a.tar.gz puppet-firewall-279c52185ec96cd1f8b0c25a1a14b0e537c1c11a.tar.bz2 |
Split and rename
Diffstat (limited to 'manifests/vm/mail.pp')
-rw-r--r-- | manifests/vm/mail.pp | 64 |
1 files changed, 64 insertions, 0 deletions
diff --git a/manifests/vm/mail.pp b/manifests/vm/mail.pp new file mode 100644 index 0000000..f629865 --- /dev/null +++ b/manifests/vm/mail.pp @@ -0,0 +1,64 @@ +class firewall::vm::mail($destination, $zone = 'fw') { + shorewall::rule { 'mail-1': + action => 'DNAT', + source => 'net', + destination => "$zone:$destination:25", + proto => 'tcp', + destinationport => '25', + ratelimit => '-', + order => 1000, + } + + shorewall::rule { 'mail-2': + action => 'DNAT', + source => '$FW', + destination => "$zone:$destination:25", + proto => 'tcp', + destinationport => '25', + originaldest => hiera('firewall::external_ip', $::ipaddress), + ratelimit => '-', + order => 1001, + } + + shorewall::rule { 'mail-3': + action => 'DNAT', + source => 'net', + destination => "$zone:$destination:993", + proto => 'tcp', + destinationport => '993', + ratelimit => hiera("firewall::ssl_ratelimit", '-'), + order => 1002, + } + + shorewall::rule { 'mail-4': + action => 'DNAT', + source => '$FW', + destination => "$zone:$destination:993", + proto => 'tcp', + destinationport => '993', + originaldest => hiera('firewall::external_ip', $::ipaddress), + ratelimit => hiera("firewall::ssl_ratelimit", '-'), + order => 1003, + } + + shorewall::rule { 'mail-5': + action => 'DNAT', + source => 'net', + destination => "$zone:$destination:587", + proto => 'tcp', + destinationport => '587', + ratelimit => hiera("firewall::ssl_ratelimit", '-'), + order => 1004, + } + + shorewall::rule { 'mail-6': + action => 'DNAT', + source => '$FW', + destination => "$zone:$destination:587", + proto => 'tcp', + destinationport => '587', + originaldest => hiera('firewall::external_ip', $::ipaddress), + ratelimit => hiera("firewall::ssl_ratelimit", '-'), + order => 1005, + } +} |