Skip to content
GitLab
Menu
Projects
Groups
Snippets
/
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
Menu
Open sidebar
immerda
Puppet Modules
firewall
Commits
c76f342e
Commit
c76f342e
authored
Jun 14, 2021
by
mh
Browse files
add more rules
parent
725712c2
Changes
4
Hide whitespace changes
Inline
Side-by-side
manifests/rules/imap.pp
0 → 100644
View file @
c76f342e
# manage incoming imap
class
firewall::rules::imap
{
include
firewall
if
$firewall::use_nftables
{
nftables::rule
{
'default_in-imap'
:
content
=>
'tcp dport {143, 993} accept'
,
}
}
else
{
include
shorewall::rules::imap
}
}
manifests/rules/managesieve.pp
0 → 100644
View file @
c76f342e
# manage incoming managesieve
class
firewall::rules::managesieve
{
include
firewall
if
$firewall::use_nftables
{
nftables::rule
{
'default_in-managesieve'
:
content
=>
'tcp dport 4190 accept'
,
}
}
else
{
include
shorewall::rules::managesieve
}
}
manifests/rules/out/managesieve.pp
0 → 100644
View file @
c76f342e
# outgoing managesieve
class
firewall::rules::out::managesieve
{
include
firewall
if
$firewall::use_nftables
{
nftables::rule
{
'default_out-managesieve'
:
content
=>
'tcp dport 4190 accept'
,
}
}
else
{
include
shorewall::rules::out::managesieve
}
}
manifests/rules/pop3.pp
0 → 100644
View file @
c76f342e
# manage incoming pop3
class
firewall::rules::pop3
{
include
firewall
if
$firewall::use_nftables
{
nftables::rule
{
'default_in-pop3'
:
content
=>
'tcp dport {110, 995} accept'
,
}
}
else
{
include
shorewall::rules::pop3
}
}
Write
Preview
Supports
Markdown
0%
Try again
or
attach a new file
.
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment