Most of our vpn hosts are on a 192.168.1.0/24 network. However we have a small number on a 'less secure' 'less trusted' subnet: 192.168.100.0/24. This change adds in logic to: * on log01, allow rsyslog from 192.168.100.x hosts * on ipa servers, allow ipa ports for 192.168.100.x hosts * then reject everything else. This will make sure 192.168.100.x hosts can only hit ssh and the two above items, otherwise all vpn hosts will reject their traffic. This should add a bit of security to having those hosts on the vpn. Signed-off-by: Kevin Fenzi <kevin@scrye.com> |
||
---|---|---|
.. | ||
files | ||
handlers | ||
meta | ||
tasks | ||
templates | ||
README |
This role is the base setup for all our machines. If there's something that shouldn't be run on every single machine, it should be in another role.