|  | Commit message (Collapse) | Author | Age | Files | 
|---|
| ... |  | 
| | 
| 
| 
| 
| 
| 
| | At the each IPSec end-point the traffic is DNAT'ed to / MASQUERADE'd
from our dedicated IP after ESP decapsulation. Also, some IP tables
ensure that alien (not coming from / going to the tunnel end-point) is
dropped. | 
| | 
| 
| 
| 
| 
| 
| 
| 
| 
| | Also, added some options:
    -f force:   no confirmation asked
    -c check:   check (dry-run) mode
    -v verbose: see the difference between old and new ruleset
    -4 IPv4 only
    -6 IPv6 only | 
| | 
| 
| 
| 
| | These rules are automatically included by third-party servers such as
strongSwan or fail2ban. | 
| | 
| 
| 
| | So it doesn't mess with the high-priority rules regarding IPSec. | 
| | 
| 
| 
| 
| | update-firewall.sh -c does not update the firewall, but returns a
non-zero value iff. running it without the switch would modify it. | 
| | |  | 
| | |  | 
| | |  | 
| | |  | 
| | |  | 
| | |  | 
| | |  | 
| | |  | 
|  | To run the playbook:
  cd ./ansible
  ansible-playbook -i vms site.yml |