From 2bcaaf01a5fcc2d2ce618da6af30a43a70d03d80 Mon Sep 17 00:00:00 2001 From: Guilhem Moulin Date: Sun, 3 Nov 2013 05:54:11 +0100 Subject: Use a dedicated, non-routable, IPv4 for IPSec. At the each IPSec end-point the traffic is DNAT'ed to / MASQUERADE'd from our dedicated IP after ESP decapsulation. Also, some IP tables ensure that alien (not coming from / going to the tunnel end-point) is dropped. --- roles/common/handlers/main.yml | 6 ++++++ 1 file changed, 6 insertions(+) (limited to 'roles/common/handlers') diff --git a/roles/common/handlers/main.yml b/roles/common/handlers/main.yml index a64a236..9cae8bf 100644 --- a/roles/common/handlers/main.yml +++ b/roles/common/handlers/main.yml @@ -19,3 +19,9 @@ - name: Restart IPSec service: name=ipsec state=restarted + +- name: Reload networking + # /etc/init.d/networking doesn't answer the status command; but since + # it should be "up" whenever ansible has access to the machine, we use + # pattern=init as a dummy assumption. + service: name=networking pattern=init state=reloaded -- cgit v1.2.3