Allow nebula through firewall
This commit is contained in:
parent
b1284877a3
commit
850278ab19
6 changed files with 9 additions and 2 deletions
|
@ -1,2 +1,3 @@
|
||||||
nebula_is_lighthouse: true
|
nebula_is_lighthouse: true
|
||||||
|
nebula_listen_port: "{{ nebula_lighthouse_port }}"
|
||||||
ssh_extra_allowed_users: f2b@{{ nebula.cidr }} f2b@{{ pve_hosts.internal_cidr }}
|
ssh_extra_allowed_users: f2b@{{ nebula.cidr }} f2b@{{ pve_hosts.internal_cidr }}
|
||||||
|
|
2
ansible/host_vars/ingress.yml
Normal file
2
ansible/host_vars/ingress.yml
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
# Listen on a static port so it can be opened in the firewall
|
||||||
|
nebula_listen_port: "{{ nebula_lighthouse_port }}"
|
|
@ -12,6 +12,9 @@ table inet filter {
|
||||||
iif lo accept
|
iif lo accept
|
||||||
|
|
||||||
tcp dport {http, https, {{ ssh_port }}, 8443, 8448} accept
|
tcp dport {http, https, {{ ssh_port }}, 8443, 8448} accept
|
||||||
|
|
||||||
|
# Allow nebula
|
||||||
|
udp dport {{ nebula_listen_port }} accept;
|
||||||
}
|
}
|
||||||
|
|
||||||
chain POSTROUTING {
|
chain POSTROUTING {
|
||||||
|
|
|
@ -9,7 +9,7 @@
|
||||||
dest: /etc/nftables.conf
|
dest: /etc/nftables.conf
|
||||||
validate: nft -c -f %s
|
validate: nft -c -f %s
|
||||||
become: true
|
become: true
|
||||||
notify: reload firewall
|
notify: reload nftables
|
||||||
|
|
||||||
- name: Enable nftables
|
- name: Enable nftables
|
||||||
service:
|
service:
|
||||||
|
|
|
@ -1 +1,2 @@
|
||||||
nebula_is_lighthouse: false
|
nebula_is_lighthouse: false
|
||||||
|
nebula_listen_port: 0
|
||||||
|
|
|
@ -17,7 +17,7 @@ lighthouse:
|
||||||
|
|
||||||
listen:
|
listen:
|
||||||
host: 0.0.0.0
|
host: 0.0.0.0
|
||||||
port: "{{ nebula_is_lighthouse | ternary(nebula_lighthouse_port, 0) }}"
|
port: "{{ nebula_listen_port }}"
|
||||||
|
|
||||||
punchy:
|
punchy:
|
||||||
punch: true
|
punch: true
|
||||||
|
|
Loading…
Reference in a new issue