{
imports = [
../../nixos/profiles/dnscrypt-proxy2.nix
- ../../nixos/profiles/wireguard/wg-intra.nix
../../nixos/profiles/networking/ssh.nix
../../nixos/profiles/networking/wifi.nix
#../../nixos/profiles/openvpn/calyx.nix
'';
ruleset = ''
table inet filter {
- chain input-intra {
- tcp dport { ssh, 2222 } counter accept comment "SSH"
- udp dport 60001-60010 counter accept comment "Mosh"
- #tcp dport 4713 counter accept comment "pulseaudio"
- tcp dport 5201 counter accept comment "iperf"
- }
chain input-net {
}
tcp dport { 4444, 5555 } counter accept
tcp dport 5201 counter accept comment "iperf"
}
- chain output-intra {
- tcp dport { ssh, 2222 } counter accept comment "SSH"
- udp dport 60001-60100 counter accept comment "Mosh"
- tcp dport { http, https } counter accept comment "HTTP"
- tcp dport git counter accept comment "Git"
- tcp dport 5201 counter accept comment "iperf"
- ip daddr losurdo.wg tcp dport 9091 counter accept comment "transmission"
- }
chain output-net {
tcp dport { ssh, 2222, 20022 } counter accept comment "SSH"
udp dport 60001-60100 counter accept comment "Mosh"
+++ /dev/null
-_:
-{
- systemd.services."wireguard-wg-intra".serviceConfig.LoadCredentialEncrypted = [
- "privateKey:${./wireguard/wg-intra/privateKey.cred}"
- ];
- networking.wireguard.wg-intra.peers = {
- mermet.enable = true;
- losurdo.enable = true;
- patate.enable = true;
- aubergine.enable = true;
- };
-}