Properly configure firewall to allow tinc to pass through
This commit is contained in:
parent
9fecd353f8
commit
41f717c5be
|
@ -78,6 +78,11 @@ in
|
||||||
# firewall
|
# firewall
|
||||||
networking.firewall.allowedUDPPorts = [ 655 ];
|
networking.firewall.allowedUDPPorts = [ 655 ];
|
||||||
networking.firewall.allowedTCPPorts = [ 655 ];
|
networking.firewall.allowedTCPPorts = [ 655 ];
|
||||||
|
networking.firewall.interfaces."tinc.${networkName}" = {
|
||||||
|
allowedUDPPortRanges = [{ from = 0; to = 65535; }];
|
||||||
|
allowedTCPPortRanges = [{ from = 0; to = 65535; }];
|
||||||
|
};
|
||||||
|
|
||||||
|
|
||||||
# configure tinc service
|
# configure tinc service
|
||||||
# ----------------------
|
# ----------------------
|
||||||
|
|
|
@ -31,7 +31,7 @@ in
|
||||||
|
|
||||||
config = {
|
config = {
|
||||||
nix.settings = mkIf cfg.enableClient {
|
nix.settings = mkIf cfg.enableClient {
|
||||||
substituters = [ cfg.host ];
|
substituters = [ "http://${cfg.host}" ];
|
||||||
trusted-public-keys = [ cfg.publicKey ];
|
trusted-public-keys = [ cfg.publicKey ];
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue