-class firewall::vm::dns($destination, $zone = 'vm') {
+class firewall::virtual::dns($destination, $zone = 'vm') {
shorewall::rule { 'dns-route-0':
action => 'DNS/ACCEPT',
source => 'net',
-class firewall::vm::gitd($destination, $zone = 'fw') {
+class firewall::virtual::gitd($destination, $zone = 'fw') {
shorewall::rule { 'git-daemon-1':
action => 'DNAT',
source => 'net',
-class firewall::vm::gobby($destination, $zone = 'fw') {
+class firewall::virtual::gobby($destination, $zone = 'fw') {
shorewall::rule { 'gobby-0':
action => 'DNAT',
source => 'net',
-class firewall::vm::http($destination, $zone = 'vm') {
+class firewall::virtual::http($destination, $zone = 'vm') {
shorewall::rule { 'http-route-1':
action => 'DNAT',
source => 'net',
-class firewall::vm::https($destination, $zone = 'vm') {
+class firewall::virtual::https($destination, $zone = 'vm') {
shorewall::rule { 'https-route-1':
action => 'DNAT',
source => 'net',
-class firewall::vm::icecast($destination, $zone = 'fw') {
+class firewall::virtual::icecast($destination, $zone = 'fw') {
shorewall::rule { 'icecast-1':
action => 'DNAT',
source => 'net',
-class firewall::vm::jabber($destination, $zone = 'fw') {
+class firewall::virtual::jabber($destination, $zone = 'fw') {
shorewall::rule { 'jabber-0':
action => 'DNAT',
source => 'net',
-class firewall::vm::mail($destination, $zone = 'fw') {
+class firewall::virtual::mail($destination, $zone = 'fw') {
shorewall::rule { 'mail-1':
action => 'DNAT',
source => 'net',
-class firewall::vm::mdns($destination, $zone = 'fw') {
+class firewall::virtual::mdns($destination, $zone = 'fw') {
shorewall::rule { 'mdns-0':
action => 'DNAT',
source => 'net',
-class firewall::vm::mumble($destination, $zone = 'fw') {
+class firewall::virtual::mumble($destination, $zone = 'fw') {
shorewall::rule { 'mumble-0':
action => 'DNAT',
source => 'net',
-define firewall::vm::munin($destination, $port_orig, $port_dest = '', $order = '400', $zone = 'fw') {
+define firewall::virtual::munin($destination, $port_orig, $port_dest = '', $order = '400', $zone = 'fw') {
shorewall::rule { "munin-$name-1":
action => 'DNAT',
source => 'net',
-class firewall::vm::puppetmaster($destination, $puppetmaster_port = '8140', $puppetmaster_nonssl_port = '8141', $zone = 'fw') {
+class firewall::virtual::puppetmaster($destination, $puppetmaster_port = '8140', $puppetmaster_nonssl_port = '8141', $zone = 'fw') {
shorewall::rule { 'puppetmaster-1':
action => 'DNAT',
source => 'net',
-class firewall::vm::rsync($destination, $zone = 'fw') {
+class firewall::virtual::rsync($destination, $zone = 'fw') {
shorewall::rule { 'rsync-0':
action => 'DNAT',
source => 'net',
-define firewall::vm::ssh($destination, $port_orig = '22', $port_dest = '', $zone = 'vm') {
+define firewall::virtual::ssh($destination, $port_orig = '22', $port_dest = '', $zone = 'vm') {
shorewall::rule { "ssh-$name-1":
action => 'DNAT',
source => 'net',
-class firewall::vm::tor($destination, $zone = 'fw') {
+class firewall::virtual::tor($destination, $zone = 'fw') {
shorewall::rule { 'tor-0':
action => 'DNAT',
source => 'net',
-class firewall::vm::yacy($destination, $zone = 'fw') {
+class firewall::virtual::yacy($destination, $zone = 'fw') {
shorewall::rule { 'yacy-0':
action => 'DNAT',
source => 'net',