order => 240,
action => 'ACCEPT';
}
- shorewall::rule { 'net-me-rpc.nfsd-tcp':
+ shorewall::rule { 'net-me-rpc.statd-tcp':
source => 'net',
destination => '$FW',
proto => 'tcp',
- destinationport => '2049',
+ destinationport => '662',
order => 240,
action => 'ACCEPT';
}
- shorewall::rule { 'net-me-rpc.nfsd-udp':
+ shorewall::rule { 'net-me-rpc.statd-udp':
source => 'net',
destination => '$FW',
proto => 'udp',
- destinationport => '2049',
+ destinationport => '662',
order => 240,
action => 'ACCEPT';
}
- shorewall::rule { 'net-me-rpc.statd-tcp':
+ shorewall::rule { 'me-net-rpc.statd-tcp':
source => 'net',
destination => '$FW',
proto => 'tcp',
- destinationport => '4000',
+ destinationport => '2020',
order => 240,
action => 'ACCEPT';
}
- shorewall::rule { 'net-me-rpc.statd-udp':
+ shorewall::rule { 'me-net-rpc.statd-udp':
source => 'net',
destination => '$FW',
proto => 'udp',
- destinationport => '4000',
+ destinationport => '2020',
order => 240,
action => 'ACCEPT';
}
source => 'net',
destination => '$FW',
proto => 'tcp',
- destinationport => '4001',
+ destinationport => '32803',
order => 240,
action => 'ACCEPT';
}
source => 'net',
destination => '$FW',
proto => 'udp',
- destinationport => '4001',
+ destinationport => '32769',
order => 240,
action => 'ACCEPT';
}
source => 'net',
destination => '$FW',
proto => 'tcp',
- destinationport => '4002',
+ destinationport => '892',
order => 240,
action => 'ACCEPT';
}
source => 'net',
destination => '$FW',
proto => 'udp',
- destinationport => '4002',
+ destinationport => '892',
+ order => 240,
+ action => 'ACCEPT';
+ }
+ shorewall::rule { 'net-me-rpc.rquotad-tcp':
+ source => 'net',
+ destination => '$FW',
+ proto => 'tcp',
+ destinationport => '875',
+ order => 240,
+ action => 'ACCEPT';
+ }
+ shorewall::rule { 'net-me-rpc.rquoata-udp':
+ source => 'net',
+ destination => '$FW',
+ proto => 'udp',
+ destinationport => '875',
order => 240,
action => 'ACCEPT';
}