diff --git a/nixos/hosts/frankfurt-linode-01/firewall.nix b/nixos/hosts/frankfurt-linode-01/firewall.nix index 3b083cfc..982a444e 100644 --- a/nixos/hosts/frankfurt-linode-01/firewall.nix +++ b/nixos/hosts/frankfurt-linode-01/firewall.nix @@ -6,7 +6,7 @@ 80 # HTTP 443 # HTTPS 42420 # Vintage Story - 25565 # Minecraft + # 25565 # Minecraft 25 # Mailserver 143 # Mailserver 465 # Mailserver @@ -17,20 +17,21 @@ ]; allowedUDPPorts = [ 10000 # Jitsi Meet (udp) - 15636 # Enshrouded - Game - 15637 # Enshrouded - Query Port + # 15636 # Enshrouded - Game + # 15637 # Enshrouded - Query Port ]; }; nftables = { enable = true; + # NOTE: If these need to be re-enabled, move them to the PREROUTING chain below + # iifname "enp0s4" udp dport 15636 dnat to 10.100.1.2:15636; + # iifname "enp0s4" udp dport 15637 dnat to 10.100.1.2:15637; ruleset = '' table ip nat { chain PREROUTING { type nat hook prerouting priority dstnat; policy accept; iifname "enp0s4" udp dport 10000 dnat to 10.100.0.2:10000; - iifname "enp0s4" udp dport 15636 dnat to 10.100.1.2:15636; - iifname "enp0s4" udp dport 15637 dnat to 10.100.1.2:15637; } } ''; @@ -42,8 +43,8 @@ externalInterface = "wireguard0"; forwardPorts = [ { sourcePort = 10000; proto = "udp"; destination = "10.100.0.2:10000"; } - { sourcePort = 15636; proto = "udp"; destination = "10.100.1.2:15636"; } - { sourcePort = 15637; proto = "udp"; destination = "10.100.1.2:15637"; } + # { sourcePort = 15636; proto = "udp"; destination = "10.100.1.2:15636"; } + # { sourcePort = 15637; proto = "udp"; destination = "10.100.1.2:15637"; } ]; }; };