mount nas
This commit is contained in:
1
.gitignore
vendored
Normal file
1
.gitignore
vendored
Normal file
@@ -0,0 +1 @@
|
|||||||
|
secrets/
|
||||||
20
drives.nix
20
drives.nix
@@ -5,6 +5,10 @@
|
|||||||
# device = "10.94.157.2:/mnt/Nethergarde/Windows";
|
# device = "10.94.157.2:/mnt/Nethergarde/Windows";
|
||||||
# fsType = "nfs";
|
# fsType = "nfs";
|
||||||
#};
|
#};
|
||||||
|
"/mnt/nethergarde/leonhome" = {
|
||||||
|
device = "10.46.32.2:/mnt/Nethergarde/Home";
|
||||||
|
fsType = "nfs";
|
||||||
|
};
|
||||||
#"/mnt/nethergarde/bigdata" = {
|
#"/mnt/nethergarde/bigdata" = {
|
||||||
# device = "10.94.157.2:/mnt/Nethergarde/Bigdata";
|
# device = "10.94.157.2:/mnt/Nethergarde/Bigdata";
|
||||||
# fsType = "nfs";
|
# fsType = "nfs";
|
||||||
@@ -24,6 +28,22 @@
|
|||||||
fsType = "vfat";
|
fsType = "vfat";
|
||||||
options = [ "fmask=0077" "dmask=0077" ];
|
options = [ "fmask=0077" "dmask=0077" ];
|
||||||
};
|
};
|
||||||
|
#"/mnt/nethergarde/leonhome" = {
|
||||||
|
# device = "//10.46.32.2/Leon\\040home\\040share";
|
||||||
|
# fsType = "cifs";
|
||||||
|
# options = [
|
||||||
|
# "credentials=/etc/nixos/secrets/smb-secrets-leon-home"
|
||||||
|
# "x-systemd.automount"
|
||||||
|
# "noauto"
|
||||||
|
# "x-systemd.idle-timeout=60"
|
||||||
|
# "x-systemd.device-timeout=5s"
|
||||||
|
# "x-systemd.mount-timeout=5s"
|
||||||
|
# "uid=1000"
|
||||||
|
# "gid=100"
|
||||||
|
# "iocharset=utf8"
|
||||||
|
# "vers=3.1.1"
|
||||||
|
# ];
|
||||||
|
#};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -13,7 +13,6 @@
|
|||||||
trustedInterfaces = [ "incusbr0" ];
|
trustedInterfaces = [ "incusbr0" ];
|
||||||
};
|
};
|
||||||
|
|
||||||
# here’s the custom nftables filter ruleset for forwarded traffic:
|
|
||||||
nftables.ruleset = ''
|
nftables.ruleset = ''
|
||||||
table ip filter {
|
table ip filter {
|
||||||
chain forward {
|
chain forward {
|
||||||
@@ -25,6 +24,9 @@
|
|||||||
iifname "incusbr0" oifname "enp4s0" ct state new,established accept
|
iifname "incusbr0" oifname "enp4s0" ct state new,established accept
|
||||||
iifname "incusbr1" oifname "enp4s0" ct state new,established accept
|
iifname "incusbr1" oifname "enp4s0" ct state new,established accept
|
||||||
|
|
||||||
|
# allow vm to vm communication
|
||||||
|
iifname "tap*" oifname "tap*" accept
|
||||||
|
|
||||||
# allow natted replies
|
# allow natted replies
|
||||||
iifname "enp4s0" oifname "incusbr0" tcp dport 8123 ct state new,established accept
|
iifname "enp4s0" oifname "incusbr0" tcp dport 8123 ct state new,established accept
|
||||||
iifname "enp4s0" oifname "incusbr0" tcp dport 80 ct state new,established accept
|
iifname "enp4s0" oifname "incusbr0" tcp dport 80 ct state new,established accept
|
||||||
|
|||||||
Reference in New Issue
Block a user