next fix
This commit is contained in:
parent
7fb7f33e72
commit
8d8b227f6b
|
|
@ -0,0 +1,5 @@
|
|||
# Interne Docker Netzwerke
|
||||
172.16.0.0/12
|
||||
192.168.0.0/16
|
||||
10.0.0.0/8
|
||||
fd00::/8
|
||||
|
|
@ -0,0 +1,9 @@
|
|||
# Wir definieren eine neue Regel namens DOCKER_WL
|
||||
DOCKER_WL {
|
||||
type = "ip";
|
||||
map = "${LOCAL_CONFDIR}/local.d/docker_whitelist.map";
|
||||
symbol = "DOCKER_WHITELIST";
|
||||
score = -50.0; # Zieht 50 Punkte ab -> Sofort in die Inbox
|
||||
description = "Whitelist fuer interne Docker IPs";
|
||||
action = "accept"; # Erzwingt Annahme
|
||||
}
|
||||
|
|
@ -1,13 +0,0 @@
|
|||
docker_trust {
|
||||
priority = high;
|
||||
# Dein Docker-Netzwerk (wie im Screenshot zu sehen)
|
||||
from_ip = ["172.16.0.0/12", "172.18.0.0/16", "10.0.0.0/8", "192.168.0.0/16"];
|
||||
|
||||
apply {
|
||||
# Zieht 20 Punkte ab
|
||||
score = -20.0;
|
||||
|
||||
# Deaktiviert die Checks, die bei Weiterleitungen oft falsch anschlagen
|
||||
symbols_disabled = ["SPOOF_REPLYTO", "DMARC_FAIL", "SPF_FAIL", "R_SPF_FAIL"];
|
||||
}
|
||||
}
|
||||
Loading…
Reference in New Issue