Compare commits
4 Commits
Author | SHA1 | Date | |
---|---|---|---|
e53bb1eadd | |||
1bfdc82fd2 | |||
589b5b28af | |||
14b12f22ac |
1391
sio2/CYBER/Nagios/nagios.cfg
Normal file
1391
sio2/CYBER/Nagios/nagios.cfg
Normal file
File diff suppressed because it is too large
Load Diff
50
sio2/CYBER/Nagios/nagios4.conf
Normal file
50
sio2/CYBER/Nagios/nagios4.conf
Normal file
@ -0,0 +1,50 @@
|
|||||||
|
# apache configuration for nagios 4.x
|
||||||
|
|
||||||
|
ScriptAlias /cgi-bin/nagios4 /usr/lib/cgi-bin/nagios4
|
||||||
|
ScriptAlias /nagios4/cgi-bin /usr/lib/cgi-bin/nagios4
|
||||||
|
|
||||||
|
# Where the stylesheets (config files) reside
|
||||||
|
Alias /nagios4/stylesheets /etc/nagios4/stylesheets
|
||||||
|
|
||||||
|
# Where the HTML pages live
|
||||||
|
Alias /nagios4 /usr/share/nagios4/htdocs
|
||||||
|
|
||||||
|
<DirectoryMatch (/usr/share/nagios4/htdocs|/usr/lib/cgi-bin/nagios4|/etc/nagios4/stylesheets)>
|
||||||
|
Options FollowSymLinks
|
||||||
|
DirectoryIndex index.php index.html
|
||||||
|
AllowOverride AuthConfig
|
||||||
|
#
|
||||||
|
# The default Debian nagios4 install sets use_authentication=0 in
|
||||||
|
# /etc/nagios4/cgi.cfg, which turns off nagos's internal authentication.
|
||||||
|
# This is insecure. As a compromise this default apache2 configuration
|
||||||
|
# only allows private IP addresses access.
|
||||||
|
#
|
||||||
|
# The <Files>...</Files> below shows how you can secure the nagios4
|
||||||
|
# web site so anybody can view it, but only authenticated users can issue
|
||||||
|
# commands (such as silence notifications). To do that replace the
|
||||||
|
# "Require all granted" with "Require valid-user", and use htdigest
|
||||||
|
# program from the apache2-utils package to add users to
|
||||||
|
# /etc/nagios4/htdigest.users.
|
||||||
|
#
|
||||||
|
# A step up is to insist all users validate themselves by moving
|
||||||
|
# the stanza's in the <Files>..<Files> into the <DirectoryMatch>.
|
||||||
|
# Then by setting use_authentication=1 in /etc/nagios4/cgi.cfg you
|
||||||
|
# can configure which people get to see a particular service from
|
||||||
|
# within the nagios configuration.
|
||||||
|
#
|
||||||
|
Require ip ::1/128 fc00::/7 fe80::/10 10.0.0.0/8 127.0.0.0/8 169.254.0.0/16 172.16.0.0/12 192.168.0.0/16
|
||||||
|
<Files "cmd.cgi">
|
||||||
|
AuthDigestDomain "Nagios4"
|
||||||
|
AuthDigestProvider file
|
||||||
|
AuthUserFile "/etc/nagios4/htdigest.users"
|
||||||
|
AuthGroupFile "/etc/group"
|
||||||
|
AuthName "Nagios4"
|
||||||
|
AuthType Digest
|
||||||
|
Require all granted
|
||||||
|
#Require valid-user
|
||||||
|
</Files>
|
||||||
|
</DirectoryMatch>
|
||||||
|
|
||||||
|
<Directory /usr/share/nagios4/htdocs>
|
||||||
|
Options +ExecCGI
|
||||||
|
</Directory>
|
30
sio2/CYBER/Nagios/srv.cfg
Normal file
30
sio2/CYBER/Nagios/srv.cfg
Normal file
@ -0,0 +1,30 @@
|
|||||||
|
define host {
|
||||||
|
use linux-server ; Name of host template to use
|
||||||
|
host_name srv
|
||||||
|
alias srv
|
||||||
|
address 172.20.10.11
|
||||||
|
}
|
||||||
|
define service{
|
||||||
|
use generic-service
|
||||||
|
host_name srv
|
||||||
|
service_description WWW
|
||||||
|
check_command check_http
|
||||||
|
}
|
||||||
|
define service{
|
||||||
|
use generic-service
|
||||||
|
host_name srv
|
||||||
|
service_description SSH
|
||||||
|
check_command check_ssh
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
109
sio2/SISR/PXE/dhcpd.conf
Normal file
109
sio2/SISR/PXE/dhcpd.conf
Normal file
@ -0,0 +1,109 @@
|
|||||||
|
# dhcpd.conf
|
||||||
|
#
|
||||||
|
# Sample configuration file for ISC dhcpd
|
||||||
|
#
|
||||||
|
|
||||||
|
# option definitions common to all supported networks...
|
||||||
|
option domain-name "192.168.1.1";
|
||||||
|
option domain-name-servers 192.168.1.1;
|
||||||
|
|
||||||
|
default-lease-time 600;
|
||||||
|
max-lease-time 7200;
|
||||||
|
|
||||||
|
# The ddns-updates-style parameter controls whether or not the server will
|
||||||
|
# attempt to do a DNS update when a lease is confirmed. We default to the
|
||||||
|
# behavior of the version 2 packages ('none', since DHCP v2 didn't
|
||||||
|
# have support for DDNS.)
|
||||||
|
ddns-update-style none;
|
||||||
|
|
||||||
|
# If this DHCP server is the official DHCP server for the local
|
||||||
|
# network, the authoritative directive should be uncommented.
|
||||||
|
#authoritative;
|
||||||
|
|
||||||
|
# Use this to send dhcp log messages to a different log file (you also
|
||||||
|
# have to hack syslog.conf to complete the redirection).
|
||||||
|
#log-facility local7;
|
||||||
|
|
||||||
|
# No service will be given on this subnet, but declaring it helps the
|
||||||
|
# DHCP server to understand the network topology.
|
||||||
|
|
||||||
|
#subnet 10.152.187.0 netmask 255.255.255.0 {
|
||||||
|
#}
|
||||||
|
|
||||||
|
# This is a very basic subnet declaration.
|
||||||
|
|
||||||
|
subnet 192.168.1.0 netmask 255.255.255.0 {
|
||||||
|
range 192.168.1.20 192.168.1.50;
|
||||||
|
option routers 192.168.1.1;
|
||||||
|
option domain-name "sio.lan";
|
||||||
|
filename "pxelinux.0";
|
||||||
|
next-server 192.168.1.1;
|
||||||
|
}
|
||||||
|
|
||||||
|
# This declaration allows BOOTP clients to get dynamic addresses,
|
||||||
|
# which we don't really recommend.
|
||||||
|
|
||||||
|
#subnet 10.254.239.32 netmask 255.255.255.224 {
|
||||||
|
# range dynamic-bootp 10.254.239.40 10.254.239.60;
|
||||||
|
# option broadcast-address 10.254.239.31;
|
||||||
|
# option routers rtr-239-32-1.example.org;
|
||||||
|
#}
|
||||||
|
|
||||||
|
# A slightly different configuration for an internal subnet.
|
||||||
|
#subnet 10.5.5.0 netmask 255.255.255.224 {
|
||||||
|
# range 10.5.5.26 10.5.5.30;
|
||||||
|
# option domain-name-servers ns1.internal.example.org;
|
||||||
|
# option domain-name "internal.example.org";
|
||||||
|
# option routers 10.5.5.1;
|
||||||
|
# option broadcast-address 10.5.5.31;
|
||||||
|
# default-lease-time 600;
|
||||||
|
# max-lease-time 7200;
|
||||||
|
#}
|
||||||
|
|
||||||
|
# Hosts which require special configuration options can be listed in
|
||||||
|
# host statements. If no address is specified, the address will be
|
||||||
|
# allocated dynamically (if possible), but the host-specific information
|
||||||
|
# will still come from the host declaration.
|
||||||
|
|
||||||
|
#host passacaglia {
|
||||||
|
# hardware ethernet 0:0:c0:5d:bd:95;
|
||||||
|
# server-name "toccata.example.com";
|
||||||
|
#}
|
||||||
|
|
||||||
|
# Fixed IP addresses can also be specified for hosts. These addresses
|
||||||
|
# should not also be listed as being available for dynamic assignment.
|
||||||
|
# Hosts for which fixed IP addresses have been specified can boot using
|
||||||
|
# BOOTP or DHCP. Hosts for which no fixed address is specified can only
|
||||||
|
# be booted with DHCP, unless there is an address range on the subnet
|
||||||
|
# to which a BOOTP client is connected which has the dynamic-bootp flag
|
||||||
|
# set.
|
||||||
|
#host fantasia {
|
||||||
|
# hardware ethernet 08:00:07:26:c0:a5;
|
||||||
|
# fixed-address fantasia.example.com;
|
||||||
|
#}
|
||||||
|
|
||||||
|
# You can declare a class of clients and then do address allocation
|
||||||
|
# based on that. The example below shows a case where all clients
|
||||||
|
# in a certain class get addresses on the 10.17.224/24 subnet, and all
|
||||||
|
# other clients get addresses on the 10.0.29/24 subnet.
|
||||||
|
|
||||||
|
#class "foo" {
|
||||||
|
# match if substring (option vendor-class-identifier, 0, 4) = "SUNW";
|
||||||
|
#}
|
||||||
|
|
||||||
|
#shared-network 224-29 {
|
||||||
|
# subnet 10.17.224.0 netmask 255.255.255.0 {
|
||||||
|
# option routers rtr-224.example.org;
|
||||||
|
# }
|
||||||
|
# subnet 10.0.29.0 netmask 255.255.255.0 {
|
||||||
|
# option routers rtr-29.example.org;
|
||||||
|
# }
|
||||||
|
# pool {
|
||||||
|
# allow members of "foo";
|
||||||
|
# range 10.17.224.10 10.17.224.250;
|
||||||
|
# }
|
||||||
|
# pool {
|
||||||
|
# deny members of "foo";
|
||||||
|
# range 10.0.29.10 10.0.29.230;
|
||||||
|
# }
|
||||||
|
#}
|
71
sio2/SISR/RSYSLOG/rsyslog.con.emeteur
Normal file
71
sio2/SISR/RSYSLOG/rsyslog.con.emeteur
Normal file
@ -0,0 +1,71 @@
|
|||||||
|
# /etc/rsyslog.conf configuration file for rsyslog
|
||||||
|
#
|
||||||
|
# For more information install rsyslog-doc and see
|
||||||
|
# /usr/share/doc/rsyslog-doc/html/configuration/index.html
|
||||||
|
|
||||||
|
|
||||||
|
#################
|
||||||
|
#### MODULES ####
|
||||||
|
#################
|
||||||
|
|
||||||
|
module(load="imuxsock") # provides support for local system logging
|
||||||
|
module(load="imklog") # provides kernel logging support
|
||||||
|
#module(load="immark") # provides --MARK-- message capability
|
||||||
|
|
||||||
|
# provides UDP syslog reception
|
||||||
|
#module(load="imudp") MACHINE DE RECEPTION
|
||||||
|
#input(type="imudp" port="514") MACHINE DE RECEPTION
|
||||||
|
|
||||||
|
# provides TCP syslog reception
|
||||||
|
#module(load="imtcp")
|
||||||
|
#input(type="imtcp" port="514")
|
||||||
|
|
||||||
|
|
||||||
|
###########################
|
||||||
|
#### GLOBAL DIRECTIVES ####
|
||||||
|
###########################
|
||||||
|
|
||||||
|
#
|
||||||
|
# Set the default permissions for all log files.
|
||||||
|
#
|
||||||
|
$FileOwner root
|
||||||
|
$FileGroup adm
|
||||||
|
$FileCreateMode 0640
|
||||||
|
$DirCreateMode 0755
|
||||||
|
$Umask 0022
|
||||||
|
|
||||||
|
#
|
||||||
|
# Where to place spool and state files
|
||||||
|
#
|
||||||
|
$WorkDirectory /var/spool/rsyslog
|
||||||
|
|
||||||
|
#
|
||||||
|
# Include all config files in /etc/rsyslog.d/
|
||||||
|
#
|
||||||
|
$IncludeConfig /etc/rsyslog.d/*.conf
|
||||||
|
|
||||||
|
|
||||||
|
###############
|
||||||
|
#### RULES ####
|
||||||
|
###############
|
||||||
|
|
||||||
|
#
|
||||||
|
# Log anything besides private authentication messages to a single log file
|
||||||
|
#
|
||||||
|
*.*;auth,authpriv.none -/var/log/syslog
|
||||||
|
|
||||||
|
#
|
||||||
|
# Log commonly used facilities to their own log file
|
||||||
|
#
|
||||||
|
auth,authpriv.* /var/log/auth.log
|
||||||
|
cron.* -/var/log/cron.log
|
||||||
|
kern.* -/var/log/kern.log
|
||||||
|
mail.* -/var/log/mail.log
|
||||||
|
user.* -/var/log/user.log
|
||||||
|
|
||||||
|
#
|
||||||
|
# Emergencies are sent to everybody logged in.
|
||||||
|
#
|
||||||
|
*.emerg :omusrmsg:*
|
||||||
|
*.* @192.168.0.21:514 # exporte tous les logs de toute gravité et de toute origine vers l'adresse 192.168.100 port UDP 514
|
||||||
|
*.* @192.168.0.32:514 # exporte tous les logs de toute gravité et de toute origine vers l'adresse 192.168.100 port UDP 514
|
38
sio2/VAGRANT/Vagrantfile
vendored
38
sio2/VAGRANT/Vagrantfile
vendored
@ -1,14 +1,32 @@
|
|||||||
# -*- mode: ruby -*-
|
# -*- mode: ruby -*-
|
||||||
# vi: set ft=ruby :
|
# vi: set ft=ruby :
|
||||||
|
|
||||||
Vagrant.configure("2") do |config|
|
Vagrant.configure("2") do |config|
|
||||||
config.vm.provision "shell", inline: "apt-get update -y" # execute pour chacune des machines
|
# The most common configuration options are documented and commented below.
|
||||||
|
# For a complete reference, please see the online documentation at
|
||||||
config.vm.define "IDS" do |ids|#VM No'1
|
# https://docs.vagrantup.com.
|
||||||
ids.vm.box = "debian/bookworm64" #Setting machine type
|
|
||||||
ids.vm.hostname = "IDS" #Setting machine type
|
# Every Vagrant development environment requires a box. You can search for
|
||||||
ids.vm.network "public_network"#Set DHCP
|
# boxes at https://vagrantcloud.com/search.
|
||||||
ids.vm.provision "shell", inline: <<-SHELL
|
config.vm.box = "debian/bookworm64"
|
||||||
apt-get install -y wget curl vim unzip chkrootkit rkhunter fail2ban
|
config.vm.hostname = "nagios4"
|
||||||
|
|
||||||
|
# Disable automatic box update checking. If you disable this, then
|
||||||
|
# boxes will only be checked for updates when the user runs
|
||||||
|
# `vagrant box outdated`. This is not recommended.
|
||||||
|
# config.vm.box_check_update = false
|
||||||
|
|
||||||
|
# Create a public network, which generally matched to bridged network.
|
||||||
|
# Bridged networks make the machine appear as another physical device on
|
||||||
|
# your network.
|
||||||
|
config.vm.network "public_network"
|
||||||
|
|
||||||
|
config.vm.provision "shell", inline: <<-SHELL
|
||||||
|
apt-get update
|
||||||
|
apt-get install -y vim curl wget apache2 php nagios4 nagios-plugins-contrib
|
||||||
|
cp /etc/nagios4/apache2.conf /etc/apache2/sites-available/nagios4.conf
|
||||||
|
a2ensite nagios4.conf
|
||||||
|
a2enmod rewrite cgi
|
||||||
|
systemctl reload apache2
|
||||||
SHELL
|
SHELL
|
||||||
end
|
end
|
||||||
end
|
|
14
sio2/VAGRANT/Vagrantfile2
Normal file
14
sio2/VAGRANT/Vagrantfile2
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
# -*- mode: ruby -*-
|
||||||
|
# vi: set ft=ruby :
|
||||||
|
Vagrant.configure("2") do |config|
|
||||||
|
config.vm.provision "shell", inline: "apt-get update -y" # execute pour chacune des machines
|
||||||
|
|
||||||
|
config.vm.define "IDS" do |ids|#VM No'1
|
||||||
|
ids.vm.box = "debian/bookworm64" #Setting machine type
|
||||||
|
ids.vm.hostname = "IDS" #Setting machine type
|
||||||
|
ids.vm.network "public_network"#Set DHCP
|
||||||
|
ids.vm.provision "shell", inline: <<-SHELL
|
||||||
|
apt-get install -y wget curl vim unzip chkrootkit rkhunter fail2ban
|
||||||
|
SHELL
|
||||||
|
end
|
||||||
|
end
|
Reference in New Issue
Block a user