Compare commits

..

4 Commits

Author SHA1 Message Date
2bffbbedc0 nagios parents 2023-03-29 14:57:11 +02:00
272ef9ac07 modification 2023-02-07 17:02:52 +01:00
81478df279 modif 2023-02-03 09:51:32 +01:00
75126890b3 incrémentation des modif 2023-02-03 09:37:13 +01:00
13 changed files with 48 additions and 14 deletions

View File

@ -1,3 +1,5 @@
# -*- shell-script -*-
@def $DEV_VPN= wg0;
table filter {
@ -10,22 +12,23 @@ table filter {
# allow local connections
interface lo ACCEPT;
interface $DEV_VPN{
# respond to ping
proto icmp icmp-type echo-request ACCEPT;
# disallow ssh
proto tcp dport ssh ACCEPT;
saddr proto tcp dport ssh DROP;
}
}#FIN INPUT
# outgoing connections are not limited
chain OUTPUT {
policy ACCEPT;
interface $DEV_VPN{
# allow ssh
proto tcp dport ssh DROP;
daddr proto tcp dport ssh ACCEPT;
# respond to ping
proto icmp icmp-type echo-request ACCEPT;
}
}#FIN OUTPUT
chain FORWARD {

View File

@ -4,7 +4,7 @@
@def $DEV_PRIVATE = enp0s8;
@def $DEV_WORLD = enp0s9;
@def $DEV_VPN= wg0;
@def $NET_PRIVATE = 172.16.0.0/24;
table filter {
@ -33,23 +33,33 @@ table filter {
# we provide DNS and SMTP services for the internal net
interface $DEV_PRIVATE saddr $NET_PRIVATE {
proto (udp tcp) dport domain ACCEPT;
proto udp dport bootps ACCEPT;
proto udp dport bootps ACCEPT;
}
# interface réseau
# interface réseau
interface $DEV_WORLD {
}
# the rest is dropped by the above policy
}#FIN INPUT
# outgoing connections are not limited
chain OUTPUT policy ACCEPT;
chain OUTPUT {policy ACCEPT;
}#FIN OUTPUT
chain FORWARD {
policy ACCEPT;
interface $DEV_VPN{
# respond to ping
proto icmp icmp-type echo-request ACCEPT;
# disallow ssh
saddr($DEV_VPN) proto tcp dport ssh DROP;
# allow ssh
daddr($DEV_VPN) proto tcp dport ssh ACCEPT;
}
# connection tracking
mod state state INVALID DROP;
mod state state (ESTABLISHED RELATED) ACCEPT;

View File

@ -4,7 +4,7 @@
@def $DEV_PRIVATE = enp0s9;
@def $DEV_WORLD = enp0s8;
@def $DEV_VPN= wg0;
@def $NET_PRIVATE = 172.16.0.0/24;
table filter {
@ -34,7 +34,12 @@ table filter {
proto (udp tcp) dport domain ACCEPT;
proto udp dport bootps ACCEPT;
}
interface $DEV_VPN{
# respond to ping
proto icmp icmp-type echo-request ACCEPT;
# disallow ssh
saddr proto tcp dport ssh ACCEPT;
}
# interface réseau
interface $DEV_WORLD {
@ -44,8 +49,14 @@ table filter {
}#FIN INPUT
# outgoing connections are not limited
chain OUTPUT policy ACCEPT;
chain OUTPUT {policy ACCEPT;
interface $DEV_VPN{
# allow ssh
daddr proto tcp dport ssh DROP;
# respond to ping
proto icmp icmp-type echo-request ACCEPT;
}
}
chain FORWARD {
policy ACCEPT;

View File

@ -26,6 +26,7 @@ define host {
host_name localhost
alias localhost
address 127.0.0.1
parents r-int
}

View File

@ -9,5 +9,6 @@ define host{
host_name s-adm
alias debian-servers
address 192.168.99.99
parents r-int
}

View File

@ -9,5 +9,6 @@ define host{
host_name s-appli
alias debian-servers
address 172.16.0.3
parents r-int
}

View File

@ -9,5 +9,6 @@ define host{
host_name s-backup
alias serveur proxy
address 172.16.0.4
parents r-int
}

View File

@ -9,6 +9,7 @@ define host{
host_name s-fog
alias serveur proxy
address 172.16.0.16
parents r-int
}

View File

@ -9,5 +9,6 @@ define host{
host_name s-infra
alias debian-servers
address 172.16.0.1
parents r-int
}

View File

@ -9,6 +9,7 @@ define host{
host_name s-itil
alias serveur proxy
address 172.16.0.9
parents r-int
}

View File

@ -9,5 +9,6 @@ define host{
host_name s-nxc
alias debian-servers
address 172.16.0.7
parents r-int
}

View File

@ -9,6 +9,7 @@ define host{
host_name s-proxy
alias serveur proxy
address 172.16.0.2
parents r-int
}

View File

@ -9,6 +9,7 @@ define host{
host_name s-win
alias serveur proxy
address 172.16.0.6
parents r-int
}