94 lines
2.0 KiB
Markdown
94 lines
2.0 KiB
Markdown
Configuration de ferm
|
|
|
|
# [Ferm](http://ferm.foo-projects.org/)
|
|
|
|
Modifier l'execution d'iptables [plus d'info ici#!/bin/bash
|
|
set -u
|
|
set -e
|
|
# Version Site to Site
|
|
|
|
AddressAwg=10.0.0.1/32 # Adresse VPN Wireguard cote A
|
|
EndpointA=192.168.0.51 # Adresse extremite A
|
|
PortA=51820 # Port ecoute extremite A
|
|
NetworkA=192.168.1.0/24 # reseau cote A
|
|
NetworkC=192.168.200.0/24 #reseau cote A
|
|
NetworkD=172.16.0.0/24 #reseau cote A
|
|
|
|
AddressBwg=10.0.0.2/32 # Adresse VPN Wireguard cote B
|
|
EndpointB=192.168.0.52 # Adresse extremite B
|
|
PortB=51820 # Port ecoute extremite B
|
|
NetworkB=172.16.128.0/24 # reseau cote B
|
|
|
|
umask 077
|
|
wg genkey > endpoint-a.key
|
|
wg pubkey < endpoint-a.key > endpoint-a.pub
|
|
|
|
wg genkey > endpoint-b.key
|
|
wg pubkey < endpoint-b.key > endpoint-b.pub
|
|
|
|
|
|
PKA=$(cat endpoint-a.key)
|
|
pKA=$(cat endpoint-a.pub)
|
|
PKB=$(cat endpoint-b.key)
|
|
pKB=$(cat endpoint-b.pub)
|
|
|
|
cat <<FINI > wg0-a.conf
|
|
# local settings for Endpoint A
|
|
[Interface]
|
|
PrivateKey = $PKA
|
|
Address = $AddressAwg
|
|
ListenPort = $PortA
|
|
|
|
# IP forwarding
|
|
PreUp = sysctl -w net.ipv4.ip_forward=1
|
|
|
|
# remote settings for Endpoint B
|
|
[Peer]
|
|
PublicKey = $pKB
|
|
Endpoint = ${EndpointB}:$PortB
|
|
AllowedIPs = $AddressBwg, $NetworkB
|
|
|
|
FINI
|
|
|
|
|
|
cat <<FINI > wg0-b.conf
|
|
# local settings for Endpoint B
|
|
[Interface]
|
|
PrivateKey = $PKB
|
|
Address = $AddressBwg
|
|
ListenPort = $PortB
|
|
|
|
# IP forwarding
|
|
PreUp = sysctl -w net.ipv4.ip_forward=1
|
|
|
|
# remote settings for Endpoint A
|
|
[Peer]
|
|
PublicKey = $pKA
|
|
Endpoint = ${EndpointA}:$PortA
|
|
AllowedIPs = $AddressAwg, $NetworkA, $NetworkC, $NetworkD
|
|
|
|
FINI
|
|
|
|
echo "wg0-a.conf et wg0-b.conf sont generes ..."
|
|
echo "copier wg0-b.conf sur la machine b et renommer les fichiers de configuration ..."](https://wiki.debian.org/iptables)
|
|
```shell
|
|
update-alternatives --set iptables /usr/sbin/iptables-legacy
|
|
```
|
|
|
|
Pour tester utiliser [Nmap](https://nmap.org/man/fr/man-briefoptions.html)
|
|
### r-vp1
|
|
```shell
|
|
sudo nmap -p51820 192.168.0.51
|
|
```
|
|
### r-vp2
|
|
```shell
|
|
sudo nmap -p51820 192.168.0.52
|
|
```
|
|
### Sortie :
|
|
```
|
|
`PORT STATE SERVICE
|
|
51820/tcp filtered unknown`
|
|
```
|
|
|
|
Faire des ping!
|