Modifié : sisr1/tp07/files_firewall/current_ruleset_partie_4.nft
This commit is contained in:
		| @@ -13,14 +13,22 @@ table ip ipfilter{ | |||||||
| 		ct state established, related accept | 		ct state established, related accept | ||||||
| 		icmp type echo-request iif {$lanif} ip daddr 172.16.0.1-172.16.0.254 accept | 		icmp type echo-request iif {$lanif} ip daddr 172.16.0.1-172.16.0.254 accept | ||||||
| 		icmp type echo-request iif {$lanif} ip daddr {$iplan} accept | 		icmp type echo-request iif {$lanif} ip daddr {$iplan} accept | ||||||
|  |                 tcp dport 20 accept | ||||||
|  |                 tcp dport 21 accept | ||||||
|  |                 tcp dport {80, 443} accept | ||||||
| 		tcp dport 22 accept | 		tcp dport 22 accept | ||||||
|  | 		ip saddr 10.121.38.1 tcp dport {80, 443} accept | ||||||
|         } |         } | ||||||
| 	chain system_in { | 	chain system_in { | ||||||
|                 type filter hook input priority filter; policy drop; |                 type filter hook input priority filter; policy drop; | ||||||
| 		icmp type echo-reply accept | 		icmp type echo-reply accept | ||||||
| 		icmp type echo-request iif {$lanif} accept | 		icmp type echo-request iif {$lanif} accept | ||||||
| 		ct state established, related accept | 		ct state established, related accept | ||||||
|  |                 tcp dport 20 accept | ||||||
|  |                 tcp dport 21 accept | ||||||
|  |                 tcp dport {80, 443} accept | ||||||
|                 tcp dport 22 accept |                 tcp dport 22 accept | ||||||
|  | 		ip saddr 10.121.38.1 tcp dport {80, 443} accept | ||||||
|         } |         } | ||||||
|  	chain routing { |  	chain routing { | ||||||
|                 type filter hook forward priority filter; policy drop; |                 type filter hook forward priority filter; policy drop; | ||||||
| @@ -29,18 +37,32 @@ table ip ipfilter{ | |||||||
| 	} | 	} | ||||||
|  	chain system_out { |  	chain system_out { | ||||||
|                 type filter hook output priority filter; policy drop; |                 type filter hook output priority filter; policy drop; | ||||||
|  |                 ip daddr 10.121.38.7-10.121.38.8 accept | ||||||
|  |                 ip daddr 10.121.38.1 tcp dport 8080 accept | ||||||
| 		icmp type echo-reply oif {$lanif} accept | 		icmp type echo-reply oif {$lanif} accept | ||||||
| 		icmp type echo-request accept | 		icmp type echo-request accept | ||||||
| 		ip daddr 10.121.38.7-10.121.38.8 accept |                 tcp dport 20 accept | ||||||
|  | 		tcp sport 20 accept | ||||||
|  |                 tcp dport 21 accept | ||||||
|  | 		tcp sport 21 accept | ||||||
|  |                 tcp dport {80, 443} accept | ||||||
|  | 		tcp sport {80, 443} accept | ||||||
| 		tcp sport 22 accept | 		tcp sport 22 accept | ||||||
|         } |         } | ||||||
| 	chain postrouting { | 	chain postrouting { | ||||||
|                 type filter hook postrouting priority filter; policy drop; |                 type filter hook postrouting priority filter; policy drop; | ||||||
| 		ip daddr 10.121.38.7-10.121.38.8 accept | 		ip daddr 10.121.38.7-10.121.38.8 accept | ||||||
|  | 		ip daddr 10.121.38.1 tcp dport 8080 accept | ||||||
| 		icmp type echo-request ip saddr {$iplan, $ipdmz, $firewall} accept | 		icmp type echo-request ip saddr {$iplan, $ipdmz, $firewall} accept | ||||||
| 		icmp type echo-reply iif {$dmzif}  oif {$lanif} accept | 		icmp type echo-reply iif {$dmzif}  oif {$lanif} accept | ||||||
| 		icmp type echo-request iif {$lanif} oif {$dmzif} accept | 		icmp type echo-request iif {$lanif} oif {$dmzif} accept | ||||||
| 		icmp type echo-request ip saddr $iplan oif $lanif accept | 		icmp type echo-request ip saddr $iplan oif $lanif accept | ||||||
|  |                 tcp dport 20 accept | ||||||
|  |                 tcp sport 20 accept | ||||||
|  |                 tcp dport 21 accept | ||||||
|  |                 tcp sport 21 accept | ||||||
|  |                 tcp dport {80, 443} accept | ||||||
|  |                 tcp sport {80, 443} accept | ||||||
| 		tcp sport 22 accept | 		tcp sport 22 accept | ||||||
|         } |         } | ||||||
| } | } | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user