Grande réorganisation et renommage au niveau du Gitea, d'autres
modifications à venir.
This commit is contained in:
1
bts_annee_1/tp07_firewall/README.md
Normal file
1
bts_annee_1/tp07_firewall/README.md
Normal file
@@ -0,0 +1 @@
|
||||
Dossier contenant les configurations effectuées (par machine) pour le pare-feu nftables, septième TP.
|
1
bts_annee_1/tp07_firewall/files_firewall_vm/README.md
Normal file
1
bts_annee_1/tp07_firewall/files_firewall_vm/README.md
Normal file
@@ -0,0 +1 @@
|
||||
Contient chaque étape de la configuration du pare-feu (current_ruleset_partie_x), plus d'autres fichiers semblant essentiels.
|
@@ -0,0 +1,17 @@
|
||||
define netif = enp0s3
|
||||
define dmzif = enp0s8
|
||||
define lanif = enp0s9
|
||||
|
||||
table ip ipfilter {
|
||||
chain routing {
|
||||
type filter hook forward priority filter; policy accept;
|
||||
icmp type echo-request iif { $netif, $dmzif } drop
|
||||
icmp type { echo-reply, echo-request } accept
|
||||
drop
|
||||
}
|
||||
|
||||
chain system_in {
|
||||
type filter hook input priority filter; policy accept;
|
||||
icmp type echo-request iif { $netif, $dmzif } drop
|
||||
}
|
||||
}
|
@@ -0,0 +1,25 @@
|
||||
define netif = enp0s3
|
||||
define dmzif = enp0s8
|
||||
define lanif = enp0s9
|
||||
|
||||
table ip ipfilter{
|
||||
chain prerouting {
|
||||
type filter hook prerouting priority filter; policy drop;
|
||||
tcp dport 22 accept
|
||||
}
|
||||
chain system_in {
|
||||
type filter hook input priority filter; policy drop;
|
||||
tcp dport 22 accept
|
||||
}
|
||||
chain routing {
|
||||
type filter hook forward priority filter; policy drop;
|
||||
}
|
||||
chain system_out {
|
||||
type filter hook output priority filter; policy drop;
|
||||
tcp sport 22 accept
|
||||
}
|
||||
chain postrouting {
|
||||
type filter hook postrouting priority filter; policy drop;
|
||||
tcp sport 22 accept
|
||||
}
|
||||
}
|
@@ -0,0 +1,42 @@
|
||||
define netif = enp0s3
|
||||
define dmzif = enp0s8
|
||||
define lanif = enp0s9
|
||||
|
||||
define firewall = 192.168.0.120
|
||||
define ipdmz = 172.16.0.254
|
||||
define iplan = 10.0.0.254
|
||||
|
||||
table ip ipfilter{
|
||||
chain prerouting {
|
||||
type filter hook prerouting priority filter; policy drop;
|
||||
icmp type echo-reply accept
|
||||
icmp type echo-request iif {$lanif} ip daddr 172.16.0.1-172.16.0.254 accept
|
||||
icmp type echo-request iif {$lanif} ip daddr {$iplan} accept
|
||||
tcp dport 22 accept
|
||||
}
|
||||
chain system_in {
|
||||
type filter hook input priority filter; policy drop;
|
||||
icmp type echo-reply accept
|
||||
icmp type echo-request iif {$lanif} accept
|
||||
tcp dport 22 accept
|
||||
}
|
||||
chain routing {
|
||||
type filter hook forward priority filter; policy drop;
|
||||
icmp type echo-request iif {$lanif} oif {$dmzif} accept
|
||||
icmp type echo-reply iif {$dmzif} oif {$lanif} accept
|
||||
}
|
||||
chain system_out {
|
||||
type filter hook output priority filter; policy drop;
|
||||
icmp type echo-reply oif {$lanif} accept
|
||||
icmp type echo-request accept
|
||||
tcp sport 22 accept
|
||||
}
|
||||
chain postrouting {
|
||||
type filter hook postrouting priority filter; policy drop;
|
||||
icmp type echo-request ip saddr {$iplan, $ipdmz, $firewall} accept
|
||||
icmp type echo-reply iif {$dmzif} oif {$lanif} accept
|
||||
icmp type echo-request iif {$lanif} oif {$dmzif} accept
|
||||
icmp type echo-request ip saddr $iplan oif $lanif accept
|
||||
tcp sport 22 accept
|
||||
}
|
||||
}
|
@@ -0,0 +1,75 @@
|
||||
define netif = enp0s3
|
||||
define dmzif = enp0s8
|
||||
define lanif = enp0s9
|
||||
|
||||
define lan-ntw = 10.0.0.0/24
|
||||
|
||||
define proxy = 10.121.38.1
|
||||
define dns = {10.121.38.7 , 10.121.38.8}
|
||||
define proxyport = 8080
|
||||
define dmznet = 172.16.0.1-172.16.0.254
|
||||
|
||||
define firewall = 192.168.0.120
|
||||
define ipdmz = 172.16.0.254
|
||||
define iplan = 10.0.0.254
|
||||
|
||||
table ip ipfilter{
|
||||
chain prerouting {
|
||||
type filter hook prerouting priority filter; policy drop;
|
||||
icmp type echo-reply accept
|
||||
ct state established, related accept
|
||||
icmp type echo-request iif {$lanif} ip daddr $dmznet accept
|
||||
icmp type echo-request iif {$lanif} ip daddr {$iplan} accept
|
||||
tcp dport 20 accept
|
||||
tcp dport 21 accept
|
||||
tcp dport {80, 443} accept
|
||||
tcp dport 22 accept
|
||||
ip saddr $proxy tcp dport {80, 443} accept
|
||||
}
|
||||
chain system_in {
|
||||
type filter hook input priority filter; policy drop;
|
||||
icmp type echo-reply accept
|
||||
icmp type echo-request iif {$lanif} accept
|
||||
ct state established, related accept
|
||||
tcp dport 20 accept
|
||||
tcp dport 21 accept
|
||||
tcp dport {80, 443} accept
|
||||
tcp dport 22 accept
|
||||
ip saddr $proxy tcp dport {80, 443} accept
|
||||
}
|
||||
chain routing {
|
||||
type filter hook forward priority filter; policy drop;
|
||||
icmp type echo-request iif {$lanif} oif {$dmzif} accept
|
||||
icmp type echo-reply iif {$dmzif} oif {$lanif} accept
|
||||
}
|
||||
chain system_out {
|
||||
type filter hook output priority filter; policy drop;
|
||||
ip daddr $dns accept
|
||||
ip daddr $proxy tcp dport $proxyport accept
|
||||
icmp type echo-reply oif {$lanif} accept
|
||||
icmp type echo-request accept
|
||||
tcp dport 20 accept
|
||||
tcp sport 20 accept
|
||||
tcp dport 21 accept
|
||||
tcp sport 21 accept
|
||||
tcp dport {80, 443} accept
|
||||
tcp sport {80, 443} accept
|
||||
tcp sport 22 accept
|
||||
}
|
||||
chain postrouting {
|
||||
type filter hook postrouting priority filter; policy drop;
|
||||
ip daddr $dns accept
|
||||
ip daddr $proxy tcp dport $proxyport accept
|
||||
icmp type echo-request ip saddr {$iplan, $ipdmz, $firewall} accept
|
||||
icmp type echo-reply iif {$dmzif} oif {$lanif} accept
|
||||
icmp type echo-request iif {$lanif} oif {$dmzif} accept
|
||||
icmp type echo-request ip saddr $iplan oif $lanif accept
|
||||
tcp dport 20 accept
|
||||
tcp sport 20 accept
|
||||
tcp dport 21 accept
|
||||
tcp sport 21 accept
|
||||
tcp dport {80, 443} accept
|
||||
tcp sport {80, 443} accept
|
||||
tcp sport 22 accept
|
||||
}
|
||||
}
|
@@ -0,0 +1,107 @@
|
||||
define netif = enp0s3
|
||||
define dmzif = enp0s8
|
||||
define lanif = enp0s9
|
||||
|
||||
define lan-ntw = 10.0.0.0/24
|
||||
|
||||
define proxy = 10.121.38.1
|
||||
define dns = {10.121.38.7 , 10.121.38.8}
|
||||
define proxyport = 8080
|
||||
define dmznet = 172.16.0.1-172.16.0.254
|
||||
|
||||
define firewall = 192.168.0.120
|
||||
define ipdmz = 172.16.0.254
|
||||
define iplan = 10.0.0.254
|
||||
|
||||
table ip ipfilter{
|
||||
|
||||
chain prerouting {
|
||||
type filter hook prerouting priority filter; policy drop;
|
||||
ct state established, related accept
|
||||
icmp type echo-reply accept
|
||||
icmp type echo-request iif {$lanif} ip daddr $dmznet accept
|
||||
icmp type echo-request iif {$lanif} ip daddr {$iplan} accept
|
||||
tcp dport 20 accept
|
||||
tcp dport 21 accept
|
||||
tcp dport {80, 443} ip saddr $lan-ntw accept
|
||||
tcp sport {80, 443} ip saddr $lan-ntw accept
|
||||
tcp dport 22 accept
|
||||
udp sport 53 iif {$dmzif, $lanif} accept
|
||||
udp dport 53 accept
|
||||
ip saddr $proxy tcp dport {80, 443} accept
|
||||
ip daddr $dns accept
|
||||
}
|
||||
|
||||
chain system_in {
|
||||
type filter hook input priority filter; policy drop;
|
||||
ct state established, related accept
|
||||
icmp type echo-reply accept
|
||||
icmp type echo-request iif {$lanif} accept
|
||||
tcp dport 20 accept
|
||||
tcp dport 21 accept
|
||||
tcp dport {80, 443} accept
|
||||
tcp dport 22 accept
|
||||
udp sport 53 accept
|
||||
udp dport 53 accept
|
||||
ip saddr $proxy tcp dport {80, 443} accept
|
||||
}
|
||||
|
||||
chain routing {
|
||||
type filter hook forward priority filter; policy drop;
|
||||
ct state established, related accept
|
||||
icmp type echo-request iif {$lanif} oif {$dmzif} accept
|
||||
icmp type echo-reply iif {$dmzif} oif {$lanif} accept
|
||||
tcp dport {80, 443} ip saddr $lan-ntw accept
|
||||
tcp sport {80, 443} ip saddr $lan-ntw accept
|
||||
udp sport 53 iif {$lanif, $dmzif} accept
|
||||
udp dport 53 accept
|
||||
ip daddr $dns accept
|
||||
}
|
||||
|
||||
chain system_out {
|
||||
type filter hook output priority filter; policy drop;
|
||||
ip daddr $dns accept
|
||||
ip daddr $proxy tcp dport $proxyport accept
|
||||
icmp type echo-reply oif {$lanif} accept
|
||||
icmp type echo-request accept
|
||||
tcp dport 20 accept
|
||||
tcp sport 20 accept
|
||||
tcp dport 21 accept
|
||||
tcp sport 21 accept
|
||||
tcp dport {80, 443} accept
|
||||
tcp sport {80, 443} accept
|
||||
tcp sport 22 accept
|
||||
udp sport 53 accept
|
||||
udp dport 53 accept
|
||||
}
|
||||
|
||||
chain postrouting {
|
||||
type filter hook postrouting priority filter; policy drop;
|
||||
ct state established, related accept
|
||||
ip daddr $dns accept
|
||||
ip daddr $proxy tcp dport $proxyport accept
|
||||
icmp type echo-request ip saddr {$iplan, $ipdmz, $firewall} accept
|
||||
icmp type echo-reply iif {$dmzif} oif {$lanif} accept
|
||||
icmp type echo-request iif {$lanif} oif {$dmzif} accept
|
||||
icmp type echo-request ip saddr $iplan oif $lanif accept
|
||||
tcp dport 20 accept
|
||||
tcp sport 20 accept
|
||||
tcp dport 21 accept
|
||||
tcp sport 21 accept
|
||||
tcp dport {80, 443} accept
|
||||
tcp sport {80, 443} accept
|
||||
tcp sport 22 accept
|
||||
udp sport 53 accept
|
||||
udp dport 53 accept
|
||||
ip daddr $dns accept
|
||||
}
|
||||
|
||||
chain pre_nat {
|
||||
type nat hook prerouting priority filter; policy accept;
|
||||
}
|
||||
|
||||
chain post_nat {
|
||||
type nat hook postrouting priority filter; policy accept;
|
||||
ip saddr $lan-ntw oif $netif snat $firewall
|
||||
}
|
||||
}
|
@@ -0,0 +1,200 @@
|
||||
# Définition des interfaces avec un nom
|
||||
define netif = enp0s3
|
||||
define dmzif = enp0s8
|
||||
define lanif = enp0s9
|
||||
|
||||
# Définition du réseau LAN
|
||||
define lan-ntw = 10.0.0.0/24
|
||||
|
||||
# Définition de l'IP du proxy, du DNS, du port du proxy et du réseau DMZ pour ne pas à tout retaper
|
||||
define proxy = 10.121.38.1
|
||||
define dns = {10.121.38.7 , 10.121.38.8}
|
||||
define proxyport = 8080
|
||||
define dmznet = 172.16.0.1-172.16.0.254
|
||||
|
||||
# Définition des IPs des cartes de la machine firewall
|
||||
define firewall = 192.168.0.120
|
||||
define ipdmz = 172.16.0.254
|
||||
define iplan = 10.0.0.254
|
||||
|
||||
table ip ipfilter{
|
||||
|
||||
chain prerouting {
|
||||
type filter hook prerouting priority filter; policy drop;
|
||||
|
||||
#Permet le passage des réponses aux requêtes acceptées
|
||||
ct state established, related accept
|
||||
|
||||
#Accepte les réponses ping
|
||||
icmp type echo-reply accept
|
||||
|
||||
#Accepte les requêtes de ping si elles viennent du LAN, à destination de la DMZ
|
||||
icmp type echo-request iif {$lanif} ip daddr $dmznet accept
|
||||
|
||||
#Même chose que plus haut, mais à destination de l'IP de la carte LAN du firewall
|
||||
icmp type echo-request iif {$lanif} ip daddr {$iplan} accept
|
||||
|
||||
#Autorise les requêtes ayant pour port de destination les ports FTP
|
||||
tcp dport 20 accept
|
||||
tcp dport 21 accept
|
||||
|
||||
#Autorise les requêtes HTTP/HTTPS venant de la LAN
|
||||
tcp dport {80, 443} ip saddr $lan-ntw accept
|
||||
tcp sport {80, 443} ip saddr $lan-ntw accept
|
||||
|
||||
#Autorise le SSH
|
||||
tcp dport 22 accept
|
||||
|
||||
#Autorise les requêtes DNS depuis la DMZ et le LAN
|
||||
udp sport 53 iif {$dmzif, $lanif} accept
|
||||
udp dport 53 accept
|
||||
|
||||
#Autorise les requêtes provenant du proxy avec ports HTTP/HTTPS
|
||||
ip saddr $proxy tcp dport {80, 443} accept
|
||||
|
||||
#Autorise les requêtes qui vont vers le serveur DNS
|
||||
ip daddr $dns accept
|
||||
}
|
||||
|
||||
chain system_in {
|
||||
type filter hook input priority filter; policy drop;
|
||||
|
||||
#Permet le passage des réponses aux requêtes acceptées
|
||||
ct state established, related accept
|
||||
|
||||
#Accepte les réponses ping
|
||||
icmp type echo-reply accept
|
||||
|
||||
#Accepte les requêtes de ping si elles viennent du LAN
|
||||
icmp type echo-request iif {$lanif} accept
|
||||
|
||||
#Autorise les requêtes ayant pour port de destination les ports FTP
|
||||
tcp dport 20 accept
|
||||
tcp dport 21 accept
|
||||
|
||||
#Autorise les requêtes HTTP/HTTPS
|
||||
tcp dport {80, 443} accept
|
||||
|
||||
#Autorise le SSH
|
||||
tcp dport 22 accept
|
||||
|
||||
#Autorise les requêtes DNS
|
||||
udp sport 53 accept
|
||||
udp dport 53 accept
|
||||
|
||||
#Autorise les requêtes provenant du proxy avec ports HTTP/HTTPS
|
||||
ip saddr $proxy tcp dport {80, 443} accept
|
||||
}
|
||||
|
||||
chain routing {
|
||||
type filter hook forward priority filter; policy drop;
|
||||
|
||||
#Permet le passage des réponses aux requêtes acceptées
|
||||
ct state established, related accept
|
||||
|
||||
#Accepte les requêtes de ping si elles viennent du LAN, à destination de la DMZ
|
||||
icmp type echo-request iif {$lanif} oif {$dmzif} accept
|
||||
|
||||
#Même chose que plus haut, mais à destination de l'IP de la carte LAN du firewall
|
||||
icmp type echo-reply iif {$dmzif} oif {$lanif} accept
|
||||
|
||||
#Autorise les requêtes HTTP/HTTPS venant de la LAN
|
||||
tcp dport {80, 443} ip saddr $lan-ntw accept
|
||||
tcp sport {80, 443} ip saddr $lan-ntw accept
|
||||
|
||||
#Autorise les requêtes DNS depuis la DMZ et le LAN
|
||||
udp sport 53 iif {$lanif, $dmzif} accept
|
||||
udp dport 53 accept
|
||||
|
||||
#Autorise les requêtes qui vont vers le serveur DNS
|
||||
ip daddr $dns accept
|
||||
}
|
||||
|
||||
chain system_out {
|
||||
type filter hook output priority filter; policy drop;
|
||||
|
||||
#Autorise les requêtes qui vont vers le serveur DNS
|
||||
ip daddr $dns accept
|
||||
|
||||
#Autorise les requêtes provenant du proxy, depuis le port 8080
|
||||
ip daddr $proxy tcp dport $proxyport accept
|
||||
|
||||
#Accepte les requêtes de ping si elles viennent du LAN
|
||||
icmp type echo-reply oif {$lanif} accept
|
||||
|
||||
#Accepte les requêtes ping
|
||||
icmp type echo-request accept
|
||||
|
||||
#Autorise les requêtes ayant pour port de destination les ports FTP
|
||||
tcp dport 20 accept
|
||||
tcp sport 20 accept
|
||||
tcp dport 21 accept
|
||||
tcp sport 21 accept
|
||||
|
||||
#Autorise les requêtes provenant des ports HTTP/HTTPS
|
||||
tcp dport {80, 443} accept
|
||||
tcp sport {80, 443} accept
|
||||
|
||||
#Autorise le SSH
|
||||
tcp sport 22 accept
|
||||
|
||||
#Autorise les requêtes DNS
|
||||
udp sport 53 accept
|
||||
udp dport 53 accept
|
||||
}
|
||||
|
||||
chain postrouting {
|
||||
type filter hook postrouting priority filter; policy drop;
|
||||
|
||||
#Permet le passage des réponses aux requêtes acceptées
|
||||
ct state established, related accept
|
||||
|
||||
#Autorise les requêtes qui vont vers le serveur DNS
|
||||
ip daddr $dns accept
|
||||
|
||||
#Autorise les requêtes allant vers le proxy avec le port 8080
|
||||
ip daddr $proxy tcp dport $proxyport accept
|
||||
|
||||
#Autorise les requêtes ping venant des cartes LAN, DMZ et la carte en pont du firewall
|
||||
icmp type echo-request ip saddr {$iplan, $ipdmz, $firewall} accept
|
||||
|
||||
#Autorise les réponses ping si elles viennent de la DMZ à destination du LAN
|
||||
icmp type echo-reply iif {$dmzif} oif {$lanif} accept
|
||||
|
||||
#Autorise les requêtes ping venant de la LAN à destination de la DMZ
|
||||
icmp type echo-request iif {$lanif} oif {$dmzif} accept
|
||||
|
||||
#Autorise les requêtes ping ayant le LAN pour origine, à destination de la carte LAN du firewall
|
||||
icmp type echo-request ip saddr $iplan oif $lanif accept
|
||||
|
||||
#Autorise les requêtes FTP
|
||||
tcp dport 20 accept
|
||||
tcp sport 20 accept
|
||||
tcp dport 21 accept
|
||||
tcp sport 21 accept
|
||||
|
||||
#Autorise les requêtes ayant pour ports HTTP et HTTPS comme ports de destination et de source
|
||||
tcp dport {80, 443} accept
|
||||
tcp sport {80, 443} accept
|
||||
|
||||
#Autorise le SSH
|
||||
tcp sport 22 accept
|
||||
|
||||
#Autorise les requêtes DNS
|
||||
udp sport 53 accept
|
||||
udp dport 53 accept
|
||||
|
||||
#Autorise les requêtes provenant du DNS
|
||||
ip daddr $dns accept
|
||||
}
|
||||
|
||||
chain pre_nat {
|
||||
type nat hook prerouting priority filter; policy accept;
|
||||
}
|
||||
|
||||
chain post_nat {
|
||||
type nat hook postrouting priority filter; policy accept;
|
||||
ip saddr $lan-ntw oif $netif snat $firewall
|
||||
ip saddr $dmznet oif $netif snat $firewall
|
||||
}
|
||||
}
|
@@ -0,0 +1,215 @@
|
||||
# Définition des interfaces avec un nom
|
||||
define netif = enp0s3
|
||||
define dmzif = enp0s8
|
||||
define lanif = enp0s9
|
||||
|
||||
# Définition de l'IP du serveur web
|
||||
define srv = 172.16.0.1
|
||||
|
||||
# Définition du réseau LAN
|
||||
define lan-ntw = 10.0.0.0/24
|
||||
|
||||
# Définition de l'IP du proxy, du DNS, du port du proxy et du réseau DMZ pour ne pas à tout retaper
|
||||
define proxy = 10.121.38.1
|
||||
define dns = {10.121.38.7 , 10.121.38.8}
|
||||
define proxyport = 8080
|
||||
define dmznet = 172.16.0.1-172.16.0.254
|
||||
|
||||
# Définition des IPs des cartes de la machine firewall
|
||||
define firewall = 192.168.0.120
|
||||
define ipdmz = 172.16.0.254
|
||||
define iplan = 10.0.0.254
|
||||
|
||||
table ip ipfilter{
|
||||
|
||||
chain prerouting {
|
||||
type filter hook prerouting priority filter; policy drop;
|
||||
|
||||
#Permet le passage des réponses aux requêtes acceptées
|
||||
ct state established, related accept
|
||||
|
||||
#Accepte les réponses ping
|
||||
icmp type echo-reply accept
|
||||
|
||||
#Accepte les requêtes de ping si elles viennent du LAN, à destination de la DMZ
|
||||
icmp type echo-request iif {$lanif} ip daddr $dmznet accept
|
||||
|
||||
#Même chose que plus haut, mais à destination de l'IP de la carte LAN du firewall
|
||||
icmp type echo-request iif {$lanif} ip daddr {$iplan} accept
|
||||
|
||||
#Autorise les requêtes ayant pour port de destination les ports FTP
|
||||
tcp dport 20 accept
|
||||
tcp dport 21 accept
|
||||
|
||||
#Autorise les requêtes HTTP/HTTPS venant de la LAN
|
||||
tcp dport {80, 443} ip saddr $lan-ntw accept
|
||||
tcp sport {80, 443} ip saddr $lan-ntw accept
|
||||
|
||||
#Autorise le SSH
|
||||
tcp dport 22 accept
|
||||
|
||||
#Autorise les requêtes DNS depuis la DMZ et le LAN
|
||||
udp sport 53 iif {$dmzif, $lanif} accept
|
||||
udp dport 53 accept
|
||||
|
||||
#Autorise les requêtes provenant du proxy avec ports HTTP/HTTPS
|
||||
ip saddr $proxy tcp dport {80, 443} accept
|
||||
|
||||
#Autorise les requêtes qui vont vers le serveur DNS
|
||||
ip daddr $dns accept
|
||||
}
|
||||
|
||||
chain system_in {
|
||||
type filter hook input priority filter; policy drop;
|
||||
|
||||
#Permet le passage des réponses aux requêtes acceptées
|
||||
ct state established, related accept
|
||||
|
||||
#Accepte les réponses ping
|
||||
icmp type echo-reply accept
|
||||
|
||||
#Accepte les requêtes de ping si elles viennent du LAN
|
||||
icmp type echo-request iif {$lanif} accept
|
||||
|
||||
#Autorise les requêtes ayant pour port de destination les ports FTP
|
||||
tcp dport 20 accept
|
||||
tcp dport 21 accept
|
||||
|
||||
#Autorise les requêtes HTTP/HTTPS
|
||||
tcp dport {80, 443} accept
|
||||
|
||||
#Autorise le SSH
|
||||
tcp dport 22 accept
|
||||
|
||||
#Autorise les requêtes DNS
|
||||
udp sport 53 accept
|
||||
udp dport 53 accept
|
||||
|
||||
#Autorise les requêtes provenant du proxy avec ports HTTP/HTTPS
|
||||
ip saddr $proxy tcp dport {80, 443} accept
|
||||
}
|
||||
|
||||
chain routing {
|
||||
type filter hook forward priority filter; policy drop;
|
||||
|
||||
#Permet le passage des réponses aux requêtes acceptées
|
||||
ct state established, related accept
|
||||
|
||||
#Accepte les requêtes de ping si elles viennent du LAN, à destination de la DMZ
|
||||
icmp type echo-request iif {$lanif} oif {$dmzif} accept
|
||||
|
||||
#Même chose que plus haut, mais à destination de l'IP de la carte LAN du firewall
|
||||
icmp type echo-reply iif {$dmzif} oif {$lanif} accept
|
||||
|
||||
#Autorise les requêtes HTTP/HTTPS venant de la LAN
|
||||
tcp dport {80, 443} ip saddr $lan-ntw accept
|
||||
tcp sport {80, 443} ip saddr $lan-ntw accept
|
||||
|
||||
#Autorise le port forwarding pour la DMZ pour HTTP/HTTPS
|
||||
tcp dport {80, 443} ip saddr $srv accept
|
||||
|
||||
#Autorise les requêtes DNS depuis la DMZ et le LAN
|
||||
udp sport 53 iif {$lanif, $dmzif} accept
|
||||
udp dport 53 accept
|
||||
|
||||
#Autorise les requêtes qui vont vers le serveur DNS
|
||||
ip daddr $dns accept
|
||||
}
|
||||
|
||||
chain system_out {
|
||||
type filter hook output priority filter; policy drop;
|
||||
|
||||
#Autorise les requêtes qui vont vers le serveur DNS
|
||||
ip daddr $dns accept
|
||||
|
||||
#Autorise les requêtes provenant du proxy, depuis le port 8080
|
||||
ip daddr $proxy tcp dport $proxyport accept
|
||||
|
||||
#Accepte les requêtes de ping si elles viennent du LAN
|
||||
icmp type echo-reply oif {$lanif} accept
|
||||
|
||||
#Accepte les requêtes ping
|
||||
icmp type echo-request accept
|
||||
|
||||
#Autorise les requêtes ayant pour port de destination les ports FTP
|
||||
tcp dport 20 accept
|
||||
tcp sport 20 accept
|
||||
tcp dport 21 accept
|
||||
tcp sport 21 accept
|
||||
|
||||
#Autorise les requêtes provenant des ports HTTP/HTTPS
|
||||
tcp dport {80, 443} accept
|
||||
tcp sport {80, 443} accept
|
||||
|
||||
#Autorise le SSH
|
||||
tcp sport 22 accept
|
||||
|
||||
#Autorise les requêtes DNS
|
||||
udp sport 53 accept
|
||||
udp dport 53 accept
|
||||
}
|
||||
|
||||
chain postrouting {
|
||||
type filter hook postrouting priority filter; policy drop;
|
||||
|
||||
#Permet le passage des réponses aux requêtes acceptées
|
||||
ct state established, related accept
|
||||
|
||||
#Autorise les requêtes qui vont vers le serveur DNS
|
||||
ip daddr $dns accept
|
||||
|
||||
#Autorise les requêtes allant vers le proxy avec le port 8080
|
||||
ip daddr $proxy tcp dport $proxyport accept
|
||||
|
||||
#Autorise les requêtes ping venant des cartes LAN, DMZ et la carte en pont du firewall
|
||||
icmp type echo-request ip saddr {$iplan, $ipdmz, $firewall} accept
|
||||
|
||||
#Autorise les réponses ping si elles viennent de la DMZ à destination du LAN
|
||||
icmp type echo-reply iif {$dmzif} oif {$lanif} accept
|
||||
|
||||
#Autorise les requêtes ping venant de la LAN à destination de la DMZ
|
||||
icmp type echo-request iif {$lanif} oif {$dmzif} accept
|
||||
|
||||
#Autorise les requêtes ping ayant le LAN pour origine, à destination de la carte LAN du firewall
|
||||
icmp type echo-request ip saddr $iplan oif $lanif accept
|
||||
|
||||
#Autorise les requêtes FTP
|
||||
tcp dport 20 accept
|
||||
tcp sport 20 accept
|
||||
tcp dport 21 accept
|
||||
tcp sport 21 accept
|
||||
|
||||
#Autorise les requêtes ayant pour ports HTTP et HTTPS comme ports de destination et de source
|
||||
tcp dport {80, 443} accept
|
||||
tcp sport {80, 443} accept
|
||||
|
||||
#Autorise le SSH
|
||||
tcp sport 22 accept
|
||||
|
||||
#Autorise les requêtes DNS
|
||||
udp sport 53 accept
|
||||
udp dport 53 accept
|
||||
|
||||
#Autorise les requêtes provenant du DNS
|
||||
ip daddr $dns accept
|
||||
}
|
||||
|
||||
chain pre_nat {
|
||||
type nat hook prerouting priority filter; policy accept;
|
||||
|
||||
#Autorise les requêtes HTTP vers la carte LAN du firewall
|
||||
tcp dport 80 ip daddr $firewall dnat $srv:80
|
||||
#Même chose mais pour HTTPS
|
||||
tcp dport 443 ip daddr $firewall dnat $srv:443
|
||||
}
|
||||
|
||||
chain post_nat {
|
||||
type nat hook postrouting priority filter; policy accept;
|
||||
|
||||
#Autorise la NAT à destination du firewall si la requête vient du LAN et part vers Internet
|
||||
ip saddr $lan-ntw oif $netif snat $firewall
|
||||
|
||||
#Même chose, mais si la requête provient de la DMZ
|
||||
ip saddr $dmznet oif $netif snat $firewall
|
||||
}
|
||||
}
|
25
bts_annee_1/tp07_firewall/files_firewall_vm/interfaces
Normal file
25
bts_annee_1/tp07_firewall/files_firewall_vm/interfaces
Normal file
@@ -0,0 +1,25 @@
|
||||
# This file describes the network interfaces available on your system
|
||||
# and how to activate them. For more information, see interfaces(5).
|
||||
|
||||
source /etc/network/interfaces.d/*
|
||||
|
||||
# The loopback network interface
|
||||
auto lo
|
||||
iface lo inet loopback
|
||||
|
||||
# The primary network interface
|
||||
allow-hotplug enp0s3
|
||||
iface enp0s3 inet static
|
||||
address 192.168.0.120
|
||||
gateway 192.168.0.1
|
||||
pre-up bash /root/scriptsnft/refresh_firewall.sh
|
||||
|
||||
# Second network interface : DMZ
|
||||
allow-hotplug enp0s8
|
||||
iface enp0s8 inet static
|
||||
address 172.16.0.254/24
|
||||
|
||||
# Third network interface : LAN
|
||||
allow-hotplug enp0s9
|
||||
iface enp0s9 inet static
|
||||
address 10.0.0.254/24
|
3
bts_annee_1/tp07_firewall/files_firewall_vm/proxy.conf
Normal file
3
bts_annee_1/tp07_firewall/files_firewall_vm/proxy.conf
Normal file
@@ -0,0 +1,3 @@
|
||||
Acquire::http::Proxy "http://10.121.38.1:8080/";
|
||||
Acquire::https::Proxy "http://10.121.38.1:8080/";
|
||||
|
@@ -0,0 +1,7 @@
|
||||
#!/bin/bash
|
||||
# active le routage entre les interfaces réseau du firewall
|
||||
echo "1" > /proc/sys/net/ipv4/ip_forward
|
||||
#vide les règles actuelles du pare-feu
|
||||
nft flush ruleset
|
||||
#charge les règles du pare-feu présentes dans le fichier
|
||||
nft -f /root/scriptsnft/current_ruleset.nft
|
4
bts_annee_1/tp07_firewall/files_firewall_vm/resolv.conf
Normal file
4
bts_annee_1/tp07_firewall/files_firewall_vm/resolv.conf
Normal file
@@ -0,0 +1,4 @@
|
||||
domain sio.lan
|
||||
search sio.lan
|
||||
nameserver 10.121.38.7
|
||||
nameserver 10.121.38.8
|
1
bts_annee_1/tp07_firewall/files_pclan_vm/README.md
Normal file
1
bts_annee_1/tp07_firewall/files_pclan_vm/README.md
Normal file
@@ -0,0 +1 @@
|
||||
Contient les fichiers essentiels de la machine pclan-ge.
|
14
bts_annee_1/tp07_firewall/files_pclan_vm/interfaces
Normal file
14
bts_annee_1/tp07_firewall/files_pclan_vm/interfaces
Normal file
@@ -0,0 +1,14 @@
|
||||
# This file describes the network interfaces available on your system
|
||||
# and how to activate them. For more information, see interfaces(5).
|
||||
|
||||
source /etc/network/interfaces.d/*
|
||||
|
||||
# The loopback network interface
|
||||
auto lo
|
||||
iface lo inet loopback
|
||||
|
||||
# The primary network interface
|
||||
allow-hotplug enp0s3
|
||||
iface enp0s3 inet static
|
||||
address 10.0.0.1/24
|
||||
gateway 10.0.0.254
|
4
bts_annee_1/tp07_firewall/files_pclan_vm/resolv.conf
Normal file
4
bts_annee_1/tp07_firewall/files_pclan_vm/resolv.conf
Normal file
@@ -0,0 +1,4 @@
|
||||
domain sio.lan
|
||||
search sio.lan
|
||||
nameserver 10.121.38.7
|
||||
nameserver 10.121.38.8
|
1
bts_annee_1/tp07_firewall/files_pcnet_vm/README.md
Normal file
1
bts_annee_1/tp07_firewall/files_pcnet_vm/README.md
Normal file
@@ -0,0 +1 @@
|
||||
Contient les fichiers essentiels de la machine pcnet-ge.
|
14
bts_annee_1/tp07_firewall/files_pcnet_vm/interfaces
Normal file
14
bts_annee_1/tp07_firewall/files_pcnet_vm/interfaces
Normal file
@@ -0,0 +1,14 @@
|
||||
# This file describes the network interfaces available on your system
|
||||
# and how to activate them. For more information, see interfaces(5).
|
||||
|
||||
source /etc/network/interfaces.d/*
|
||||
|
||||
# The loopback network interface
|
||||
auto lo
|
||||
iface lo inet loopback
|
||||
|
||||
# The primary network interface
|
||||
allow-hotplug enp0s3
|
||||
iface enp0s3 inet static
|
||||
address 192.168.0.121
|
||||
gateway 192.168.0.120
|
4
bts_annee_1/tp07_firewall/files_pcnet_vm/resolv.conf
Normal file
4
bts_annee_1/tp07_firewall/files_pcnet_vm/resolv.conf
Normal file
@@ -0,0 +1,4 @@
|
||||
domain sio.lan
|
||||
search sio.lan
|
||||
nameserver 10.121.38.7
|
||||
nameserver 10.121.38.8
|
1
bts_annee_1/tp07_firewall/files_srvweb_vm/README.md
Normal file
1
bts_annee_1/tp07_firewall/files_srvweb_vm/README.md
Normal file
@@ -0,0 +1 @@
|
||||
Contient les fichiers essentiels de la machine srvweb-ge.
|
14
bts_annee_1/tp07_firewall/files_srvweb_vm/interfaces
Normal file
14
bts_annee_1/tp07_firewall/files_srvweb_vm/interfaces
Normal file
@@ -0,0 +1,14 @@
|
||||
# This file describes the network interfaces available on your system
|
||||
# and how to activate them. For more information, see interfaces(5).
|
||||
|
||||
source /etc/network/interfaces.d/*
|
||||
|
||||
# The loopback network interface
|
||||
auto lo
|
||||
iface lo inet loopback
|
||||
|
||||
# The primary network interface
|
||||
allow-hotplug enp0s3
|
||||
iface enp0s3 inet static
|
||||
address 172.16.0.1/24
|
||||
gateway 172.16.0.254
|
4
bts_annee_1/tp07_firewall/files_srvweb_vm/resolv.conf
Normal file
4
bts_annee_1/tp07_firewall/files_srvweb_vm/resolv.conf
Normal file
@@ -0,0 +1,4 @@
|
||||
domain sio.lan
|
||||
search sio.lan
|
||||
nameserver 10.121.38.7
|
||||
nameserver 10.121.38.8
|
Reference in New Issue
Block a user