renommé : TP04/Scripts/.bash_history -> sio1/TP04/Scripts/.bash_history

renommé :         TP04/Scripts/.bashrc -> sio1/TP04/Scripts/.bashrc
	renommé :         TP04/Scripts/.lesshst -> sio1/TP04/Scripts/.lesshst
	renommé :         TP04/Scripts/.profile -> sio1/TP04/Scripts/.profile
	renommé :         TP04/Scripts/.ssh/id_rsa -> sio1/TP04/Scripts/.ssh/id_rsa
	renommé :         TP04/Scripts/.ssh/id_rsa.pub -> sio1/TP04/Scripts/.ssh/id_rsa.pub
	renommé :         TP04/Scripts/.ssh/known_hosts -> sio1/TP04/Scripts/.ssh/known_hosts
	renommé :         TP04/Scripts/.ssh/known_hosts.old -> sio1/TP04/Scripts/.ssh/known_hosts.old
	renommé :         TP04/Scripts/LeScript.sh -> sio1/TP04/Scripts/LeScript.sh
	renommé :         TP04/Scripts/Users.csv -> sio1/TP04/Scripts/Users.csv
	renommé :         TP04/Scripts/createLogins.sh -> sio1/TP04/Scripts/createLogins.sh
	renommé :         TP04/Scripts/createUsers.sh -> sio1/TP04/Scripts/createUsers.sh
	renommé :         TP04/Scripts/logins.csv -> sio1/TP04/Scripts/logins.csv
	renommé :         TP04/Scripts/testlogin.csv -> sio1/TP04/Scripts/testlogin.csv
	renommé :         siotp/sisr1/TP7/scriptsnft/current_ruleset.nft -> sio1/siotp/sisr1/TP7/scriptsnft/current_ruleset.nft
	renommé :         siotp/sisr1/TP7/scriptsnft/fw_part1.nft -> sio1/siotp/sisr1/TP7/scriptsnft/fw_part1.nft
	renommé :         siotp/sisr1/TP7/scriptsnft/fw_part2.nft -> sio1/siotp/sisr1/TP7/scriptsnft/fw_part2.nft
	renommé :         siotp/sisr1/TP7/scriptsnft/fw_part3.nft -> sio1/siotp/sisr1/TP7/scriptsnft/fw_part3.nft
	renommé :         siotp/sisr1/TP7/scriptsnft/fw_part4.nft -> sio1/siotp/sisr1/TP7/scriptsnft/fw_part4.nft
	renommé :         siotp/sisr1/TP7/scriptsnft/fw_part5.nft -> sio1/siotp/sisr1/TP7/scriptsnft/fw_part5.nft
	renommé :         siotp/sisr1/TP7/scriptsnft/fw_part6.nft -> sio1/siotp/sisr1/TP7/scriptsnft/fw_part6.nft
	renommé :         siotp/sisr1/TP7/scriptsnft/fw_part7.nft -> sio1/siotp/sisr1/TP7/scriptsnft/fw_part7.nft
	renommé :         siotp/sisr1/TP7/scriptsnft/old-current_ruleset.nft -> sio1/siotp/sisr1/TP7/scriptsnft/old-current_ruleset.nft
	renommé :         siotp/sisr1/TP7/scriptsnft/refresh_firewall.sh -> sio1/siotp/sisr1/TP7/scriptsnft/refresh_firewall.sh
	renommé :         siotp/sisr1/tp01-02/srv-dhcp/dhcpd.conf -> sio1/siotp/sisr1/tp01-02/srv-dhcp/dhcpd.conf
	renommé :         siotp/sisr1/tp01-02/srv-dhcp/hosts -> sio1/siotp/sisr1/tp01-02/srv-dhcp/hosts
	renommé :         siotp/sisr1/tp01-02/srv-dhcp/interfaces -> sio1/siotp/sisr1/tp01-02/srv-dhcp/interfaces
	renommé :         siotp/sisr1/tp01-02/srv-dhcp/isc-dhcp-server -> sio1/siotp/sisr1/tp01-02/srv-dhcp/isc-dhcp-server
	renommé :         siotp/sisr1/tp01-02/srv-dhcp/nat.sh -> sio1/siotp/sisr1/tp01-02/srv-dhcp/nat.sh
	renommé :         siotp/sisr1/tp01-02/srv-dns1/db.sio1lab.lan -> sio1/siotp/sisr1/tp01-02/srv-dns1/db.sio1lab.lan
	renommé :         siotp/sisr1/tp01-02/srv-dns1/db.sio1lab.lan.rev -> sio1/siotp/sisr1/tp01-02/srv-dns1/db.sio1lab.lan.rev
	renommé :         siotp/sisr1/tp01-02/srv-dns1/named.conf -> sio1/siotp/sisr1/tp01-02/srv-dns1/named.conf
	renommé :         siotp/sisr1/tp01-02/srv-dns1/named.conf.local -> sio1/siotp/sisr1/tp01-02/srv-dns1/named.conf.local
	renommé :         siotp/sisr1/tp01-02/srv-dns1/named.conf.options -> sio1/siotp/sisr1/tp01-02/srv-dns1/named.conf.options
	renommé :         siotp/sisr1/tp01-02/srv-dns2/db.sio1lab.lan -> sio1/siotp/sisr1/tp01-02/srv-dns2/db.sio1lab.lan
	renommé :         siotp/sisr1/tp01-02/srv-dns2/db.sio1lab.lan.rev -> sio1/siotp/sisr1/tp01-02/srv-dns2/db.sio1lab.lan.rev
	renommé :         siotp/sisr1/tp01-02/srv-dns2/named.conf.default-zones -> sio1/siotp/sisr1/tp01-02/srv-dns2/named.conf.default-zones
	renommé :         siotp/sisr1/tp01-02/srv-dns2/named.conf.local -> sio1/siotp/sisr1/tp01-02/srv-dns2/named.conf.local
	renommé :         siotp/sisr1/tp01-02/srv-dns2/named.conf.options -> sio1/siotp/sisr1/tp01-02/srv-dns2/named.conf.options
	renommé :         siotp/sisr1/tp03/srv-admin/interfaces -> sio1/siotp/sisr1/tp03/srv-admin/interfaces
	renommé :         siotp/sisr1/tp03/srv-admin/nat.sh -> sio1/siotp/sisr1/tp03/srv-admin/nat.sh
	renommé :         siotp/sisr1/tp03/srv-dns2/bind/db.monlabo.lan -> sio1/siotp/sisr1/tp03/srv-dns2/bind/db.monlabo.lan
	renommé :         siotp/sisr1/tp03/srv-dns2/bind/db.monlabo.lan.rev -> sio1/siotp/sisr1/tp03/srv-dns2/bind/db.monlabo.lan.rev
	renommé :         siotp/sisr1/tp03/srv-dns2/bind/named.conf.local -> sio1/siotp/sisr1/tp03/srv-dns2/bind/named.conf.local
	renommé :         siotp/sisr1/tp03/srv-dns2/bind/named.conf.options -> sio1/siotp/sisr1/tp03/srv-dns2/bind/named.conf.options
	renommé :         siotp/sisr1/tp03/srv-service/bind/db.monlabo.lan -> sio1/siotp/sisr1/tp03/srv-service/bind/db.monlabo.lan
	renommé :         siotp/sisr1/tp03/srv-service/bind/db.monlabo.lan.rev -> sio1/siotp/sisr1/tp03/srv-service/bind/db.monlabo.lan.rev
	renommé :         siotp/sisr1/tp03/srv-service/bind/named.conf.local -> sio1/siotp/sisr1/tp03/srv-service/bind/named.conf.local
	renommé :         siotp/sisr1/tp03/srv-service/bind/named.conf.options -> sio1/siotp/sisr1/tp03/srv-service/bind/named.conf.options
	renommé :         siotp/sisr1/tp03/srv-service/dhcp/dhcpd.conf -> sio1/siotp/sisr1/tp03/srv-service/dhcp/dhcpd.conf
	renommé :         siotp/sisr1/tp4/Users.csv -> sio1/siotp/sisr1/tp4/Users.csv
	renommé :         siotp/sisr1/tp4/createLogins.sh -> sio1/siotp/sisr1/tp4/createLogins.sh
	renommé :         siotp/sisr1/tp4/logins.csv -> sio1/siotp/sisr1/tp4/logins.csv
	renommé :         squid/conf.d/debian.conf -> sio1/squid/conf.d/debian.conf
	renommé :         squid/errorpage.css -> sio1/squid/errorpage.css
	renommé :         squid/passwords -> sio1/squid/passwords
	renommé :         squid/squid.conf -> sio1/squid/squid.conf
	renommé :         squid/squid.conf.old -> sio1/squid/squid.conf.old
	renommé :         squid/users -> sio1/squid/users
This commit is contained in:
Jarod Pauchet
2024-09-09 17:49:54 +02:00
parent ee2d9a9ef2
commit 3009bf1f9b
59 changed files with 0 additions and 0 deletions

View File

@@ -0,0 +1,215 @@
# Définition des interfaces avec un nom
define netif = enp0s3
define dmzif = enp0s8
define lanif = enp0s9
# Définition de l'IP du serveur web
define srv = 172.16.0.1
# Définition du réseau LAN
define lan-ntw = 10.0.0.0/24
# Définition de l'IP du proxy, du DNS, du port du proxy et du réseau DMZ pour ne pas à tout retaper
define proxy = 10.121.38.1
define dns = {10.121.38.7 , 10.121.38.8}
define proxyport = 8080
define dmznet = 172.16.0.1-172.16.0.254
# Définition des IPs des cartes de la machine firewall
define firewall = 192.168.0.120
define ipdmz = 172.16.0.254
define iplan = 10.0.0.254
table ip ipfilter{
chain prerouting {
type filter hook prerouting priority filter; policy drop;
#Permet le passage des réponses aux requêtes acceptées
ct state established, related accept
#Accepte les réponses ping
icmp type echo-reply accept
#Accepte les requêtes de ping si elles viennent du LAN, à destination de la DMZ
icmp type echo-request iif {$lanif} ip daddr $dmznet accept
#Même chose que plus haut, mais à destination de l'IP de la carte LAN du firewall
icmp type echo-request iif {$lanif} ip daddr {$iplan} accept
#Autorise les requêtes ayant pour port de destination les ports FTP
tcp dport 20 accept
tcp dport 21 accept
#Autorise les requêtes HTTP/HTTPS venant de la LAN
tcp dport {80, 443} ip saddr $lan-ntw accept
tcp sport {80, 443} ip saddr $lan-ntw accept
#Autorise le SSH
tcp dport 22 accept
#Autorise les requêtes DNS depuis la DMZ et le LAN
udp sport 53 iif {$dmzif, $lanif} accept
udp dport 53 accept
#Autorise les requêtes provenant du proxy avec ports HTTP/HTTPS
ip saddr $proxy tcp dport {80, 443} accept
#Autorise les requêtes qui vont vers le serveur DNS
ip daddr $dns accept
}
chain system_in {
type filter hook input priority filter; policy drop;
#Permet le passage des réponses aux requêtes acceptées
ct state established, related accept
#Accepte les réponses ping
icmp type echo-reply accept
#Accepte les requêtes de ping si elles viennent du LAN
icmp type echo-request iif {$lanif} accept
#Autorise les requêtes ayant pour port de destination les ports FTP
tcp dport 20 accept
tcp dport 21 accept
#Autorise les requêtes HTTP/HTTPS
tcp dport {80, 443} accept
#Autorise le SSH
tcp dport 22 accept
#Autorise les requêtes DNS
udp sport 53 accept
udp dport 53 accept
#Autorise les requêtes provenant du proxy avec ports HTTP/HTTPS
ip saddr $proxy tcp dport {80, 443} accept
}
chain routing {
type filter hook forward priority filter; policy drop;
#Permet le passage des réponses aux requêtes acceptées
ct state established, related accept
#Accepte les requêtes de ping si elles viennent du LAN, à destination de la DMZ
icmp type echo-request iif {$lanif} oif {$dmzif} accept
#Même chose que plus haut, mais à destination de l'IP de la carte LAN du firewall
icmp type echo-reply iif {$dmzif} oif {$lanif} accept
#Autorise les requêtes HTTP/HTTPS venant de la LAN
tcp dport {80, 443} ip saddr $lan-ntw accept
tcp sport {80, 443} ip saddr $lan-ntw accept
#Autorise le port forwarding pour la DMZ pour HTTP/HTTPS
tcp dport {80, 443} ip saddr $srv accept
#Autorise les requêtes DNS depuis la DMZ et le LAN
udp sport 53 iif {$lanif, $dmzif} accept
udp dport 53 accept
#Autorise les requêtes qui vont vers le serveur DNS
ip daddr $dns accept
}
chain system_out {
type filter hook output priority filter; policy drop;
#Autorise les requêtes qui vont vers le serveur DNS
ip daddr $dns accept
#Autorise les requêtes provenant du proxy, depuis le port 8080
ip daddr $proxy tcp dport $proxyport accept
#Accepte les requêtes de ping si elles viennent du LAN
icmp type echo-reply oif {$lanif} accept
#Accepte les requêtes ping
icmp type echo-request accept
#Autorise les requêtes ayant pour port de destination les ports FTP
tcp dport 20 accept
tcp sport 20 accept
tcp dport 21 accept
tcp sport 21 accept
#Autorise les requêtes provenant des ports HTTP/HTTPS
tcp dport {80, 443} accept
tcp sport {80, 443} accept
#Autorise le SSH
tcp sport 22 accept
#Autorise les requêtes DNS
udp sport 53 accept
udp dport 53 accept
}
chain postrouting {
type filter hook postrouting priority filter; policy drop;
#Permet le passage des réponses aux requêtes acceptées
ct state established, related accept
#Autorise les requêtes qui vont vers le serveur DNS
ip daddr $dns accept
#Autorise les requêtes allant vers le proxy avec le port 8080
ip daddr $proxy tcp dport $proxyport accept
#Autorise les requêtes ping venant des cartes LAN, DMZ et la carte en pont du firewall
icmp type echo-request ip saddr {$iplan, $ipdmz, $firewall} accept
#Autorise les réponses ping si elles viennent de la DMZ à destination du LAN
icmp type echo-reply iif {$dmzif} oif {$lanif} accept
#Autorise les requêtes ping venant de la LAN à destination de la DMZ
icmp type echo-request iif {$lanif} oif {$dmzif} accept
#Autorise les requêtes ping ayant le LAN pour origine, à destination de la carte LAN du firewall
icmp type echo-request ip saddr $iplan oif $lanif accept
#Autorise les requêtes FTP
tcp dport 20 accept
tcp sport 20 accept
tcp dport 21 accept
tcp sport 21 accept
#Autorise les requêtes ayant pour ports HTTP et HTTPS comme ports de destination et de source
tcp dport {80, 443} accept
tcp sport {80, 443} accept
#Autorise le SSH
tcp sport 22 accept
#Autorise les requêtes DNS
udp sport 53 accept
udp dport 53 accept
#Autorise les requêtes provenant du DNS
ip daddr $dns accept
}
chain pre_nat {
type nat hook prerouting priority filter; policy accept;
#Autorise les requêtes HTTP vers la carte LAN du firewall
tcp dport 80 ip daddr $firewall dnat $srv:80
#Même chose mais pour HTTPS
tcp dport 443 ip daddr $firewall dnat $srv:443
}
chain post_nat {
type nat hook postrouting priority filter; policy accept;
#Autorise la NAT à destination du firewall si la requête vient du LAN et part vers Internet
ip saddr $lan-ntw oif $netif snat $firewall
#Même chose, mais si la requête provient de la DMZ
ip saddr $dmznet oif $netif snat $firewall
}
}

View File

@@ -0,0 +1,18 @@
define netif = enp0s3
define dmzif = enp0s8
define lanif = enp0s9
table ip ipfilter {
chain routing {
type filter hook forward priority filter; policy accept;
icmp type echo-request iif { "$netif", "$dmzif" } drop
icmp type { echo-reply, echo-request } accept
drop
}
chain system_in {
type filter hook input priority filter; policy accept;
icmp type echo-request iif { "$netif", "$dmzif" } drop
}
}

View File

@@ -0,0 +1,34 @@
define netif = enp0s3
define dmzif = enp0s8
define lanif = enp0s9
table ip ipfilter {
chain prerouting {
type filter hook prerouting priority filter; policy drop;
tcp dport 22 accept
}
chain routing {
type filter hook forward priority filter; policy drop;
icmp type echo-request iif { $netif, $dmzif } drop
icmp type { echo-reply, echo-request } accept
}
chain system_in {
type filter hook input priority filter; policy drop;
icmp type echo-request iif { $netif, $dmzif } drop
tcp dport 22 accept
}
chain system_out {
type filter hook output priority filter; policy drop;
tcp sport 22 accept
}
chain postrouting {
type filter hook postrouting priority filter; policy drop;
tcp sport 22 accept
}
}

View File

@@ -0,0 +1,41 @@
define netif = enp0s3
define dmzif = enp0s8
define lanif = enp0s9
define netip = 192.168.0.140
define dmzip = 172.16.0.254
define lanip = 10.0.0.254
table ip ipfilter{
chain prerouting {
type filter hook prerouting priority filter; policy drop;
icmp type echo-request iif $lanif ip daddr 172.16.0.1-172.16.0.254 accept
icmp type echo-request iif $lanif ip daddr $lanip accept
icmp type echo-reply accept
tcp dport 22 accept
}
chain system_in {
type filter hook input priority filter; policy drop;
icmp type echo-request iif $lanif accept
icmp type echo-reply accept
tcp dport 22 accept
}
chain routing {
type filter hook forward priority filter; policy drop;
icmp type echo-request iif $lanif oif $dmzif accept
icmp type echo-reply iif $dmzif oif $lanif accept
}
chain system_out {
type filter hook output priority filter; policy drop;
icmp type echo-request accept
icmp type echo-reply oif $lanif accept
tcp sport 22 accept
}
chain postrouting {
type filter hook postrouting priority filter; policy drop;
icmp type echo-request ip saddr {$lanip , $dmzip , $netip } accept
icmp type echo-request iif $lanif oif $dmzif accept
icmp type echo-reply iif $dmzif oif $lanif accept
icmp type echo-reply ip saddr $lanip oif $lanif accept
tcp sport 22 accept
}
}

View File

@@ -0,0 +1,68 @@
define netif = enp0s3
define dmzif = enp0s8
define lanif = enp0s9
define firewall = 192.168.0.140
define ipdmz = 172.16.0.254
define iplan = 10.0.0.254
table ip ipfilter{
chain prerouting {
type filter hook prerouting priority filter; policy drop;
icmp type echo-reply accept
ct state established, related accept
icmp type echo-request iif {$lanif} ip daddr 172.16.0.1-172.16.0.254 accept
icmp type echo-request iif {$lanif} ip daddr {$iplan} accept
tcp dport 20 accept
tcp dport 21 accept
tcp dport {80, 443} accept
tcp dport 22 accept
ip saddr 10.121.38.1 tcp dport {80, 443} accept
}
chain system_in {
type filter hook input priority filter; policy drop;
icmp type echo-reply accept
icmp type echo-request iif {$lanif} accept
ct state established, related accept
tcp dport 20 accept
tcp dport 21 accept
tcp dport {80, 443} accept
tcp dport 22 accept
ip saddr 10.121.38.1 tcp dport {80, 443} accept
}
chain routing {
type filter hook forward priority filter; policy drop;
icmp type echo-request iif {$lanif} oif {$dmzif} accept
icmp type echo-reply iif {$dmzif} oif {$lanif} accept
}
chain system_out {
type filter hook output priority filter; policy drop;
ip daddr 10.121.38.7-10.121.38.8 accept
ip daddr 10.121.38.1 tcp dport 8080 accept
icmp type echo-reply oif {$lanif} accept
icmp type echo-request accept
tcp dport 20 accept
tcp sport 20 accept
tcp dport 21 accept
tcp sport 21 accept
tcp dport {80, 443} accept
tcp sport {80, 443} accept
tcp sport 22 accept
}
chain postrouting {
type filter hook postrouting priority filter; policy drop;
ip daddr 10.121.38.7-10.121.38.8 accept
ip daddr 10.121.38.1 tcp dport 8080 accept
icmp type echo-request ip saddr {$iplan, $ipdmz, $firewall} accept
icmp type echo-reply iif {$dmzif} oif {$lanif} accept
icmp type echo-request iif {$lanif} oif {$dmzif} accept
icmp type echo-request ip saddr $iplan oif $lanif accept
tcp dport 20 accept
tcp sport 20 accept
tcp dport 21 accept
tcp sport 21 accept
tcp dport {80, 443} accept
tcp sport {80, 443} accept
tcp sport 22 accept
}
}

View File

@@ -0,0 +1,94 @@
define netif = enp0s3
define dmzif = enp0s8
define lanif = enp0s9
define firewall = 192.168.0.140
define ipdmz = 172.16.0.254
define iplan = 10.0.0.254
define lan-ntw = 10.0.0.0/24
define dns-server = {10.121.38.7 , 10.121.38.8}
define proxy-lyc = 10.121.38.1
define proxy-port = 8080
table ip ipfilter{
chain prerouting {
type filter hook prerouting priority filter; policy drop;
icmp type echo-reply accept
ct state established, related accept
icmp type echo-request iif {$lanif} ip daddr 172.16.0.1-172.16.0.254 accept
icmp type echo-request iif {$lanif} ip daddr {$iplan} accept
tcp dport 20 accept
tcp dport 21 accept
tcp dport {80, 443} accept
tcp dport 22 accept
ip saddr $proxy-lyc tcp dport {80, 443} accept
ct state {established,related} accept
tcp sport {80,443} ip saddr $lan-ntw accept
tcp dport {80,443} ip saddr $lan-ntw accept
}
chain system_in {
type filter hook input priority filter; policy drop;
icmp type echo-reply accept
icmp type echo-request iif {$lanif} accept
ct state established, related accept
tcp dport 20 accept
tcp dport 21 accept
tcp dport {80, 443} accept
tcp dport 22 accept
ip saddr $proxy-lyc tcp dport {80, 443} accept
}
chain routing {
type filter hook forward priority filter; policy drop;
icmp type echo-request iif {$lanif} oif {$dmzif} accept
icmp type echo-reply iif {$dmzif} oif {$lanif} accept
ct state {established,related} accept
tcp sport {80,443} ip saddr $lan-ntw accept
tcp dport {80,443} ip saddr $lan-ntw accept
}
chain system_out {
type filter hook output priority filter; policy drop;
ip daddr $dns-server accept
ip daddr $proxy-lyc tcp dport $proxy-port accept
icmp type echo-reply oif {$lanif} accept
icmp type echo-request accept
tcp dport 20 accept
tcp sport 20 accept
tcp dport 21 accept
tcp sport 21 accept
tcp dport {80, 443} accept
tcp sport {80, 443} accept
tcp sport 22 accept
}
chain postrouting {
type filter hook postrouting priority filter; policy drop;
ip daddr $dns-server accept
ip daddr $proxy-lyc tcp dport $proxy-port accept
icmp type echo-request ip saddr {$iplan, $ipdmz, $firewall} accept
icmp type echo-reply iif {$dmzif} oif {$lanif} accept
icmp type echo-request iif {$lanif} oif {$dmzif} accept
icmp type echo-request ip saddr $iplan oif $lanif accept
tcp dport 20 accept
tcp sport 20 accept
tcp dport 21 accept
tcp sport 21 accept
tcp dport {80, 443} accept
tcp sport {80, 443} accept
tcp sport 22 accept
ct state {established,related} accept
}
}
table ip nat {
chain prerouting {
type nat hook prerouting priority filter; policy accept;
}
chain postrouting {
type nat hook postrouting priority filter; policy accept;
ip saddr $lan-ntw oif $netif snat $firewall
}
}

View File

@@ -0,0 +1,200 @@
# Définition des interfaces avec un nom
define netif = enp0s3
define dmzif = enp0s8
define lanif = enp0s9
# Définition du réseau LAN
define lan-ntw = 10.0.0.0/24
# Définition de l'IP du proxy, du DNS, du port du proxy et du réseau DMZ pour ne pas à tout retaper
define proxy = 10.121.38.1
define dns = {10.121.38.7 , 10.121.38.8}
define proxyport = 8080
define dmznet = 172.16.0.1-172.16.0.254
# Définition des IPs des cartes de la machine firewall
define firewall = 192.168.0.140
define ipdmz = 172.16.0.254
define iplan = 10.0.0.254
table ip ipfilter{
chain prerouting {
type filter hook prerouting priority filter; policy drop;
#Permet le passage des réponses aux requêtes acceptées
ct state established, related accept
#Accepte les réponses ping
icmp type echo-reply accept
#Accepte les requêtes de ping si elles viennent du LAN, à destination de la DMZ
icmp type echo-request iif {$lanif} ip daddr $dmznet accept
#Même chose que plus haut, mais à destination de l'IP de la carte LAN du firewall
icmp type echo-request iif {$lanif} ip daddr {$iplan} accept
#Autorise les requêtes ayant pour port de destination les ports FTP
tcp dport 20 accept
tcp dport 21 accept
#Autorise les requêtes HTTP/HTTPS venant de la LAN
tcp dport {80, 443} ip saddr $lan-ntw accept
tcp sport {80, 443} ip saddr $lan-ntw accept
#Autorise le SSH
tcp dport 22 accept
#Autorise les requêtes DNS depuis la DMZ et le LAN
udp sport 53 iif {$dmzif, $lanif} accept
udp dport 53 accept
#Autorise les requêtes provenant du proxy avec ports HTTP/HTTPS
ip saddr $proxy tcp dport {80, 443} accept
#Autorise les requêtes qui vont vers le serveur DNS
ip daddr $dns accept
}
chain system_in {
type filter hook input priority filter; policy drop;
#Permet le passage des réponses aux requêtes acceptées
ct state established, related accept
#Accepte les réponses ping
icmp type echo-reply accept
#Accepte les requêtes de ping si elles viennent du LAN
icmp type echo-request iif {$lanif} accept
#Autorise les requêtes ayant pour port de destination les ports FTP
tcp dport 20 accept
tcp dport 21 accept
#Autorise les requêtes HTTP/HTTPS
tcp dport {80, 443} accept
#Autorise le SSH
tcp dport 22 accept
#Autorise les requêtes DNS
udp sport 53 accept
udp dport 53 accept
#Autorise les requêtes provenant du proxy avec ports HTTP/HTTPS
ip saddr $proxy tcp dport {80, 443} accept
}
chain routing {
type filter hook forward priority filter; policy drop;
#Permet le passage des réponses aux requêtes acceptées
ct state established, related accept
#Accepte les requêtes de ping si elles viennent du LAN, à destination de la DMZ
icmp type echo-request iif {$lanif} oif {$dmzif} accept
#Même chose que plus haut, mais à destination de l'IP de la carte LAN du firewall
icmp type echo-reply iif {$dmzif} oif {$lanif} accept
#Autorise les requêtes HTTP/HTTPS venant de la LAN
tcp dport {80, 443} ip saddr $lan-ntw accept
tcp sport {80, 443} ip saddr $lan-ntw accept
#Autorise les requêtes DNS depuis la DMZ et le LAN
udp sport 53 iif {$lanif, $dmzif} accept
udp dport 53 accept
#Autorise les requêtes qui vont vers le serveur DNS
ip daddr $dns accept
}
chain system_out {
type filter hook output priority filter; policy drop;
#Autorise les requêtes qui vont vers le serveur DNS
ip daddr $dns accept
#Autorise les requêtes provenant du proxy, depuis le port 8080
ip daddr $proxy tcp dport $proxyport accept
#Accepte les requêtes de ping si elles viennent du LAN
icmp type echo-reply oif {$lanif} accept
#Accepte les requêtes ping
icmp type echo-request accept
#Autorise les requêtes ayant pour port de destination les ports FTP
tcp dport 20 accept
tcp sport 20 accept
tcp dport 21 accept
tcp sport 21 accept
#Autorise les requêtes provenant des ports HTTP/HTTPS
tcp dport {80, 443} accept
tcp sport {80, 443} accept
#Autorise le SSH
tcp sport 22 accept
#Autorise les requêtes DNS
udp sport 53 accept
udp dport 53 accept
}
chain postrouting {
type filter hook postrouting priority filter; policy drop;
#Permet le passage des réponses aux requêtes acceptées
ct state established, related accept
#Autorise les requêtes qui vont vers le serveur DNS
ip daddr $dns accept
#Autorise les requêtes allant vers le proxy avec le port 8080
ip daddr $proxy tcp dport $proxyport accept
#Autorise les requêtes ping venant des cartes LAN, DMZ et la carte en pont du firewall
icmp type echo-request ip saddr {$iplan, $ipdmz, $firewall} accept
#Autorise les réponses ping si elles viennent de la DMZ à destination du LAN
icmp type echo-reply iif {$dmzif} oif {$lanif} accept
#Autorise les requêtes ping venant de la LAN à destination de la DMZ
icmp type echo-request iif {$lanif} oif {$dmzif} accept
#Autorise les requêtes ping ayant le LAN pour origine, à destination de la carte LAN du firewall
icmp type echo-request ip saddr $iplan oif $lanif accept
#Autorise les requêtes FTP
tcp dport 20 accept
tcp sport 20 accept
tcp dport 21 accept
tcp sport 21 accept
#Autorise les requêtes ayant pour ports HTTP et HTTPS comme ports de destination et de source
tcp dport {80, 443} accept
tcp sport {80, 443} accept
#Autorise le SSH
tcp sport 22 accept
#Autorise les requêtes DNS
udp sport 53 accept
udp dport 53 accept
#Autorise les requêtes provenant du DNS
ip daddr $dns accept
}
chain pre_nat {
type nat hook prerouting priority filter; policy accept;
}
chain post_nat {
type nat hook postrouting priority filter; policy accept;
ip saddr $lan-ntw oif $netif snat $firewall
ip saddr $dmznet oif $netif snat $firewall
}
}

View File

@@ -0,0 +1,215 @@
# Définition des interfaces avec un nom
define netif = enp0s3
define dmzif = enp0s8
define lanif = enp0s9
# Définition de l'IP du serveur web
define srv = 172.16.0.1
# Définition du réseau LAN
define lan-ntw = 10.0.0.0/24
# Définition de l'IP du proxy, du DNS, du port du proxy et du réseau DMZ pour ne pas à tout retaper
define proxy = 10.121.38.1
define dns = {10.121.38.7 , 10.121.38.8}
define proxyport = 8080
define dmznet = 172.16.0.1-172.16.0.254
# Définition des IPs des cartes de la machine firewall
define firewall = 192.168.0.140
define ipdmz = 172.16.0.254
define iplan = 10.0.0.254
table ip ipfilter{
chain prerouting {
type filter hook prerouting priority filter; policy drop;
#Permet le passage des réponses aux requêtes acceptées
ct state established, related accept
#Accepte les réponses ping
icmp type echo-reply accept
#Accepte les requêtes de ping si elles viennent du LAN, à destination de la DMZ
icmp type echo-request iif {$lanif} ip daddr $dmznet accept
#Même chose que plus haut, mais à destination de l'IP de la carte LAN du firewall
icmp type echo-request iif {$lanif} ip daddr {$iplan} accept
#Autorise les requêtes ayant pour port de destination les ports FTP
tcp dport 20 accept
tcp dport 21 accept
#Autorise les requêtes HTTP/HTTPS venant de la LAN
tcp dport {80, 443} ip saddr $lan-ntw accept
tcp sport {80, 443} ip saddr $lan-ntw accept
#Autorise le SSH
tcp dport 22 accept
#Autorise les requêtes DNS depuis la DMZ et le LAN
udp sport 53 iif {$dmzif, $lanif} accept
udp dport 53 accept
#Autorise les requêtes provenant du proxy avec ports HTTP/HTTPS
ip saddr $proxy tcp dport {80, 443} accept
#Autorise les requêtes qui vont vers le serveur DNS
ip daddr $dns accept
}
chain system_in {
type filter hook input priority filter; policy drop;
#Permet le passage des réponses aux requêtes acceptées
ct state established, related accept
#Accepte les réponses ping
icmp type echo-reply accept
#Accepte les requêtes de ping si elles viennent du LAN
icmp type echo-request iif {$lanif} accept
#Autorise les requêtes ayant pour port de destination les ports FTP
tcp dport 20 accept
tcp dport 21 accept
#Autorise les requêtes HTTP/HTTPS
tcp dport {80, 443} accept
#Autorise le SSH
tcp dport 22 accept
#Autorise les requêtes DNS
udp sport 53 accept
udp dport 53 accept
#Autorise les requêtes provenant du proxy avec ports HTTP/HTTPS
ip saddr $proxy tcp dport {80, 443} accept
}
chain routing {
type filter hook forward priority filter; policy drop;
#Permet le passage des réponses aux requêtes acceptées
ct state established, related accept
#Accepte les requêtes de ping si elles viennent du LAN, à destination de la DMZ
icmp type echo-request iif {$lanif} oif {$dmzif} accept
#Même chose que plus haut, mais à destination de l'IP de la carte LAN du firewall
icmp type echo-reply iif {$dmzif} oif {$lanif} accept
#Autorise les requêtes HTTP/HTTPS venant de la LAN
tcp dport {80, 443} ip saddr $lan-ntw accept
tcp sport {80, 443} ip saddr $lan-ntw accept
#Autorise le port forwarding pour la DMZ pour HTTP/HTTPS
tcp dport {80, 443} ip saddr $srv accept
#Autorise les requêtes DNS depuis la DMZ et le LAN
udp sport 53 iif {$lanif, $dmzif} accept
udp dport 53 accept
#Autorise les requêtes qui vont vers le serveur DNS
ip daddr $dns accept
}
chain system_out {
type filter hook output priority filter; policy drop;
#Autorise les requêtes qui vont vers le serveur DNS
ip daddr $dns accept
#Autorise les requêtes provenant du proxy, depuis le port 8080
ip daddr $proxy tcp dport $proxyport accept
#Accepte les requêtes de ping si elles viennent du LAN
icmp type echo-reply oif {$lanif} accept
#Accepte les requêtes ping
icmp type echo-request accept
#Autorise les requêtes ayant pour port de destination les ports FTP
tcp dport 20 accept
tcp sport 20 accept
tcp dport 21 accept
tcp sport 21 accept
#Autorise les requêtes provenant des ports HTTP/HTTPS
tcp dport {80, 443} accept
tcp sport {80, 443} accept
#Autorise le SSH
tcp sport 22 accept
#Autorise les requêtes DNS
udp sport 53 accept
udp dport 53 accept
}
chain postrouting {
type filter hook postrouting priority filter; policy drop;
#Permet le passage des réponses aux requêtes acceptées
ct state established, related accept
#Autorise les requêtes qui vont vers le serveur DNS
ip daddr $dns accept
#Autorise les requêtes allant vers le proxy avec le port 8080
ip daddr $proxy tcp dport $proxyport accept
#Autorise les requêtes ping venant des cartes LAN, DMZ et la carte en pont du firewall
icmp type echo-request ip saddr {$iplan, $ipdmz, $firewall} accept
#Autorise les réponses ping si elles viennent de la DMZ à destination du LAN
icmp type echo-reply iif {$dmzif} oif {$lanif} accept
#Autorise les requêtes ping venant de la LAN à destination de la DMZ
icmp type echo-request iif {$lanif} oif {$dmzif} accept
#Autorise les requêtes ping ayant le LAN pour origine, à destination de la carte LAN du firewall
icmp type echo-request ip saddr $iplan oif $lanif accept
#Autorise les requêtes FTP
tcp dport 20 accept
tcp sport 20 accept
tcp dport 21 accept
tcp sport 21 accept
#Autorise les requêtes ayant pour ports HTTP et HTTPS comme ports de destination et de source
tcp dport {80, 443} accept
tcp sport {80, 443} accept
#Autorise le SSH
tcp sport 22 accept
#Autorise les requêtes DNS
udp sport 53 accept
udp dport 53 accept
#Autorise les requêtes provenant du DNS
ip daddr $dns accept
}
chain pre_nat {
type nat hook prerouting priority filter; policy accept;
#Autorise les requêtes HTTP vers la carte LAN du firewall
tcp dport 80 ip daddr $firewall dnat $srv:80
#Même chose mais pour HTTPS
tcp dport 443 ip daddr $firewall dnat $srv:443
}
chain post_nat {
type nat hook postrouting priority filter; policy accept;
#Autorise la NAT à destination du firewall si la requête vient du LAN et part vers Internet
ip saddr $lan-ntw oif $netif snat $firewall
#Même chose, mais si la requête provient de la DMZ
ip saddr $dmznet oif $netif snat $firewall
}
}

View File

@@ -0,0 +1,106 @@
define netif = enp0s3
define dmzif = enp0s8
define lanif = enp0s9
define firewall = 192.168.0.140
define ipdmz = 172.16.0.254
define iplan = 10.0.0.254
define ipsrvweb = 172.16.0.1
define dmznet = 172.16.0.1-172.16.0.254
define lan-ntw = 10.0.0.0/24
define dns-server = {10.121.38.7 , 10.121.38.8}
define proxy-lyc = 10.121.38.1
define proxy-port = 8080
table ip ipfilter{
chain prerouting {
type filter hook prerouting priority filter; policy drop;
icmp type echo-reply accept
ct state established, related accept
icmp type echo-request iif {$lanif} ip daddr 172.16.0.1-172.16.0.254 accept
icmp type echo-request iif {$lanif} ip daddr {$iplan} accept
tcp dport 20 accept
tcp dport 21 accept
tcp dport {80, 443} accept
tcp dport 22 accept
ip saddr $proxy-lyc tcp dport {80, 443} accept
ct state {established,related} accept
tcp sport {80,443} ip saddr $lan-ntw accept
tcp dport {80,443} ip saddr $lan-ntw accept
udp dport 53 accept
}
chain system_in {
type filter hook input priority filter; policy drop;
icmp type echo-reply accept
icmp type echo-request iif {$lanif} accept
ct state established, related accept
tcp dport 20 accept
tcp dport 21 accept
tcp dport {80, 443} accept
tcp dport 22 accept
ip saddr $proxy-lyc tcp dport {80, 443} accept
}
chain routing {
type filter hook forward priority filter; policy drop;
icmp type echo-request iif {$lanif} oif {$dmzif} accept
icmp type echo-reply iif {$dmzif} oif {$lanif} accept
ct state {established,related} accept
tcp sport {80,443} ip saddr $lan-ntw accept
tcp dport {80,443} ip saddr $lan-ntw accept
udp dport 53 iif {$lanif, $dmzif} accept
# http et https vers srvweb
tcp dport {80, 443} ip daddr $ipsrvweb accept
}
chain system_out {
type filter hook output priority filter; policy drop;
ip daddr $dns-server accept
ip daddr $proxy-lyc tcp dport $proxy-port accept
icmp type echo-reply oif {$lanif} accept
icmp type echo-request accept
tcp dport 20 accept
tcp sport 20 accept
tcp dport 21 accept
tcp sport 21 accept
tcp dport {80, 443} accept
tcp sport {80, 443} accept
tcp sport 22 accept
udp dport 53 accept
}
chain postrouting {
type filter hook postrouting priority filter; policy drop;
ip daddr $dns-server accept
ip daddr $proxy-lyc tcp dport $proxy-port accept
icmp type echo-request ip saddr {$iplan, $ipdmz, $firewall} accept
icmp type echo-reply iif {$dmzif} oif {$lanif} accept
icmp type echo-request iif {$lanif} oif {$dmzif} accept
icmp type echo-request ip saddr $iplan oif $lanif accept
tcp dport 20 accept
tcp sport 20 accept
tcp dport 21 accept
tcp sport 21 accept
tcp dport {80, 443} accept
tcp sport {80, 443} accept
tcp sport 22 accept
ct state {established,related} accept
udp dport 53 accept
}
}
table ip nat {
chain prerouting {
type nat hook prerouting priority filter; policy accept;
# http et https du firewall vers srvweb
tcp dport 80 ip daddr $firewall dnat $ipsrvweb:80
tcp dport 443 ip daddr $firewall dnat $ipsrvweb:443
}
chain postrouting {
type nat hook postrouting priority filter; policy accept;
ip saddr $lan-ntw oif $netif snat $firewall
ip saddr $dmznet oif $netif snat $firewall
}
}

View File

@@ -0,0 +1,7 @@
#!/bin/bash
# active le routage entre les interfaces réseau du firewall
echo "1" > /proc/sys/net/ipv4/ip_forward
#vide les règles actuelles du pare-feu
nft flush ruleset
#charge les règles du pare-feu présentes dans le fichier
nft -f /root/scriptsnft/current_ruleset.nft

View File

@@ -0,0 +1,112 @@
# dhcpd.conf
#
# Sample configuration file for ISC dhcpd
#
# option definitions common to all supported networks...
#option domain-name "example.org";
#option domain-name-servers ns1.example.org, ns2.example.org;
default-lease-time 604800;
max-lease-time 604800;
# The ddns-updates-style parameter controls whether or not the server will
# attempt to do a DNS update when a lease is confirmed. We default to the
# behavior of the version 2 packages ('none', since DHCP v2 didn't
# have support for DDNS.)
ddns-update-style none;
# If this DHCP server is the official DHCP server for the local
# network, the authoritative directive should be uncommented.
#authoritative;
# Use this to send dhcp log messages to a different log file (you also
# have to hack syslog.conf to complete the redirection).
#log-facility local7;
# No service will be given on this subnet, but declaring it helps the
# DHCP server to understand the network topology.
subnet 192.168.2.0 netmask 255.255.255.0 {
range 192.168.2.140 192.168.2.169;
}
host xp-master {
hardware ethernet 08:00:27:77:70:0D;
fixed-address 192.168.2.222;
}
# This is a very basic subnet declaration.
#subnet 10.254.239.0 netmask 255.255.255.224 {
# range 10.254.239.10 10.254.239.20;
# option routers rtr-239-0-1.example.org, rtr-239-0-2.example.org;
#}
# This declaration allows BOOTP clients to get dynamic addresses,
# which we don't really recommend.
#subnet 10.254.239.32 netmask 255.255.255.224 {
# range dynamic-bootp 10.254.239.40 10.254.239.60;
# option broadcast-address 10.254.239.31;
# option routers rtr-239-32-1.example.org;
#}
# A slightly different configuration for an internal subnet.
#subnet 10.5.5.0 netmask 255.255.255.224 {
# range 10.5.5.26 10.5.5.30;
option domain-name-servers 192.168.0.140, 192.168.0.142;
# option domain-name "internal.example.org";
option routers 192.168.2.1;
# option broadcast-address 10.5.5.31;
# default-lease-time 600;
# max-lease-time 7200;
#}
# Hosts which require special configuration options can be listed in
# host statements. If no address is specified, the address will be
# allocated dynamically (if possible), but the host-specific information
# will still come from the host declaration.
#host passacaglia {
# hardware ethernet 0:0:c0:5d:bd:95;
# filename "vmunix.passacaglia";
# server-name "toccata.example.com";
#}
# Fixed IP addresses can also be specified for hosts. These addresses
# should not also be listed as being available for dynamic assignment.
# Hosts for which fixed IP addresses have been specified can boot using
# BOOTP or DHCP. Hosts for which no fixed address is specified can only
# be booted with DHCP, unless there is an address range on the subnet
# to which a BOOTP client is connected which has the dynamic-bootp flag
# set.
#host fantasia {
# hardware ethernet 08:00:07:26:c0:a5;
# fixed-address fantasia.example.com;
#}
# You can declare a class of clients and then do address allocation
# based on that. The example below shows a case where all clients
# in a certain class get addresses on the 10.17.224/24 subnet, and all
# other clients get addresses on the 10.0.29/24 subnet.
#class "foo" {
# match if substring (option vendor-class-identifier, 0, 4) = "SUNW";
#}
#shared-network 224-29 {
# subnet 10.17.224.0 netmask 255.255.255.0 {
# option routers rtr-224.example.org;
# }
# subnet 10.0.29.0 netmask 255.255.255.0 {
# option routers rtr-29.example.org;
# }
# pool {
# allow members of "foo";
# range 10.17.224.10 10.17.224.250;
# }
# pool {
# deny members of "foo";
# range 10.0.29.10 10.0.29.230;
# }
#}

View File

@@ -0,0 +1,8 @@
127.0.0.1 localhost
127.0.1.1 bookworm-jp.sio.lan bookworm-jp
192.168.0.35 bookworm-ge.sio.lan bookworm-ge
192.168.0.40 bookworm-jb.sio.lan bookworm-jb
# The following lines are desirable for IPv6 capable hosts
::1 localhost ip6-localhost ip6-loopback
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters

View File

@@ -0,0 +1,24 @@
# This file describes the network interfaces available on your system
# and how to activate them. For more information, see interfaces(5).
source /etc/network/interfaces.d/*
# The loopback network interface
auto lo
iface lo inet loopback
# Interface fixe
auto enp0s3
iface enp0s3 inet static
address 192.168.0.141/24
gateway 192.168.0.1
# The primary network interface
#allow-hotplug enp0s3
#iface enp0s3 inet dhcp
# Interface fixe
auto enp0s8
iface enp0s8 inet static
address 192.168.2.1/24

View File

@@ -0,0 +1,18 @@
# Defaults for isc-dhcp-server (sourced by /etc/init.d/isc-dhcp-server)
# Path to dhcpd's config file (default: /etc/dhcp/dhcpd.conf).
DHCPDv4_CONF=/etc/dhcp/dhcpd.conf
#DHCPDv6_CONF=/etc/dhcp/dhcpd6.conf
# Path to dhcpd's PID file (default: /var/run/dhcpd.pid).
DHCPDv4_PID=/var/run/dhcpd.pid
#DHCPDv6_PID=/var/run/dhcpd6.pid
# Additional options to start dhcpd with.
# Don't use options -cf or -pf here; use DHCPD_CONF/ DHCPD_PID instead
#OPTIONS=""
# On what interfaces should the DHCP server (dhcpd) serve DHCP requests?
# Separate multiple interfaces with spaces, e.g. "eth0 eth1".
INTERFACESv4="enp0s8"
INTERFACESv6=""

View File

@@ -0,0 +1,6 @@
#!/bin/bash
sysctl net.ipv4.ip_forward=1
nft add table basic_nat_table
nft add chain basic_nat_table prerouting {type nat hook prerouting priority 0\; }
nft add chain basic_nat_table postrouting {type nat hook postrouting priority 0\; }
nft add rule basic_nat_table postrouting masquerade

View File

@@ -0,0 +1,28 @@
;
; BIND data file for local loopback interface
;
$TTL 604800
@ IN SOA dns1.sio1lab.lan. root.sio1lab.lan. (
2 ; Serial
604800 ; Refresh
86400 ; Retry
2419200 ; Expire
604800 ) ; Negative Cache TTL
;
@ IN NS deb-dns-jp.sio1lab.lan.
IN NS deb-dns2-jp.sio1lab.lan.
IN A 192.168.0.140
IN A 192.168.0.141
deb-dns-jp IN A 192.168.0.140
deb-dhcp-jp IN A 192.168.0.141
deb-dns2-jp IN A 192.168.0.142
deb-dns1-ge IN A 192.168.0.121
deb-dns2-ge IN A 192.168.0.122
deb-dhcp-ge IN A 192.168.0.120
dhcp IN CNAME deb-dhcp-jp
dns1 IN CNAME deb-dns-jp
dns2 IN CNAME deb-dns2-jp
dhcp2ge IN CNAME deb-dhcp-ge
dns3ge IN CNAME deb-dns1-ge
dns3ge IN CNAME deb-dns2-ge

View File

@@ -0,0 +1,30 @@
;
; BIND data file for local loopback interface
;
$TTL 604800
@ IN SOA dns1.sio1lab.lan. root.sio1lab.lan. (
2 ; Serial
604800 ; Refresh
86400 ; Retry
2419200 ; Expire
604800 ) ; Negative Cache TTL
;
@ IN NS deb-dns-jp.sio1lab.lan.
IN NS deb-dns2-jp.sio1lab.lan.
deb-dns-jp IN A 192.168.0.140
deb-dhcp-jp IN A 192.168.0.141
deb-dns2-jp IN A 192.168.0.142
deb-dhcp-ge IN A 192.168.0.120
deb-dns1-ge IN A 192.168.0.121
deb-dns2-ge IN A 192.168.0.122
dhcp IN CNAME deb-dhcp-jp
dns1 IN CNAME deb-dns-jp
dns2 IN CNAME deb-dns2-jp
dhcp2ge IN CNAME deb-dhcp-ge
dns3ge IN CNAME deb-dns1-ge
dns4ge IN CNAME deb-dns2-ge
140 IN PTR deb-dns-jp.sio1lab.lan
141 IN PTR deb-dhcp-jp.sio1lab.lan

View File

@@ -0,0 +1,11 @@
// This is the primary configuration file for the BIND DNS server named.
//
// Please read /usr/share/doc/bind9/README.Debian for information on the
// structure of BIND configuration files in Debian, *BEFORE* you customize
// this configuration file.
//
// If you are just adding zones, please do that in /etc/bind/named.conf.local
include "/etc/bind/named.conf.options";
include "/etc/bind/named.conf.local";
include "/etc/bind/named.conf.default-zones";

View File

@@ -0,0 +1,20 @@
//
// Do any local configuration here
//
// Consider adding the 1918 zones here, if they are not used in your
// organization
//include "/etc/bind/zones.rfc1918";
// zone directe
zone "sio1lab.lan" {
type master;
file "/etc/bind/db.sio1lab.lan";
};
// zone inverse
zone "0.168.192.in-addr.arpa" {
type master;
notify no;
file "/etc/bind/db.sio1lab.lan.rev";
};

View File

@@ -0,0 +1,25 @@
options {
directory "/var/cache/bind";
// If there is a firewall between you and nameservers you want
// to talk to, you may need to fix the firewall to allow multiple
// ports to talk. See http://www.kb.cert.org/vuls/id/800113
// If your ISP provided one or more IP addresses for stable
// nameservers, you probably want to use them as forwarders.
// Uncomment the following block, and insert the addresses replacing
// the all-0's placeholder.
forwarders {
10.121.38.7;
10.121.38.8;
};
//========================================================================
// If BIND logs error messages about the root key being expired,
// you will need to update your keys. See https://www.isc.org/bind-keys
//========================================================================
dnssec-validation auto;
listen-on-v6 { any; };
};

View File

@@ -0,0 +1,20 @@
$ORIGIN .
$TTL 604800 ; 1 week
sio1lab.lan IN SOA dns1.sio1lab.lan. root.sio1lab.lan. (
2 ; serial
604800 ; refresh (1 week)
86400 ; retry (1 day)
2419200 ; expire (4 weeks)
604800 ; minimum (1 week)
)
NS deb-dns-jp.sio1lab.lan.
NS deb-dns2-jp.sio1lab.lan.
A 192.168.0.140
A 192.168.0.141
$ORIGIN sio1lab.lan.
deb-dhcp-jp A 192.168.0.141
deb-dns-jp A 192.168.0.140
deb-dns2-jp A 192.168.0.142
dhcp CNAME deb-dhcp-jp
dns1 CNAME deb-dns-jp
dns2 CNAME deb-dns2-jp

View File

@@ -0,0 +1,20 @@
$ORIGIN .
$TTL 604800 ; 1 week
0.168.192.in-addr.arpa IN SOA dns1.sio1lab.lan. root.sio1lab.lan. (
2 ; serial
604800 ; refresh (1 week)
86400 ; retry (1 day)
2419200 ; expire (4 weeks)
604800 ; minimum (1 week)
)
NS deb-dns-jp.sio1lab.lan.
NS deb-dns2-jp.sio1lab.lan.
$ORIGIN 0.168.192.in-addr.arpa.
140 PTR deb-dns-jp.sio1lab.lan
141 PTR deb-dhcp-jp.sio1lab.lan
deb-dhcp-jp A 192.168.0.141
deb-dns-jp A 192.168.0.140
deb-dns2-jp A 192.168.0.142
dhcp CNAME deb-dhcp-jp
dns1 CNAME deb-dns-jp
dns2 CNAME deb-dns2-jp

View File

@@ -0,0 +1,30 @@
// prime the server with knowledge of the root servers
zone "." {
type hint;
file "/usr/share/dns/root.hints";
};
// be authoritative for the localhost forward and reverse zones, and for
// broadcast zones as per RFC 1912
zone "localhost" {
type master;
file "/etc/bind/db.local";
};
zone "127.in-addr.arpa" {
type master;
file "/etc/bind/db.127";
};
zone "0.in-addr.arpa" {
type master;
file "/etc/bind/db.0";
};
zone "255.in-addr.arpa" {
type master;
file "/etc/bind/db.255";
};

View File

@@ -0,0 +1,24 @@
//
// Do any local configuration here
//
// Consider adding the 1918 zones here, if they are not used in your
// organization
//include "/etc/bind/zones.rfc1918";
// zone directe
zone "sio1lab.lan" {
type slave;
file "/etc/bind/db.sio1lab.lan";
masters { 192.168.0.140; };
masterfile-format text;
};
// zone inverse
zone "0.168.192.in-addr.arpa" {
type slave;
notify no;
file "/etc/bind/db.sio1lab.lan.rev";
masters { 192.168.0.140; };
masterfile-format text;
};

View File

@@ -0,0 +1,24 @@
options {
directory "/var/cache/bind";
// If there is a firewall between you and nameservers you want
// to talk to, you may need to fix the firewall to allow multiple
// ports to talk. See http://www.kb.cert.org/vuls/id/800113
// If your ISP provided one or more IP addresses for stable
// nameservers, you probably want to use them as forwarders.
// Uncomment the following block, and insert the addresses replacing
// the all-0's placeholder.
// forwarders {
// 0.0.0.0;
// };
//========================================================================
// If BIND logs error messages about the root key being expired,
// you will need to update your keys. See https://www.isc.org/bind-keys
//========================================================================
dnssec-validation auto;
listen-on-v6 { any; };
};

View File

@@ -0,0 +1,23 @@
# This file describes the network interfaces available on your system
# and how to activate them. For more information, see interfaces(5).
source /etc/network/interfaces.d/*
# The loopback network interface
auto lo
iface lo inet loopback
# interface fixe
auto enp0s3
iface enp0s3 inet static
address 192.168.0.140/24
gateway 192.168.0.1
# interface interne fix
auto enp0s8
iface enp0s8 inet dhcp
# address 172.16.0.254/24
# interface interne dhcp
#allow-hotplug enp0s8
#iface enp0s8 inet dhcp

View File

@@ -0,0 +1,6 @@
#!/bin/bash
sysctl net.ipv4.ip_forward=1
nft add table basic_nat_table
nft add chain basic_nat_table prerouting {type nat hook prerouting priority 0\; }
nft add chain basic_nat_table postrouting {type nat hook postrouting priority 0\; }
nft add rule basic_nat_table postrouting masquerade

View File

@@ -0,0 +1,26 @@
$ORIGIN .
$TTL 604800 ; 1 week
monlabo.lan IN SOA dns1.monlabo.lan. root.monlabo.lan. (
2 ; serial
604800 ; refresh (1 week)
86400 ; retry (1 day)
2419200 ; expire (4 weeks)
604800 ; minimum (1 week)
)
NS srv-dns2.monlabo.lan.
NS srv-service.monlabo.lan.
A 172.16.0.1
$ORIGIN monlabo.lan.
dhcp CNAME srv-service
dns CNAME srv-service
dns1 CNAME srv-service
dns2 CNAME srv-dns2
router CNAME srv-admin-jp
srv-admin-jp A 172.16.0.254
srv-dns2 A 172.16.0.2
srv-service A 172.16.0.1
srvadmin CNAME srv-admin-jp
srvdhcp CNAME srv-service
srvdns CNAME srv-service
srvdns1 CNAME srv-service
srvdns2 CNAME srv-dns2

View File

@@ -0,0 +1,18 @@
$ORIGIN .
$TTL 604800 ; 1 week
0.16.172.in-addr.arpa IN SOA dns1.monlabo.lan. root.monlabo.lan. (
2 ; serial
604800 ; refresh (1 week)
86400 ; retry (1 day)
2419200 ; expire (4 weeks)
604800 ; minimum (1 week)
)
NS srv-dns2.monlabo.lan.
NS srv-service.monlabo.lan.
A 172.16.0.1
$ORIGIN 0.16.172.in-addr.arpa.
1 PTR srv-service.monlabo.lan
2 PTR srv-dns2.monlabo.lan
254 PTR srv-admin-jp.monlabo.lan
srv-dns2 A 172.16.0.2
srv-service A 172.16.0.1

View File

@@ -0,0 +1,24 @@
//
// Do any local configuration here
//
// Consider adding the 1918 zones here, if they are not used in your
// organization
//include "/etc/bind/zones.rfc1918";
// zone directe
zone "monlabo.lan" {
type slave;
file "/etc/bind/db.monlabo.lan";
masters { 172.16.0.1; };
masterfile-format text;
};
// zone inverse
zone "0.16.172.in-addr.arpa" {
type slave;
notify no;
file "/etc/bind/db.monlabo.lan.rev";
masters { 172.16.0.1; };
masterfile-format text;
};

View File

@@ -0,0 +1,25 @@
options {
directory "/var/cache/bind";
// If there is a firewall between you and nameservers you want
// to talk to, you may need to fix the firewall to allow multiple
// ports to talk. See http://www.kb.cert.org/vuls/id/800113
// If your ISP provided one or more IP addresses for stable
// nameservers, you probably want to use them as forwarders.
// Uncomment the following block, and insert the addresses replacing
// the all-0's placeholder.
forwarders {
10.121.38.7;
10.121.38.8;
};
//========================================================================
// If BIND logs error messages about the root key being expired,
// you will need to update your keys. See https://www.isc.org/bind-keys
//========================================================================
dnssec-validation auto;
listen-on-v6 { any; };
};

View File

@@ -0,0 +1,29 @@
;
; BIND data file for local loopback interface
;
$TTL 604800
@ IN SOA dns1.monlabo.lan. root.monlabo.lan. (
2 ; Serial
604800 ; Refresh
86400 ; Retry
2419200 ; Expire
604800 ) ; Negative Cache TTL
;
@ IN NS srv-service.monlabo.lan.
IN NS srv-dns2.monlabo.lan.
IN A 172.16.0.1
srv-dns2 IN A 172.16.0.2
srv-service IN A 172.16.0.1
srv-admin-jp IN A 172.16.0.254
dhcp IN CNAME srv-service
srvdns IN CNAME srv-service
srvdns1 IN CNAME srv-service
srvdhcp IN CNAME srv-service
dns IN CNAME srv-service
dns1 IN CNAME srv-service
dns2 IN CNAME srv-dns2
srvdns2 IN CNAME srv-dns2
srvadmin IN CNAME srv-admin-jp
router IN CNAME srv-admin-jp

View File

@@ -0,0 +1,21 @@
;
; BIND data file for local loopback interface
;
$TTL 604800
@ IN SOA dns1.monlabo.lan. root.monlabo.lan. (
2 ; Serial
604800 ; Refresh
86400 ; Retry
2419200 ; Expire
604800 ) ; Negative Cache TTL
;
@ IN NS srv-service.monlabo.lan.
IN NS srv-dns2.monlabo.lan.
IN A 172.16.0.1
srv-dns2 IN A 172.16.0.2
srv-service IN A 172.16.0.1
;deb-dns2-jp IN A 192.168.0.142
1 IN PTR srv-service.monlabo.lan
254 IN PTR srv-admin-jp.monlabo.lan
2 IN PTR srv-dns2.monlabo.lan

View File

@@ -0,0 +1,20 @@
//
// Do any local configuration here
//
// Consider adding the 1918 zones here, if they are not used in your
// organization
//include "/etc/bind/zones.rfc1918";
// Zone directe
zone "monlabo.lan" {
type master;
file "/etc/bind/db.monlabo.lan";
};
// Zone inverse
zone "0.16.172.in-addr.arpa" {
type master;
notify no;
file "/etc/bind/db.monlabo.lan.rev";
};

View File

@@ -0,0 +1,25 @@
options {
directory "/var/cache/bind";
// If there is a firewall between you and nameservers you want
// to talk to, you may need to fix the firewall to allow multiple
// ports to talk. See http://www.kb.cert.org/vuls/id/800113
// If your ISP provided one or more IP addresses for stable
// nameservers, you probably want to use them as forwarders.
// Uncomment the following block, and insert the addresses replacing
// the all-0's placeholder.
forwarders {
10.121.38.7;
10.121.38.8;
};
//========================================================================
// If BIND logs error messages about the root key being expired,
// you will need to update your keys. See https://www.isc.org/bind-keys
//========================================================================
dnssec-validation auto;
listen-on-v6 { any; };
};

View File

@@ -0,0 +1,110 @@
# dhcpd.conf
#
# Sample configuration file for ISC dhcpd
#
# option definitions common to all supported networks...
#option domain-name "example.org";
#option domain-name-servers ns1.example.org, ns2.example.org;
default-lease-time 604800;
max-lease-time 604800;
# The ddns-updates-style parameter controls whether or not the server will
# attempt to do a DNS update when a lease is confirmed. We default to the
# behavior of the version 2 packages ('none', since DHCP v2 didn't
# have support for DDNS.)
ddns-update-style none;
subnet 172.16.0.0 netmask 255.255.255.0 {
range 172.16.0.100 172.16.0.200;
option routers 172.16.0.254;
option domain-name-servers 172.16.0.1, 172.16.0.2;
option domain-name "monlabo.lan";
}
host srv-admin-jp {
hardware ethernet 08:00:27:44:f2:e7;
fixed-address 172.16.0.254;
}
host srv-dns2 {
hardware ethernet 08:00:27:2b:f5:4c;
fixed-address 172.16.0.2;
option domain-name-servers 127.0.0.1;
}
# This is a very basic subnet declaration.
#subnet 10.254.239.0 netmask 255.255.255.224 {
# range 10.254.239.10 10.254.239.20;
# option routers rtr-239-0-1.example.org, rtr-239-0-2.example.org;
#}
# This declaration allows BOOTP clients to get dynamic addresses,
# which we don't really recommend.
#subnet 10.254.239.32 netmask 255.255.255.224 {
# range dynamic-bootp 10.254.239.40 10.254.239.60;
# option broadcast-address 10.254.239.31;
# option routers rtr-239-32-1.example.org;
#}
# A slightly different configuration for an internal subnet.
#subnet 10.5.5.0 netmask 255.255.255.224 {
# range 10.5.5.26 10.5.5.30;
# option domain-name-servers ns1.internal.example.org;
# option domain-name "internal.example.org";
# option routers 10.5.5.1;
# option broadcast-address 10.5.5.31;
# default-lease-time 600;
# max-lease-time 7200;
#}
# Hosts which require special configuration options can be listed in
# host statements. If no address is specified, the address will be
# allocated dynamically (if possible), but the host-specific information
# will still come from the host declaration.
#host passacaglia {
# hardware ethernet 0:0:c0:5d:bd:95;
# filename "vmunix.passacaglia";
# server-name "toccata.example.com";
#}
# Fixed IP addresses can also be specified for hosts. These addresses
# should not also be listed as being available for dynamic assignment.
# Hosts for which fixed IP addresses have been specified can boot using
# BOOTP or DHCP. Hosts for which no fixed address is specified can only
# be booted with DHCP, unless there is an address range on the subnet
# to which a BOOTP client is connected which has the dynamic-bootp flag
# set.
#host fantasia {
# hardware ethernet 08:00:07:26:c0:a5;
# fixed-address fantasia.example.com;
#}
# You can declare a class of clients and then do address allocation
# based on that. The example below shows a case where all clients
# in a certain class get addresses on the 10.17.224/24 subnet, and all
# other clients get addresses on the 10.0.29/24 subnet.
#class "foo" {
# match if substring (option vendor-class-identifier, 0, 4) = "SUNW";
#}
#shared-network 224-29 {
# subnet 10.17.224.0 netmask 255.255.255.0 {
# option routers rtr-224.example.org;
# }
# subnet 10.0.29.0 netmask 255.255.255.0 {
# option routers rtr-29.example.org;
# }
# pool {
# allow members of "foo";
# range 10.17.224.10 10.17.224.250;
# }
# pool {
# deny members of "foo";
# range 10.0.29.10 10.0.29.230;
# }
#}

View File

@@ -0,0 +1,30 @@
Ermengarde,Berthelmot,eberthelmot0@webmd.com,Female,Accountant
Kassi,Bunker,kbunker1@xinhuanet.com,Female,Production
Moises,McCallum,mmccallum2@i2i.jp,Male,Production
Patrizio,Lune,plune3@upenn.edu,Male,Accountant
Blanch,Everix,beverix4@php.net,Female,Accountant
Stafani,Kibbel,skibbel5@marriott.com,Female,Production
Ignacius,Mosdell,imosdell6@cloudflare.com,Male,Management
Jeana,Waller-Bridge,jwallerbridge7@mapy.cz,Female,Management
Elroy,Dressel,edressel8@opera.com,Male,Production
Thea,Strettell,tstrettell9@nature.com,Female,Production
Solomon,Insoll,sinsolla@utexas.edu,Male,Accountant
Carri,Feedome,cfeedomeb@ask.com,Female,Accountant
Padraic,Chetwind,pchetwindc@last.fm,Male,Management
Solly,D'Ugo,sdugod@uiuc.edu,Male,Production
Konstanze,MacCostigan,kmaccostigane@seattletimes.com,Female,Accountant
Roxane,Powlesland,rpowleslandf@pcworld.com,Female,Management
Orelle,Kennealy,okennealyg@arstechnica.com,Female,Production
Sukey,Soitoux,ssoitouxh@shinystat.com,Female,Production
Nelli,Syce,nsycei@blogger.com,Female,Production
Clarisse,Shillam,cshillamj@dailymotion.com,Female,Production
Carin,Gueny,cguenyk@naver.com,Female,Management
Donny,Riepel,driepell@addtoany.com,Male,Production
Daniella,Ralfe,dralfem@wunderground.com,Female,Production
Lexy,Clynmans,lclynmansn@furl.net,Female,Production
Gardiner,Adamthwaite,gadamthwaiteo@spotify.com,Male,Production
Woodman,Lippett,wlippettp@purevolume.com,Male,Production
Nadya,Munnion,nmunnionq@flavors.me,Female,Production
Llewellyn,Habershon,lhabershonr@alibaba.com,Male,Production
Isaak,Greatrex,igreatrexs@seesaa.net,Male,Production
Darill,Frostdyke,dfrostdyket@cafepress.com,Male,Production
1 Ermengarde Berthelmot eberthelmot0@webmd.com Female Accountant
2 Kassi Bunker kbunker1@xinhuanet.com Female Production
3 Moises McCallum mmccallum2@i2i.jp Male Production
4 Patrizio Lune plune3@upenn.edu Male Accountant
5 Blanch Everix beverix4@php.net Female Accountant
6 Stafani Kibbel skibbel5@marriott.com Female Production
7 Ignacius Mosdell imosdell6@cloudflare.com Male Management
8 Jeana Waller-Bridge jwallerbridge7@mapy.cz Female Management
9 Elroy Dressel edressel8@opera.com Male Production
10 Thea Strettell tstrettell9@nature.com Female Production
11 Solomon Insoll sinsolla@utexas.edu Male Accountant
12 Carri Feedome cfeedomeb@ask.com Female Accountant
13 Padraic Chetwind pchetwindc@last.fm Male Management
14 Solly D'Ugo sdugod@uiuc.edu Male Production
15 Konstanze MacCostigan kmaccostigane@seattletimes.com Female Accountant
16 Roxane Powlesland rpowleslandf@pcworld.com Female Management
17 Orelle Kennealy okennealyg@arstechnica.com Female Production
18 Sukey Soitoux ssoitouxh@shinystat.com Female Production
19 Nelli Syce nsycei@blogger.com Female Production
20 Clarisse Shillam cshillamj@dailymotion.com Female Production
21 Carin Gueny cguenyk@naver.com Female Management
22 Donny Riepel driepell@addtoany.com Male Production
23 Daniella Ralfe dralfem@wunderground.com Female Production
24 Lexy Clynmans lclynmansn@furl.net Female Production
25 Gardiner Adamthwaite gadamthwaiteo@spotify.com Male Production
26 Woodman Lippett wlippettp@purevolume.com Male Production
27 Nadya Munnion nmunnionq@flavors.me Female Production
28 Llewellyn Habershon lhabershonr@alibaba.com Male Production
29 Isaak Greatrex igreatrexs@seesaa.net Male Production
30 Darill Frostdyke dfrostdyket@cafepress.com Male Production

View File

@@ -0,0 +1,16 @@
#!/bin/bash
#
rm ./logins.csv
while read line
do
echo $line > ./temp.txt
prenom=$(cut -d "," -f 1 ./temp.txt)
nom=$(cut -d "," -f 2 ./temp.txt)
initial=$(cut -c 1 ./temp.txt)
id=$(echo $initial$nom | tr [:upper:] [:lower:])
passwd=$(echo $RANDOM | md5sum | head -c 8)
echo $id","$passwd","$prenom","$nom","$(cut -d "," -f 5 ./temp.txt) >> ./logins.csv
rm ./temp.txt
done < ./Users.csv

View File

@@ -0,0 +1,30 @@
eberthelmot,59155498,Ermengarde,Berthelmot,Accountant
kbunker,b9068820,Kassi,Bunker,Production
mmccallum,ee65d788,Moises,McCallum,Production
plune,779b128e,Patrizio,Lune,Accountant
beverix,40741acd,Blanch,Everix,Accountant
skibbel,46353bb2,Stafani,Kibbel,Production
imosdell,8ec4cdc3,Ignacius,Mosdell,Management
jwaller-bridge,ac7367bb,Jeana,Waller-Bridge,Management
edressel,1af39ab6,Elroy,Dressel,Production
tstrettell,1f333d96,Thea,Strettell,Production
sinsoll,9b14d3c8,Solomon,Insoll,Accountant
cfeedome,acc2de2b,Carri,Feedome,Accountant
pchetwind,fcf81634,Padraic,Chetwind,Management
sd'ugo,a6d1382b,Solly,D'Ugo,Production
kmaccostigan,d2531594,Konstanze,MacCostigan,Accountant
rpowlesland,b5049d93,Roxane,Powlesland,Management
okennealy,c03675ff,Orelle,Kennealy,Production
ssoitoux,c4b0dc61,Sukey,Soitoux,Production
nsyce,40b513f5,Nelli,Syce,Production
cshillam,d963042c,Clarisse,Shillam,Production
cgueny,965b0c91,Carin,Gueny,Management
driepel,1fcb2d72,Donny,Riepel,Production
dralfe,8c506545,Daniella,Ralfe,Production
lclynmans,f107ef6e,Lexy,Clynmans,Production
gadamthwaite,87b1a7a0,Gardiner,Adamthwaite,Production
wlippett,c8829ebf,Woodman,Lippett,Production
nmunnion,f874ffce,Nadya,Munnion,Production
lhabershon,529dd157,Llewellyn,Habershon,Production
igreatrex,70d37da4,Isaak,Greatrex,Production
dfrostdyke,83578805,Darill,Frostdyke,Production
1 eberthelmot 59155498 Ermengarde Berthelmot Accountant
2 kbunker b9068820 Kassi Bunker Production
3 mmccallum ee65d788 Moises McCallum Production
4 plune 779b128e Patrizio Lune Accountant
5 beverix 40741acd Blanch Everix Accountant
6 skibbel 46353bb2 Stafani Kibbel Production
7 imosdell 8ec4cdc3 Ignacius Mosdell Management
8 jwaller-bridge ac7367bb Jeana Waller-Bridge Management
9 edressel 1af39ab6 Elroy Dressel Production
10 tstrettell 1f333d96 Thea Strettell Production
11 sinsoll 9b14d3c8 Solomon Insoll Accountant
12 cfeedome acc2de2b Carri Feedome Accountant
13 pchetwind fcf81634 Padraic Chetwind Management
14 sd'ugo a6d1382b Solly D'Ugo Production
15 kmaccostigan d2531594 Konstanze MacCostigan Accountant
16 rpowlesland b5049d93 Roxane Powlesland Management
17 okennealy c03675ff Orelle Kennealy Production
18 ssoitoux c4b0dc61 Sukey Soitoux Production
19 nsyce 40b513f5 Nelli Syce Production
20 cshillam d963042c Clarisse Shillam Production
21 cgueny 965b0c91 Carin Gueny Management
22 driepel 1fcb2d72 Donny Riepel Production
23 dralfe 8c506545 Daniella Ralfe Production
24 lclynmans f107ef6e Lexy Clynmans Production
25 gadamthwaite 87b1a7a0 Gardiner Adamthwaite Production
26 wlippett c8829ebf Woodman Lippett Production
27 nmunnion f874ffce Nadya Munnion Production
28 lhabershon 529dd157 Llewellyn Habershon Production
29 igreatrex 70d37da4 Isaak Greatrex Production
30 dfrostdyke 83578805 Darill Frostdyke Production