Compare commits
8 Commits
Author | SHA1 | Date | |
---|---|---|---|
66ba6ac484 | |||
c11548b778 | |||
b76adc7830 | |||
b5db0b93ef | |||
2ee8d4fa6b | |||
703f169a05 | |||
e4df98a2cd | |||
078b3a300c |
20
Sio1/SISR1/20-DNS/Master/db.domaine.lan
Normal file
20
Sio1/SISR1/20-DNS/Master/db.domaine.lan
Normal file
@ -0,0 +1,20 @@
|
||||
;
|
||||
; BIND data file for local loopback interface
|
||||
;
|
||||
$TTL 604800
|
||||
domaine.lan. IN SOA srv1.domaine.lan. root.srv1.domaine.lan. (
|
||||
2022020100 ; Serial
|
||||
604800 ; Refresh
|
||||
86400 ; Retry
|
||||
2419200 ; Expire
|
||||
604800 ) ; Negative Cache TTL
|
||||
;
|
||||
@ IN NS srv1.domaine.lan.
|
||||
srv1 IN A 192.168.0.110
|
||||
@ IN NS srv2.domaine.lan.
|
||||
srv2 IN A 192.168.0.114
|
||||
|
||||
;@ IN AAAA ::1
|
||||
poste1 IN A 192.168.0.111
|
||||
poste2 IN A 192.168.0.112
|
||||
www2 IN CNAME poste1
|
14
Sio1/SISR1/20-DNS/Master/db.domaine.lan.rev
Normal file
14
Sio1/SISR1/20-DNS/Master/db.domaine.lan.rev
Normal file
@ -0,0 +1,14 @@
|
||||
$TTL 38400 ; 10 hours 40 minutes
|
||||
@ IN SOA srv1.domaine.lan. root.srv1.domaine.lan. (
|
||||
2022020100 ; serial
|
||||
10800 ; refresh (3 hours)
|
||||
3600 ; retry (1 hour)
|
||||
604800 ; expire (1 week)
|
||||
38400 ; minimum (10 hours 40 minutes)
|
||||
)
|
||||
IN NS srv1.domaine.lan.
|
||||
IN NS srv2.domaine.lan.
|
||||
|
||||
110 IN PTR srv1.domaine.lan.
|
||||
111 IN PTR xp.domaine.lan.
|
||||
114 IN PTR srv2.domaine.lan.
|
11
Sio1/SISR1/20-DNS/Master/named.conf
Normal file
11
Sio1/SISR1/20-DNS/Master/named.conf
Normal file
@ -0,0 +1,11 @@
|
||||
// This is the primary configuration file for the BIND DNS server named.
|
||||
//
|
||||
// Please read /usr/share/doc/bind9/README.Debian.gz for information on the
|
||||
// structure of BIND configuration files in Debian, *BEFORE* you customize
|
||||
// this configuration file.
|
||||
//
|
||||
// If you are just adding zones, please do that in /etc/bind/named.conf.local
|
||||
|
||||
include "/etc/bind/named.conf.options";
|
||||
include "/etc/bind/named.conf.local";
|
||||
include "/etc/bind/named.conf.default-zones";
|
20
Sio1/SISR1/20-DNS/Master/named.conf.local
Normal file
20
Sio1/SISR1/20-DNS/Master/named.conf.local
Normal file
@ -0,0 +1,20 @@
|
||||
//
|
||||
// Do any local configuration here
|
||||
//
|
||||
|
||||
// Consider adding the 1918 zones here, if they are not used in your
|
||||
// organization
|
||||
//include "/etc/bind/zones.rfc1918";
|
||||
|
||||
// zone directe
|
||||
zone "domaine.lan" {
|
||||
type master;
|
||||
file "/etc/bind/db.domaine.lan";
|
||||
};
|
||||
|
||||
// zone inverse
|
||||
zone "0.168.192.in-addr.arpa" {
|
||||
type master;
|
||||
notify no;
|
||||
file "/etc/bind/db.domaine.lan.rev";
|
||||
};
|
3
Sio1/SISR1/20-DNS/Master/resolv.conf
Normal file
3
Sio1/SISR1/20-DNS/Master/resolv.conf
Normal file
@ -0,0 +1,3 @@
|
||||
domain domaine.lan
|
||||
search domaine.lan
|
||||
nameserver 127.0.0.1
|
12
Sio1/SISR1/30-FiltrageEtDMZ/fw0.sh
Normal file
12
Sio1/SISR1/30-FiltrageEtDMZ/fw0.sh
Normal file
@ -0,0 +1,12 @@
|
||||
#!/bin/bash
|
||||
|
||||
IFEXT=enp0s3
|
||||
IFDMZ=enp0s8
|
||||
IFINT=enp0s9
|
||||
|
||||
# ici instruction pour activer le routage
|
||||
sysctl -w net.ipv4.ip_forward=1
|
||||
# ici instructions pour definir les stratégies par defaut (etape 1)
|
||||
|
||||
# ici instructions pour remettre a zero les chaines filter et nat (etape 1)
|
||||
|
21
Sio1/SISR1/30-FiltrageEtDMZ/fw1.sh
Executable file
21
Sio1/SISR1/30-FiltrageEtDMZ/fw1.sh
Executable file
@ -0,0 +1,21 @@
|
||||
#!/bin/bash
|
||||
|
||||
IFEXT=enp0s3
|
||||
IFDMZ=enp0s8
|
||||
IFINT=enp0s9
|
||||
|
||||
# ici instruction pour activer le routage
|
||||
sysctl -w net.ipv4.ip_forward=1
|
||||
|
||||
# ici instructions pour definir les stratégies par defaut (etape 1)
|
||||
sudo iptables -P INPUT DROP
|
||||
sudo iptables -P OUTPUT DROP
|
||||
sudo iptables -P FORWARD DROP
|
||||
|
||||
# ici instructions pour remettre a zero les chaines filter et nat (etape 1)
|
||||
sudo iptables -F -t nat
|
||||
sudo iptables -F -t filter
|
||||
|
||||
# autorise le loopback
|
||||
sudo iptables -A INPUT -i lo -j ACCEPT
|
||||
sudo iptables -A OUTPUT -o lo -j ACCEPT
|
28
Sio1/SISR1/30-FiltrageEtDMZ/fw2.sh
Executable file
28
Sio1/SISR1/30-FiltrageEtDMZ/fw2.sh
Executable file
@ -0,0 +1,28 @@
|
||||
#!/bin/bash
|
||||
set -e
|
||||
set -u
|
||||
|
||||
IFEXT=enp0s3
|
||||
IFDMZ=enp0s8
|
||||
IFINT=enp0s9
|
||||
|
||||
# ici instruction pour activer le routage
|
||||
sysctl -w net.ipv4.ip_forward=1
|
||||
|
||||
# ici instructions pour definir les stratégies par defaut (etape 1)
|
||||
sudo iptables -P INPUT DROP
|
||||
sudo iptables -P OUTPUT DROP
|
||||
sudo iptables -P FORWARD DROP
|
||||
|
||||
# ici instructions pour remettre a zero les chaines filter et nat (etape 1)
|
||||
sudo iptables -F -t nat
|
||||
sudo iptables -F -t filter
|
||||
|
||||
# autorise le loopback
|
||||
sudo iptables -A INPUT -i lo -j ACCEPT
|
||||
sudo iptables -A OUTPUT -o lo -j ACCEPT
|
||||
|
||||
# Connection ssh
|
||||
|
||||
sudo iptables -A INPUT -p tcp --dport 22 -j ACCEPT #entrée
|
||||
sudo iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT #sortie
|
36
Sio1/SISR1/30-FiltrageEtDMZ/fw3.sh
Executable file
36
Sio1/SISR1/30-FiltrageEtDMZ/fw3.sh
Executable file
@ -0,0 +1,36 @@
|
||||
#!/bin/bash
|
||||
set -e
|
||||
set -u
|
||||
|
||||
IFEXT=enp0s3
|
||||
IFDMZ=enp0s8
|
||||
IFINT=enp0s9
|
||||
|
||||
# ici instruction pour activer le routage
|
||||
sysctl -w net.ipv4.ip_forward=1
|
||||
|
||||
# ici instructions pour definir les stratégies par defaut (etape 1)
|
||||
sudo iptables -P INPUT DROP
|
||||
sudo iptables -P OUTPUT DROP
|
||||
sudo iptables -P FORWARD DROP
|
||||
|
||||
# ici instructions pour remettre a zero les chaines filter et nat (etape 1)
|
||||
sudo iptables -F -t nat
|
||||
sudo iptables -F -t filter
|
||||
|
||||
# Loopback
|
||||
sudo iptables -A INPUT -i lo -j ACCEPT
|
||||
sudo iptables -A OUTPUT -o lo -j ACCEPT
|
||||
|
||||
# Connexion ssh serveur
|
||||
sudo iptables -A INPUT -p tcp --dport 22 -j ACCEPT #entrée
|
||||
sudo iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT #sortie
|
||||
|
||||
# Requete DNS client
|
||||
sudo iptables -A OUTPUT -p udp --dport 53 -j ACCEPT
|
||||
sudo iptables -A INPUT -p udp --sport 53 -j ACCEPT
|
||||
|
||||
# Acces HTTP client
|
||||
sudo iptables -A OUTPUT -p udp --dport 80 -j ACCEPT
|
||||
sudo iptables -A INPUT -p udp --sport 80 -j ACCEPT
|
||||
|
41
Sio1/SISR1/30-FiltrageEtDMZ/fw4.sh
Executable file
41
Sio1/SISR1/30-FiltrageEtDMZ/fw4.sh
Executable file
@ -0,0 +1,41 @@
|
||||
#!/bin/bash
|
||||
set -e
|
||||
set -u
|
||||
|
||||
IFEXT=enp0s3
|
||||
IFDMZ=enp0s8
|
||||
IFINT=enp0s9
|
||||
|
||||
# ici instruction pour activer le routage
|
||||
sysctl -w net.ipv4.ip_forward=1
|
||||
|
||||
# ici instructions pour definir les stratégies par defaut (etape 1)
|
||||
sudo iptables -P INPUT DROP
|
||||
sudo iptables -P OUTPUT DROP
|
||||
sudo iptables -P FORWARD DROP
|
||||
|
||||
# ici instructions pour remettre a zero les chaines filter et nat (etape 1)
|
||||
sudo iptables -F -t nat
|
||||
sudo iptables -F -t filter
|
||||
|
||||
# Loopback
|
||||
sudo iptables -A INPUT -i lo -j ACCEPT
|
||||
sudo iptables -A OUTPUT -o lo -j ACCEPT
|
||||
|
||||
# Connexion ssh serveur
|
||||
sudo iptables -A INPUT -p tcp --dport 22 -j ACCEPT #entrée
|
||||
sudo iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT #sortie
|
||||
|
||||
# Requete DNS client
|
||||
sudo iptables -A OUTPUT -p udp --dport 53 -j ACCEPT
|
||||
sudo iptables -A INPUT -p udp --sport 53 -j ACCEPT
|
||||
|
||||
# Acces HTTP client
|
||||
sudo iptables -A OUTPUT -p udp --dport 80 -j ACCEPT
|
||||
sudo iptables -A INPUT -p udp --sport 80 -j ACCEPT
|
||||
|
||||
# NAT sur la carte exterieur (pouvoir curl une machine de l'autre coter)
|
||||
sudo iptables -t nat -A POSTROUTING -o "${IFEXT}" -j MASQUERADE -s 10.0.0.0/16
|
||||
#sudo iptables -L -t nat # pour controler
|
||||
sudo iptables -A FORWARD -j ACCEPT
|
||||
|
46
Sio1/SISR1/30-FiltrageEtDMZ/fw5.sh
Executable file
46
Sio1/SISR1/30-FiltrageEtDMZ/fw5.sh
Executable file
@ -0,0 +1,46 @@
|
||||
#!/bin/bash
|
||||
set -e
|
||||
set -u
|
||||
|
||||
IFEXT=enp0s3
|
||||
IFDMZ=enp0s8
|
||||
IFINT=enp0s9
|
||||
|
||||
# ici instruction pour activer le routage
|
||||
sysctl -w net.ipv4.ip_forward=1
|
||||
|
||||
# ici instructions pour definir les stratégies par defaut (etape 1)
|
||||
sudo iptables -P INPUT DROP
|
||||
sudo iptables -P OUTPUT DROP
|
||||
sudo iptables -P FORWARD DROP
|
||||
|
||||
# ici instructions pour remettre a zero les chaines filter et nat (etape 1)
|
||||
sudo iptables -F -t nat
|
||||
sudo iptables -F -t filter
|
||||
|
||||
# Loopback
|
||||
sudo iptables -A INPUT -i lo -j ACCEPT
|
||||
sudo iptables -A OUTPUT -o lo -j ACCEPT
|
||||
|
||||
# Connexion ssh serveur
|
||||
sudo iptables -A INPUT -p tcp --dport 22 -j ACCEPT #entrée
|
||||
sudo iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT #sortie
|
||||
|
||||
# Requete DNS client
|
||||
sudo iptables -A OUTPUT -p udp --dport 53 -j ACCEPT
|
||||
sudo iptables -A INPUT -p udp --sport 53 -j ACCEPT
|
||||
|
||||
# Acces HTTP client
|
||||
sudo iptables -A OUTPUT -p udp --dport 80 -j ACCEPT
|
||||
sudo iptables -A INPUT -p udp --sport 80 -j ACCEPT
|
||||
|
||||
# NAT sur la carte exterieur (pouvoir curl une machine de l'autre coter)
|
||||
sudo iptables -t nat -A POSTROUTING -o "${IFEXT}" -j MASQUERADE -s 10.0.0.0/16
|
||||
sudo iptables -t nat -A POSTROUTING -o "${IFEXT}" -j MASQUERADE -s 172.16.0.0/16
|
||||
#sudo iptables -L -t nat # pour controler
|
||||
sudo iptables -A FORWARD -j ACCEPT
|
||||
|
||||
# Acces DNS sortante
|
||||
sudo iptables -A FORWARD -p udp --dport 53 -j ACCEPT
|
||||
sudo iptables -A FORWARD -p udp --sport 53 -j ACCEPT
|
||||
|
10
Sio1/SISR1/40-ShellEtBash/crsamba1
Executable file
10
Sio1/SISR1/40-ShellEtBash/crsamba1
Executable file
@ -0,0 +1,10 @@
|
||||
#!/bin/bash
|
||||
|
||||
set -e
|
||||
set -u
|
||||
|
||||
fich=users.txt
|
||||
while read ligne
|
||||
do
|
||||
echo "${ligne}"
|
||||
done < $fich
|
21
Sio1/SISR1/40-ShellEtBash/crsamba2
Executable file
21
Sio1/SISR1/40-ShellEtBash/crsamba2
Executable file
@ -0,0 +1,21 @@
|
||||
#!/bin/bash
|
||||
|
||||
#set -e
|
||||
#set -u
|
||||
|
||||
fich=$1
|
||||
|
||||
if [[ $# -ne 1 ]] ; then
|
||||
echo "usage : $0 <fichier>"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
if [[ ! -r "${fich}" ]] ; then
|
||||
echo "$0 : erreur ouverture ${fich}"
|
||||
exit 2
|
||||
fi
|
||||
|
||||
while read ligne
|
||||
do
|
||||
echo "${ligne}"
|
||||
done < $fich
|
22
Sio1/SISR1/40-ShellEtBash/crsamba4
Executable file
22
Sio1/SISR1/40-ShellEtBash/crsamba4
Executable file
@ -0,0 +1,22 @@
|
||||
#!/bin/bash
|
||||
|
||||
#set -e
|
||||
#set -u
|
||||
|
||||
if [[ $# -ne 1 ]] ; then
|
||||
echo "usage : $0 <fichier>"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
if [[ ! -r "$1" ]] ; then
|
||||
echo "$0 : erreur ouverture ${fich}"
|
||||
exit 2
|
||||
fi
|
||||
|
||||
|
||||
|
||||
fich=$1
|
||||
while read ligne
|
||||
do
|
||||
echo "${ligne}"|cut -d: -f1
|
||||
done < $fich
|
24
Sio1/SISR1/40-ShellEtBash/crsamba5
Executable file
24
Sio1/SISR1/40-ShellEtBash/crsamba5
Executable file
@ -0,0 +1,24 @@
|
||||
#!/bin/bash
|
||||
|
||||
#set -e
|
||||
#set -u
|
||||
|
||||
if [[ $# -ne 1 ]] ; then
|
||||
echo "usage : $0 <fichier>"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
if [[ ! -r "$1" ]] ; then
|
||||
echo "$0 : erreur ouverture ${fich}"
|
||||
exit 2
|
||||
fi
|
||||
|
||||
|
||||
|
||||
fich=$1
|
||||
while read ligne
|
||||
do
|
||||
login=$(echo "${ligne}"|cut -d: -f1)
|
||||
nom=$(echo "${ligne}"|cut -d: -f2)
|
||||
echo "${login} ${nom}"
|
||||
done < $fich
|
4
Sio1/SISR1/40-ShellEtBash/users.txt
Normal file
4
Sio1/SISR1/40-ShellEtBash/users.txt
Normal file
@ -0,0 +1,4 @@
|
||||
lucien:Lucien Aymar
|
||||
claudine:Claudine Dupont
|
||||
robert:Robert Michel
|
||||
marcelle:Marcelle Parde
|
Reference in New Issue
Block a user