Compare commits
5 Commits
Author | SHA1 | Date | |
---|---|---|---|
b76adc7830 | |||
b5db0b93ef | |||
2ee8d4fa6b | |||
703f169a05 | |||
e4df98a2cd |
@ -1,20 +0,0 @@
|
||||
//
|
||||
// Do any local configuration here
|
||||
//
|
||||
|
||||
// Consider adding the 1918 zones here, if they are not used in your
|
||||
// organization
|
||||
//include "/etc/bind/zones.rfc1918";
|
||||
|
||||
// zone directe
|
||||
zone "domaine.lan" {
|
||||
type master;
|
||||
file "/etc/bind/db.domaine.lan";
|
||||
};
|
||||
|
||||
// zone inverse
|
||||
zone "0.168.192.in-addr.arpa" {
|
||||
type master;
|
||||
notify no;
|
||||
file "/etc/bind/db.domaine.lan.rev";
|
||||
};
|
@ -1,24 +0,0 @@
|
||||
options {
|
||||
directory "/var/cache/bind";
|
||||
|
||||
// If there is a firewall between you and nameservers you want
|
||||
// to talk to, you may need to fix the firewall to allow multiple
|
||||
// ports to talk. See http://www.kb.cert.org/vuls/id/800113
|
||||
|
||||
// If your ISP provided one or more IP addresses for stable
|
||||
// nameservers, you probably want to use them as forwarders.
|
||||
// Uncomment the following block, and insert the addresses replacing
|
||||
// the all-0's placeholder.
|
||||
|
||||
forwarders {
|
||||
10.121.38.7;
|
||||
};
|
||||
|
||||
//========================================================================
|
||||
// If BIND logs error messages about the root key being expired,
|
||||
// you will need to update your keys. See https://www.isc.org/bind-keys
|
||||
//========================================================================
|
||||
dnssec-validation no;
|
||||
|
||||
listen-on-v6 { any; };
|
||||
};
|
@ -1,3 +0,0 @@
|
||||
domain domaine.lan
|
||||
search domaine.lan
|
||||
nameserver 127.0.0.1
|
12
Sio1/SISR1/30-FiltrageEtDMZ/fw0.sh
Normal file
12
Sio1/SISR1/30-FiltrageEtDMZ/fw0.sh
Normal file
@ -0,0 +1,12 @@
|
||||
#!/bin/bash
|
||||
|
||||
IFEXT=enp0s3
|
||||
IFDMZ=enp0s8
|
||||
IFINT=enp0s9
|
||||
|
||||
# ici instruction pour activer le routage
|
||||
sysctl -w net.ipv4.ip_forward=1
|
||||
# ici instructions pour definir les stratégies par defaut (etape 1)
|
||||
|
||||
# ici instructions pour remettre a zero les chaines filter et nat (etape 1)
|
||||
|
21
Sio1/SISR1/30-FiltrageEtDMZ/fw1.sh
Executable file
21
Sio1/SISR1/30-FiltrageEtDMZ/fw1.sh
Executable file
@ -0,0 +1,21 @@
|
||||
#!/bin/bash
|
||||
|
||||
IFEXT=enp0s3
|
||||
IFDMZ=enp0s8
|
||||
IFINT=enp0s9
|
||||
|
||||
# ici instruction pour activer le routage
|
||||
sysctl -w net.ipv4.ip_forward=1
|
||||
|
||||
# ici instructions pour definir les stratégies par defaut (etape 1)
|
||||
sudo iptables -P INPUT DROP
|
||||
sudo iptables -P OUTPUT DROP
|
||||
sudo iptables -P FORWARD DROP
|
||||
|
||||
# ici instructions pour remettre a zero les chaines filter et nat (etape 1)
|
||||
sudo iptables -F -t nat
|
||||
sudo iptables -F -t filter
|
||||
|
||||
# autorise le loopback
|
||||
sudo iptables -A INPUT -i lo -j ACCEPT
|
||||
sudo iptables -A OUTPUT -o lo -j ACCEPT
|
28
Sio1/SISR1/30-FiltrageEtDMZ/fw2.sh
Executable file
28
Sio1/SISR1/30-FiltrageEtDMZ/fw2.sh
Executable file
@ -0,0 +1,28 @@
|
||||
#!/bin/bash
|
||||
set -e
|
||||
set -u
|
||||
|
||||
IFEXT=enp0s3
|
||||
IFDMZ=enp0s8
|
||||
IFINT=enp0s9
|
||||
|
||||
# ici instruction pour activer le routage
|
||||
sysctl -w net.ipv4.ip_forward=1
|
||||
|
||||
# ici instructions pour definir les stratégies par defaut (etape 1)
|
||||
sudo iptables -P INPUT DROP
|
||||
sudo iptables -P OUTPUT DROP
|
||||
sudo iptables -P FORWARD DROP
|
||||
|
||||
# ici instructions pour remettre a zero les chaines filter et nat (etape 1)
|
||||
sudo iptables -F -t nat
|
||||
sudo iptables -F -t filter
|
||||
|
||||
# autorise le loopback
|
||||
sudo iptables -A INPUT -i lo -j ACCEPT
|
||||
sudo iptables -A OUTPUT -o lo -j ACCEPT
|
||||
|
||||
# Connection ssh
|
||||
|
||||
sudo iptables -A INPUT -p tcp --dport 22 -j ACCEPT #entrée
|
||||
sudo iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT #sortie
|
36
Sio1/SISR1/30-FiltrageEtDMZ/fw3.sh
Executable file
36
Sio1/SISR1/30-FiltrageEtDMZ/fw3.sh
Executable file
@ -0,0 +1,36 @@
|
||||
#!/bin/bash
|
||||
set -e
|
||||
set -u
|
||||
|
||||
IFEXT=enp0s3
|
||||
IFDMZ=enp0s8
|
||||
IFINT=enp0s9
|
||||
|
||||
# ici instruction pour activer le routage
|
||||
sysctl -w net.ipv4.ip_forward=1
|
||||
|
||||
# ici instructions pour definir les stratégies par defaut (etape 1)
|
||||
sudo iptables -P INPUT DROP
|
||||
sudo iptables -P OUTPUT DROP
|
||||
sudo iptables -P FORWARD DROP
|
||||
|
||||
# ici instructions pour remettre a zero les chaines filter et nat (etape 1)
|
||||
sudo iptables -F -t nat
|
||||
sudo iptables -F -t filter
|
||||
|
||||
# Loopback
|
||||
sudo iptables -A INPUT -i lo -j ACCEPT
|
||||
sudo iptables -A OUTPUT -o lo -j ACCEPT
|
||||
|
||||
# Connexion ssh serveur
|
||||
sudo iptables -A INPUT -p tcp --dport 22 -j ACCEPT #entrée
|
||||
sudo iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT #sortie
|
||||
|
||||
# Requete DNS client
|
||||
sudo iptables -A OUTPUT -p udp --dport 53 -j ACCEPT
|
||||
sudo iptables -A INPUT -p udp --sport 53 -j ACCEPT
|
||||
|
||||
# Acces HTTP client
|
||||
sudo iptables -A OUTPUT -p udp --dport 80 -j ACCEPT
|
||||
sudo iptables -A INPUT -p udp --sport 80 -j ACCEPT
|
||||
|
41
Sio1/SISR1/30-FiltrageEtDMZ/fw4.sh
Executable file
41
Sio1/SISR1/30-FiltrageEtDMZ/fw4.sh
Executable file
@ -0,0 +1,41 @@
|
||||
#!/bin/bash
|
||||
set -e
|
||||
set -u
|
||||
|
||||
IFEXT=enp0s3
|
||||
IFDMZ=enp0s8
|
||||
IFINT=enp0s9
|
||||
|
||||
# ici instruction pour activer le routage
|
||||
sysctl -w net.ipv4.ip_forward=1
|
||||
|
||||
# ici instructions pour definir les stratégies par defaut (etape 1)
|
||||
sudo iptables -P INPUT DROP
|
||||
sudo iptables -P OUTPUT DROP
|
||||
sudo iptables -P FORWARD DROP
|
||||
|
||||
# ici instructions pour remettre a zero les chaines filter et nat (etape 1)
|
||||
sudo iptables -F -t nat
|
||||
sudo iptables -F -t filter
|
||||
|
||||
# Loopback
|
||||
sudo iptables -A INPUT -i lo -j ACCEPT
|
||||
sudo iptables -A OUTPUT -o lo -j ACCEPT
|
||||
|
||||
# Connexion ssh serveur
|
||||
sudo iptables -A INPUT -p tcp --dport 22 -j ACCEPT #entrée
|
||||
sudo iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT #sortie
|
||||
|
||||
# Requete DNS client
|
||||
sudo iptables -A OUTPUT -p udp --dport 53 -j ACCEPT
|
||||
sudo iptables -A INPUT -p udp --sport 53 -j ACCEPT
|
||||
|
||||
# Acces HTTP client
|
||||
sudo iptables -A OUTPUT -p udp --dport 80 -j ACCEPT
|
||||
sudo iptables -A INPUT -p udp --sport 80 -j ACCEPT
|
||||
|
||||
# NAT sur la carte exterieur (pouvoir curl une machine de l'autre coter)
|
||||
sudo iptables -t nat -A POSTROUTING -o "${IFEXT}" -j MASQUERADE -s 10.0.0.0/16
|
||||
#sudo iptables -L -t nat # pour controler
|
||||
sudo iptables -A FORWARD -j ACCEPT
|
||||
|
46
Sio1/SISR1/30-FiltrageEtDMZ/fw5-1.sh
Executable file
46
Sio1/SISR1/30-FiltrageEtDMZ/fw5-1.sh
Executable file
@ -0,0 +1,46 @@
|
||||
#!/bin/bash
|
||||
set -e
|
||||
set -u
|
||||
|
||||
IFEXT=enp0s3
|
||||
IFDMZ=enp0s8
|
||||
IFINT=enp0s9
|
||||
|
||||
# ici instruction pour activer le routage
|
||||
sysctl -w net.ipv4.ip_forward=1
|
||||
|
||||
# ici instructions pour definir les stratégies par defaut (etape 1)
|
||||
sudo iptables -P INPUT DROP
|
||||
sudo iptables -P OUTPUT DROP
|
||||
sudo iptables -P FORWARD DROP
|
||||
|
||||
# ici instructions pour remettre a zero les chaines filter et nat (etape 1)
|
||||
sudo iptables -F -t nat
|
||||
sudo iptables -F -t filter
|
||||
|
||||
# Loopback
|
||||
sudo iptables -A INPUT -i lo -j ACCEPT
|
||||
sudo iptables -A OUTPUT -o lo -j ACCEPT
|
||||
|
||||
# Connexion ssh serveur
|
||||
sudo iptables -A INPUT -p tcp --dport 22 -j ACCEPT #entrée
|
||||
sudo iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT #sortie
|
||||
|
||||
# Requete DNS client
|
||||
sudo iptables -A OUTPUT -p udp --dport 53 -j ACCEPT
|
||||
sudo iptables -A INPUT -p udp --sport 53 -j ACCEPT
|
||||
|
||||
# Acces HTTP client
|
||||
sudo iptables -A OUTPUT -p udp --dport 80 -j ACCEPT
|
||||
sudo iptables -A INPUT -p udp --sport 80 -j ACCEPT
|
||||
|
||||
# NAT sur la carte exterieur (pouvoir curl une machine de l'autre coter)
|
||||
sudo iptables -t nat -A POSTROUTING -o "${IFEXT}" -j MASQUERADE -s 10.0.0.0/16
|
||||
sudo iptables -t nat -A POSTROUTING -o "${IFEXT}" -j MASQUERADE -s 172.16.0.0/16
|
||||
#sudo iptables -L -t nat # pour controler
|
||||
sudo iptables -A FORWARD -j ACCEPT
|
||||
|
||||
# Acces DNS sortante
|
||||
sudo iptables -A FORWARD -p udp --dport 53 -j ACCEPT
|
||||
sudo iptables -A FORWARD -p udp --sport 53 -j ACCEPT
|
||||
|
Reference in New Issue
Block a user