Compare commits
5 Commits
Author | SHA1 | Date | |
---|---|---|---|
b76adc7830 | |||
b5db0b93ef | |||
2ee8d4fa6b | |||
703f169a05 | |||
e4df98a2cd |
@ -1,20 +0,0 @@
|
|||||||
//
|
|
||||||
// Do any local configuration here
|
|
||||||
//
|
|
||||||
|
|
||||||
// Consider adding the 1918 zones here, if they are not used in your
|
|
||||||
// organization
|
|
||||||
//include "/etc/bind/zones.rfc1918";
|
|
||||||
|
|
||||||
// zone directe
|
|
||||||
zone "domaine.lan" {
|
|
||||||
type master;
|
|
||||||
file "/etc/bind/db.domaine.lan";
|
|
||||||
};
|
|
||||||
|
|
||||||
// zone inverse
|
|
||||||
zone "0.168.192.in-addr.arpa" {
|
|
||||||
type master;
|
|
||||||
notify no;
|
|
||||||
file "/etc/bind/db.domaine.lan.rev";
|
|
||||||
};
|
|
@ -1,24 +0,0 @@
|
|||||||
options {
|
|
||||||
directory "/var/cache/bind";
|
|
||||||
|
|
||||||
// If there is a firewall between you and nameservers you want
|
|
||||||
// to talk to, you may need to fix the firewall to allow multiple
|
|
||||||
// ports to talk. See http://www.kb.cert.org/vuls/id/800113
|
|
||||||
|
|
||||||
// If your ISP provided one or more IP addresses for stable
|
|
||||||
// nameservers, you probably want to use them as forwarders.
|
|
||||||
// Uncomment the following block, and insert the addresses replacing
|
|
||||||
// the all-0's placeholder.
|
|
||||||
|
|
||||||
forwarders {
|
|
||||||
10.121.38.7;
|
|
||||||
};
|
|
||||||
|
|
||||||
//========================================================================
|
|
||||||
// If BIND logs error messages about the root key being expired,
|
|
||||||
// you will need to update your keys. See https://www.isc.org/bind-keys
|
|
||||||
//========================================================================
|
|
||||||
dnssec-validation no;
|
|
||||||
|
|
||||||
listen-on-v6 { any; };
|
|
||||||
};
|
|
@ -1,3 +0,0 @@
|
|||||||
domain domaine.lan
|
|
||||||
search domaine.lan
|
|
||||||
nameserver 127.0.0.1
|
|
12
Sio1/SISR1/30-FiltrageEtDMZ/fw0.sh
Normal file
12
Sio1/SISR1/30-FiltrageEtDMZ/fw0.sh
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
IFEXT=enp0s3
|
||||||
|
IFDMZ=enp0s8
|
||||||
|
IFINT=enp0s9
|
||||||
|
|
||||||
|
# ici instruction pour activer le routage
|
||||||
|
sysctl -w net.ipv4.ip_forward=1
|
||||||
|
# ici instructions pour definir les stratégies par defaut (etape 1)
|
||||||
|
|
||||||
|
# ici instructions pour remettre a zero les chaines filter et nat (etape 1)
|
||||||
|
|
21
Sio1/SISR1/30-FiltrageEtDMZ/fw1.sh
Executable file
21
Sio1/SISR1/30-FiltrageEtDMZ/fw1.sh
Executable file
@ -0,0 +1,21 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
IFEXT=enp0s3
|
||||||
|
IFDMZ=enp0s8
|
||||||
|
IFINT=enp0s9
|
||||||
|
|
||||||
|
# ici instruction pour activer le routage
|
||||||
|
sysctl -w net.ipv4.ip_forward=1
|
||||||
|
|
||||||
|
# ici instructions pour definir les stratégies par defaut (etape 1)
|
||||||
|
sudo iptables -P INPUT DROP
|
||||||
|
sudo iptables -P OUTPUT DROP
|
||||||
|
sudo iptables -P FORWARD DROP
|
||||||
|
|
||||||
|
# ici instructions pour remettre a zero les chaines filter et nat (etape 1)
|
||||||
|
sudo iptables -F -t nat
|
||||||
|
sudo iptables -F -t filter
|
||||||
|
|
||||||
|
# autorise le loopback
|
||||||
|
sudo iptables -A INPUT -i lo -j ACCEPT
|
||||||
|
sudo iptables -A OUTPUT -o lo -j ACCEPT
|
28
Sio1/SISR1/30-FiltrageEtDMZ/fw2.sh
Executable file
28
Sio1/SISR1/30-FiltrageEtDMZ/fw2.sh
Executable file
@ -0,0 +1,28 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
set -e
|
||||||
|
set -u
|
||||||
|
|
||||||
|
IFEXT=enp0s3
|
||||||
|
IFDMZ=enp0s8
|
||||||
|
IFINT=enp0s9
|
||||||
|
|
||||||
|
# ici instruction pour activer le routage
|
||||||
|
sysctl -w net.ipv4.ip_forward=1
|
||||||
|
|
||||||
|
# ici instructions pour definir les stratégies par defaut (etape 1)
|
||||||
|
sudo iptables -P INPUT DROP
|
||||||
|
sudo iptables -P OUTPUT DROP
|
||||||
|
sudo iptables -P FORWARD DROP
|
||||||
|
|
||||||
|
# ici instructions pour remettre a zero les chaines filter et nat (etape 1)
|
||||||
|
sudo iptables -F -t nat
|
||||||
|
sudo iptables -F -t filter
|
||||||
|
|
||||||
|
# autorise le loopback
|
||||||
|
sudo iptables -A INPUT -i lo -j ACCEPT
|
||||||
|
sudo iptables -A OUTPUT -o lo -j ACCEPT
|
||||||
|
|
||||||
|
# Connection ssh
|
||||||
|
|
||||||
|
sudo iptables -A INPUT -p tcp --dport 22 -j ACCEPT #entrée
|
||||||
|
sudo iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT #sortie
|
36
Sio1/SISR1/30-FiltrageEtDMZ/fw3.sh
Executable file
36
Sio1/SISR1/30-FiltrageEtDMZ/fw3.sh
Executable file
@ -0,0 +1,36 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
set -e
|
||||||
|
set -u
|
||||||
|
|
||||||
|
IFEXT=enp0s3
|
||||||
|
IFDMZ=enp0s8
|
||||||
|
IFINT=enp0s9
|
||||||
|
|
||||||
|
# ici instruction pour activer le routage
|
||||||
|
sysctl -w net.ipv4.ip_forward=1
|
||||||
|
|
||||||
|
# ici instructions pour definir les stratégies par defaut (etape 1)
|
||||||
|
sudo iptables -P INPUT DROP
|
||||||
|
sudo iptables -P OUTPUT DROP
|
||||||
|
sudo iptables -P FORWARD DROP
|
||||||
|
|
||||||
|
# ici instructions pour remettre a zero les chaines filter et nat (etape 1)
|
||||||
|
sudo iptables -F -t nat
|
||||||
|
sudo iptables -F -t filter
|
||||||
|
|
||||||
|
# Loopback
|
||||||
|
sudo iptables -A INPUT -i lo -j ACCEPT
|
||||||
|
sudo iptables -A OUTPUT -o lo -j ACCEPT
|
||||||
|
|
||||||
|
# Connexion ssh serveur
|
||||||
|
sudo iptables -A INPUT -p tcp --dport 22 -j ACCEPT #entrée
|
||||||
|
sudo iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT #sortie
|
||||||
|
|
||||||
|
# Requete DNS client
|
||||||
|
sudo iptables -A OUTPUT -p udp --dport 53 -j ACCEPT
|
||||||
|
sudo iptables -A INPUT -p udp --sport 53 -j ACCEPT
|
||||||
|
|
||||||
|
# Acces HTTP client
|
||||||
|
sudo iptables -A OUTPUT -p udp --dport 80 -j ACCEPT
|
||||||
|
sudo iptables -A INPUT -p udp --sport 80 -j ACCEPT
|
||||||
|
|
41
Sio1/SISR1/30-FiltrageEtDMZ/fw4.sh
Executable file
41
Sio1/SISR1/30-FiltrageEtDMZ/fw4.sh
Executable file
@ -0,0 +1,41 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
set -e
|
||||||
|
set -u
|
||||||
|
|
||||||
|
IFEXT=enp0s3
|
||||||
|
IFDMZ=enp0s8
|
||||||
|
IFINT=enp0s9
|
||||||
|
|
||||||
|
# ici instruction pour activer le routage
|
||||||
|
sysctl -w net.ipv4.ip_forward=1
|
||||||
|
|
||||||
|
# ici instructions pour definir les stratégies par defaut (etape 1)
|
||||||
|
sudo iptables -P INPUT DROP
|
||||||
|
sudo iptables -P OUTPUT DROP
|
||||||
|
sudo iptables -P FORWARD DROP
|
||||||
|
|
||||||
|
# ici instructions pour remettre a zero les chaines filter et nat (etape 1)
|
||||||
|
sudo iptables -F -t nat
|
||||||
|
sudo iptables -F -t filter
|
||||||
|
|
||||||
|
# Loopback
|
||||||
|
sudo iptables -A INPUT -i lo -j ACCEPT
|
||||||
|
sudo iptables -A OUTPUT -o lo -j ACCEPT
|
||||||
|
|
||||||
|
# Connexion ssh serveur
|
||||||
|
sudo iptables -A INPUT -p tcp --dport 22 -j ACCEPT #entrée
|
||||||
|
sudo iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT #sortie
|
||||||
|
|
||||||
|
# Requete DNS client
|
||||||
|
sudo iptables -A OUTPUT -p udp --dport 53 -j ACCEPT
|
||||||
|
sudo iptables -A INPUT -p udp --sport 53 -j ACCEPT
|
||||||
|
|
||||||
|
# Acces HTTP client
|
||||||
|
sudo iptables -A OUTPUT -p udp --dport 80 -j ACCEPT
|
||||||
|
sudo iptables -A INPUT -p udp --sport 80 -j ACCEPT
|
||||||
|
|
||||||
|
# NAT sur la carte exterieur (pouvoir curl une machine de l'autre coter)
|
||||||
|
sudo iptables -t nat -A POSTROUTING -o "${IFEXT}" -j MASQUERADE -s 10.0.0.0/16
|
||||||
|
#sudo iptables -L -t nat # pour controler
|
||||||
|
sudo iptables -A FORWARD -j ACCEPT
|
||||||
|
|
46
Sio1/SISR1/30-FiltrageEtDMZ/fw5-1.sh
Executable file
46
Sio1/SISR1/30-FiltrageEtDMZ/fw5-1.sh
Executable file
@ -0,0 +1,46 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
set -e
|
||||||
|
set -u
|
||||||
|
|
||||||
|
IFEXT=enp0s3
|
||||||
|
IFDMZ=enp0s8
|
||||||
|
IFINT=enp0s9
|
||||||
|
|
||||||
|
# ici instruction pour activer le routage
|
||||||
|
sysctl -w net.ipv4.ip_forward=1
|
||||||
|
|
||||||
|
# ici instructions pour definir les stratégies par defaut (etape 1)
|
||||||
|
sudo iptables -P INPUT DROP
|
||||||
|
sudo iptables -P OUTPUT DROP
|
||||||
|
sudo iptables -P FORWARD DROP
|
||||||
|
|
||||||
|
# ici instructions pour remettre a zero les chaines filter et nat (etape 1)
|
||||||
|
sudo iptables -F -t nat
|
||||||
|
sudo iptables -F -t filter
|
||||||
|
|
||||||
|
# Loopback
|
||||||
|
sudo iptables -A INPUT -i lo -j ACCEPT
|
||||||
|
sudo iptables -A OUTPUT -o lo -j ACCEPT
|
||||||
|
|
||||||
|
# Connexion ssh serveur
|
||||||
|
sudo iptables -A INPUT -p tcp --dport 22 -j ACCEPT #entrée
|
||||||
|
sudo iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT #sortie
|
||||||
|
|
||||||
|
# Requete DNS client
|
||||||
|
sudo iptables -A OUTPUT -p udp --dport 53 -j ACCEPT
|
||||||
|
sudo iptables -A INPUT -p udp --sport 53 -j ACCEPT
|
||||||
|
|
||||||
|
# Acces HTTP client
|
||||||
|
sudo iptables -A OUTPUT -p udp --dport 80 -j ACCEPT
|
||||||
|
sudo iptables -A INPUT -p udp --sport 80 -j ACCEPT
|
||||||
|
|
||||||
|
# NAT sur la carte exterieur (pouvoir curl une machine de l'autre coter)
|
||||||
|
sudo iptables -t nat -A POSTROUTING -o "${IFEXT}" -j MASQUERADE -s 10.0.0.0/16
|
||||||
|
sudo iptables -t nat -A POSTROUTING -o "${IFEXT}" -j MASQUERADE -s 172.16.0.0/16
|
||||||
|
#sudo iptables -L -t nat # pour controler
|
||||||
|
sudo iptables -A FORWARD -j ACCEPT
|
||||||
|
|
||||||
|
# Acces DNS sortante
|
||||||
|
sudo iptables -A FORWARD -p udp --dport 53 -j ACCEPT
|
||||||
|
sudo iptables -A FORWARD -p udp --sport 53 -j ACCEPT
|
||||||
|
|
Reference in New Issue
Block a user