Compare commits
6 Commits
Author | SHA1 | Date | |
---|---|---|---|
|
b0181d43a7 | ||
|
44c9e9c290 | ||
ea17c40313 | |||
|
4de0324acf | ||
|
c0206dfe3c | ||
|
0ed3b921ed |
@@ -14,8 +14,8 @@ Pour chaque machine intéressante
|
||||
on taggue : git tag v.0.1
|
||||
on vérifie : git status
|
||||
on renvoie sur le dépôt amont : git push
|
||||
on renvoie les tags : git push –tag
|
||||
on renvoie les tags : git push --tag
|
||||
vérifier ensuite que les fichiers sont bien remontés sur le dépôt amont
|
||||
exemple d'arborescence :
|
||||
|
||||
|
||||
|
||||
|
22
sio1/02-dns/esclave/named.conf.local
Normal file
22
sio1/02-dns/esclave/named.conf.local
Normal file
@@ -0,0 +1,22 @@
|
||||
//
|
||||
// Do any local configuration here
|
||||
//
|
||||
|
||||
// Consider adding the 1918 zones here, if they are not used in your
|
||||
// organization
|
||||
//include "/etc/bind/zones.rfc1918";
|
||||
zone "domaine.lan" {
|
||||
type slave;
|
||||
file "/etc/bind/db.domaine.lan";
|
||||
masters { 192.168.0.29; };
|
||||
masterfile-format text;
|
||||
};
|
||||
|
||||
// zone inverse
|
||||
zone "0.168.192.in-addr.arpa" {
|
||||
type slave;
|
||||
notify no;
|
||||
file "/etc/bind/db.domaine.lan.rev";
|
||||
masters { 192.168.0.29; };
|
||||
masterfile-format text;
|
||||
};
|
8572
sio1/03-squid/squid.conf
Normal file
8572
sio1/03-squid/squid.conf
Normal file
File diff suppressed because it is too large
Load Diff
3
sio1/ferm/tppf/fw.sh
Executable file
3
sio1/ferm/tppf/fw.sh
Executable file
@@ -0,0 +1,3 @@
|
||||
#!/bin/bash
|
||||
sysctl -w net.ipv4.ip_forward=1
|
||||
|
11
sio1/ferm/tppf/fw1.sh
Executable file
11
sio1/ferm/tppf/fw1.sh
Executable file
@@ -0,0 +1,11 @@
|
||||
#!/bin/bash
|
||||
sysctl -w net.ipv4.ip_forward=1
|
||||
iptables -F -t filter
|
||||
iptables -F nat
|
||||
|
||||
iptables -P INPUT DROP
|
||||
iptables -P OUTPUT DROP
|
||||
iptables -P FORWARD DROP
|
||||
|
||||
iptables -A INPUT -p tcp --dport 22 -j ACCEPT
|
||||
iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT
|
20
sio1/ferm/tppf/fw3.sh
Executable file
20
sio1/ferm/tppf/fw3.sh
Executable file
@@ -0,0 +1,20 @@
|
||||
#!/bin/bash
|
||||
sysctl -w net.ipv4.ip_forward=1
|
||||
iptables -F -t filter
|
||||
iptables -F nat
|
||||
|
||||
iptables -P INPUT DROP
|
||||
iptables -P OUTPUT DROP
|
||||
iptables -P FORWARD DROP
|
||||
|
||||
iptables -A INPUT -p tcp --dport 22 -j ACCEPT
|
||||
iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT
|
||||
|
||||
iptables -A OUTPUT -p tcp --dport 80 -j ACCEPT
|
||||
iptables -A INPUT -p tcp --sport 80 -j ACCEPT
|
||||
|
||||
iptables -A OUTPUT -p udp --dport 53 -j ACCEPT
|
||||
iptables -A INPUT -p udp --sport 53 -j ACCEPT
|
||||
|
||||
iptables -A OUTPUT -p tcp -d 10.121.38.1 --dport 8080 -j ACCEPT
|
||||
iptables -A INPUT -p tcp -d 10.121.38.1 --sport 8080 -j ACCEPT
|
16
sio1/ferm/tppf/fw3.sh.save
Executable file
16
sio1/ferm/tppf/fw3.sh.save
Executable file
@@ -0,0 +1,16 @@
|
||||
#!/bin/bash
|
||||
sysctl -w net.ipv4.ip_forward=1
|
||||
iptables -F -t filter
|
||||
iptables -F nat
|
||||
|
||||
iptables -P INPUT DROP
|
||||
iptables -P OUTPUT DROP
|
||||
iptables -P FORWARD DROP
|
||||
|
||||
iptables -A INPUT -p tcp --dport 22 -j ACCEPT
|
||||
iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT
|
||||
|
||||
iptables -A INPUT -p tcp --dport 22 -j ACCEPT
|
||||
iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT
|
||||
iptables -A INPUT -p tcp --dport 22 -j ACCEPT
|
||||
iptables -A OUTPUT
|
22
sio1/ferm/tppf/fw3.sh.save.1
Executable file
22
sio1/ferm/tppf/fw3.sh.save.1
Executable file
@@ -0,0 +1,22 @@
|
||||
iptables -A INPUT -p tcp --dport 22 -j ACCEPT
|
||||
iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT
|
||||
iptables -A INPUT -p tcp --dport 22 -j ACCEPT
|
||||
iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT
|
||||
iptables -A INPUT -p tcp --dport 22 -j ACCEPT
|
||||
iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT
|
||||
#!/bin/bash
|
||||
sysctl -w net.ipv4.ip_forward=1
|
||||
iptables -F -t filter
|
||||
iptables -F nat
|
||||
|
||||
iptables -P INPUT DROP
|
||||
iptables -P OUTPUT DROP
|
||||
iptables -P FORWARD DROP
|
||||
|
||||
iptables -A INPUT -p tcp --dport 22 -j ACCEPT
|
||||
iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT
|
||||
|
||||
iptables -A INPUT -p tcp -m multiport --dports 53,80,21 -j ACCEPT
|
||||
iptables -A OUTPUT -p tcp -m multiport --sports 53,80,21 -j ACCEPT
|
||||
|
||||
|
27
sio1/ferm/tppf/fw4.sh
Executable file
27
sio1/ferm/tppf/fw4.sh
Executable file
@@ -0,0 +1,27 @@
|
||||
#!/bin/bash
|
||||
sysctl -w net.ipv4.ip_forward=1
|
||||
iptables -F -t filter
|
||||
iptables -F nat
|
||||
|
||||
iptables -P INPUT DROP
|
||||
iptables -P OUTPUT DROP
|
||||
iptables -P FORWARD DROP
|
||||
|
||||
iptables -A INPUT -p tcp --dport 22 -j ACCEPT
|
||||
iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT
|
||||
|
||||
iptables -A OUTPUT -p tcp --dport 80 -j ACCEPT
|
||||
iptables -A INPUT -p tcp --sport 80 -j ACCEPT
|
||||
|
||||
iptables -A OUTPUT -p udp --dport 53 -j ACCEPT
|
||||
iptables -A INPUT -p udp --sport 53 -j ACCEPT
|
||||
|
||||
iptables -A OUTPUT -p tcp -d 10.121.38.1 --dport 8080 -j ACCEPT
|
||||
iptables -A INPUT -p tcp -d 10.121.38.1 --sport 8080 -j ACCEPT
|
||||
|
||||
iptables -t nat -A POSTROUTING -o enp0s3 -j MASQUERADE
|
||||
iptables -A FORWARD -o enp0s3 -j ACCEPT
|
||||
iptables -A FORWARD -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
|
||||
|
||||
|
||||
|
5
sio2/sisr/05-lvs/lvs
Executable file
5
sio2/sisr/05-lvs/lvs
Executable file
@@ -0,0 +1,5 @@
|
||||
#!/bin/bash
|
||||
echo "1" > /proc/sys/net/ipv4/ip_forward
|
||||
ipvsadm -A -t 192.168.0.160:80 -s rr
|
||||
ipvsadm -a -t 192.168.0.160:80 -r 172.16.0.11:80 -m
|
||||
ipvsadm -a -t 192.168.0.160:80 -r 172.16.0.12:80 -m
|
5
sio2/sisr/05-lvs/recup
Executable file
5
sio2/sisr/05-lvs/recup
Executable file
@@ -0,0 +1,5 @@
|
||||
#!/bin/bash
|
||||
while [ true ]
|
||||
do
|
||||
curl -s http://192.168.0.160 -o /dev/null
|
||||
done
|
Reference in New Issue
Block a user