Compare commits
6 Commits
Author | SHA1 | Date | |
---|---|---|---|
|
44c9e9c290 | ||
ea17c40313 | |||
|
4de0324acf | ||
|
c0206dfe3c | ||
|
0ed3b921ed | ||
|
cc1a97efba |
@@ -14,8 +14,8 @@ Pour chaque machine intéressante
|
|||||||
on taggue : git tag v.0.1
|
on taggue : git tag v.0.1
|
||||||
on vérifie : git status
|
on vérifie : git status
|
||||||
on renvoie sur le dépôt amont : git push
|
on renvoie sur le dépôt amont : git push
|
||||||
on renvoie les tags : git push –tag
|
on renvoie les tags : git push --tag
|
||||||
vérifier ensuite que les fichiers sont bien remontés sur le dépôt amont
|
vérifier ensuite que les fichiers sont bien remontés sur le dépôt amont
|
||||||
exemple d'arborescence :
|
|
||||||
|
|
||||||
|
|
||||||
|
21
sio1/02-dns/db.domaine.lan
Normal file
21
sio1/02-dns/db.domaine.lan
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
;
|
||||||
|
; BIND data file for local loopback interface
|
||||||
|
;
|
||||||
|
$TTL 604800
|
||||||
|
domaine.lan. IN SOA srv1.domaine.lan. root.srv1.domaine.lan. (
|
||||||
|
2 ; Serial
|
||||||
|
604800 ; Refresh
|
||||||
|
86400 ; Retry
|
||||||
|
2419200 ; Expire
|
||||||
|
604800 ) ; Negative Cache TTL
|
||||||
|
|
||||||
|
;
|
||||||
|
|
||||||
|
NS srv1.domaine.lan.
|
||||||
|
srv1.domaine.lan. A 192.168.0.29
|
||||||
|
srv2.domaine.lan. A 192.168.0.41
|
||||||
|
|
||||||
|
$ORIGIN domaine.lan.
|
||||||
|
poste1 A 192.168.0.22
|
||||||
|
www CNAME poste1.domaine.lan.
|
||||||
|
|
19
sio1/02-dns/db.domaine.lan.rev
Normal file
19
sio1/02-dns/db.domaine.lan.rev
Normal file
@@ -0,0 +1,19 @@
|
|||||||
|
;
|
||||||
|
; BIND data file for local loopback interface
|
||||||
|
;
|
||||||
|
$TTL 604800
|
||||||
|
@ IN SOA srv1.domaine.lan. root.domaine.lan. (
|
||||||
|
2021022600 ; Serial
|
||||||
|
604800 ; Refresh
|
||||||
|
86400 ; Retry
|
||||||
|
2419200 ; Expire
|
||||||
|
604800 ) ; Negative Cache TTL
|
||||||
|
;
|
||||||
|
IN NS srv1.domaine.lan.
|
||||||
|
srv1.domaine.lan. A 192.168.0.29
|
||||||
|
srv2.domaine.lan. A 192.168.0.41
|
||||||
|
|
||||||
|
29 IN PTR srv1.domaine.lan.
|
||||||
|
22 IN PTR poste1.domaine.lan.
|
||||||
|
41 IN PTR srv2.domaine.lan.
|
||||||
|
|
22
sio1/02-dns/esclave/named.conf.local
Normal file
22
sio1/02-dns/esclave/named.conf.local
Normal file
@@ -0,0 +1,22 @@
|
|||||||
|
//
|
||||||
|
// Do any local configuration here
|
||||||
|
//
|
||||||
|
|
||||||
|
// Consider adding the 1918 zones here, if they are not used in your
|
||||||
|
// organization
|
||||||
|
//include "/etc/bind/zones.rfc1918";
|
||||||
|
zone "domaine.lan" {
|
||||||
|
type slave;
|
||||||
|
file "/etc/bind/db.domaine.lan";
|
||||||
|
masters { 192.168.0.29; };
|
||||||
|
masterfile-format text;
|
||||||
|
};
|
||||||
|
|
||||||
|
// zone inverse
|
||||||
|
zone "0.168.192.in-addr.arpa" {
|
||||||
|
type slave;
|
||||||
|
notify no;
|
||||||
|
file "/etc/bind/db.domaine.lan.rev";
|
||||||
|
masters { 192.168.0.29; };
|
||||||
|
masterfile-format text;
|
||||||
|
};
|
17
sio1/02-dns/named.conf.local
Normal file
17
sio1/02-dns/named.conf.local
Normal file
@@ -0,0 +1,17 @@
|
|||||||
|
//
|
||||||
|
// Do any local configuration here
|
||||||
|
//
|
||||||
|
|
||||||
|
// Consider adding the 1918 zones here, if they are not used in your
|
||||||
|
// organization
|
||||||
|
//include "/etc/bind/zones.rfc1918";
|
||||||
|
zone "domaine.lan" {
|
||||||
|
type master;
|
||||||
|
file "/etc/bind/db.domaine.lan";
|
||||||
|
};
|
||||||
|
|
||||||
|
zone "0.168.192.in-addr.arpa" {
|
||||||
|
type master;
|
||||||
|
notify no;
|
||||||
|
file "/etc/bind/db.domaine.lan.rev";
|
||||||
|
};
|
24
sio1/02-dns/named.conf.options
Normal file
24
sio1/02-dns/named.conf.options
Normal file
@@ -0,0 +1,24 @@
|
|||||||
|
options {
|
||||||
|
directory "/var/cache/bind";
|
||||||
|
|
||||||
|
// If there is a firewall between you and nameservers you want
|
||||||
|
// to talk to, you may need to fix the firewall to allow multiple
|
||||||
|
// ports to talk. See http://www.kb.cert.org/vuls/id/800113
|
||||||
|
|
||||||
|
// If your ISP provided one or more IP addresses for stable
|
||||||
|
// nameservers, you probably want to use them as forwarders.
|
||||||
|
// Uncomment the following block, and insert the addresses replacing
|
||||||
|
// the all-0's placeholder.
|
||||||
|
|
||||||
|
forwarders {
|
||||||
|
192.168.0.1;
|
||||||
|
};
|
||||||
|
|
||||||
|
//========================================================================
|
||||||
|
// If BIND logs error messages about the root key being expired,
|
||||||
|
// you will need to update your keys. See https://www.isc.org/bind-keys
|
||||||
|
//========================================================================
|
||||||
|
dnssec-validation no;
|
||||||
|
|
||||||
|
listen-on-v6 { any; };
|
||||||
|
};
|
8572
sio1/03-squid/squid.conf
Normal file
8572
sio1/03-squid/squid.conf
Normal file
File diff suppressed because it is too large
Load Diff
3
sio1/ferm/tppf/fw.sh
Executable file
3
sio1/ferm/tppf/fw.sh
Executable file
@@ -0,0 +1,3 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
sysctl -w net.ipv4.ip_forward=1
|
||||||
|
|
11
sio1/ferm/tppf/fw1.sh
Executable file
11
sio1/ferm/tppf/fw1.sh
Executable file
@@ -0,0 +1,11 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
sysctl -w net.ipv4.ip_forward=1
|
||||||
|
iptables -F -t filter
|
||||||
|
iptables -F nat
|
||||||
|
|
||||||
|
iptables -P INPUT DROP
|
||||||
|
iptables -P OUTPUT DROP
|
||||||
|
iptables -P FORWARD DROP
|
||||||
|
|
||||||
|
iptables -A INPUT -p tcp --dport 22 -j ACCEPT
|
||||||
|
iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT
|
20
sio1/ferm/tppf/fw3.sh
Executable file
20
sio1/ferm/tppf/fw3.sh
Executable file
@@ -0,0 +1,20 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
sysctl -w net.ipv4.ip_forward=1
|
||||||
|
iptables -F -t filter
|
||||||
|
iptables -F nat
|
||||||
|
|
||||||
|
iptables -P INPUT DROP
|
||||||
|
iptables -P OUTPUT DROP
|
||||||
|
iptables -P FORWARD DROP
|
||||||
|
|
||||||
|
iptables -A INPUT -p tcp --dport 22 -j ACCEPT
|
||||||
|
iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT
|
||||||
|
|
||||||
|
iptables -A OUTPUT -p tcp --dport 80 -j ACCEPT
|
||||||
|
iptables -A INPUT -p tcp --sport 80 -j ACCEPT
|
||||||
|
|
||||||
|
iptables -A OUTPUT -p udp --dport 53 -j ACCEPT
|
||||||
|
iptables -A INPUT -p udp --sport 53 -j ACCEPT
|
||||||
|
|
||||||
|
iptables -A OUTPUT -p tcp -d 10.121.38.1 --dport 8080 -j ACCEPT
|
||||||
|
iptables -A INPUT -p tcp -d 10.121.38.1 --sport 8080 -j ACCEPT
|
16
sio1/ferm/tppf/fw3.sh.save
Executable file
16
sio1/ferm/tppf/fw3.sh.save
Executable file
@@ -0,0 +1,16 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
sysctl -w net.ipv4.ip_forward=1
|
||||||
|
iptables -F -t filter
|
||||||
|
iptables -F nat
|
||||||
|
|
||||||
|
iptables -P INPUT DROP
|
||||||
|
iptables -P OUTPUT DROP
|
||||||
|
iptables -P FORWARD DROP
|
||||||
|
|
||||||
|
iptables -A INPUT -p tcp --dport 22 -j ACCEPT
|
||||||
|
iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT
|
||||||
|
|
||||||
|
iptables -A INPUT -p tcp --dport 22 -j ACCEPT
|
||||||
|
iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT
|
||||||
|
iptables -A INPUT -p tcp --dport 22 -j ACCEPT
|
||||||
|
iptables -A OUTPUT
|
22
sio1/ferm/tppf/fw3.sh.save.1
Executable file
22
sio1/ferm/tppf/fw3.sh.save.1
Executable file
@@ -0,0 +1,22 @@
|
|||||||
|
iptables -A INPUT -p tcp --dport 22 -j ACCEPT
|
||||||
|
iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT
|
||||||
|
iptables -A INPUT -p tcp --dport 22 -j ACCEPT
|
||||||
|
iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT
|
||||||
|
iptables -A INPUT -p tcp --dport 22 -j ACCEPT
|
||||||
|
iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT
|
||||||
|
#!/bin/bash
|
||||||
|
sysctl -w net.ipv4.ip_forward=1
|
||||||
|
iptables -F -t filter
|
||||||
|
iptables -F nat
|
||||||
|
|
||||||
|
iptables -P INPUT DROP
|
||||||
|
iptables -P OUTPUT DROP
|
||||||
|
iptables -P FORWARD DROP
|
||||||
|
|
||||||
|
iptables -A INPUT -p tcp --dport 22 -j ACCEPT
|
||||||
|
iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT
|
||||||
|
|
||||||
|
iptables -A INPUT -p tcp -m multiport --dports 53,80,21 -j ACCEPT
|
||||||
|
iptables -A OUTPUT -p tcp -m multiport --sports 53,80,21 -j ACCEPT
|
||||||
|
|
||||||
|
|
27
sio1/ferm/tppf/fw4.sh
Executable file
27
sio1/ferm/tppf/fw4.sh
Executable file
@@ -0,0 +1,27 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
sysctl -w net.ipv4.ip_forward=1
|
||||||
|
iptables -F -t filter
|
||||||
|
iptables -F nat
|
||||||
|
|
||||||
|
iptables -P INPUT DROP
|
||||||
|
iptables -P OUTPUT DROP
|
||||||
|
iptables -P FORWARD DROP
|
||||||
|
|
||||||
|
iptables -A INPUT -p tcp --dport 22 -j ACCEPT
|
||||||
|
iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT
|
||||||
|
|
||||||
|
iptables -A OUTPUT -p tcp --dport 80 -j ACCEPT
|
||||||
|
iptables -A INPUT -p tcp --sport 80 -j ACCEPT
|
||||||
|
|
||||||
|
iptables -A OUTPUT -p udp --dport 53 -j ACCEPT
|
||||||
|
iptables -A INPUT -p udp --sport 53 -j ACCEPT
|
||||||
|
|
||||||
|
iptables -A OUTPUT -p tcp -d 10.121.38.1 --dport 8080 -j ACCEPT
|
||||||
|
iptables -A INPUT -p tcp -d 10.121.38.1 --sport 8080 -j ACCEPT
|
||||||
|
|
||||||
|
iptables -t nat -A POSTROUTING -o enp0s3 -j MASQUERADE
|
||||||
|
iptables -A FORWARD -o enp0s3 -j ACCEPT
|
||||||
|
iptables -A FORWARD -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
|
||||||
|
|
||||||
|
|
||||||
|
|
5
sio2/sisr/05-lvs/lvs
Executable file
5
sio2/sisr/05-lvs/lvs
Executable file
@@ -0,0 +1,5 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
echo "1" > /proc/sys/net/ipv4/ip_forward
|
||||||
|
ipvsadm -A -t 192.168.0.160:80 -s rr
|
||||||
|
ipvsadm -a -t 192.168.0.160:80 -r 172.16.0.11:80 -m
|
||||||
|
ipvsadm -a -t 192.168.0.160:80 -r 172.16.0.12:80 -m
|
Reference in New Issue
Block a user