documentazione_3di_riservata:manuali_sysadmin:sallustio
Differenze
Queste sono le differenze tra la revisione selezionata e la versione attuale della pagina.
Entrambe le parti precedenti la revisioneRevisione precedenteProssima revisione | Revisione precedente | ||
documentazione_3di_riservata:manuali_sysadmin:sallustio [2017/10/11 11:56] – mpascale | documentazione_3di_riservata:manuali_sysadmin:sallustio [Data sconosciuta] (versione attuale) – eliminata - modifica esterna (Data sconosciuta) 127.0.0.1 | ||
---|---|---|---|
Linea 1: | Linea 1: | ||
- | ==== Sallustio ==== | ||
- | === Configurazione Interfacce === | ||
- | "/ | ||
- | <code bash net> | ||
- | # This blank configuration will automatically use DHCP for any net.* | ||
- | # scripts in / | ||
- | # please review / | ||
- | # in / | ||
- | |||
- | ns_domain_lo=" | ||
- | dns_domain_eth0=" | ||
- | dns_domain_eth1=" | ||
- | dns_domain_eth2=" | ||
- | nis_domain_lo=" | ||
- | nis_domain_eth0=" | ||
- | nis_domain_eth1=" | ||
- | nis_domain_eth2=" | ||
- | ns_search_lo=" | ||
- | dns_search_eth0=" | ||
- | dns_search_eth1=" | ||
- | dns_search_eth2=" | ||
- | nis_search_lo=" | ||
- | nis_search_eth0=" | ||
- | nis_search_eth1=" | ||
- | nis_search_eth2=" | ||
- | domainname=" | ||
- | |||
- | dns_servers=" | ||
- | |||
- | config_eth0=" | ||
- | |||
- | config_eth1=" | ||
- | |||
- | config_eth2=" | ||
- | 93.149.47.163 netmask 255.255.255.248 broadcast 92.223.169.87 | ||
- | 93.149.47.164 netmask 255.255.255.248 broadcast 92.223.169.87 | ||
- | 93.149.47.165 netmask 255.255.255.248 broadcast 92.223.169.87 | ||
- | 93.149.47.166 netmask 255.255.255.248 broadcast 92.223.169.87" | ||
- | routes_eth2=" | ||
- | </ | ||
- | |||
- | === Configurazione Firewall === | ||
- | |||
- | <code bash firewall> | ||
- | #!/bin/bash | ||
- | |||
- | # i = interface | ||
- | # n = net | ||
- | # h = host | ||
- | |||
- | iLAN=eth0 | ||
- | iDMZ=eth1 | ||
- | iWAN=eth2 | ||
- | iLO=lo | ||
- | nLAN=10.17.61.0/ | ||
- | nDMZ=10.17.62.80/ | ||
- | # | ||
- | nWAN=93.149.47.160/ | ||
- | nCH=37.235.56.141 | ||
- | ndw4=213.183.146.126 | ||
- | #h1 = dns1 = titano/ | ||
- | # | ||
- | h1DMZint=10.17.62.85 | ||
- | # | ||
- | # | ||
- | h1DMZext=93.149.47.165 | ||
- | #h2 = dns3 | ||
- | # | ||
- | h2DMZint=10.17.62.86 | ||
- | # | ||
- | # | ||
- | h2DMZext=93.149.47.166 | ||
- | #h3 = 3didemo | ||
- | # | ||
- | h3DMZint=10.17.62.83 | ||
- | # | ||
- | # | ||
- | h3DMZext=93.149.47.163 | ||
- | #h4 = xenit | ||
- | # | ||
- | h4DMZint=10.17.62.84 | ||
- | # | ||
- | # | ||
- | h4DMZext=93.149.47.164 | ||
- | #h sallustio | ||
- | # | ||
- | hMEint=10.17.62.82 | ||
- | # | ||
- | # | ||
- | hMEext=93.149.47.162 | ||
- | |||
- | |||
- | # NON UTILIZZATO | ||
- | # | ||
- | |||
- | iptables -P INPUT ACCEPT | ||
- | iptables -P OUTPUT ACCEPT | ||
- | iptables -P FORWARD ACCEPT | ||
- | |||
- | iptables -F | ||
- | iptables -t nat -F | ||
- | |||
- | iptables -F WAN | ||
- | iptables -X WAN | ||
- | iptables -N WAN | ||
- | |||
- | iptables -F LAN | ||
- | iptables -X LAN | ||
- | iptables -N LAN | ||
- | |||
- | iptables -F DMZ | ||
- | iptables -X DMZ | ||
- | iptables -N DMZ | ||
- | |||
- | iptables -F WANFORWARD | ||
- | iptables -X WANFORWARD | ||
- | iptables -N WANFORWARD | ||
- | |||
- | iptables -F LANFORWARD | ||
- | iptables -X LANFORWARD | ||
- | iptables -N LANFORWARD | ||
- | |||
- | iptables -F DMZFORWARD | ||
- | iptables -X DMZFORWARD | ||
- | iptables -N DMZFORWARD | ||
- | |||
- | iptables -F BLACKLIST | ||
- | iptables -X BLACKLIST | ||
- | iptables -N BLACKLIST | ||
- | |||
- | iptables -F MARTIANS | ||
- | iptables -X MARTIANS | ||
- | iptables -N MARTIANS | ||
- | |||
- | iptables -F LOGFORWARD | ||
- | iptables -X LOGFORWARD | ||
- | iptables -N LOGFORWARD | ||
- | |||
- | |||
- | # WAN input rules | ||
- | iptables -A WAN -j BLACKLIST | ||
- | iptables -A WAN -m conntrack --ctstate ESTABLISHED, | ||
- | |||
- | # LAN input rules | ||
- | iptables -A LAN -j ACCEPT | ||
- | |||
- | # DMZ input rules | ||
- | iptables -A DMZ -j ACCEPT | ||
- | |||
- | # WAN forward list | ||
- | iptables -A WANFORWARD -j BLACKLIST | ||
- | iptables -A WANFORWARD -m conntrack --ctstate ESTABLISHED, | ||
- | iptables -A WANFORWARD -p tcp -d 10.17.61.33 --dport 636 -j ACCEPT | ||
- | iptables -A WANFORWARD -p udp -d 10.17.61.33 --dport 636 -j ACCEPT | ||
- | iptables -A WANFORWARD -p tcp -d 10.17.61.2 --dport 636 -j ACCEPT | ||
- | iptables -A WANFORWARD -p udp -d 10.17.61.2 --dport 636 -j ACCEPT | ||
- | #VPascali | ||
- | iptables -A WANFORWARD -p tcp -d 10.17.61.2 -s $nCH --dport 389 -j ACCEPT | ||
- | iptables -A WANFORWARD -p tcp -d 10.17.61.2 -s $ndw4 --dport 389 -j ACCEPT | ||
- | iptables -A WANFORWARD -p tcp -d 10.17.61.2 -s 151.236.7.237 --dport 389 -j ACCEPT #LDAP FTP | ||
- | iptables -A WANFORWARD -p tcp -d 10.17.61.33 --dport 389 -j ACCEPT | ||
- | iptables -A WANFORWARD -p udp -d 10.17.61.33 --dport 389 -j ACCEPT | ||
- | iptables -A WANFORWARD -p tcp -d 10.17.61.2 --dport 389 -j ACCEPT | ||
- | iptables -A WANFORWARD -p udp -d 10.17.61.2 --dport 389 -j ACCEPT | ||
- | iptables -A WANFORWARD -p tcp -d $h1DMZint -m multiport --dports 22, | ||
- | iptables -A WANFORWARD -p tcp -d $h3DMZint -m multiport --dports 80,443 -j ACCEPT | ||
- | iptables -A WANFORWARD -p tcp -d $h4DMZint -m multiport --dports 80,443 -j ACCEPT | ||
- | #iptables -A WANFORWARD -p tcp -d $h2DMZint -m multiport --dports 25, | ||
- | iptables -A WANFORWARD -p tcp -d $h2DMZint -m multiport --dports 53, | ||
- | iptables -A WANFORWARD -p tcp -d $h2DMZint -s $nCH --dport 636 -j ACCEPT | ||
- | iptables -A WANFORWARD -p tcp -d $h2DMZint -s $ndw4 --dport 636 -j ACCEPT | ||
- | iptables -A WANFORWARD -p udp -d $h1DMZint --dport 53 -j ACCEPT | ||
- | iptables -A WANFORWARD -p udp -d $h2DMZint --dport 53 -j ACCEPT | ||
- | iptables -A WANFORWARD -p udp -d 10.17.61.52 --dport 1194 -j ACCEPT | ||
- | iptables -A WANFORWARD -p udp -d 10.17.61.52 --dport 1194 -j ACCEPT | ||
- | iptables -A WANFORWARD -p tcp -d 10.17.61.30 --dport 2525 -j ACCEPT # Laco Sharepoint Demo | ||
- | iptables -A WANFORWARD -p udp -d 10.17.61.30 --dport 2525 -j ACCEPT # Laco Sharepoint Demo | ||
- | #iptables -A WANFORWARD -p tcp -d 10.17.61.98 --dport 1521 -j ACCEPT # Laco Oracle | ||
- | #iptables -A WANFORWARD -p udp -d 10.17.61.98 --dport 1521 -j ACCEPT # Laco Oracle | ||
- | #iptables -A WANFORWARD -p tcp -d 10.17.61.181 --dport 3389 -j ACCEPT # alberimonumentali.3di.it | ||
- | #iptables -A WANFORWARD -p udp -d 10.17.61.181 --dport 3389 -j ACCEPT # alberimonumentali.3di.it | ||
- | #iptables -A WANFORWARD -p tcp -d 10.17.61.97 --dport 3389 -j ACCEPT # IRVV Odolini | ||
- | #iptables -A WANFORWARD -p udp -d 10.17.61.97 --dport 3389 -j ACCEPT # IRVV Odolini | ||
- | #iptables -A WANFORWARD -p tcp -d 10.17.61.62 --dport 3306 -j ACCEPT # mySQL Millennium (fcavola) | ||
- | #iptables -A WANFORWARD -p udp -d 10.17.61.62 --dport 3306 -j ACCEPT # mySQL Millennium (fcavola) | ||
- | iptables -A WANFORWARD -p tcp -d 10.17.61.62 --dport 22 -j ACCEPT # ssh Millennium (fcavola) | ||
- | iptables -A WANFORWARD -p udp -d 10.17.61.62 --dport 22 -j ACCEPT # ssh Millennium (fcavola) | ||
- | iptables -A WANFORWARD -p tcp -d 10.17.61.63 --dport 22 -j ACCEPT # ssh Magento (fcavola) | ||
- | iptables -A WANFORWARD -p udp -d 10.17.61.63 --dport 22 -j ACCEPT # ssh Magento (fcavola) | ||
- | iptables -A WANFORWARD -p tcp -d 10.17.61.61 --dport 22 -j ACCEPT # ssh VipMaster (svanetti) | ||
- | iptables -A WANFORWARD -p udp -d 10.17.61.61 --dport 22 -j ACCEPT # ssh VipMaster (svanetti) | ||
- | iptables -A WANFORWARD -p tcp -s $nCH -d 10.17.61.61 --dport 25 -j ACCEPT # Mail Server IT | ||
- | #iptables -A WANFORWARD -p tcp -d 10.17.61.24 --dport 80 -j ACCEPT # forward FTSWS-temp per rtirabassi | ||
- | iptables -A WANFORWARD -p tcp -d 10.17.61.68 --dport 80 -j ACCEPT # forward ZoneMinder | ||
- | iptables -A WANFORWARD -p tcp -d 10.17.61.68 --dport 22 -j ACCEPT # forward ZoneMinder | ||
- | iptables -A WANFORWARD -p tcp -d 10.17.61.46 --dport 1521 -j ACCEPT #temp oracle-precise dbms | ||
- | iptables -A WANFORWARD -p tcp -d 10.17.61.17 --dport 1521 -j ACCEPT #temp regventest | ||
- | iptables -A WANFORWARD -p tcp -d 10.17.61.8 | ||
- | iptables -A WANFORWARD -p tcp -d 10.17.61.50 | ||
- | iptables -A WANFORWARD -p tcp -d 10.17.61.192 | ||
- | #VPN Albania | ||
- | iptables -A WANFORWARD -p tcp -d 10.17.61.68 --dport 500 -j ACCEPT # forward VITO | ||
- | iptables -A WANFORWARD -p tcp -d 10.17.61.68 --dport 4500 -j ACCEPT # forward VITO | ||
- | iptables -A WANFORWARD -p tcp -d 10.17.61.68 --dport 1701 -j ACCEPT # forward VITO | ||
- | |||
- | |||
- | # LAN forward list | ||
- | iptables -A LANFORWARD -o $iWAN -j MARTIANS | ||
- | iptables -A LANFORWARD -j ACCEPT | ||
- | |||
- | # DMZ forward list | ||
- | iptables -A DMZFORWARD -o $iWAN -j MARTIANS | ||
- | iptables -A DMZFORWARD -s $h1DMZint -j ACCEPT | ||
- | iptables -A DMZFORWARD -s $h2DMZint -j ACCEPT | ||
- | iptables -A DMZFORWARD -s $h3DMZint -j ACCEPT | ||
- | iptables -A DMZFORWARD -s $h4DMZint -j ACCEPT | ||
- | |||
- | # PREROUTING rules | ||
- | iptables -t nat -A PREROUTING -i $iLAN -s $nLAN -d $h1DMZext -j DNAT --to-destination $h1DMZint | ||
- | iptables -t nat -A PREROUTING -i $iLAN -s $nLAN -d $h2DMZext -j DNAT --to-destination $h2DMZint | ||
- | iptables -t nat -A PREROUTING -i $iLAN -s $nLAN -d $h3DMZext -j DNAT --to-destination $h3DMZint | ||
- | iptables -t nat -A PREROUTING -i $iLAN -s $nLAN -d $h4DMZext -j DNAT --to-destination $h4DMZint | ||
- | iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $h1DMZext --dport 25 -j DNAT --to 10.17.61.61: | ||
- | iptables -t nat -A PREROUTING -i $iWAN -d $h1DMZext -j DNAT --to-destination $h1DMZint | ||
- | iptables -t nat -A PREROUTING -i $iWAN -d $h2DMZext -j DNAT --to-destination $h2DMZint | ||
- | iptables -t nat -A PREROUTING -i $iWAN -d $h3DMZext -j DNAT --to-destination $h3DMZint | ||
- | iptables -t nat -A PREROUTING -i $iWAN -d $h4DMZext -j DNAT --to-destination $h4DMZint | ||
- | #iptables -t nat -A PREROUTING -i $Wan -p tcp --dport 13389 -j DNAT --to 192.168.1.100: | ||
- | iptables -t nat -A PREROUTING -p tcp -d $hMEext --dport 2525 -j DNAT --to 10.17.61.30 # Laco Sharepoint Demo | ||
- | iptables -t nat -A PREROUTING -p udp -d $hMEext --dport 2525 -j DNAT --to 10.17.61.30 # Laco Sharepoint Demo | ||
- | #iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 1521 -j DNAT --to 10.17.61.98 # Laco Oracle ----NEW | ||
- | #iptables -t nat -A PREROUTING -p udp -i $iWAN -d $hMEext --dport 1521 -j DNAT --to 10.17.61.98 # Laco Oracle ----NEW | ||
- | #iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 13389 -j DNAT --to 10.17.61.181: | ||
- | #iptables -t nat -A PREROUTING -p udp -i $iWAN -d $hMEext --dport 13389 -j DNAT --to 10.17.61.181: | ||
- | #iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 13389 -j DNAT --to 10.17.61.97: | ||
- | #iptables -t nat -A PREROUTING -p udp -i $iWAN -d $hMEext --dport 13389 -j DNAT --to 10.17.61.97: | ||
- | #iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 13306 -j DNAT --to 10.17.61.62: | ||
- | #iptables -t nat -A PREROUTING -p udp -i $iWAN -d $hMEext --dport 13306 -j DNAT --to 10.17.61.62: | ||
- | iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 33022 -j DNAT --to 10.17.61.62: | ||
- | iptables -t nat -A PREROUTING -p udp -i $iWAN -d $hMEext --dport 33022 -j DNAT --to 10.17.61.62: | ||
- | iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 33023 -j DNAT --to 10.17.61.63: | ||
- | iptables -t nat -A PREROUTING -p udp -i $iWAN -d $hMEext --dport 33023 -j DNAT --to 10.17.61.63: | ||
- | iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 33024 -j DNAT --to 10.17.61.61: | ||
- | iptables -t nat -A PREROUTING -p udp -i $iWAN -d $hMEext --dport 33024 -j DNAT --to 10.17.61.61: | ||
- | iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 20000 -j DNAT --to 10.17.61.50: | ||
- | iptables -t nat -A PREROUTING -p tcp -s 188.9.83.251 -d $hMEext --dport 20001 -j DNAT --to 10.17.61.192: | ||
- | iptables -t nat -A PREROUTING -p tcp -s 195.78.211.98 -d $hMEext --dport 20001 -j DNAT --to 10.17.61.192: | ||
- | iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 10636 -j DNAT --to 10.17.61.33: | ||
- | iptables -t nat -A PREROUTING -p udp -i $iWAN -d $hMEext --dport 10636 -j DNAT --to 10.17.61.33: | ||
- | iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 20636 -j DNAT --to 10.17.61.2: | ||
- | iptables -t nat -A PREROUTING -p udp -i $iWAN -d $hMEext --dport 20636 -j DNAT --to 10.17.61.2: | ||
- | #VPascali | ||
- | iptables -t nat -A PREROUTING -p tcp -s 37.235.56.141 -i $iWAN -d $hMEext --dport 60389 -j DNAT --to 10.17.61.33: | ||
- | iptables -t nat -A PREROUTING -p udp -s 37.235.56.141 -i $iWAN -d $hMEext --dport 60389 -j DNAT --to 10.17.61.33: | ||
- | iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 60389 -j DNAT --to 10.17.61.33: | ||
- | iptables -t nat -A PREROUTING -p udp -i $iWAN -d $hMEext --dport 60389 -j DNAT --to 10.17.61.33: | ||
- | iptables -t nat -A PREROUTING -p tcp -s 213.183.146.126 -i $iWAN -d $hMEext --dport 20389 -j DNAT --to 10.17.61.33: | ||
- | iptables -t nat -A PREROUTING -p udp -s 213.183.146.126 -i $iWAN -d $hMEext --dport 20389 -j DNAT --to 10.17.61.33: | ||
- | iptables -t nat -A PREROUTING -p udp -s 151.236.7.237 -i $iWAN -d $hMEext --dport 20389 -j DNAT --to 10.17.61.33: | ||
- | iptables -t nat -A PREROUTING -p tcp -s 151.236.7.237 -i $iWAN -d $hMEext --dport 20389 -j DNAT --to 10.17.61.33: | ||
- | iptables -t nat -A PREROUTING -p tcp -s 213.183.146.126 -i $iWAN -d $hMEext --dport 30389 -j DNAT --to 10.17.61.2: | ||
- | iptables -t nat -A PREROUTING -p udp -s 213.183.146.126 -i $iWAN -d $hMEext --dport 30389 -j DNAT --to 10.17.61.2: | ||
- | iptables -t nat -A PREROUTING -p tcp -s 213.183.146.83 -i $iWAN -d $hMEext --dport 60389 -j DNAT --to 10.17.61.2: | ||
- | iptables -t nat -A PREROUTING -p udp -s 213.183.146.83 -i $iWAN -d $hMEext --dport 60389 -j DNAT --to 10.17.61.2: | ||
- | iptables -t nat -A PREROUTING -p udp -i $iWAN -d $hMEext --dport 1194 -j DNAT --to 10.17.61.52 | ||
- | iptables -t nat -A PREROUTING -p udp -i $iWAN -d $hMEext --dport 1194 -j DNAT --to 10.17.61.52 | ||
- | #iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 10880 -j DNAT --to 10.17.61.24: | ||
- | iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 10880 -j DNAT --to 10.17.61.68: | ||
- | iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 10882 -j DNAT --to 10.17.61.68: | ||
- | iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 11521 -j DNAT --to 10.17.61.46: | ||
- | iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 21521 -j DNAT --to 10.17.61.17: | ||
- | iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 5521 -j DNAT --to-destination 10.17.61.8: | ||
- | #VPN ALBANIA | ||
- | iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 500 -j DNAT --to 10.17.61.68: | ||
- | iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 4500 -j DNAT --to 10.17.61.68: | ||
- | iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 1701 -j DNAT --to 10.17.61.68: | ||
- | |||
- | # POSTROUTING rules | ||
- | |||
- | #iptables -t nat -A POSTROUTING -p udp -o $iLAN -s $nLAN -d 10.17.61.181 --dport 13389 -j SNAT --to-source $hMEext # alberimonumentali.3di.it | ||
- | iptables -t nat -A POSTROUTING -p udp -o $iLAN -s $nLAN -d 10.17.61.30 --dport 2525 -j SNAT --to-source $hMEext # Laco Sharepoint Demo | ||
- | iptables -t nat -A POSTROUTING -p tcp -o $iWAN -s 10.17.61.61 --dport 25 -j SNAT --to-source $h4DMZext # Mail Server IT | ||
- | #iptables -t nat -A POSTROUTING -p tcp -o $iWAN -s 10.17.61.8 | ||
- | iptables -t nat -A POSTROUTING -o $iLAN -d $nLAN -s $h1DMZint -j SNAT --to-source $h1DMZext | ||
- | iptables -t nat -A POSTROUTING -o $iLAN -d $nLAN -s $h2DMZint -j SNAT --to-source $h2DMZext | ||
- | iptables -t nat -A POSTROUTING -o $iLAN -d $nLAN -s $h3DMZint -j SNAT --to-source $h3DMZext | ||
- | iptables -t nat -A POSTROUTING -o $iLAN -d $nLAN -s $h4DMZint -j SNAT --to-source $h4DMZext | ||
- | iptables -t nat -A POSTROUTING -o $iWAN -s $h1DMZint -j SNAT --to-source $h1DMZext | ||
- | iptables -t nat -A POSTROUTING -o $iWAN -s $h2DMZint -j SNAT --to-source $h2DMZext | ||
- | iptables -t nat -A POSTROUTING -o $iWAN -s $h3DMZint -j SNAT --to-source $h3DMZext | ||
- | iptables -t nat -A POSTROUTING -o $iWAN -s $h4DMZint -j SNAT --to-source $h4DMZext | ||
- | #iptables -t nat -A POSTROUTING -o $iWAN -s $nLAN -j MASQUERADE | ||
- | iptables -t nat -A POSTROUTING -o $iWAN -s $nLAN -j SNAT --to-source $hMEext | ||
- | #iptables -t nat -A POSTROUTING -o $iDMZ -s $nLAN -j MASQUERADE | ||
- | iptables -t nat -A POSTROUTING -o $iDMZ -s $nLAN -j SNAT --to-source $hMEint | ||
- | |||
- | # loopback! | ||
- | iptables -A INPUT -i $iLO -j ACCEPT | ||
- | |||
- | # block unauthorized!!! | ||
- | dirname=`dirname $0` | ||
- | for i in `cat ${dirname}/ | ||
- | iptables -A BLACKLIST -p tcp -s $i -j REJECT --reject-with=tcp-reset | ||
- | iptables -A BLACKLIST -s $i -j REJECT | ||
- | done | ||
- | |||
- | # martians won't flee!! | ||
- | dirname=`dirname $0` | ||
- | for i in `cat ${dirname}/ | ||
- | iptables -A MARTIANS -d $i -j DROP | ||
- | done | ||
- | |||
- | |||
- | # logging (LOGFORWARD) | ||
- | # log pacchetti INVALID in LOGFORWARD | ||
- | iptables -A LOGFORWARD -m conntrack --ctstate INVALID -j LOG --log-level 6 --log-prefix=" | ||
- | # log ssh | ||
- | iptables -A LOGFORWARD -m conntrack --ctstate NEW -p tcp -d $h2DMZint --dport 22 -j LOG --log-level 6 --log-prefix=" | ||
- | # log vpn | ||
- | iptables -A LOGFORWARD -m conntrack --ctstate NEW -p tcp -d 10.17.61.52 --dport 1194 -j LOG --log-level 6 --log-prefix=" | ||
- | iptables -A LOGFORWARD -m conntrack --ctstate NEW -p udp -d 10.17.61.52 --dport 1194 -j LOG --log-level 6 --log-prefix=" | ||
- | # log sharepoint | ||
- | iptables -A LOGFORWARD -m conntrack --ctstate NEW -p tcp -d 10.17.61.30 --dport 2525 -j LOG --log-level 6 --log-prefix=" | ||
- | iptables -A LOGFORWARD -m conntrack --ctstate NEW -p udp -d 10.17.61.30 --dport 2525 -j LOG --log-level 6 --log-prefix=" | ||
- | # log oracle | ||
- | #iptables -A LOGFORWARD -m conntrack --ctstate NEW -p tcp -d 10.17.61.98 --dport 1521 -j LOG --log-level 6 --log-prefix=" | ||
- | #iptables -A LOGFORWARD -m conntrack --ctstate NEW -p udp -d 10.17.61.98 --dport 1521 -j LOG --log-level 6 --log-prefix=" | ||
- | iptables -A LOGFORWARD -m conntrack --ctstate NEW -p tcp -d 10.17.61.8 --dport 22 -j LOG --log-level 6 --log-prefix=" | ||
- | # chains | ||
- | iptables -A INPUT -i $iWAN -j WAN | ||
- | iptables -A INPUT -i $iLAN -j LAN | ||
- | iptables -A INPUT -i $iDMZ -j DMZ | ||
- | iptables -A FORWARD -j LOGFORWARD | ||
- | iptables -A FORWARD -i $iWAN -j WANFORWARD | ||
- | iptables -A FORWARD -i $iLAN -s $nLAN -j LANFORWARD | ||
- | iptables -A FORWARD -i $iDMZ -j DMZFORWARD | ||
- | |||
- | # Chiude tutto il resto | ||
- | iptables -P INPUT DROP | ||
- | iptables -P OUTPUT ACCEPT | ||
- | iptables -P FORWARD DROP | ||
- | </ |
/data/attic/documentazione_3di_riservata/manuali_sysadmin/sallustio.1507715806.txt.gz · Ultima modifica: 2017/10/11 11:56 da mpascale