Strumenti Utente

Strumenti Sito


documentazione_3di_riservata:manuali_sysadmin:sallustio

Questa è una vecchia versione del documento!


Sallustio

Configurazione Interfacce

“/etc/conf.d/net”

net
# This blank configuration will automatically use DHCP for any net.*
# scripts in /etc/init.d.  To create a more complete configuration,
# please review /etc/conf.d/net.example and save your configuration
# in /etc/conf.d/net (this file :]!).
 
ns_domain_lo="3di.it"
dns_domain_eth0="3di.it"
dns_domain_eth1="3di.it"
dns_domain_eth2="3di.it"
nis_domain_lo="3di.it"
nis_domain_eth0="3di.it"
nis_domain_eth1="3di.it"
nis_domain_eth2="3di.it"
ns_search_lo="3di.it bo.priv"
dns_search_eth0="3di.it bo.priv"
dns_search_eth1="3di.it bo.priv"
dns_search_eth2="3di.it bo.priv"
nis_search_lo="3di.it bo.priv"
nis_search_eth0="3di.it bo.priv"
nis_search_eth1="3di.it bo.priv"
nis_search_eth2="3di.it bo.priv"
domainname="3di.it"
 
dns_servers="10.17.61.33 10.17.61.56"
 
config_eth0="10.17.61.1 netmask 255.255.255.0 broadcast 10.17.61.255"
 
config_eth1="10.17.62.82 netmask 255.255.255.248 broadcast 10.17.61.199"
 
config_eth2="93.149.47.162 netmask 255.255.255.248 broadcast 93.149.47.167
93.149.47.163 netmask 255.255.255.248 broadcast 92.223.169.87
93.149.47.164 netmask 255.255.255.248 broadcast 92.223.169.87
93.149.47.165 netmask 255.255.255.248 broadcast 92.223.169.87
93.149.47.166 netmask 255.255.255.248 broadcast 92.223.169.87"
routes_eth2="default via 93.149.47.161"

Configurazione Firewall

firewall
#!/bin/bash
 
# i = interface
# n = net
# h = host
 
iLAN=eth0
iDMZ=eth1
iWAN=eth2
iLO=lo
nLAN=10.17.61.0/24
nDMZ=10.17.62.80/29
#nWAN=92.223.169.80/29
nWAN=93.149.47.160/29
nCH=37.235.56.141
ndw4=213.183.146.126
#h1 = dns1 = titano/vegezio
#h1DMZint=10.17.62.197
h1DMZint=10.17.62.85
#h1DMZext=81.208.26.197
#h1DMZext=92.223.169.85
h1DMZext=93.149.47.165
#h2 = dns3
#h2DMZint=10.17.62.198
h2DMZint=10.17.62.86
#h2DMZext=81.208.26.198
#h2DMZext=92.223.169.86
h2DMZext=93.149.47.166
#h3 = 3didemo
#h3DMZint=10.17.62.195
h3DMZint=10.17.62.83
#h3DMZext=81.208.26.195
#h3DMZext=92.223.169.83
h3DMZext=93.149.47.163
#h4 = xenit
#h4DMZint=10.17.62.196
h4DMZint=10.17.62.84
#h4DMZext=81.208.26.196
#h4DMZext=92.223.169.84
h4DMZext=93.149.47.164
#h sallustio
#hMEint=10.17.62.194
hMEint=10.17.62.82
#hMEext=81.208.26.194
#hMEext=92.223.169.82
hMEext=93.149.47.162
 
 
# NON UTILIZZATO
#ipWind=151.58.8.95
 
iptables -P INPUT ACCEPT
iptables -P OUTPUT ACCEPT
iptables -P FORWARD ACCEPT
 
iptables -F
iptables -t nat -F
 
iptables -F WAN
iptables -X WAN
iptables -N WAN
 
iptables -F LAN
iptables -X LAN
iptables -N LAN
 
iptables -F DMZ
iptables -X DMZ
iptables -N DMZ
 
iptables -F WANFORWARD
iptables -X WANFORWARD
iptables -N WANFORWARD
 
iptables -F LANFORWARD
iptables -X LANFORWARD
iptables -N LANFORWARD
 
iptables -F DMZFORWARD
iptables -X DMZFORWARD
iptables -N DMZFORWARD
 
iptables -F BLACKLIST
iptables -X BLACKLIST
iptables -N BLACKLIST
 
iptables -F MARTIANS
iptables -X MARTIANS
iptables -N MARTIANS
 
iptables -F LOGFORWARD
iptables -X LOGFORWARD
iptables -N LOGFORWARD
 
 
# WAN input rules
iptables -A WAN -j BLACKLIST
iptables -A WAN -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
 
# LAN input rules
iptables -A LAN -j ACCEPT
 
# DMZ input rules
iptables -A DMZ -j ACCEPT
 
# WAN forward list
iptables -A WANFORWARD -j BLACKLIST
iptables -A WANFORWARD -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
iptables -A WANFORWARD -p tcp -d 10.17.61.33 --dport 636 -j ACCEPT
iptables -A WANFORWARD -p udp -d 10.17.61.33 --dport 636 -j ACCEPT
iptables -A WANFORWARD -p tcp -d 10.17.61.2 --dport 636 -j ACCEPT
iptables -A WANFORWARD -p udp -d 10.17.61.2 --dport 636 -j ACCEPT
#VPascali
iptables -A WANFORWARD -p tcp -d 10.17.61.2 -s $nCH --dport 389 -j ACCEPT
iptables -A WANFORWARD -p tcp -d 10.17.61.2 -s $ndw4 --dport 389 -j ACCEPT
iptables -A WANFORWARD -p tcp -d 10.17.61.2 -s 151.236.7.237 --dport 389 -j ACCEPT #LDAP FTP
iptables -A WANFORWARD -p tcp -d 10.17.61.33 --dport 389 -j ACCEPT
iptables -A WANFORWARD -p udp -d 10.17.61.33 --dport 389 -j ACCEPT
iptables -A WANFORWARD -p tcp -d 10.17.61.2 --dport 389 -j ACCEPT
iptables -A WANFORWARD -p udp -d 10.17.61.2 --dport 389 -j ACCEPT
iptables -A WANFORWARD -p tcp -d $h1DMZint -m multiport --dports 22,53,80,443,554 -j ACCEPT
iptables -A WANFORWARD -p tcp -d $h3DMZint -m multiport --dports 80,443 -j ACCEPT
iptables -A WANFORWARD -p tcp -d $h4DMZint -m multiport --dports 80,443 -j ACCEPT
#iptables -A WANFORWARD -p tcp -d $h2DMZint -m multiport --dports 25,53,80,443,465,993,2221 -j ACCEPT
iptables -A WANFORWARD -p tcp -d $h2DMZint -m multiport --dports 53,80,443,2221 -j ACCEPT
iptables -A WANFORWARD -p tcp -d $h2DMZint -s $nCH --dport 636 -j ACCEPT
iptables -A WANFORWARD -p tcp -d $h2DMZint -s $ndw4 --dport 636 -j ACCEPT
iptables -A WANFORWARD -p udp -d $h1DMZint --dport 53 -j ACCEPT
iptables -A WANFORWARD -p udp -d $h2DMZint --dport 53 -j ACCEPT
iptables -A WANFORWARD -p udp -d 10.17.61.52 --dport 1194 -j ACCEPT
iptables -A WANFORWARD -p udp -d 10.17.61.52 --dport 1194 -j ACCEPT
iptables -A WANFORWARD -p tcp -d 10.17.61.30 --dport 2525 -j ACCEPT # Laco Sharepoint Demo
iptables -A WANFORWARD -p udp -d 10.17.61.30 --dport 2525 -j ACCEPT # Laco Sharepoint Demo
#iptables -A WANFORWARD -p tcp -d 10.17.61.98 --dport 1521 -j ACCEPT # Laco Oracle
#iptables -A WANFORWARD -p udp -d 10.17.61.98 --dport 1521 -j ACCEPT # Laco Oracle
#iptables -A WANFORWARD -p tcp -d 10.17.61.181 --dport 3389 -j ACCEPT # alberimonumentali.3di.it
#iptables -A WANFORWARD -p udp -d 10.17.61.181 --dport 3389 -j ACCEPT # alberimonumentali.3di.it
#iptables -A WANFORWARD -p tcp -d 10.17.61.97 --dport 3389 -j ACCEPT # IRVV Odolini
#iptables -A WANFORWARD -p udp -d 10.17.61.97 --dport 3389 -j ACCEPT # IRVV Odolini
#iptables -A WANFORWARD -p tcp -d 10.17.61.62 --dport 3306 -j ACCEPT # mySQL Millennium (fcavola)
#iptables -A WANFORWARD -p udp -d 10.17.61.62 --dport 3306 -j ACCEPT # mySQL Millennium (fcavola)
iptables -A WANFORWARD -p tcp -d 10.17.61.62 --dport 22 -j ACCEPT # ssh Millennium (fcavola)
iptables -A WANFORWARD -p udp -d 10.17.61.62 --dport 22 -j ACCEPT # ssh Millennium (fcavola)
iptables -A WANFORWARD -p tcp -d 10.17.61.63 --dport 22 -j ACCEPT # ssh Magento (fcavola)
iptables -A WANFORWARD -p udp -d 10.17.61.63 --dport 22 -j ACCEPT # ssh Magento (fcavola)
iptables -A WANFORWARD -p tcp -d 10.17.61.61 --dport 22 -j ACCEPT # ssh VipMaster (svanetti)
iptables -A WANFORWARD -p udp -d 10.17.61.61 --dport 22 -j ACCEPT # ssh VipMaster (svanetti)
iptables -A WANFORWARD -p tcp -s $nCH -d 10.17.61.61 --dport 25 -j ACCEPT # Mail Server IT
#iptables -A WANFORWARD -p tcp -d 10.17.61.24 --dport 80 -j ACCEPT # forward FTSWS-temp per rtirabassi
iptables -A WANFORWARD -p tcp -d 10.17.61.68 --dport 80 -j ACCEPT # forward ZoneMinder
iptables -A WANFORWARD -p tcp -d 10.17.61.68 --dport 22 -j ACCEPT # forward ZoneMinder
iptables -A WANFORWARD -p tcp -d 10.17.61.46 --dport 1521 -j ACCEPT #temp oracle-precise dbms 
iptables -A WANFORWARD -p tcp -d 10.17.61.17 --dport 1521 -j ACCEPT #temp regventest
iptables -A WANFORWARD -p tcp -d 10.17.61.8  --dport 22 -j ACCEPT # ssh gitlab
iptables -A WANFORWARD -p tcp -d 10.17.61.50  --dport 22 -j ACCEPT # ssh per supporto easyredmine
iptables -A WANFORWARD -p tcp -d 10.17.61.192  --dport 22 -j ACCEPT # ssh Regesta
#VPN Albania
iptables -A WANFORWARD -p tcp -d 10.17.61.68 --dport 500 -j ACCEPT # forward VITO
iptables -A WANFORWARD -p tcp -d 10.17.61.68 --dport 4500 -j ACCEPT # forward VITO
iptables -A WANFORWARD -p tcp -d 10.17.61.68 --dport 1701 -j ACCEPT # forward VITO
 
 
# LAN forward list
iptables -A LANFORWARD -o $iWAN -j MARTIANS
iptables -A LANFORWARD -j ACCEPT
 
# DMZ forward list
iptables -A DMZFORWARD -o $iWAN -j MARTIANS
iptables -A DMZFORWARD -s $h1DMZint -j ACCEPT
iptables -A DMZFORWARD -s $h2DMZint -j ACCEPT
iptables -A DMZFORWARD -s $h3DMZint -j ACCEPT
iptables -A DMZFORWARD -s $h4DMZint -j ACCEPT
 
# PREROUTING rules
iptables -t nat -A PREROUTING -i $iLAN -s $nLAN -d $h1DMZext -j DNAT --to-destination $h1DMZint
iptables -t nat -A PREROUTING -i $iLAN -s $nLAN -d $h2DMZext -j DNAT --to-destination $h2DMZint
iptables -t nat -A PREROUTING -i $iLAN -s $nLAN -d $h3DMZext -j DNAT --to-destination $h3DMZint
iptables -t nat -A PREROUTING -i $iLAN -s $nLAN -d $h4DMZext -j DNAT --to-destination $h4DMZint
iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $h1DMZext --dport 25 -j DNAT --to 10.17.61.61:25 # Mail Server IT su container LXC dedicato mail-it.bo.priv
iptables -t nat -A PREROUTING -i $iWAN -d $h1DMZext -j DNAT --to-destination $h1DMZint
iptables -t nat -A PREROUTING -i $iWAN -d $h2DMZext -j DNAT --to-destination $h2DMZint
iptables -t nat -A PREROUTING -i $iWAN -d $h3DMZext -j DNAT --to-destination $h3DMZint
iptables -t nat -A PREROUTING -i $iWAN -d $h4DMZext -j DNAT --to-destination $h4DMZint
#iptables -t nat -A PREROUTING -i $Wan -p tcp --dport 13389 -j DNAT --to 192.168.1.100:3389 # shape-cm enav-da-modificare
iptables -t nat -A PREROUTING -p tcp -d $hMEext --dport 2525 -j DNAT --to 10.17.61.30 # Laco Sharepoint Demo
iptables -t nat -A PREROUTING -p udp -d $hMEext --dport 2525 -j DNAT --to 10.17.61.30 # Laco Sharepoint Demo
#iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 1521 -j DNAT --to 10.17.61.98 # Laco Oracle ----NEW
#iptables -t nat -A PREROUTING -p udp -i $iWAN -d $hMEext --dport 1521 -j DNAT --to 10.17.61.98 # Laco Oracle ----NEW
#iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 13389 -j DNAT --to 10.17.61.181:3389 # alberimonumentali
#iptables -t nat -A PREROUTING -p udp -i $iWAN -d $hMEext --dport 13389 -j DNAT --to 10.17.61.181:3389 # alberimonumentali
#iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 13389 -j DNAT --to 10.17.61.97:3389 # IRVV Odolini
#iptables -t nat -A PREROUTING -p udp -i $iWAN -d $hMEext --dport 13389 -j DNAT --to 10.17.61.97:3389 # IRVV Odolini
#iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 13306 -j DNAT --to 10.17.61.62:3306 # mySQL Millennium (fcavola)
#iptables -t nat -A PREROUTING -p udp -i $iWAN -d $hMEext --dport 13306 -j DNAT --to 10.17.61.62:3306 # mySQL Millennium (fcavola)
iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 33022 -j DNAT --to 10.17.61.62:22 # ssh Millennium (fcavola)
iptables -t nat -A PREROUTING -p udp -i $iWAN -d $hMEext --dport 33022 -j DNAT --to 10.17.61.62:22 # ssh Millennium (fcavola)
iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 33023 -j DNAT --to 10.17.61.63:22 # ssh Magento (fcavola)
iptables -t nat -A PREROUTING -p udp -i $iWAN -d $hMEext --dport 33023 -j DNAT --to 10.17.61.63:22 # ssh Magento (fcavola)
iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 33024 -j DNAT --to 10.17.61.61:22 # ssh VipMaster (svanetti)
iptables -t nat -A PREROUTING -p udp -i $iWAN -d $hMEext --dport 33024 -j DNAT --to 10.17.61.61:22 # ssh VipMaster (svanetti)
iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 20000 -j DNAT --to 10.17.61.50:22 # ssh Per suppoerto easyredmine 
iptables -t nat -A PREROUTING -p tcp -s 188.9.83.251 -d $hMEext --dport 20001 -j DNAT --to 10.17.61.192:22 # ssh Regesta 
iptables -t nat -A PREROUTING -p tcp -s 195.78.211.98 -d $hMEext --dport 20001 -j DNAT --to 10.17.61.192:22 # ssh Regesta 
iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 10636 -j DNAT --to 10.17.61.33:636
iptables -t nat -A PREROUTING -p udp -i $iWAN -d $hMEext --dport 10636 -j DNAT --to 10.17.61.33:636
iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 20636 -j DNAT --to 10.17.61.2:636
iptables -t nat -A PREROUTING -p udp -i $iWAN -d $hMEext --dport 20636 -j DNAT --to 10.17.61.2:636
#VPascali
iptables -t nat -A PREROUTING -p tcp -s 37.235.56.141 -i $iWAN -d $hMEext --dport 60389 -j DNAT --to 10.17.61.33:389
iptables -t nat -A PREROUTING -p udp -s 37.235.56.141 -i $iWAN -d $hMEext --dport 60389 -j DNAT --to 10.17.61.33:389
iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 60389 -j DNAT --to 10.17.61.33:389
iptables -t nat -A PREROUTING -p udp -i $iWAN -d $hMEext --dport 60389 -j DNAT --to 10.17.61.33:389
iptables -t nat -A PREROUTING -p tcp -s 213.183.146.126 -i $iWAN -d $hMEext --dport 20389 -j DNAT --to 10.17.61.33:389
iptables -t nat -A PREROUTING -p udp -s 213.183.146.126 -i $iWAN -d $hMEext --dport 20389 -j DNAT --to 10.17.61.33:389
iptables -t nat -A PREROUTING -p udp -s 151.236.7.237 -i $iWAN -d $hMEext --dport 20389 -j DNAT --to 10.17.61.33:389 #LDAP FTP
iptables -t nat -A PREROUTING -p tcp -s 151.236.7.237 -i $iWAN -d $hMEext --dport 20389 -j DNAT --to 10.17.61.33:389 #LDAP FTP
iptables -t nat -A PREROUTING -p tcp -s 213.183.146.126 -i $iWAN -d $hMEext --dport 30389 -j DNAT --to 10.17.61.2:389
iptables -t nat -A PREROUTING -p udp -s 213.183.146.126 -i $iWAN -d $hMEext --dport 30389 -j DNAT --to 10.17.61.2:389
iptables -t nat -A PREROUTING -p tcp -s 213.183.146.83 -i $iWAN -d $hMEext --dport 60389 -j DNAT --to 10.17.61.2:389
iptables -t nat -A PREROUTING -p udp -s 213.183.146.83 -i $iWAN -d $hMEext --dport 60389 -j DNAT --to 10.17.61.2:389
iptables -t nat -A PREROUTING -p udp -i $iWAN -d $hMEext --dport 1194 -j DNAT --to 10.17.61.52
iptables -t nat -A PREROUTING -p udp -i $iWAN -d $hMEext --dport 1194 -j DNAT --to 10.17.61.52
#iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 10880 -j DNAT --to 10.17.61.24:80 # nat FTSWS-temp per rtirabassi
iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 10880 -j DNAT --to 10.17.61.68:80 # nat ZoneMinder
iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 10882 -j DNAT --to 10.17.61.68:22 # nat ZoneMinder
iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 11521 -j DNAT --to 10.17.61.46:1521 #temp oracle-precise dbms
iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 21521 -j DNAT --to 10.17.61.17:1521 #temp oracle regventest
iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 5521 -j DNAT --to-destination 10.17.61.8:22 # git.3di.it => gitlab.bo.priv
#VPN ALBANIA
iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 500 -j DNAT --to 10.17.61.68:500 # nat VITO
iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 4500 -j DNAT --to 10.17.61.68:4500 # nat VITO
iptables -t nat -A PREROUTING -p tcp -i $iWAN -d $hMEext --dport 1701 -j DNAT --to 10.17.61.68:1701 # nat VITO
 
# POSTROUTING rules
 
#iptables -t nat -A POSTROUTING -p udp -o $iLAN -s $nLAN -d 10.17.61.181 --dport 13389 -j SNAT --to-source $hMEext # alberimonumentali.3di.it
iptables -t nat -A POSTROUTING -p udp -o $iLAN -s $nLAN -d 10.17.61.30 --dport 2525 -j SNAT --to-source $hMEext # Laco Sharepoint Demo
iptables -t nat -A POSTROUTING -p tcp -o $iWAN -s 10.17.61.61 --dport 25 -j SNAT --to-source $h4DMZext # Mail Server IT
#iptables -t nat -A POSTROUTING -p tcp -o $iWAN -s 10.17.61.8  -j MASQUERADE
iptables -t nat -A POSTROUTING -o $iLAN -d $nLAN -s $h1DMZint -j SNAT --to-source $h1DMZext
iptables -t nat -A POSTROUTING -o $iLAN -d $nLAN -s $h2DMZint -j SNAT --to-source $h2DMZext
iptables -t nat -A POSTROUTING -o $iLAN -d $nLAN -s $h3DMZint -j SNAT --to-source $h3DMZext
iptables -t nat -A POSTROUTING -o $iLAN -d $nLAN -s $h4DMZint -j SNAT --to-source $h4DMZext
iptables -t nat -A POSTROUTING -o $iWAN -s $h1DMZint -j SNAT --to-source $h1DMZext
iptables -t nat -A POSTROUTING -o $iWAN -s $h2DMZint -j SNAT --to-source $h2DMZext
iptables -t nat -A POSTROUTING -o $iWAN -s $h3DMZint -j SNAT --to-source $h3DMZext
iptables -t nat -A POSTROUTING -o $iWAN -s $h4DMZint -j SNAT --to-source $h4DMZext
#iptables -t nat -A POSTROUTING -o $iWAN -s $nLAN -j MASQUERADE
iptables -t nat -A POSTROUTING -o $iWAN -s $nLAN -j SNAT --to-source $hMEext
#iptables -t nat -A POSTROUTING -o $iDMZ -s $nLAN -j MASQUERADE
iptables -t nat -A POSTROUTING -o $iDMZ -s $nLAN -j SNAT --to-source $hMEint
 
# loopback!
iptables -A INPUT -i $iLO -j ACCEPT
 
# block unauthorized!!!
dirname=`dirname $0`
for i in `cat ${dirname}/ip_blacklist`; do
	iptables -A BLACKLIST -p tcp -s $i -j REJECT --reject-with=tcp-reset
	iptables -A BLACKLIST -s $i -j REJECT
done
 
# martians won't flee!!
dirname=`dirname $0`
for i in `cat ${dirname}/ip_martians`; do
        iptables -A MARTIANS -d $i -j DROP
done
 
 
# logging (LOGFORWARD)
# log pacchetti INVALID in LOGFORWARD
iptables -A LOGFORWARD -m conntrack --ctstate INVALID -j LOG --log-level 6 --log-prefix="firewall: INVALID - "
# log ssh
iptables -A LOGFORWARD -m conntrack --ctstate NEW -p tcp -d $h2DMZint --dport 22 -j LOG --log-level 6 --log-prefix="firewall: CVS - "
# log vpn 
iptables -A LOGFORWARD -m conntrack --ctstate NEW -p tcp -d 10.17.61.52 --dport 1194 -j LOG --log-level 6 --log-prefix="firewall: VPN - "
iptables -A LOGFORWARD -m conntrack --ctstate NEW -p udp -d 10.17.61.52 --dport 1194 -j LOG --log-level 6 --log-prefix="firewall: VPN - "
# log sharepoint
iptables -A LOGFORWARD -m conntrack --ctstate NEW -p tcp -d 10.17.61.30 --dport 2525 -j LOG --log-level 6 --log-prefix="firewall: SHAREPOINT -"
iptables -A LOGFORWARD -m conntrack --ctstate NEW -p udp -d 10.17.61.30 --dport 2525 -j LOG --log-level 6 --log-prefix="firewall: SHAREPOINT -"
# log oracle
#iptables -A LOGFORWARD -m conntrack --ctstate NEW -p tcp -d 10.17.61.98 --dport 1521 -j LOG --log-level 6 --log-prefix="firewall: ORACLE -"
#iptables -A LOGFORWARD -m conntrack --ctstate NEW -p udp -d 10.17.61.98 --dport 1521 -j LOG --log-level 6 --log-prefix="firewall: ORACLE -"
iptables -A LOGFORWARD -m conntrack --ctstate NEW -p tcp -d 10.17.61.8 --dport 22 -j LOG --log-level 6 --log-prefix="firewall: GIT -"
# chains
iptables -A INPUT -i $iWAN -j WAN
iptables -A INPUT -i $iLAN -j LAN
iptables -A INPUT -i $iDMZ -j DMZ
iptables -A FORWARD -j LOGFORWARD
iptables -A FORWARD -i $iWAN -j WANFORWARD
iptables -A FORWARD -i $iLAN -s $nLAN -j LANFORWARD
iptables -A FORWARD -i $iDMZ -j DMZFORWARD
 
# Chiude tutto il resto
iptables -P INPUT DROP
iptables -P OUTPUT ACCEPT
iptables -P FORWARD DROP
/data/attic/documentazione_3di_riservata/manuali_sysadmin/sallustio.1507715768.txt.gz · Ultima modifica: 2017/10/11 11:56 da mpascale