phil
13/02/2014, 19h11
A chacun a ses préférences
philippe@hostname:~$ sudo apt-get install ufw [...] philippe@hostname:~$ sudo ufw status Status: inactive philippe@hostname:~$ sudo ufw allow 22/tcp Rules updated Rules updated (v6) philippe@hostname:~$ sudo ufw enable Firewall is active and enabled on system startup philippe@hostname:~$ sudo ufw status numbered Status: active To Action From -- ------ ---- [ 1] 22/tcp ALLOW IN Anywhere [ 2] 22/tcp ALLOW IN Anywhere (v6) philippe@hostname:~$ sudo ufw delete 2 Deleting: allow 22/tcp Proceed with operation (y|n)? y Rule deleted (v6) philippe@hostname:~$
# Required-Stop: $local_fs $remote_fs $network $syslog $named
# Default-Start: 2 3 4 5
# Default-Stop: 0 1 6
# X-Interactive: true
# Short-Description: Firewall de fou
### END INIT INFO
# Vider les tables actuelles
/sbin/iptables -t filter -F
# Vider les règles personnelles
/sbin/iptables -t filter -X
# Interdire toute connexion entrante et sortante
/sbin/iptables -t filter -P INPUT DROP
/sbin/iptables -t filter -P FORWARD DROP
/sbin/iptables -t filter -P OUTPUT DROP
# ---
# Ne pas casser les connexions etablies
/sbin/iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
/sbin/iptables -A OUTPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
# Autoriser loopback
/sbin/iptables -t filter -A INPUT -i lo -j ACCEPT
/sbin/iptables -t filter -A OUTPUT -o lo -j ACCEPT
# ICMP (Ping)
/sbin/iptables -A INPUT -i eth0 -p icmp --source proxy.ovh.net -j ACCEPT
/sbin/iptables -A INPUT -i eth0 -p icmp --source proxy.p19.ovh.net -j ACCEPT
/sbin/iptables -A INPUT -i eth0 -p icmp --source proxy.rbx.ovh.net -j ACCEPT
/sbin/iptables -A INPUT -i eth0 -p icmp --source proxy.sbg.ovh.net -j ACCEPT
/sbin/iptables -A INPUT -i eth0 -p icmp --source proxy.bhs.ovh.net -j ACCEPT
/sbin/iptables -A INPUT -i eth0 -p icmp --source ping.ovh.net -j ACCEPT
/sbin/iptables -A INPUT -i eth0 -p icmp --source 94.23.218.250 -j ACCEPT # IP = aaa.bbb.ccc obtenue selon la règle precedente
/sbin/iptables -A INPUT -i eth0 -p icmp --source 94.23.218.249 -j ACCEPT # temporaire, seulement pour serveurs HG
/sbin/iptables -A INPUT -i eth0 -p icmp --source 94.23.218.251 -j ACCEPT # IP pour system de monitoring
# MOI
/sbin/iptables -A INPUT -i eth0 -p icmp --source X.X.X.X -j ACCEPT
#/sbin/iptables -t filter -A OUTPUT -p tcp --dport 24441 -j ACCEPT
# ---
# Subversion In
#/sbin/iptables -t filter -A INPUT -p tcp --dport 3690 -j ACCEPT
# Subversion Out
#/sbin/iptables -t filter -A OUTPUT -p tcp --dport 3690 -j ACCEPT
# SSH In
/sbin/iptables -t filter -A INPUT -p tcp --dport 22 -j ACCEPT
# SSH Out
/sbin/iptables -t filter -A OUTPUT -p tcp --dport 22 -j ACCEPT
# DNS In/Out
/sbin/iptables -t filter -A OUTPUT -p tcp --dport 53 -j ACCEPT
/sbin/iptables -t filter -A OUTPUT -p udp --dport 53 -j ACCEPT
/sbin/iptables -t filter -A INPUT -p tcp --dport 53 -j ACCEPT
/sbin/iptables -t filter -A INPUT -p udp --dport 53 -j ACCEPT
# NTP Out
/sbin/iptables -t filter -A OUTPUT -p udp --dport 123 -j ACCEPT
# HTTP + HTTPS Out
#/sbin/iptables -t filter -A OUTPUT -p tcp --dport 80 -j ACCEPT
/sbin/iptables -t filter -A OUTPUT -p tcp --dport 443 -j ACCEPT
# HTTP + HTTPS In
#/sbin/iptables -t filter -A INPUT -p tcp --dport 80 -j ACCEPT
/sbin/iptables -t filter -A INPUT -p tcp --dport 443 -j ACCEPT
# Mail SMTP:25
/sbin/iptables -t filter -A INPUT -p tcp --dport 25 -j ACCEPT
/sbin/iptables -t filter -A OUTPUT -p tcp --dport 25 -j ACCEPT
# Mail POP3:110
#/sbin/iptables -t filter -A INPUT -p tcp --dport 110 -j ACCEPT
#/sbin/iptables -t filter -A OUTPUT -p tcp --dport 110 -j ACCEPT
# Mail IMAP:143
#/sbin/iptables -t filter -A INPUT -p tcp --dport 143 -j ACCEPT
#/sbin/iptables -t filter -A OUTPUT -p tcp --dport 143 -j ACCEPT
# Mail POP3S:995
#/sbin/iptables -t filter -A INPUT -p tcp --dport 995 -j ACCEPT
#/sbin/iptables -t filter -A OUTPUT -p tcp --dport 995 -j ACCEPT