Moderator: ago



Code: Select all
#! /bin/sh
ETH_INTERNET=eth0
ETH_LAN=eth1
SUBNET_LAN=192.100.12.0/255.255.255.0
IPTABLES=iptables
iptables -F FORWARD
iptables -F INPUT
iptables -F OUTPUT
iptables -t nat -F POSTROUTING
iptables -P INPUT DROP
iptables -P OUTPUT DROP
iptables -P FORWARD DROP
#------------------------------------------------------------------------------
#-------------- CONTROLLI GENERALI --------------------------------------------
#------------------------------------------------------------------------------
#Se mi entrano in input pacchetti con indirizzi di rete locali dall'interfaccia di internet scartali!!
iptables -A INPUT -s $SUBNET_LAN -i $ETH_INTERNET -j DROP
iptables -A FORWARD -s $SUBNET_LAN -i $ETH_INTERNET -j DROP
#Permetto di entrare nel server solo dalla rete locale (scarto il resto)
iptables -A INPUT -p tcp --destination-port 1024: -s ! $SUBNET_LAN -m state --state RELATED,ESTABLISHED -j ACCEPT
iptables -A INPUT -p tcp --destination-port 1024: -i $ETH_INTERNET -m state --state RELATED,ESTABLISHED -j ACCEPT
iptables -A INPUT -m unclean -j DROP
iptables -A FORWARD -m unclean -j DROP
#Accettiamo per il postfix e cose varie se conoscete metodi meno rischiosi fatemi sapere grazie!!
iptables -A OUTPUT -p tcp --destination-port 0: -s ! $SUBNET_LAN -m state --state NEW,RELATED,ESTABLISHED -j ACCEPT
#------------------------------------------------------------------------------
#-------------- MASQUERADING ----------------------------------------
#------------------------------------------------------------------------------
iptables -t nat -A POSTROUTING -p tcp -o $ETH_INTERNET -j MASQUERADE
#FTP
iptables -A FORWARD -i eth1 -o eth0 -p tcp --destination-port 20 -m state --state NEW,RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -i eth1 -o eth0 -p tcp --destination-port 21 -m state --state NEW,RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -i eth0 -o eth1 -p tcp --source-port 20 -m state --state RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -i eth0 -o eth1 -p tcp --source-port 21 -m state --state RELATED,ESTABLISHED -j ACCEPT
#------------------------------------------------------------------------------
#--- VERIFICATE SE HANNO SENSO A ME SEMBRANO INUTILI OLTRE CHE RISCHIOSE ----
#------------------------------------------------------------------------------
ricordo che però se nn le applicavo X nn mi partiva.
iptables -A FORWARD -i eth1 -o eth0 -p tcp --source-port 1024: --destination-port 1024: -m state --state NEW,RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -i eth0 -o eth1 -p tcp --source-port 1024: --destination-port 1024: -m state --state RELATED,ESTABLISHED -j ACCEPT
#------------------------------------------------------------------------------
#-------------- FORWARD ------------------------------------------------
#------------------------------------------------------------------------------
#Socket
iptables -A INPUT -p tcp -i lo -j ACCEPT
#http
iptables -A FORWARD -p tcp --source-port 80 -d 192.100.12.159 -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -p tcp --source-port 80 -d 192.100.12.28 -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -p tcp --source-port 80 -d 192.100.12.32 -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -p tcp --destination-port 80 -s 192.100.12.159 -i eth1 -m state --state NEW,RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -p tcp --destination-port 80 -s 192.100.12.28 -i eth1 -m state --state NEW,RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -p tcp --destination-port 80 -s 192.100.12.32 -i eth1 -m state --state NEW,RELATED,ESTABLISHED -j ACCEPT
#https
iptables -A FORWARD -p tcp --destination-port 443 -s 192.100.12.159 -i eth1 -m state --state NEW,RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -p tcp --destination-port 443 -s 192.100.12.27 -i eth1 -m state --state NEW,RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -p tcp --destination-port 443 -s 192.100.12.28 -i eth1 -m state --state NEW,RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -p tcp --destination-port 443 -s 192.100.12.6 -i eth1 -m state --state NEW,RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -p tcp --source-port 443 -d 192.100.12.159 -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -p tcp --source-port 443 -d 192.100.12.27 -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -p tcp --source-port 443 -d 192.100.12.28 -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -p tcp --source-port 443 -d 192.100.12.6 -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
#------------------------------------------------------------------------------
#-------------- INPUT/OUTPUT -------------------------------------------
#------------------------------------------------------------------------------
# E-Mail
iptables -A INPUT -p tcp --destination-port 25 -s 192.100.12.159 -j ACCEPT
iptables -A INPUT -p tcp --destination-port 25 -s 192.100.12.28 -j ACCEPT
iptables -A INPUT -p tcp --destination-port 25 -s 192.100.12.32 -j ACCEPT
iptables -A INPUT -p tcp --destination-port 110 -s 192.100.12.159 -j ACCEPT
iptables -A INPUT -p tcp --destination-port 110 -s 192.100.12.28 -j ACCEPT
iptables -A INPUT -p tcp --destination-port 110 -s 192.100.12.32 -j ACCEPT
#Mail
iptables -A INPUT -p tcp --source-port 25 -d 192.100.12.159 -j ACCEPT
iptables -A INPUT -p tcp --source-port 25 -d 192.100.12.28 -j ACCEPT
iptables -A INPUT -p tcp --source-port 25 -d 192.100.12.32 -j ACCEPT
iptables -A INPUT -p tcp --source-port 110 -d 192.100.12.159 -j ACCEPT
iptables -A INPUT -p tcp --source-port 110 -d 192.100.12.28 -j ACCEPT
iptables -A INPUT -p tcp --source-port 110 -d 192.100.12.32 -j ACCEPT
#-----------------------------------------------------------------------------------------------------------------------------------
#--------------------------------------------- ICMP ------------------------------------------------------------------------
#-----------------------------------------------------------------------------------------------------------------------------------
#iptables -A FORWARD -p icmp -m icmp --icmp-type 8 -m length --length 128:65535 -j DROP
#-----------------------------------------------------------------------------------------------------------------------------------
#--------------------------------------------- SAMBA ------------------------------------------------------------------------
#-----------------------------------------------------------------------------------------------------------------------------------
#ssh
iptables -A INPUT -p tcp --destination-port 22 -s 192.100.12.159 -j ACCEPT
iptables -A INPUT -p udp --destination-port 22 -s 192.100.12.159 -j ACCEPT
iptables -A INPUT -p tcp --source-port 22 -d 192.100.12.159 -j ACCEPT
iptables -A INPUT -p udp --source-port 22 -d 192.100.12.159 -j ACCEPT
#telnet
iptables -A INPUT -p tcp --destination-port 23 -s 192.100.12.159 -j ACCEPT
iptables -A INPUT -p udp --destination-port 23 -s 192.100.12.159 -j ACCEPT
iptables -A INPUT -p tcp --source-port 23 -d 192.100.12.159 -j ACCEPT
iptables -A INPUT -p udp --source-port 23 -d 192.100.12.159 -j ACCEPT
#mail
#iptables -A INPUT -p tcp --destination-port 110 -j ACCEPT
#iptables -A INPUT -p tcp --source-port 110 -j ACCEPT
##iptables -A INPUT -p udp --destination-port 110 -j ACCEPT
#iptables -A INPUT -p udp --source-port 110 -j ACCEPT
#iptables -A INPUT -p tcp --destination-port 25 -j ACCEPT
#iptables -A INPUT -p tcp --source-port 25 -j ACCEPT
#iptables -A INPUT -p udp --destination-port 25 -j ACCEPT
#iptables -A INPUT -p udp --source-port 25 -j ACCEPT
#dns
iptables -A INPUT -p tcp --destination-port 53 -j ACCEPT
iptables -A INPUT -p tcp --source-port 53 -j ACCEPT
iptables -A INPUT -p udp --destination-port 53 -j ACCEPT
iptables -A INPUT -p udp --source-port 53 -j ACCEPT
iptables -A FORWARD -p tcp --source-port 53 -j ACCEPT
iptables -A FORWARD -p tcp --destination-port 53 -j ACCEPT
iptables -A FORWARD -p udp --source-port 53 -j ACCEPT
iptables -A FORWARD -p udp --destination-port 53 -j ACCEPT
iptables -A OUTPUT -p tcp --destination-port 53 -j ACCEPT
iptables -A OUTPUT -p tcp --source-port 53 -j ACCEPT
iptables -A OUTPUT -p udp --destination-port 53 -j ACCEPT
iptables -A OUTPUT -p udp --source-port 53 -j ACCEPT
#SAMBA
iptables -A INPUT -p udp --destination-port 137 -s $SUBNET_LAN -i eth1 -j ACCEPT
iptables -A INPUT -p udp --destination-port 138 -s $SUBNET_LAN -i eth1 -j ACCEPT
iptables -A INPUT -p tcp --destination-port 139 -s $SUBNET_LAN -i eth1 -j ACCEPT
iptables -A INPUT -p tcp --destination-port 445 -s $SUBNET_LAN -i eth1 -j ACCEPT
#webmin
iptables -A INPUT -p tcp -s $SUBNET_LAN --destination-port 10000 -i eth1 -j ACCEPT
iptables -A INPUT -p udp -s $SUBNET_LAN --destination-port 10000 -i eth1 -j ACCEPT
iptables -A INPUT -p tcp -d $SUBNET_LAN --source-port 10000 -i eth1 -j ACCEPT
iptables -A INPUT -p udp -d $SUBNET_LAN --source-port 10000 -i eth1 -j ACCEPT
#------------------------------------------------------------------------------
#-------------- OUTPUT -------------------------------------------------
#------------------------------------------------------------------------------
iptables -A OUTPUT -p tcp --destination-port 25 -j ACCEPT
iptables -A OUTPUT -p tcp --destination-port 110 -j ACCEPT
iptables -A OUTPUT -p tcp --source-port 25 -j ACCEPT
iptables -A OUTPUT -p tcp --source-port 110 -j ACCEPT
iptables -A OUTPUT -p tcp --destination-port 20 -j ACCEPT
iptables -A OUTPUT -p tcp --destination-port 21 -j ACCEPT
iptables -A OUTPUT -p tcp --source-port 20 -j ACCEPT
iptables -A OUTPUT -p tcp --source-port 21 -j ACCEPT
iptables -A OUTPUT -p udp --source-port 137 -d $SUBNET_LAN -o $ETH_LAN -j ACCEPT
iptables -A OUTPUT -p udp --source-port 138 -d $SUBNET_LAN -o $ETH_LAN -j ACCEPT
iptables -A OUTPUT -p tcp --source-port 139 -d $SUBNET_LAN -o $ETH_LAN -j ACCEPT
iptables -A OUTPUT -p tcp --source-port 22 -d 192.100.12.159 -j ACCEPT
iptables -A OUTPUT -p udp --source-port 22 -d 192.100.12.159 -j ACCEPT
iptables -A OUTPUT -p tcp --source-port 23 -d 192.100.12.159 -j ACCEPT
iptables -A OUTPUT -p udp --source-port 23 -d 192.100.12.159 -j ACCEPT
iptables -A OUTPUT -p tcp -d $SUBNET_LAN --source-port 10000 -j ACCEPT
iptables -A OUTPUT -p udp -d $SUBNET_LAN --source-port 10000 -j ACCEPT

beh... deve andare bene a te...pistodj wrote:ecco il mio script di iptables:



lascia perdere. snort è un network analyzer, ma viene usato per testare la vulnerabilità della rete e per fare forensics analisys. fa molto più di quello che chiedi, e nello specifico, non è abbastanza dettagliato per quello che vuoi tepistodj wrote:cosa sarebbe snort?? che funzionalità ha in più...??
snort è un IDS (Intrusion Detection System)... anzi è l'IDS. Comunque non server per fare monitoring di prestazioni, ma per analizzare il traffico e beccare le anomalie, tipo attacchi alla rete.k.gothmog wrote:lascia perdere. snort è un network analyzer, ma viene usato per testare la vulnerabilità della rete e per fare forensics analisys. fa molto più di quello che chiedi, e nello specifico, non è abbastanza dettagliato per quello che vuoi tepistodj wrote:cosa sarebbe snort?? che funzionalità ha in più...??