{"id":1333,"date":"2017-02-20T12:41:36","date_gmt":"2017-02-20T11:41:36","guid":{"rendered":"http:\/\/clark.tipistrani.it\/?p=1333"},"modified":"2017-02-20T12:41:36","modified_gmt":"2017-02-20T11:41:36","slug":"ale338-sh","status":"publish","type":"post","link":"http:\/\/clark.tipistrani.it\/?p=1333","title":{"rendered":"ale338.sh"},"content":{"rendered":"<p>#!\/bin\/bash -x<br \/>\n### BEGIN INIT INFO<br \/>\n# Provides: iptables<br \/>\n# Required-Start: $remote_fs $syslog<br \/>\n# Required-Stop: $remote_fs $syslog<br \/>\n# Default-Start: 2 3 4 5<br \/>\n# Default-Stop: 0 1 6<br \/>\n# Short-Description: Firewall initscript<br \/>\n# Description: Packet filtering iptables firewall<br \/>\n# placed in \/usr\/local\/bin.<br \/>\n### END INIT INFO<br \/>\n### Mario V. Guenzi giugno 2000<br \/>\n### Last modified february 2017<br \/>\nexport PATH=\/bin:\/sbin:\/usr\/bin:\/usr\/sbin:\/usr\/local\/bin:\/usr\/local\/sbin<br \/>\n######################<br \/>\n# start firewall<br \/>\n######################<br \/>\nstart()<br \/>\n{<br \/>\n# set a few variables<br \/>\necho &#8220;Welcome in ale338&#8221;<br \/>\necho &#8220;Alessandra sei la mia vita&#8221;<br \/>\necho &#8220;&#8221;<br \/>\necho &#8221; setting global variables&#8221;<br \/>\necho &#8220;&#8221;<br \/>\nDATE `date` #todays time stamp<br \/>\nIPT=&#8221;`whereis -b iptables | cut -d \\&#8221; \\&#8221; -f 2`&#8221;<br \/>\nEXTIF=&#8221;eth0&#8243; ## word interface<br \/>\nINTIF=&#8221;eth1&#8243; ## lan interface<br \/>\nDMZIF=&#8221;eth3&#8243; ## DMZ interface<br \/>\nLOOPBACK=&#8221;127.0.0.1&#8243; ## lo interface<br \/>\nVIDEO=&#8221;eth0:1&#8243; ## interfaccia per verifica da remoto di videosorveglianza<br \/>\nWEBIF=&#8221;eth0:0&#8243; ## interfaccia su cui girano le applicazioni web da esterno<br \/>\nLAN=&#8221;192.168.2.0\/24&#8243; #our lan<br \/>\nDMZ=&#8221;192.168.200.0\/24&#8243; #DMZ lan<br \/>\nEXTIP=&#8221;`ifconfig $EXTIF | grep inet| cut -f2 -d:| cut -f1 -d&#8221; &#8220;`&#8221;<br \/>\nINTIP=&#8221;`ifconfig $INTIF | grep inet| cut -f2 -d:| cut -f1 -d&#8221; &#8220;`&#8221;<br \/>\nDMZIP=&#8221;`ifconfig $DMZIF | grep inet| cut -f2 -d:| cut -f1 -d&#8221; &#8220;`&#8221;<br \/>\nVIDIP=&#8221;`ifconfig $VIDEO | grep inet| cut -f2 -d:| cut -f1 -d&#8221; &#8220;`&#8221;<br \/>\nWEBIP=&#8221;`ifconfig $WEBIF | grep inet| cut -f2 -d:| cut -f1 -d&#8221; &#8220;`&#8221;<br \/>\nLOG_LEVEL=&#8221;info&#8221;<br \/>\nCHIMERA=&#8221;192.168.2.224&#8243;<br \/>\nCASA=&#8221;xx.174.xxx.214&#8243;<br \/>\nGRECALE=&#8221;192.168.2.251&#8243;<br \/>\nPERSEO=&#8221;192.168.2.240&#8243;<br \/>\nSTRONMBOLI=&#8221;192.168.2.232&#8243;<br \/>\nCRM=&#8221;192.168.200.10&#8243;<br \/>\nRESERVED_NET=&#8221;0.0.0.0\/8 1.0.0.0\/8 2.0.0.0\/8 10.0.0.0\/8 172.16.0.0\/12 192.168.0.0\/16 \\<br \/>\n224.0.0.0\/4 240.0.0.0\/5&#8243;<br \/>\nLOG_LEVEL=&#8221;info&#8221;<br \/>\n# adjust \/proc<br \/>\necho &#8221; applying general security settings to \/proc filesystem&#8221;<br \/>\necho &#8220;&#8221;<br \/>\nif [ -e \/proc\/sys\/net\/ipv4\/tcp_syncookies ]; then echo 1 &gt; \/proc\/sys\/net\/ipv4\/tcp_syncookies; fi<br \/>\nif [ -e \/proc\/sys\/net\/ipv4\/conf\/all\/rp_filter ]; then echo 1 &gt; \/proc\/sys\/net\/ipv4\/conf\/all\/rp_filter; fi<br \/>\nif [ -e \/proc\/sys\/net\/ipv4\/ip_forward ]; then echo 1 &gt; \/proc\/sys\/net\/ipv4\/ip_forward; fi<br \/>\nif [ -e \/proc\/sys\/net\/ipv4\/icmp_ignore_bogus_error_responses ]; then echo 1 &gt; \/proc\/sys\/net\/ipv4\/icmp_ignore_bogus_error_responses; fi<br \/>\nif [ -e \/proc\/sys\/net\/ipv4\/conf\/all\/accept_source_route ]; then echo 0 &gt; \/proc\/sys\/net\/ipv4\/conf\/all\/accept_source_route; fi<br \/>\nif [ -e \/proc\/sys\/net\/ipv4\/tcp_ecn ]; then echo 0 &gt; \/proc\/sys\/net\/ipv4\/tcp_ecn; fi<br \/>\nif [ -e \/proc\/sys\/net\/ipv4\/conf\/all\/send_redirects ]; then echo 0 &gt; \/proc\/sys\/net\/ipv4\/conf\/all\/send_redirects; fi<br \/>\nif [ -e \/proc\/sys\/net\/ipv4\/conf\/all\/accept_redirects ]; then echo 0 &gt; \/proc\/sys\/net\/ipv4\/conf\/all\/accept_redirects; fi<br \/>\nif [ -e \/proc\/sys\/net\/ipv4\/conf\/all\/secure_redirects ]; then echo 1 &gt; \/proc\/sys\/net\/ipv4\/conf\/all\/secure_redirects; fi<br \/>\nif [ -e \/proc\/sys\/net\/ipv4\/icmp_echo_ignore_broadcasts ]; then echo 1 &gt; \/proc\/sys\/net\/ipv4\/icmp_echo_ignore_broadcasts; fi<br \/>\nif [ -e \/proc\/sys\/net\/ipv4\/netfilter\/ip_ct_generic_timeout ]; then echo 120 &gt; \/proc\/sys\/net\/ipv4\/netfilter\/ip_ct_generic_timeout; fi<br \/>\nif [ -f \/proc\/sys\/net\/ipv4\/conf\/$EXTIF\/log_martians ]; then echo 1 &gt; \/proc\/sys\/net\/ipv4\/conf\/$EXTIF\/log_martians; fi<br \/>\nif [ -f \/proc\/sys\/net\/ipv4\/conf\/$INTIF\/log_martians ]; then echo 0 &gt; \/proc\/sys\/net\/ipv4\/conf\/$INTIF\/log_martians; fi<br \/>\nif [ -f \/proc\/sys\/net\/ipv4\/tcp_timestamps ]; then echo 1 &gt; \/proc\/sys\/net\/ipv4\/tcp_timestamps; fi<\/p>\n<p>### Attempt to flush All rules in filter table<br \/>\n$IPT -F &gt; \/dev\/null<br \/>\n### Mmmm I&#8217;m not sure old way maybe is better<br \/>\n$IPT -F INPUT &gt; \/dev\/null<br \/>\n$IPT -F FORWARD &gt; \/dev\/null<br \/>\n$IPT -F OUTPUT &gt; \/dev\/null<br \/>\n$IPT -F -t nat &gt; \/dev\/null<br \/>\n## Flush Rules\/delete User chains in mangle table, if any<br \/>\n$IPT -F -t mangle<br \/>\n$IPT -t mangle -X<br \/>\n### Delete all user-defined chains, reduces dumb warning if you run<br \/>\n### this script more than once.<br \/>\n$IPT -X<\/p>\n<p>### Set default policy<br \/>\n$IPT -t nat -P PREROUTING ACCEPT<br \/>\n$IPT -t nat -P POSTROUTING ACCEPT<br \/>\n$IPT -P INPUT DROP ###Higly Reccomended Default Policy<br \/>\n$IPT -P OUTPUT DROP<br \/>\n$IPT -P FORWARD DROP<br \/>\n$IPT -t nat -A POSTROUTING -s $LAN -o $EXTIF -j SNAT &#8211;to-source $EXTIP<br \/>\n#$IPT -t nat -A POSTROUTING -s $DMZ -o $WEBIF -j SNAT &#8211;to-source $WEBIP<br \/>\n### lo interface<br \/>\n$IPT -A INPUT -i lo -j ACCEPT<br \/>\n$IPT -A OUTPUT -o lo -j ACCEPT<br \/>\n### Some check on packets status<br \/>\n$IPT -N KEEP_STATE<br \/>\n$IPT -F KEEP_STATE<\/p>\n<p>$IPT -A KEEP_STATE -m state &#8211;state INVALID -j DROP<br \/>\n$IPT -A KEEP_STATE -m state &#8211;state RELATED,ESTABLISHED -j ACCEPT<\/p>\n<p>### Some check on packets flag<br \/>\n$IPT -N CHECK_FLAGS<br \/>\n$IPT -F CHECK_FLAGS<\/p>\n<p>NMAP FIN\/URG\/PSH<br \/>\n$IPT -A CHECK_FLAGS -p tcp &#8211;tcp-flags ALL FIN,URG,PSH -m limit &#8211;limit 5\/minute -j LOG &#8211;log-level $LOG_LEVEL &#8211;log-prefix &#8220;NMAP-XMAS:&#8221;<br \/>\n$IPT -A CHECK_FLAGS -p tcp &#8211;tcp-flags ALL FIN,URG,PSH -j DROP<br \/>\n### SYN\/RST<br \/>\n$IPT -A CHECK_FLAGS -p tcp &#8211;tcp-flags SYN,RST SYN,RST -m limit &#8211;limit 5\/minute -j LOG &#8211;log-level $LOG_LEVEL &#8211;log-prefix &#8220;SYN\/RST:&#8221;<br \/>\n$IPT -A CHECK_FLAGS -p tcp &#8211;tcp-flags SYN,RST SYN,RST -j DROP<br \/>\n### SYN\/FIN Scan(probably)<br \/>\n$IPT -A CHECK_FLAGS -p tcp &#8211;tcp-flags SYN,FIN SYN,FIN -m limit &#8211;limit 5\/minute -j LOG &#8211;log-level $LOG_LEVEL &#8211;log-prefix &#8220;SYN\/FIN:&#8221;<br \/>\n$IPT -A CHECK_FLAGS -p tcp &#8211;tcp-flags SYN,FIN SYN,FIN -j DROP<br \/>\n## Chain DENY_PORTS This rules will DROP\/LOG pachets based on port number<br \/>\n$IPT -N DENY_PORTS<br \/>\n$IPT -F DENY_PORTS<br \/>\n$IPT -N DENY_NET<br \/>\n$IPT -F DENY_NET<br \/>\n### do not allow forbiden addresses on eth0<br \/>\n$IPT -I INPUT -i $EXTIF -s 0.0.0.0\/8 -j DROP<br \/>\n$IPT -I INPUT -i $EXTIF -s 2.0.0.0\/8 -j DROP<br \/>\n$IPT -I INPUT -i $EXTIF -s 10.0.0.0\/8 -j DROP<br \/>\n$IPT -I INPUT -i $EXTIF -s 172.16.0.0\/12 -j DROP<br \/>\n$IPT -I INPUT -i $EXTIF -s 192.168.0.0\/16 -j DROP<br \/>\n$IPT -I INPUT -i $EXTIF -s 127.0.0.0\/8 -j DROP<br \/>\n$IPT -I INPUT -i $EXTIF -s 224.0.0.0\/4 -j DROP<br \/>\n$IPT -I INPUT -i $EXTIF -s 240.0.0.0\/5 -j DROP<br \/>\n$IPT -I FORWARD -i $EXTIF -s 0.0.0.0\/8 -j DROP<br \/>\n$IPT -I FORWARD -i $EXTIF -s 2.0.0.0\/8 -j DROP<br \/>\n$IPT -I FORWARD -i $EXTIF -s 10.0.0.0\/8 -j DROP<br \/>\n$IPT -I FORWARD -i $EXTIF -s 172.16.0.0\/12 -j DROP<br \/>\n$IPT -I FORWARD -i $EXTIF -s 192.168.0.0\/16 -j DROP<br \/>\n$IPT -I FORWARD -i $EXTIF -s 127.0.0.0\/8 -j DROP<br \/>\n$IPT -I FORWARD -i $EXTIF -s 224.0.0.0\/4 -j DROP<br \/>\n$IPT -I FORWARD -i $EXTIF -s 240.0.0.0\/5 -j DROP<br \/>\n$IPT -A INPUT -i $EXTIF -d $LOOPBACK -j DROP<br \/>\n$IPT -A INPUT -i $EXTIF -s $EXTIP -j DROP<\/p>\n<p>DENIED_TCP_PORTS=&#8221;111 137:139 635 2049 6000:6063 10498 12754 20034 12345:12346 \\<br \/>\n27374 27444 27665 31335&#8243;<br \/>\nfor PORT in $DENIED_TCP_PORTS; do<br \/>\n$IPT -A DENY_PORTS -p tcp &#8211;dport $PORT -m limit &#8211;limit 5\/minute \\<br \/>\n-j LOG &#8211;log-level $LOG_LEVEL &#8211;log-prefix &#8220;DENIED PORT:&#8221;<br \/>\n$IPT -A DENY_PORTS -p tcp &#8211;sport $PORT -m limit &#8211;limit 5\/minute \\<br \/>\n-j LOG &#8211;log-level $LOG_LEVEL &#8211;log-prefix &#8220;DENIED PORT:&#8221;<br \/>\n$IPT -A DENY_PORTS -p tcp &#8211;dport $PORT -j DROP<br \/>\n$IPT -A DENY_PORTS -p tcp &#8211;sport $PORT -j DROP<br \/>\ndone<br \/>\n$IPT -A DENY_PORTS -p tcp &#8211;dport 113 -j REJECT &#8211;reject-with tcp-reset<br \/>\nDENIED_UDP_PORTS=&#8221;111 512 514 515 635 2049 10498 27444 31335 31337&#8243;<br \/>\nfor PORT in $DENIED_UDP_PORTS; do<br \/>\n$IPT -A DENY_PORTS -p udp &#8211;dport $PORT -m limit &#8211;limit 5\/minute \\<br \/>\n-j LOG &#8211;log-level $LOG_LEVEL &#8211;log-prefix &#8220;DENIED PORT:&#8221;<br \/>\n$IPT -A DENY_PORTS -p udp &#8211;sport $PORT -m limit &#8211;limit 5\/minute \\<br \/>\n-j LOG &#8211;log-level $LOG_LEVEL &#8211;log-prefix &#8220;DENIED PORT:&#8221;<br \/>\n$IPT -A DENY_PORTS -p udp &#8211;dport $PORT -j DROP<br \/>\n$IPT -A DENY_PORTS -p udp &#8211;sport $PORT -j DROP<br \/>\ndone<\/p>\n<p>Blocking TOR traffic read from \/usr\/local\/bin\/torblock.sh<br \/>\n$IPT -N TOR_BLOCK<br \/>\n$IPT -F TOR_BLOCK<br \/>\n$IPT -I INPUT -j TOR_BLOCK<br \/>\n$IPT -I OUTPUT -j TOR_BLOCK<br \/>\n$IPT -I FORWARD -j TOR_BLOCK<br \/>\n### ICMP FILTER<br \/>\n### Deny icmp-type<br \/>\n$IPT -N FilterICMP<br \/>\n$IPT -F FilterICMP<br \/>\n$IPT -A FilterICMP -p icmp &#8211;icmp-type echo-request -i $EXTIF -j DROP<br \/>\n$IPT -A FilterICMP -p icmp &#8211;icmp-type router-advertisement -i $EXTIF -j DROP<br \/>\n$IPT -A FilterICMP -p icmp &#8211;icmp-type router-solicitation -i $EXTIF -j DROP<br \/>\n$IPT -A FilterICMP -p icmp &#8211;icmp-type address-mask-request -i $EXTIF -j DROP<br \/>\n$IPT -A FilterICMP -p icmp &#8211;icmp-type address-mask-reply -i $EXTIF -j DROP<br \/>\n$IPT -A FilterICMP -p icmp &#8211;icmp-type fragmentation-needed -i $EXTIF -j DROP<br \/>\n$IPT -A FilterICMP -p icmp &#8211;icmp-type host-precedence-violation -i $EXTIF -j DROP<br \/>\n$IPT -A FilterICMP -p icmp &#8211;icmp-type precedence-cutoff -i $EXTIF -j DROP<br \/>\n$IPT -A FilterICMP -p icmp &#8211;icmp-type source-quench -i $EXTIF -j DROP<br \/>\n$IPT -A FilterICMP -p icmp &#8211;icmp-type redirect -i $EXTIF -j DROP<br \/>\n$IPT -A FilterICMP -p icmp &#8211;icmp-type network-redirect -i $EXTIF -j DROP<br \/>\n$IPT -A FilterICMP -p icmp &#8211;icmp-type host-redirect -i $EXTIF -j DROP<br \/>\n$IPT -A FilterICMP -p icmp &#8211;icmp-type TOS-network-redirect -i $EXTIF -j DROP<br \/>\n$IPT -A FilterICMP -p icmp &#8211;icmp-type TOS-host-redirect -i $EXTIF -j DROP<br \/>\n$IPT -A FilterICMP -p icmp &#8211;icmp-type timestamp-request -i $EXTIF -j DROP<br \/>\n$IPT -A FilterICMP -p icmp &#8211;icmp-type timestamp-reply -i $EXTIF -j DROP<br \/>\n###Accept icmp-type<br \/>\n$IPT -A FilterICMP -p icmp -i $INTIF -s $EXTIP -j ACCEPT<br \/>\n$IPT -A FilterICMP -p icmp -i $DMZIF -s $EXTIP -j ACCEPT<br \/>\n$IPT -A FilterICMP -p icmp -i $DMZIF -j ACCEPT<br \/>\n$IPT -A OUTPUT -p icmp -m state &#8211;state NEW -j ACCEPT<br \/>\n$IPT -A INPUT -p icmp -m state &#8211;state ESTABLISHED,RELATED -j ACCEPT<br \/>\n$IPT -A FilterICMP -i $EXTIF -p icmp &#8211;icmp-type echo-reply -m limit &#8211;limit 1\/s -j ACCEPT<br \/>\n$IPT -A FilterICMP -i $EXTIF -p icmp &#8211;icmp-type destination-unreachable -m limit &#8211;limit 1\/s -j ACCEPT<br \/>\n$IPT -A FilterICMP -i $EXTIF -p icmp &#8211;icmp-type network-unreachable -m limit &#8211;limit 1\/s -j ACCEPT<br \/>\n$IPT -A FilterICMP -i $EXTIF -p icmp &#8211;icmp-type host-unreachable -m limit &#8211;limit 1\/s -j ACCEPT<br \/>\n$IPT -A FilterICMP -i $EXTIF -p icmp &#8211;icmp-type protocol-unreachable -m limit &#8211;limit 1\/s -j ACCEPT<br \/>\n$IPT -A FilterICMP -i $EXTIF -p icmp &#8211;icmp-type port-unreachable -m limit &#8211;limit 1\/s -j ACCEPT<br \/>\n$IPT -A FilterICMP -i $EXTIF -p icmp &#8211;icmp-type source-route-failed -m limit &#8211;limit 1\/s -j ACCEPT<br \/>\n$IPT -A FilterICMP -i $EXTIF -p icmp &#8211;icmp-type network-unknown -m limit &#8211;limit 1\/s -j ACCEPT<br \/>\n$IPT -A FilterICMP -i $EXTIF -p icmp &#8211;icmp-type host-unknown -m limit &#8211;limit 1\/s -j ACCEPT<br \/>\n$IPT -A FilterICMP -i $EXTIF -p icmp &#8211;icmp-type network-prohibited -m limit &#8211;limit 1\/s -j ACCEPT<br \/>\n$IPT -A FilterICMP -i $EXTIF -p icmp &#8211;icmp-type host-prohibited -m limit &#8211;limit 1\/s -j ACCEPT<br \/>\n$IPT -A FilterICMP -i $EXTIF -p icmp &#8211;icmp-type network-unreachable -m limit &#8211;limit 1\/s -j ACCEPT<br \/>\n$IPT -A FilterICMP -i $EXTIF -p icmp &#8211;icmp-type host-unreachable -m limit &#8211;limit 1\/s -j ACCEPT<br \/>\n$IPT -A FilterICMP -i $EXTIF -p icmp &#8211;icmp-type communication-prohibited -m limit &#8211;limit 1\/s -j ACCEPT<br \/>\n$IPT -A FilterICMP -i $EXTIF -p icmp &#8211;icmp-type time-exceeded -m limit &#8211;limit 1\/s -j ACCEPT<br \/>\n$IPT -A FilterICMP -i $EXTIF -p icmp &#8211;icmp-type ttl-zero-during-transit -m limit &#8211;limit 1\/s -j ACCEPT<br \/>\n$IPT -A FilterICMP -i $EXTIF -p icmp &#8211;icmp-type ttl-zero-during-reassembly -m limit &#8211;limit 1\/s -j ACCEPT<br \/>\n$IPT -A FilterICMP -i $EXTIF -p icmp &#8211;icmp-type parameter-problem -m limit &#8211;limit 1\/s -j ACCEPT<br \/>\n$IPT -A FilterICMP -i $EXTIF -p icmp &#8211;icmp-type ip-header-bad -m limit &#8211;limit 1\/s -j ACCEPT<br \/>\n$IPT -A FilterICMP -i $EXTIF -p icmp &#8211;icmp-type required-option-missing -m limit &#8211;limit 1\/s -j ACCEPT<br \/>\n###ACCEPT Rules<br \/>\n$IPT -A INPUT -p tcp &#8211;dport 1722 -j ACCEPT<br \/>\n$IPT -A FORWARD -p tcp &#8211;dport 1722 -j ACCEPT<br \/>\n$IPT -A FORWARD -i eth0 -p tcp &#8211;dport 21 -j ACCEPT<br \/>\n$IPT -A INPUT -i $EXTIF -m state &#8211;state ESTABLISHED,RELATED -j ACCEPT<br \/>\n$IPT -A INPUT -i $INTIF -m state &#8211;state NEW -j ACCEPT<br \/>\n$IPT -A INPUT -i $DMZIF -m state &#8211;state NEW -j ACCEPT<br \/>\n$IPT -A INPUT -m state &#8211;state ESTABLISHED,RELATED -j ACCEPT<br \/>\n$IPT -A FORWARD -i $INTIF -m state &#8211;state NEW -j ACCEPT<br \/>\n$IPT -A FORWARD -i $DMZIF -m state &#8211;state NEW -j ACCEPT<br \/>\n$IPT -A FORWARD -m state &#8211;state ESTABLISHED,RELATED -j ACCEPT<br \/>\n$IPT -A OUTPUT -m state &#8211;state NEW,ESTABLISHED,RELATED -j ACCEPT<br \/>\n### Squid<br \/>\n#$IPT -t nat -A PREROUTING -i $INTIF -s ! 192.168.2.1 -p tcp &#8211;dport 80 -j DNAT &#8211;to 192.168.2.1:3128<br \/>\n#$IPT -t nat -A POSTROUTING -o $INTIF -s 192.168.2.0\/24 -d 192.168.2.1 -j SNAT $INTIP<br \/>\n#$IPT -A FORWARD -s $LAN -d 192.168.2.1 -i $INTIF -o $INTIF -p tcp &#8211;dport 3128 -j ACCEPT<\/p>\n<p>### DMZ<br \/>\n### from Internet to DMZ<br \/>\n#$IPT -A INPUT -p tcp -i $EXTIF -d $WEBIP &#8211;sport 1024:65535 &#8211;dport 80 -j ACCEPT<br \/>\n#$IPT -A INPUT -p tcp -i $EXTIF -d $WEBIP &#8211;sport 1024:65535 &#8211;dport 443 -j ACCEPT<br \/>\n#$IPT -A INPUT -p tcp -i $EXTIF -d $WEBIP &#8211;sport 1024:65535 &#8211;dport 1722 -j ACCEPT<br \/>\n#$IPT -A FORWARD -p tcp -i $EXTIF -d $WEBIP &#8211;sport 1024:65535 &#8211;dport 80 -j ACCEPT<br \/>\n#$IPT -A FORWARD -p tcp -i $EXTIF -d $WEBIP &#8211;sport 1024:65535 &#8211;dport 443 -j ACCEPT<br \/>\n#$IPT -A FORWARD -p tcp -i $EXTIF -d $WEBIP &#8211;sport 1024:65535 &#8211;dport 1722 -j ACCEPT<br \/>\n#$IPT -A PREROUTING -p tcp -i $EXTIF -d $WEBIP &#8211;dport 80 -j DNAT &#8211;to-destination $CRM:80<br \/>\n#$IPT -A PREROUTING -p tcp -i $EXTIF -d $WEBIP &#8211;dport 443 -j DNAT &#8211;to-destination $CRM:443<br \/>\n#$IPT -A PREROUTING -p tcp -i $EXTIF -d $WEBIP &#8211;dport 1722 -j DNAT &#8211;to-destination $CRM:1722<br \/>\n### from LAN TO DMZ<br \/>\n#$IPT -A FORWARD -s $LAN -d $DMZ -j ACCEPT<br \/>\n### from DMZ to LAN<br \/>\n#$IPT -A FORWARD -s $DMZ -d $LAN -j REJECT<br \/>\n### FTP<br \/>\n$IPT -t nat -A PREROUTING -i $EXTIF -p tcp -d $EXTIP &#8211;dport 21 -j DNAT &#8211;to-destination $GRECALE:21<br \/>\n### openvpn<br \/>\n$IPT -A INPUT -i $EXTIF -m state &#8211;state NEW,ESTABLISHED,RELATED \\<br \/>\n-p tcp &#8211;dport 775 -j ACCEPT<br \/>\n$IPT -t nat -A PREROUTING -p tcp -i $EXTIF -d $EXTIP &#8211;dport 775 -j DNAT &#8211;to-destination $CHIMERA:775<br \/>\n$IPT -A FORWARD -i $EXTIF -p tcp &#8211;dport 775 -o $INTIF -j ACCEPT<br \/>\n$IPT -t nat -A POSTROUTING -o $INTIF -j SNAT &#8211;to $INTIP<br \/>\n### openvpn road warriors<br \/>\n$IPT -A INPUT -i $EXTIF -m state &#8211;state NEW,ESTABLISHED,RELATED \\<br \/>\n-p udp &#8211;dport 1194 -j ACCEPT<br \/>\n$IPT -t nat -A PREROUTING -p udp -i $EXTIF -d $EXTIP &#8211;dport 1194 -j DNAT &#8211;to-destination $CHIMERA:1194<\/p>\n<p>$IPT -A FORWARD -i $EXTIF -p udp &#8211;dport 1194 -o $INTIF -j ACCEPT<br \/>\n$IPT -t nat -A POSTROUTING -o $INTIF -j SNAT &#8211;to $INTIP<\/p>\n<p>$IPT -A INPUT -i eth0 -p tcp &#8211;dport 0:65535 -j DROP<br \/>\n$IPT -A INPUT -i eth0 -p udp &#8211;dport 0:65535 -j DROP<\/p>\n<p>###<\/p>\n<p>}<\/p>\n<p>#################<br \/>\n# stop firewall<br \/>\n#################<br \/>\nstop()<br \/>\n{<br \/>\nIPT=&#8221;`whereis -b iptables | cut -d \\&#8221; \\&#8221; -f 2`&#8221;<br \/>\n#Flush regole e policy in accept<br \/>\n$IPT -F INPUT &gt; \/dev\/null<br \/>\n$IPT -F OUTPUT &gt; \/dev\/null<br \/>\n$IPT -F FORWARD &gt; \/dev\/null<br \/>\n$IPT -F &gt; \/dev\/null<br \/>\n$IPT -P INPUT ACCEPT<br \/>\n$IPT -P OUTPUT ACCEPT<br \/>\n$IPT -P FORWARD ACCEPT<br \/>\n$IPT -t nat -F<br \/>\n$IPT -t mangle -F<\/p>\n<p>#Disattivazione IP forwarding<br \/>\necho 0 &gt; \/proc\/sys\/net\/ipv4\/ip_forward<br \/>\n}<\/p>\n<p>IPT=&#8221;`whereis -b iptables | cut -d \\&#8221; \\&#8221; -f 2`&#8221;<br \/>\ncase &#8220;$1&#8221; in<br \/>\nstart)<br \/>\nstart<br \/>\n;;<br \/>\nstop)<br \/>\nstop<br \/>\n;;<br \/>\nrestart)<br \/>\nstop<br \/>\nstart<br \/>\n;;<br \/>\nstatus)<br \/>\n$IPT -L -v<br \/>\n;;<br \/>\n*)<br \/>\necho &#8220;Usage: $0 {start | stop | status}&#8221;<br \/>\nexit 1<br \/>\n;;<br \/>\nesac<br \/>\nexit 0<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>#!\/bin\/bash -x ### BEGIN INIT INFO # Provides: iptables # Required-Start: $remote_fs $syslog # Required-Stop: $remote_fs $syslog # Default-Start: 2 3 4 5 # Default-Stop: 0 1 6 # Short-Description: Firewall initscript # Description: Packet filtering iptables firewall # placed in \/usr\/local\/bin. ### END INIT INFO ### Mario V. Guenzi giugno 2000 ### Last modified [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8,14,9,6],"tags":[104,103,108,106],"class_list":["post-1333","post","type-post","status-publish","format-standard","hentry","category-linux","category-networking","category-script","category-work","tag-bash-script","tag-iptables","tag-packet-filtering","tag-security"],"_links":{"self":[{"href":"http:\/\/clark.tipistrani.it\/index.php?rest_route=\/wp\/v2\/posts\/1333","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/clark.tipistrani.it\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/clark.tipistrani.it\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/clark.tipistrani.it\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/clark.tipistrani.it\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1333"}],"version-history":[{"count":2,"href":"http:\/\/clark.tipistrani.it\/index.php?rest_route=\/wp\/v2\/posts\/1333\/revisions"}],"predecessor-version":[{"id":1349,"href":"http:\/\/clark.tipistrani.it\/index.php?rest_route=\/wp\/v2\/posts\/1333\/revisions\/1349"}],"wp:attachment":[{"href":"http:\/\/clark.tipistrani.it\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1333"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/clark.tipistrani.it\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1333"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/clark.tipistrani.it\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}