Table des matières 1 Cœur... 1 1 1 Routeur... 1 1 1 1 Configuration... 1 1 1 2 Fichiers de configuration... 1



Similar documents
Linux Squid Proxy Server

Install and configure a Debian based UniFi controller

Linux Terminal Server Project

INUVIKA OVD VIRTUAL DESKTOP ENTERPRISE

TP : Configuration de routeurs CISCO

Pexip Reverse Proxy and TURN Server Deployment Guide

Sicurezza nelle reti

SI455 Advanced Computer Networking. Lab2: Adding DNS and Servers (v1.0) Due 6 Feb by start of class

Configuring Your Gateman Proxy Server

How to Create, Setup, and Configure an Ubuntu Router with a Transparent Proxy.

Quick Note 052. Connecting to Digi Remote Manager SM Through Web Proxy

Multi-Homing Security Gateway

Adafruit's Raspberry Pi Lesson 3. Network Setup

Building a Penetration Testing Virtual Computer Laboratory

Savvius Insight Initial Configuration

Setting up a Squid-Proxy Server

ZyWALL USG / Fonctions

F-Secure Internet Gatekeeper Virtual Appliance

Create a virtual machine at your assigned virtual server. Use the following specs

How To Connect A Raspberry Pi To The Internet On A Microsoft Moonstone 2 (Microsoft) Microsoft Powerbook 2 (Powerbook 2) (Powerboard 2) And Powerbook 3 (Powerstation 2)

Digium Switchvox AA65 PBX Configuration

CSE/ISE 311: Systems Administra5on Network Firewalls

CYAN SECURE WEB APPLIANCE. User interface manual

Connections and wiring Diagram

Setting up a Raspberry Pi as a WiFi access point

THINKTEL COMMUNICATIONS DIGIUM G100/G200 PRI OVER IP SIP TRUNKING

LAN TCP/IP and DHCP Setup

TCP/IP Network Essentials. Linux System Administration and IP Services

How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface

DriveLock Websecurity

For extra services running behind your router. What to do after IP change

OpenCPN Garmin Radar Plugin

What are the advantages and drawbacks of using DNS wildcard redirection?

IPv6.marceln.org.

Network Configuration Settings

Comodo MyDLP Software Version 2.0. Installation Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

Using VDOMs to host two FortiOS instances on a single FortiGate unit

Using a Cisco PIX Firewall to Limit Outbound Internet Access

H3C Firewall and UTM Devices DNS and NAT Configuration Examples (Comware V5)

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Connecting EWS using DDNS

Brest. Backup : copy flash:ppe_brest1 running-config

This article describes a detailed configuration example that demonstrates how to configure Cyberoam to provide the access of internal resources.

NETWORK SETUP GLOSSARY

NETWORK SETUP GLOSSARY

Configuring a customer owned router to function as a switch with Ultra TV

Implementing Reverse Proxy Using Squid. Prepared By Visolve Squid Team

Creating a VPN with overlapping subnets

ZENworks 11 Support Pack 4 HTTP Proxy Reference. May 2016

Chapter 3 Security and Firewall Protection

DIR-100. Before You Begin. Check Your Package Contents. Triple Play Router

How To Configure Multiburb Smt On A Sidewinder G2 In A Load Sharing Environment

Workshop. Avril 2015 Benoit Buonassera

+ iptables. packet filtering && firewall

Redhat 6.2 Installation Howto -Basic Proxy and Transparent

emerge 50P emerge 5000P

Smart Telephone System

Procedure to Create and Duplicate Master LiveUSB Stick

Software that provides secure access to technology, everywhere.

Dell Proximity Printing Solution. Installation Guide

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

Linux Networking Basics

Corso di Configurazione e Gestione di Reti Locali

Inside-Out Attacks. Security Event April 28, 2004 Page 1. Responses to the following questions

Configuring Ubuntu Server as a Firewall and Reverse Proxy for OWA 2007 Configuration Guide

Secure Web Appliance. Reverse Proxy

Secure Employee Information System to Manage Integrated Network Services

Linux Networking: IP Packet Filter Firewalling

How To Set Up Squid 2.5.Xx (Libdap) On A Pc Or Macbook Or Ipad) On Pc Or Ipa (For Macbook) On An Ipa Or Ipam (For Ipa) On Mac

Inside-Out Attacks. Covert Channel Attacks Inside-out Attacks Seite 1 GLÄRNISCHSTRASSE 7 POSTFACH 1671 CH-8640 RAPPERSWIL

Change Log. 2 per vices corporation

SOA Software API Gateway Appliance 7.1.x Administration Guide

IP Address: the per-network unique identifier used to find you on a network

NNAS-D5 Quick Installation Guide

Multi-Homing Gateway. User s Manual

Firewall. IPTables and its use in a realistic scenario. José Bateira ei10133 Pedro Cunha ei05064 Pedro Grilo ei09137 FEUP MIEIC SSIN

Application Note. Connecting Networks

Dramatically simplifying voice and data networking HOW-TO GUIDE. Bundle Quick Start Guide

Use Domain Name System and IP Version 6

1. What is this? Why would I want it?

Configuring Advanced Windows Server 2012 Services

Network Address Translation Commands

How To Use Windows Live Family Safety On Windows 7 (32 Bit) And Windows Live Safety (64 Bit) On A Pc Or Mac Or Ipad (32)

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

GRAVITYZONE HERE. Deployment Guide VLE Environment

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

6.0. Getting Started Guide

C.A.I.T. 2014/2015 Departamento de Computación Facultad de Informática Universidad de Coruña

Installation of the On Site Server (OSS)

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration

Installing and Scaling out Ubuntu Enterprise Cloud in Virtual Environment

Configuring PA Firewalls for a Layer 3 Deployment

CYBERSITTER NAME. LLC/Solid Oak Software. Company. Version Client. Type of product. Computer. Devices supported

Installation and Configuration Guide

Centralized Cloud Firewall. Ivan Ivanovic BUCC/AMRES Tbilisi, December 2013.

Configure Yealink IP Phones for Asterisk PBX

Securing Networks with PIX and ASA

Cloudvue Remote Desktop Client GUI User Guide

Network System Management. Creating an Active Directory Domain

Transcription:

Table des matières 1 Cœur... 1 1 1 Routeur... 1 1 1 1 Configuration... 1 1 1 2 Fichiers de configuration... 1 1 Routeur 1 1 Routeur 1 1 1 Configuration Nom : routeur1.mlif.local Adresse IP eth0 : dynamique 172.16./16 Adresse IP eth1: statique 192.168.100.1/24 : cœur Adresse IP eth2 : statique 192.168.200.1/24 : DMZ Adresse IP eth3 : statique 192.168.50.1/24 : usagers Domaine dns : mlif.local Serveur dns : 192.168.100.20 Admin : root Mot de passe : root 1 1 2 Fichiers de configuration 1 1 2 1 Réseaux /etc/network/interfaces : # This file describes the network interfaces available on your system # and how to activate them. For more information, see interfaces(5). # The loopback network interface auto lo iface lo inet loopback # The primary network interface auto eth0 allow-hotplug eth0 iface eth0 inet dhcp auto eth1

allow-hotplug eth1 iface eth1 inet static address 192.168.100.1 netmask 255.255.255.0 auto eth2 allow-hotplug eth2 iface eth2 inet static address 192.168.200.1 netmask 255.255.255.0 auto eth3 allow-hotplug eth3 iface eth3 inet static address 192.168.50.1 netmask 255.255.255.0 domain mlif.local dns-search mlif.local dns-nameservers 192.168.100.20 # ##Pour automatiser le NAT, decommenter la ligne suivante: #post-up iptables-restore < /etc/iptables_rules.save 2 DMZ 2-1 Proxy 2-1-1 configuration Nom : srv-proxy.mlif.local Adresse IP eth0: dhcp 192.168.200.10/24 : cœur Domaine dns : mlif.local Serveur dns : 192.168.100.20 Admin : root Mot de passe : root

2-1-2 fichier de configuration /etc/squid3/squid.conf Fichier de configuration de squid /etc/squidguard/squidguard.conf Fichier de configuration de squidguard /var/lib/squidguard/db/blacklists/ Dossier des bases de données des blacklists Fichier de configuration de squid /etc/squid3/squid.conf # Configuration squid3 http_port 3128 # définition des ACL acl usagers src 192.168.50.0/24 acl ports_web port 80 443 acl sites_facebook dstdom_regex.*facebook.* acl sites_twitter dstdom_regex.*twitter.* acl mot_jeu url_regex.*jeu.* acl mot_porn url_regex.*porn.* acl mot_xxx url_regex.*xxx.* acl mot_sport url_regex.*sport.* # Définition des règles http_access deny usagers sites_facebook http_access deny usagers mot_sport http_access deny usagers mot_xxx http_access deny usagers sites_twitter http_access deny usagers mot_porn http_access deny usagers mot_jeu http_access allow usagers ports_web http_access deny all redirect_program /usr/bin/squidguard -c /etc/squidguard/squidguard.conf

Fichier de configuration de squidguard /etc/squidguard/squidguard.conf : dbhome /var/lib/squidguard/db/blacklists logdir /var/log/squid dest porno { domainlist adult/domains urllist adult/urls dest agressive { domainlist aggressive/domains urllist aggressive/urls dest agressif { domainlist aggressif/domains urllist aggressif/urls dest astrology { domainlist astrology/domains urlist astrology/urls dest audio-video { domainlist audio-video/domains urllist audio-video/urls dest download { domainlist download/domains urllist download/urls dest game { domainlist game/domains urllist game/urls dest child { domainlist child/domains urllist game/urls dest drogue { domainlist drogue/domains urllist drogue/urls dest financial { domainlist financial/domains urlist financial/urls

dest forums { domainlist forums/domains urllist forums/urls dest hacking { domainlist hacking/domains urllist hacking/urls dest manga { domainlist manga/domains urllist manga/urls dest lingerie { domainlist lingerie/domains urllist lingerie/urls dest mail { domainlist mail/domains urllist mail/urls dest radio { domainlist radio/domains urllist radio/urls dest sexual_education { domainlist sexual_education/domains urllist sexual_education/urls dest sports { domainlist sports/domains urllist sports/urls dest violence { domainlist violence/domains urllist violence/urls dest phishing { domainlist phishing/domains urllist phishing/urls dest malware {

domainlist malware/domains urllist malware/urls acl { default { pass!porno!agressive!agressif!astrology!astrology!audi$ redirect http://google.fr