1
|
<?xml version="1.0" encoding="UTF-8" ?>
|
2
|
|
3
|
<firewall name="/usr/share/era/modeles/5zones-AixMars.xml" model="/usr/share/era/modeles/5zones.xml" version="2.42">
|
4
|
<zones>
|
5
|
</zones>
|
6
|
<include>
|
7
|
iptables -t nat -N NONAT
|
8
|
iptables -t nat -I NONAT -j ACCEPT
|
9
|
iptables -t nat -I PREROUTING ! -i eth0 -d 10.0.0.0/8 -j NONAT
|
10
|
iptables -t nat -I PREROUTING -d 172.16.0.0/12 -j NONAT
|
11
|
iptables -t nat -I PREROUTING -d 192.168.0.0/16 -j NONAT
|
12
|
iptables -t nat -I PREROUTING -d 161.48.0.0/19 -j NONAT
|
13
|
iptables -t nat -I PREROUTING -d 79.174.192.22/32 -j NONAT
|
14
|
iptables -t nat -I PREROUTING -d 79.174.192.38/32 -j NONAT
|
15
|
iptables -t nat -I PREROUTING -d 195.221.236.208/32 -j NONAT
|
16
|
iptables -t nat -I PREROUTING -d 83.97.61.199/32 -j NONAT
|
17
|
iptables -t nat -I PREROUTING -d 83.97.61.244/32 -j NONAT
|
18
|
if [ "$type_etab" = "Lycee_Region" ] ; then
|
19
|
iptables -t nat -I PREROUTING -d 10.40.0.0/16 -j RETURN
|
20
|
fi
|
21
|
iptables -D pub-bas -i eth4 -p tcp --dport 3128 -j ACCEPT
|
22
|
iptables -t nat -D PREROUTING -i eth4 -p tcp --dport 80 --tcp-flags SYN,RST,ACK SYN ! -d %%adresse_ip_eth0/32 -j REDIRECT --to-ports 3128
|
23
|
iptables -D pub-bas -i eth4 -p tcp --dport 3128 -j ACCEPT
|
24
|
iptables -t nat -D PREROUTING -i eth4 -p tcp --dport 3128 --tcp-flags SYN,RST,ACK SYN ! -d %%adresse_ip_eth0/32 -j REDIRECT --to-ports 3128
|
25
|
iptables -D pub-bas -i eth4 -p tcp --dport 3128 -j ACCEPT
|
26
|
iptables -t nat -D PREROUTING -i eth4 -p tcp --dport 8080 --tcp-flags SYN,RST,ACK SYN ! -d %%adresse_ip_eth0/32 -j REDIRECT --to-ports 3128
|
27
|
iptables -D pub-bas -d %%adresse_ip_eth4/32 -i eth4 -p tcp -m state --state NEW -m tcp --dport 3128 --tcp-flags SYN,RST,ACK SYN -j ACCEPT
|
28
|
iptables -A adm-ext -s 88.190.20.94 -i eth1 -o eth0 -p tcp -m state --state NEW -m tcp --dport 4882 --tcp-flags SYN,RST,ACK SYN -j ACCEPT
|
29
|
iptables -A ped-ext -s 88.190.20.94 -i eth2 -o eth0 -p tcp -m state --state NEW -m tcp --dport 4882 --tcp-flags SYN,RST,ACK SYN -j ACCEPT
|
30
|
iptables -I ext-bas -d %%adresse_ip_eth0/32 -p tcp -m tcp --dport 8062 -j DROP
|
31
|
if [ -e /usr/share/era/ipset-tor ] ; then
|
32
|
. /usr/share/era/ipset-tor &> /dev/null
|
33
|
iptables -I OUTPUT -o eth0 -p tcp -m tcp -m set --match-set bastion-tor dst -j DROP
|
34
|
iptables -I FORWARD -o eth0 -p tcp -m tcp -m set --match-set bastion-tor dst -j DROP
|
35
|
fi
|
36
|
type_etab=$(CreoleGet type_etab)
|
37
|
if [ "$type_etab" = "CG13" ] ; then
|
38
|
iptables -t nat -A POSTROUTING -o eth0 -s 10.231.0.0/255.255.0.0 -j SNAT --to-source %%adresse_ip_eth0
|
39
|
fi
|
40
|
if [ -e /etc/sysconfig/regles-locales ] ; then
|
41
|
. /etc/sysconfig/regles-locales
|
42
|
fi
|
43
|
</include>
|
44
|
<services>
|
45
|
<service name="EDT" protocol="tcp" ports="49500" id="73" libelle="EDT-tcp" tcpwrapper=""/>
|
46
|
<service name="EDT-udp" protocol="udp" ports="55200" id="74" libelle="EDT-udp" tcpwrapper=""/>
|
47
|
<service name="Kav_WOL" protocol="udp" ports="60000" id="70" libelle="WakeOnLan Kaspersky" tcpwrapper=""/>
|
48
|
<service name="absence_9000" protocol="tcp" ports="9000" id="46" libelle="absence_9000" tcpwrapper=""/>
|
49
|
<service name="agent_kav" protocol="tcp" ports="14000" id="47" libelle="agent_kav" tcpwrapper=""/>
|
50
|
<service name="agent_kav_ssl" protocol="tcp" ports="13000" id="65" libelle="agent_kav_ssl" tcpwrapper=""/>
|
51
|
<service name="ead_4201" protocol="tcp" ports="4201" id="76" libelle="Acces backend EAD" tcpwrapper=""/>
|
52
|
<service name="http80" protocol="tcp" ports="80" id="71" libelle="port 80 (le nom de service http est deja utilise dans le modele dijon donc on utilise le nom http80)" tcpwrapper=""/>
|
53
|
<service name="https443" protocol="tcp" ports="443" id="72" libelle="port 443 (le nom de service http est deja utilise dans le modele dijon donc on utilise le nom https443)" tcpwrapper=""/>
|
54
|
<service name="impression" protocol="tcp" ports="9100" id="75" libelle="port imprimantes" tcpwrapper=""/>
|
55
|
<service name="kav_control_client" protocol="udp" ports="15000" id="68" libelle="" tcpwrapper=""/>
|
56
|
<service name="ldap_ssl" protocol="tcp" ports="636" id="101" libelle="service d'annuaire" tcpwrapper=""/>
|
57
|
<service name="ldap_tcp" protocol="tcp" ports="389" id="67" libelle="service d'annuaire" tcpwrapper=""/>
|
58
|
<service name="ldap_udp" protocol="udp" ports="389" id="64" libelle="service d'annuaire" tcpwrapper=""/>
|
59
|
<service name="ntp_tcp" protocol="tcp" ports="123" id="48" libelle="ntp_tcp" tcpwrapper=""/>
|
60
|
<service name="ntp_udp" protocol="udp" ports="123" id="49" libelle="ntp_udp" tcpwrapper=""/>
|
61
|
<service name="pronote_49300" protocol="tcp" ports="49300" id="50" libelle="pronote_49300" tcpwrapper=""/>
|
62
|
<service name="pronote_8000" protocol="tcp" ports="8000" id="51" libelle="pronote_8000" tcpwrapper=""/>
|
63
|
<service name="snmp_tcp" protocol="tcp" ports="161-162" id="52" libelle="snmp_tcp" tcpwrapper=""/>
|
64
|
<service name="snmp_udp" protocol="udp" ports="161-162" id="53" libelle="snmp_udp" tcpwrapper=""/>
|
65
|
<service name="ssh_exterieur" protocol="tcp" ports="25000" id="69" libelle="ssh sur dmz depuis l'exterieur" tcpwrapper=""/>
|
66
|
<service name="trend_cnnx_client" protocol="tcp" ports="13000" id="100" libelle="connexion du client trend à son serveur" tcpwrapper=""/>
|
67
|
<service name="trend_cnnx_console" protocol="tcp" ports="4343" id="99" libelle="port de connexion du client à la console TREND" tcpwrapper=""/>
|
68
|
<service name="zwook_443" protocol="tcp" ports="443" id="63" libelle="zwwok_443" tcpwrapper=""/>
|
69
|
<service name="zwook_80" protocol="tcp" ports="80" id="62" libelle="zwook_80" tcpwrapper=""/>
|
70
|
<service name="zwook_9080" protocol="tcp" ports="9080" id="61" libelle="zwook_9080" tcpwrapper=""/>
|
71
|
<groupe id="EDT" libelle="acces EDT depuis exterieur">
|
72
|
<service name="EDT" protocol="tcp" ports="49500" id="73" libelle="EDT-tcp" tcpwrapper=""/>
|
73
|
<service name="EDT-udp" protocol="udp" ports="55200" id="74" libelle="EDT-udp" tcpwrapper=""/>
|
74
|
</groupe>
|
75
|
<groupe id="gr_ead_AixMars" libelle="groupe EAD (8501, 4200, 4201)">
|
76
|
<service name="ead_4201" protocol="tcp" ports="4201" id="76" libelle="Acces backend EAD" tcpwrapper=""/>
|
77
|
</groupe>
|
78
|
<groupe id="gr_kav" libelle="Agent Kaspersky">
|
79
|
<service name="agent_kav" protocol="tcp" ports="14000" id="47" libelle="agent_kav" tcpwrapper=""/>
|
80
|
<service name="agent_kav_ssl" protocol="tcp" ports="13000" id="65" libelle="agent_kav_ssl" tcpwrapper=""/>
|
81
|
</groupe>
|
82
|
<groupe id="gr_kav_control" libelle="Kaspersky Controle des Clients et WakeOnLan">
|
83
|
<service name="Kav_WOL" protocol="udp" ports="60000" id="70" libelle="WakeOnLan Kaspersky" tcpwrapper=""/>
|
84
|
<service name="kav_control_client" protocol="udp" ports="15000" id="68" libelle="" tcpwrapper=""/>
|
85
|
</groupe>
|
86
|
<groupe id="gr_ldap" libelle="service d'annuaire TCP et UDP">
|
87
|
<service name="ldap_tcp" protocol="tcp" ports="389" id="67" libelle="service d'annuaire" tcpwrapper=""/>
|
88
|
<service name="ldap_udp" protocol="udp" ports="389" id="64" libelle="service d'annuaire" tcpwrapper=""/>
|
89
|
</groupe>
|
90
|
<groupe id="gr_ntp" libelle="gr_ntp">
|
91
|
<service name="ntp_tcp" protocol="tcp" ports="123" id="48" libelle="ntp_tcp" tcpwrapper=""/>
|
92
|
<service name="ntp_udp" protocol="udp" ports="123" id="49" libelle="ntp_udp" tcpwrapper=""/>
|
93
|
</groupe>
|
94
|
<groupe id="gr_pronote_ext" libelle="gr_pronote_ext">
|
95
|
<service name="pronote_49300" protocol="tcp" ports="49300" id="50" libelle="pronote_49300" tcpwrapper=""/>
|
96
|
<service name="pronote_8000" protocol="tcp" ports="8000" id="51" libelle="pronote_8000" tcpwrapper=""/>
|
97
|
</groupe>
|
98
|
<groupe id="gr_snmp" libelle="Snmp en TCP et UDP">
|
99
|
<service name="snmp_tcp" protocol="tcp" ports="161-162" id="52" libelle="snmp_tcp" tcpwrapper=""/>
|
100
|
<service name="snmp_udp" protocol="udp" ports="161-162" id="53" libelle="snmp_udp" tcpwrapper=""/>
|
101
|
</groupe>
|
102
|
<groupe id="gr_trend" libelle="ports utilisé par les clients TREND">
|
103
|
<service name="trend_cnnx_client" protocol="tcp" ports="13000" id="100" libelle="connexion du client trend à son serveur" tcpwrapper=""/>
|
104
|
<service name="trend_cnnx_console" protocol="tcp" ports="4343" id="99" libelle="port de connexion du client à la console TREND" tcpwrapper=""/>
|
105
|
</groupe>
|
106
|
<groupe id="gr_www" libelle="http et https">
|
107
|
<service name="http80" protocol="tcp" ports="80" id="71" libelle="port 80 (le nom de service http est deja utilise dans le modele dijon donc on utilise le nom http80)" tcpwrapper=""/>
|
108
|
<service name="https443" protocol="tcp" ports="443" id="72" libelle="port 443 (le nom de service http est deja utilise dans le modele dijon donc on utilise le nom https443)" tcpwrapper=""/>
|
109
|
</groupe>
|
110
|
<groupe id="gr_zwook" libelle="gr_zwook">
|
111
|
<service name="zwook_80" protocol="tcp" ports="80" id="62" libelle="zwook_80" tcpwrapper=""/>
|
112
|
<service name="zwook_9080" protocol="tcp" ports="9080" id="61" libelle="zwook_9080" tcpwrapper=""/>
|
113
|
<service name="zwook_443" protocol="tcp" ports="443" id="63" libelle="zwwok_443" tcpwrapper=""/>
|
114
|
</groupe>
|
115
|
</services>
|
116
|
<qosclasses upload="" download="">
|
117
|
</qosclasses>
|
118
|
<extremites>
|
119
|
<extremite zone="privdmz" name="ip_acces_vpn_dmzpri" libelle="Adresse destination acces VPN DMZ privée" netmask="%%netmask_acces_vpn_dmzpri" subnet="1" type="" interface="" container="">
|
120
|
<ip address="%%ip_acces_vpn_dmzpri"/>
|
121
|
</extremite>
|
122
|
<extremite zone="admin" name="ip_acces_vpn_admin" libelle="Adresse destination acces VPN reseau admin" netmask="%%netmask_acces_vpn_admin" subnet="1" type="" interface="" container="">
|
123
|
<ip address="%%ip_acces_vpn_admin"/>
|
124
|
</extremite>
|
125
|
<extremite zone="exterieur" name="ip_source_acces_vpn_dmzpri" libelle="Adresse source de l'acces au reseau DMZ privée par VPN" netmask="%%netmask_source_acces_vpn_dmzpri" subnet="1" type="" interface="" container="">
|
126
|
<ip address="%%ip_source_acces_vpn_dmzpri"/>
|
127
|
</extremite>
|
128
|
<extremite zone="pedago" name="ip_pronote_peda" libelle="ip srv note sur le peda" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
|
129
|
<ip address="%%ip_pronote_peda"/>
|
130
|
</extremite>
|
131
|
<extremite zone="privdmz" name="ip_spipzwook_dmzpri" libelle="srv ip spipzwook dmzpri" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
|
132
|
<ip address="%%ip_spipzwook_dmzpri"/>
|
133
|
</extremite>
|
134
|
<extremite zone="exterieur" name="ip_source_acces_vpn_peda" libelle="Adresse source de l'acces au reseau peda par VPN" netmask="%%netmask_source_acces_vpn_peda" subnet="1" type="" interface="" container="">
|
135
|
<ip address="%%ip_source_acces_vpn_peda"/>
|
136
|
</extremite>
|
137
|
<extremite zone="pubdmz" name="ip_edt_dmzpub" libelle="Serveur EDT en dmz pub" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
|
138
|
<ip address="%%ip_edt_dmzpub"/>
|
139
|
</extremite>
|
140
|
<extremite zone="pubdmz" name="serveur_web" libelle="Serveur web sur DMZ publique" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
|
141
|
<ip address="%%ip_web_dmzpub"/>
|
142
|
</extremite>
|
143
|
<extremite zone="bastion" name="ip_bastion_eth1" libelle="IP bastion eth1" netmask="255.255.255.255" subnet="0" type="conteneur" interface="eth1" container="ip">
|
144
|
<ip address="%%adresse_ip_eth1"/>
|
145
|
</extremite>
|
146
|
<extremite zone="bastion" name="ip_bastion_eth0" libelle="adresse IP eth0" netmask="255.255.255.255" subnet="0" type="conteneur" interface="eth1" container="ip">
|
147
|
<ip address="%%adresse_ip_eth0"/>
|
148
|
</extremite>
|
149
|
<extremite zone="pedago" name="ip_scribe_peda" libelle="Serveur Scribe en zone péda" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
|
150
|
<ip address="%%ip_scribe_peda"/>
|
151
|
</extremite>
|
152
|
<extremite zone="privdmz" name="ip_edt_dmzpri" libelle="Serveur EDT en dmz pri" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
|
153
|
<ip address="%%ip_edt_dmzpri"/>
|
154
|
</extremite>
|
155
|
<extremite zone="pedago" name="ip_srv_antivirus" libelle="adresse IP du serveur antivirus" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
|
156
|
<ip address="%%ip_srv_antivirus"/>
|
157
|
</extremite>
|
158
|
<extremite zone="privdmz" name="ip_pronote_dmzpri" libelle="ip srv note en dmz prive" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
|
159
|
<ip address="%%ip_pronote_dmzpri"/>
|
160
|
</extremite>
|
161
|
<extremite zone="admin" name="ip_amon_eth1" libelle="IP Amon eth1" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
|
162
|
<ip address="%%adresse_ip_eth1"/>
|
163
|
</extremite>
|
164
|
<extremite zone="privdmz" name="ip_scribe_pri" libelle="Serveur Scribe en DMZ privée" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
|
165
|
<ip address="%%ip_scribe_pri"/>
|
166
|
</extremite>
|
167
|
<extremite zone="pubdmz" name="ip_srv_dmzpub_cas" libelle="Serveur DMZ publique en mode CAS" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
|
168
|
<ip address="%%ip_srv_dmzpub_cas"/>
|
169
|
</extremite>
|
170
|
<extremite zone="pedago" name="ETH0_peda" libelle="Eth0 pour DNAT vers peda" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
|
171
|
<ip address="%%adresse_ip_eth0"/>
|
172
|
</extremite>
|
173
|
<extremite zone="privdmz" name="ip_srv_antivirus_dmz" libelle="adresse IP du serveur antivirus en DMZ" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
|
174
|
<ip address="%%ip_srv_antivirus_dmz"/>
|
175
|
</extremite>
|
176
|
<extremite zone="pubdmz" name="ssh_dmzpub" libelle="Serveur SSH sur DMZ publique" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
|
177
|
<ip address="%%ip_ssh_dmzpub"/>
|
178
|
</extremite>
|
179
|
<extremite zone="pubdmz" name="ip_spipzwook_dmzpub" libelle="ip srv zwook dmz pub" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
|
180
|
<ip address="%%ip_spipzwook_dmzpub"/>
|
181
|
</extremite>
|
182
|
<extremite zone="pubdmz" name="ip_acces_vpn_dmzpub" libelle="Adresse destination acces VPN DMZ publique" netmask="%%netmask_acces_vpn_dmzpub" subnet="1" type="" interface="" container="">
|
183
|
<ip address="%%ip_acces_vpn_dmzpub"/>
|
184
|
</extremite>
|
185
|
<extremite zone="pedago" name="PC_supervision" libelle="Station supervision des lycées" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
|
186
|
<ip address="%%ip_supervision"/>
|
187
|
</extremite>
|
188
|
<extremite zone="pubdmz" name="srv_absence" libelle="Serveur Absence port 9000" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
|
189
|
<ip address="%%ip_absence_dmzpub"/>
|
190
|
</extremite>
|
191
|
<extremite zone="admin" name="imprimantes_acces_peda" libelle="imprimantes admin accesibles du reseau peda" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
|
192
|
<ip address="%%ip_imprimantes_acces_peda"/>
|
193
|
</extremite>
|
194
|
<extremite zone="pubdmz" name="ip_srv_pub_antivirus" libelle="IPs des serveurs à proteger en DMZ pub" netmask="%%netmask_srv_pub_antivirus" subnet="1" type="" interface="" container="">
|
195
|
<ip address="%%ip_srv_pub_antivirus"/>
|
196
|
</extremite>
|
197
|
<extremite zone="pedago" name="ip_sauv_nas" libelle="ip serveur a sauvegarder" netmask="%%netmask_sauv_nas" subnet="1" type="" interface="" container="">
|
198
|
<ip address="%%ip_sauv_nas"/>
|
199
|
</extremite>
|
200
|
<extremite zone="privdmz" name="ip_srv_pri_antivirus" libelle="adresses IP des serveurs à proteger en DMZ prive" netmask="%%netmask_srv_pri_antivirus" subnet="1" type="" interface="" container="">
|
201
|
<ip address="%%ip_srv_pri_antivirus"/>
|
202
|
</extremite>
|
203
|
<extremite zone="privdmz" name="ETH0_dmzpri" libelle="Eth0 pour DNAT vers peda" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
|
204
|
<ip address="%%adresse_ip_eth0"/>
|
205
|
</extremite>
|
206
|
<extremite zone="pedago" name="ip_amon_eth2" libelle="IP Amon eth2" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
|
207
|
<ip address="%%adresse_ip_eth2"/>
|
208
|
</extremite>
|
209
|
<extremite zone="exterieur" name="ip_source_acces_vpn_dmzpub" libelle="Adresse source de l'acces au reseau DMZ publique par VPN" netmask="%%netmask_source_acces_vpn_dmzpub" subnet="1" type="" interface="" container="">
|
210
|
<ip address="%%ip_source_acces_vpn_dmzpub"/>
|
211
|
</extremite>
|
212
|
<extremite zone="privdmz" name="ip_srv_dmzpri_cas" libelle="Serveur DMZ privée en mode CAS" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
|
213
|
<ip address="%%ip_srv_dmzpri_cas"/>
|
214
|
</extremite>
|
215
|
<extremite zone="pubdmz" name="ETH0_DMZPUB" libelle="Eth0 pour DNAT vers DMZ PUB" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
|
216
|
<ip address="%%adresse_ip_eth0"/>
|
217
|
</extremite>
|
218
|
<extremite zone="admin" name="ip_srv_antivirus_adm" libelle="IP du serveur antivirus sur le reseau admin" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
|
219
|
<ip address="%%ip_srv_antivirus_adm"/>
|
220
|
</extremite>
|
221
|
<extremite zone="pubdmz" name="ip_pronote_dmzpub" libelle="ip srv note en dmz pub" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
|
222
|
<ip address="%%ip_pronote_dmzpub"/>
|
223
|
</extremite>
|
224
|
<extremite zone="pedago" name="Vlans_Peda" libelle="Reseau Global Vlan Peda" netmask="%%netmask_global_vlanpeda" subnet="1" type="" interface="" container="">
|
225
|
<ip address="%%adresse_global_vlanpeda"/>
|
226
|
</extremite>
|
227
|
<extremite zone="privdmz" name="ip_nas" libelle="ip du serveur nas" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
|
228
|
<ip address="%%ip_nas"/>
|
229
|
</extremite>
|
230
|
<extremite zone="exterieur" name="ip_source_acces_vpn_admin" libelle="Adresse source de l'acces au reseau admin par VPN" netmask="%%netmask_source_acces_vpn_admin" subnet="1" type="" interface="" container="">
|
231
|
<ip address="%%ip_source_acces_vpn_admin"/>
|
232
|
</extremite>
|
233
|
<extremite zone="pedago" name="ip_acces_vpn_peda" libelle="Adresse destination acces VPN reseau peda" netmask="%%netmask_acces_vpn_peda" subnet="1" type="" interface="" container="">
|
234
|
<ip address="%%ip_acces_vpn_peda"/>
|
235
|
</extremite>
|
236
|
<extremite zone="pedago" name="ip_edt_peda" libelle="serveur EDT sur reseau peda" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
|
237
|
<ip address="%%ip_edt_peda"/>
|
238
|
</extremite>
|
239
|
<extremite zone="exterieur" name="reseau_rectorat" libelle="Reseau du Rectorat" netmask="255.255.254.0" subnet="1" type="" interface="" container="">
|
240
|
<ip address="195.83.252.0"/>
|
241
|
</extremite>
|
242
|
</extremites>
|
243
|
<ranges>
|
244
|
</ranges>
|
245
|
<user_groups>
|
246
|
<user_group name="professeurs" id="10001"/>
|
247
|
<user_group name="élèves" id="10002"/>
|
248
|
</user_groups>
|
249
|
<applications>
|
250
|
<app_group name="Navigateur Web" description="Liste des navigateurs web">
|
251
|
<app name="Internet Explorer"/>
|
252
|
<app name="Firefox"/>
|
253
|
<app name="AutresNav"/>
|
254
|
</app_group>
|
255
|
<application name="AutresNav" description="Autres navigateurs">
|
256
|
<path name="C:\Program Files\*opera*"/>
|
257
|
</application>
|
258
|
<application name="Firefox" description="Navigateur Mozilla Firefox">
|
259
|
<path name="C:\Program Files\*firefox*"/>
|
260
|
<path name="/usr/bin/*firefox*"/>
|
261
|
</application>
|
262
|
<application name="Internet Explorer" description="Navigateur Internet Explorer">
|
263
|
<path name="C:\Program Files\Internet Explorer\*ieplorer*"/>
|
264
|
</application>
|
265
|
</applications>
|
266
|
<flux-list>
|
267
|
<flux zoneA="bastion" zoneB="exterieur">
|
268
|
<montantes default_policy="0">
|
269
|
</montantes>
|
270
|
<descendantes default_policy="1">
|
271
|
</descendantes>
|
272
|
</flux>
|
273
|
<flux zoneA="exterieur" zoneB="admin">
|
274
|
<montantes default_policy="0">
|
275
|
<directive tag="acces_vpn_admin" service="tous" priority="1" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser acces depuis client VPN vers admin" ipsec="0" accept="0">
|
276
|
<source name="ip_source_acces_vpn_admin"/>
|
277
|
<destination name="ip_acces_vpn_admin"/>
|
278
|
</directive>
|
279
|
</montantes>
|
280
|
<descendantes default_policy="1">
|
281
|
<directive service="tous" priority="6" action="16" attrs="0" nat_extr="exterieur_bastion" nat_port="0" src_inv="0" dest_inv="0" serv_inv="0" libelle="pas de description" ipsec="0" accept="0">
|
282
|
<source name="admin_restreint"/>
|
283
|
<destination name="exterieur"/>
|
284
|
</directive>
|
285
|
</descendantes>
|
286
|
</flux>
|
287
|
<flux zoneA="bastion" zoneB="admin">
|
288
|
<montantes default_policy="0">
|
289
|
<directive tag="activer_lightsquid" service="lightsquid" priority="13" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser lightsquid pour eth1" ipsec="0" accept="0">
|
290
|
<source name="admin_admin"/>
|
291
|
<destination name="ip_bastion_eth0"/>
|
292
|
</directive>
|
293
|
</montantes>
|
294
|
<descendantes default_policy="1">
|
295
|
</descendantes>
|
296
|
</flux>
|
297
|
<flux zoneA="exterieur" zoneB="pedago">
|
298
|
<montantes default_policy="0">
|
299
|
<directive tag="Acces_Station_Supervision" service="tous" priority="1" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Acces a la station de supervision (Lycée)" ipsec="0" accept="0">
|
300
|
<source name="exterieur"/>
|
301
|
<destination name="PC_supervision"/>
|
302
|
</directive>
|
303
|
<directive tag="acces_vpn_peda" service="tous" priority="2" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser acces depuis client VPN vers peda" ipsec="0" accept="0">
|
304
|
<source name="ip_source_acces_vpn_peda"/>
|
305
|
<destination name="ip_acces_vpn_peda"/>
|
306
|
</directive>
|
307
|
<directive tag="entpeda" service="ldap" priority="3" action="8" attrs="17" nat_extr="ip_scribe_peda" nat_port="389" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT pour LDAP depuis Seshat vers ENT péda" ipsec="0" accept="0">
|
308
|
<source name="reseau_rectorat"/>
|
309
|
<destination name="ETH0_peda"/>
|
310
|
</directive>
|
311
|
<directive tag="entpeda" service="ldaps" priority="4" action="8" attrs="17" nat_extr="ip_scribe_peda" nat_port="636" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT pour LDAPS depuis Seshat vers ENT péda" ipsec="0" accept="0">
|
312
|
<source name="reseau_rectorat"/>
|
313
|
<destination name="ETH0_peda"/>
|
314
|
</directive>
|
315
|
<directive tag="entpeda" service="eole-sso" priority="5" action="8" attrs="17" nat_extr="ip_scribe_peda" nat_port="8443" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT pour SSO vers ENT péda" ipsec="0" accept="0">
|
316
|
<source name="exterieur"/>
|
317
|
<destination name="ETH0_peda"/>
|
318
|
</directive>
|
319
|
</montantes>
|
320
|
<descendantes default_policy="1">
|
321
|
<directive tag="intercopeda" service="tous" priority="11" action="16" attrs="17" nat_extr="exterieur_bastion" nat_port="0" src_inv="0" dest_inv="0" serv_inv="0" libelle="SNAT pour le reseau global péda" ipsec="0" accept="0">
|
322
|
<source name="Vlans_Peda"/>
|
323
|
<destination name="exterieur"/>
|
324
|
</directive>
|
325
|
</descendantes>
|
326
|
</flux>
|
327
|
<flux zoneA="admin" zoneB="pedago">
|
328
|
<montantes default_policy="0">
|
329
|
<directive tag="kav_control_ped" service="gr_kav_control" priority="1" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="kaspersky controle et WakeOnLan des clients admin à partir du server Kav Peda" ipsec="0" accept="0">
|
330
|
<source name="ip_srv_antivirus"/>
|
331
|
<destination name="admin"/>
|
332
|
</directive>
|
333
|
<directive tag="imprimantes_ped_vers_adm" service="impression" priority="2" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise l'acces aux imprimantes réseau depuis le réseau pedago" ipsec="0" accept="0">
|
334
|
<source name="pedago"/>
|
335
|
<destination name="imprimantes_acces_peda"/>
|
336
|
</directive>
|
337
|
<directive tag="kav_ped_vers_adm" service="gr_kav" priority="3" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser zone peda dialoguer avec serveur kav admin" ipsec="0" accept="0">
|
338
|
<source name="pedago"/>
|
339
|
<destination name="ip_srv_antivirus_adm"/>
|
340
|
</directive>
|
341
|
<directive tag="trend_control_ped" service="gr_trend" priority="4" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="controles des postes trend depuis le serveur peda vers l'admin" ipsec="0" accept="0">
|
342
|
<source name="ip_srv_antivirus"/>
|
343
|
<destination name="admin"/>
|
344
|
</directive>
|
345
|
<directive tag="trend_ped_vers_adm" service="gr_trend" priority="5" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser client TREND de PEDA vers ADMIN" ipsec="0" accept="0">
|
346
|
<source name="pedago"/>
|
347
|
<destination name="ip_srv_antivirus_adm"/>
|
348
|
</directive>
|
349
|
</montantes>
|
350
|
<descendantes default_policy="1">
|
351
|
</descendantes>
|
352
|
</flux>
|
353
|
<flux zoneA="bastion" zoneB="pedago">
|
354
|
<montantes default_policy="0">
|
355
|
<directive tag="AdminDepuisEth2" service="eole-sso" priority="14" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Authentification SSO sur eth1 depuis reseau pedago pour l'EAD" ipsec="0" accept="0">
|
356
|
<source name="pedago_admin"/>
|
357
|
<destination name="ip_bastion_eth1"/>
|
358
|
</directive>
|
359
|
<directive tag="activer_lightsquid" service="lightsquid" priority="15" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser peda vers lightsquid" ipsec="0" accept="0">
|
360
|
<source name="pedago_admin"/>
|
361
|
<destination name="ip_bastion_eth0"/>
|
362
|
</directive>
|
363
|
</montantes>
|
364
|
<descendantes default_policy="1">
|
365
|
</descendantes>
|
366
|
</flux>
|
367
|
<flux zoneA="exterieur" zoneB="privdmz">
|
368
|
<montantes default_policy="0">
|
369
|
<directive tag="acces_vpn_dmzpri" service="tous" priority="1" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser acces depuis client VPN vers DMZ pri" ipsec="0" accept="0">
|
370
|
<source name="ip_source_acces_vpn_dmzpri"/>
|
371
|
<destination name="ip_acces_vpn_dmzpri"/>
|
372
|
</directive>
|
373
|
<directive tag="entdmzpri" service="ldap" priority="2" action="8" attrs="17" nat_extr="ip_scribe_pri" nat_port="389" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT pour LDAP depuis Seshat vers ENT dmz privée" ipsec="0" accept="0">
|
374
|
<source name="reseau_rectorat"/>
|
375
|
<destination name="ETH0_dmzpri"/>
|
376
|
</directive>
|
377
|
<directive tag="entdmzpri" service="ldaps" priority="3" action="8" attrs="17" nat_extr="ip_scribe_pri" nat_port="636" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT pour LDAPS depuis Seshat vers ENT dmz privée" ipsec="0" accept="0">
|
378
|
<source name="reseau_rectorat"/>
|
379
|
<destination name="ETH0_dmzpri"/>
|
380
|
</directive>
|
381
|
<directive tag="entdmzpri" service="eole-sso" priority="4" action="8" attrs="17" nat_extr="ip_scribe_pri" nat_port="8443" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT pour SSO vers ENT dmz privée" ipsec="0" accept="0">
|
382
|
<source name="exterieur"/>
|
383
|
<destination name="ETH0_dmzpri"/>
|
384
|
</directive>
|
385
|
</montantes>
|
386
|
<descendantes default_policy="1">
|
387
|
<directive service="tous" priority="6" action="16" attrs="0" nat_extr="exterieur_bastion" nat_port="0" src_inv="0" dest_inv="0" serv_inv="0" libelle="SNAT pour l'acces des serveurs DMZ privés vers l'exterieur" ipsec="0" accept="0">
|
388
|
<source name="privdmz_restreint"/>
|
389
|
<destination name="exterieur"/>
|
390
|
</directive>
|
391
|
<directive service="gr_redirection_http" priority="7" action="4" attrs="0" nat_port="3128" src_inv="0" dest_inv="1" serv_inv="0" libelle="Redirection des flux http sans proxy" ipsec="0" accept="0">
|
392
|
<source name="privdmz"/>
|
393
|
<destination name="exterieur_bastion"/>
|
394
|
</directive>
|
395
|
<directive service="gr_redirection_http" priority="8" action="4" attrs="0" nat_port="81" src_inv="0" dest_inv="0" serv_inv="0" libelle="Redirection des flux vers le serveur de distribution du fichier wpad" ipsec="0" accept="0">
|
396
|
<source name="privdmz"/>
|
397
|
<destination name="exterieur"/>
|
398
|
</directive>
|
399
|
<directive service="gr_redirection_https" priority="9" action="4" attrs="0" nat_port="82" src_inv="0" dest_inv="0" serv_inv="0" libelle="Redirection des flux https sans proxy vers une page d'erreur" ipsec="0" accept="0">
|
400
|
<source name="privdmz"/>
|
401
|
<destination name="exterieur"/>
|
402
|
</directive>
|
403
|
</descendantes>
|
404
|
</flux>
|
405
|
<flux zoneA="admin" zoneB="privdmz">
|
406
|
<montantes default_policy="0">
|
407
|
<directive tag="kav_control_pri" service="gr_kav_control" priority="1" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Kaspersky controle et WakeOnLan des clients admin à partir du server Kav en DMZpri" ipsec="0" accept="0">
|
408
|
<source name="ip_srv_antivirus_dmz"/>
|
409
|
<destination name="admin"/>
|
410
|
</directive>
|
411
|
<directive tag="kav_pri_vers_adm" service="gr_kav" priority="2" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser serveur DMZ_pri a dialoguer avec serveur kav admin" ipsec="0" accept="0">
|
412
|
<source name="ip_srv_pri_antivirus"/>
|
413
|
<destination name="ip_srv_antivirus_adm"/>
|
414
|
</directive>
|
415
|
<directive tag="trend_control_pri" service="gr_trend" priority="3" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="controle de TREND de la DMZ vers la zone ADMIN" ipsec="0" accept="0">
|
416
|
<source name="ip_srv_antivirus_dmz"/>
|
417
|
<destination name="admin"/>
|
418
|
</directive>
|
419
|
<directive tag="trend_pri_vers_adm" service="gr_trend" priority="4" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="client TREND DMZ pub vers serveur ADMIN" ipsec="0" accept="0">
|
420
|
<source name="ip_srv_pri_antivirus"/>
|
421
|
<destination name="ip_srv_antivirus_adm"/>
|
422
|
</directive>
|
423
|
</montantes>
|
424
|
<descendantes default_policy="1">
|
425
|
</descendantes>
|
426
|
</flux>
|
427
|
<flux zoneA="bastion" zoneB="privdmz">
|
428
|
<montantes default_policy="0">
|
429
|
<directive tag="spipzwook_dmzpri" service="gr_ntp" priority="11" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise Zwook a se synchroniser (NTP) sur l'amon" ipsec="0" accept="0">
|
430
|
<source name="ip_spipzwook_dmzpri"/>
|
431
|
<destination name="bastion"/>
|
432
|
</directive>
|
433
|
<directive service="echo-request" priority="12" action="2" attrs="0" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise ETH4 a répondre au ping depuis DMZ pri" ipsec="0" accept="0">
|
434
|
<source name="privdmz_restreint"/>
|
435
|
<destination name="bastion"/>
|
436
|
</directive>
|
437
|
</montantes>
|
438
|
<descendantes default_policy="1">
|
439
|
</descendantes>
|
440
|
</flux>
|
441
|
<flux zoneA="exterieur" zoneB="pubdmz">
|
442
|
<montantes default_policy="0">
|
443
|
<directive tag="serveur_web_CG13_Region" service="gr_www" priority="1" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorisation d'acces au serveur WEB depuis l'exterieur (CG13_Region)" ipsec="0" accept="0">
|
444
|
<source name="exterieur"/>
|
445
|
<destination name="serveur_web"/>
|
446
|
</directive>
|
447
|
<directive tag="serveur_web_FAI" service="http" priority="2" action="8" attrs="17" nat_extr="serveur_web" nat_port="80" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT de l'autorisation d'accés au serveur WEB depuis l'exterieur (FAI)" ipsec="0" accept="0">
|
448
|
<source name="exterieur"/>
|
449
|
<destination name="ETH0_DMZPUB"/>
|
450
|
</directive>
|
451
|
<directive tag="serveur_absence_CG13_Region" service="absence_9000" priority="3" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorisation d'acces au serveur absence sur port 9000 (CG13_Region)" ipsec="0" accept="0">
|
452
|
<source name="exterieur"/>
|
453
|
<destination name="srv_absence"/>
|
454
|
</directive>
|
455
|
<directive tag="serveur_absence_FAI" service="absence_9000" priority="4" action="8" attrs="17" nat_extr="srv_absence" nat_port="9000" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT pour acces au serveur absence en port 9000 (FAI)" ipsec="0" accept="0">
|
456
|
<source name="exterieur"/>
|
457
|
<destination name="ETH0_DMZPUB"/>
|
458
|
</directive>
|
459
|
<directive tag="pronote_dmz_CG13_Region" service="gr_pronote_ext" priority="5" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise accès pronote en dmz pub port 8000 et 49300 (CG13_Region)" ipsec="0" accept="0">
|
460
|
<source name="exterieur"/>
|
461
|
<destination name="ip_pronote_dmzpub"/>
|
462
|
</directive>
|
463
|
<directive tag="pronote_dmz_FAI" service="pronote_49300" priority="6" action="8" attrs="17" nat_extr="ip_pronote_dmzpub" nat_port="49300" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT port 49300 de l'ext vers srv pronote pub (FAI)" ipsec="0" accept="0">
|
464
|
<source name="exterieur"/>
|
465
|
<destination name="ETH0_DMZPUB"/>
|
466
|
</directive>
|
467
|
<directive tag="pronote_dmz_FAI" service="pronote_8000" priority="7" action="8" attrs="17" nat_extr="ip_pronote_dmzpub" nat_port="8000" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT port 8000 de l'ext vers srv pronote pub (FAI)" ipsec="0" accept="0">
|
468
|
<source name="exterieur"/>
|
469
|
<destination name="ETH0_DMZPUB"/>
|
470
|
</directive>
|
471
|
<directive tag="edt_dmz_CG13_Region" service="EDT" priority="8" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise accès EDT en dmz pub port tcp 49500 (CG13_Region)" ipsec="0" accept="0">
|
472
|
<source name="exterieur"/>
|
473
|
<destination name="ip_edt_dmzpub"/>
|
474
|
</directive>
|
475
|
<directive tag="edt_dmz_FAI" service="EDT" priority="9" action="8" attrs="17" nat_extr="ip_edt_dmzpub" nat_port="49500" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT ports tcp 49500 de l'ext vers srv EDT pub (FAI)" ipsec="0" accept="0">
|
476
|
<source name="exterieur"/>
|
477
|
<destination name="ETH0_DMZPUB"/>
|
478
|
</directive>
|
479
|
<directive tag="zwook_dmzpub_CG13_Region" service="gr_zwook" priority="10" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise ports 80, 9080,443 de l'ext vers zwook pub (CG13_Region)" ipsec="0" accept="0">
|
480
|
<source name="exterieur"/>
|
481
|
<destination name="ip_spipzwook_dmzpub"/>
|
482
|
</directive>
|
483
|
<directive tag="zwook_dmzpub_FAI" service="http" priority="11" action="8" attrs="17" nat_extr="ip_spipzwook_dmzpub" nat_port="80" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT port 80 de l'ext vers zwook pub (FAI)" ipsec="0" accept="0">
|
484
|
<source name="exterieur"/>
|
485
|
<destination name="ETH0_DMZPUB"/>
|
486
|
</directive>
|
487
|
<directive tag="zwook_dmzpub_FAI" service="zwook_9080" priority="12" action="8" attrs="17" nat_extr="ip_spipzwook_dmzpub" nat_port="9080" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT port 9080 de l'ext vers zwook pub (FAI)" ipsec="0" accept="0">
|
488
|
<source name="exterieur"/>
|
489
|
<destination name="ETH0_DMZPUB"/>
|
490
|
</directive>
|
491
|
<directive tag="zwook_dmzpub_FAI" service="https" priority="13" action="8" attrs="17" nat_extr="ip_spipzwook_dmzpub" nat_port="443" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT port 443 de l'ext vers zwook pub (FAI)" ipsec="0" accept="0">
|
492
|
<source name="exterieur"/>
|
493
|
<destination name="ETH0_DMZPUB"/>
|
494
|
</directive>
|
495
|
<directive tag="acces_vpn_dmzpub" service="tous" priority="14" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser acces depuis client VPN vers DMZ pub" ipsec="0" accept="0">
|
496
|
<source name="ip_source_acces_vpn_dmzpub"/>
|
497
|
<destination name="ip_acces_vpn_dmzpub"/>
|
498
|
</directive>
|
499
|
<directive tag="ssh_dmzpub_CG13_Region" service="ssh_exterieur" priority="15" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise accès SSH en dmz pub sur port 25000 (CG13_Region)" ipsec="0" accept="0">
|
500
|
<source name="exterieur"/>
|
501
|
<destination name="ssh_dmzpub"/>
|
502
|
</directive>
|
503
|
<directive tag="ssh_dmzpub_fai" service="ssh_exterieur" priority="16" action="8" attrs="17" nat_extr="ssh_dmzpub" nat_port="25000" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT port 25000 pour SSH de l'ext vers srv en dmzpub (FAI)" ipsec="0" accept="0">
|
504
|
<source name="exterieur"/>
|
505
|
<destination name="ETH0_DMZPUB"/>
|
506
|
</directive>
|
507
|
</montantes>
|
508
|
<descendantes default_policy="1">
|
509
|
<directive tag="zwook_dmzpub_CG13_Region" service="tous" priority="5" action="16" attrs="17" nat_extr="ETH0_DMZPUB" nat_port="0" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise tout zwook pub vers ext (CG13_Region)" ipsec="0" accept="0">
|
510
|
<source name="ip_spipzwook_dmzpub"/>
|
511
|
<destination name="exterieur"/>
|
512
|
</directive>
|
513
|
<directive tag="zwook_dmzpub_FAI" service="tous" priority="6" action="16" attrs="17" nat_extr="ETH0_DMZPUB" nat_port="0" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise tout zwook vers exterieur (FAI)" ipsec="0" accept="0">
|
514
|
<source name="ip_spipzwook_dmzpub"/>
|
515
|
<destination name="exterieur"/>
|
516
|
</directive>
|
517
|
<directive tag="dmzpub_cas_ext" service="eole-sso" priority="7" action="16" attrs="17" nat_extr="ETH0_DMZPUB" nat_port="0" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser les serveurs en DMZ publique en mode CAS à sortir sur le port eole-sso" ipsec="0" accept="0">
|
518
|
<source name="ip_srv_dmzpub_cas"/>
|
519
|
<destination name="exterieur"/>
|
520
|
</directive>
|
521
|
<directive service="tous" priority="8" action="1" attrs="0" src_inv="0" dest_inv="0" serv_inv="0" libelle="Blocage acces Internet depuis DMZ Pub" ipsec="0" accept="0">
|
522
|
<source name="pubdmz"/>
|
523
|
<destination name="exterieur"/>
|
524
|
</directive>
|
525
|
</descendantes>
|
526
|
</flux>
|
527
|
<flux zoneA="admin" zoneB="pubdmz">
|
528
|
<montantes default_policy="0">
|
529
|
<directive tag="kav_pub_vers_adm" service="gr_kav" priority="1" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser serveur DMZ_pub a dialoguer avec serveur kav admin" ipsec="0" accept="0">
|
530
|
<source name="ip_srv_pub_antivirus"/>
|
531
|
<destination name="ip_srv_antivirus_adm"/>
|
532
|
</directive>
|
533
|
<directive tag="trend_pub_vers_adm" service="gr_trend" priority="2" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser trend de la dmz pub vers l'admin" ipsec="0" accept="0">
|
534
|
<source name="ip_srv_pub_antivirus"/>
|
535
|
<destination name="ip_srv_antivirus_adm"/>
|
536
|
</directive>
|
537
|
</montantes>
|
538
|
<descendantes default_policy="1">
|
539
|
</descendantes>
|
540
|
</flux>
|
541
|
<flux zoneA="bastion" zoneB="pubdmz">
|
542
|
<montantes default_policy="0">
|
543
|
<directive tag="zwook_dmzpub_CG13_Region" service="gr_ntp" priority="12" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise Zwook a se synchroniser (NTP) sur l'amon - CG13_Region" ipsec="0" accept="0">
|
544
|
<source name="ip_spipzwook_dmzpub"/>
|
545
|
<destination name="bastion"/>
|
546
|
</directive>
|
547
|
<directive tag="zwook_dmzpub_FAI" service="gr_ntp" priority="13" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise Zwook a se synchroniser (NTP) sur l'amon - FAI" ipsec="0" accept="0">
|
548
|
<source name="ip_spipzwook_dmzpub"/>
|
549
|
<destination name="bastion"/>
|
550
|
</directive>
|
551
|
<directive service="echo-request" priority="14" action="2" attrs="0" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise ETH3 a repondre au ping depuis la zone DMZ pub" ipsec="0" accept="0">
|
552
|
<source name="pubdmz_restreint"/>
|
553
|
<destination name="bastion"/>
|
554
|
</directive>
|
555
|
</montantes>
|
556
|
<descendantes default_policy="1">
|
557
|
</descendantes>
|
558
|
</flux>
|
559
|
<flux zoneA="pedago" zoneB="privdmz">
|
560
|
<montantes default_policy="0">
|
561
|
<directive tag="kav_pri_vers_ped" service="gr_kav" priority="2" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser serveur DMZ_pri a dialoguer avec serveur kav peda" ipsec="0" accept="0">
|
562
|
<source name="ip_srv_pri_antivirus"/>
|
563
|
<destination name="ip_srv_antivirus"/>
|
564
|
</directive>
|
565
|
<directive tag="spipzwook_dmzpri" service="gr_ldap" priority="3" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise ldap 389 du zwook DMZ privé vers peda" ipsec="0" accept="0">
|
566
|
<source name="ip_spipzwook_dmzpri"/>
|
567
|
<destination name="pedago"/>
|
568
|
</directive>
|
569
|
<directive tag="kav_control_pri" service="gr_kav_control" priority="4" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Kaspersky controle et WakeOnLan des clients peda à partir du server Kav en DMZpri" ipsec="0" accept="0">
|
570
|
<source name="ip_srv_antivirus_dmz"/>
|
571
|
<destination name="pedago"/>
|
572
|
</directive>
|
573
|
<directive tag="trend_pri_vers_ped" service="gr_trend" priority="5" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser client trend de dmz prive vers peda" ipsec="0" accept="0">
|
574
|
<source name="ip_srv_pri_antivirus"/>
|
575
|
<destination name="ip_srv_antivirus"/>
|
576
|
</directive>
|
577
|
<directive tag="trend_control_pri" service="gr_trend" priority="6" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser le controle de TREND de la DMZ pub vers le Peda" ipsec="0" accept="0">
|
578
|
<source name="ip_srv_antivirus_dmz"/>
|
579
|
<destination name="pedago"/>
|
580
|
</directive>
|
581
|
<directive tag="dmzpri_cas" service="eole-sso" priority="7" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser eole-sso depuis les serveurs en DMZ privée en mode CAS vers ENT péda" ipsec="0" accept="1">
|
582
|
<source name="ip_srv_dmzpri_cas"/>
|
583
|
<destination name="ip_scribe_peda"/>
|
584
|
</directive>
|
585
|
</montantes>
|
586
|
<descendantes default_policy="1">
|
587
|
<directive tag="Peda_NASpri" service="tous" priority="1" action="1" attrs="17" src_inv="1" dest_inv="0" serv_inv="0" libelle="Interdiction a tout sauf srv pedago vers NAS" ipsec="0" accept="0">
|
588
|
<source name="ip_sauv_nas"/>
|
589
|
<destination name="ip_nas"/>
|
590
|
</directive>
|
591
|
</descendantes>
|
592
|
</flux>
|
593
|
<flux zoneA="pubdmz" zoneB="pedago">
|
594
|
<montantes default_policy="0">
|
595
|
<directive tag="kav_pub_vers_ped" service="gr_kav" priority="1" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise serveurs de DMZ Pub a se connecter a KAV sur pedago" ipsec="0" accept="0">
|
596
|
<source name="ip_srv_pub_antivirus"/>
|
597
|
<destination name="ip_srv_antivirus"/>
|
598
|
</directive>
|
599
|
<directive tag="zwook_dmzpub_CG13_Region" service="gr_ldap" priority="2" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise ldap 389 du zwook vers peda (CG13_Region)" ipsec="0" accept="0">
|
600
|
<source name="ip_spipzwook_dmzpub"/>
|
601
|
<destination name="pedago"/>
|
602
|
</directive>
|
603
|
<directive tag="zwook_dmzpub_CG13_Region" service="dns" priority="3" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise dns 53 du srv zwook pub vers peda (CG13_Region)" ipsec="0" accept="0">
|
604
|
<source name="ip_spipzwook_dmzpub"/>
|
605
|
<destination name="pedago"/>
|
606
|
</directive>
|
607
|
<directive tag="zwook_dmzpub_FAI" service="gr_ldap" priority="4" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise LDAP 389 zwook pub vers peda (FAI)" ipsec="0" accept="0">
|
608
|
<source name="ip_spipzwook_dmzpub"/>
|
609
|
<destination name="pedago"/>
|
610
|
</directive>
|
611
|
<directive tag="zwook_dmzpub_FAI" service="dns" priority="5" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise dns 53 zwook pub vers peda (FAI)" ipsec="0" accept="0">
|
612
|
<source name="ip_spipzwook_dmzpub"/>
|
613
|
<destination name="pedago"/>
|
614
|
</directive>
|
615
|
<directive tag="pronote_peda_CG13_Region" service="pronote_49300" priority="6" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise le port 49300 entre pub(relais-net) vers peda (serveur) (CG13_Region)" ipsec="0" accept="0">
|
616
|
<source name="ip_pronote_dmzpub"/>
|
617
|
<destination name="ip_pronote_peda"/>
|
618
|
</directive>
|
619
|
<directive tag="pronote_peda_FAI" service="pronote_49300" priority="7" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser port 49300 de pub (relais-net) vers peda (srv pronote) (FAI)" ipsec="0" accept="0">
|
620
|
<source name="ip_pronote_dmzpub"/>
|
621
|
<destination name="ip_pronote_peda"/>
|
622
|
</directive>
|
623
|
<directive tag="edt_peda_CG13_Region" service="EDT" priority="8" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise le port 49500 entre pub(EDT relais) vers peda (serveur EDT) (CG13_Region)" ipsec="0" accept="0">
|
624
|
<source name="ip_edt_dmzpub"/>
|
625
|
<destination name="ip_edt_peda"/>
|
626
|
</directive>
|
627
|
<directive tag="edt_peda_FAI" service="EDT" priority="9" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser port 49500 de pub (relais-net) vers peda (srv pronote) (FAI)" ipsec="0" accept="0">
|
628
|
<source name="ip_edt_dmzpub"/>
|
629
|
<destination name="ip_edt_peda"/>
|
630
|
</directive>
|
631
|
<directive tag="trend_pub_vers_ped" service="gr_trend" priority="10" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser trend depuis publique vers prive" ipsec="0" accept="0">
|
632
|
<source name="ip_srv_pub_antivirus"/>
|
633
|
<destination name="ip_srv_antivirus"/>
|
634
|
</directive>
|
635
|
<directive tag="dmzpub_cas_peda" service="eole-sso" priority="11" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser eole-sso depuis les serveurs en DMZ publique en mode CAS vers ENT péda" ipsec="0" accept="1">
|
636
|
<source name="ip_srv_dmzpub_cas"/>
|
637
|
<destination name="ip_scribe_peda"/>
|
638
|
</directive>
|
639
|
</montantes>
|
640
|
<descendantes default_policy="1">
|
641
|
</descendantes>
|
642
|
</flux>
|
643
|
<flux zoneA="pubdmz" zoneB="privdmz">
|
644
|
<montantes default_policy="0">
|
645
|
<directive tag="pronote_dmzpri_CG13_Region" service="pronote_49300" priority="1" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise le port 49300 entre pub(relais-net) vers pri (serveur) (CG13_Region)" ipsec="0" accept="0">
|
646
|
<source name="ip_pronote_dmzpub"/>
|
647
|
<destination name="ip_pronote_dmzpri"/>
|
648
|
</directive>
|
649
|
<directive tag="pronote_dmzpri_FAI" service="pronote_49300" priority="2" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser port 49300 de pub (relais-net) vers pri (srv pronote) (FAI)" ipsec="0" accept="0">
|
650
|
<source name="ip_pronote_dmzpub"/>
|
651
|
<destination name="ip_pronote_dmzpri"/>
|
652
|
</directive>
|
653
|
<directive tag="kav_pub_vers_pri" service="gr_kav" priority="3" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise serveurs de DMZ Pub a se connecter a KAV sur DMZ Pri" ipsec="0" accept="0">
|
654
|
<source name="ip_srv_pub_antivirus"/>
|
655
|
<destination name="ip_srv_antivirus_dmz"/>
|
656
|
</directive>
|
657
|
<directive tag="edt_dmzpri_CG13_Region" service="EDT" priority="4" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise le port 49500 entre pub(EDT relais) vers pri (serveur EDT) (CG13_Region)" ipsec="0" accept="0">
|
658
|
<source name="ip_edt_dmzpub"/>
|
659
|
<destination name="ip_edt_dmzpri"/>
|
660
|
</directive>
|
661
|
<directive tag="edt_dmzpri_FAI" service="EDT" priority="5" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser port 49500 de pub (EDT relais) vers pri (srv EDT) (FAI)" ipsec="0" accept="0">
|
662
|
<source name="ip_edt_dmzpub"/>
|
663
|
<destination name="ip_edt_dmzpri"/>
|
664
|
</directive>
|
665
|
<directive tag="trend_pub_vers_pri" service="gr_trend" priority="6" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser dmz pub vers le serveur trend en dmz prive" ipsec="0" accept="0">
|
666
|
<source name="ip_srv_pub_antivirus"/>
|
667
|
<destination name="ip_srv_antivirus_dmz"/>
|
668
|
</directive>
|
669
|
<directive tag="dmzpub_cas_pri" service="eole-sso" priority="7" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser eole-sso depuis les serveurs en DMZ publique en mode CAS vers ENT dmz privée" ipsec="0" accept="1">
|
670
|
<source name="ip_srv_dmzpub_cas"/>
|
671
|
<destination name="ip_scribe_pri"/>
|
672
|
</directive>
|
673
|
</montantes>
|
674
|
<descendantes default_policy="1">
|
675
|
</descendantes>
|
676
|
</flux>
|
677
|
</flux-list>
|
678
|
</firewall>
|