Projet

Général

Profil

5zones-AixMars.xml

Jean-Marc MELET, 23/09/2016 10:48

Télécharger (52,3 ko)

 
1
<?xml version="1.0" encoding="UTF-8" ?>
2

    
3
<firewall name="/usr/share/era/modeles/5zones-AixMars.xml" model="/usr/share/era/modeles/5zones.xml" version="2.42">
4
    <zones>
5
    </zones>
6
    <include>
7
iptables -t nat -N NONAT
8
iptables -t nat -I NONAT -j ACCEPT
9
iptables -t nat -I PREROUTING ! -i eth0 -d 10.0.0.0/8 -j NONAT
10
iptables -t nat -I PREROUTING -d 172.16.0.0/12 -j NONAT
11
iptables -t nat -I PREROUTING -d 192.168.0.0/16 -j NONAT
12
iptables -t nat -I PREROUTING -d 161.48.0.0/19 -j NONAT
13
iptables -t nat -I PREROUTING -d 79.174.192.22/32 -j NONAT
14
iptables -t nat -I PREROUTING -d 79.174.192.38/32 -j NONAT
15
iptables -t nat -I PREROUTING -d 195.221.236.208/32 -j NONAT
16
iptables -t nat -I PREROUTING -d 83.97.61.199/32 -j NONAT
17
iptables -t nat -I PREROUTING -d 83.97.61.244/32 -j NONAT
18
if [ "$type_etab" = "Lycee_Region" ] ; then
19
iptables -t nat -I PREROUTING -d 10.40.0.0/16 -j RETURN
20
fi
21
iptables -D pub-bas -i eth4 -p tcp --dport 3128 -j ACCEPT
22
iptables -t nat -D PREROUTING -i eth4 -p tcp --dport 80 --tcp-flags SYN,RST,ACK SYN ! -d %%adresse_ip_eth0/32 -j REDIRECT --to-ports 3128
23
iptables -D pub-bas -i eth4 -p tcp --dport 3128 -j ACCEPT
24
iptables -t nat -D PREROUTING -i eth4 -p tcp --dport 3128 --tcp-flags SYN,RST,ACK SYN ! -d %%adresse_ip_eth0/32 -j REDIRECT --to-ports 3128
25
iptables -D pub-bas -i eth4 -p tcp --dport 3128 -j ACCEPT
26
iptables -t nat -D PREROUTING -i eth4 -p tcp --dport 8080 --tcp-flags SYN,RST,ACK SYN ! -d %%adresse_ip_eth0/32 -j REDIRECT --to-ports 3128
27
iptables -D pub-bas -d %%adresse_ip_eth4/32 -i eth4 -p tcp -m state --state NEW -m tcp --dport 3128 --tcp-flags SYN,RST,ACK SYN -j ACCEPT
28
iptables -A adm-ext -s 88.190.20.94 -i eth1 -o eth0 -p tcp -m state --state NEW -m tcp --dport 4882 --tcp-flags SYN,RST,ACK SYN -j ACCEPT
29
iptables -A ped-ext -s 88.190.20.94 -i eth2 -o eth0 -p tcp -m state --state NEW -m tcp --dport 4882 --tcp-flags SYN,RST,ACK SYN -j ACCEPT
30
iptables -I ext-bas -d %%adresse_ip_eth0/32 -p tcp -m tcp --dport 8062 -j DROP
31
if [ -e /usr/share/era/ipset-tor ] ; then
32
. /usr/share/era/ipset-tor &amp;&gt; /dev/null
33
iptables -I OUTPUT -o eth0 -p tcp -m tcp -m set --match-set bastion-tor dst -j DROP
34
iptables -I FORWARD -o eth0 -p tcp -m tcp -m set --match-set bastion-tor dst -j DROP
35
fi
36
type_etab=$(CreoleGet type_etab)
37
if [ "$type_etab" = "CG13" ] ; then
38
iptables -t nat -A POSTROUTING -o eth0 -s 10.231.0.0/255.255.0.0 -j SNAT --to-source %%adresse_ip_eth0
39
fi
40
if [ -e /etc/sysconfig/regles-locales ] ; then
41
. /etc/sysconfig/regles-locales
42
fi
43
</include>
44
    <services>
45
        <service name="EDT" protocol="tcp" ports="49500" id="73" libelle="EDT-tcp" tcpwrapper=""/>
46
        <service name="EDT-udp" protocol="udp" ports="55200" id="74" libelle="EDT-udp" tcpwrapper=""/>
47
        <service name="Kav_WOL" protocol="udp" ports="60000" id="70" libelle="WakeOnLan Kaspersky" tcpwrapper=""/>
48
        <service name="absence_9000" protocol="tcp" ports="9000" id="46" libelle="absence_9000" tcpwrapper=""/>
49
        <service name="agent_kav" protocol="tcp" ports="14000" id="47" libelle="agent_kav" tcpwrapper=""/>
50
        <service name="agent_kav_ssl" protocol="tcp" ports="13000" id="65" libelle="agent_kav_ssl" tcpwrapper=""/>
51
        <service name="ead_4201" protocol="tcp" ports="4201" id="76" libelle="Acces backend EAD" tcpwrapper=""/>
52
        <service name="http80" protocol="tcp" ports="80" id="71" libelle="port 80 (le nom de service http est deja utilise dans le modele dijon donc on utilise le nom http80)" tcpwrapper=""/>
53
        <service name="https443" protocol="tcp" ports="443" id="72" libelle="port 443 (le nom de service http est deja utilise dans le modele dijon donc on utilise le nom https443)" tcpwrapper=""/>
54
        <service name="impression" protocol="tcp" ports="9100" id="75" libelle="port imprimantes" tcpwrapper=""/>
55
        <service name="kav_control_client" protocol="udp" ports="15000" id="68" libelle="" tcpwrapper=""/>
56
        <service name="ldap_ssl" protocol="tcp" ports="636" id="101" libelle="service d'annuaire" tcpwrapper=""/>
57
        <service name="ldap_tcp" protocol="tcp" ports="389" id="67" libelle="service d'annuaire" tcpwrapper=""/>
58
        <service name="ldap_udp" protocol="udp" ports="389" id="64" libelle="service d'annuaire" tcpwrapper=""/>
59
        <service name="ntp_tcp" protocol="tcp" ports="123" id="48" libelle="ntp_tcp" tcpwrapper=""/>
60
        <service name="ntp_udp" protocol="udp" ports="123" id="49" libelle="ntp_udp" tcpwrapper=""/>
61
        <service name="pronote_49300" protocol="tcp" ports="49300" id="50" libelle="pronote_49300" tcpwrapper=""/>
62
        <service name="pronote_8000" protocol="tcp" ports="8000" id="51" libelle="pronote_8000" tcpwrapper=""/>
63
        <service name="snmp_tcp" protocol="tcp" ports="161-162" id="52" libelle="snmp_tcp" tcpwrapper=""/>
64
        <service name="snmp_udp" protocol="udp" ports="161-162" id="53" libelle="snmp_udp" tcpwrapper=""/>
65
        <service name="ssh_exterieur" protocol="tcp" ports="25000" id="69" libelle="ssh sur dmz depuis l'exterieur" tcpwrapper=""/>
66
        <service name="trend_cnnx_client" protocol="tcp" ports="13000" id="100" libelle="connexion du client trend à son serveur" tcpwrapper=""/>
67
        <service name="trend_cnnx_console" protocol="tcp" ports="4343" id="99" libelle="port de connexion du client à la console TREND" tcpwrapper=""/>
68
        <service name="zwook_443" protocol="tcp" ports="443" id="63" libelle="zwwok_443" tcpwrapper=""/>
69
        <service name="zwook_80" protocol="tcp" ports="80" id="62" libelle="zwook_80" tcpwrapper=""/>
70
        <service name="zwook_9080" protocol="tcp" ports="9080" id="61" libelle="zwook_9080" tcpwrapper=""/>
71
        <groupe id="EDT" libelle="acces EDT depuis exterieur">
72
            <service name="EDT" protocol="tcp" ports="49500" id="73" libelle="EDT-tcp" tcpwrapper=""/>
73
            <service name="EDT-udp" protocol="udp" ports="55200" id="74" libelle="EDT-udp" tcpwrapper=""/>
74
        </groupe>
75
        <groupe id="gr_ead_AixMars" libelle="groupe EAD (8501, 4200, 4201)">
76
            <service name="ead_4201" protocol="tcp" ports="4201" id="76" libelle="Acces backend EAD" tcpwrapper=""/>
77
        </groupe>
78
        <groupe id="gr_kav" libelle="Agent Kaspersky">
79
            <service name="agent_kav" protocol="tcp" ports="14000" id="47" libelle="agent_kav" tcpwrapper=""/>
80
            <service name="agent_kav_ssl" protocol="tcp" ports="13000" id="65" libelle="agent_kav_ssl" tcpwrapper=""/>
81
        </groupe>
82
        <groupe id="gr_kav_control" libelle="Kaspersky Controle des Clients et WakeOnLan">
83
            <service name="Kav_WOL" protocol="udp" ports="60000" id="70" libelle="WakeOnLan Kaspersky" tcpwrapper=""/>
84
            <service name="kav_control_client" protocol="udp" ports="15000" id="68" libelle="" tcpwrapper=""/>
85
        </groupe>
86
        <groupe id="gr_ldap" libelle="service d'annuaire TCP et UDP">
87
            <service name="ldap_tcp" protocol="tcp" ports="389" id="67" libelle="service d'annuaire" tcpwrapper=""/>
88
            <service name="ldap_udp" protocol="udp" ports="389" id="64" libelle="service d'annuaire" tcpwrapper=""/>
89
        </groupe>
90
        <groupe id="gr_ntp" libelle="gr_ntp">
91
            <service name="ntp_tcp" protocol="tcp" ports="123" id="48" libelle="ntp_tcp" tcpwrapper=""/>
92
            <service name="ntp_udp" protocol="udp" ports="123" id="49" libelle="ntp_udp" tcpwrapper=""/>
93
        </groupe>
94
        <groupe id="gr_pronote_ext" libelle="gr_pronote_ext">
95
            <service name="pronote_49300" protocol="tcp" ports="49300" id="50" libelle="pronote_49300" tcpwrapper=""/>
96
            <service name="pronote_8000" protocol="tcp" ports="8000" id="51" libelle="pronote_8000" tcpwrapper=""/>
97
        </groupe>
98
        <groupe id="gr_snmp" libelle="Snmp en TCP et UDP">
99
            <service name="snmp_tcp" protocol="tcp" ports="161-162" id="52" libelle="snmp_tcp" tcpwrapper=""/>
100
            <service name="snmp_udp" protocol="udp" ports="161-162" id="53" libelle="snmp_udp" tcpwrapper=""/>
101
        </groupe>
102
        <groupe id="gr_trend" libelle="ports utilisé par les clients TREND">
103
            <service name="trend_cnnx_client" protocol="tcp" ports="13000" id="100" libelle="connexion du client trend à son serveur" tcpwrapper=""/>
104
            <service name="trend_cnnx_console" protocol="tcp" ports="4343" id="99" libelle="port de connexion du client à la console TREND" tcpwrapper=""/>
105
        </groupe>
106
        <groupe id="gr_www" libelle="http et https">
107
            <service name="http80" protocol="tcp" ports="80" id="71" libelle="port 80 (le nom de service http est deja utilise dans le modele dijon donc on utilise le nom http80)" tcpwrapper=""/>
108
            <service name="https443" protocol="tcp" ports="443" id="72" libelle="port 443 (le nom de service http est deja utilise dans le modele dijon donc on utilise le nom https443)" tcpwrapper=""/>
109
        </groupe>
110
        <groupe id="gr_zwook" libelle="gr_zwook">
111
            <service name="zwook_80" protocol="tcp" ports="80" id="62" libelle="zwook_80" tcpwrapper=""/>
112
            <service name="zwook_9080" protocol="tcp" ports="9080" id="61" libelle="zwook_9080" tcpwrapper=""/>
113
            <service name="zwook_443" protocol="tcp" ports="443" id="63" libelle="zwwok_443" tcpwrapper=""/>
114
        </groupe>
115
    </services>
116
    <qosclasses upload="" download="">
117
    </qosclasses>
118
    <extremites>
119
        <extremite zone="privdmz" name="ip_acces_vpn_dmzpri" libelle="Adresse destination acces VPN DMZ privée" netmask="%%netmask_acces_vpn_dmzpri" subnet="1" type="" interface="" container="">
120
            <ip address="%%ip_acces_vpn_dmzpri"/>
121
        </extremite>
122
        <extremite zone="admin" name="ip_acces_vpn_admin" libelle="Adresse destination acces VPN reseau admin" netmask="%%netmask_acces_vpn_admin" subnet="1" type="" interface="" container="">
123
            <ip address="%%ip_acces_vpn_admin"/>
124
        </extremite>
125
        <extremite zone="exterieur" name="ip_source_acces_vpn_dmzpri" libelle="Adresse source de l'acces au reseau DMZ privée par VPN" netmask="%%netmask_source_acces_vpn_dmzpri" subnet="1" type="" interface="" container="">
126
            <ip address="%%ip_source_acces_vpn_dmzpri"/>
127
        </extremite>
128
        <extremite zone="pedago" name="ip_pronote_peda" libelle="ip srv note sur le peda" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
129
            <ip address="%%ip_pronote_peda"/>
130
        </extremite>
131
        <extremite zone="privdmz" name="ip_spipzwook_dmzpri" libelle="srv ip spipzwook dmzpri" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
132
            <ip address="%%ip_spipzwook_dmzpri"/>
133
        </extremite>
134
        <extremite zone="exterieur" name="ip_source_acces_vpn_peda" libelle="Adresse source de l'acces au reseau peda par VPN" netmask="%%netmask_source_acces_vpn_peda" subnet="1" type="" interface="" container="">
135
            <ip address="%%ip_source_acces_vpn_peda"/>
136
        </extremite>
137
        <extremite zone="pubdmz" name="ip_edt_dmzpub" libelle="Serveur EDT en dmz pub" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
138
            <ip address="%%ip_edt_dmzpub"/>
139
        </extremite>
140
        <extremite zone="pubdmz" name="serveur_web" libelle="Serveur web sur DMZ publique" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
141
            <ip address="%%ip_web_dmzpub"/>
142
        </extremite>
143
        <extremite zone="bastion" name="ip_bastion_eth1" libelle="IP bastion eth1" netmask="255.255.255.255" subnet="0" type="conteneur" interface="eth1" container="ip">
144
            <ip address="%%adresse_ip_eth1"/>
145
        </extremite>
146
        <extremite zone="bastion" name="ip_bastion_eth0" libelle="adresse IP eth0" netmask="255.255.255.255" subnet="0" type="conteneur" interface="eth1" container="ip">
147
            <ip address="%%adresse_ip_eth0"/>
148
        </extremite>
149
        <extremite zone="pedago" name="ip_scribe_peda" libelle="Serveur Scribe en zone péda" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
150
            <ip address="%%ip_scribe_peda"/>
151
        </extremite>
152
        <extremite zone="privdmz" name="ip_edt_dmzpri" libelle="Serveur EDT en dmz pri" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
153
            <ip address="%%ip_edt_dmzpri"/>
154
        </extremite>
155
        <extremite zone="pedago" name="ip_srv_antivirus" libelle="adresse IP du serveur antivirus" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
156
            <ip address="%%ip_srv_antivirus"/>
157
        </extremite>
158
        <extremite zone="privdmz" name="ip_pronote_dmzpri" libelle="ip srv note en dmz prive" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
159
            <ip address="%%ip_pronote_dmzpri"/>
160
        </extremite>
161
        <extremite zone="admin" name="ip_amon_eth1" libelle="IP Amon eth1" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
162
            <ip address="%%adresse_ip_eth1"/>
163
        </extremite>
164
        <extremite zone="privdmz" name="ip_scribe_pri" libelle="Serveur Scribe en DMZ privée" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
165
            <ip address="%%ip_scribe_pri"/>
166
        </extremite>
167
        <extremite zone="pubdmz" name="ip_srv_dmzpub_cas" libelle="Serveur DMZ publique en mode CAS" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
168
            <ip address="%%ip_srv_dmzpub_cas"/>
169
        </extremite>
170
        <extremite zone="pedago" name="ETH0_peda" libelle="Eth0 pour DNAT vers peda" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
171
            <ip address="%%adresse_ip_eth0"/>
172
        </extremite>
173
        <extremite zone="privdmz" name="ip_srv_antivirus_dmz" libelle="adresse IP du serveur antivirus en DMZ" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
174
            <ip address="%%ip_srv_antivirus_dmz"/>
175
        </extremite>
176
        <extremite zone="pubdmz" name="ssh_dmzpub" libelle="Serveur SSH sur DMZ publique" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
177
            <ip address="%%ip_ssh_dmzpub"/>
178
        </extremite>
179
        <extremite zone="pubdmz" name="ip_spipzwook_dmzpub" libelle="ip srv zwook dmz pub" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
180
            <ip address="%%ip_spipzwook_dmzpub"/>
181
        </extremite>
182
        <extremite zone="pubdmz" name="ip_acces_vpn_dmzpub" libelle="Adresse destination acces VPN DMZ publique" netmask="%%netmask_acces_vpn_dmzpub" subnet="1" type="" interface="" container="">
183
            <ip address="%%ip_acces_vpn_dmzpub"/>
184
        </extremite>
185
        <extremite zone="pedago" name="PC_supervision" libelle="Station supervision des lycées" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
186
            <ip address="%%ip_supervision"/>
187
        </extremite>
188
        <extremite zone="pubdmz" name="srv_absence" libelle="Serveur Absence port 9000" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
189
            <ip address="%%ip_absence_dmzpub"/>
190
        </extremite>
191
        <extremite zone="admin" name="imprimantes_acces_peda" libelle="imprimantes admin accesibles du reseau peda" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
192
            <ip address="%%ip_imprimantes_acces_peda"/>
193
        </extremite>
194
        <extremite zone="pubdmz" name="ip_srv_pub_antivirus" libelle="IPs des serveurs à proteger en DMZ pub" netmask="%%netmask_srv_pub_antivirus" subnet="1" type="" interface="" container="">
195
            <ip address="%%ip_srv_pub_antivirus"/>
196
        </extremite>
197
        <extremite zone="pedago" name="ip_sauv_nas" libelle="ip serveur a sauvegarder" netmask="%%netmask_sauv_nas" subnet="1" type="" interface="" container="">
198
            <ip address="%%ip_sauv_nas"/>
199
        </extremite>
200
        <extremite zone="privdmz" name="ip_srv_pri_antivirus" libelle="adresses IP des serveurs à proteger en DMZ prive" netmask="%%netmask_srv_pri_antivirus" subnet="1" type="" interface="" container="">
201
            <ip address="%%ip_srv_pri_antivirus"/>
202
        </extremite>
203
        <extremite zone="privdmz" name="ETH0_dmzpri" libelle="Eth0 pour DNAT vers peda" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
204
            <ip address="%%adresse_ip_eth0"/>
205
        </extremite>
206
        <extremite zone="pedago" name="ip_amon_eth2" libelle="IP Amon eth2" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
207
            <ip address="%%adresse_ip_eth2"/>
208
        </extremite>
209
        <extremite zone="exterieur" name="ip_source_acces_vpn_dmzpub" libelle="Adresse source de l'acces au reseau DMZ publique par VPN" netmask="%%netmask_source_acces_vpn_dmzpub" subnet="1" type="" interface="" container="">
210
            <ip address="%%ip_source_acces_vpn_dmzpub"/>
211
        </extremite>
212
        <extremite zone="privdmz" name="ip_srv_dmzpri_cas" libelle="Serveur DMZ privée en mode CAS" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
213
            <ip address="%%ip_srv_dmzpri_cas"/>
214
        </extremite>
215
        <extremite zone="pubdmz" name="ETH0_DMZPUB" libelle="Eth0 pour DNAT vers DMZ PUB" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
216
            <ip address="%%adresse_ip_eth0"/>
217
        </extremite>
218
        <extremite zone="admin" name="ip_srv_antivirus_adm" libelle="IP du serveur antivirus sur le reseau admin" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
219
            <ip address="%%ip_srv_antivirus_adm"/>
220
        </extremite>
221
        <extremite zone="pubdmz" name="ip_pronote_dmzpub" libelle="ip srv note en dmz pub" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
222
            <ip address="%%ip_pronote_dmzpub"/>
223
        </extremite>
224
        <extremite zone="pedago" name="Vlans_Peda" libelle="Reseau Global Vlan Peda" netmask="%%netmask_global_vlanpeda" subnet="1" type="" interface="" container="">
225
            <ip address="%%adresse_global_vlanpeda"/>
226
        </extremite>
227
        <extremite zone="privdmz" name="ip_nas" libelle="ip du serveur nas" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
228
            <ip address="%%ip_nas"/>
229
        </extremite>
230
        <extremite zone="exterieur" name="ip_source_acces_vpn_admin" libelle="Adresse source de l'acces au reseau admin par VPN" netmask="%%netmask_source_acces_vpn_admin" subnet="1" type="" interface="" container="">
231
            <ip address="%%ip_source_acces_vpn_admin"/>
232
        </extremite>
233
        <extremite zone="pedago" name="ip_acces_vpn_peda" libelle="Adresse destination acces VPN reseau peda" netmask="%%netmask_acces_vpn_peda" subnet="1" type="" interface="" container="">
234
            <ip address="%%ip_acces_vpn_peda"/>
235
        </extremite>
236
        <extremite zone="pedago" name="ip_edt_peda" libelle="serveur EDT sur reseau peda" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
237
            <ip address="%%ip_edt_peda"/>
238
        </extremite>
239
        <extremite zone="exterieur" name="reseau_rectorat" libelle="Reseau du Rectorat" netmask="255.255.254.0" subnet="1" type="" interface="" container="">
240
            <ip address="195.83.252.0"/>
241
        </extremite>
242
    </extremites>
243
    <ranges>
244
    </ranges>
245
    <user_groups>
246
        <user_group name="professeurs" id="10001"/>
247
        <user_group name="élèves" id="10002"/>
248
    </user_groups>
249
    <applications>
250
        <app_group name="Navigateur Web" description="Liste des navigateurs web">
251
                <app name="Internet Explorer"/>
252
                <app name="Firefox"/>
253
                <app name="AutresNav"/>
254
        </app_group>
255
                <application name="AutresNav" description="Autres navigateurs">
256
                <path name="C:\Program Files\*opera*"/>
257
        </application>
258
                <application name="Firefox" description="Navigateur Mozilla Firefox">
259
                <path name="C:\Program Files\*firefox*"/>
260
                <path name="/usr/bin/*firefox*"/>
261
        </application>
262
                <application name="Internet Explorer" description="Navigateur Internet Explorer">
263
                <path name="C:\Program Files\Internet Explorer\*ieplorer*"/>
264
        </application>
265
    </applications>
266
    <flux-list>
267
        <flux zoneA="bastion" zoneB="exterieur">
268
            <montantes default_policy="0">
269
            </montantes>
270
            <descendantes default_policy="1">
271
            </descendantes>
272
        </flux>
273
        <flux zoneA="exterieur" zoneB="admin">
274
            <montantes default_policy="0">
275
                <directive tag="acces_vpn_admin" service="tous" priority="1" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser acces depuis client VPN vers admin" ipsec="0" accept="0">
276
                    <source name="ip_source_acces_vpn_admin"/>
277
                    <destination name="ip_acces_vpn_admin"/>
278
                </directive>
279
            </montantes>
280
            <descendantes default_policy="1">
281
                <directive service="tous" priority="6" action="16" attrs="0" nat_extr="exterieur_bastion" nat_port="0" src_inv="0" dest_inv="0" serv_inv="0" libelle="pas de description" ipsec="0" accept="0">
282
                    <source name="admin_restreint"/>
283
                    <destination name="exterieur"/>
284
                </directive>
285
            </descendantes>
286
        </flux>
287
        <flux zoneA="bastion" zoneB="admin">
288
            <montantes default_policy="0">
289
                <directive tag="activer_lightsquid" service="lightsquid" priority="13" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser lightsquid pour eth1" ipsec="0" accept="0">
290
                    <source name="admin_admin"/>
291
                    <destination name="ip_bastion_eth0"/>
292
                </directive>
293
            </montantes>
294
            <descendantes default_policy="1">
295
            </descendantes>
296
        </flux>
297
        <flux zoneA="exterieur" zoneB="pedago">
298
            <montantes default_policy="0">
299
                <directive tag="Acces_Station_Supervision" service="tous" priority="1" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Acces a la station de supervision (Lycée)" ipsec="0" accept="0">
300
                    <source name="exterieur"/>
301
                    <destination name="PC_supervision"/>
302
                </directive>
303
                <directive tag="acces_vpn_peda" service="tous" priority="2" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser acces depuis client VPN vers peda" ipsec="0" accept="0">
304
                    <source name="ip_source_acces_vpn_peda"/>
305
                    <destination name="ip_acces_vpn_peda"/>
306
                </directive>
307
                <directive tag="entpeda" service="ldap" priority="3" action="8" attrs="17" nat_extr="ip_scribe_peda" nat_port="389" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT pour LDAP depuis Seshat vers ENT péda" ipsec="0" accept="0">
308
                    <source name="reseau_rectorat"/>
309
                    <destination name="ETH0_peda"/>
310
                </directive>
311
                <directive tag="entpeda" service="ldaps" priority="4" action="8" attrs="17" nat_extr="ip_scribe_peda" nat_port="636" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT pour LDAPS depuis Seshat vers ENT péda" ipsec="0" accept="0">
312
                    <source name="reseau_rectorat"/>
313
                    <destination name="ETH0_peda"/>
314
                </directive>
315
                <directive tag="entpeda" service="eole-sso" priority="5" action="8" attrs="17" nat_extr="ip_scribe_peda" nat_port="8443" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT pour SSO vers ENT péda" ipsec="0" accept="0">
316
                    <source name="exterieur"/>
317
                    <destination name="ETH0_peda"/>
318
                </directive>
319
            </montantes>
320
            <descendantes default_policy="1">
321
                <directive tag="intercopeda" service="tous" priority="11" action="16" attrs="17" nat_extr="exterieur_bastion" nat_port="0" src_inv="0" dest_inv="0" serv_inv="0" libelle="SNAT pour le reseau global péda" ipsec="0" accept="0">
322
                    <source name="Vlans_Peda"/>
323
                    <destination name="exterieur"/>
324
                </directive>
325
            </descendantes>
326
        </flux>
327
        <flux zoneA="admin" zoneB="pedago">
328
            <montantes default_policy="0">
329
                <directive tag="kav_control_ped" service="gr_kav_control" priority="1" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="kaspersky controle et WakeOnLan des clients admin à partir du server Kav Peda" ipsec="0" accept="0">
330
                    <source name="ip_srv_antivirus"/>
331
                    <destination name="admin"/>
332
                </directive>
333
                <directive tag="imprimantes_ped_vers_adm" service="impression" priority="2" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise l'acces aux imprimantes réseau depuis le réseau pedago" ipsec="0" accept="0">
334
                    <source name="pedago"/>
335
                    <destination name="imprimantes_acces_peda"/>
336
                </directive>
337
                <directive tag="kav_ped_vers_adm" service="gr_kav" priority="3" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser zone peda dialoguer avec serveur kav admin" ipsec="0" accept="0">
338
                    <source name="pedago"/>
339
                    <destination name="ip_srv_antivirus_adm"/>
340
                </directive>
341
                <directive tag="trend_control_ped" service="gr_trend" priority="4" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="controles des postes trend depuis le serveur peda vers l'admin" ipsec="0" accept="0">
342
                    <source name="ip_srv_antivirus"/>
343
                    <destination name="admin"/>
344
                </directive>
345
                <directive tag="trend_ped_vers_adm" service="gr_trend" priority="5" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser client TREND de PEDA vers ADMIN" ipsec="0" accept="0">
346
                    <source name="pedago"/>
347
                    <destination name="ip_srv_antivirus_adm"/>
348
                </directive>
349
            </montantes>
350
            <descendantes default_policy="1">
351
            </descendantes>
352
        </flux>
353
        <flux zoneA="bastion" zoneB="pedago">
354
            <montantes default_policy="0">
355
                <directive tag="AdminDepuisEth2" service="eole-sso" priority="14" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Authentification SSO sur eth1 depuis reseau pedago pour l'EAD" ipsec="0" accept="0">
356
                    <source name="pedago_admin"/>
357
                    <destination name="ip_bastion_eth1"/>
358
                </directive>
359
                <directive tag="activer_lightsquid" service="lightsquid" priority="15" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser peda vers lightsquid" ipsec="0" accept="0">
360
                    <source name="pedago_admin"/>
361
                    <destination name="ip_bastion_eth0"/>
362
                </directive>
363
            </montantes>
364
            <descendantes default_policy="1">
365
            </descendantes>
366
        </flux>
367
        <flux zoneA="exterieur" zoneB="privdmz">
368
            <montantes default_policy="0">
369
                <directive tag="acces_vpn_dmzpri" service="tous" priority="1" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser acces depuis client VPN vers DMZ pri" ipsec="0" accept="0">
370
                    <source name="ip_source_acces_vpn_dmzpri"/>
371
                    <destination name="ip_acces_vpn_dmzpri"/>
372
                </directive>
373
                <directive tag="entdmzpri" service="ldap" priority="2" action="8" attrs="17" nat_extr="ip_scribe_pri" nat_port="389" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT pour LDAP depuis Seshat vers ENT dmz privée" ipsec="0" accept="0">
374
                    <source name="reseau_rectorat"/>
375
                    <destination name="ETH0_dmzpri"/>
376
                </directive>
377
                <directive tag="entdmzpri" service="ldaps" priority="3" action="8" attrs="17" nat_extr="ip_scribe_pri" nat_port="636" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT pour LDAPS depuis Seshat vers ENT dmz privée" ipsec="0" accept="0">
378
                    <source name="reseau_rectorat"/>
379
                    <destination name="ETH0_dmzpri"/>
380
                </directive>
381
                <directive tag="entdmzpri" service="eole-sso" priority="4" action="8" attrs="17" nat_extr="ip_scribe_pri" nat_port="8443" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT pour SSO vers ENT dmz privée" ipsec="0" accept="0">
382
                    <source name="exterieur"/>
383
                    <destination name="ETH0_dmzpri"/>
384
                </directive>
385
            </montantes>
386
            <descendantes default_policy="1">
387
                <directive service="tous" priority="6" action="16" attrs="0" nat_extr="exterieur_bastion" nat_port="0" src_inv="0" dest_inv="0" serv_inv="0" libelle="SNAT pour l'acces des serveurs DMZ privés vers l'exterieur" ipsec="0" accept="0">
388
                    <source name="privdmz_restreint"/>
389
                    <destination name="exterieur"/>
390
                </directive>
391
                <directive service="gr_redirection_http" priority="7" action="4" attrs="0" nat_port="3128" src_inv="0" dest_inv="1" serv_inv="0" libelle="Redirection des flux http sans proxy" ipsec="0" accept="0">
392
                    <source name="privdmz"/>
393
                    <destination name="exterieur_bastion"/>
394
                </directive>
395
                <directive service="gr_redirection_http" priority="8" action="4" attrs="0" nat_port="81" src_inv="0" dest_inv="0" serv_inv="0" libelle="Redirection des flux vers le serveur de distribution du fichier wpad" ipsec="0" accept="0">
396
                    <source name="privdmz"/>
397
                    <destination name="exterieur"/>
398
                </directive>
399
                <directive service="gr_redirection_https" priority="9" action="4" attrs="0" nat_port="82" src_inv="0" dest_inv="0" serv_inv="0" libelle="Redirection des flux https sans proxy vers une page d'erreur" ipsec="0" accept="0">
400
                    <source name="privdmz"/>
401
                    <destination name="exterieur"/>
402
                </directive>
403
            </descendantes>
404
        </flux>
405
        <flux zoneA="admin" zoneB="privdmz">
406
            <montantes default_policy="0">
407
                <directive tag="kav_control_pri" service="gr_kav_control" priority="1" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Kaspersky controle et WakeOnLan des clients admin à partir du server Kav en DMZpri" ipsec="0" accept="0">
408
                    <source name="ip_srv_antivirus_dmz"/>
409
                    <destination name="admin"/>
410
                </directive>
411
                <directive tag="kav_pri_vers_adm" service="gr_kav" priority="2" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser serveur DMZ_pri a dialoguer avec serveur kav admin" ipsec="0" accept="0">
412
                    <source name="ip_srv_pri_antivirus"/>
413
                    <destination name="ip_srv_antivirus_adm"/>
414
                </directive>
415
                <directive tag="trend_control_pri" service="gr_trend" priority="3" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="controle de TREND de la DMZ vers la zone ADMIN" ipsec="0" accept="0">
416
                    <source name="ip_srv_antivirus_dmz"/>
417
                    <destination name="admin"/>
418
                </directive>
419
                <directive tag="trend_pri_vers_adm" service="gr_trend" priority="4" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="client TREND DMZ pub vers serveur ADMIN" ipsec="0" accept="0">
420
                    <source name="ip_srv_pri_antivirus"/>
421
                    <destination name="ip_srv_antivirus_adm"/>
422
                </directive>
423
            </montantes>
424
            <descendantes default_policy="1">
425
            </descendantes>
426
        </flux>
427
        <flux zoneA="bastion" zoneB="privdmz">
428
            <montantes default_policy="0">
429
                <directive tag="spipzwook_dmzpri" service="gr_ntp" priority="11" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise Zwook a se synchroniser (NTP) sur l'amon" ipsec="0" accept="0">
430
                    <source name="ip_spipzwook_dmzpri"/>
431
                    <destination name="bastion"/>
432
                </directive>
433
                <directive service="echo-request" priority="12" action="2" attrs="0" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise ETH4 a répondre au ping depuis DMZ pri" ipsec="0" accept="0">
434
                    <source name="privdmz_restreint"/>
435
                    <destination name="bastion"/>
436
                </directive>
437
            </montantes>
438
            <descendantes default_policy="1">
439
            </descendantes>
440
        </flux>
441
        <flux zoneA="exterieur" zoneB="pubdmz">
442
            <montantes default_policy="0">
443
                <directive tag="serveur_web_CG13_Region" service="gr_www" priority="1" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorisation d'acces au serveur WEB depuis l'exterieur (CG13_Region)" ipsec="0" accept="0">
444
                    <source name="exterieur"/>
445
                    <destination name="serveur_web"/>
446
                </directive>
447
                <directive tag="serveur_web_FAI" service="http" priority="2" action="8" attrs="17" nat_extr="serveur_web" nat_port="80" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT de l'autorisation d'accés au serveur WEB depuis l'exterieur (FAI)" ipsec="0" accept="0">
448
                    <source name="exterieur"/>
449
                    <destination name="ETH0_DMZPUB"/>
450
                </directive>
451
                <directive tag="serveur_absence_CG13_Region" service="absence_9000" priority="3" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorisation d'acces au serveur absence sur port 9000 (CG13_Region)" ipsec="0" accept="0">
452
                    <source name="exterieur"/>
453
                    <destination name="srv_absence"/>
454
                </directive>
455
                <directive tag="serveur_absence_FAI" service="absence_9000" priority="4" action="8" attrs="17" nat_extr="srv_absence" nat_port="9000" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT pour acces au serveur absence en port 9000 (FAI)" ipsec="0" accept="0">
456
                    <source name="exterieur"/>
457
                    <destination name="ETH0_DMZPUB"/>
458
                </directive>
459
                <directive tag="pronote_dmz_CG13_Region" service="gr_pronote_ext" priority="5" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise accès pronote en dmz pub port 8000 et 49300 (CG13_Region)" ipsec="0" accept="0">
460
                    <source name="exterieur"/>
461
                    <destination name="ip_pronote_dmzpub"/>
462
                </directive>
463
                <directive tag="pronote_dmz_FAI" service="pronote_49300" priority="6" action="8" attrs="17" nat_extr="ip_pronote_dmzpub" nat_port="49300" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT port 49300 de l'ext vers srv pronote pub (FAI)" ipsec="0" accept="0">
464
                    <source name="exterieur"/>
465
                    <destination name="ETH0_DMZPUB"/>
466
                </directive>
467
                <directive tag="pronote_dmz_FAI" service="pronote_8000" priority="7" action="8" attrs="17" nat_extr="ip_pronote_dmzpub" nat_port="8000" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT port 8000 de l'ext vers srv pronote pub (FAI)" ipsec="0" accept="0">
468
                    <source name="exterieur"/>
469
                    <destination name="ETH0_DMZPUB"/>
470
                </directive>
471
                <directive tag="edt_dmz_CG13_Region" service="EDT" priority="8" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise accès EDT en dmz pub port tcp 49500 (CG13_Region)" ipsec="0" accept="0">
472
                    <source name="exterieur"/>
473
                    <destination name="ip_edt_dmzpub"/>
474
                </directive>
475
                <directive tag="edt_dmz_FAI" service="EDT" priority="9" action="8" attrs="17" nat_extr="ip_edt_dmzpub" nat_port="49500" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT ports tcp 49500 de l'ext vers srv EDT pub (FAI)" ipsec="0" accept="0">
476
                    <source name="exterieur"/>
477
                    <destination name="ETH0_DMZPUB"/>
478
                </directive>
479
                <directive tag="zwook_dmzpub_CG13_Region" service="gr_zwook" priority="10" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise ports 80, 9080,443 de l'ext vers zwook pub (CG13_Region)" ipsec="0" accept="0">
480
                    <source name="exterieur"/>
481
                    <destination name="ip_spipzwook_dmzpub"/>
482
                </directive>
483
                <directive tag="zwook_dmzpub_FAI" service="http" priority="11" action="8" attrs="17" nat_extr="ip_spipzwook_dmzpub" nat_port="80" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT port 80 de l'ext vers zwook pub (FAI)" ipsec="0" accept="0">
484
                    <source name="exterieur"/>
485
                    <destination name="ETH0_DMZPUB"/>
486
                </directive>
487
                <directive tag="zwook_dmzpub_FAI" service="zwook_9080" priority="12" action="8" attrs="17" nat_extr="ip_spipzwook_dmzpub" nat_port="9080" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT port 9080 de l'ext vers zwook pub (FAI)" ipsec="0" accept="0">
488
                    <source name="exterieur"/>
489
                    <destination name="ETH0_DMZPUB"/>
490
                </directive>
491
                <directive tag="zwook_dmzpub_FAI" service="https" priority="13" action="8" attrs="17" nat_extr="ip_spipzwook_dmzpub" nat_port="443" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT port 443 de l'ext vers zwook pub (FAI)" ipsec="0" accept="0">
492
                    <source name="exterieur"/>
493
                    <destination name="ETH0_DMZPUB"/>
494
                </directive>
495
                <directive tag="acces_vpn_dmzpub" service="tous" priority="14" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser acces depuis client VPN vers DMZ pub" ipsec="0" accept="0">
496
                    <source name="ip_source_acces_vpn_dmzpub"/>
497
                    <destination name="ip_acces_vpn_dmzpub"/>
498
                </directive>
499
                <directive tag="ssh_dmzpub_CG13_Region" service="ssh_exterieur" priority="15" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise accès SSH en dmz pub sur port 25000 (CG13_Region)" ipsec="0" accept="0">
500
                    <source name="exterieur"/>
501
                    <destination name="ssh_dmzpub"/>
502
                </directive>
503
                <directive tag="ssh_dmzpub_fai" service="ssh_exterieur" priority="16" action="8" attrs="17" nat_extr="ssh_dmzpub" nat_port="25000" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT port 25000 pour SSH de l'ext vers srv en dmzpub (FAI)" ipsec="0" accept="0">
504
                    <source name="exterieur"/>
505
                    <destination name="ETH0_DMZPUB"/>
506
                </directive>
507
            </montantes>
508
            <descendantes default_policy="1">
509
                <directive tag="zwook_dmzpub_CG13_Region" service="tous" priority="5" action="16" attrs="17" nat_extr="ETH0_DMZPUB" nat_port="0" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise tout zwook pub vers ext (CG13_Region)" ipsec="0" accept="0">
510
                    <source name="ip_spipzwook_dmzpub"/>
511
                    <destination name="exterieur"/>
512
                </directive>
513
                <directive tag="zwook_dmzpub_FAI" service="tous" priority="6" action="16" attrs="17" nat_extr="ETH0_DMZPUB" nat_port="0" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise tout zwook vers exterieur (FAI)" ipsec="0" accept="0">
514
                    <source name="ip_spipzwook_dmzpub"/>
515
                    <destination name="exterieur"/>
516
                </directive>
517
                <directive tag="dmzpub_cas_ext" service="eole-sso" priority="7" action="16" attrs="17" nat_extr="ETH0_DMZPUB" nat_port="0" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser les serveurs en DMZ publique en mode CAS à sortir sur le port eole-sso" ipsec="0" accept="0">
518
                    <source name="ip_srv_dmzpub_cas"/>
519
                    <destination name="exterieur"/>
520
                </directive>
521
                <directive service="tous" priority="8" action="1" attrs="0" src_inv="0" dest_inv="0" serv_inv="0" libelle="Blocage acces Internet depuis DMZ Pub" ipsec="0" accept="0">
522
                    <source name="pubdmz"/>
523
                    <destination name="exterieur"/>
524
                </directive>
525
            </descendantes>
526
        </flux>
527
        <flux zoneA="admin" zoneB="pubdmz">
528
            <montantes default_policy="0">
529
                <directive tag="kav_pub_vers_adm" service="gr_kav" priority="1" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser serveur DMZ_pub a dialoguer avec serveur kav admin" ipsec="0" accept="0">
530
                    <source name="ip_srv_pub_antivirus"/>
531
                    <destination name="ip_srv_antivirus_adm"/>
532
                </directive>
533
                <directive tag="trend_pub_vers_adm" service="gr_trend" priority="2" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser trend de la dmz pub vers l'admin" ipsec="0" accept="0">
534
                    <source name="ip_srv_pub_antivirus"/>
535
                    <destination name="ip_srv_antivirus_adm"/>
536
                </directive>
537
            </montantes>
538
            <descendantes default_policy="1">
539
            </descendantes>
540
        </flux>
541
        <flux zoneA="bastion" zoneB="pubdmz">
542
            <montantes default_policy="0">
543
                <directive tag="zwook_dmzpub_CG13_Region" service="gr_ntp" priority="12" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise Zwook a se synchroniser (NTP) sur l'amon - CG13_Region" ipsec="0" accept="0">
544
                    <source name="ip_spipzwook_dmzpub"/>
545
                    <destination name="bastion"/>
546
                </directive>
547
                <directive tag="zwook_dmzpub_FAI" service="gr_ntp" priority="13" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise Zwook a se synchroniser (NTP) sur l'amon - FAI" ipsec="0" accept="0">
548
                    <source name="ip_spipzwook_dmzpub"/>
549
                    <destination name="bastion"/>
550
                </directive>
551
                <directive service="echo-request" priority="14" action="2" attrs="0" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise ETH3 a repondre au ping depuis la zone DMZ pub" ipsec="0" accept="0">
552
                    <source name="pubdmz_restreint"/>
553
                    <destination name="bastion"/>
554
                </directive>
555
            </montantes>
556
            <descendantes default_policy="1">
557
            </descendantes>
558
        </flux>
559
        <flux zoneA="pedago" zoneB="privdmz">
560
            <montantes default_policy="0">
561
                <directive tag="kav_pri_vers_ped" service="gr_kav" priority="2" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser serveur DMZ_pri a dialoguer avec serveur kav peda" ipsec="0" accept="0">
562
                    <source name="ip_srv_pri_antivirus"/>
563
                    <destination name="ip_srv_antivirus"/>
564
                </directive>
565
                <directive tag="spipzwook_dmzpri" service="gr_ldap" priority="3" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise ldap 389 du zwook DMZ privé vers peda" ipsec="0" accept="0">
566
                    <source name="ip_spipzwook_dmzpri"/>
567
                    <destination name="pedago"/>
568
                </directive>
569
                <directive tag="kav_control_pri" service="gr_kav_control" priority="4" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Kaspersky controle et WakeOnLan des clients peda à partir du server Kav en DMZpri" ipsec="0" accept="0">
570
                    <source name="ip_srv_antivirus_dmz"/>
571
                    <destination name="pedago"/>
572
                </directive>
573
                <directive tag="trend_pri_vers_ped" service="gr_trend" priority="5" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser client trend de dmz prive vers peda" ipsec="0" accept="0">
574
                    <source name="ip_srv_pri_antivirus"/>
575
                    <destination name="ip_srv_antivirus"/>
576
                </directive>
577
                <directive tag="trend_control_pri" service="gr_trend" priority="6" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser le controle de TREND de la DMZ pub vers le Peda" ipsec="0" accept="0">
578
                    <source name="ip_srv_antivirus_dmz"/>
579
                    <destination name="pedago"/>
580
                </directive>
581
                <directive tag="dmzpri_cas" service="eole-sso" priority="7" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser eole-sso depuis les serveurs en DMZ privée en mode CAS vers ENT péda" ipsec="0" accept="1">
582
                    <source name="ip_srv_dmzpri_cas"/>
583
                    <destination name="ip_scribe_peda"/>
584
                </directive>
585
            </montantes>
586
            <descendantes default_policy="1">
587
                <directive tag="Peda_NASpri" service="tous" priority="1" action="1" attrs="17" src_inv="1" dest_inv="0" serv_inv="0" libelle="Interdiction a tout sauf srv pedago vers NAS" ipsec="0" accept="0">
588
                    <source name="ip_sauv_nas"/>
589
                    <destination name="ip_nas"/>
590
                </directive>
591
            </descendantes>
592
        </flux>
593
        <flux zoneA="pubdmz" zoneB="pedago">
594
            <montantes default_policy="0">
595
                <directive tag="kav_pub_vers_ped" service="gr_kav" priority="1" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise serveurs de DMZ Pub a se connecter a KAV sur pedago" ipsec="0" accept="0">
596
                    <source name="ip_srv_pub_antivirus"/>
597
                    <destination name="ip_srv_antivirus"/>
598
                </directive>
599
                <directive tag="zwook_dmzpub_CG13_Region" service="gr_ldap" priority="2" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise ldap 389 du zwook vers peda (CG13_Region)" ipsec="0" accept="0">
600
                    <source name="ip_spipzwook_dmzpub"/>
601
                    <destination name="pedago"/>
602
                </directive>
603
                <directive tag="zwook_dmzpub_CG13_Region" service="dns" priority="3" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise dns 53 du srv zwook pub vers peda (CG13_Region)" ipsec="0" accept="0">
604
                    <source name="ip_spipzwook_dmzpub"/>
605
                    <destination name="pedago"/>
606
                </directive>
607
                <directive tag="zwook_dmzpub_FAI" service="gr_ldap" priority="4" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise LDAP 389 zwook pub vers peda (FAI)" ipsec="0" accept="0">
608
                    <source name="ip_spipzwook_dmzpub"/>
609
                    <destination name="pedago"/>
610
                </directive>
611
                <directive tag="zwook_dmzpub_FAI" service="dns" priority="5" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise dns 53 zwook pub vers peda (FAI)" ipsec="0" accept="0">
612
                    <source name="ip_spipzwook_dmzpub"/>
613
                    <destination name="pedago"/>
614
                </directive>
615
                <directive tag="pronote_peda_CG13_Region" service="pronote_49300" priority="6" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise le port 49300 entre pub(relais-net) vers peda (serveur) (CG13_Region)" ipsec="0" accept="0">
616
                    <source name="ip_pronote_dmzpub"/>
617
                    <destination name="ip_pronote_peda"/>
618
                </directive>
619
                <directive tag="pronote_peda_FAI" service="pronote_49300" priority="7" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser port 49300 de pub (relais-net) vers peda (srv pronote) (FAI)" ipsec="0" accept="0">
620
                    <source name="ip_pronote_dmzpub"/>
621
                    <destination name="ip_pronote_peda"/>
622
                </directive>
623
                <directive tag="edt_peda_CG13_Region" service="EDT" priority="8" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise le port 49500 entre pub(EDT relais) vers peda (serveur EDT) (CG13_Region)" ipsec="0" accept="0">
624
                    <source name="ip_edt_dmzpub"/>
625
                    <destination name="ip_edt_peda"/>
626
                </directive>
627
                <directive tag="edt_peda_FAI" service="EDT" priority="9" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser port 49500 de pub (relais-net) vers peda (srv pronote) (FAI)" ipsec="0" accept="0">
628
                    <source name="ip_edt_dmzpub"/>
629
                    <destination name="ip_edt_peda"/>
630
                </directive>
631
                <directive tag="trend_pub_vers_ped" service="gr_trend" priority="10" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser trend depuis publique vers prive" ipsec="0" accept="0">
632
                    <source name="ip_srv_pub_antivirus"/>
633
                    <destination name="ip_srv_antivirus"/>
634
                </directive>
635
                <directive tag="dmzpub_cas_peda" service="eole-sso" priority="11" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser eole-sso depuis les serveurs en DMZ publique en mode CAS vers ENT péda" ipsec="0" accept="1">
636
                    <source name="ip_srv_dmzpub_cas"/>
637
                    <destination name="ip_scribe_peda"/>
638
                </directive>
639
            </montantes>
640
            <descendantes default_policy="1">
641
            </descendantes>
642
        </flux>
643
        <flux zoneA="pubdmz" zoneB="privdmz">
644
            <montantes default_policy="0">
645
                <directive tag="pronote_dmzpri_CG13_Region" service="pronote_49300" priority="1" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise le port 49300 entre pub(relais-net) vers pri (serveur) (CG13_Region)" ipsec="0" accept="0">
646
                    <source name="ip_pronote_dmzpub"/>
647
                    <destination name="ip_pronote_dmzpri"/>
648
                </directive>
649
                <directive tag="pronote_dmzpri_FAI" service="pronote_49300" priority="2" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser port 49300 de pub (relais-net) vers pri (srv pronote) (FAI)" ipsec="0" accept="0">
650
                    <source name="ip_pronote_dmzpub"/>
651
                    <destination name="ip_pronote_dmzpri"/>
652
                </directive>
653
                <directive tag="kav_pub_vers_pri" service="gr_kav" priority="3" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise serveurs de DMZ Pub a se connecter a KAV sur DMZ Pri" ipsec="0" accept="0">
654
                    <source name="ip_srv_pub_antivirus"/>
655
                    <destination name="ip_srv_antivirus_dmz"/>
656
                </directive>
657
                <directive tag="edt_dmzpri_CG13_Region" service="EDT" priority="4" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise le port 49500 entre pub(EDT relais) vers pri (serveur EDT) (CG13_Region)" ipsec="0" accept="0">
658
                    <source name="ip_edt_dmzpub"/>
659
                    <destination name="ip_edt_dmzpri"/>
660
                </directive>
661
                <directive tag="edt_dmzpri_FAI" service="EDT" priority="5" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser port 49500 de pub (EDT relais) vers pri (srv EDT) (FAI)" ipsec="0" accept="0">
662
                    <source name="ip_edt_dmzpub"/>
663
                    <destination name="ip_edt_dmzpri"/>
664
                </directive>
665
                <directive tag="trend_pub_vers_pri" service="gr_trend" priority="6" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser dmz pub vers le serveur trend en dmz prive" ipsec="0" accept="0">
666
                    <source name="ip_srv_pub_antivirus"/>
667
                    <destination name="ip_srv_antivirus_dmz"/>
668
                </directive>
669
                <directive tag="dmzpub_cas_pri" service="eole-sso" priority="7" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser eole-sso depuis les serveurs en DMZ publique en mode CAS vers ENT dmz privée" ipsec="0" accept="1">
670
                    <source name="ip_srv_dmzpub_cas"/>
671
                    <destination name="ip_scribe_pri"/>
672
                </directive>
673
            </montantes>
674
            <descendantes default_policy="1">
675
            </descendantes>
676
        </flux>
677
    </flux-list>
678
</firewall>