Projet

Général

Profil

5zones-AixMars.xml

Jean-Marc MELET, 10/04/2017 18:35

Télécharger (52,1 ko)

 
1
<?xml version="1.0" encoding="UTF-8" ?>
2

    
3
<firewall name="/usr/share/era/modeles/5zones-AixMars.xml" model="/usr/share/era/modeles/5zones.xml" version="2.42">
4
    <zones>
5
    </zones>
6
    <include>
7
iptables -t nat -N NONAT
8
iptables -t nat -I NONAT -j ACCEPT
9
iptables -t nat -I PREROUTING ! -i eth0 -d 10.0.0.0/8 -j NONAT
10
iptables -t nat -I PREROUTING -d 172.16.0.0/12 -j NONAT
11
iptables -t nat -I PREROUTING -d 192.168.0.0/16 -j NONAT
12
iptables -t nat -I PREROUTING -d 161.48.0.0/19 -j NONAT
13
iptables -t nat -I PREROUTING -d 79.174.192.22/32 -j NONAT
14
iptables -t nat -I PREROUTING -d 79.174.192.38/32 -j NONAT
15
iptables -t nat -I PREROUTING -d 195.221.236.208/32 -j NONAT
16
iptables -t nat -I PREROUTING -d 83.97.61.199/32 -j NONAT
17
iptables -t nat -I PREROUTING -d 83.97.61.244/32 -j NONAT
18
type_etab=$(CreoleGet type_etab)
19
if [ "$type_etab" = "Lycee_Region" ] ; then
20
iptables -t nat -I PREROUTING -d 10.40.0.0/16 -j RETURN
21
fi
22
iptables -D pub-bas -i eth4 -p tcp --dport 3128 -j ACCEPT
23
iptables -t nat -D PREROUTING -i eth4 -p tcp --dport 80 --tcp-flags SYN,RST,ACK SYN ! -d %%adresse_ip_eth0/32 -j REDIRECT --to-ports 3128
24
iptables -D pub-bas -i eth4 -p tcp --dport 3128 -j ACCEPT
25
iptables -t nat -D PREROUTING -i eth4 -p tcp --dport 3128 --tcp-flags SYN,RST,ACK SYN ! -d %%adresse_ip_eth0/32 -j REDIRECT --to-ports 3128
26
iptables -D pub-bas -i eth4 -p tcp --dport 3128 -j ACCEPT
27
iptables -t nat -D PREROUTING -i eth4 -p tcp --dport 8080 --tcp-flags SYN,RST,ACK SYN ! -d %%adresse_ip_eth0/32 -j REDIRECT --to-ports 3128
28
iptables -D pub-bas -d %%adresse_ip_eth4/32 -i eth4 -p tcp -m state --state NEW -m tcp --dport 3128 --tcp-flags SYN,RST,ACK SYN -j ACCEPT
29
iptables -I ext-bas -d %%adresse_ip_eth0/32 -p tcp -m tcp --dport 8062 -j DROP
30
if [ -e /usr/share/era/ipset-tor ] ; then
31
. /usr/share/era/ipset-tor &amp;&gt; /dev/null
32
iptables -I OUTPUT -o eth0 -p tcp -m tcp -m set --match-set bastion-tor dst -j DROP
33
iptables -I FORWARD -o eth0 -p tcp -m tcp -m set --match-set bastion-tor dst -j DROP
34
fi
35
if [ "$type_etab" = "CG13" ] ; then
36
iptables -t nat -A POSTROUTING -o eth0 -s 10.231.0.0/255.255.0.0 -j SNAT --to-source %%adresse_ip_eth0
37
fi
38
if [ -e /etc/sysconfig/regles-locales ] ; then
39
. /etc/sysconfig/regles-locales
40
fi
41
</include>
42
    <services>
43
        <service name="EDT" protocol="tcp" ports="49500" id="73" libelle="EDT-tcp" tcpwrapper=""/>
44
        <service name="EDT-udp" protocol="udp" ports="55200" id="74" libelle="EDT-udp" tcpwrapper=""/>
45
        <service name="Kav_WOL" protocol="udp" ports="60000" id="70" libelle="WakeOnLan Kaspersky" tcpwrapper=""/>
46
        <service name="absence_9000" protocol="tcp" ports="9000" id="46" libelle="absence_9000" tcpwrapper=""/>
47
        <service name="agent_kav" protocol="tcp" ports="14000" id="47" libelle="agent_kav" tcpwrapper=""/>
48
        <service name="agent_kav_ssl" protocol="tcp" ports="13000" id="65" libelle="agent_kav_ssl" tcpwrapper=""/>
49
        <service name="ead_4201" protocol="tcp" ports="4201" id="76" libelle="Acces backend EAD" tcpwrapper=""/>
50
        <service name="http80" protocol="tcp" ports="80" id="71" libelle="port 80 (le nom de service http est deja utilise dans le modele dijon donc on utilise le nom http80)" tcpwrapper=""/>
51
        <service name="https443" protocol="tcp" ports="443" id="72" libelle="port 443 (le nom de service http est deja utilise dans le modele dijon donc on utilise le nom https443)" tcpwrapper=""/>
52
        <service name="impression" protocol="tcp" ports="9100" id="75" libelle="port imprimantes" tcpwrapper=""/>
53
        <service name="kav_control_client" protocol="udp" ports="15000" id="68" libelle="" tcpwrapper=""/>
54
        <service name="ldap_ssl" protocol="tcp" ports="636" id="101" libelle="service d'annuaire" tcpwrapper=""/>
55
        <service name="ldap_tcp" protocol="tcp" ports="389" id="67" libelle="service d'annuaire" tcpwrapper=""/>
56
        <service name="ldap_udp" protocol="udp" ports="389" id="64" libelle="service d'annuaire" tcpwrapper=""/>
57
        <service name="ntp_tcp" protocol="tcp" ports="123" id="48" libelle="ntp_tcp" tcpwrapper=""/>
58
        <service name="ntp_udp" protocol="udp" ports="123" id="49" libelle="ntp_udp" tcpwrapper=""/>
59
        <service name="pronote_49300" protocol="tcp" ports="49300" id="50" libelle="pronote_49300" tcpwrapper=""/>
60
        <service name="pronote_8000" protocol="tcp" ports="8000" id="51" libelle="pronote_8000" tcpwrapper=""/>
61
        <service name="snmp_tcp" protocol="tcp" ports="161-162" id="52" libelle="snmp_tcp" tcpwrapper=""/>
62
        <service name="snmp_udp" protocol="udp" ports="161-162" id="53" libelle="snmp_udp" tcpwrapper=""/>
63
        <service name="ssh_exterieur" protocol="tcp" ports="25000" id="69" libelle="ssh sur dmz depuis l'exterieur" tcpwrapper=""/>
64
        <service name="trend_cnnx_client" protocol="tcp" ports="13000" id="100" libelle="connexion du client trend à son serveur" tcpwrapper=""/>
65
        <service name="trend_cnnx_console" protocol="tcp" ports="4343" id="99" libelle="port de connexion du client à la console TREND" tcpwrapper=""/>
66
        <service name="zwook_443" protocol="tcp" ports="443" id="63" libelle="zwwok_443" tcpwrapper=""/>
67
        <service name="zwook_80" protocol="tcp" ports="80" id="62" libelle="zwook_80" tcpwrapper=""/>
68
        <service name="zwook_9080" protocol="tcp" ports="9080" id="61" libelle="zwook_9080" tcpwrapper=""/>
69
        <groupe id="EDT" libelle="acces EDT depuis exterieur">
70
            <service name="EDT" protocol="tcp" ports="49500" id="73" libelle="EDT-tcp" tcpwrapper=""/>
71
            <service name="EDT-udp" protocol="udp" ports="55200" id="74" libelle="EDT-udp" tcpwrapper=""/>
72
        </groupe>
73
        <groupe id="gr_ead_AixMars" libelle="groupe EAD (8501, 4200, 4201)">
74
            <service name="ead_4201" protocol="tcp" ports="4201" id="76" libelle="Acces backend EAD" tcpwrapper=""/>
75
        </groupe>
76
        <groupe id="gr_kav" libelle="Agent Kaspersky">
77
            <service name="agent_kav" protocol="tcp" ports="14000" id="47" libelle="agent_kav" tcpwrapper=""/>
78
            <service name="agent_kav_ssl" protocol="tcp" ports="13000" id="65" libelle="agent_kav_ssl" tcpwrapper=""/>
79
        </groupe>
80
        <groupe id="gr_kav_control" libelle="Kaspersky Controle des Clients et WakeOnLan">
81
            <service name="Kav_WOL" protocol="udp" ports="60000" id="70" libelle="WakeOnLan Kaspersky" tcpwrapper=""/>
82
            <service name="kav_control_client" protocol="udp" ports="15000" id="68" libelle="" tcpwrapper=""/>
83
        </groupe>
84
        <groupe id="gr_ldap" libelle="service d'annuaire TCP et UDP">
85
            <service name="ldap_tcp" protocol="tcp" ports="389" id="67" libelle="service d'annuaire" tcpwrapper=""/>
86
            <service name="ldap_udp" protocol="udp" ports="389" id="64" libelle="service d'annuaire" tcpwrapper=""/>
87
        </groupe>
88
        <groupe id="gr_ntp" libelle="gr_ntp">
89
            <service name="ntp_tcp" protocol="tcp" ports="123" id="48" libelle="ntp_tcp" tcpwrapper=""/>
90
            <service name="ntp_udp" protocol="udp" ports="123" id="49" libelle="ntp_udp" tcpwrapper=""/>
91
        </groupe>
92
        <groupe id="gr_pronote_ext" libelle="gr_pronote_ext">
93
            <service name="pronote_49300" protocol="tcp" ports="49300" id="50" libelle="pronote_49300" tcpwrapper=""/>
94
            <service name="pronote_8000" protocol="tcp" ports="8000" id="51" libelle="pronote_8000" tcpwrapper=""/>
95
        </groupe>
96
        <groupe id="gr_snmp" libelle="Snmp en TCP et UDP">
97
            <service name="snmp_tcp" protocol="tcp" ports="161-162" id="52" libelle="snmp_tcp" tcpwrapper=""/>
98
            <service name="snmp_udp" protocol="udp" ports="161-162" id="53" libelle="snmp_udp" tcpwrapper=""/>
99
        </groupe>
100
        <groupe id="gr_trend" libelle="ports utilisé par les clients TREND">
101
            <service name="trend_cnnx_client" protocol="tcp" ports="13000" id="100" libelle="connexion du client trend à son serveur" tcpwrapper=""/>
102
            <service name="trend_cnnx_console" protocol="tcp" ports="4343" id="99" libelle="port de connexion du client à la console TREND" tcpwrapper=""/>
103
        </groupe>
104
        <groupe id="gr_www" libelle="http et https">
105
            <service name="http80" protocol="tcp" ports="80" id="71" libelle="port 80 (le nom de service http est deja utilise dans le modele dijon donc on utilise le nom http80)" tcpwrapper=""/>
106
            <service name="https443" protocol="tcp" ports="443" id="72" libelle="port 443 (le nom de service http est deja utilise dans le modele dijon donc on utilise le nom https443)" tcpwrapper=""/>
107
        </groupe>
108
        <groupe id="gr_zwook" libelle="gr_zwook">
109
            <service name="zwook_80" protocol="tcp" ports="80" id="62" libelle="zwook_80" tcpwrapper=""/>
110
            <service name="zwook_9080" protocol="tcp" ports="9080" id="61" libelle="zwook_9080" tcpwrapper=""/>
111
            <service name="zwook_443" protocol="tcp" ports="443" id="63" libelle="zwwok_443" tcpwrapper=""/>
112
        </groupe>
113
    </services>
114
    <qosclasses upload="" download="">
115
    </qosclasses>
116
    <extremites>
117
        <extremite zone="privdmz" name="ip_acces_vpn_dmzpri" libelle="Adresse destination acces VPN DMZ privée" netmask="%%netmask_acces_vpn_dmzpri" subnet="1" type="" interface="" container="">
118
            <ip address="%%ip_acces_vpn_dmzpri"/>
119
        </extremite>
120
        <extremite zone="admin" name="ip_acces_vpn_admin" libelle="Adresse destination acces VPN reseau admin" netmask="%%netmask_acces_vpn_admin" subnet="1" type="" interface="" container="">
121
            <ip address="%%ip_acces_vpn_admin"/>
122
        </extremite>
123
        <extremite zone="exterieur" name="ip_source_acces_vpn_dmzpri" libelle="Adresse source de l'acces au reseau DMZ privée par VPN" netmask="%%netmask_source_acces_vpn_dmzpri" subnet="1" type="" interface="" container="">
124
            <ip address="%%ip_source_acces_vpn_dmzpri"/>
125
        </extremite>
126
        <extremite zone="pedago" name="ip_pronote_peda" libelle="ip srv note sur le peda" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
127
            <ip address="%%ip_pronote_peda"/>
128
        </extremite>
129
        <extremite zone="privdmz" name="ip_spipzwook_dmzpri" libelle="srv ip spipzwook dmzpri" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
130
            <ip address="%%ip_spipzwook_dmzpri"/>
131
        </extremite>
132
        <extremite zone="exterieur" name="ip_source_acces_vpn_peda" libelle="Adresse source de l'acces au reseau peda par VPN" netmask="%%netmask_source_acces_vpn_peda" subnet="1" type="" interface="" container="">
133
            <ip address="%%ip_source_acces_vpn_peda"/>
134
        </extremite>
135
        <extremite zone="pubdmz" name="ip_edt_dmzpub" libelle="Serveur EDT en dmz pub" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
136
            <ip address="%%ip_edt_dmzpub"/>
137
        </extremite>
138
        <extremite zone="pubdmz" name="serveur_web" libelle="Serveur web sur DMZ publique" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
139
            <ip address="%%ip_web_dmzpub"/>
140
        </extremite>
141
        <extremite zone="bastion" name="ip_bastion_eth1" libelle="IP bastion eth1" netmask="255.255.255.255" subnet="0" type="conteneur" interface="eth1" container="ip">
142
            <ip address="%%adresse_ip_eth1"/>
143
        </extremite>
144
        <extremite zone="bastion" name="ip_bastion_eth0" libelle="adresse IP eth0" netmask="255.255.255.255" subnet="0" type="conteneur" interface="eth1" container="ip">
145
            <ip address="%%adresse_ip_eth0"/>
146
        </extremite>
147
        <extremite zone="pedago" name="ip_scribe_peda" libelle="Serveur Scribe en zone péda" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
148
            <ip address="%%ip_scribe_peda"/>
149
        </extremite>
150
        <extremite zone="privdmz" name="ip_edt_dmzpri" libelle="Serveur EDT en dmz pri" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
151
            <ip address="%%ip_edt_dmzpri"/>
152
        </extremite>
153
        <extremite zone="pedago" name="ip_srv_antivirus" libelle="adresse IP du serveur antivirus" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
154
            <ip address="%%ip_srv_antivirus"/>
155
        </extremite>
156
        <extremite zone="privdmz" name="ip_pronote_dmzpri" libelle="ip srv note en dmz prive" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
157
            <ip address="%%ip_pronote_dmzpri"/>
158
        </extremite>
159
        <extremite zone="admin" name="ip_amon_eth1" libelle="IP Amon eth1" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
160
            <ip address="%%adresse_ip_eth1"/>
161
        </extremite>
162
        <extremite zone="privdmz" name="ip_scribe_pri" libelle="Serveur Scribe en DMZ privée" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
163
            <ip address="%%ip_scribe_pri"/>
164
        </extremite>
165
        <extremite zone="pubdmz" name="ip_srv_dmzpub_cas" libelle="Serveur DMZ publique en mode CAS" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
166
            <ip address="%%ip_srv_dmzpub_cas"/>
167
        </extremite>
168
        <extremite zone="pedago" name="ETH0_peda" libelle="Eth0 pour DNAT vers peda" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
169
            <ip address="%%adresse_ip_eth0"/>
170
        </extremite>
171
        <extremite zone="privdmz" name="ip_srv_antivirus_dmz" libelle="adresse IP du serveur antivirus en DMZ" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
172
            <ip address="%%ip_srv_antivirus_dmz"/>
173
        </extremite>
174
        <extremite zone="pubdmz" name="ssh_dmzpub" libelle="Serveur SSH sur DMZ publique" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
175
            <ip address="%%ip_ssh_dmzpub"/>
176
        </extremite>
177
        <extremite zone="pubdmz" name="ip_spipzwook_dmzpub" libelle="ip srv zwook dmz pub" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
178
            <ip address="%%ip_spipzwook_dmzpub"/>
179
        </extremite>
180
        <extremite zone="pubdmz" name="ip_acces_vpn_dmzpub" libelle="Adresse destination acces VPN DMZ publique" netmask="%%netmask_acces_vpn_dmzpub" subnet="1" type="" interface="" container="">
181
            <ip address="%%ip_acces_vpn_dmzpub"/>
182
        </extremite>
183
        <extremite zone="pedago" name="PC_supervision" libelle="Station supervision des lycées" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
184
            <ip address="%%ip_supervision"/>
185
        </extremite>
186
        <extremite zone="pubdmz" name="srv_absence" libelle="Serveur Absence port 9000" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
187
            <ip address="%%ip_absence_dmzpub"/>
188
        </extremite>
189
        <extremite zone="admin" name="imprimantes_acces_peda" libelle="imprimantes admin accesibles du reseau peda" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
190
            <ip address="%%ip_imprimantes_acces_peda"/>
191
        </extremite>
192
        <extremite zone="pubdmz" name="ip_srv_pub_antivirus" libelle="IPs des serveurs à proteger en DMZ pub" netmask="%%netmask_srv_pub_antivirus" subnet="1" type="" interface="" container="">
193
            <ip address="%%ip_srv_pub_antivirus"/>
194
        </extremite>
195
        <extremite zone="pedago" name="ip_sauv_nas" libelle="ip serveur a sauvegarder" netmask="%%netmask_sauv_nas" subnet="1" type="" interface="" container="">
196
            <ip address="%%ip_sauv_nas"/>
197
        </extremite>
198
        <extremite zone="privdmz" name="ip_srv_pri_antivirus" libelle="adresses IP des serveurs à proteger en DMZ prive" netmask="%%netmask_srv_pri_antivirus" subnet="1" type="" interface="" container="">
199
            <ip address="%%ip_srv_pri_antivirus"/>
200
        </extremite>
201
        <extremite zone="privdmz" name="ETH0_dmzpri" libelle="Eth0 pour DNAT vers peda" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
202
            <ip address="%%adresse_ip_eth0"/>
203
        </extremite>
204
        <extremite zone="pedago" name="ip_amon_eth2" libelle="IP Amon eth2" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
205
            <ip address="%%adresse_ip_eth2"/>
206
        </extremite>
207
        <extremite zone="exterieur" name="ip_source_acces_vpn_dmzpub" libelle="Adresse source de l'acces au reseau DMZ publique par VPN" netmask="%%netmask_source_acces_vpn_dmzpub" subnet="1" type="" interface="" container="">
208
            <ip address="%%ip_source_acces_vpn_dmzpub"/>
209
        </extremite>
210
        <extremite zone="privdmz" name="ip_srv_dmzpri_cas" libelle="Serveur DMZ privée en mode CAS" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
211
            <ip address="%%ip_srv_dmzpri_cas"/>
212
        </extremite>
213
        <extremite zone="pubdmz" name="ETH0_DMZPUB" libelle="Eth0 pour DNAT vers DMZ PUB" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
214
            <ip address="%%adresse_ip_eth0"/>
215
        </extremite>
216
        <extremite zone="admin" name="ip_srv_antivirus_adm" libelle="IP du serveur antivirus sur le reseau admin" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
217
            <ip address="%%ip_srv_antivirus_adm"/>
218
        </extremite>
219
        <extremite zone="pubdmz" name="ip_pronote_dmzpub" libelle="ip srv note en dmz pub" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
220
            <ip address="%%ip_pronote_dmzpub"/>
221
        </extremite>
222
        <extremite zone="pedago" name="Vlans_Peda" libelle="Reseau Global Vlan Peda" netmask="%%netmask_global_vlanpeda" subnet="1" type="" interface="" container="">
223
            <ip address="%%adresse_global_vlanpeda"/>
224
        </extremite>
225
        <extremite zone="privdmz" name="ip_nas" libelle="ip du serveur nas" netmask="255.255.255.255" subnet="1" type="" interface="" container="">
226
            <ip address="%%ip_nas"/>
227
        </extremite>
228
        <extremite zone="exterieur" name="ip_source_acces_vpn_admin" libelle="Adresse source de l'acces au reseau admin par VPN" netmask="%%netmask_source_acces_vpn_admin" subnet="1" type="" interface="" container="">
229
            <ip address="%%ip_source_acces_vpn_admin"/>
230
        </extremite>
231
        <extremite zone="pedago" name="ip_acces_vpn_peda" libelle="Adresse destination acces VPN reseau peda" netmask="%%netmask_acces_vpn_peda" subnet="1" type="" interface="" container="">
232
            <ip address="%%ip_acces_vpn_peda"/>
233
        </extremite>
234
        <extremite zone="pedago" name="ip_edt_peda" libelle="serveur EDT sur reseau peda" netmask="255.255.255.255" subnet="0" type="" interface="" container="">
235
            <ip address="%%ip_edt_peda"/>
236
        </extremite>
237
        <extremite zone="exterieur" name="reseau_rectorat" libelle="Reseau du Rectorat" netmask="255.255.254.0" subnet="1" type="" interface="" container="">
238
            <ip address="195.83.252.0"/>
239
        </extremite>
240
    </extremites>
241
    <ranges>
242
    </ranges>
243
    <user_groups>
244
        <user_group name="professeurs" id="10001"/>
245
        <user_group name="élèves" id="10002"/>
246
    </user_groups>
247
    <applications>
248
        <app_group name="Navigateur Web" description="Liste des navigateurs web">
249
                <app name="Internet Explorer"/>
250
                <app name="Firefox"/>
251
                <app name="AutresNav"/>
252
        </app_group>
253
                <application name="AutresNav" description="Autres navigateurs">
254
                <path name="C:\Program Files\*opera*"/>
255
        </application>
256
                <application name="Firefox" description="Navigateur Mozilla Firefox">
257
                <path name="C:\Program Files\*firefox*"/>
258
                <path name="/usr/bin/*firefox*"/>
259
        </application>
260
                <application name="Internet Explorer" description="Navigateur Internet Explorer">
261
                <path name="C:\Program Files\Internet Explorer\*ieplorer*"/>
262
        </application>
263
    </applications>
264
    <flux-list>
265
        <flux zoneA="bastion" zoneB="exterieur">
266
            <montantes default_policy="0">
267
            </montantes>
268
            <descendantes default_policy="1">
269
            </descendantes>
270
        </flux>
271
        <flux zoneA="exterieur" zoneB="admin">
272
            <montantes default_policy="0">
273
                <directive tag="acces_vpn_admin" service="tous" priority="1" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser acces depuis client VPN vers admin" ipsec="0" accept="0">
274
                    <source name="ip_source_acces_vpn_admin"/>
275
                    <destination name="ip_acces_vpn_admin"/>
276
                </directive>
277
            </montantes>
278
            <descendantes default_policy="1">
279
                <directive service="tous" priority="6" action="16" attrs="0" nat_extr="exterieur_bastion" nat_port="0" src_inv="0" dest_inv="0" serv_inv="0" libelle="pas de description" ipsec="0" accept="0">
280
                    <source name="admin_restreint"/>
281
                    <destination name="exterieur"/>
282
                </directive>
283
            </descendantes>
284
        </flux>
285
        <flux zoneA="bastion" zoneB="admin">
286
            <montantes default_policy="0">
287
                <directive tag="activer_lightsquid" service="lightsquid" priority="13" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser lightsquid pour eth1" ipsec="0" accept="0">
288
                    <source name="admin_admin"/>
289
                    <destination name="ip_bastion_eth0"/>
290
                </directive>
291
            </montantes>
292
            <descendantes default_policy="1">
293
            </descendantes>
294
        </flux>
295
        <flux zoneA="exterieur" zoneB="pedago">
296
            <montantes default_policy="0">
297
                <directive tag="Acces_Station_Supervision" service="tous" priority="1" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Acces a la station de supervision (Lycée)" ipsec="0" accept="0">
298
                    <source name="exterieur"/>
299
                    <destination name="PC_supervision"/>
300
                </directive>
301
                <directive tag="acces_vpn_peda" service="tous" priority="2" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser acces depuis client VPN vers peda" ipsec="0" accept="0">
302
                    <source name="ip_source_acces_vpn_peda"/>
303
                    <destination name="ip_acces_vpn_peda"/>
304
                </directive>
305
                <directive tag="entpeda" service="ldap" priority="3" action="8" attrs="17" nat_extr="ip_scribe_peda" nat_port="389" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT pour LDAP depuis Seshat vers ENT péda" ipsec="0" accept="0">
306
                    <source name="reseau_rectorat"/>
307
                    <destination name="ETH0_peda"/>
308
                </directive>
309
                <directive tag="entpeda" service="ldaps" priority="4" action="8" attrs="17" nat_extr="ip_scribe_peda" nat_port="636" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT pour LDAPS depuis Seshat vers ENT péda" ipsec="0" accept="0">
310
                    <source name="reseau_rectorat"/>
311
                    <destination name="ETH0_peda"/>
312
                </directive>
313
                <directive tag="entpeda" service="eole-sso" priority="5" action="8" attrs="17" nat_extr="ip_scribe_peda" nat_port="8443" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT pour SSO vers ENT péda" ipsec="0" accept="0">
314
                    <source name="exterieur"/>
315
                    <destination name="ETH0_peda"/>
316
                </directive>
317
            </montantes>
318
            <descendantes default_policy="1">
319
                <directive tag="intercopeda" service="tous" priority="11" action="16" attrs="17" nat_extr="exterieur_bastion" nat_port="0" src_inv="0" dest_inv="0" serv_inv="0" libelle="SNAT pour le reseau global péda" ipsec="0" accept="0">
320
                    <source name="Vlans_Peda"/>
321
                    <destination name="exterieur"/>
322
                </directive>
323
            </descendantes>
324
        </flux>
325
        <flux zoneA="admin" zoneB="pedago">
326
            <montantes default_policy="0">
327
                <directive tag="kav_control_ped" service="gr_kav_control" priority="1" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="kaspersky controle et WakeOnLan des clients admin à partir du server Kav Peda" ipsec="0" accept="0">
328
                    <source name="ip_srv_antivirus"/>
329
                    <destination name="admin"/>
330
                </directive>
331
                <directive tag="imprimantes_ped_vers_adm" service="impression" priority="2" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise l'acces aux imprimantes réseau depuis le réseau pedago" ipsec="0" accept="0">
332
                    <source name="pedago"/>
333
                    <destination name="imprimantes_acces_peda"/>
334
                </directive>
335
                <directive tag="kav_ped_vers_adm" service="gr_kav" priority="3" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser zone peda dialoguer avec serveur kav admin" ipsec="0" accept="0">
336
                    <source name="pedago"/>
337
                    <destination name="ip_srv_antivirus_adm"/>
338
                </directive>
339
                <directive tag="trend_control_ped" service="gr_trend" priority="4" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="controles des postes trend depuis le serveur peda vers l'admin" ipsec="0" accept="0">
340
                    <source name="ip_srv_antivirus"/>
341
                    <destination name="admin"/>
342
                </directive>
343
                <directive tag="trend_ped_vers_adm" service="gr_trend" priority="5" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser client TREND de PEDA vers ADMIN" ipsec="0" accept="0">
344
                    <source name="pedago"/>
345
                    <destination name="ip_srv_antivirus_adm"/>
346
                </directive>
347
            </montantes>
348
            <descendantes default_policy="1">
349
            </descendantes>
350
        </flux>
351
        <flux zoneA="bastion" zoneB="pedago">
352
            <montantes default_policy="0">
353
                <directive tag="AdminDepuisEth2" service="eole-sso" priority="14" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Authentification SSO sur eth1 depuis reseau pedago pour l'EAD" ipsec="0" accept="0">
354
                    <source name="pedago_admin"/>
355
                    <destination name="ip_bastion_eth1"/>
356
                </directive>
357
                <directive tag="activer_lightsquid" service="lightsquid" priority="15" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser peda vers lightsquid" ipsec="0" accept="0">
358
                    <source name="pedago_admin"/>
359
                    <destination name="ip_bastion_eth0"/>
360
                </directive>
361
            </montantes>
362
            <descendantes default_policy="1">
363
            </descendantes>
364
        </flux>
365
        <flux zoneA="exterieur" zoneB="privdmz">
366
            <montantes default_policy="0">
367
                <directive tag="acces_vpn_dmzpri" service="tous" priority="1" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser acces depuis client VPN vers DMZ pri" ipsec="0" accept="0">
368
                    <source name="ip_source_acces_vpn_dmzpri"/>
369
                    <destination name="ip_acces_vpn_dmzpri"/>
370
                </directive>
371
                <directive tag="entdmzpri" service="ldap" priority="2" action="8" attrs="17" nat_extr="ip_scribe_pri" nat_port="389" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT pour LDAP depuis Seshat vers ENT dmz privée" ipsec="0" accept="0">
372
                    <source name="reseau_rectorat"/>
373
                    <destination name="ETH0_dmzpri"/>
374
                </directive>
375
                <directive tag="entdmzpri" service="ldaps" priority="3" action="8" attrs="17" nat_extr="ip_scribe_pri" nat_port="636" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT pour LDAPS depuis Seshat vers ENT dmz privée" ipsec="0" accept="0">
376
                    <source name="reseau_rectorat"/>
377
                    <destination name="ETH0_dmzpri"/>
378
                </directive>
379
                <directive tag="entdmzpri" service="eole-sso" priority="4" action="8" attrs="17" nat_extr="ip_scribe_pri" nat_port="8443" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT pour SSO vers ENT dmz privée" ipsec="0" accept="0">
380
                    <source name="exterieur"/>
381
                    <destination name="ETH0_dmzpri"/>
382
                </directive>
383
            </montantes>
384
            <descendantes default_policy="1">
385
                <directive service="tous" priority="6" action="16" attrs="0" nat_extr="exterieur_bastion" nat_port="0" src_inv="0" dest_inv="0" serv_inv="0" libelle="SNAT pour l'acces des serveurs DMZ privés vers l'exterieur" ipsec="0" accept="0">
386
                    <source name="privdmz_restreint"/>
387
                    <destination name="exterieur"/>
388
                </directive>
389
                <directive service="gr_redirection_http" priority="7" action="4" attrs="0" nat_port="3128" src_inv="0" dest_inv="1" serv_inv="0" libelle="Redirection des flux http sans proxy" ipsec="0" accept="0">
390
                    <source name="privdmz"/>
391
                    <destination name="exterieur_bastion"/>
392
                </directive>
393
                <directive service="gr_redirection_http" priority="8" action="4" attrs="0" nat_port="81" src_inv="0" dest_inv="0" serv_inv="0" libelle="Redirection des flux vers le serveur de distribution du fichier wpad" ipsec="0" accept="0">
394
                    <source name="privdmz"/>
395
                    <destination name="exterieur"/>
396
                </directive>
397
                <directive service="gr_redirection_https" priority="9" action="4" attrs="0" nat_port="82" src_inv="0" dest_inv="0" serv_inv="0" libelle="Redirection des flux https sans proxy vers une page d'erreur" ipsec="0" accept="0">
398
                    <source name="privdmz"/>
399
                    <destination name="exterieur"/>
400
                </directive>
401
            </descendantes>
402
        </flux>
403
        <flux zoneA="admin" zoneB="privdmz">
404
            <montantes default_policy="0">
405
                <directive tag="kav_control_pri" service="gr_kav_control" priority="1" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Kaspersky controle et WakeOnLan des clients admin à partir du server Kav en DMZpri" ipsec="0" accept="0">
406
                    <source name="ip_srv_antivirus_dmz"/>
407
                    <destination name="admin"/>
408
                </directive>
409
                <directive tag="kav_pri_vers_adm" service="gr_kav" priority="2" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser serveur DMZ_pri a dialoguer avec serveur kav admin" ipsec="0" accept="0">
410
                    <source name="ip_srv_pri_antivirus"/>
411
                    <destination name="ip_srv_antivirus_adm"/>
412
                </directive>
413
                <directive tag="trend_control_pri" service="gr_trend" priority="3" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="controle de TREND de la DMZ vers la zone ADMIN" ipsec="0" accept="0">
414
                    <source name="ip_srv_antivirus_dmz"/>
415
                    <destination name="admin"/>
416
                </directive>
417
                <directive tag="trend_pri_vers_adm" service="gr_trend" priority="4" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="client TREND DMZ pub vers serveur ADMIN" ipsec="0" accept="0">
418
                    <source name="ip_srv_pri_antivirus"/>
419
                    <destination name="ip_srv_antivirus_adm"/>
420
                </directive>
421
            </montantes>
422
            <descendantes default_policy="1">
423
            </descendantes>
424
        </flux>
425
        <flux zoneA="bastion" zoneB="privdmz">
426
            <montantes default_policy="0">
427
                <directive tag="spipzwook_dmzpri" service="gr_ntp" priority="11" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise Zwook a se synchroniser (NTP) sur l'amon" ipsec="0" accept="0">
428
                    <source name="ip_spipzwook_dmzpri"/>
429
                    <destination name="bastion"/>
430
                </directive>
431
                <directive service="echo-request" priority="12" action="2" attrs="0" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise ETH4 a répondre au ping depuis DMZ pri" ipsec="0" accept="0">
432
                    <source name="privdmz_restreint"/>
433
                    <destination name="bastion"/>
434
                </directive>
435
            </montantes>
436
            <descendantes default_policy="1">
437
            </descendantes>
438
        </flux>
439
        <flux zoneA="exterieur" zoneB="pubdmz">
440
            <montantes default_policy="0">
441
                <directive tag="serveur_web_CG13_Region" service="gr_www" priority="1" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorisation d'acces au serveur WEB depuis l'exterieur (CG13_Region)" ipsec="0" accept="0">
442
                    <source name="exterieur"/>
443
                    <destination name="serveur_web"/>
444
                </directive>
445
                <directive tag="serveur_web_FAI" service="http" priority="2" action="8" attrs="17" nat_extr="serveur_web" nat_port="80" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT de l'autorisation d'accés au serveur WEB depuis l'exterieur (FAI)" ipsec="0" accept="0">
446
                    <source name="exterieur"/>
447
                    <destination name="ETH0_DMZPUB"/>
448
                </directive>
449
                <directive tag="serveur_absence_CG13_Region" service="absence_9000" priority="3" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorisation d'acces au serveur absence sur port 9000 (CG13_Region)" ipsec="0" accept="0">
450
                    <source name="exterieur"/>
451
                    <destination name="srv_absence"/>
452
                </directive>
453
                <directive tag="serveur_absence_FAI" service="absence_9000" priority="4" action="8" attrs="17" nat_extr="srv_absence" nat_port="9000" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT pour acces au serveur absence en port 9000 (FAI)" ipsec="0" accept="0">
454
                    <source name="exterieur"/>
455
                    <destination name="ETH0_DMZPUB"/>
456
                </directive>
457
                <directive tag="pronote_dmz_CG13_Region" service="gr_pronote_ext" priority="5" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise accès pronote en dmz pub port 8000 et 49300 (CG13_Region)" ipsec="0" accept="0">
458
                    <source name="exterieur"/>
459
                    <destination name="ip_pronote_dmzpub"/>
460
                </directive>
461
                <directive tag="pronote_dmz_FAI" service="pronote_49300" priority="6" action="8" attrs="17" nat_extr="ip_pronote_dmzpub" nat_port="49300" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT port 49300 de l'ext vers srv pronote pub (FAI)" ipsec="0" accept="0">
462
                    <source name="exterieur"/>
463
                    <destination name="ETH0_DMZPUB"/>
464
                </directive>
465
                <directive tag="pronote_dmz_FAI" service="pronote_8000" priority="7" action="8" attrs="17" nat_extr="ip_pronote_dmzpub" nat_port="8000" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT port 8000 de l'ext vers srv pronote pub (FAI)" ipsec="0" accept="0">
466
                    <source name="exterieur"/>
467
                    <destination name="ETH0_DMZPUB"/>
468
                </directive>
469
                <directive tag="edt_dmz_CG13_Region" service="EDT" priority="8" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise accès EDT en dmz pub port tcp 49500 (CG13_Region)" ipsec="0" accept="0">
470
                    <source name="exterieur"/>
471
                    <destination name="ip_edt_dmzpub"/>
472
                </directive>
473
                <directive tag="edt_dmz_FAI" service="EDT" priority="9" action="8" attrs="17" nat_extr="ip_edt_dmzpub" nat_port="49500" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT ports tcp 49500 de l'ext vers srv EDT pub (FAI)" ipsec="0" accept="0">
474
                    <source name="exterieur"/>
475
                    <destination name="ETH0_DMZPUB"/>
476
                </directive>
477
                <directive tag="zwook_dmzpub_CG13_Region" service="gr_zwook" priority="10" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise ports 80, 9080,443 de l'ext vers zwook pub (CG13_Region)" ipsec="0" accept="0">
478
                    <source name="exterieur"/>
479
                    <destination name="ip_spipzwook_dmzpub"/>
480
                </directive>
481
                <directive tag="zwook_dmzpub_FAI" service="http" priority="11" action="8" attrs="17" nat_extr="ip_spipzwook_dmzpub" nat_port="80" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT port 80 de l'ext vers zwook pub (FAI)" ipsec="0" accept="0">
482
                    <source name="exterieur"/>
483
                    <destination name="ETH0_DMZPUB"/>
484
                </directive>
485
                <directive tag="zwook_dmzpub_FAI" service="zwook_9080" priority="12" action="8" attrs="17" nat_extr="ip_spipzwook_dmzpub" nat_port="9080" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT port 9080 de l'ext vers zwook pub (FAI)" ipsec="0" accept="0">
486
                    <source name="exterieur"/>
487
                    <destination name="ETH0_DMZPUB"/>
488
                </directive>
489
                <directive tag="zwook_dmzpub_FAI" service="https" priority="13" action="8" attrs="17" nat_extr="ip_spipzwook_dmzpub" nat_port="443" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT port 443 de l'ext vers zwook pub (FAI)" ipsec="0" accept="0">
490
                    <source name="exterieur"/>
491
                    <destination name="ETH0_DMZPUB"/>
492
                </directive>
493
                <directive tag="acces_vpn_dmzpub" service="tous" priority="14" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser acces depuis client VPN vers DMZ pub" ipsec="0" accept="0">
494
                    <source name="ip_source_acces_vpn_dmzpub"/>
495
                    <destination name="ip_acces_vpn_dmzpub"/>
496
                </directive>
497
                <directive tag="ssh_dmzpub_CG13_Region" service="ssh_exterieur" priority="15" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise accès SSH en dmz pub sur port 25000 (CG13_Region)" ipsec="0" accept="0">
498
                    <source name="exterieur"/>
499
                    <destination name="ssh_dmzpub"/>
500
                </directive>
501
                <directive tag="ssh_dmzpub_fai" service="ssh_exterieur" priority="16" action="8" attrs="17" nat_extr="ssh_dmzpub" nat_port="25000" src_inv="0" dest_inv="0" serv_inv="0" libelle="DNAT port 25000 pour SSH de l'ext vers srv en dmzpub (FAI)" ipsec="0" accept="0">
502
                    <source name="exterieur"/>
503
                    <destination name="ETH0_DMZPUB"/>
504
                </directive>
505
            </montantes>
506
            <descendantes default_policy="1">
507
                <directive tag="zwook_dmzpub_CG13_Region" service="tous" priority="5" action="16" attrs="17" nat_extr="ETH0_DMZPUB" nat_port="0" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise tout zwook pub vers ext (CG13_Region)" ipsec="0" accept="0">
508
                    <source name="ip_spipzwook_dmzpub"/>
509
                    <destination name="exterieur"/>
510
                </directive>
511
                <directive tag="zwook_dmzpub_FAI" service="tous" priority="6" action="16" attrs="17" nat_extr="ETH0_DMZPUB" nat_port="0" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise tout zwook vers exterieur (FAI)" ipsec="0" accept="0">
512
                    <source name="ip_spipzwook_dmzpub"/>
513
                    <destination name="exterieur"/>
514
                </directive>
515
                <directive tag="dmzpub_cas_ext" service="eole-sso" priority="7" action="16" attrs="17" nat_extr="ETH0_DMZPUB" nat_port="0" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser les serveurs en DMZ publique en mode CAS à sortir sur le port eole-sso" ipsec="0" accept="0">
516
                    <source name="ip_srv_dmzpub_cas"/>
517
                    <destination name="exterieur"/>
518
                </directive>
519
                <directive service="tous" priority="8" action="1" attrs="0" src_inv="0" dest_inv="0" serv_inv="0" libelle="Blocage acces Internet depuis DMZ Pub" ipsec="0" accept="0">
520
                    <source name="pubdmz"/>
521
                    <destination name="exterieur"/>
522
                </directive>
523
            </descendantes>
524
        </flux>
525
        <flux zoneA="admin" zoneB="pubdmz">
526
            <montantes default_policy="0">
527
                <directive tag="kav_pub_vers_adm" service="gr_kav" priority="1" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser serveur DMZ_pub a dialoguer avec serveur kav admin" ipsec="0" accept="0">
528
                    <source name="ip_srv_pub_antivirus"/>
529
                    <destination name="ip_srv_antivirus_adm"/>
530
                </directive>
531
                <directive tag="trend_pub_vers_adm" service="gr_trend" priority="2" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser trend de la dmz pub vers l'admin" ipsec="0" accept="0">
532
                    <source name="ip_srv_pub_antivirus"/>
533
                    <destination name="ip_srv_antivirus_adm"/>
534
                </directive>
535
            </montantes>
536
            <descendantes default_policy="1">
537
            </descendantes>
538
        </flux>
539
        <flux zoneA="bastion" zoneB="pubdmz">
540
            <montantes default_policy="0">
541
                <directive tag="zwook_dmzpub_CG13_Region" service="gr_ntp" priority="12" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise Zwook a se synchroniser (NTP) sur l'amon - CG13_Region" ipsec="0" accept="0">
542
                    <source name="ip_spipzwook_dmzpub"/>
543
                    <destination name="bastion"/>
544
                </directive>
545
                <directive tag="zwook_dmzpub_FAI" service="gr_ntp" priority="13" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise Zwook a se synchroniser (NTP) sur l'amon - FAI" ipsec="0" accept="0">
546
                    <source name="ip_spipzwook_dmzpub"/>
547
                    <destination name="bastion"/>
548
                </directive>
549
                <directive service="echo-request" priority="14" action="2" attrs="0" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise ETH3 a repondre au ping depuis la zone DMZ pub" ipsec="0" accept="0">
550
                    <source name="pubdmz_restreint"/>
551
                    <destination name="bastion"/>
552
                </directive>
553
            </montantes>
554
            <descendantes default_policy="1">
555
            </descendantes>
556
        </flux>
557
        <flux zoneA="pedago" zoneB="privdmz">
558
            <montantes default_policy="0">
559
                <directive tag="kav_pri_vers_ped" service="gr_kav" priority="2" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser serveur DMZ_pri a dialoguer avec serveur kav peda" ipsec="0" accept="0">
560
                    <source name="ip_srv_pri_antivirus"/>
561
                    <destination name="ip_srv_antivirus"/>
562
                </directive>
563
                <directive tag="spipzwook_dmzpri" service="gr_ldap" priority="3" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise ldap 389 du zwook DMZ privé vers peda" ipsec="0" accept="0">
564
                    <source name="ip_spipzwook_dmzpri"/>
565
                    <destination name="pedago"/>
566
                </directive>
567
                <directive tag="kav_control_pri" service="gr_kav_control" priority="4" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Kaspersky controle et WakeOnLan des clients peda à partir du server Kav en DMZpri" ipsec="0" accept="0">
568
                    <source name="ip_srv_antivirus_dmz"/>
569
                    <destination name="pedago"/>
570
                </directive>
571
                <directive tag="trend_pri_vers_ped" service="gr_trend" priority="5" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser client trend de dmz prive vers peda" ipsec="0" accept="0">
572
                    <source name="ip_srv_pri_antivirus"/>
573
                    <destination name="ip_srv_antivirus"/>
574
                </directive>
575
                <directive tag="trend_control_pri" service="gr_trend" priority="6" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser le controle de TREND de la DMZ pub vers le Peda" ipsec="0" accept="0">
576
                    <source name="ip_srv_antivirus_dmz"/>
577
                    <destination name="pedago"/>
578
                </directive>
579
                <directive tag="dmzpri_cas" service="eole-sso" priority="7" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser eole-sso depuis les serveurs en DMZ privée en mode CAS vers ENT péda" ipsec="0" accept="1">
580
                    <source name="ip_srv_dmzpri_cas"/>
581
                    <destination name="ip_scribe_peda"/>
582
                </directive>
583
            </montantes>
584
            <descendantes default_policy="1">
585
                <directive tag="Peda_NASpri" service="tous" priority="1" action="1" attrs="17" src_inv="1" dest_inv="0" serv_inv="0" libelle="Interdiction a tout sauf srv pedago vers NAS" ipsec="0" accept="0">
586
                    <source name="ip_sauv_nas"/>
587
                    <destination name="ip_nas"/>
588
                </directive>
589
            </descendantes>
590
        </flux>
591
        <flux zoneA="pubdmz" zoneB="pedago">
592
            <montantes default_policy="0">
593
                <directive tag="kav_pub_vers_ped" service="gr_kav" priority="1" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise serveurs de DMZ Pub a se connecter a KAV sur pedago" ipsec="0" accept="0">
594
                    <source name="ip_srv_pub_antivirus"/>
595
                    <destination name="ip_srv_antivirus"/>
596
                </directive>
597
                <directive tag="zwook_dmzpub_CG13_Region" service="gr_ldap" priority="2" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise ldap 389 du zwook vers peda (CG13_Region)" ipsec="0" accept="0">
598
                    <source name="ip_spipzwook_dmzpub"/>
599
                    <destination name="pedago"/>
600
                </directive>
601
                <directive tag="zwook_dmzpub_CG13_Region" service="dns" priority="3" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise dns 53 du srv zwook pub vers peda (CG13_Region)" ipsec="0" accept="0">
602
                    <source name="ip_spipzwook_dmzpub"/>
603
                    <destination name="pedago"/>
604
                </directive>
605
                <directive tag="zwook_dmzpub_FAI" service="gr_ldap" priority="4" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise LDAP 389 zwook pub vers peda (FAI)" ipsec="0" accept="0">
606
                    <source name="ip_spipzwook_dmzpub"/>
607
                    <destination name="pedago"/>
608
                </directive>
609
                <directive tag="zwook_dmzpub_FAI" service="dns" priority="5" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise dns 53 zwook pub vers peda (FAI)" ipsec="0" accept="0">
610
                    <source name="ip_spipzwook_dmzpub"/>
611
                    <destination name="pedago"/>
612
                </directive>
613
                <directive tag="pronote_peda_CG13_Region" service="pronote_49300" priority="6" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise le port 49300 entre pub(relais-net) vers peda (serveur) (CG13_Region)" ipsec="0" accept="0">
614
                    <source name="ip_pronote_dmzpub"/>
615
                    <destination name="ip_pronote_peda"/>
616
                </directive>
617
                <directive tag="pronote_peda_FAI" service="pronote_49300" priority="7" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser port 49300 de pub (relais-net) vers peda (srv pronote) (FAI)" ipsec="0" accept="0">
618
                    <source name="ip_pronote_dmzpub"/>
619
                    <destination name="ip_pronote_peda"/>
620
                </directive>
621
                <directive tag="edt_peda_CG13_Region" service="EDT" priority="8" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise le port 49500 entre pub(EDT relais) vers peda (serveur EDT) (CG13_Region)" ipsec="0" accept="0">
622
                    <source name="ip_edt_dmzpub"/>
623
                    <destination name="ip_edt_peda"/>
624
                </directive>
625
                <directive tag="edt_peda_FAI" service="EDT" priority="9" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser port 49500 de pub (relais-net) vers peda (srv pronote) (FAI)" ipsec="0" accept="0">
626
                    <source name="ip_edt_dmzpub"/>
627
                    <destination name="ip_edt_peda"/>
628
                </directive>
629
                <directive tag="trend_pub_vers_ped" service="gr_trend" priority="10" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser trend depuis publique vers prive" ipsec="0" accept="0">
630
                    <source name="ip_srv_pub_antivirus"/>
631
                    <destination name="ip_srv_antivirus"/>
632
                </directive>
633
                <directive tag="dmzpub_cas_peda" service="eole-sso" priority="11" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser eole-sso depuis les serveurs en DMZ publique en mode CAS vers ENT péda" ipsec="0" accept="1">
634
                    <source name="ip_srv_dmzpub_cas"/>
635
                    <destination name="ip_scribe_peda"/>
636
                </directive>
637
            </montantes>
638
            <descendantes default_policy="1">
639
            </descendantes>
640
        </flux>
641
        <flux zoneA="pubdmz" zoneB="privdmz">
642
            <montantes default_policy="0">
643
                <directive tag="pronote_dmzpri_CG13_Region" service="pronote_49300" priority="1" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise le port 49300 entre pub(relais-net) vers pri (serveur) (CG13_Region)" ipsec="0" accept="0">
644
                    <source name="ip_pronote_dmzpub"/>
645
                    <destination name="ip_pronote_dmzpri"/>
646
                </directive>
647
                <directive tag="pronote_dmzpri_FAI" service="pronote_49300" priority="2" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser port 49300 de pub (relais-net) vers pri (srv pronote) (FAI)" ipsec="0" accept="0">
648
                    <source name="ip_pronote_dmzpub"/>
649
                    <destination name="ip_pronote_dmzpri"/>
650
                </directive>
651
                <directive tag="kav_pub_vers_pri" service="gr_kav" priority="3" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise serveurs de DMZ Pub a se connecter a KAV sur DMZ Pri" ipsec="0" accept="0">
652
                    <source name="ip_srv_pub_antivirus"/>
653
                    <destination name="ip_srv_antivirus_dmz"/>
654
                </directive>
655
                <directive tag="edt_dmzpri_CG13_Region" service="EDT" priority="4" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autorise le port 49500 entre pub(EDT relais) vers pri (serveur EDT) (CG13_Region)" ipsec="0" accept="0">
656
                    <source name="ip_edt_dmzpub"/>
657
                    <destination name="ip_edt_dmzpri"/>
658
                </directive>
659
                <directive tag="edt_dmzpri_FAI" service="EDT" priority="5" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser port 49500 de pub (EDT relais) vers pri (srv EDT) (FAI)" ipsec="0" accept="0">
660
                    <source name="ip_edt_dmzpub"/>
661
                    <destination name="ip_edt_dmzpri"/>
662
                </directive>
663
                <directive tag="trend_pub_vers_pri" service="gr_trend" priority="6" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser dmz pub vers le serveur trend en dmz prive" ipsec="0" accept="0">
664
                    <source name="ip_srv_pub_antivirus"/>
665
                    <destination name="ip_srv_antivirus_dmz"/>
666
                </directive>
667
                <directive tag="dmzpub_cas_pri" service="eole-sso" priority="7" action="2" attrs="17" src_inv="0" dest_inv="0" serv_inv="0" libelle="Autoriser eole-sso depuis les serveurs en DMZ publique en mode CAS vers ENT dmz privée" ipsec="0" accept="1">
668
                    <source name="ip_srv_dmzpub_cas"/>
669
                    <destination name="ip_scribe_pri"/>
670
                </directive>
671
            </montantes>
672
            <descendantes default_policy="1">
673
            </descendantes>
674
        </flux>
675
    </flux-list>
676
</firewall>