Projet

Général

Profil

4zones26v1.xml

/usr/share/era/modeles/ - Jerome WATREMEZ, 22/09/2017 08:58

Télécharger (73,3 ko)

 
1
<?xml version="1.0" encoding="UTF-8" ?>
2
<firewall name="/usr/share/era/modeles/4zones26v1.xml" netbios="1" qos="0" version="2.42">
3
    <zones>
4
        <zone interface="%%nom_zone_eth0" ip="%%adresse_ip_eth0" level="10" name="exterieur" netmask="%%adresse_netmask_eth0" network="%%adresse_network_eth0" />
5
        <zone interface="lo" ip="127.0.0.1" level="100" name="bastion" netmask="255.255.255.255" network="0.0.0.0" />
6
    <zone interface="%%nom_zone_eth1" ip="%%adresse_ip_eth1" level="50" name="admin" netmask="%%adresse_netmask_eth1" network="%%adresse_network_eth1" />
7
    <zone interface="%%nom_zone_eth2" ip="%%adresse_ip_eth2" level="40" name="pedago" netmask="%%adresse_netmask_eth2" network="%%adresse_network_eth2" />
8
    <zone interface="%%nom_zone_eth3" ip="%%adresse_ip_eth3" level="30" name="dmz" netmask="%%adresse_netmask_eth3" network="%%adresse_network_eth3" />
9
    </zones>
10
    <include>
11
## INCLUSIONS_STATIQUES ##
12
##  EXT-DMZ: redirection des ports autorises sur les serveurs DMZ
13
##  IP PUB 1 : serveur WWW
14
%if %%ip_pub1 != ''
15
   /sbin/iptables -t nat -I PREROUTING -d %%ip_pub1/32 -i eth0 -p tcp -m tcp -m multiport --dports 20:22,80,81,389,443,636,1723,4129,4200 --tcp-flags SYN,RST,ACK SYN -j DNAT --to-destination %%ip_serveur_web1
16
   /sbin/iptables -t nat -I PREROUTING -d %%ip_pub1/32 -i eth0 -p tcp -m tcp -m multiport --dports 7070,8008,8090,8443,20100,44123,49300,49400,49500 --tcp-flags SYN,RST,ACK SYN -j DNAT --to-destination %%ip_serveur_web1
17
   /sbin/iptables -t filter -I ext-dmz -d %%ip_serveur_web1/32 -i eth0 -o eth3 -p tcp -m tcp --tcp-flags SYN,RST,ACK SYN -j ACCEPT
18
   /sbin/iptables -t nat -I POSTROUTING -s %%ip_serveur_web1/32 -o eth0 -j SNAT --to-source %%adresse_ip_eth0
19
%end if
20
##  IP PUB 2 : serveur NOTES
21
%if %%ip_pub2 != ''
22
   /sbin/iptables -t nat -I PREROUTING -d %%ip_pub2/32 -i eth0 -p tcp -m tcp -m multiport --dports 20:22,80,81,389,443,636,1723,4129,4200 --tcp-flags SYN,RST,ACK SYN -j DNAT --to-destination %%ip_serveur_web2
23
   /sbin/iptables -t nat -I PREROUTING -d %%ip_pub2/32 -i eth0 -p tcp -m tcp -m multiport --dports 7070,8008,8090,8443,20100,44123,49300,49400,49500 --tcp-flags SYN,RST,ACK SYN -j DNAT --to-destination %%ip_serveur_web2
24
   /sbin/iptables -t filter -I ext-dmz -d %%ip_serveur_web2/32 -i eth0 -o eth3 -p tcp -m tcp --tcp-flags SYN,RST,ACK SYN -j ACCEPT
25
   /sbin/iptables -t nat -I POSTROUTING -s %%ip_serveur_web2/32 -o eth0 -j SNAT --to-source %%adresse_ip_eth0
26
%end if
27
##  IP PUB 3 : serveur COURRIER
28
%if %%ip_pub3 != ''
29
   /sbin/iptables -t nat -I PREROUTING -d %%ip_pub3/32 -i eth0 -p tcp -m tcp -m multiport --dports 20:22,25,80,81,110,143,389,443,585,636,995,1723,4129,4200 --tcp-flags SYN,RST,ACK SYN -j DNAT --to-destination %%ip_serveur_web3
30
   /sbin/iptables -t nat -I PREROUTING -d %%ip_pub3/32 -i eth0 -p tcp -m tcp -m multiport --dports 7070,8008,8090,8443,20100,44123,49300,49400,49500 --tcp-flags SYN,RST,ACK SYN -j DNAT --to-destination %%ip_serveur_web3
31
   /sbin/iptables -t filter -I ext-dmz -d %%ip_serveur_web3/32 -i eth0 -o eth3 -p tcp -m tcp --tcp-flags SYN,RST,ACK SYN -j ACCEPT
32
   /sbin/iptables -t nat -I POSTROUTING -s %%ip_serveur_web3/32 -o eth0 -j SNAT --to-source %%adresse_ip_eth0
33
%end if
34
##  IP PUB 4 : serveur DISPO
35
%if %%ip_pub4 != ''
36
   /sbin/iptables -t nat -I PREROUTING -d %%ip_pub4/32 -i eth0 -p tcp -m tcp --tcp-flags SYN,RST,ACK SYN -j DNAT --to-destination %%ip_serveur_web4
37
   /sbin/iptables -t nat -I PREROUTING -d %%ip_pub4/32 -i eth0 -p udp -m udp -j DNAT --to-destination %%ip_serveur_web4
38
   /sbin/iptables -t filter -I ext-dmz -d %%ip_serveur_web4/32 -i eth0 -o eth3 -p tcp -m tcp --tcp-flags SYN,RST,ACK SYN -j ACCEPT
39
   /sbin/iptables -t filter -I ext-dmz -d %%ip_serveur_web4/32 -i eth0 -o eth3 -p udp -j ACCEPT
40
   /sbin/iptables -t nat -I POSTROUTING -s %%ip_serveur_web4/32 -o eth0 -j SNAT --to-source %%adresse_ip_eth0
41
%end if
42
##  IP PUB 5 :
43
%if %%ip_pub5 != ''
44
   /sbin/iptables -t nat -I PREROUTING -d %%ip_pub5/32 -i eth0 -p tcp -m tcp -m multiport --dports 20:22,80,81,389,443,636,1723,4129,4200 --tcp-flags SYN,RST,ACK SYN -j DNAT --to-destination %%ip_serveur_web5
45
   /sbin/iptables -t nat -I PREROUTING -d %%ip_pub5/32 -i eth0 -p tcp -m tcp -m multiport --dports 7070,8008,8090,8443,20100,44123,49300,49400,49500 --tcp-flags SYN,RST,ACK SYN -j DNAT --to-destination %%ip_serveur_web5
46
   /sbin/iptables -t filter -I ext-dmz -d %%ip_serveur_web5/32 -i eth0 -o eth3 -p tcp -m tcp --tcp-flags SYN,RST,ACK SYN -j ACCEPT
47
   /sbin/iptables -t nat -I POSTROUTING -s %%ip_serveur_web5/32 -o eth0 -j SNAT --to-source %%adresse_ip_eth0
48
%end if
49
##  IP PUB 6 :
50
%if %%ip_pub6 != ''
51
   /sbin/iptables -t nat -I PREROUTING -d %%ip_pub6/32 -i eth0 -p tcp -m tcp -m multiport --dports 20:22,80,81,389,443,636,1723,4129,4200 --tcp-flags SYN,RST,ACK SYN -j DNAT --to-destination %%ip_serveur_web6
52
   /sbin/iptables -t nat -I PREROUTING -d %%ip_pub6/32 -i eth0 -p tcp -m tcp -m multiport --dports 7070,8008,8090,8443,20100,44123,49300,49400,49500 --tcp-flags SYN,RST,ACK SYN -j DNAT --to-destination %%ip_serveur_web6
53
   /sbin/iptables -t filter -I ext-dmz -d %%ip_serveur_web6/32 -i eth0 -o eth3 -p tcp -m tcp --tcp-flags SYN,RST,ACK SYN -j ACCEPT
54
   /sbin/iptables -t nat -I POSTROUTING -s %%ip_serveur_web6/32 -o eth0 -j SNAT --to-source %%adresse_ip_eth0
55
%end if
56
##  IP PUB 7 :
57
%if %%ip_pub7 != ''
58
   /sbin/iptables -t nat -I PREROUTING -d %%ip_pub7/32 -i eth0 -p tcp -m tcp -m multiport --dports 20:22,25,80,81,110,143,389,443,585,636,995,1723,4129,4200 --tcp-flags SYN,RST,ACK SYN -j DNAT --to-destination %%ip_serveur_web7
59
   /sbin/iptables -t nat -I PREROUTING -d %%ip_pub7/32 -i eth0 -p tcp -m tcp -m multiport --dports 7070,8008,8090,8443,20100,44123,49300,49400,49500 --tcp-flags SYN,RST,ACK SYN -j DNAT --to-destination %%ip_serveur_web7
60
   /sbin/iptables -t filter -I ext-dmz -d %%ip_serveur_web7/32 -i eth0 -o eth3 -p tcp -m tcp --tcp-flags SYN,RST,ACK SYN -j ACCEPT
61
   /sbin/iptables -t nat -I POSTROUTING -s %%ip_serveur_web7/32 -o eth0 -j SNAT --to-source %%adresse_ip_eth0
62
%end if
63
##  IP PUB 8 :
64
%if %%ip_pub8 != ''
65
   /sbin/iptables -t nat -I PREROUTING -d %%ip_pub8/32 -i eth0 -p tcp -m tcp --tcp-flags SYN,RST,ACK SYN -j DNAT --to-destination %%ip_serveur_web8
66
   /sbin/iptables -t nat -I PREROUTING -d %%ip_pub8/32 -i eth0 -p udp -m udp -j DNAT --to-destination %%ip_serveur_web8
67
   /sbin/iptables -t filter -I ext-dmz -d %%ip_serveur_web8/32 -i eth0 -o eth3 -p tcp -m tcp --tcp-flags SYN,RST,ACK SYN -j ACCEPT
68
   /sbin/iptables -t filter -I ext-dmz -d %%ip_serveur_web8/32 -i eth0 -o eth3 -p udp -j ACCEPT
69
   /sbin/iptables -t nat -I POSTROUTING -s %%ip_serveur_web8/32 -o eth0 -j SNAT --to-source %%adresse_ip_eth0
70
%end if
71

    
72
## EXT-BAS: acces au serveur peda depuis le reseau rectorat
73
/sbin/iptables -t nat -I PREROUTING -s 195.83.225.0/24 -d %%adresse_ip_eth0/32 -i eth0 -p tcp -m tcp --dport 44123 --tcp-flags SYN,RST,ACK SYN -j DNAT --to-destination %%ip_serveur_pedago
74
/sbin/iptables -t filter -I ext-ped -s 195.83.225.0/24 -d %%ip_serveur_pedago/32 -i eth0 -p tcp -m state --state NEW -m tcp --dport 44123 --tcp-flags SYN,RST,ACK SYN -j ACCEPT
75

    
76
## EXCEPTIONS au PROXY HTTP et HTTPS
77
## ADMIN : VPN OTP (195.83.226.53), GLPI (195.83.225.232) et HORIZON (172.31.0.0)
78
/sbin/iptables -t nat -I PREROUTING -i eth1 -p tcp -m tcp -m multiport --dports 80,443 --tcp-flags SYN,RST,ACK SYN -d 195.83.226.53/32 -j ACCEPT
79
/sbin/iptables -t nat -I PREROUTING -i eth1 -p tcp -m tcp -m multiport --dports 80,443 --tcp-flags SYN,RST,ACK SYN -d 195.83.225.232/32 -j ACCEPT
80
/sbin/iptables -t nat -I PREROUTING -i eth1 -p tcp -m tcp -m multiport --dports 80,443 --tcp-flags SYN,RST,ACK SYN -d 172.31.0.0/16 -j ACCEPT
81
## PEDA : VPN OTP (195.83.226.53), serveur GLPI (195.83.225.232) et client LEGERS
82
/sbin/iptables -t nat -I PREROUTING -i eth2 -p tcp -m tcp -m multiport --dports 80,443 --tcp-flags SYN,RST,ACK SYN -d 195.83.226.53/32 -j ACCEPT
83
/sbin/iptables -t nat -I PREROUTING -i eth2 -p tcp -m tcp -m multiport --dports 80,443 --tcp-flags SYN,RST,ACK SYN -d 195.83.225.232/32 -j ACCEPT
84
/sbin/iptables -t nat -I PREROUTING -i eth2 -p tcp -m tcp -m multiport --dports 80,443 --tcp-flags SYN,RST,ACK SYN -d 172.23.0.0/16 -j ACCEPT
85
## DMZ : pas de proxy pour domaine ac-montpellier (SSO pronote ENT)
86
/sbin/iptables -t nat -I PREROUTING -i eth3 -p tcp -m tcp -m multiport --dports 80,443 --tcp-flags SYN,RST,ACK SYN -d 195.83.225.0/24 -j ACCEPT
87

    
88
## SNAT en IP eth2 de la zone pedago etendu si destination zone client leger (inventaire GLPI REGION) pour port 80 et 62354
89
/sbin/iptables -t filter -I ped-ext -s %%adresse_network_eth2/%%adresse_netmask_eth2 -d 172.23.0.0/18 -i eth2 -o eth0 -p tcp -m tcp --dport 62354 --tcp-flags SYN,RST,ACK SYN -j ACCEPT
90
/sbin/iptables -t nat -I POSTROUTING -s %%adresse_network_eth2/%%adresse_netmask_eth2 -d 172.23.0.0/18 -o eth0 -p tcp -m tcp --dport 62354 --tcp-flags SYN,RST,ACK SYN -j SNAT --to-source %%adresse_ip_eth2
91
/sbin/iptables -t filter -I ped-ext -s %%adresse_network_eth2/%%adresse_netmask_eth2 -d 172.23.0.0/18 -i eth2 -o eth0 -p tcp -m tcp --dport 80 --tcp-flags SYN,RST,ACK SYN -j ACCEPT
92
/sbin/iptables -t nat -I POSTROUTING -s %%adresse_network_eth2/%%adresse_netmask_eth2 -d 172.23.0.0/18 -o eth0 -p tcp -m tcp --dport 80 --tcp-flags SYN,RST,ACK SYN -j SNAT --to-source %%adresse_ip_eth2
93

    
94
## EDUTICE
95
%if %%numero_etab in ('0300006u','0300013b','0300016e','0300020j','0300024n','0300031w','0300033y','0300036b','0300037c','0300039e','0300043j','0300059b','0300929X','0301012m','0301094b','0301098f','0301208a','0301209b','0301213f','0301232b','0301246s','0301325c','0301747l','0301827y')
96
## les serveurs edutice peuvent sortir pour faire telemaintenance vers l'exterieur
97
/sbin/iptables -t nat -I POSTROUTING -s %%ip_serveur_pedago2/32 -d 91.121.175.129/32 -o eth0 -p udp -m udp --dport 1194 -j SNAT --to-source %%adresse_ip_eth0
98
/sbin/iptables -t nat -I POSTROUTING -s %%ip_serveur_antivirus/32 -d 91.121.175.129/32 -o eth0 -p udp -m udp --dport 1194 -j SNAT --to-source %%adresse_ip_eth0
99
/sbin/iptables -t filter -I ped-ext -s %%ip_serveur_antivirus/32 -d 91.121.175.129/32 -i eth2 -o eth0 -p udp -m udp --dport 1194 -j ACCEPT
100
/sbin/iptables -t filter -I ped-ext -s %%ip_serveur_pedago2/32 -d 91.121.175.129/32 -i eth2 -o eth0 -p udp -m udp --dport 1194 -j ACCEPT
101
## autoriser l'exterieur a faire du 8099 sur ip eth0 et renvoyer vers serveur pedago
102
/sbin/iptables -t nat -I PREROUTING -d %%adresse_ip_eth0/32 -i eth0 -p tcp -m tcp --dport 8099 --tcp-flags SYN,RST,ACK SYN -j DNAT --to-destination %%ip_serveur_pedago2:8080
103
/sbin/iptables -t filter -I ext-bas -d %%adresse_ip_eth0/32 -i eth0 -p tcp -m state --state NEW -m tcp --dport 8099 --tcp-flags SYN,RST,ACK SYN -j ACCEPT
104
%end if
105

    
106
## acces CD34 au MDM tablettes via serveur PEDA
107
%if %%numero_etab in ('0340109j','0340955d','0341366a','0342326u')
108
/sbin/iptables -t nat -I PREROUTING -s 212.51.190.239/32 -d %%adresse_ip_eth0/32 -i eth0 -p tcp -m tcp --dport 44123 --tcp-flags SYN,RST,ACK SYN -j DNAT --to-destination %%ip_serveur_pedago
109
/sbin/iptables -t filter -I ext-ped -s 212.51.190.239/32 -d %%ip_serveur_pedago/32 -i eth0 -p tcp -m state --state NEW -m tcp --dport 44123 --tcp-flags SYN,RST,ACK SYN -j ACCEPT
110
%end if
111

    
112
## pour NTOP
113
/sbin/iptables -t filter -I adm-bas -m state --state NEW -p tcp --dport 3000 --tcp-flags SYN,RST,ACK SYN -i eth1 -s %%adresse_network_eth1/%%adresse_netmask_eth2 -j ACCEPT
114
/sbin/iptables -t filter -I ped-bas -m state --state NEW -p tcp --dport 3000 --tcp-flags SYN,RST,ACK SYN -i eth2 -s %%adresse_network_eth2/30 -j ACCEPT
115
/sbin/iptables -t filter -I ext-bas -m state --state NEW -p tcp --dport 3000 --tcp-flags SYN,RST,ACK SYN -i eth0 -s 195.83.225.0/255.255.255.0 -j ACCEPT
116

    
117
## Pour shinken
118
/sbin/iptables -t filter -I ext-bas -m state --state NEW -p tcp --dport 6556 --tcp-flags SYN,RST,ACK SYN -i eth0 -s 195.83.225.0/255.255.255.0 -j ACCEPT
119

    
120
## Specificite 0340042L - Lyc Mermoz MPL - plusieurs sous-reseaux
121
%if %%numero_etab == '0340042l'
122
/sbin/iptables -t nat -A POSTROUTING -s %%adresse_network_eth2/%%adresse_netmask_eth2 -o eth0 -p tcp -m tcp --tcp-flags SYN,RST,ACK SYN -j SNAT --to-source %%adresse_ip_eth0
123
%end if
124

    
125
## Specificite 0340076Y - Lyc Curie Sete - port 14000 utilise par client PRONOTE
126
%if %%numero_etab == '0340076y'
127
/sbin/iptables -t nat -I PREROUTING -d %%ip_pub2/32 -i eth0 -p tcp -m tcp --dport 14000 --tcp-flags SYN,RST,ACK SYN -j DNAT --to-destination %%ip_serveur_web2
128
%end if
129

    
130
## Specificite  utilise par PISA 2018
131
%if %%numero_etab  in ('0340002t','0660028x','0660030z')
132
/sbin/iptables -t nat -I PREROUTING -d 54.93.92.194 -j ACCEPT
133
%end if
134

    
135
## Regle pour starleaf BREEZE
136
## Pour admin
137
/sbin/iptables -t nat -I PREROUTING -i eth1 -p tcp -m tcp -m multiport --dports 80,443 --tcp-flags SYN,RST,ACK SYN -d 89.202.39.91/32 -j ACCEPT
138
/sbin/iptables -t nat -I PREROUTING -i eth1 -p tcp -m tcp -m multiport --dports 80,443 --tcp-flags SYN,RST,ACK SYN -d 80.231.134.47/32 -j ACCEPT
139
/sbin/iptables -t nat -I PREROUTING -i eth1 -p tcp -m tcp -m multiport --dports 80,443 --tcp-flags SYN,RST,ACK SYN -d 72.28.118.203/32 -j ACCEPT
140
## pour pedago
141
/sbin/iptables -t nat -I PREROUTING -i eth2 -p tcp -m tcp -m multiport --dports 80,443 --tcp-flags SYN,RST,ACK SYN -d 89.202.39.91/32 -j ACCEPT
142
/sbin/iptables -t nat -I PREROUTING -i eth2 -p tcp -m tcp -m multiport --dports 80,443 --tcp-flags SYN,RST,ACK SYN -d 80.231.134.47/32 -j ACCEPT
143
/sbin/iptables -t nat -I PREROUTING -i eth2 -p tcp -m tcp -m multiport --dports 80,443 --tcp-flags SYN,RST,ACK SYN -d 72.28.118.203/32 -j ACCEPT
144

    
145
## Plages horaires pour WIFI LORDI
146
%if %%plage_wifi == 'oui' and %%plage_wifi_debut != '' and %%plage_wifi_fin != '' and %%nom_zone_eth4 != '' and %%vlan_id_eth4[0] != ''
147
   /sbin/iptables -I INPUT -i %%nom_zone_eth4.%%vlan_id_eth4[0] -m time --timestop %%plage_wifi_debut --timestart %%plage_wifi_fin --kerneltz -j DROP
148
%end if
149
    </include>
150
    <services>
151
        <service id="11" libelle="service 8500" name="8500" ports="8500" protocol="tcp" tcpwrapper="" />
152
        <service id="46" libelle="Acces web aux agents Zéphir" name="agents_zephir" ports="8090" protocol="tcp" tcpwrapper="" />
153
        <service id="6" libelle="serveur de noms" name="dns-tcp" ports="53" protocol="tcp" tcpwrapper="" />
154
        <service id="7" libelle="serveur de noms" name="dns-udp" ports="53" protocol="udp" tcpwrapper="" />
155
        <service id="36" libelle="ead" name="ead" ports="4200" protocol="tcp" tcpwrapper="" />
156
        <service id="73" libelle="port EAD du Scribe avec reverse proxy" name="ead-scribe" ports="%%revprox_ead_port" protocol="tcp" tcpwrapper="" />
157
        <service id="echo-reply" libelle="règle icmp echo-reply" name="echo-reply" ports="0" protocol="ICMP" tcpwrapper="" />
158
        <service id="echo-request" libelle="règle icmp echo-request" name="echo-request" ports="0" protocol="ICMP" tcpwrapper="" />
159
        <service id="45" libelle="Service Eole SSO" name="eole-sso" ports="%%eolesso_port" protocol="tcp" tcpwrapper="" />
160
        <service id="79" libelle="Redirection du service EoleSSO" name="revprox-sso" ports="8443" protocol="tcp" tcpwrapper="" />
161
        <service id="51" libelle="protocole pour ipsec" name="esp" ports="0" protocol="esp" tcpwrapper="" />
162
        <service id="78" libelle="transfert de fichiers sur le port 21" name="ftp" ports="21" protocol="tcp" tcpwrapper="" />
163
        <service id="26" libelle="transfert de fichiers" name="ftp-tcp" ports="20-21" protocol="tcp" tcpwrapper="" />
164
        <service id="29" libelle="service ftps" name="ftps" ports="989-990" protocol="tcp" tcpwrapper="" />
165
        <service id="3" libelle="serveur web" name="http" ports="80" protocol="tcp" tcpwrapper="" />
166
        <service id="5" libelle="serveur web sécurisé" name="https" ports="443" protocol="tcp" tcpwrapper="" />
167
        <service id="21" libelle="service imap" name="imap" ports="143" protocol="tcp" tcpwrapper="" />
168
        <service id="23" libelle="service imap4-ssl" name="imap4-ssl" ports="993" protocol="tcp" tcpwrapper="" />
169
        <service id="15" libelle="service irc" name="irc" ports="194" protocol="tcp" tcpwrapper="" />
170
        <service id="16" libelle="service ircs" name="ircs" ports="994" protocol="tcp" tcpwrapper="" />
171
        <service id="13" libelle="service ircu" name="ircu" ports="6665-6669" protocol="tcp" tcpwrapper="" />
172
        <service id="53" libelle="protocole pour ipsec" name="isakmp_4500" ports="4500" protocol="udp" tcpwrapper="" />
173
        <service id="52" libelle="protocol pour ipsec" name="isakmp_500" ports="500" protocol="udp" tcpwrapper="" />
174
        <service id="22" libelle="service d'annuaire" name="ldap" ports="389" protocol="tcp" tcpwrapper="slapd" />
175
        <service id="24" libelle="service ldaps" name="ldaps" ports="636" protocol="tcp" tcpwrapper="slapd" />
176
        <service id="54" libelle="port d'accès &#224; l'application lightsquid" name="lightsquid" ports="%%lightsquid_port" protocol="tcp" tcpwrapper="" />
177
        <service id="72" libelle="ltspfsd" name="ltspfsd" ports="9220" protocol="tcp" tcpwrapper="" />
178
        <service id="15" libelle="service mdqs" name="mdqs" ports="666" protocol="tcp" tcpwrapper="" />
179
        <service id="17" libelle="service msnp" name="msnp" ports="1863" protocol="tcp" tcpwrapper="" />
180
        <service id="71" libelle="nbd-client" name="nbd-client" ports="2000" protocol="tcp" tcpwrapper="" />
181
        <service id="32" libelle="nouvelles" name="news" ports="2009" protocol="tcp" tcpwrapper="" />
182
        <service id="30" libelle="service nntp" name="nntp" ports="119" protocol="tcp" tcpwrapper="" />
183
        <service id="31" libelle="service nntps" name="nntps" ports="563" protocol="tcp" tcpwrapper="" />
184
        <service id="43" libelle="Serveur d'authentification NuFw" name="nuauth" ports="4129" protocol="tcp" tcpwrapper="" />
185
        <service id="28" libelle="service pftp" name="pftp" ports="662" protocol="tcp" tcpwrapper="" />
186
        <service id="20" libelle="service pop" name="pop" ports="110" protocol="tcp" tcpwrapper="" />
187
        <service id="25" libelle="service pop3s" name="pop3s" ports="995" protocol="tcp" tcpwrapper="" />
188
        <service id="60" libelle="" name="portmap" ports="111" protocol="tcp" tcpwrapper="" />
189
        <service id="61" libelle="" name="lockd" ports="4005" protocol="tcp" tcpwrapper="" />
190
        <service id="62" libelle="" name="mountd" ports="4003" protocol="tcp" tcpwrapper="" />
191
        <service id="48" libelle="administration posh" name="posh-admin" ports="7070" protocol="tcp" tcpwrapper="" />
192
        <service id="4" libelle="service proxy" name="proxy" ports="3128" protocol="tcp" tcpwrapper="" />
193
        <service id="12" libelle="proxy" name="proxy-8080" ports="8080" protocol="tcp" tcpwrapper="" />
194
        <service id="70" libelle="pulseaudio" name="pulseaudio" ports="16001" protocol="tcp" tcpwrapper="" />
195
        <service id="64" libelle="protocole RELP pour rsyslog" name="rsyslog_RELP" ports="20514" protocol="tcp" tcpwrapper="" />
196
        <service id="65" libelle="protocole TCP pour rsyslog" name="rsyslog_TCP" ports="10514" protocol="tcp" tcpwrapper="" />
197
        <service id="66" libelle="protocole UDP pour rsyslog" name="rsyslog_UDP" ports="514" protocol="udp" tcpwrapper="" />
198
        <service id="38" libelle="samba tcp" name="samba-tcp" ports="137-139" protocol="tcp" tcpwrapper="" />
199
        <service id="37" libelle="samba" name="samba-udp" ports="137-139" protocol="udp" tcpwrapper="" />
200
        <service id="39" libelle="samba3" name="samba3" ports="445" protocol="tcp" tcpwrapper="" />
201
        <service id="45" libelle="" name="scribe-controlevnc" ports="8789-8790" protocol="tcp" tcpwrapper="" />
202
        <service id="36" libelle="service scribe sur les clients" name="scribe-service" ports="8788" protocol="tcp" tcpwrapper="" />
203
        <service id="40" libelle="vnc 5800" name="scribe_vnc1" ports="5800" protocol="tcp" tcpwrapper="" />
204
        <service id="41" libelle="vnc 5900" name="scribe_vnc2" ports="5900" protocol="tcp" tcpwrapper="" />
205
        <service id="59" libelle="Serveur NFS" name="serveur_nfs" ports="2049" protocol="tcp" tcpwrapper="" />
206
        <service id="27" libelle="service sftp" name="sftp" ports="115" protocol="tcp" tcpwrapper="" />
207
        <service id="19" libelle="service mail" name="smtp" ports="25" protocol="tcp" tcpwrapper="" />
208
        <service id="77" libelle="Service SMTP SSL" name="smtps" ports="465" protocol="tcp" tcpwrapper="" />
209
        <service id="8" libelle="shell sécrurisé" name="ssh" ports="22" protocol="tcp" tcpwrapper="sshd" />
210
        <service id="58" libelle="serveur sympa internet" name="sympa-internet" ports="8787" protocol="tcp" tcpwrapper="" />
211
        <service id="57" libelle="sympa domaine restreint" name="sympa-restreint" ports="8888" protocol="tcp" tcpwrapper="" />
212
        <service id="18" libelle="service talk" name="talk" ports="517-518" protocol="tcp" tcpwrapper="" />
213
        <service id="33" libelle="tous les ports en tcp" name="tcp" ports="0-65535" protocol="tcp" tcpwrapper="" />
214
        <service id="tout" libelle="tous les services" name="tous" ports="0" protocol="TOUT" tcpwrapper="" />
215
        <service id="34" libelle="tous les ports en udp" name="udp" ports="0-65535" protocol="udp" tcpwrapper="" />
216
        <service id="9" libelle="appliquation web d'administration" name="webmin" ports="10000" protocol="tcp" tcpwrapper="" />
217
        <service id="55" libelle="port 2eme instance de squid" name="proxy2" ports="%%proxy2_port" protocol="tcp" tcpwrapper="" />
218
        <service id="56" libelle="serveur de temps" name="ntp" ports="123" protocol="udp" tcpwrapper="" />
219
        <service id="63" libelle="Serveur jabber (XMPP)" name="xmpp" ports="5222" protocol="tcp" tcpwrapper="" />
220
        <service id="81" libelle="Serveur jabber SSL (XMPP)" name="xmpp-ssl" ports="5223" protocol="tcp" tcpwrapper="" />
221
        <service id="67" libelle="Proxy Cntlm" name="cntlm" ports="%%cntlm_port" protocol="tcp" tcpwrapper="" />
222
        <service id="68" libelle="Accès &#224; gen_config depuis l'extérieur en https" name="gen_config" ports="7000" protocol="tcp" tcpwrapper="" />
223
        <service id="70" libelle="" name="radius" ports="1812" protocol="udp" tcpwrapper="" />
224
        <service id="74" libelle="" name="radius-acct" ports="1813" protocol="udp" tcpwrapper="" />
225
        <service id="75" libelle="Accès aux serveurs TFTP" name="tftpd-hpa" ports="69" protocol="udp" tcpwrapper="in.tftpd" />
226
        <service id="76" libelle="Interface CUPS" name="cups" ports="631" protocol="tcp" tcpwrapper="" />
227
        <service id="82" libelle="Service d'impression Raw" name="raw" ports="9100" protocol="tcp" tcpwrapper="" />
228
        <service id="80" libelle="Accès &#224; l'outil Gaspacho" name="gaspacho" ports="8080" protocol="tcp" tcpwrapper="" />
229
        <groupe id="admin_amon" libelle="Port autorise pour l'administration distante d'Amon (ssh, ead, agents zephir)">
230
            <service id="46" libelle="Acces web aux agents Zéphir" name="agents_zephir" ports="8090" protocol="tcp" tcpwrapper="" />
231
            <service id="36" libelle="ead" name="ead" ports="4200" protocol="tcp" tcpwrapper="" />
232
            <service id="54" libelle="port d'accès &#224; l'application lightsquid" name="lightsquid" ports="%%lightsquid_port" protocol="tcp" tcpwrapper="" />
233
            <service id="echo-request" libelle="règle icmp echo-request" name="echo-request" ports="0" protocol="ICMP" tcpwrapper="" />
234
        </groupe>
235
        <groupe id="dns" libelle="dns tcp et udp">
236
            <service id="7" libelle="serveur de noms" name="dns-udp" ports="53" protocol="udp" tcpwrapper="" />
237
            <service id="6" libelle="serveur de noms" name="dns-tcp" ports="53" protocol="tcp" tcpwrapper="" />
238
        </groupe>
239
        <groupe id="eclair-dmz" libelle="Eclair en DMZ">
240
            <service id="72" libelle="ltspfsd" name="ltspfsd" ports="9220" protocol="tcp" tcpwrapper="" />
241
            <service id="71" libelle="nbd-client" name="nbd-client" ports="2000" protocol="tcp" tcpwrapper="" />
242
            <service id="70" libelle="pulseaudio" name="pulseaudio" ports="16001" protocol="tcp" tcpwrapper="" />
243
            <service id="41" libelle="vnc 5900" name="scribe_vnc2" ports="5900" protocol="tcp" tcpwrapper="" />
244
        </groupe>
245
        <groupe id="gr_forum" libelle="interdire l'utilisation des forums">
246
            <service id="30" libelle="service nntp" name="nntp" ports="119" protocol="tcp" tcpwrapper="" />
247
            <service id="31" libelle="service nntps" name="nntps" ports="563" protocol="tcp" tcpwrapper="" />
248
            <service id="32" libelle="nouvelles" name="news" ports="2009" protocol="tcp" tcpwrapper="" />
249
        </groupe>
250
        <groupe id="gr_ftp" libelle="">
251
            <service id="26" libelle="transfert de fichiers" name="ftp-tcp" ports="20-21" protocol="tcp" tcpwrapper="" />
252
            <service id="29" libelle="service ftps" name="ftps" ports="989-990" protocol="tcp" tcpwrapper="" />
253
            <service id="28" libelle="service pftp" name="pftp" ports="662" protocol="tcp" tcpwrapper="" />
254
            <service id="27" libelle="service sftp" name="sftp" ports="115" protocol="tcp" tcpwrapper="" />
255
        </groupe>
256
        <groupe id="gr_irc" libelle="interdire l'utilisation des dialogues en direct (icq)">
257
            <service id="18" libelle="service talk" name="talk" ports="517-518" protocol="tcp" tcpwrapper="" />
258
            <service id="17" libelle="service msnp" name="msnp" ports="1863" protocol="tcp" tcpwrapper="" />
259
            <service id="15" libelle="service mdqs" name="mdqs" ports="666" protocol="tcp" tcpwrapper="" />
260
            <service id="16" libelle="service ircs" name="ircs" ports="994" protocol="tcp" tcpwrapper="" />
261
            <service id="15" libelle="service irc" name="irc" ports="194" protocol="tcp" tcpwrapper="" />
262
            <service id="13" libelle="service ircu" name="ircu" ports="6665-6669" protocol="tcp" tcpwrapper="" />
263
        </groupe>
264
        <groupe id="gr_messagerie" libelle="interdire l'utilisation des dialogues en direct (icq)">
265
            <service id="21" libelle="service imap" name="imap" ports="143" protocol="tcp" tcpwrapper="" />
266
            <service id="23" libelle="service imap4-ssl" name="imap4-ssl" ports="993" protocol="tcp" tcpwrapper="" />
267
            <service id="22" libelle="service d'annuaire" name="ldap" ports="389" protocol="tcp" tcpwrapper="slapd" />
268
            <service id="24" libelle="service ldaps" name="ldaps" ports="636" protocol="tcp" tcpwrapper="slapd" />
269
            <service id="20" libelle="service pop" name="pop" ports="110" protocol="tcp" tcpwrapper="" />
270
            <service id="25" libelle="service pop3s" name="pop3s" ports="995" protocol="tcp" tcpwrapper="" />
271
            <service id="19" libelle="service mail" name="smtp" ports="25" protocol="tcp" tcpwrapper="" />
272
            <service id="77" libelle="Service SMTP SSL" name="smtps" ports="465" protocol="tcp" tcpwrapper="" />
273
        </groupe>
274
        <groupe id="gr_smtp" libelle="smtp et smtps">
275
            <service id="19" libelle="service mail" name="smtp" ports="25" protocol="tcp" tcpwrapper="" />
276
            <service id="77" libelle="Service SMTP SSL" name="smtps" ports="465" protocol="tcp" tcpwrapper="" />
277
        </groupe>
278
        <groupe id="gr_pop" libelle="pop3 et pop3s">
279
            <service id="20" libelle="service pop" name="pop" ports="110" protocol="tcp" tcpwrapper="" />
280
            <service id="25" libelle="service pop3s" name="pop3s" ports="995" protocol="tcp" tcpwrapper="" />
281
        </groupe>
282
        <groupe id="gr_imap" libelle="imap et imap-ssl">
283
            <service id="21" libelle="service imap" name="imap" ports="143" protocol="tcp" tcpwrapper="" />
284
            <service id="23" libelle="service imap4-ssl" name="imap4-ssl" ports="993" protocol="tcp" tcpwrapper="" />
285
        </groupe>
286
        <groupe id="gr_redirection" libelle="Protocoles a rediriger vers le proxy">
287
            <service id="3" libelle="serveur web" name="http" ports="80" protocol="tcp" tcpwrapper="" />
288
            <service id="4" libelle="service proxy" name="proxy" ports="3128" protocol="tcp" tcpwrapper="" />
289
            <service id="12" libelle="proxy" name="proxy-8080" ports="8080" protocol="tcp" tcpwrapper="" />
290
            <service id="5" libelle="serveur web sécurisé" name="https" ports="443" protocol="tcp" tcpwrapper="" />
291
        </groupe>
292
        <groupe id="gr_redirection_proxy" libelle="Protocoles proxy a rediriger vers le proxy">
293
            <service id="4" libelle="service proxy" name="proxy" ports="3128" protocol="tcp" tcpwrapper="" />
294
            <service id="12" libelle="proxy" name="proxy-8080" ports="8080" protocol="tcp" tcpwrapper="" />
295
        </groupe>
296
        <groupe id="gr_redirection_http" libelle="Protocoles http a rediriger vers le proxy">
297
            <service id="3" libelle="serveur web" name="http" ports="80" protocol="tcp" tcpwrapper="" />
298
            <service id="4" libelle="service proxy" name="proxy" ports="3128" protocol="tcp" tcpwrapper="" />
299
            <service id="12" libelle="proxy" name="proxy-8080" ports="8080" protocol="tcp" tcpwrapper="" />
300
        </groupe>
301
        <groupe id="gr_redirection_https" libelle="Https a redifiger vers le proxy">
302
            <service id="5" libelle="serveur web sécurisé" name="https" ports="443" protocol="tcp" tcpwrapper="" />
303
        </groupe>
304
        <groupe id="gr_restreint" libelle="on ferme tout sauf l'utilisation du web par le proxy">
305
            <service id="33" libelle="tous les ports en tcp" name="tcp" ports="0-65535" protocol="tcp" tcpwrapper="" />
306
            <service id="34" libelle="tous les ports en udp" name="udp" ports="0-65535" protocol="udp" tcpwrapper="" />
307
        </groupe>
308
        <groupe id="ipsec" libelle="Services utilises pas ipsec">
309
            <service id="51" libelle="protocole pour ipsec" name="esp" ports="0" protocol="esp" tcpwrapper="" />
310
            <service id="53" libelle="protocole pour ipsec" name="isakmp_4500" ports="4500" protocol="udp" tcpwrapper="" />
311
            <service id="52" libelle="protocol pour ipsec" name="isakmp_500" ports="500" protocol="udp" tcpwrapper="" />
312
        </groupe>
313
        <groupe id="nfs" libelle="Serveur NFS + portmap">
314
            <service id="60" libelle="" name="portmap" ports="111" protocol="tcp" tcpwrapper="" />
315
            <service id="61" libelle="" name="lockd" ports="4005" protocol="tcp" tcpwrapper="" />
316
            <service id="62" libelle="" name="mountd" ports="4003" protocol="tcp" tcpwrapper="" />
317
            <service id="59" libelle="Serveur NFS" name="serveur_nfs" ports="2049" protocol="tcp" tcpwrapper="" />
318
        </groupe>
319
        <groupe id="samba" libelle="samba proto">
320
            <service id="37" libelle="samba" name="samba-udp" ports="137-139" protocol="udp" tcpwrapper="" />
321
            <service id="38" libelle="samba tcp" name="samba-tcp" ports="137-139" protocol="tcp" tcpwrapper="" />
322
            <service id="39" libelle="samba3" name="samba3" ports="445" protocol="tcp" tcpwrapper="" />
323
        </groupe>
324
        <groupe id="scribe-dmz-pedago" libelle="service Scribe DMZ vers pedago">
325
            <service id="38" libelle="samba tcp" name="samba-tcp" ports="137-139" protocol="tcp" tcpwrapper="" />
326
            <service id="37" libelle="samba" name="samba-udp" ports="137-139" protocol="udp" tcpwrapper="" />
327
            <service id="39" libelle="samba3" name="samba3" ports="445" protocol="tcp" tcpwrapper="" />
328
            <service id="36" libelle="service scribe sur les clients" name="scribe-service" ports="8788" protocol="tcp" tcpwrapper="" />
329
            <service id="40" libelle="vnc 5800" name="scribe_vnc1" ports="5800" protocol="tcp" tcpwrapper="" />
330
            <service id="41" libelle="vnc 5900" name="scribe_vnc2" ports="5900" protocol="tcp" tcpwrapper="" />
331
            <service id="76" libelle="Interface CUPS" name="cups" ports="631" protocol="tcp" tcpwrapper="" />
332
            <service id="82" libelle="Service d'impression Raw" name="raw" ports="9100" protocol="tcp" tcpwrapper="" />
333
        </groupe>
334
        <groupe id="scribe-pedago-dmz" libelle="client scribe vers la DMZ">
335
            <service id="22" libelle="service d'annuaire" name="ldap" ports="389" protocol="tcp" tcpwrapper="slapd" />
336
            <service id="24" libelle="service ldaps" name="ldaps" ports="636" protocol="tcp" tcpwrapper="slapd" />
337
            <service id="38" libelle="samba tcp" name="samba-tcp" ports="137-139" protocol="tcp" tcpwrapper="" />
338
            <service id="37" libelle="samba" name="samba-udp" ports="137-139" protocol="udp" tcpwrapper="" />
339
            <service id="39" libelle="samba3" name="samba3" ports="445" protocol="tcp" tcpwrapper="" />
340
            <service id="45" libelle="" name="scribe-controlevnc" ports="8789-8790" protocol="tcp" tcpwrapper="" />
341
            <service id="40" libelle="vnc 5800" name="scribe_vnc1" ports="5800" protocol="tcp" tcpwrapper="" />
342
            <service id="41" libelle="vnc 5900" name="scribe_vnc2" ports="5900" protocol="tcp" tcpwrapper="" />
343
        </groupe>
344
        <groupe id="scribe-posh" libelle="Ouverture des ports pour l'utilisation de nginx pour Posh">
345
            <service id="3" libelle="serveur web" name="http" ports="80" protocol="tcp" tcpwrapper="" />
346
            <service id="5" libelle="serveur web sécurisé" name="https" ports="443" protocol="tcp" tcpwrapper="" />
347
            <service id="48" libelle="administration posh" name="posh-admin" ports="7070" protocol="tcp" tcpwrapper="" />
348
        </groupe>
349
        <groupe id="scribe_ext" libelle="services extranet scribe ">
350
            <service id="26" libelle="transfert de fichiers" name="ftp-tcp" ports="20-21" protocol="tcp" tcpwrapper="" />
351
            <service id="5" libelle="serveur web sécurisé" name="https" ports="443" protocol="tcp" tcpwrapper="" />
352
        </groupe>
353
        <groupe id="sympa" libelle="serveur sympa">
354
            <service id="58" libelle="serveur sympa internet" name="sympa-internet" ports="8787" protocol="tcp" tcpwrapper="" />
355
            <service id="57" libelle="sympa domaine restreint" name="sympa-restreint" ports="8888" protocol="tcp" tcpwrapper="" />
356
        </groupe>
357
        <groupe id="vnc" libelle="vnc">
358
            <service id="40" libelle="vnc 5800" name="scribe_vnc1" ports="5800" protocol="tcp" tcpwrapper="" />
359
            <service id="41" libelle="vnc 5900" name="scribe_vnc2" ports="5900" protocol="tcp" tcpwrapper="" />
360
        </groupe>
361
        <groupe id="gr_radius" libelle="Serveur radius (UDP)">
362
            <service id="70" libelle="" name="radius" ports="1812" protocol="udp" tcpwrapper="" />
363
            <service id="74" libelle="" name="radius-acct" ports="1813" protocol="udp" tcpwrapper="" />
364
        </groupe>
365
    </services><extremites>
366
        <extremite container="" interface="" libelle="Zone entière" name="exterieur" netmask="%%adresse_netmask_eth0" subnet="1" type="" zone="exterieur">
367
            <ip address="%%adresse_ip_eth0" />
368
        </extremite>
369
        <extremite container="" interface="" libelle="zone restreinte" name="exterieur_restreint" netmask="%%adresse_netmask_eth0" subnet="1" type="" zone="exterieur">
370
            <ip address="%%adresse_network_eth0" />
371
        </extremite>
372
        <extremite container="" interface="" libelle="reseau autorise a se connecter a ssh" name="exterieur_ssh" netmask="%%netmask_ssh_eth0" subnet="1" type="" zone="exterieur">
373
            <ip address="%%ip_ssh_eth0" />
374
        </extremite>
375
        <extremite container="" interface="" libelle="Zone entière" name="bastion" netmask="255.255.255.255" subnet="1" type="" zone="bastion">
376
            <ip address="127.0.0.1" />
377
        </extremite>
378
        <extremite container="" interface="eth0" libelle="Bastion sur la zone exterieur" name="bastion_exterieur" netmask="255.255.255.255" subnet="0" type="normal" zone="bastion">
379
            <ip address="%%adresse_ip_eth0" />
380
        </extremite>
381
        <extremite container="" interface="" libelle="reseau autorise a administrer depuis l'exterieur" name="exterieur_admin" netmask="%%netmask_admin_eth0" subnet="1" type="" zone="exterieur">
382
            <ip address="%%ip_admin_eth0" />
383
        </extremite>
384
        <extremite container="" interface="" libelle="IP de bastion sur la zone exterieur" name="exterieur_bastion" netmask="255.255.255.255" subnet="0" type="" zone="exterieur">
385
            <ip address="%%adresse_ip_eth0" />
386
        </extremite>
387
        <extremite container="internet" interface="containers" libelle="conteneur internet" name="internet" netmask="255.255.255.255" subnet="0" type="conteneur" zone="bastion">
388
            <ip address="%%container_ip_internet" />
389
        </extremite>
390
    <extremite container="" interface="" libelle="adresse du bastion sur le reseau admin" name="admin_bastion" netmask="255.255.255.255" subnet="0" type="" zone="exterieur">
391
            <ip address="%%adresse_ip_eth1" />
392
        </extremite>
393
        <extremite container="" interface="" libelle="zone restreinte" name="admin_restreint" netmask="%%adresse_netmask_eth1" subnet="1" type="" zone="admin">
394
            <ip address="%%adresse_network_eth1" />
395
        </extremite>
396
        <extremite container="" interface="" libelle="reseau autorise a se connecter a ssh depuis le reseau administratif" name="admin_ssh" netmask="%%netmask_ssh_eth1" subnet="1" type="" zone="admin">
397
            <ip address="%%ip_ssh_eth1" />
398
        </extremite>
399
        <extremite container="" interface="" libelle="Zone entière" name="admin" netmask="%%adresse_netmask_eth1" subnet="1" type="" zone="admin">
400
            <ip address="%%adresse_ip_eth1" />
401
        </extremite>
402
        <extremite container="" interface="" libelle="reseau autorise a administrer depuis le reseau administratif" name="admin_admin" netmask="%%netmask_admin_eth1" subnet="1" type="" zone="admin">
403
            <ip address="%%ip_admin_eth1" />
404
        </extremite>
405
        <extremite container="internet" interface="eth1" libelle="eth1 dans le conteneur internet" name="internet_eth1" netmask="255.255.255.255" subnet="0" type="conteneur" zone="bastion">
406
            <ip address="%%adresse_ip_eth1_proxy_link" />
407
        </extremite>
408
    <extremite container="" interface="" libelle="reseau autorise a se connecter a ssh depuis le reseau pedagogique" name="pedago_ssh" netmask="%%netmask_ssh_eth2" subnet="1" type="" zone="pedago">
409
            <ip address="%%ip_ssh_eth2" />
410
        </extremite>
411
        <extremite container="" interface="" libelle="" name="pedago_bastion" netmask="255.255.255.255" subnet="0" type="" zone="exterieur">
412
            <ip address="%%adresse_ip_eth2" />
413
        </extremite>
414
        <extremite container="" interface="" libelle="zone restreinte" name="pedago_restreint" netmask="%%adresse_netmask_eth2" subnet="1" type="" zone="pedago">
415
            <ip address="%%adresse_network_eth2" />
416
        </extremite>
417
        <extremite container="" interface="" libelle="Zone entière" name="pedago" netmask="%%adresse_netmask_eth2" subnet="1" type="" zone="pedago">
418
            <ip address="%%adresse_ip_eth2" />
419
        </extremite>
420
        <extremite container="" interface="" libelle="reseau autorise a administrer depuis le reseau pedagogique" name="pedago_admin" netmask="%%netmask_admin_eth2" subnet="1" type="" zone="pedago">
421
            <ip address="%%ip_admin_eth2" />
422
        </extremite>
423
        <extremite container="internet" interface="eth2" libelle="eth2 dans le conteneur internet" name="internet_eth2" netmask="255.255.255.255" subnet="0" type="conteneur" zone="bastion">
424
            <ip address="%%adresse_ip_eth2_proxy_link" />
425
        </extremite>
426
    <extremite container="" interface="" libelle="clients de l'agrégateur de logs en udp" name="clients_udp_rsyslog" netmask="%%netmask_client_logs_udp" subnet="0" type="" zone="exterieur">
427
            <ip address="%%adresses_ip_clients_logs_udp" />
428
        </extremite>
429
        <extremite container="" interface="" libelle="clients de l'agrégateur de logs en tcp" name="clients_tcp_rsyslog" netmask="%%netmask_client_logs_tcp" subnet="0" type="" zone="exterieur">
430
            <ip address="%%adresses_ip_clients_logs_tcp" />
431
        </extremite>
432
        <extremite container="" interface="" libelle="clients de l'agrégateur de logs en relp" name="clients_relp_rsyslog" netmask="%%netmask_client_logs_relp" subnet="0" type="" zone="exterieur">
433
            <ip address="%%adresses_ip_clients_logs_relp" />
434
        </extremite>
435
    <extremite container="" interface="" libelle="serveur scribe sur DMZ" name="serveur_scribe_dmz" netmask="255.255.255.255" subnet="0" type="" zone="dmz">
436
            <ip address="%%ip_serveur_scribe_dmz" />
437
        </extremite>
438
    <extremite container="" interface="" libelle="Zone entière" name="dmz" netmask="%%adresse_netmask_eth3" subnet="1" type="" zone="dmz">
439
            <ip address="%%adresse_ip_eth3" />
440
        </extremite>
441
        <extremite container="" interface="" libelle="zone restreinte" name="dmz_restreint" netmask="%%adresse_netmask_eth3" subnet="1" type="" zone="dmz">
442
            <ip address="%%adresse_network_eth3" />
443
        </extremite>
444
        <extremite container="" interface="" libelle="reseau autorise a se connecter a ssh depuis la dmz" name="dmz_ssh" netmask="%%netmask_ssh_eth3" subnet="1" type="" zone="dmz">
445
            <ip address="%%ip_ssh_eth3" />
446
        </extremite>
447
        <extremite container="" interface="" libelle="reseau autorise a administrer depuis la dmz" name="dmz_admin" netmask="%%netmask_admin_eth3" subnet="1" type="" zone="dmz">
448
            <ip address="%%ip_admin_eth3" />
449
        </extremite>
450
    </extremites><ranges>
451
        </ranges><user_groups>
452
        </user_groups><applications>
453
        </applications><qosclasses download="" upload="">
454
        </qosclasses><flux-list>
455
        <flux zoneA="bastion" zoneB="exterieur">
456
            <montantes default_policy="0">
457
            <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="ouverture de posh a travers de nginx" priority="1" serv_inv="0" service="scribe-posh" src_inv="0" tag="ActiverNGINX">
458
                    <source name="exterieur" />
459
                    <destination name="bastion" />
460
                </directive>
461
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="ouverture de l'EAD Scribe a travers de nginx" priority="2" serv_inv="0" service="ead-scribe" src_inv="0" tag="ead_scribe">
462
                    <source name="exterieur" />
463
                    <destination name="bastion" />
464
                </directive>
465
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="ssh exterieur vers Amon" priority="3" serv_inv="0" service="ssh" src_inv="0" tag="SSHDepuisEth0">
466
                    <source name="exterieur_ssh" />
467
                    <destination name="bastion" />
468
                </directive>
469
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="administration exterieure vers Amon" priority="4" serv_inv="0" service="admin_amon" src_inv="0" tag="AdminDepuisEth0">
470
                    <source name="exterieur_admin" />
471
                    <destination name="bastion" />
472
                </directive>
473
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="administration exterieure vers Amon" priority="5" serv_inv="0" service="lightsquid" src_inv="0" tag="lightsquid0">
474
                    <source name="exterieur_admin" />
475
                    <destination name="bastion" />
476
                </directive>
477
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="pas de description" priority="6" serv_inv="0" service="eole-sso" src_inv="0" tag="eole_sso">
478
                    <source name="exterieur" />
479
                    <destination name="bastion" />
480
                </directive>
481
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="redirection du service EoleSSO par le proxy inverse" priority="7" serv_inv="0" service="revprox-sso" src_inv="0" tag="revprox_sso">
482
                    <source name="exterieur" />
483
                    <destination name="bastion" />
484
                </directive>
485
                <directive accept="0" action="2" attrs="0" dest_inv="0" ipsec="0" libelle="Autoriser ipsec" priority="8" serv_inv="0" service="ipsec" src_inv="0">
486
                    <source name="exterieur" />
487
                    <destination name="bastion" />
488
                </directive>
489
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="gen_config exterieur vers Amon" priority="9" serv_inv="0" service="gen_config" src_inv="0" tag="SSHDepuisEth0">
490
                    <source name="exterieur_ssh" />
491
                    <destination name="bastion" />
492
                </directive>
493
            <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="pas de description" priority="10" serv_inv="0" service="rsyslog_RELP" src_inv="0" tag="ClientRsyslogRELP">
494
                    <source name="clients_relp_rsyslog" />
495
                    <destination name="bastion" />
496
                </directive>
497
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="pas de description" priority="11" serv_inv="0" service="rsyslog_TCP" src_inv="0" tag="ClientRsyslogTCP">
498
                    <source name="clients_tcp_rsyslog" />
499
                    <destination name="bastion" />
500
                </directive>
501
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="pas de description" priority="12" serv_inv="0" service="rsyslog_UDP" src_inv="0" tag="ClientRsyslogUDP">
502
                    <source name="clients_udp_rsyslog" />
503
                    <destination name="bastion" />
504
                </directive>
505
            </montantes>
506
            <descendantes default_policy="1">
507
            </descendantes>
508
        </flux>
509
        <flux zoneA="exterieur" zoneB="admin">
510
            <montantes default_policy="0">
511
            </montantes>
512
            <descendantes default_policy="1">
513
            <directive accept="0" action="16" attrs="0" dest_inv="0" ipsec="0" libelle="pas de description" nat_extr="exterieur_bastion" nat_port="0" priority="1" serv_inv="0" service="tous" src_inv="0">
514
                    <source name="admin_restreint" />
515
                    <destination name="exterieur" />
516
                </directive>
517
                <directive accept="0" action="4" attrs="17" dest_inv="0" ipsec="0" libelle="Redirection des flux http avec proxy alternatif" nat_port="3128" priority="2" serv_inv="0" service="gr_redirection_proxy" src_inv="0" tag="ProxyBypass1">
518
                    <source name="admin" />
519
                    <destination name="exterieur" />
520
                    <exception dest="0" eolvar="%%proxy_bypass_src_network_eth1/%%calc_classe(%%proxy_bypass_src_netmask_eth1)" ip="" name="" src="1" />
521
                    <exception dest="1" eolvar="%%proxy_bypass_network_eth1/%%calc_classe(%%proxy_bypass_netmask_eth1)" ip="" name="" src="0" />
522
                    <exception dest="1" eolvar="%%proxy_bypass_domain_eth1" ip="" name="" src="0" />
523
                </directive>
524
                <directive accept="0" action="4" attrs="17" dest_inv="1" ipsec="0" libelle="Redirection des flux http sans proxy vers une page d'erreur" nat_port="81" priority="3" serv_inv="0" service="http" src_inv="0" tag="ProxyBypass1">
525
                    <source name="admin" />
526
                    <destination name="exterieur_bastion" />
527
                    <exception dest="0" eolvar="%%proxy_bypass_src_network_eth1/%%calc_classe(%%proxy_bypass_src_netmask_eth1)" ip="" name="" src="1" />
528
                    <exception dest="1" eolvar="%%proxy_bypass_network_eth1/%%calc_classe(%%proxy_bypass_netmask_eth1)" ip="" name="" src="0" />
529
                    <exception dest="1" eolvar="%%proxy_bypass_domain_eth1" ip="" name="" src="0" />
530
                </directive>
531
                <directive accept="0" action="4" attrs="17" dest_inv="0" ipsec="0" libelle="Redirection des flux https sans proxy vers une page d'erreur" nat_port="82" priority="4" serv_inv="0" service="gr_redirection_https" src_inv="0" tag="ProxyBypass1">
532
                    <source name="admin" />
533
                    <destination name="exterieur" />
534
                    <exception dest="0" eolvar="%%proxy_bypass_src_network_eth1/%%calc_classe(%%proxy_bypass_src_netmask_eth1)" ip="" name="" src="1" />
535
                    <exception dest="1" eolvar="%%proxy_bypass_network_eth1/%%calc_classe(%%proxy_bypass_netmask_eth1)" ip="" name="" src="0" />
536
                    <exception dest="1" eolvar="%%proxy_bypass_domain_eth1" ip="" name="" src="0" />
537
                </directive>
538
                <directive accept="0" action="4" attrs="17" dest_inv="0" ipsec="0" libelle="Redirection des flux http avec proxy alternatif" nat_port="3128" priority="5" serv_inv="0" service="gr_redirection_proxy" src_inv="0" tag="ForceProxy1">
539
                    <source name="admin" />
540
                    <destination name="exterieur" />
541
                    <exception dest="0" eolvar="%%proxy_bypass_src_network_eth1/%%calc_classe(%%proxy_bypass_src_netmask_eth1)" ip="" name="" src="1" />
542
                    <exception dest="1" eolvar="%%proxy_bypass_domain_eth1" ip="" name="" src="0" />
543
                </directive>
544
                <directive accept="0" action="4" attrs="17" dest_inv="1" ipsec="0" libelle="Redirection des flux http sans proxy vers une page d'erreur" nat_port="81" priority="6" serv_inv="0" service="http" src_inv="0" tag="ForceProxy1">
545
                    <source name="admin" />
546
                    <destination name="exterieur_bastion" />
547
                    <exception dest="0" eolvar="%%proxy_bypass_src_network_eth1/%%calc_classe(%%proxy_bypass_src_netmask_eth1)" ip="" name="" src="1" />
548
                    <exception dest="1" eolvar="%%proxy_bypass_domain_eth1" ip="" name="" src="0" />
549
                </directive>
550
                <directive accept="0" action="4" attrs="17" dest_inv="0" ipsec="0" libelle="Redirection des flux https sans proxy vers une page d'erreur" nat_port="82" priority="7" serv_inv="0" service="gr_redirection_https" src_inv="0" tag="ForceProxy1">
551
                    <source name="admin" />
552
                    <destination name="exterieur" />
553
                    <exception dest="0" eolvar="%%proxy_bypass_src_network_eth1/%%calc_classe(%%proxy_bypass_src_netmask_eth1)" ip="" name="" src="1" />
554
                    <exception dest="1" eolvar="%%proxy_bypass_domain_eth1" ip="" name="" src="0" />
555
                </directive>
556
            </descendantes>
557
        </flux>
558
        <flux zoneA="bastion" zoneB="admin">
559
            <montantes default_policy="0">
560
            <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="ssh admin vers Amon" priority="1" serv_inv="0" service="ssh" src_inv="0" tag="SSHDepuisEth1">
561
                    <source name="admin_ssh" />
562
                    <destination name="bastion" />
563
                </directive>
564
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="administration admin vers Amon" priority="2" serv_inv="0" service="admin_amon" src_inv="0" tag="AdminDepuisEth1">
565
                    <source name="admin_admin" />
566
                    <destination name="bastion" />
567
                </directive>
568
                <directive accept="0" action="2" attrs="0" dest_inv="0" ipsec="0" libelle="pas de description" priority="3" serv_inv="0" service="dns-tcp" src_inv="0">
569
                    <source name="admin" />
570
                    <destination name="internet_eth1" />
571
                </directive>
572
                <directive accept="0" action="2" attrs="0" dest_inv="0" ipsec="0" libelle="pas de description" priority="4" serv_inv="0" service="dns-udp" src_inv="0">
573
                    <source name="admin" />
574
                    <destination name="internet_eth1" />
575
                </directive>
576
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="autoriser l'acces a Nuauth" priority="5" serv_inv="0" service="nuauth" src_inv="0" tag="auth_nufw">
577
                    <source name="admin" />
578
                    <destination name="bastion" />
579
                </directive>
580
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="pas de description" priority="6" serv_inv="0" service="eole-sso" src_inv="0" tag="eole_sso">
581
                    <source name="admin" />
582
                    <destination name="bastion" />
583
                </directive>
584
                <directive accept="0" action="2" attrs="0" dest_inv="0" ipsec="0" libelle="pas de description" priority="7" serv_inv="0" service="proxy" src_inv="0">
585
                    <source name="admin" />
586
                    <destination name="internet_eth1" />
587
                </directive>
588
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="pas de description" priority="8" serv_inv="0" service="proxy2" src_inv="0" tag="Activer squid2">
589
                    <source name="admin" />
590
                    <destination name="internet_eth1" />
591
                </directive>
592
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="pas de description" priority="9" serv_inv="0" service="cntlm" src_inv="0" tag="cntlm">
593
                    <source name="admin" />
594
                    <destination name="internet_eth1" />
595
                </directive>
596
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="gen_config admin vers Amon" priority="10" serv_inv="0" service="gen_config" src_inv="0" tag="SSHDepuisEth1">
597
                    <source name="admin_ssh" />
598
                    <destination name="bastion" />
599
                </directive>
600
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="raduis admin vers Amon" priority="11" serv_inv="0" service="gr_radius" src_inv="0" tag="ActiverRadiuseth1">
601
                    <source name="admin" />
602
                    <destination name="bastion" />
603
                </directive>
604
                <directive accept="0" action="2" attrs="0" dest_inv="0" ipsec="0" libelle="Autorisation reverse proxy + WPAD" priority="12" serv_inv="0" service="http" src_inv="0">
605
                    <source name="admin" />
606
                    <destination name="bastion_exterieur" />
607
                </directive>
608
            </montantes>
609
            <descendantes default_policy="1">
610
            </descendantes>
611
        </flux>
612
        <flux zoneA="exterieur" zoneB="pedago">
613
            <montantes default_policy="0">
614
            </montantes>
615
            <descendantes default_policy="1">
616
            <directive accept="0" action="16" attrs="0" dest_inv="0" ipsec="0" libelle="pas de description" nat_extr="exterieur_bastion" nat_port="0" priority="1" serv_inv="0" service="tous" src_inv="0">
617
                    <source name="pedago_restreint" />
618
                    <destination name="exterieur" />
619
                </directive>
620
                <directive accept="0" action="1" attrs="1" dest_inv="0" ipsec="0" libelle="pedago -&gt; exterieur : interdire les protocoles de news, forums ..." priority="2" serv_inv="0" service="gr_forum" src_inv="0" tag="Interdiction des forums">
621
                    <source name="pedago" />
622
                    <destination name="exterieur" />
623
                </directive>
624
                <directive accept="0" action="1" attrs="1" dest_inv="0" ipsec="0" libelle="Interdire les connexions FTP" priority="3" serv_inv="0" service="gr_ftp" src_inv="0" tag="Interdire les connexions FTP">
625
                    <source name="pedago" />
626
                    <destination name="exterieur" />
627
                </directive>
628
                <directive accept="0" action="1" attrs="1" dest_inv="0" ipsec="0" libelle="pedago -&gt; exterieur : interdire les protocoles de discussion en ligne (irc ...)" priority="4" serv_inv="0" service="gr_irc" src_inv="0" tag="Interdire l'utilisation des dialogues en direct">
629
                    <source name="pedago" />
630
                    <destination name="exterieur" />
631
                </directive>
632
                <directive accept="0" action="1" attrs="1" dest_inv="0" ipsec="0" libelle="pedago -&gt; exterieur : interdire les protocoles de messagerie (pop, imap ...)" priority="5" serv_inv="0" service="gr_messagerie" src_inv="0" tag="Interdiction des protocoles de messagerie">
633
                    <source name="pedago" />
634
                    <destination name="exterieur" />
635
                </directive>
636
                <directive accept="0" action="1" attrs="1" dest_inv="0" ipsec="0" libelle="pedago -&gt; exterieur : tout interdire (sauf le web via le proxy)" priority="6" serv_inv="0" service="gr_restreint" src_inv="0" tag="Internet restreint">
637
                    <source name="pedago" />
638
                    <destination name="exterieur" />
639
                </directive>
640
                <directive accept="0" action="4" attrs="17" dest_inv="0" ipsec="0" libelle="Redirection des flux http avec proxy alternatif" nat_port="3128" priority="7" serv_inv="0" service="gr_redirection_proxy" src_inv="0" tag="ProxyBypass2">
641
                    <source name="pedago" />
642
                    <destination name="exterieur" />
643
                    <exception dest="0" eolvar="%%proxy_bypass_src_network_eth2/%%calc_classe(%%proxy_bypass_src_netmask_eth2)" ip="" name="" src="1" />
644
                    <exception dest="1" eolvar="%%proxy_bypass_network_eth2/%%calc_classe(%%proxy_bypass_netmask_eth2)" ip="" name="" src="0" />
645
                    <exception dest="1" eolvar="%%proxy_bypass_domain_eth2" ip="" name="" src="0" />
646
                </directive>
647
                <directive accept="0" action="4" attrs="17" dest_inv="1" ipsec="0" libelle="Redirection des flux http sans proxy" nat_port="81" priority="8" serv_inv="0" service="http" src_inv="0" tag="ProxyBypass2">
648
                    <source name="pedago" />
649
                    <destination name="exterieur_bastion" />
650
                    <exception dest="0" eolvar="%%proxy_bypass_src_network_eth2/%%calc_classe(%%proxy_bypass_src_netmask_eth2)" ip="" name="" src="1" />
651
                    <exception dest="1" eolvar="%%proxy_bypass_network_eth2/%%calc_classe(%%proxy_bypass_netmask_eth2)" ip="" name="" src="0" />
652
                    <exception dest="1" eolvar="%%proxy_bypass_domain_eth2" ip="" name="" src="0" />
653
                </directive>
654
                <directive accept="0" action="4" attrs="17" dest_inv="0" ipsec="0" libelle="Redirection des flux https sans proxy vers une page d'erreur" nat_port="82" priority="9" serv_inv="0" service="gr_redirection_https" src_inv="0" tag="ProxyBypass2">
655
                    <source name="pedago" />
656
                    <destination name="exterieur" />
657
                    <exception dest="0" eolvar="%%proxy_bypass_src_network_eth2/%%calc_classe(%%proxy_bypass_src_netmask_eth2)" ip="" name="" src="1" />
658
                    <exception dest="1" eolvar="%%proxy_bypass_network_eth2/%%calc_classe(%%proxy_bypass_netmask_eth2)" ip="" name="" src="0" />
659
                    <exception dest="1" eolvar="%%proxy_bypass_domain_eth2" ip="" name="" src="0" />
660
                </directive>
661
                <directive accept="0" action="4" attrs="17" dest_inv="0" ipsec="0" libelle="Redirection des flux http avec proxy alternatif" nat_port="3128" priority="10" serv_inv="0" service="gr_redirection_proxy" src_inv="0" tag="ForceProxy2">
662
                    <source name="pedago" />
663
                    <destination name="exterieur" />
664
                    <exception dest="0" eolvar="%%proxy_bypass_src_network_eth2/%%calc_classe(%%proxy_bypass_src_netmask_eth2)" ip="" name="" src="1" />
665
                    <exception dest="1" eolvar="%%proxy_bypass_domain_eth2" ip="" name="" src="0" />
666
                </directive>
667
                <directive accept="0" action="4" attrs="17" dest_inv="1" ipsec="0" libelle="Redirection des flux http sans proxy vers une page d'erreur" nat_port="81" priority="11" serv_inv="0" service="http" src_inv="0" tag="ForceProxy2">
668
                    <source name="pedago" />
669
                    <destination name="exterieur_bastion" />
670
                    <exception dest="0" eolvar="%%proxy_bypass_src_network_eth2/%%calc_classe(%%proxy_bypass_src_netmask_eth2)" ip="" name="" src="1" />
671
                    <exception dest="1" eolvar="%%proxy_bypass_domain_eth2" ip="" name="" src="0" />
672
                </directive>
673
                <directive accept="0" action="4" attrs="17" dest_inv="0" ipsec="0" libelle="Redirection des flux https sans proxy vers une page d'erreur" nat_port="82" priority="12" serv_inv="0" service="gr_redirection_https" src_inv="0" tag="ForceProxy2">
674
                    <source name="pedago" />
675
                    <destination name="exterieur" />
676
                    <exception dest="0" eolvar="%%proxy_bypass_src_network_eth2/%%calc_classe(%%proxy_bypass_src_netmask_eth2)" ip="" name="" src="1" />
677
                    <exception dest="1" eolvar="%%proxy_bypass_domain_eth2" ip="" name="" src="0" />
678
                </directive>
679
            </descendantes>
680
        </flux>
681
        <flux zoneA="admin" zoneB="pedago">
682
            <montantes default_policy="0">
683
            </montantes>
684
            <descendantes default_policy="1">
685
            </descendantes>
686
        </flux>
687
        <flux zoneA="bastion" zoneB="pedago">
688
            <montantes default_policy="0">
689
            <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="ssh pedago vers Amon" priority="1" serv_inv="0" service="ssh" src_inv="0" tag="SSHDepuisEth2">
690
                    <source name="pedago_ssh" />
691
                    <destination name="bastion" />
692
                </directive>
693
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="administration pedago vers Amon" priority="2" serv_inv="0" service="admin_amon" src_inv="0" tag="AdminDepuisEth2">
694
                    <source name="pedago_admin" />
695
                    <destination name="bastion" />
696
                </directive>
697
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="administration pedago vers Amon" priority="3" serv_inv="0" service="lightsquid" src_inv="0" tag="lightsquid2">
698
                    <source name="pedago_admin" />
699
                    <destination name="bastion" />
700
                </directive>
701
                <directive accept="0" action="2" attrs="0" dest_inv="0" ipsec="0" libelle="pas de description" priority="4" serv_inv="0" service="dns-tcp" src_inv="0">
702
                    <source name="pedago" />
703
                    <destination name="internet_eth2" />
704
                </directive>
705
                <directive accept="0" action="2" attrs="0" dest_inv="0" ipsec="0" libelle="pas de description" priority="5" serv_inv="0" service="dns-udp" src_inv="0">
706
                    <source name="pedago" />
707
                    <destination name="internet_eth2" />
708
                </directive>
709
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="autoriser l'acces a Nuauth" priority="6" serv_inv="0" service="nuauth" src_inv="0" tag="auth_nufw">
710
                    <source name="pedago" />
711
                    <destination name="bastion" />
712
                </directive>
713
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="pas de description" priority="7" serv_inv="0" service="eole-sso" src_inv="0" tag="eole_sso">
714
                    <source name="pedago" />
715
                    <destination name="bastion" />
716
                </directive>
717
                <directive accept="0" action="2" attrs="0" dest_inv="0" ipsec="0" libelle="pas de description" priority="8" serv_inv="0" service="proxy" src_inv="0">
718
                    <source name="pedago" />
719
                    <destination name="internet_eth2" />
720
                </directive>
721
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="pas de description" priority="9" serv_inv="0" service="proxy2" src_inv="0" tag="Activer squid2">
722
                    <source name="pedago" />
723
                    <destination name="internet_eth2" />
724
                </directive>
725
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="pas de description" priority="10" serv_inv="0" service="cntlm" src_inv="0" tag="cntlm">
726
                    <source name="pedago" />
727
                    <destination name="internet_eth2" />
728
                </directive>
729
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="gen_config pedago vers Amon" priority="11" serv_inv="0" service="gen_config" src_inv="0" tag="SSHDepuisEth2">
730
                    <source name="pedago_ssh" />
731
                    <destination name="bastion" />
732
                </directive>
733
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="raduis admin vers Amon" priority="12" serv_inv="0" service="gr_radius" src_inv="0" tag="ActiverRadiuseth2">
734
                    <source name="pedago" />
735
                    <destination name="bastion" />
736
                </directive>
737
                <directive accept="0" action="2" attrs="0" dest_inv="0" ipsec="0" libelle="Autorisation reverse proxy + WPAD" priority="13" serv_inv="0" service="http" src_inv="0">
738
                    <source name="pedago" />
739
                    <destination name="bastion_exterieur" />
740
                </directive>
741
            </montantes>
742
            <descendantes default_policy="1">
743
            </descendantes>
744
        </flux>
745
        <flux zoneA="exterieur" zoneB="dmz">
746
            <montantes default_policy="0">
747
            </montantes>
748
            <descendantes default_policy="1">
749
                <directive accept="0" action="4" attrs="17" dest_inv="0" ipsec="0" libelle="Redirection des flux http avec proxy alternatif" nat_port="3128" priority="1" serv_inv="0" service="gr_redirection_proxy" src_inv="0" tag="ProxyBypass3">
750
                    <source name="dmz" />
751
                    <destination name="exterieur" />
752
                    <exception dest="0" eolvar="%%proxy_bypass_src_network_eth3/%%calc_classe(%%proxy_bypass_src_netmask_eth3)" ip="" name="" src="1" />
753
                    <exception dest="1" eolvar="%%proxy_bypass_network_eth3/%%calc_classe(%%proxy_bypass_netmask_eth3)" ip="" name="" src="0" />
754
                    <exception dest="1" eolvar="%%proxy_bypass_domain_eth3" ip="" name="" src="0" />
755
                </directive>
756
                <directive accept="0" action="4" attrs="17" dest_inv="1" ipsec="0" libelle="Redirection des flux http sans proxy vers une page d'erreur" nat_port="81" priority="2" serv_inv="0" service="http" src_inv="0" tag="ProxyBypass3">
757
                    <source name="dmz" />
758
                    <destination name="exterieur_bastion" />
759
                    <exception dest="0" eolvar="%%proxy_bypass_src_network_eth3/%%calc_classe(%%proxy_bypass_src_netmask_eth3)" ip="" name="" src="1" />
760
                    <exception dest="1" eolvar="%%proxy_bypass_network_eth3/%%calc_classe(%%proxy_bypass_netmask_eth3)" ip="" name="" src="0" />
761
                    <exception dest="1" eolvar="%%proxy_bypass_domain_eth3" ip="" name="" src="0" />
762
                </directive>
763
                <directive accept="0" action="4" attrs="17" dest_inv="0" ipsec="0" libelle="Redirection des flux https sans proxy vers une page d'erreur" nat_port="82" priority="3" serv_inv="0" service="gr_redirection_https" src_inv="0" tag="ProxyBypass3">
764
                    <source name="dmz" />
765
                    <destination name="exterieur" />
766
                    <exception dest="0" eolvar="%%proxy_bypass_src_network_eth3/%%calc_classe(%%proxy_bypass_src_netmask_eth3)" ip="" name="" src="1" />
767
                    <exception dest="1" eolvar="%%proxy_bypass_network_eth3/%%calc_classe(%%proxy_bypass_netmask_eth3)" ip="" name="" src="0" />
768
                    <exception dest="1" eolvar="%%proxy_bypass_domain_eth3" ip="" name="" src="0" />
769
                </directive>
770
                <directive accept="0" action="4" attrs="17" dest_inv="0" ipsec="0" libelle="Redirection des flux http avec proxy alternatif" nat_port="3128" priority="4" serv_inv="0" service="gr_redirection_proxy" src_inv="0" tag="ForceProxy3">
771
                    <source name="dmz" />
772
                    <destination name="exterieur" />
773
                    <exception dest="0" eolvar="%%proxy_bypass_src_network_eth3/%%calc_classe(%%proxy_bypass_src_netmask_eth3)" ip="" name="" src="1" />
774
                    <exception dest="1" eolvar="%%proxy_bypass_domain_eth3" ip="" name="" src="0" />
775
                </directive>
776
                <directive accept="0" action="4" attrs="17" dest_inv="1" ipsec="0" libelle="Redirection des flux http sans proxy vers une page d'erreur" nat_port="81" priority="5" serv_inv="0" service="http" src_inv="0" tag="ForceProxy3">
777
                    <source name="dmz" />
778
                    <destination name="exterieur_bastion" />
779
                    <exception dest="0" eolvar="%%proxy_bypass_src_network_eth3/%%calc_classe(%%proxy_bypass_src_netmask_eth3)" ip="" name="" src="1" />
780
                    <exception dest="1" eolvar="%%proxy_bypass_domain_eth3" ip="" name="" src="0" />
781
                </directive>
782
                <directive accept="0" action="4" attrs="17" dest_inv="0" ipsec="0" libelle="Redirection des flux https sans proxy vers une page d'erreur" nat_port="82" priority="6" serv_inv="0" service="gr_redirection_https" src_inv="0" tag="ForceProxy3">
783
                    <source name="dmz" />
784
                    <destination name="exterieur" />
785
                    <exception dest="0" eolvar="%%proxy_bypass_src_network_eth3/%%calc_classe(%%proxy_bypass_src_netmask_eth3)" ip="" name="" src="1" />
786
                    <exception dest="1" eolvar="%%proxy_bypass_domain_eth3" ip="" name="" src="0" />
787
                </directive>
788
            <directive accept="0" action="16" attrs="17" dest_inv="0" ipsec="0" libelle="autoriser scribe a sortir sur Internet" nat_extr="exterieur_bastion" nat_port="0" priority="7" serv_inv="0" service="tous" src_inv="0" tag="ScribeDMZ">
789
                    <source name="serveur_scribe_dmz" />
790
                    <destination name="exterieur" />
791
                </directive>
792
            </descendantes>
793
        </flux>
794
        <flux zoneA="admin" zoneB="dmz">
795
            <montantes default_policy="0">
796
            </montantes>
797
            <descendantes default_policy="1">
798
            </descendantes>
799
        </flux>
800
        <flux zoneA="bastion" zoneB="dmz">
801
            <montantes default_policy="0">
802
                <directive accept="0" action="2" attrs="0" dest_inv="0" ipsec="0" libelle="Autorisation reverse proxy + WPAD" priority="1" serv_inv="0" service="http" src_inv="0">
803
                    <source name="dmz" />
804
                    <destination name="bastion_exterieur" />
805
                </directive>
806
            <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="ssh dmz vers Amon" priority="2" serv_inv="0" service="ssh" src_inv="0" tag="SSHDepuisEth3">
807
                    <source name="dmz_ssh" />
808
                    <destination name="bastion" />
809
                </directive>
810
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="administration dmz vers Amon" priority="3" serv_inv="0" service="admin_amon" src_inv="0" tag="AdminDepuisEth3">
811
                    <source name="dmz_admin" />
812
                    <destination name="bastion" />
813
                </directive>
814
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="administration dmz vers Amon" priority="4" serv_inv="0" service="lightsquid" src_inv="0" tag="lightsquid3">
815
                    <source name="dmz_admin" />
816
                    <destination name="bastion" />
817
                </directive>
818
                <directive accept="0" action="2" attrs="0" dest_inv="0" ipsec="0" libelle="pas de description" priority="5" serv_inv="0" service="dns-tcp" src_inv="0">
819
                    <source name="dmz" />
820
                    <destination name="internet" />
821
                </directive>
822
                <directive accept="0" action="2" attrs="0" dest_inv="0" ipsec="0" libelle="pas de description" priority="6" serv_inv="0" service="dns-udp" src_inv="0">
823
                    <source name="dmz" />
824
                    <destination name="internet" />
825
                </directive>
826

    
827
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="pas de description" priority="7" serv_inv="0" service="eole-sso" src_inv="0" tag="eole_sso">
828
                    <source name="dmz" />
829
                    <destination name="bastion" />
830
                </directive>
831
                <directive accept="0" action="2" attrs="0" dest_inv="0" ipsec="0" libelle="pas de description" priority="8" serv_inv="0" service="proxy" src_inv="0">
832
                    <source name="dmz" />
833
                    <destination name="internet" />
834
                </directive>
835
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="pas de description" priority="9" serv_inv="0" service="proxy2" src_inv="0" tag="Activer squid2">
836
                    <source name="dmz" />
837
                    <destination name="internet" />
838
                </directive>
839
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="pas de description" priority="10" serv_inv="0" service="cntlm" src_inv="0" tag="cntlm">
840
                    <source name="dmz" />
841
                    <destination name="internet" />
842
                </directive>
843
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="gen_config dmz vers Amon" priority="11" serv_inv="0" service="gen_config" src_inv="0" tag="SSHDepuisEth3">
844
                    <source name="dmz_ssh" />
845
                    <destination name="bastion" />
846
                </directive>
847
            </montantes>
848
            <descendantes default_policy="1">
849
            </descendantes>
850
        </flux>
851
    <flux zoneA="pedago" zoneB="dmz">
852
            <montantes default_policy="0">
853
                <directive accept="0" action="2" attrs="17" dest_inv="0" ipsec="0" libelle="autoriser scribe a se connecter au reseau pedago" priority="1" serv_inv="0" service="scribe-dmz-pedago" src_inv="0" tag="ScribeDMZ">
854
                    <source name="serveur_scribe_dmz" />
855
                    <destination name="pedago" />
856
                </directive>
857
            </montantes>
858
            <descendantes default_policy="1">
859
            </descendantes>
860
        </flux>
861
        </flux-list></firewall>