
lucas_sc
(usa Outra)
Enviado em 29/08/2017 - 13:48h
#LIPAS AS REGRAS
iptables -F
iptables -X
iptables -Z
# CARREGANDO TODOS OS MODULOS DO NETFILTER NO KERNEL
modprobe ip_tables
modprobe iptable_nat
modprobe iptable_filter
modprobe iptable_mangle
modprobe ipt_LOG
modprobe ipt_MASQUERADE
modprobe ip_nat_ftp
modprobe ip_conntrack_ftp
modprobe ipt_REDIRECT
#alteracoes basicas
echo 0 > /proc/sys/net/ipv4/conf/all/accept_redirects
echo 1 > /proc/sys/net/ipv4/icmp_echo_ignore_broadcasts
echo 0 > /proc/sys/net/ipv4/conf/all/accept_source_route
echo 0 > /proc/sys/net/ipv4/ip_forward
echo 1 > /proc/sys/net/ipv4/tcp_syncookies
echo 1 > /proc/sys/net/ipv4/conf/default/rp_filter
# Políticas Padrões
iptables -P FORWARD -j DROP
iptables -P INPUT -j DROP
iptables -P OUTPUT -j ACCEPT
#Saida
iptables -t nat -A POSTROUTING -o enp6s0 -j MASQUERADE
# Abre para a interface de loopback:
iptables -A INPUT -p tcp -i lo -j ACCEPT
# Abre as portas referentes aos serviços usados:
#squid
iptables -t nat -A PREROUTING -i enp6s0 -p tcp --dport 80 -j REDIRECT --to-port 3128
iptables -t nat -A PREROUTING -i enp6s0 -p tcp --dport 443 -j REDIRECT --to-port 3128
# SSH:
iptables -A INPUT -p tcp --dport 22 -j ACCEPT
# Garante que o firewall permitirá pacotes de conexões iniciadas:
iptables -A INPUT -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
iptables -A FORWARD -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
#protecao contra DDoS (isso não evita ataque DDoS, apenas dificulta...)
iptables -A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s -j ACCEPT
#contra pacotes invalidos
iptables -A INPUT -m state --state INVALID -j DROP
/sbin/service iptables save