{"id":1948,"date":"2022-12-13T19:21:31","date_gmt":"2022-12-13T18:21:31","guid":{"rendered":"https:\/\/www.webodesign.net\/?page_id=1948"},"modified":"2023-01-06T15:37:19","modified_gmt":"2023-01-06T14:37:19","slug":"firewall-definition-des-regles-iptables","status":"publish","type":"page","link":"https:\/\/www.webodesign.net\/?page_id=1948","title":{"rendered":"Firewall &#8211; D\u00e9finition des r\u00e8gles IPtables"},"content":{"rendered":"\n<div class=\"wp-block-uagb-container uagb-block-f2ba38ab alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-1b4128f7\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-6227a653\"><h3 class=\"uagb-heading-text\">Firewall &#8211; D\u00e9finition des r\u00e8gles IPtables<\/h3><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-10\" style=\"padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px\">\n<div class=\"wp-block-column is-layout-constrained wp-container-8\">\n<div class=\"wp-block-group is-layout-flow\">\n<div class=\"wp-block-group has-border-color has-vivid-cyan-blue-border-color has-background is-layout-flow\" style=\"border-style:dotted;border-width:2px;border-radius:8px;background-color:#fffdf8;padding-right:7px;padding-bottom:15px;padding-left:7px\">\n<h3 class=\"has-text-color wp-block-heading\" id=\"3-iii-cr%C3%A9ation-dun-admin-pour-phpmyadmin\" style=\"color:#fffdf8;padding-top:0;padding-right:0;padding-bottom:0;padding-left:0;font-size:1px\">Proc\u00e9dure d&rsquo;installation de NetFilter<\/h3>\n\n\n\n<div class=\"qubely-block-accordion  qubely-block-d34844\" data-item-toggle=\"true\">\n<div class=\"wp-block-qubely-accordion-item qubely-block-436f85\"><div class=\"qubely-accordion-item qubely-type-fill qubely-accordion-active\"><div class=\"qubely-accordion-panel qubely-icon-position-right\"><span class=\"qubely-accordion-panel-handler\" role=\"button\"><span class=\"qubely-accordion-panel-handler-label\">Proc\u00e9dure d&rsquo;installation de NetFilter<\/span><span class=\"qubely-accordion-icon fa fa-plus\"><\/span><\/span><\/div><div class=\"qubely-accordion-body\" style=\"display:block\"><div itemprop=\"text\">\n<div class=\"wp-block-codemirror-blocks-code-block code-block\"><pre class=\"CodeMirror\" data-setting=\"{&quot;mode&quot;:&quot;shell&quot;,&quot;mime&quot;:&quot;text\/x-sh&quot;,&quot;theme&quot;:&quot;material&quot;,&quot;lineNumbers&quot;:false,&quot;styleActiveLine&quot;:false,&quot;lineWrapping&quot;:false,&quot;readOnly&quot;:true,&quot;showPanel&quot;:false,&quot;languageLabel&quot;:&quot;no&quot;,&quot;language&quot;:&quot;Shell&quot;,&quot;modeName&quot;:&quot;shell&quot;}\">sudo apt-get remove --auto-remove nftables\n\nsudo apt-get purge nftables\n\nsudo apt-get update\n\nsudo apt-get install iptables\n\niptables --list\n\niptables -L -v\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (liste des r\u00e8gles d\u00e9taill\u00e9)\n\niptables -S\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (liste des commandes ajout\u00e9es)\n\niptables -L --line-numbers\n\n# Bloquer le ping entrant\n\n# iptables -A(ou -I ou -D)\u00a0 -i &lt;interface&gt; -p &lt;protocol (tcp\/udp\/icmp)&gt; -s &lt;source&gt; --dport &lt;port no.&gt;\u00a0 -j &lt;target&gt;\n\niptables -A INPUT -s 127.0.0.1 -p icmp -j DROP\n\niptables -F\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 --&gt; vider toutes les r\u00e8gles\n\niptables -A INPUT -s 127.0.0.1 -p icmp -j DROP\n\niptables -D INPUT -s 127.0.0.1 -p icmp -j DROP\u00a0\u00a0\u00a0\u00a0\u00a0 --&gt; supprimer la r\u00e8gle exit iptables -D INPUT<\/pre><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-border-color has-vivid-cyan-blue-border-color has-background is-layout-flow\" style=\"border-style:dotted;border-width:2px;border-radius:8px;background-color:#fffdf8;padding-right:7px;padding-bottom:15px;padding-left:7px\">\n<h3 class=\"has-text-color wp-block-heading\" id=\"3-iii-cr%C3%A9ation-dun-admin-pour-phpmyadmin\" style=\"color:#fffdf8;padding-top:0;padding-right:0;padding-bottom:0;padding-left:0;font-size:1px\">R\u00e8gles iptables<\/h3>\n\n\n\n<div class=\"qubely-block-accordion  qubely-block-d34844\" data-item-toggle=\"true\">\n<div class=\"wp-block-qubely-accordion-item qubely-block-73b1ce\"><div class=\"qubely-accordion-item qubely-type-fill qubely-accordion-active\"><div class=\"qubely-accordion-panel qubely-icon-position-right\"><span class=\"qubely-accordion-panel-handler\" role=\"button\"><span class=\"qubely-accordion-panel-handler-label\">R\u00e8gles iptables<\/span><span class=\"qubely-accordion-icon fa fa-plus\"><\/span><\/span><\/div><div class=\"qubely-accordion-body\" style=\"display:block\"><div itemprop=\"text\">\n<div class=\"wp-block-codemirror-blocks-code-block code-block\"><pre class=\"CodeMirror\" data-setting=\"{&quot;mode&quot;:&quot;shell&quot;,&quot;mime&quot;:&quot;text\/x-sh&quot;,&quot;theme&quot;:&quot;material&quot;,&quot;lineNumbers&quot;:false,&quot;styleActiveLine&quot;:false,&quot;lineWrapping&quot;:false,&quot;readOnly&quot;:true,&quot;showPanel&quot;:false,&quot;languageLabel&quot;:&quot;no&quot;,&quot;language&quot;:&quot;Shell&quot;,&quot;modeName&quot;:&quot;shell&quot;}\"> nano regles-iptables.sh\nchmod +x regles-iptables.sh\n\n#!\/bin\/sh\n\n# On vide les r\u00e8gles d\u00e9j\u00e0 existantes\nsudo iptables -t filter -F\nsudo iptables -t filter -X\n\n# Interdire toutes connexions entrantes et sortantes\nsudo iptables -P INPUT DROP\nsudo iptables -P FORWARD DROP\nsudo iptables -P OUTPUT DROP\n\n# Ne pas casser les connexions etablies\nsudo iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT\nsudo iptables -A OUTPUT -m state --state RELATED,ESTABLISHED -j ACCEPT\n\n# Autoriser loopback\nsudo iptables -A INPUT -i lo -j ACCEPT\nsudo iptables -A OUTPUT -o lo -j ACCEPT\n\n# Autoriser le ping\nsudo iptables -A INPUT -p icmp -j ACCEPT\nsudo iptables -A OUTPUT -p icmp -j ACCEPT\n\n# Autoriser SSH\nsudo iptables -A INPUT -p tcp --dport 22 -j ACCEPT\nsudo iptables -A OUTPUT -p tcp --dport 22 -j ACCEPT\n\n# Autoriser DNS\nsudo iptables -A OUTPUT -p tcp --dport 53 -j ACCEPT\nsudo iptables -A OUTPUT -p udp --dport 53 -j ACCEPT\nsudo iptables -A INPUT -p tcp --dport 53 -j ACCEPT\nsudo iptables -A INPUT -p udp --dport 53 -j ACCEPT\n\n# Autoriser NTP\nsudo iptables -A OUTPUT -p udp --dport 123 -j ACCEPT\n\n# Autoriser FTP\nmodprobe ip_conntrack_ftp\nsudo iptables -A OUTPUT -p tcp --dport 20:21 -j ACCEPT\nsudo iptables -A INPUT -p tcp --dport 20:21 -j ACCEPT\nsudo iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT\n\n# Autoriser HTTP et HTTPS\nsudo iptables -A OUTPUT -p tcp --dport 80 -j ACCEPT\nsudo iptables -A INPUT -p tcp --dport 80 -j ACCEPT\nsudo iptables -A OUTPUT -p tcp --dport 443 -j ACCEPT\nsudo iptables -A INPUT -p tcp --dport 443 -j ACCEPT\nsudo iptables -A INPUT -p tcp --dport 8443 -j ACCEPT\n\n# Mails\n# Autoriser POP3\nsudo iptables -A INPUT -p tcp --dport 110 -j ACCEPT\nsudo iptables -A OUTPUT -p tcp --dport 110 -j ACCEPT\n\n# Autoriser SMTP\nsudo iptables -A INPUT -p tcp --dport 25 -j ACCEPT\nsudo iptables -A OUTPUT -p tcp --dport 25 -j ACCEPT\nsudo iptables -A INPUT -p tcp --dport 587 -j ACCEPT\nsudo iptables -A OUTPUT -p tcp --dport 587 -j ACCEPT\n\n# Autoriser IMAP\nsudo iptables -A INPUT -p tcp --dport 143 -j ACCEPT\nsudo iptables -A OUTPUT -p tcp --dport 143 -j ACCEPT\n\n# Autoriser POP3S\nsudo iptables -A INPUT -p tcp --dport 995 -j ACCEPT\nsudo iptables -A OUTPUT -p tcp --dport 995 -j ACCEPT\n\n# Autoriser Webadmin sur vmi820488.contaboserver.net\nsudo iptables -A INPUT -p tcp --dport 10000 -j ACCEPT\nsudo iptables -A OUTPUT -p tcp --dport 10000 -j ACCEPT<\/pre><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-65e8c841\"><h3 class=\"uagb-heading-text\">Informations :<\/h3><\/div>\n\n\n\n<p>apt-get install iptables-persistent (r\u00e9pondre oui pour enregistrer les r\u00e8gles IPV4 et IPV6)<\/p>\n\n\n\n<p>Les fichiers de configaration sont sauvegard\u00e9s dans le dossier \/etc\/iptables : rules.v4 et rules.v6<\/p>\n\n\n\n<p>service iptables-persisitent save (sauvegarde les r\u00e8gle en m\u00e9moire dans le fichier rules.v4)<\/p>\n\n\n\n<p>service iptables-persisitent flush (vide les r\u00e8gles sauvegard\u00e9es en m\u00e9moire) <\/p>\n\n\n\n<p>service iptables-persisitent reload (charge les r\u00e8gles pr\u00e9sentent dans le fichier rules.v4 en m\u00e9moire)<\/p>\n<\/div><\/div><\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-border-color has-vivid-cyan-blue-border-color uag-hide-desktop uag-hide-tab uag-hide-mob is-layout-flow\" style=\"border-style:dotted;border-width:2px;border-radius:8px;padding-right:7px;padding-bottom:7px;padding-left:7px\">\n<div class=\"wp-block-columns is-layout-flex wp-container-5\">\n<div class=\"wp-block-column is-layout-flow\">\n<pre class=\"wp-block-code has-background-color has-text-color\" style=\"border-width:5px;border-radius:5px;padding-top:5px;padding-bottom:5px;padding-left:5px\"><code lang=\"bash\" class=\"language-bash line-numbers\">nano regles-iptables.sh\nchmod +x regles-iptables.sh\n\n#!\/bin\/sh\n\n# On vide les r\u00e8gles d\u00e9j\u00e0 existantes\nsudo iptables -t filter -F\nsudo iptables -t filter -X\n\n# Interdire toutes connexions entrantes et sortantes\nsudo iptables -P INPUT DROP\nsudo iptables -P FORWARD DROP\nsudo iptables -P OUTPUT DROP\n\n# Ne pas casser les connexions etablies\nsudo iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT\nsudo iptables -A OUTPUT -m state --state RELATED,ESTABLISHED -j ACCEPT\n\n# Autoriser loopback\nsudo iptables -A INPUT -i lo -j ACCEPT\nsudo iptables -A OUTPUT -o lo -j ACCEPT\n\n# Autoriser le ping\nsudo iptables -A INPUT -p icmp -j ACCEPT\nsudo iptables -A OUTPUT -p icmp -j ACCEPT\n\n# Autoriser SSH\nsudo iptables -A INPUT -p tcp --dport 22 -j ACCEPT\nsudo iptables -A OUTPUT -p tcp --dport 22 -j ACCEPT\n\n# Autoriser DNS\nsudo iptables -A OUTPUT -p tcp --dport 53 -j ACCEPT\nsudo iptables -A OUTPUT -p udp --dport 53 -j ACCEPT\nsudo iptables -A INPUT -p tcp --dport 53 -j ACCEPT\nsudo iptables -A INPUT -p udp --dport 53 -j ACCEPT\n<\/code><\/pre>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow\">\n<pre class=\"wp-block-code has-background-color has-text-color\" style=\"border-width:5px;border-radius:5px;padding-top:5px;padding-bottom:5px;padding-left:5px\"><code lang=\"bash\" class=\"language-bash line-numbers\"># Autoriser NTP\nsudo iptables -A OUTPUT -p udp --dport 123 -j ACCEPT\n\n# Autoriser FTP\nmodprobe ip_conntrack_ftp\nsudo iptables -A OUTPUT -p tcp --dport 20:21 -j ACCEPT\nsudo iptables -A INPUT -p tcp --dport 20:21 -j ACCEPT\nsudo iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT\n\n# Autoriser HTTP et HTTPS\nsudo iptables -A OUTPUT -p tcp --dport 80 -j ACCEPT\nsudo iptables -A INPUT -p tcp --dport 80 -j ACCEPT\nsudo iptables -A OUTPUT -p tcp --dport 443 -j ACCEPT\nsudo iptables -A INPUT -p tcp --dport 443 -j ACCEPT\nsudo iptables -A INPUT -p tcp --dport 8443 -j ACCEPT\n\n# Mails\n# Autoriser POP3\nsudo iptables -A INPUT -p tcp --dport 110 -j ACCEPT\nsudo iptables -A OUTPUT -p tcp --dport 110 -j ACCEPT\n\n# Autoriser SMTP\nsudo iptables -A INPUT -p tcp --dport 25 -j ACCEPT\nsudo iptables -A OUTPUT -p tcp --dport 25 -j ACCEPT\nsudo iptables -A INPUT -p tcp --dport 587 -j ACCEPT\nsudo iptables -A OUTPUT -p tcp --dport 587 -j ACCEPT\n\n# Autoriser IMAP\nsudo iptables -A INPUT -p tcp --dport 143 -j ACCEPT\nsudo iptables -A OUTPUT -p tcp --dport 143 -j ACCEPT\n\n# Autoriser POP3S\nsudo iptables -A INPUT -p tcp --dport 995 -j ACCEPT\nsudo iptables -A OUTPUT -p tcp --dport 995 -j ACCEPT\n\n# Autoriser Webadmin sur vmi820488.contaboserver.net\nsudo iptables -A INPUT -p tcp --dport 10000 -j ACCEPT\nsudo iptables -A OUTPUT -p tcp --dport 10000 -j ACCEPT\n<\/code><\/pre>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow\" style=\"flex-basis:22%\">\n\n<div class=\"cleanlogin-container\">\t\t\n\n\t<form class=\"cleanlogin-form\" method=\"post\" action=\"https:\/\/www.webodesign.net\/?page_id=2385\" onsubmit=\"submit.disabled = true; return true;\">\n\t\t\t\n\t\t<fieldset>\n\n\t\t\t\t\t\t<div class=\"cleanlogin-field\">\n                <label for=\"log\">Identifiant<\/label>\n\t\t\t\t<input class=\"cleanlogin-field-username\" type=\"text\" name=\"log\" placeholder=\"Identifiant\" aria-label=\"Identifiant\">\n\t\t\t<\/div>\n\t\t\t\n\t\t\t<div class=\"cleanlogin-field\">\n                <label for=\"pwd\">Mot de passe<\/label>\n\t\t\t\t<input class=\"cleanlogin-field-password\" type=\"password\" id=\"pwd\" name=\"pwd\" placeholder=\"Mot de passe\" aria-label=\"Mot de passe\">\n                <i class=\"bi bi-eye-slash\" id=\"togglePassword\"><\/i>\n\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t<input type=\"hidden\" name=\"clean_login_wpnonce\" value=\"e994c14fba\">\n            \n\t\t\t\t\t<\/fieldset>\n\t\t\n\t\t<fieldset>\n\t\t\t<input class=\"cleanlogin-field\" type=\"submit\" value=\"Se connecter\" name=\"submit\">\n\t\t\t<input type=\"hidden\" name=\"action\" value=\"login\">\n\t\t\t\n\t\t\t<div class=\"cleanlogin-field cleanlogin-field-remember\">\n\t\t\t\t<input type=\"checkbox\" id=\"rememberme\" name=\"rememberme\" value=\"forever\">\n\t\t\t\t<label for=\"rememberme\">Se souvenir de moi\u00a0?<\/label>\n\t\t\t<\/div>\n\t\t<\/fieldset>\n\n\t\t\n\t\t<div class=\"cleanlogin-form-bottom\">\n\t\t\t\n            \n\t\t\t\t\t\t\t\t\t\n\t\t<\/div>\n\t\t\n\t<\/form>\n\n<\/div>\n\n<script>\nconst togglePassword = document.querySelector('#togglePassword');\nconst password = document.querySelector('#pwd');\n\ntogglePassword.addEventListener('click', function (e) {\n    const type = password.getAttribute('type') === 'password' ? 'text' : 'password';\n    password.setAttribute('type', type);\n    this.classList.toggle('bi-eye');\n});\n<\/script>\n<\/div>\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Firewall &#8211; D\u00e9finition des r\u00e8gles IPtables Proc\u00e9dure d&rsquo;installation de NetFilter R\u00e8gles iptables<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":658,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"qubely_global_settings":"","qubely_interactions":"","_uag_custom_page_level_css":""},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"qubely_landscape":false,"qubely_portrait":false,"qubely_thumbnail":false},"uagb_author_info":{"display_name":"R\u00e9mi","author_link":"https:\/\/www.webodesign.net\/?author=3"},"uagb_comment_info":0,"uagb_excerpt":"Firewall &#8211; D\u00e9finition des r\u00e8gles IPtables Proc\u00e9dure d&rsquo;installation de NetFilter R\u00e8gles iptables","_links":{"self":[{"href":"https:\/\/www.webodesign.net\/index.php?rest_route=\/wp\/v2\/pages\/1948"}],"collection":[{"href":"https:\/\/www.webodesign.net\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.webodesign.net\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.webodesign.net\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.webodesign.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1948"}],"version-history":[{"count":5,"href":"https:\/\/www.webodesign.net\/index.php?rest_route=\/wp\/v2\/pages\/1948\/revisions"}],"predecessor-version":[{"id":2161,"href":"https:\/\/www.webodesign.net\/index.php?rest_route=\/wp\/v2\/pages\/1948\/revisions\/2161"}],"up":[{"embeddable":true,"href":"https:\/\/www.webodesign.net\/index.php?rest_route=\/wp\/v2\/pages\/658"}],"wp:attachment":[{"href":"https:\/\/www.webodesign.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}