1- Contenu du script iptables :
[code]###BEGIN INIT INFO
Provides: scriptname
Required-Start: $remote_fs $syslog
Required-Stop: $remote_fs $syslog
Default-Start: 2 3 4 5
Default-Stop: 0 1 6
Short-Description: Start daemon at boot time
Description: Enable service provided by daemon.
END INIT INFO
#!/bin/sh
Vider les tables “filter” actuelles
iptables -t filter -F
Vider les règles personnelles
iptables -t filter -X
Interdire toute connexion entrante et sortante
iptables -t filter -P INPUT DROP
iptables -t filter -P FORWARD DROP
iptables -t filter -P OUTPUT DROP
Autoriser loopback (localhost)
iptables -t filter -A INPUT -i lo -s 127.0.0.0/0 -d 127.0.0.0/0 -j ACCEPT
iptables -t filter -A OUTPUT -o lo -s 127.0.0.0/0 -d 127.0.0.0/0 -j ACCEPT
Ne pas casser les connexions etablies
iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
iptables -A OUTPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
ICMP (Ping)
iptables -t filter -A INPUT -p icmp -j ACCEPT
iptables -t filter -A OUTPUT -p icmp -j ACCEPT
#Proxmox
iptables -t filter -A OUTPUT -p udp --dport 8006 -j ACCEPT
iptables -t filter -A INPUT -p tcp --dport 8006 -j ACCEPT
SSH In
iptables -t filter -A INPUT -p tcp --dport xxxx -j ACCEPT
iptables -t filter -A INPUT -p tcp --dport xxxx -j ACCEPT
SSH Out
iptables -t filter -A OUTPUT -p tcp --dport xxxx -j ACCEPT
iptables -t filter -A OUTPUT -p tcp --dport xxxx -j ACCEPT
DNS In/Out
iptables -t filter -A OUTPUT -p tcp --dport 53 -j ACCEPT
iptables -t filter -A OUTPUT -p udp --dport 53 -j ACCEPT
iptables -t filter -A INPUT -p tcp --dport 53 -j ACCEPT
iptables -t filter -A INPUT -p udp --dport 53 -j ACCEPT
NTP Out : pour la mise a jour automatique de l heure
iptables -t filter -A OUTPUT -p udp --dport 123 -j ACCEPT
Whos is
iptables -t filter -A OUTPUT -p tcp --dport 43 -j ACCEPT
iptables -t filter -A INPUT -p tcp --dport 80 -j ACCEPT
HTTP + HTTPS Out
iptables -t filter -A OUTPUT -p tcp --dport 80 -j ACCEPT
iptables -t filter -A OUTPUT -p tcp --dport 443 -j ACCEPT
HTTP + HTTPS In
iptables -t filter -A INPUT -p tcp --dport 80 -j ACCEPT
iptables -t filter -A INPUT -p tcp --dport 443 -j ACCEPT
iptables -t filter -A INPUT -p tcp --dport 8443 -j ACCEPT
Monit munin :
#iptables -t filter -A INPUT -p tcp --dport 1337 -j ACCEPT
#iptables -A INPUT -p tcp --dport 4949 -j ACCEPT
#iptables -A OUTPUT -p tcp --dport 4949 -j ACCEPT
#FTP
#iptables -t filter -A INPUT -p tcp --dport 20:21 -j ACCEPT
#iptables -t filter -A OUTPUT -p tcp --dport 20:21 -j ACCEPT
#iptables -A INPUT -p tcp -m tcp --dport 49152:65534 -j ACCEPT
Mail SMTP
iptables -t filter -A INPUT -p tcp --dport 25 -j ACCEPT
iptables -t filter -A OUTPUT -p tcp --dport 25 -j ACCEPT
iptables -t filter -A INPUT -p tcp --dport 993 -j ACCEPT
iptables -t filter -A OUTPUT -p tcp --dport 993 -j ACCEPT
iptables -t filter -A OUTPUT -p tcp --dport 465 -j ACCEPT
iptables -t filter -A INPUT -p tcp --dport 465 -j ACCEPT
iptables -t filter -A OUTPUT -p tcp --dport 110 -j ACCEPT
iptables -t filter -A OUTPUT -p tcp --dport 587 -j ACCEPT
iptables -t filter -A OUTPUT -p tcp --dport 587 -j ACCEPT
Teamspeak
#iptables -A INPUT -p udp -m udp --dport xxxx -j ACCEPT
#iptables -A INPUT -p tcp -m tcp --dport xxxx -j ACCEPT
#iptables -A INPUT -p tcp -m tcp --dport xxxx -j ACCEPT
#iptables -A OUTPUT -p tcp -m tcp --dport xxxx -j ACCEPT
#w00tw00t
iptables -I INPUT -d xx.xx.xx.xx -p tcp --dport 80 -m string --to 70 --algo bm --string ‘GET /w00tw00t.at.ISC.SANS.’ -j DROP
##############BAN BAN BAN BAN BAN#####################
iptables -A INPUT -s 220.255.1.202 -j DROP
iptables -A INPUT -s 220.255.1.236 -j DROP
iptables -A INPUT -s 114.44.104.11 -j DROP
iptables -A INPUT -s 114.44.105.57 -j DROP
iptables -A INPUT -s 118.167.2.206 -j DROP
iptables -A INPUT -s 118.167.8.246 -j DROP
iptables -A INPUT -s 118.167.97.19 -j DROP
iptables -A INPUT -s 118.168.128.126 -j DROP
iptables -A INPUT -s 201.254.96.72 -j DROP
[/code]
2 - Le code est exécuté sur la machine hôte
3 - Sortie de iptables-save de la machine hôte :
[code]# Generated by iptables-save v1.4.8 on Wed Nov 14 18:32:03 2012
*nat
:PREROUTING ACCEPT [898:95185]
:POSTROUTING ACCEPT [384:23308]
:OUTPUT ACCEPT [997:145925]
-A POSTROUTING -s 10.0.0.3/32 -o vmbr0 -j MASQUERADE
COMMIT
Completed on Wed Nov 14 18:32:03 2012
Generated by iptables-save v1.4.8 on Wed Nov 14 18:32:03 2012
*mangle
:PREROUTING ACCEPT [766782:141939072]
:INPUT ACCEPT [765153:141732285]
:FORWARD ACCEPT [28:1859]
:OUTPUT ACCEPT [800318:152845356]
:POSTROUTING ACCEPT [795746:151909438]
COMMIT
Completed on Wed Nov 14 18:32:03 2012
Generated by iptables-save v1.4.8 on Wed Nov 14 18:32:03 2012
*filter
:INPUT DROP [950:210505]
:FORWARD DROP [16:1062]
:OUTPUT DROP [4584:936715]
-A INPUT -d xx.xx.xx.xx/32 -p tcp -m tcp --dport 80 -m string --string “GET /w00tw00t.at.ISC.SANS.” --algo bm --to 70 -j DROP
-A INPUT -i lo -j ACCEPT
-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -p icmp -j ACCEPT
-A INPUT -p tcp -m tcp --dport 8006 -j ACCEPT
-A INPUT -i eth0 -j ACCEPT
-A INPUT -p tcp -m tcp --dport xxxx -j ACCEPT
-A INPUT -p tcp -m tcp --dport xxxx -j ACCEPT
-A INPUT -p tcp -m tcp --dport 53 -j ACCEPT
-A INPUT -p udp -m udp --dport 53 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 8443 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 25 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 993 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 465 -j ACCEPT
-A INPUT -s 220.255.1.202/32 -j DROP
-A INPUT -s 220.255.1.236/32 -j DROP
-A INPUT -s 114.44.104.11/32 -j DROP
-A INPUT -s 114.44.105.57/32 -j DROP
-A INPUT -s 118.167.2.206/32 -j DROP
-A INPUT -s 118.167.8.246/32 -j DROP
-A INPUT -s 118.167.97.19/32 -j DROP
-A INPUT -s 118.168.128.126/32 -j DROP
-A INPUT -s 201.254.96.72/32 -j DROP
-A INPUT -s 121.179.146.9/32 -j DROP
-A INPUT -s 119.39.244.178/32 -j DROP
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A OUTPUT -p icmp -j ACCEPT
-A OUTPUT -p udp -m udp --dport 8006 -j ACCEPT
-A OUTPUT -p tcp -m tcp --dport xxxx -j ACCEPT
-A OUTPUT -p tcp -m tcp --dport xxxx -j ACCEPT
-A OUTPUT -p tcp -m tcp --dport 53 -j ACCEPT
-A OUTPUT -p udp -m udp --dport 53 -j ACCEPT
-A OUTPUT -p udp -m udp --dport 123 -j ACCEPT
-A OUTPUT -p tcp -m tcp --dport 43 -j ACCEPT
-A OUTPUT -p tcp -m tcp --dport 80 -j ACCEPT
-A OUTPUT -p tcp -m tcp --dport 443 -j ACCEPT
-A OUTPUT -p tcp -m tcp --dport 25 -j ACCEPT
-A OUTPUT -p tcp -m tcp --dport 993 -j ACCEPT
-A OUTPUT -p tcp -m tcp --dport 465 -j ACCEPT
-A OUTPUT -p tcp -m tcp --dport 110 -j ACCEPT
-A OUTPUT -p tcp -m tcp --dport 587 -j ACCEPT
-A OUTPUT -p tcp -m tcp --dport 587 -j ACCEPT
COMMIT
Completed on Wed Nov 14 18:32:03 2012
[/code]
4 - aptitude est effectué sur la machine virtuelle (pour tester si j’ai la connection à internet je fais comme ça… ya peut-être d’autres moyens 
5- Sortie de ifconfig sur la machine hôte
[code]dummy0 Link encap:Ethernet HWaddr ee:fe:74:67:e8:88
inet6 addr: fe80::ecfe:74ff:fe67:e888/64 Scope:Link
UP BROADCAST RUNNING NOARP MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:363 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:0 (0.0 B) TX bytes:23994 (23.4 KiB)
eth0 Link encap:Ethernet HWaddr 00:25:90:7c:68:40
inet6 addr: fe80::225:90ff:fe7c:6840/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:376093 errors:0 dropped:0 overruns:0 frame:0
TX packets:346550 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:150205783 (143.2 MiB) TX bytes:80629554 (76.8 MiB)
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:468151 errors:0 dropped:0 overruns:0 frame:0
TX packets:468151 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:77036668 (73.4 MiB) TX bytes:77036668 (73.4 MiB)
venet0 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
inet6 addr: fe80::1/128 Scope:Link
UP BROADCAST POINTOPOINT RUNNING NOARP MTU:1500 Metric:1
RX packets:256 errors:0 dropped:0 overruns:0 frame:0
TX packets:291 errors:0 dropped:3 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:38135 (37.2 KiB) TX bytes:24912 (24.3 KiB)
vmbr0 Link encap:Ethernet HWaddr 00:25:90:7c:68:40
inet addr:IP_hote Bcast:xx.xx.xx.255 Mask:255.255.255.0
inet6 addr: fe80::225:90ff:fe7c:6840/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:364390 errors:0 dropped:0 overruns:0 frame:0
TX packets:331339 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:144078216 (137.4 MiB) TX bytes:79787202 (76.0 MiB)
vmbr1 Link encap:Ethernet HWaddr ee:fe:74:67:e8:88
inet6 addr: fe80::ecfe:74ff:fe67:e888/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:6 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:0 (0.0 B) TX bytes:468 (468.0 B)
[/code]
6 - sortie de ifconfig sur la machine distante :
[code]lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:60 errors:0 dropped:0 overruns:0 frame:0
TX packets:60 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:4838 (4.7 KiB) TX bytes:4838 (4.7 KiB)
venet0 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
inet addr:127.0.0.2 P-t-P:127.0.0.2 Bcast:0.0.0.0 Mask:255.255.255.255
UP BROADCAST POINTOPOINT RUNNING NOARP MTU:1500 Metric:1
RX packets:338 errors:0 dropped:0 overruns:0 frame:0
TX packets:291 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:29989 (29.2 KiB) TX bytes:43248 (42.2 KiB)
venet0:0 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
inet addr:10.0.0.3 P-t-P:10.0.0.3 Bcast:0.0.0.0 Mask:255.255.255.255
UP BROADCAST POINTOPOINT RUNNING NOARP MTU:1500 Metric:1
[/code]
Voila !