實驗:針對不同的用戶設置不同的共享目錄和權限
vim /etc/samba/smb.conf
[global]
workgroup = WANGGROUP
security = user
netbios name = smbsrv7
passdb backend = tdbsam
log file = /var/log/samba/log.%I
log level = 2
config file = /etc/samba/conf.d/%U
[share]
comment=samba share dir
path=/data/tools
read only = yes
[root@centos7 conf.d]#cat /etc/samba/conf.d/smb2
[share]
path=/data/smb2
writeable=yes
[root@centos7 conf.d]#cat /etc/samba/conf.d/smb3
[share]
path=/data/smb3
實驗:多用戶掛載
client
useradd smb1
useradd smb2
useradd smb3
vim /etc/fstab
//192.168.30.7/share /mnt cifs username=smbshare,password=centos,multiuser 0 0
mount -a
su – smb1
cifscreds add sambaserverip
proxy
isa
GPL
http://www.magedu.com/news
http://www.magedu.com/study/
tcp 80
QQ IP
udp 8000
tcp 443 https://www.baidu.com/
數據www.tencent.com
msn :www
isa server
http://ip/a.vbs
1M
mtu 1500
ethernet(ip(tcp(app(data))))
http tcp80 10
https tcp443 10
web 10
jump
實驗:自定義鏈
使用自定義鏈
iptables -N WEB
iptables -A WEB -p tcp -m multiport –dports 80,443 -j ACCEPT
iptables -I INPUT -s 192.168.30.0/24 -j WEB
iptables -vnL
修改
iptables -R WEB 1 -p tcp -m multiport –dports 80,443,8080 -j ACCEPT
刪除自定義鏈
iptables -D INPUT 1
iptables -D WEB 1
iptables -X WEB
fileshare:samba,ftp,
web:http https
manage:ssh telnet
lamp
client — > apache+php fpm A –> mysql B
manager C
B:
iptables -F
iptables -A INPUT -s AIP -p tcp –dport 3306 -j ACCEPT
iptables -A INPUT -s CIP -p tcp –dport 22 -j ACCEPT
iptables -A INPUT -j REJECT
A:
iptables -F
iptables -A INPUT -i lo -j ACCEPT
iptables -A INPUT -p tcp –dport 80 -j ACCEPT
iptables -A INPUT -s CIP -p tcp –dport 22 -j ACCEPT
iptables -A INPUT -j REJECT
ssh any reject
http source 192.168.30.0/24 accept
-m multport –dports 80,443
iptables -A FORWARD -m time –timestart 1:00 –timestop 10:00 –weekdays 1,3,5 -j REJECT
實驗:實現內網的安全
ptables -A FORWARD -j REJECT
iptables -I FORWARD -m state –state ESTABLISHED,RELATED -j ACCEPT
iptables -I FORWARD 2 -s 192.168.30.0/24 -d 10.0.0.0/8 -m state –state NEW -j ACCEPT
A:10.0.0.0/8
B:172.16.0.0/16 – 172.31.0.0/16 172.16.0.0/12
C:192.168.0.0/24 – 192.168.255.0/24 192.168.0.0/16
實驗:實現SNAT
lan:192.168.30.0/24
nat server:
lan interface:192.168.30.17
wan interface: 10.0.0.254
wan: 10.0.0.0/8
wanserver 10.0.0.10
靜態IP
iptables -t nat -A POSTROUTING -s 192.168.30.0/24 -j SNAT –to-source 10.0.0.254
動態IP
iptables -t nat -A POSTROUTING -s 192.168.30.0/24 -j MASQUERADE
實驗:實現DNAT
iptables -t nat -A PREROUTING -d 10.0.0.254 -p tcp –dport 80 -j DNAT –to-destination 192.168.30.7:8080
實驗:端口轉發
iptables -t nat -A PREROUTING -d 192.168.30.7 -p tcp –dport 80 -j REDIRECT –to-ports 8080
本文來自投稿,不代表Linux運維部落立場,如若轉載,請注明出處:http://www.www58058.com/102079