[네트워크][보안] 클루닉스 내부 Bridge 서버 구축

Firewall + NAT를 동시에 지원하는 Bridge 구성을 위한 guide.

Bridge type의 장점 : FW 고장시 router에서 Hub로 직접 선을 연결하면 문제없이 사용

가능하다.

1. Bridge Firewall 구성

  – Hardware

    – 2 NIC

    – 저 사양의 PC로 가능

  – Network 구성

    – GW <-> Bridge_FW <-> Hub <-> nodes

    – Bridge_FW은 NAT(Masquerading)를 위해서 private ip하나와 public ip하나가

      필요하다.

      – private ip : 192.168.12.254

      – public ip : 211.241.202.253

2. redhat 7.3 + compact rpm install

  – bridge 구성을 위한 component

    – kernel (bridge enabled) > 2.4.18-3

    – bridge-utils-0.9.3-4.i386.rpm

3. Make Bridge

  Bridge는 bridge-utils rpm에 있는 brctl로 bridge interface를 만든다. 두개의

NIC으로 하나의 bridge interface(br0)를 만들 수 있다.

  

  brctl addbr br0

  brctl addif br0 eth0

  brctl addif br0 eth1

  bridge는 기본적으로 두 개의 ethernet segment를 연결하는 장치로, 장비 자체의

  주소는 필요없다. 하지만 firewall 관리 및 NAT를 위해 IP가 필요하다.

  필요한 IP 설정은 bridge를 위한 script에서 설정한다.

  

  – chkconfig –del network

  – eth0, eth1은 ip를 갖지 않으므로 booting시에 사용하지 않는다.

    /etc/sysconfig/network-scripts/ifcfg-eth{0,1}

    

/etc/sysconfig/network-scripts/ifcfg-eth1 :

# As eth0 will be tied to bridge(br0 interface),

# this must be activated with no IP addr

# Donghyun Kim <ryan@clunix.com> 2002.09.24

DEVICE=eth0

ONBOOT=no

/etc/sysconfig/network-scripts/ifcfg-eth1 :

# As eth1 will be tied to bridge(br0 interface),

# this must be activated with no IP addr

# Donghyun Kim <ryan@clunix.com> 2002.09.24

DEVICE=eth1

ONBOOT=no

  – bridge interface에 public, private 두개의 ip를 지정한다.

    /etc/sysconfig/network-scripts/ifcfg-{br0,br0:priv}

/etc/sysconfig/network-scripts/ifcfg-br0 :

# This is bridge interface tied with eth0/eth1

# bridge interface must be setup before activation by /etc/rc.d/init/bridge :

#   – brctl addbr br0

#   – brctl addif eth0

#   – brctl addif eth1

# Donghyun Kim <ryan@clunix.com> 2002.09.24

DEVICE=br0

IPADDR=211.241.202.253

NETMASK=255.255.255.128

ONBOOT=yes

/etc/sysconfig/network-scripts/ifcfg-br0:priv :

# This is bridge interface tied with eth0/eth1

# bridge interface must be setup before activation :

#   brctl addbr br0

#   brctl addif eth0

#   brctl addif eth1

# Donghyun Kim <ryan@clunix.com> 2002.09.24

DEVICE=br0:priv

IPADDR=192.168.12.254

NETMASK=255.255.255.0

ONBOOT=yes

  – bridge interface를 만들고 lo, br0 interface를 ifup/ifdown을 사용하여

    설정한다. 이때 bridge를 동작시키기 위해서는 br0, eth0, eth1 모두 UP

    상태이어야 한다.

    init-script style의 bridge를 다음과 같이 만든다.

/etc/rc.d/init.d/bridge :

#! /bin/sh

#

# bridge        Start/Stop Ethernet Bridge interface with 2 ethernet NIC

#

# chkconfig: 2345 9 91

# description:  Ethernet Bridge for transparent(bridge) Firewall

#               make bridge interface(br0) and tie 2 NIC to br0 and

#               setup firewall & NAT(MASQUERADE) of iptables

#

# Donghyun Kim <ryan@clunix.com> 2002.09.25

#

# Source function library.

. /etc/init.d/functions

# Source Network config

. /etc/sysconfig/network

# Check that networking is up.

if [ ${NETWORKING} = “no” ]

then

        exit 0

fi

[ -x /usr/sbin/brctl ] || exit 0

RETVAL=0

start() {

        # check /var/lock/subsys/bridge file

        if [ -f /var/lock/subsys/bridge ] ; then

                return

        fi

        # make bridge interface

        echo -n $”Starting Bridge: ”

        /usr/sbin/brctl addbr br0 > /dev/null 2>&1 &&

        /usr/sbin/brctl addif br0 eth0 > /dev/null 2>&1 &&

        /usr/sbin/brctl addif br0 eth1 > /dev/null 2>&1

        RETVAL=$?

        if [ $RETVAL -eq 0 ] ; then

                success “bridge startup”

        else

                failure “bridge startup”

        fi

        echo

        # start networking of bridge

        echo -n $”Starting Network of Bridge: ”

        ifup lo && ifconfig eth0 0.0.0.0 && \\

          ifconfig eth1 0.0.0.0 && ifup br0

        RETVAL=$?

        [ $RETVAL -eq 0 ] && success “Network of bridge startup” || failure

“Network of bridge startup”

        echo

        touch /var/lock/subsys/bridge

        return $RETVAL

}

stop() {

        # check /var/lock/subsys/bridge file

        if [ ! -f /var/lock/subsys/bridge ] ; then

                return

        fi

        # stop networking of bridge

        echo -n $”Stopping Network of bridge: ”

        ifdown br0 && ifconfig eth1 down && ifconfig eth0 down && ifdown lo

        RETVAL=$?

        [ $RETVAL -eq 0 ] && success “Network of bridge stopping” || failure

“Network of bridge stopping”

        echo

        # stop bridge interface

        echo -n $”Stopping Bridge: ”

        /usr/sbin/brctl delif br0 eth1 > /dev/null 2>&1 &&

        /usr/sbin/brctl delif br0 eth0 > /dev/null 2>&1 &&

        /usr/sbin/brctl delbr br0 > /dev/null 2>&1

        RETVAL=$?

        if [ $RETVAL -eq 0 ] ; then

                success “bridge stopping”

        else

                failure “bridge stopping”

        fi

        echo

        rm -f /var/lock/subsys/bridge

        return $RETVAL

}

# See how we were called.

case “$1” in

  start)

        start

        ;;

  stop)

        stop

        ;;

  status)

        /usr/sbin/brctl show

        ;;

  restart)

        stop

        sleep 2

        start

        ;;

  *)

        echo  $”Usage: $0 {start|stop|status|restart}”

        exit 1

esac

exit $RETVAL

  – 먼저 bridge를 실행하여 network enable을 한 뒤에 iptables를 사용한

    filtering을 구성한다.

    1. default policy를 설정한다.

    2. 명시적인 drop(refuse)시 로그를 남기고 REJECT를 위한 refuse chain 구성

    3. 모든 internal node에 적용할 global protocol chain을 구성한다.

      – icmp : icmp-type 0,3,5,8,11 accept

      – udp : edonkey, 소리바다 accept

      – tcp : MSN, edonkey, 소리바다 accept

    4. ip_conntrack (stateful inspection) 기능으로 connection mapping을 유지

      – “-m state –state …”

      – internal -> external로 맺어진 connection을 tracking해서 쌍방향 유지

/etc/rc.d/init.d/firewall

#! /bin/sh

#

# firewall      Start/Stop firewall with iptables

#

# chkconfig: 2345 99 99

# description:  Clunix Firewall filtering & NAT with iptables

#

# Donghyun Kim <ryan@clunix.com> 2002.09.25

#

# Source function library.

. /etc/init.d/functions

# Source Network config

. /etc/sysconfig/network

# Check that networking is up.

if [ ${NETWORKING} = “no” ]

then

        exit 0

fi

[ -x /sbin/iptables ] || exit 0

RETVAL=0

start() {

        # check /var/lock/subsys/firewall file

        if [ -f /var/lock/subsys/firewall ] ; then

                return

        fi

        # print “start firewall” msg

        echo -n $”Starting Firewall: ”

        #

        # start firewall & NAT

        #

        modprobe ip_conntrack_ftp

        modprobe ip_nat_ftp

        echo 1 > /proc/sys/net/ipv4/ip_forward

        #

        # init iptables

        #

        # flush all chains

        iptables -F

        iptables -X

        chains=`cat /proc/net/ip_tables_names 2>/dev/null`

        for i in $chains

        do

                iptables -t $i -F

                iptables -t $i -X

                iptables -t $i -Z

        done

        ######################################################################

        # set default policies

        ######################################################################

        # firewall itself : output only

        iptables -P INPUT DROP

        iptables -P OUTPUT ACCEPT

        # firewall filtering

        iptables -P FORWARD DROP

        ######################################################################

        # User defined chains

        ######################################################################

        #

        # refuse :

        # explicit refuse chains

        # logging to /var/log/firewall (via syslog kern.debug) & reject

        #

        iptables -N refuse

        iptables -A refuse ! -i eth1 -m limit –limit 1/m -j LOG \\

          –log-prefix “refused: ” –log-level debug

        iptables -A refuse -p tcp -m limit –limit 10/s -j REJECT \\

          –reject-with tcp-reset

        iptables -A refuse -p udp -m limit –limit 10/s -j REJECT

        iptables -A refuse -j DROP

        #

        # global_icmp :

        # specified ICMP packets are accepted globally

        #

        # accept following icmp pkt

        #  –  0 : echo reply

        #  –  3 : dest unreachable

        #  –  5 : redirect

        #  –  8 : echo request

        #  – 11 : time exceed

        iptables -N global_icmp

        iptables -A global_icmp -p icmp –icmp-type 0 -j ACCEPT

        iptables -A global_icmp -p icmp –icmp-type 3 -j ACCEPT

        iptables -A global_icmp -p icmp –icmp-type 5 -j ACCEPT

        iptables -A global_icmp -p icmp –icmp-type 8 -j ACCEPT

        iptables -A global_icmp -p icmp –icmp-type 11 -j ACCEPT

        #

        # global_udp :

        # specified udp packets are accepted globally

        #

        iptables -N global_udp

        # edoneky (4661-4663/tcp, 4665/udp) for all PC

        iptables -A global_udp -p udp –dport 4665 -j ACCEPT

        #

        # global_tcp :

        # specified tcp packets (that is valid) are accepted globally

        #

        # specified tcp packets (that is valid) are accepted globally

        #

        iptables -N global_tcp

        # accept tcp syn pkt

        iptables -A global_tcp -p tcp –syn -j ACCEPT

        # drop new pkt that has no syn

        iptables -A global_tcp -p tcp ! –syn -m state –state NEW -j DROP

        # MSN file transfer (6891-6900/tcp) for all PC

        # http://support.microsoft.com/default.aspx?scid=KB;EN-US;Q278887&

        iptables -A global_tcp -p tcp –dport 6891:6900 -j ACCEPT

        # edoneky (4661-4663/tcp, 4665/udp) for all PC

        iptables -A global_tcp -p tcp –dport 4661:4663 -j ACCEPT

        #

        # open :

        # accept connection by each server:port

        #

        iptables -N open

        # ares (211.241.202.129) : smtp(25/tcp), wts(3389/tcp)

        iptables -A open -p tcp -d 211.241.202.129 –dport 25 -j ACCEPT

        iptables -A open -p tcp -d 211.241.202.129 –dport 3389 -j ACCEPT

        # dev (211.241.202.133) : ssh(22/tcp), dns(53/udp)

        iptables -A open -p tcp -d 211.241.202.133 –dport 22 -j ACCEPT

        iptables -A open -p udp -d 211.241.202.133 –dport 53 -j ACCEPT

        # master (211.241.202.134) : ftp(21/tcp), ssh(22/tcp)

        iptables -A open -p tcp -d 211.241.202.134 –dport 21 -j ACCEPT

        iptables -A open -p tcp -d 211.241.202.134 –dport 22 -j ACCEPT

        # wts (211.241.202.245) : wts(3389/tcp)

        iptables -A open -p tcp -d 211.241.202.245 –dport 3389 -j ACCEPT

        # wts.manpa.net (211.241.202.135) : http(80/tcp) wts(3389/tcp)

        iptables -A open -p tcp -d 211.241.202.135 –dport 80 -j ACCEPT

        iptables -A open -p tcp -d 211.241.202.135 –dport 3389 -j ACCEPT

        # tech (211.241.202.221) : http(80/tcp), ftp(21/tcp)

        iptables -A open -p tcp -d 211.241.202.221 –dport 80 -j ACCEPT

        iptables -A open -p tcp -d 211.241.202.221 –dport 21 -j ACCEPT

        # 서진우 서버 (211.241.202.223) : ftp(21/tcp), ssh(22/tcp)

        iptables -A open -p tcp -d 211.241.202.221 –dport 21 -j ACCEPT

        iptables -A open -p tcp -d 211.241.202.221 –dport 22 -j ACCEPT

        # 서진우 PC 211.241.202.152 :

        #   ftp(21/tcp), ssh(22/tcp), http(80/tcp), wts(3389/tcp)

        iptables -A open -p tcp -d 211.241.202.152 –dport 21 -j ACCEPT

        iptables -A open -p tcp -d 211.241.202.152 –dport 22 -j ACCEPT

        iptables -A open -p tcp -d 211.241.202.152 –dport 80 -j ACCEPT

        # 기술팀 개인별 서버 : 서진우 요청

        #   211.241.202.151,153,154,155 : wts(3389/tcp)

        iptables -A open -p tcp -d 211.241.202.151 –dport 3389 -j ACCEPT

        iptables -A open -p tcp -d 211.241.202.153 –dport 3389 -j ACCEPT

        iptables -A open -p tcp -d 211.241.202.154 –dport 3389 -j ACCEPT

        iptables -A open -p tcp -d 211.241.202.155 –dport 3389 -j ACCEPT

        iptables -A open -p tcp -d 211.241.202.154 –dport 3389 -j ACCEPT

        iptables -A open -p tcp -d 211.241.202.155 –dport 3389 -j ACCEPT

        ######################################################################

        # FORWARD chain rules

        ######################################################################

        # accept all packets from internal network (eth1)

        iptables -A FORWARD -p ALL -i eth1 -j ACCEPT

        # accept all packets from in/out according to stateful-inspection

        iptables -A FORWARD -m state –state ESTABLISHED,RELATED -j ACCEPT

        # accept specified icmp packets by global_icmp chain

        iptables -A FORWARD -p icmp -j global_icmp

        # accept specified udp packets by global_udp chain

        iptables -A FORWARD -p udp -j global_udp

        # accept specified tcp packets by global_tcp chain

        iptables -A FORWARD -p tcp -j global_tcp

        # accept packets by server:port

        iptables -A FORWARD -j open

        # otherwise, refuse it

        iptables -A FORWARD -j refuse

        ######################################################################

        # INPUT/OUTPUT chain rules for firewall itself

        #                                     (211.241.202.253/192.168.12.254)

        ######################################################################

        #   br0 : ssh(22/tcp), global_icmp

        #   lo : accept all in/out

        #

        # accept all pkt from local loopback interface

        iptables -A INPUT -i lo -j ACCEPT

        # accept all packets by stateful-inspection

        iptables -A INPUT -m state –state ESTABLISHED,RELATED -j ACCEPT

        # filter by global icmp pkt

        iptables -A INPUT -p icmp -j global_icmp

        # filter by  global tcp pkt

        iptables -A INPUT -p tcp -j global_tcp

        # accept only ssh(22/tcp) pkt

        iptables -A INPUT -p tcp -i eth1 –dport 22 -j ACCEPT

        # otherwise, refuse pkt

        iptables -A INPUT -j refuse

        # accept all out pkt

        iptables -A OUTPUT -o br0 -j ACCEPT

        iptables -A OUTPUT -o lo -j ACCEPT

        ######################################################################

        # for NAT(masquerade) 192.168.12.0/24 -> 211.241.202.253 via firewall

        ######################################################################

        #

        # masquerade

        #

        iptables -t nat -A POSTROUTING -s 192.168.12.0/24 -j MASQUERADE

        # print “firewall startup” msg

        [ $? -eq 0 ] && success “firewall startup” || \\

        # print “firewall startup” msg

        [ $? -eq 0 ] && success “firewall startup” || \\

          failure “firewall startup”

        echo

        # lock

        touch /var/lock/subsys/firewall

}

stop() {

        # check /var/lock/subsys/firewall file

        if [ ! -f /var/lock/subsys/firewall ] ; then

                return

        fi

        # print “stop firewall” msg

        echo -n $”Stopping Firewall: ”

        #

        # flush & delete iptables rules

        #

        chains=`cat /proc/net/ip_tables_names 2>/dev/null`

        for i in $chains

        do

                iptables -t $i -F

                iptables -t $i -X

        done

        iptables -P INPUT ACCEPT && \\

        iptables -P OUTPUT ACCEPT && \\

        iptables -P FORWARD ACCEPT && \\

        iptables -t nat -P PREROUTING ACCEPT && \\

        iptables -t nat -P POSTROUTING ACCEPT && \\

        iptables -t nat -P OUTPUT ACCEPT && \\

        iptables -t mangle -P PREROUTING ACCEPT && \\

        iptables -t mangle -P OUTPUT ACCEPT

        #

        # start firewall & NAT

        #

        echo 0 > /proc/sys/net/ipv4/ip_forward

        rmmod ip_nat_ftp

        rmmod ip_conntrack_ftp

        # print “firewall stop” msg

        [ $? -eq 0 ] && success “firewall stop” || failure “firewall stop”

        echo

        # unlock

        rm -f /var/lock/subsys/firewall

}

# See how we were called.

case “$1” in

  start)

        start

        ;;

  stop)

        stop

        ;;

  status)

        /sbin/iptables -L INPUT

        /sbin/iptables -L OUTPUT

        /sbin/iptables -L FORWARD

        ;;

  restart)

        stop

        sleep 1

        start

        ;;

  *)

        echo  $”Usage: $0 {start|stop|status|restart}”

        exit 1

esac

exit $RETVAL

서진우

슈퍼컴퓨팅 전문 기업 클루닉스/ 상무(기술이사)/ 정보시스템감리사/ 시스존 블로그 운영자

You may also like...

1 Response

  1. 2024년 10월 13일

    … [Trackback]

    […] Find More on to that Topic: nblog.syszone.co.kr/archives/494 […]

페이스북/트위트/구글 계정으로 댓글 가능합니다.