User Tools

Site Tools


private:network:home

Network

Map

map.svg

Addresses

Prefix is 192.168.0.

  • 1 : gateway (FB)
  • 2-63 : DHCP range
  • 64 : YPC
  • 65-127 : fixed address range for production devices
  • 128 : YS
  • 129-199 : experimental fixed address range
  • 200-254 : home automation devices with fixed addresses

Peggy private network

  • YS:eth0 : ypn
  • YS:eth1 : peggy (cross, ip = 10.0.0.1 static)
CF : gate:/etc/init.d/firewall

System security config

# Spoof protection (reverse path filter)
net.ipv4.conf.default.rp_filter = 1
net.ipv4.conf.all.rp_filter = 1
 
# Log malformed IP addresses
net.ipv4.conf.all.log_martians = 1
 
# Do not disable ICMP redirects ! (Peggy router)
#net.ipv4.conf.all.send_redirects = 0
 
# Do not disable source routed packets (Peggy router)
#net.ipv4.conf.all.accept_source_route = 0
#net.ipv6.conf.all.accept_source_route = 0
 
# Disable acceptance of ICMP redirects
net.ipv4.conf.all.accept_redirects = 0
net.ipv6.conf.all.accept_redirects = 0
 
# Turn on protection from Denial of Service (DOS) attacks
net.ipv4.tcp_syncookies = 1
 
# Do not disable responding to ping broadcasts
#net.ipv4.icmp_echo_ignore_broadcasts = 1
 
# Enable IP routing. Required if your firewall is protecting a
# network, NAT included
net.ipv4.ip_forward = 1

DNSMasq config

# Don't forward queries for names, only for full domains
domain-needed
 
# Eth interface
interface=eth1
 
# Local domain
domain=peggy.private.network
 
# DNS cache size
cache-size=256
 
# DHCP range
dhcp-range=10.0.0.2,10.0.0.31,24h
 
# NetMask
dhcp-option=1,255.255.255.0
 
# Local domain
dhcp-option=40,peggy.private.network
 
# Release on shutdown for M$ clients
dhcp-option=vendor:MSFT,2,li
 
# We are the only DHCP on this network
dhcp-authoritative

IPTables config script (@startup / eth1 up)

#!/bin/bash
 
## Reset
iptables -F
iptables -X
 
## User chains
iptables -N valid-src
iptables -N valid-dst
 
## Allow open connection to receive RX data
iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
 
## Allow open connection to receive TX data
iptables -A OUTPUT -m state ! --state INVALID -j ACCEPT
 
## Loopback
iptables -I INPUT -i lo -j ACCEPT
 
## Verify src/dest
iptables -A INPUT   -i eth1 -j valid-src
iptables -A FORWARD -i eth1 -j valid-src
iptables -A OUTPUT  -o eth1 -j valid-dst
iptables -A FORWARD -o eth1 -j valid-dst
 
## Drops
 
# Broadcast (RFC 1700) "this" network
iptables -A valid-src -d 0.0.0.0/8 -j DROP
 
# Local network gateway
iptables -A valid-src -d 10.0.0.1 --dport 23 -j DROP
iptables -A valid-src -d 10.0.0.1 --dport 25 -j DROP
iptables -A valid-src -d 10.0.0.1 --dport 26912 -j DROP
 
# Local network (RFC 1918)
iptables -A valid-src -d 10.0.0.0/8 -j DROP
 
# Loopback
iptables -A valid-src -d 127.0.0.0/8 -j DROP
 
# Autoconfig
iptables -A valid-src -d 169.254.0.0/16 -j DROP
 
# Local network (RFC 1918)
iptables -A valid-src -d 172.16.0.0/12 -j DROP
 
# Local network (RFC 1918)
iptables -A valid-src -d 192.168.0.0/16 -j DROP
 
# Multicast (RFC 5771)
iptables -A valid-src -d 224.0.0.0/4 -j DROP
 
# Local network (RFC 1918)
iptables -A valid-src -d 240.0.0.0/5 -j DROP
 
# Local network (RFC 1918)
iptables -A valid-src -s 255.255.255.255 -j DROP
 
iptables -A valid-dst -s 224.0.0.0/4 -j DROP
private/network/home.txt · Last modified: 2022/06/30 21:13 by 127.0.0.1