Added firewall rule for node exporters

This commit is contained in:
Random936 2025-02-10 20:08:14 -08:00
parent 5ff34bbfc6
commit 73bfe6d1f7
3 changed files with 104 additions and 103 deletions

View File

@ -1,109 +1,108 @@
%YAML 1.1 %YAML 1.1
--- ---
vars:
address-groups:
HOME_NET: "[192.168.100.0/24]"
EXTERNAL_NET: "!$HOME_NET"
HTTP_SERVERS: "$HOME_NET"
SMTP_SERVERS: "$HOME_NET"
SQL_SERVERS: "$HOME_NET"
DNS_SERVERS: "$HOME_NET"
TELNET_SERVERS: "$HOME_NET"
AIM_SERVERS: "$EXTERNAL_NET"
DC_SERVERS: "$HOME_NET"
DNP3_SERVER: "$HOME_NET"
DNP3_CLIENT: "$HOME_NET"
MODBUS_CLIENT: "$HOME_NET"
MODBUS_SERVER: "$HOME_NET"
ENIP_CLIENT: "$HOME_NET"
ENIP_SERVER: "$HOME_NET"
port-groups:
HTTP_PORTS: "80"
SHELLCODE_PORTS: "!80"
ORACLE_PORTS: 1521
SSH_PORTS: 22
DNP3_PORTS: 20000
MODBUS_PORTS: 502
FILE_DATA_PORTS: "[$HTTP_PORTS,110,143]"
FTP_PORTS: 21
GENEVE_PORTS: 6081
VXLAN_PORTS: 4789
TEREDO_PORTS: 3544
SIP_PORTS: "[5060, 5061]"
vars: default-log-dir: /home/logging/logs
address-groups: classification-file: /etc/suricata/classification.config
HOME_NET: "[192.168.100.0/24]" reference-config-file: /etc/suricata/reference.config
EXTERNAL_NET: "!$HOME_NET" default-rule-path: /etc/suricata/rules
HTTP_SERVERS: "$HOME_NET" rule-files:
SMTP_SERVERS: "$HOME_NET" - suricata.rules
SQL_SERVERS: "$HOME_NET"
DNS_SERVERS: "$HOME_NET"
TELNET_SERVERS: "$HOME_NET"
AIM_SERVERS: "$EXTERNAL_NET"
DC_SERVERS: "$HOME_NET"
DNP3_SERVER: "$HOME_NET"
DNP3_CLIENT: "$HOME_NET"
MODBUS_CLIENT: "$HOME_NET"
MODBUS_SERVER: "$HOME_NET"
ENIP_CLIENT: "$HOME_NET"
ENIP_SERVER: "$HOME_NET"
port-groups:
HTTP_PORTS: "80"
SHELLCODE_PORTS: "!80"
ORACLE_PORTS: 1521
SSH_PORTS: 22
DNP3_PORTS: 20000
MODBUS_PORTS: 502
FILE_DATA_PORTS: "[$HTTP_PORTS,110,143]"
FTP_PORTS: 21
GENEVE_PORTS: 6081
VXLAN_PORTS: 4789
TEREDO_PORTS: 3544
SIP_PORTS: "[5060, 5061]"
default-log-dir: /home/logging/logs stats:
classification-file: /etc/suricata/classification.config enabled: yes
reference-config-file: /etc/suricata/reference.config
default-rule-path: /etc/suricata/rules
rule-files:
- suricata.rules
stats: af-packet:
enabled: yes - interface: enp6s18
use-mmap: yes
tpacket-v3: yes
cluster-id: 99
cluster-type: cluster_flow
defrag: yes
af-packet: outputs:
- interface: enp6s18 - fast:
use-mmap: yes enabled: yes
tpacket-v3: yes filename: fast.log
cluster-id: 99 append: yes
cluster-type: cluster_flow
defrag: yes
outputs: - eve-log:
- fast: enabled: yes
enabled: yes filetype: regular
filename: fast.log filename: eve.json
append: yes types:
- alert:
tagged-packets: yes
- http:
extended: yes
- http2
- dns:
enabled: yes
- tls:
extended: yes
- flow
- mqtt
- ssh
- dhcp:
enabled: yes
- arp:
enabled: yes
- ldap
- quic
- sip
- rfb
- snmp
- bittorrent-dht
- krb5
- dcerpc
- ike
- tftp
- smb
- nfs
- rdp
- ftp
- websocket
- smtp
- eve-log: - pcap-log:
enabled: yes enabled: yes
filetype: regular filename: log.pcap
filename: eve.json limit: 1gb
types: max-files: 20
- alert:
tagged-packets: yes
- http:
extended: yes
- http2
- dns:
enabled: yes
- tls:
extended: yes
- flow
- mqtt
- ssh
- dhcp:
enabled: yes
- arp:
enabled: yes
- ldap
- quic
- sip
- rfb
- snmp
- bittorrent-dht
- krb5
- dcerpc
- ike
- tftp
- smb
- nfs
- rdp
- ftp
- websocket
- smtp
- pcap-log: - stats:
enabled: yes enabled: yes
filename: log.pcap filename: stats.log
limit: 1gb append: yes
max-files: 20 totals: yes
threads: no
- stats:
enabled: yes
filename: stats.log
append: yes
totals: yes
threads: no

View File

@ -14,6 +14,8 @@
enable = true; enable = true;
port = 9002; port = 9002;
enabledCollectors = [ "systemd" "processes" ]; enabledCollectors = [ "systemd" "processes" ];
openFirewall = true;
firewallFilter = "-s 192.168.100.41 -p tcp -m tcp --dport 9002";
}; };
system.stateVersion = "24.05"; system.stateVersion = "24.05";

View File

@ -17,7 +17,7 @@ in {
}; };
networking.nameservers = [ gateway_ip ]; networking.nameservers = [ gateway_ip ];
networking.firewall.allowedTCPPorts = open_ports ++ [9002]; networking.firewall.allowedTCPPorts = open_ports;
networking.interfaces.enp6s18.ipv4.addresses = [ networking.interfaces.enp6s18.ipv4.addresses = [
{ {
address = ip_address; address = ip_address;