11-06-2001
Consider using a 2.4 kernal so that you can take advantage of iptables which is easier and more powerful. You can do a lot of things in iptable much more simply than ipchains, and since it is session based (unlike ipchains which is sessionless) it can detect some attacks much better than ipchains.
10 More Discussions You Might Find Interesting
1. Cybersecurity
Hello,
I in the process of installing a firewall. I'm new to this topic and would like to know if someone can point me in the right direction.
I'm running Solaris 8.
Thanks in advance. (2 Replies)
Discussion started by: sunoracle
2 Replies
2. Shell Programming and Scripting
plz help me, i need to configure my firewall with using shell script, i am using unix fedora 9. thanks ppl. replys would be great. (1 Reply)
Discussion started by: king_jon85
1 Replies
3. Shell Programming and Scripting
HI All,
I need a script to reboot a linux box from a windows box.
The script needs to run automatically whenever a sitescope alerts with an error message.
Have searched for this in the forums, but could not get something relative.
Pls. let me know the various alternatives we have to do... (2 Replies)
Discussion started by: Crazy_murli
2 Replies
4. UNIX for Dummies Questions & Answers
I am a novice to linux and unix and command line, I am willing to jump in head first. I have a couple older computers, one is a dell XPS with a P2 Proccessor and th other is a old old sony VIAO. I have a small home network 3 computers...i have my DSL modem then thats connected to my wireless... (2 Replies)
Discussion started by: Tabryan07
2 Replies
5. UNIX for Advanced & Expert Users
Hi all,
I need to send mail to a particular email id using a local mail server.This mail shall contain the content of a file. I don't have any idea how to do it. Can anyone guide me ,where to start proceeding for it. Any guide or study material would appreciated. (1 Reply)
Discussion started by: amit_kv1983
1 Replies
6. Cybersecurity
HI all,
I have setup IPTables firewall/Router and my home network, with address space 192.168.10.XXX
Form my private network hosts, i can ping the gateway ( 192.168.10.101 ) , but the reverse is not happening.
Can someone help me as of what i need to do, so that i can ping my private... (1 Reply)
Discussion started by: chandan_m
1 Replies
7. Cybersecurity
Hello,
I am currently using a Sonicwall firewall to protect a class C network of public IP addresses. The sonicwall allows me to specify which IP's will be on the DMZ port and the remainder are on the LAN port by default. I would like to replace this Sonicwall with a linux box and use iptables... (3 Replies)
Discussion started by: richard987
3 Replies
8. UNIX for Dummies Questions & Answers
Hi,
I've been able to mount my linux box to a windows machine, but I can't seem to mount my linux box to another linux box I have. (I know I could scp, but for other reasons I need to do it this way) Samba is installed.
Here is an example where I mount to a Win machine.--> works fine
mount... (12 Replies)
Discussion started by: jdilts
12 Replies
9. Red Hat
Hi
I have a linux box and need to access from windows graphically
# uname -a
Linux pc-l416116 2.6.18-155.el5 #1 SMP Fri Jun 19 17:06:47 EDT 2009 i686 i686 i386 GNU/Linux
What components do I need to install on Linux and windows to do that?
TIA (6 Replies)
Discussion started by: magnus29
6 Replies
10. How to Post in the The UNIX and Linux Forums
Hello my dear friends,
Two file are auto generated from mon - fri at different directories on same windows box.Every day i have to copy the file, rename it (specific name)and ftp it to linux box specified directory.
is it possible to automate this process,If yes this has to be done from windows... (1 Reply)
Discussion started by: umesh yadav
1 Replies
LEARN ABOUT REDHAT
ipfwadm-wrapper
IPFWADM-WRAPPER(8) IPFWADM-WRAPPER(8)
NAME
ipfwadm-wrapper - IP firewall administration
SYNOPSIS
ipfwadm-wrapper -A command parameters [options]
ipfwadm-wrapper -I command parameters [options]
ipfwadm-wrapper -O command parameters [options]
ipfwadm-wrapper -F command parameters [options]
ipfwadm-wrapper -M [ -l | -s ] [options]
DESCRIPTION
Ipfwadm-wrapper emulates the behaviour of ipfwadm. You can use this wrapper to use your old ipfwadm firewall rules with ipchains. See
ipfwadm(8) for more details.
If the kernel does not support ipchains (eg. a 2.0 kernel), and the file /sbin/ipfwadm.real exists and is executable, then it will be exe-
cuted with the arguments given to ipfwadm-wrapper. This allows simple dual-booting of 2.2 and 2.0 kernels with the same firewalling
scripts: simply move ipfwadm to ipfwadm.real, and ipfwadm-wrapper to ipfwadm.
SEE ALSO
ipfwadm(8), ipchains(8)
BUGS
The script isn't clever at parsing command line arguments. You must use separate arguments, rather than run them together. For example,
`ipfwadm -Mle' becomes `ipfwadm-wrapper -M -l -e'.
Fragment accounting rules are not translated correctly; they will account packets with source port 65535.
Due to new kernel restrictions, you must be root even to list rules for 2.2 kernels.
If /usr is mounted from NFS, you will not be able to use ipfwadm-wrapper before /usr is mounted.
AUTHOR
Paul ``Rusty'' Russell <ipchains@rustcorp.com>
February 8, 1998 IPFWADM-WRAPPER(8)