Sponsored Content
Full Discussion: firewall for unix systems
Special Forums Hardware Filesystems, Disks and Memory firewall for unix systems Post 19916 by auswipe on Wednesday 17th of April 2002 11:33:20 PM
Old 04-18-2002
Take a gander at ip or ipf.

I use ipf with OpenBSD 2.9 and I am quite happy with the ease of configuration and performance.
 

9 More Discussions You Might Find Interesting

1. News, Links, Events and Announcements

eBay Unix systems

I should add a disclaimer: I am not affiliated with the sellers in any way, nor do I have any more knowledge than any other person reading the description about the item. This is simply for your reference. I see a good number of people wanting a SPARC system to play with, and even more that... (1 Reply)
Discussion started by: LivinFree
1 Replies

2. Cybersecurity

Firewall in SCO unix 5.0.4

I am using SCO unix 5.0.4 is there any possibility to create firewall in this? scondly how to connect it to internet i mean thru ppp connection what is command a or dialer actually i m getting confused sometimes ppp dials but disconnects ? pl help me from scratch (0 Replies)
Discussion started by: zaheerkhan
0 Replies

3. SCO

Sharing unix drives from two unix systems

I have two SCO openserver systems, 1 in the US and 1 in the UK. I am setting up a vpn to connect the two local networks that also have windows pc's on them. Is there a way that either unix system can see the hard drive on the other unix system so that I can share data between them. I run a cobol... (1 Reply)
Discussion started by: rongrout
1 Replies

4. IP Networking

MRTG in Unix Systems

Hi, I need help to discovery the correct MIB to monitoring CPU, Memory and Hard Disc in Unix. I get any MIB in the internet, but donīt work. Anybody help-me? Thanks. Marcio Dunder Perin (2 Replies)
Discussion started by: dunder
2 Replies

5. Shell Programming and Scripting

Configure Firewall in unix from shell script

plz help me, i need to configure my firewall with using shell script, i am using unix fedora 9. thanks ppl. replys would be great. (1 Reply)
Discussion started by: king_jon85
1 Replies

6. Cybersecurity

Disable FIREWALL in UNIX

Hi Gurus, I am new to UNIX Admin and i am trying to do one software installation. During installation process, i need to disable the existing firewall settings. I am not much aware about the UNIX Firewall settings. Can any one help me to find out whether the firewall is ON or not. If it is... (1 Reply)
Discussion started by: Raamc
1 Replies

7. UNIX for Dummies Questions & Answers

unix Operating Systems 5

Hi :) I have unix Operating Systems 5 I need working for user logout befor 10 minutes,In the case that he is not active :o what do I do? :rolleyes: (4 Replies)
Discussion started by: fakhwork
4 Replies

8. UNIX for Dummies Questions & Answers

Firewall on UNIX

I was given this assignment and part of it was to mention firewalls available on UNIX(ex. solaris) and Linux plaforms. First I would like to ask what is the difference between Unix and Linux. And also can please tell me firewalls are available on these platforms? Thank you before hand. (1 Reply)
Discussion started by: chrisd
1 Replies

9. UNIX for Dummies Questions & Answers

unix firewall

our WBM is not working so I cannot enter firewall entries so I would like to know how to do it using unix commands after I have logged in via telnet:wall: (4 Replies)
Discussion started by: kool
4 Replies
IPPOOL(5)							File Formats Manual							 IPPOOL(5)

NAME
ippool, ippool.conf - IP Pool file format DESCRIPTION
The format for files accepted by ippool is described by the following grammar: line ::= table | groupmap . table ::= "table" role tabletype . groupmap ::= "group-map" inout role number ipfgroup tabletype ::= ipftree | ipfhash . role ::= "role" "=" "ipf" . inout ::= "in" | "out" . ipftree ::= "type" "=" "tree" number "{" addrlist "}" . ipfhash ::= "type" "=" "hash" number hashopts "{" hashlist "}" . ipfgroup ::= setgroup hashopts "{" grouplist "}" | hashopts "{" setgrouplist "}" . setgroup ::= "group" "=" groupname . hashopts ::= size [ seed ] | seed . size ::= "size" number . seed ::= "seed" number . addrlist ::= [ "!" ] addrmask ";" [ addrlist ] . grouplist ::= groupentry ";" [ grouplist ] | addrmask ";" [ grouplist ] . setgrouplist ::= groupentry ";" [ setgrouplist ] . groupentry ::= addrmask "," setgroup . hashlist ::= hashentry ";" [ hashlist ] . hashentry ::= addrmask . addrmask ::= ipaddr | ipaddr "/" mask . mask ::= number | ipaddr . groupname ::= number | name . number ::= digit { digit } . ipaddr = host-num "." host-num "." host-num "." host-num . host-num = digit [ digit [ digit ] ] . digit ::= "0" | "1" | "2" | "3" | "4" | "5" | "6" | "7" | "8" | "9" . name ::= letter { letter | digit } . The IP pool configuration file is used for defining a single object that contains a reference to multiple IP address/netmask pairs. A pool may consist of a mixture of netmask sizes, from 0 to 32. At this point in time, only IPv4 addressing is supported. OVERVIEW
The IP pool configuration file provides for defining two different mechanisms for improving speed in matching IP addresses with rules. The first, table , defines a lookup table to provide a single reference in a filter rule to multiple targets and the second, group-map , pro- vides a mechanism to target multiple groups from a single filter line. The group-map command can only be used with filter rules that use the call command to invoke either fr_srcgrpmap or fr_dstgrpmap , to use the source or destination address, respectively, for determining which filter group to jump to next for continuation of filter packet pro- cessing. POOL TYPES
Two storage formats are provided: hash tables and tree structure. The hash table is intended for use with objects all containing the same netmask or a few different sized netmasks of non-overlapping address space and the tree is designed for being able to support exceptions to a covering mask, in addition to normal searching as you would do with a table. It is not possible to use the tree data storage type with group-map configuration entries. POOL ROLES
When a pool is defined in the configuration file, it must have an associated role. At present the only supported role is ipf. Future development will see futher expansion of their use by other sections of IPFilter code. EXAMPLES
The following examples show how the pool configuration file is used with the ipf configuration file to enhance the ability for the ipf con- figuration file to be succinct in meaning. 1 The first example shows how a filter rule makes reference to a specific pool for matching of the source address. pass in from pool/100 to any The pool configuration, which matches IP addresses 1.1.1.1 and any in 2.2.0.0/16, except for those in 2.2.2.0/24. table role = ipf type = tree number = 100 { 1.1.1.1/32; 2.2.0.0/16; !2.2.2.0/24 }; 2 The following ipf.conf extract uses the fr_srcgrpmap/fr_dstgrpmap lookups to use the group-map facility to lookup the next group to use for filter processing, providing the call filter rule is matched. call now fr_srcgrpmap/1010 in all call now fr_dstgrpmap/2010 out all pass in all group 1020 block in all group 1030 pass out all group 2020 block out all group 2040 A ippool configuration to work with the above ipf.conf file might look like this: group-map in role = ipf number = 1010 { 1.1.1.1/32, group = 1020; 3.3.0.0/16, group = 1030; }; group-map out role = ipf number = 2010 group = 2020 { 2.2.2.2/32; 4.4.0.0/16; 5.0.0.0/8, group = 2040; }; FILES
/dev/iplookup /etc/ippool.conf /etc/hosts SEE ALSO
ippool(8), hosts(5), ipf(5), ipf(8), ipnat(8) IPPOOL(5)
All times are GMT -4. The time now is 10:06 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy