08-01-2002
I use IP-tables, getting quite comfortable with it now
9 More Discussions You Might Find Interesting
1. Cybersecurity
Would it be possible to restrict access to internet pages in the following way?
A machine:
IP = 128.1.17.123
Only pages from domains of the type "go.jp" and "ne.jp" are viewable. All others are not viewable or only partly viewable.
B machine:
IP = 128.1.17.146
Regardless of the domain... (4 Replies)
Discussion started by: mntamago
4 Replies
2. IP Networking
ON A LINUX NETWORK, HOW DO I ASSIGN IP ADDRESSES TO OTHER TERMINALS AND AFTER THAT HOW I CAN DENY/GRANT ACCESS TO TERMINALS ON A LAN TO MY TERMINAL.PLEASE SPECIFY THE EXACT COMMANDS.kINDLY HELP ME (3 Replies)
Discussion started by: ameya_shaligram
3 Replies
3. UNIX for Advanced & Expert Users
I have a PC with KUBUNTU installed on it and with 2NIC's on it (two PCI network 100Mbit cards). I want to use it as a server packet router and firewall between two computers with windows installed on them, each of this computer being connected to one different card on the KUBUNTU server. The... (1 Reply)
Discussion started by: meorfi
1 Replies
4. Cybersecurity
hi everyone
I am a newbee to firewall scripting. cannot understand how to write rules per host. in ip6tables.
anyone plz:( (2 Replies)
Discussion started by: xecutioner
2 Replies
5. Homework & Coursework Questions
Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted!
1. The problem statement, all variables and given/known data:
produce a report containing an iptable firewall definition for a system requproduce a report containing an... (0 Replies)
Discussion started by: boabbyrab
0 Replies
6. AIX
:b:Hi,,
How do configure firewall in aix.. similar to linux iptable.
Rgards,
k.sumathi. (3 Replies)
Discussion started by: sumathi.k
3 Replies
7. SuSE
Is there a command line interface to the firewall? (4 Replies)
Discussion started by: jgt
4 Replies
8. Linux
Dear All
I have put my windows machine behind my centos firewall server with just one NIC. At now, the windows machine can ping 192.9.9.3 but cannot resolve valid url (like www.google.com). I have set DNS for it as well. Can you please let me know what is the missing step?
Thank you (6 Replies)
Discussion started by: hadimotamedi
6 Replies
9. Cybersecurity
Hey Guys,
I am looking for a good firewall software to implement in medium/large office, with at least 150 users.
I was hopping you guys could help me on this one.
Regards, (4 Replies)
Discussion started by: andrevicente
4 Replies
LEARN ABOUT CENTOS
acpidump-acpica
ACPIDUMP(1) General Commands Manual ACPIDUMP(1)
NAME
acpidump - ACPI table dump utility
SYNOPSIS
acpidump [<option>...]
DESCRIPTION
This manual page briefly documents the acpidump command. The option list is taken from the interactive help.
The acpidump command extracts the ACPI tables currently in use from the running kernel in a form usable for later processing by the acpix-
tract command.
Invocation of acpidump without parameters will dump all available ACPI tables. Multiple mixed instances of the -a , -f , and -n parameters
can be used.
OPTIONS
-b Dump tables in binary format (versus the default human-readable form)
-h | -?
Display this help message
-o <file>
Redirect output to a file. This file can be used later by acpixtract to examine the contents of the ACPI tables.
-s Print table summaries only.
-v Print the version of this utility.
-z Verbose mode.
-a <address>
Get a table from a physical address (must be superuser and you must be careful which address you use -- dmesg will typically report
the addresses for the various tables).
-f <binary-file>
Get a table from a binary file (see the -b option).
-n <signature>
Get a table via it's name or signature (e.g., MADT or SSDT).
SEE ALSO
acpixtract(1)
AUTHOR
acpidump was written by Robert Moore <robert.moore@intel.com> and Chao Guan <chao.guan@intel.com>.
This manual page was written by Al Stone <ahs3@redhat.com> for the Fedora project (but may be used by others).
July 24, 2013 ACPIDUMP(1)