Sponsored Content
Full Discussion: What Firewall do you use?
Special Forums Cybersecurity What Firewall do you use? Post 25874 by cerberusofhate on Wednesday 7th of August 2002 01:54:15 AM
Old 08-07-2002
firewall of choice

Personally, I use ipchains. I really like ipchains, just simply makes sense, is easy to write rules, and it is detailed enough for my needs (I like to pretty much log ALL connections to invalid ports, to check for portscans and the like).
cerberusofhate
 

9 More Discussions You Might Find Interesting

1. Cybersecurity

Looking Out from Behind a Firewall

Would it be possible to restrict access to internet pages in the following way? A machine: IP = 128.1.17.123 Only pages from domains of the type "go.jp" and "ne.jp" are viewable. All others are not viewable or only partly viewable. B machine: IP = 128.1.17.146 Regardless of the domain... (4 Replies)
Discussion started by: mntamago
4 Replies

2. IP Networking

Linux Firewall

ON A LINUX NETWORK, HOW DO I ASSIGN IP ADDRESSES TO OTHER TERMINALS AND AFTER THAT HOW I CAN DENY/GRANT ACCESS TO TERMINALS ON A LAN TO MY TERMINAL.PLEASE SPECIFY THE EXACT COMMANDS.kINDLY HELP ME (3 Replies)
Discussion started by: ameya_shaligram
3 Replies

3. UNIX for Advanced & Expert Users

routing and firewall

I have a PC with KUBUNTU installed on it and with 2NIC's on it (two PCI network 100Mbit cards). I want to use it as a server packet router and firewall between two computers with windows installed on them, each of this computer being connected to one different card on the KUBUNTU server. The... (1 Reply)
Discussion started by: meorfi
1 Replies

4. Cybersecurity

help with firewall

hi everyone I am a newbee to firewall scripting. cannot understand how to write rules per host. in ip6tables. anyone plz:( (2 Replies)
Discussion started by: xecutioner
2 Replies

5. Homework & Coursework Questions

firewall query

Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted! 1. The problem statement, all variables and given/known data: produce a report containing an iptable firewall definition for a system requproduce a report containing an... (0 Replies)
Discussion started by: boabbyrab
0 Replies

6. AIX

Firewall

:b:Hi,, How do configure firewall in aix.. similar to linux iptable. Rgards, k.sumathi. (3 Replies)
Discussion started by: sumathi.k
3 Replies

7. SuSE

Firewall

Is there a command line interface to the firewall? (4 Replies)
Discussion started by: jgt
4 Replies

8. Linux

Firewall?

Dear All I have put my windows machine behind my centos firewall server with just one NIC. At now, the windows machine can ping 192.9.9.3 but cannot resolve valid url (like www.google.com). I have set DNS for it as well. Can you please let me know what is the missing step? Thank you (6 Replies)
Discussion started by: hadimotamedi
6 Replies

9. Cybersecurity

Firewall

Hey Guys, I am looking for a good firewall software to implement in medium/large office, with at least 150 users. I was hopping you guys could help me on this one. Regards, (4 Replies)
Discussion started by: andrevicente
4 Replies
MASON(1)																  MASON(1)

NAME
mason - interactively create a firewall SYNOPSIS
mason < logfile > rulefile DESCRIPTION
This manual page briefly documents the mason command. mason interactively generates a set of firewall rules for a Linux-based firewall. This is done by turning on full IP logging, watching the logs for connections, and generating rules describing the connections seen. mason is familiar with most of the quirks of various connec- tion types (such as ftp and IRC), and can output rules for 2.0.x ipfwadm, 2.2.x ipchains, and Cisco packet filters. mason operates by reading in log file information from standard input and writing firewall rules to standard output. This allows mason to work offline or on a separate system. Real-time firewall generation can be achieved with a command like tail(1). Most users will want to run mason with a user-friendly interface such as mason-gui-text(1). ENVIRONMENT
mason is configured using the following environment variables. ECHOCOMMAND Sets the type of firewall rules that mason should output to standard out. Allowed values include "ipfwadm" and "ipchains". By default, mason outputs whatever kind of rules are supported by the currently running Linux kernel. DOCOMMAND Sets the type of firewall rules that mason should run immediately when a rule is generated. Allowed values include "ipfwadm" and "ipchains". By default, mason outputs whatever kind of rules are supported by the currently running Linux kernel. HEARTBEAT If set to "yes", mason will output a "+" or "-" to standard error whenever a rule generated by mason has been triggered. DYNIP Set this to the list of interfaces that have dynamically assigned addresses, separated by spaces. SEE ALSO
mason-gui-text(1) AUTHOR
This manual page was written by Jeff Licquia <jeff@luci.org>, for the Debian GNU/Linux system (but may be used by others). MASON(1)
All times are GMT -4. The time now is 03:38 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy