10-24-2008
Like everyone said, it depends on the application.
But here are two ideas:
- Just firewall the connections you don't want to allow. Even better, firewall everything and just allow what you want.
- Or, you could create a zone in Solaris that uses the second NIC. Then launch your app there.
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hello all!
Does anyone know how to redirect i link to a host or alias name?
Here is the example:
i wank to type "Bob" in my browser and be redirected to
http://192.168.54.37:7001/Bob/BobMainServlet on that perticular port.
Im using Redhat 6.2 with bind 9.2.3
regards...
dOzY (4 Replies)
Discussion started by: dozy
4 Replies
2. IP Networking
Suppose you had a bunch of domains registered with names following the scheme, 11example.com 22example.com 33example.com etc. These domains are all for virutal webhosting, and will have the same web servers with the same IPs on all of them.
The question is, because they're 2nd level domains, is... (3 Replies)
Discussion started by: vertigo23
3 Replies
3. UNIX for Advanced & Expert Users
Hello,
we practise our server with operating system ReliantUNIX 5.45 and we are using Informix Dynamic Server 7.31.
I ascertained a lot of cpu interrupts per second (int/s). The count of int/s exceeds critical maximum value considerably.
Machine specific notes for Informix Dynamic Server... (1 Reply)
Discussion started by: urbale
1 Replies
4. UNIX for Dummies Questions & Answers
We can use "pbind" to bind a process to a specific processor. But it requires the id of the process to be binded, meaning we have to do the binding after starting that process.
So how can we bind a process to a specific processor while we start that process. Say we are working on a Sun's... (3 Replies)
Discussion started by: ubcedison
3 Replies
5. UNIX for Advanced & Expert Users
Hi all,
I've 2 Debian Etch (4) box used as ns1 and ns2 with BIND9. My domain name is something like this:
subdomain.domain.com
And I've 2 authorized DNS servers for the subdomain. I set this line in both of ns1 and ns2 (I.e. in ns1.subdomain.domain.com and ns2.subdomain.domain.com):
cw ... (1 Reply)
Discussion started by: mjdousti
1 Replies
6. Red Hat
Hello,
Our production linux server have multiple network interface.
Recently we installed and started NFS. Now the client server cannot mount to the server running NFS.
Later it was discovered that the port being used for NFS is only bound to one IP address, which is not the IP address I... (0 Replies)
Discussion started by: hemangjani
0 Replies
7. UNIX for Dummies Questions & Answers
I know how to manage DNS once it's installed. I can edit named.conf and create zone files. I can sign the zones, use TSIG, etc.
How do I take the BIND 9.9 tar ball from All Downloads | Internet Systems Consortium and install it and get it to work?
Maybe I am not getting it.
Can... (0 Replies)
Discussion started by: brianjb
0 Replies
8. UNIX for Dummies Questions & Answers
When you get the message can't bind to ip already in use.
is there a command to search to see everything that is using that IP?
I've already check the host and hostname files (2 Replies)
Discussion started by: mchelle_99
2 Replies
9. UNIX for Advanced & Expert Users
Hi All
I need to do bind of exiting filesystem to new storage allocated
mount --bind /prod/OpenCSS /var/lib/test
echo "/prod/OpenCSS /var/lib/pgsql bind bind 0 0" >> /etc/fstab
will this command just work ? (2 Replies)
Discussion started by: anil529
2 Replies
LEARN ABOUT DEBIAN
fwb_pix
fwb_pix(1) Firewall Builder fwb_pix(1)
NAME
fwb_ipt - Policy compiler for Cisco PIX
SYNOPSIS
fwb_pix -fdata_file.xml [-V] [-dwdir] [-i] [-v] [-xc] [-xt] object_name
DESCRIPTION
fwb_pix is firewall policy compiler component of Firewall Builder (see fwbuilder(1)). Compiler reads objects definitions and firewall
description from the data file specified with "-f" option and generates resultant Cisco PIX configuration file. The configuration is writ-
ten to the file with the name the same as the name of the firewall object, plus extension ".fw".
The data file and the name of the firewall objects must be specified on the command line. Other command line parameters are optional.
OPTIONS
-f FILE
Specify the name of the data file to be processed.
-d wdir
Specify working directory. Compiler creates file with PIX configuration in this directory. If this parameter is missing, then PIX
configuration will be placed in the current working directory.
-v Be verbose: compiler prints diagnostic messages when it works.
-V Print version number and quit.
-i When this option is present, the last argument on the command line is supposed to be firewall object ID rather than its name
-xc When output file name is determined automatically (i.e. flags -o or -O are not present), the file name is composed of the cluster
name and member firewall name rather than just member firewall name. This is used mostly for testing when the same member firewall
object can be a part of different clusters with different configurations.
-xt This flag makes compiler treat all fatal errors as warnings and continue processing rules. Generated configuration script most
likely will be incorrect but will include error message as a comment; this flag is used for testing and debugging.
URL
Firewall Builder home page is located at the following URL: http://www.fwbuilder.org/
BUGS
Please report bugs using bug tracking system on SourceForge:
http://sourceforge.net/tracker/?group_id=5314&atid=105314
SEE ALSO
fwbuilder(1), fwb_ipf(1), fwb_ipt(1) fwb_pf(1)
FWB
fwb_pix(1)