Sponsored Content
Operating Systems OS X (Apple) OS X Support RSS Mac OS X 10.5 Leopard: About the Application Firewall Post 302260775 by Linux Bot on Friday 21st of November 2008 03:20:02 PM
Old 11-21-2008
Mac OS X 10.5 Leopard: About the Application Firewall

Mac OS X 10.5 Leopard includes a new technology called the Application Firewall. One of the basic purposes of a firewall is to control connections made to your computer from other computers on the network. In most firewall software, you must know the network ports and protocols an application uses to communicate, in order to control that application's network connections. Note: This article applies to the version of the Application Firewall included with Mac OS X 10.5.1 and later. Update to Mac OS X 10.5.1 or later if you have not yet done so. The Firewall in Leopard is an Application Firewall. This type of firewall allows you to control connections on a per-application basis, rather than a per-port basis. This makes it easier for less experienced users to gain the benefits of firewall protection and helps prevent undesirable applications from taking control of network ports that have been opened for legitimate applications. The Firewall applies to the Internet protocols most commonly used by applications, TCP and UDP. It does not affect AppleTalk. The Firewall may be set to block incoming ICMP "pings" by enabling Stealth Mode in the Advanced settings. Earlier ipfw technology is still accessible from the command line (in Terminal) and the Application Firewall does not overrule rules set with ipfw; if ipfw blocks an incoming packet, the Application Firewall will not process it. This article applies to the version of the Application Firewall included with Mac OS X 10.5.1 and later.

More from Apple OS X Support ...
 

3 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

mac backup script in leopard

Hi all I had a nice simple backup script on my mac running Tiger. I used an Automator 'Run Shell Script' command that loaded psync and backed up one directory on an external drive to a directory on another external drive. This was the command /usr/local/bin/runpsync 0 0 0... (1 Reply)
Discussion started by: Billy T
1 Replies

2. OS X (Apple)

loading MAC X 5.0(leopard) on a X86 laptop

I want to install MAC X 5.x on my T60 Lenova laptop. I have the Original Mac X 5.0 installation media. I tried to install it on a blank hard disk in my laptop but it doesn't work. On the internet I found sites that offer torrent downloads but I can't use torrent downloads on my laptop. (Corp... (1 Reply)
Discussion started by: mndavies
1 Replies

3. OS X (Apple)

Use a Serial Console with Mac OS X Leopard

I'm trying to use an old Commodore 128D as a terminal to access OS X's shell via a serial port. I've used 'screen' and 'zterm' to ensure the two machines are successfully interfaced. Instructions for opening up the serial console on other Unix-y operating systems don't work with OS X Leopard. ... (3 Replies)
Discussion started by: joecassara
3 Replies
Firewall mark classifier in tc(8)				       Linux					 Firewall mark classifier in tc(8)

NAME
fw - fwmark traffic control filter SYNOPSIS
tc filter ... fw [ classid CLASSID ] [ action ACTION_SPEC ] DESCRIPTION
the fw filter allows to classify packets based on a previously set fwmark by iptables. If it is identical to the filter's handle, the fil- ter matches. iptables allows to mark single packets with the MARK target, or whole connections using CONNMARK. The benefit of using this filter instead of doing the heavy-lifting with tc itself is that on one hand it might be convenient to keep packet filtering and classifi- cation in one place, possibly having to match a packet just once, and on the other users familiar with iptables but not tc will have a less hard time adding QoS to their setups. OPTIONS
classid CLASSID Push matching packets to the class identified by CLASSID. action ACTION_SPEC Apply an action from the generic actions framework on matching packets. EXAMPLES
Take e.g. the following tc filter statement: tc filter add ... handle 6 fw classid 1:1 will match if the packet's fwmark value is 6. This is a sample iptables statement marking packets coming in on eth0: iptables -t mangle -A PREROUTING -i eth0 -j MARK --set-mark 6 SEE ALSO
tc(8), iptables(8), iptables-extensions(8) iproute2 21 Oct 2015 Firewall mark classifier in tc(8)
All times are GMT -4. The time now is 08:31 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy