Sponsored Content
Full Discussion: Firewall?
Operating Systems Linux Firewall? Post 302539593 by hadimotamedi on Monday 18th of July 2011 07:37:27 AM
Old 07-18-2011
Sorry. How can it be checked out?
 

9 More Discussions You Might Find Interesting

1. Cybersecurity

What Firewall do you use?

Just out of curiosity, I see a lot of people here use Linux IPTables as their firewall. Anyone here use something else like OpenBSD PF or *BSD IPF, IPFW? I'm quite fond of OpenBSD and their Packet Filters. I find their syntax much easier to manage and from my personal experience, I find them... (5 Replies)
Discussion started by: tarballed
5 Replies

2. Cybersecurity

Looking Out from Behind a Firewall

Would it be possible to restrict access to internet pages in the following way? A machine: IP = 128.1.17.123 Only pages from domains of the type "go.jp" and "ne.jp" are viewable. All others are not viewable or only partly viewable. B machine: IP = 128.1.17.146 Regardless of the domain... (4 Replies)
Discussion started by: mntamago
4 Replies

3. IP Networking

Linux Firewall

ON A LINUX NETWORK, HOW DO I ASSIGN IP ADDRESSES TO OTHER TERMINALS AND AFTER THAT HOW I CAN DENY/GRANT ACCESS TO TERMINALS ON A LAN TO MY TERMINAL.PLEASE SPECIFY THE EXACT COMMANDS.kINDLY HELP ME (3 Replies)
Discussion started by: ameya_shaligram
3 Replies

4. UNIX for Advanced & Expert Users

routing and firewall

I have a PC with KUBUNTU installed on it and with 2NIC's on it (two PCI network 100Mbit cards). I want to use it as a server packet router and firewall between two computers with windows installed on them, each of this computer being connected to one different card on the KUBUNTU server. The... (1 Reply)
Discussion started by: meorfi
1 Replies

5. Cybersecurity

help with firewall

hi everyone I am a newbee to firewall scripting. cannot understand how to write rules per host. in ip6tables. anyone plz:( (2 Replies)
Discussion started by: xecutioner
2 Replies

6. Homework & Coursework Questions

firewall query

Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted! 1. The problem statement, all variables and given/known data: produce a report containing an iptable firewall definition for a system requproduce a report containing an... (0 Replies)
Discussion started by: boabbyrab
0 Replies

7. AIX

Firewall

:b:Hi,, How do configure firewall in aix.. similar to linux iptable. Rgards, k.sumathi. (3 Replies)
Discussion started by: sumathi.k
3 Replies

8. SuSE

Firewall

Is there a command line interface to the firewall? (4 Replies)
Discussion started by: jgt
4 Replies

9. Cybersecurity

Firewall

Hey Guys, I am looking for a good firewall software to implement in medium/large office, with at least 150 users. I was hopping you guys could help me on this one. Regards, (4 Replies)
Discussion started by: andrevicente
4 Replies
authck(1M)																authck(1M)

NAME
authck - check internal consistency of Authentication database SYNOPSIS
DESCRIPTION
The command only works for systems that have been converted to trusted mode. checks both the overall structure and internal field consistency of all components of the Authentication database. It reports all problems it finds. Only users who have the superuser capability can run this command. When is used with the option, is run with the option auto- matically. Options recognizes the following options and tests: Check the Protected Password database. The Protected Password database and are checked for completeness such that neither contains entries not in the other. The cross references between the Protected Password database and are checked to make sure that they agree. If a user does NOT exist in but exists in the Protected Password database, then all inconsistencies are reported. Fields in the Protected Password database are then checked for reasonable values. For example, all time stamps of past events are checked to make sure that they have times less than the times returned by time(2). Fields in the Terminal Control database are checked for reasonable values. All time stamps of past events are checked to make sure they have times less than those returned by time(2). Shorthand equivalent of using the and options together in a single command. Provide running diagnostics as the program proceeds. Produce warnings when unusual conditions are encountered that might not cause program errors in login, password and su pro- grams. WARNINGS
HP-UX 11i Version 3 is the last release to support trusted systems functionality. FILES
System password file Protected Password database Terminal Control database System Defaults database AUTHOR was developed by HP. SEE ALSO
getprpwent(3), getprtcent(3), getprdfent(3), authcap(4). TO BE OBSOLETED authck(1M)
All times are GMT -4. The time now is 04:44 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy