Sponsored Content
Special Forums Cybersecurity How statefull firewall work with segmented packet? Post 302546864 by sysgate on Friday 12th of August 2011 10:11:10 AM
Old 08-12-2011
The answer will most likely depend on what the vendor has to offer, as some firewall can operate on Layer 4 and below, while others may even work on Layer 7 (application).
 

8 More Discussions You Might Find Interesting

1. IP Networking

Seeing IP packet

Hi, Is there any way that i can directly take out the IP packet and see its contents. Waiting for your answer .............. Bye (4 Replies)
Discussion started by: manjunath
4 Replies

2. UNIX for Dummies Questions & Answers

Script doesn't work, but commands inside work

Howdie everyone... I have a shell script RemoveFiles.sh Inside this file, it only has two commands as below: rm -f ../../reportToday/temp/* rm -f ../../report/* My problem is that when i execute this script, nothing happened. Files remained unremoved. I don't see any error message as it... (2 Replies)
Discussion started by: cheongww
2 Replies

3. UNIX for Advanced & Expert Users

NIS client will not work through firewall, help please

I have an Ubuntu lucid 10.4 running as NIS client, the machine was working fine as a NIS client until i move the machine to a DMZ firewall. I tried to get NIS client working through the firewall by I fixing ypbind port to a static port by modifying the file “/etc/default/nis” YPBINDARGS="-p... (1 Reply)
Discussion started by: hassan1
1 Replies

4. Cybersecurity

filter packet

Exercise: Protection of WEB and DNS servers using the context-free rules for packet filtering: - Protect your WEB-server, so that would be for him can be accessed by browsers, and could go to dns. - Protect your primary DNS-server so that it could be to contact clients and secondary servers.... (1 Reply)
Discussion started by: numeracy
1 Replies

5. Homework & Coursework Questions

Protect service with statefull, stateless

how to protect service dns with filtering tables (statefull, stateless)? iptables -L iptables ...? (1 Reply)
Discussion started by: nini
1 Replies

6. Shell Programming and Scripting

My script work on Linux but not work in sunos.

My script work on Linux but not work in sun os. my script. logFiles="sentLog1.log sentLog2.log" intial_time="0 0" logLocation="/usr/local/tomcat/logs/" sleepTime=600 failMessage=":: $(tput bold)Log not update$(tput rmso) = " successMessage="OK" arr=($logFiles)... (7 Replies)
Discussion started by: ooilinlove
7 Replies

7. AIX

Packet loss coming with big packet size ping

(5 Replies)
Discussion started by: Vishal_dba
5 Replies

8. IP Networking

Discussion at work, would a router work pluging a cable in wan1 and lan1?

hi all. and sorry for the random question, but this sparkled a raging flame-war at work and i want more points of view situation a router, with linux of some sort, dhcp client requesting for ip in wan1 (as usual with wan ports) dhcp server listening in lan1, and assigning ip (as usual... (9 Replies)
Discussion started by: broli
9 Replies
WELF_PROXY2DLF.IN(1)					  LogReport's Lire Documentation				      WELF_PROXY2DLF.IN(1)

NAME
welf_proxy2dlf - convert logs in WebTrends Enhanced Log Format to proxy DLF SYNOPSIS
welf_proxy2dlf file DESCRIPTION
welf_proxy2dlf converts firewall logs in the WebTrends Enhanced Log Format into the proxy DLF. That format is defined at the following URL: http://www.netiq.com/partners/technology/welf.asp This converter also supports the SonicWall extensions. A list of firewall products that supports that format can be found at the following URL: http://www.netiq.com/products/fwr/compatible.asp EXAMPLES
To process a log as produced by a WebTrends proxy: $ welf_proxy2dlf < welf-proxy.log welf_proxy2dlf will be rarely used on its own, but is more likely called by lr_log2report: $ lr_log2report welf_proxy < /var/log/welf-proxy.log IMPLEMENTATION NOTES
Welf log files contains information about many applications: proxies, packet filters, IDS. IDS and packet filters information is handled by the firewall superservice, whereas the proxy information is handled by the proxy supersevice. This converter will only convert records with a proto, src and dst field. All other records are ignored (they won't be ignored by the firewall superservice). SEE ALSO
Lire::WELF(3) welf2dlf(1) AUTHORS
Francis J. Lacoste <flacoste@logreport.org> VERSION
$Id: welf_proxy2dlf.in,v 1.8 2006/07/23 13:16:36 vanbaal Exp $ COPYRIGHT
Copyright (C) 2001 Stichting LogReport Foundation LogReport@LogReport.org This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program (see COPYING); if not, check with http://www.gnu.org/copyleft/gpl.html. Lire 2.1.1 2006-07-23 WELF_PROXY2DLF.IN(1)
All times are GMT -4. The time now is 07:32 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy