08-12-2011
The answer will most likely depend on what the vendor has to offer, as some firewall can operate on Layer 4 and below, while others may even work on Layer 7 (application).
8 More Discussions You Might Find Interesting
1. IP Networking
Hi,
Is there any way that i can directly take out the IP packet and see its contents.
Waiting for your answer ..............
Bye (4 Replies)
Discussion started by: manjunath
4 Replies
2. UNIX for Dummies Questions & Answers
Howdie everyone...
I have a shell script RemoveFiles.sh
Inside this file, it only has two commands as below:
rm -f ../../reportToday/temp/*
rm -f ../../report/*
My problem is that when i execute this script, nothing happened. Files remained unremoved. I don't see any error message as it... (2 Replies)
Discussion started by: cheongww
2 Replies
3. UNIX for Advanced & Expert Users
I have an Ubuntu lucid 10.4 running as NIS client, the machine was working fine as a NIS client until i move the machine to a DMZ firewall.
I tried to get NIS client working through the firewall by I fixing ypbind port to a static port by modifying the file “/etc/default/nis”
YPBINDARGS="-p... (1 Reply)
Discussion started by: hassan1
1 Replies
4. Cybersecurity
Exercise:
Protection of WEB and DNS servers using the context-free rules for packet filtering:
- Protect your WEB-server, so that would be for him can be accessed by browsers, and could go to dns.
- Protect your primary DNS-server so that it could be to contact clients and secondary servers.... (1 Reply)
Discussion started by: numeracy
1 Replies
5. Homework & Coursework Questions
how to protect service dns with filtering tables (statefull, stateless)?
iptables -L
iptables ...? (1 Reply)
Discussion started by: nini
1 Replies
6. Shell Programming and Scripting
My script work on Linux but not work in sun os.
my script.
logFiles="sentLog1.log sentLog2.log"
intial_time="0 0"
logLocation="/usr/local/tomcat/logs/"
sleepTime=600
failMessage=":: $(tput bold)Log not update$(tput rmso) = "
successMessage="OK"
arr=($logFiles)... (7 Replies)
Discussion started by: ooilinlove
7 Replies
7. AIX
(5 Replies)
Discussion started by: Vishal_dba
5 Replies
8. IP Networking
hi all. and sorry for the random question, but this sparkled a raging flame-war at work and i want more points of view
situation
a router, with linux of some sort,
dhcp client requesting for ip in wan1 (as usual with wan ports)
dhcp server listening in lan1, and assigning ip (as usual... (9 Replies)
Discussion started by: broli
9 Replies
LEARN ABOUT DEBIAN
welf_proxy2dlf
WELF_PROXY2DLF.IN(1) LogReport's Lire Documentation WELF_PROXY2DLF.IN(1)
NAME
welf_proxy2dlf - convert logs in WebTrends Enhanced Log Format to proxy DLF
SYNOPSIS
welf_proxy2dlf file
DESCRIPTION
welf_proxy2dlf converts firewall logs in the WebTrends Enhanced Log Format into the proxy DLF.
That format is defined at the following URL: http://www.netiq.com/partners/technology/welf.asp
This converter also supports the SonicWall extensions.
A list of firewall products that supports that format can be found at the following URL: http://www.netiq.com/products/fwr/compatible.asp
EXAMPLES
To process a log as produced by a WebTrends proxy:
$ welf_proxy2dlf < welf-proxy.log
welf_proxy2dlf will be rarely used on its own, but is more likely called by lr_log2report:
$ lr_log2report welf_proxy < /var/log/welf-proxy.log
IMPLEMENTATION NOTES
Welf log files contains information about many applications: proxies, packet filters, IDS. IDS and packet filters information is handled by
the firewall superservice, whereas the proxy information is handled by the proxy supersevice.
This converter will only convert records with a proto, src and dst field. All other records are ignored (they won't be ignored by the
firewall superservice).
SEE ALSO
Lire::WELF(3) welf2dlf(1)
AUTHORS
Francis J. Lacoste <flacoste@logreport.org>
VERSION
$Id: welf_proxy2dlf.in,v 1.8 2006/07/23 13:16:36 vanbaal Exp $
COPYRIGHT
Copyright (C) 2001 Stichting LogReport Foundation LogReport@LogReport.org
This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with this program (see COPYING); if not, check with
http://www.gnu.org/copyleft/gpl.html.
Lire 2.1.1 2006-07-23 WELF_PROXY2DLF.IN(1)