Sponsored Content
Full Discussion: Firewall
Special Forums Cybersecurity Firewall Post 302603461 by andrevicente on Thursday 1st of March 2012 05:07:25 AM
Old 03-01-2012
Firewall

Hey Guys,

I am looking for a good firewall software to implement in medium/large office, with at least 150 users.
I was hopping you guys could help me on this one.


Regards,
 

9 More Discussions You Might Find Interesting

1. Cybersecurity

What Firewall do you use?

Just out of curiosity, I see a lot of people here use Linux IPTables as their firewall. Anyone here use something else like OpenBSD PF or *BSD IPF, IPFW? I'm quite fond of OpenBSD and their Packet Filters. I find their syntax much easier to manage and from my personal experience, I find them... (5 Replies)
Discussion started by: tarballed
5 Replies

2. Cybersecurity

Looking Out from Behind a Firewall

Would it be possible to restrict access to internet pages in the following way? A machine: IP = 128.1.17.123 Only pages from domains of the type "go.jp" and "ne.jp" are viewable. All others are not viewable or only partly viewable. B machine: IP = 128.1.17.146 Regardless of the domain... (4 Replies)
Discussion started by: mntamago
4 Replies

3. IP Networking

Linux Firewall

ON A LINUX NETWORK, HOW DO I ASSIGN IP ADDRESSES TO OTHER TERMINALS AND AFTER THAT HOW I CAN DENY/GRANT ACCESS TO TERMINALS ON A LAN TO MY TERMINAL.PLEASE SPECIFY THE EXACT COMMANDS.kINDLY HELP ME (3 Replies)
Discussion started by: ameya_shaligram
3 Replies

4. UNIX for Advanced & Expert Users

routing and firewall

I have a PC with KUBUNTU installed on it and with 2NIC's on it (two PCI network 100Mbit cards). I want to use it as a server packet router and firewall between two computers with windows installed on them, each of this computer being connected to one different card on the KUBUNTU server. The... (1 Reply)
Discussion started by: meorfi
1 Replies

5. Cybersecurity

help with firewall

hi everyone I am a newbee to firewall scripting. cannot understand how to write rules per host. in ip6tables. anyone plz:( (2 Replies)
Discussion started by: xecutioner
2 Replies

6. Homework & Coursework Questions

firewall query

Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted! 1. The problem statement, all variables and given/known data: produce a report containing an iptable firewall definition for a system requproduce a report containing an... (0 Replies)
Discussion started by: boabbyrab
0 Replies

7. AIX

Firewall

:b:Hi,, How do configure firewall in aix.. similar to linux iptable. Rgards, k.sumathi. (3 Replies)
Discussion started by: sumathi.k
3 Replies

8. SuSE

Firewall

Is there a command line interface to the firewall? (4 Replies)
Discussion started by: jgt
4 Replies

9. Linux

Firewall?

Dear All I have put my windows machine behind my centos firewall server with just one NIC. At now, the windows machine can ping 192.9.9.3 but cannot resolve valid url (like www.google.com). I have set DNS for it as well. Can you please let me know what is the missing step? Thank you (6 Replies)
Discussion started by: hadimotamedi
6 Replies
chfn(1) 						      General Commands Manual							   chfn(1)

Name
       chfn - change system finger entry

Syntax
       chfn [ loginname ]

Description
       The  command  is used to change information about users.  This information is used by the program, among others.  It consists of the user's
       real name, office room number, office phone number, and home phone number. The command prompts the user for each field.	 Included  in  the
       prompt  is  a  default  value,  which is enclosed between brackets.  The default value is accepted simply by typing <CR>.  To enter a blank
       field, type the word `none'.  This is an example:
       % chfn
       Changing finger information for doe
       Name [John Doe]:
       Office number [ABC-1/K0]: DEF-2/K1
       Office Phone []: 1863
       Home Phone [5771546]: none

       The command allows phone numbers to be entered with or without hyphens.	No entries may contain colons, commas, or control characters.

       It is a good idea to run after running to make sure everything is the way you want it.

       The optional argument loginname is used to change another person's finger information.  This can only be done by the superuser.

Restrictions
       The encoding of the office and extension information is installation dependent.

       Because two users may try to write the file at once, a synchronization method was developed.  On rare occasions, a message that	the  pass-
       word file is "busy" will be printed.  In this case, sleeps for a while and then tries to write to the file again.

       If the passwd entry is distributed from another host will not modify it.

       See Also
	      chsh(1), finger(1), passwd(1), passwd(5yp)

																	   chfn(1)
All times are GMT -4. The time now is 02:34 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy