Sponsored Content
Top Forums UNIX for Advanced & Expert Users iptables - similar syntax to cisco acl Post 302870841 by coolatt on Tuesday 5th of November 2013 02:59:41 AM
Old 11-05-2013
Debian

i want a tool that translates the acl & applies it to a specific interface.

Code:
access-list 110 ip permit 10.0.0.x any
access-list 110 ip deny any any

 

5 More Discussions You Might Find Interesting

1. Cybersecurity

ACL

Hi all, I've just been handled the responsibility for a FTP-site. Having no experiens of UNIX at all. And now one of my users needs to have full access to the usr directory and all it's subdirectories, don't know why just trying to do what the boss tells me. The type of UNIX is FreeBSD and the... (4 Replies)
Discussion started by: -tri-
4 Replies

2. Cybersecurity

pass syntax iptables to ipfw

Hello, excuse my English. Please could tell me how I can pass this syntax for iptables to ipfw. iptables -A OUTPUT -p tcp --dport 80 -m state --state NEW -m recent --set --name thor --rdest -j ACCEPT iptables -A INPUT -p tcp -m tcp --tcp-flag RST RST -m state --state ESTABLISHED -m recent... (0 Replies)
Discussion started by: dot357
0 Replies

3. IP Networking

iptables: syntax from drop AND log packets

Good afternoon everyone, It's the iptables n00b again. valiantly learning and reading (and asking for occasional help when I hit a wall - which I think I just did) So far I've gotten logging enabled for iptables. Now, I want to drop AND log an IP connection attempt. Could some wise eyes... (2 Replies)
Discussion started by: putter1900
2 Replies

4. IP Networking

iptables syntax

Hi, Can someone help to explain what is --to-source in the iptables rule below: iptables -t nat -A POSTROUTING -s 192.168.1.100 -o eth0 \ -j SNAT --to-source 97.158.253.26 especially why the option has double dash (--) is it a comment? Thanks (1 Reply)
Discussion started by: plee61
1 Replies

5. IP Networking

How to stack Cisco 2960-S and Cisco 2960X?

Is there an easy way to stack Cisco 2960-S and Cisco 2960X switches? If you have no idea, follow this: 1. Stacking is not supported on switches running the LAN Lite image. All switches in the stack must be running the LAN Base image. 2. In a mixed stack of Catalyst 2960-X and Catalyst 2960-S... (0 Replies)
Discussion started by: Ayaerlee
0 Replies
YPSERV.ACL(5)						      BSD File Formats Manual						     YPSERV.ACL(5)

NAME
ypserv.acl -- ypserv(8) configuration file DESCRIPTION
The ypserv.acl file controls which hosts can connect to the YP server. The format is more complex than the format for securenet(5). The first two verbs on each line controls if the line will allow or deny access for a host, network (net) or all hosts. The YP server reads the configuration file and build a list in memory. This list is processed from the beginning for every incomming request. As soon a match is found in the list the search terminates and it returns success or failure depending on allow or deny. If no match was found in the list success is returned. If access is denied every call will cause a no such domain error for the caller. Don't forget to allow localhost access if you want the machine running ypserv access it too. There is no default name for this file. Start ypserv with a -a filename to read a file with this format. The following different syntax can be used: < allow|deny > host < hostname|ip-address > If hostname has more than one ip address then all will be added to the list. < allow|deny > net < netname|netnumber > [netmask <netname|netnumber>] If netmask part of the command isn't given then the netmask will be assumed to be a class A, B or C net depending on the net number. < allow|deny > all A line containing one of these commands will always match any host. EXAMPLES
A configuration file might appear as follows: # This is an example of an access control file to be used by ypserv. # # This file is parsed line by line. First match will terminate the check # of the caller. # ########################################################################### # This is the commands that will match a single host # # allow host <hostname|ip-address> # deny host <hostname|ip-address> # # To process hostname gethostbyname is called. If the hostname has # multiple ip-addresses all will be added (I hope). ip-address # processed by inet_aton. allow host localhost deny host jodie ########################################################################### # This is the commands that will match a network # # allow net <netname|netnumber> [netmask <netname|netnumber>] # deny net <netname|netnumber> [netmask <netname|netnumber>] # # To process netname getnetbyname is called, and inet_aton is used for # netnumber. inet_aton both access numbers as 255.255.255.0 and 0xffffff00. # # If netmask isn't given the parser will assume netmask from the first bits # of the network number. So if the network is subneted the you have to add # the netmask. In my case I've got the network 139.58.253.0 at home so too # allow any of my computers to talk with the server I need the following # line # allow net mojathome netmask 255.255.255.0 ########################################################################### # At last we have a command that will match any caller: # # allow all # deny all # # reject all connections deny all FILES
/var/yp/ypserv.acl A ypserv(8) configuration file. SEE ALSO
yp(8), ypserv(8), securenet(5) AUTHOR
Mats O Jansson <moj@stacken.kth.se> BSD
July 2, 1994 BSD
All times are GMT -4. The time now is 02:57 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy