Firewalld implements a zone concept. To allow access to services based on the source address, just create a new zone, add source addresses and services to the zone and you are done.
Here is an example.
First we create a new zone named test
This new zone shall be effective for source in the 10.100.250.0/24 address range
Now we add ports 22 (represented by the predefined service ssh) and 8080 to the zone
These commands created and populated the file /etc/firewalld/zones/test.xml
When you are done, activate your changes with
A good documentation of firewalld can be found here: Firewalld - FedoraProject
I"m installing my ATI card in FC4. I'm going off of instructions that i've found. The firs step says that i need my kernel sources which i've got then it says that i've gotta unpack them so i can make links to the file later. My kernel sources that i've got are .src.rpm I've installed them but... (1 Reply)
So, I was browsing groklaw.net, and I was surprised to read that Pamela Jones was reading the copyright notices in the UnixWare 7.1.1 source code files...
Groklaw - Santa Cruz Listed Novell as Owning the Copyrights in 1999
How can that be? Are the UnixWare 7.1.1 sources available to the... (1 Reply)
I had a doubt if any services need to be restarted if port no in /etc/services in an RHEL setup is changed. For eg, the port no of 443 for SSL may need to be changed.
I hope my query is clear whether any services need to be restarted if port no in /etc/services is changed.
Please revert with... (10 Replies)
Hi,
I just started working on a script. After my research, i found a command which can help me:
AIM: To build a script which starts the services (Services 1) on server 1 automatically whenever its down. And it has a dependency on other service (Service 2) on Server 2.
So my script has to... (4 Replies)
Hi,
What is the syntax to configure sntp client to have multiple time sources?
I tried to use the below syntax, but when the src1 is not reachable, the sntp does not even try to sync to src2:
# /usr/sbin/sntp -P no -r src1 src2
sntp: receive timed out after 3 seconds
sntp: receive timed... (0 Replies)
I am working in IT company working for banks.I find hardly to get technology about bank IT on the internet.Consider banks all using Unix, I think I can get some help here.
Recommend some sits or books about bank IT will be very helpful!! (0 Replies)
New to firewalld, and having an issue trying to emulate my old iptable ruleset.
Server has one network interface, which I usually only allow SSH in from certain IPs, I know I can do this with rich rules but have read that this is sub-optimal.
So, I created a new zone, ABCinternal, added a... (8 Replies)
Discussion started by: fishface
8 Replies
LEARN ABOUT OSX
slapo-pbind
SLAPO-PBIND(5) File Formats Manual SLAPO-PBIND(5)NAME
slapo-pbind - proxy bind overlay to slapd
SYNOPSIS
/etc/openldap/slapd.conf
DESCRIPTION
The pbind overlay to slapd(8) forwards Simple Binds on a local database to a remote LDAP server instead of processing them locally. The
remote connection is managed using an instance of the ldap backend.
The pbind overlay uses a subset of the ldap backend's config directives. They are described in more detail in slapd-ldap(5).
Note: this overlay is built into the ldap backend; it is not a separate module.
overlay pbind
This directive adds the proxy bind overlay to the current backend. The proxy bind overlay may be used with any backend, but it is
mainly intended for use with local storage backends.
uri <ldapurl>
LDAP server to use.
tls <TLS parameters>
Specify the use of TLS.
network-timeout <time>
Set the network timeout.
quarantine <quarantine parameters>
Turns on quarantine of URIs that returned LDAP_UNAVAILABLE.
FILES
/etc/openldap/slapd.conf
default slapd configuration file
SEE ALSO slapd.conf(5), slapd-config(5), slapd-ldap(5), slapd(8).
AUTHOR
Howard Chu
OpenLDAP 2.4.28 2011/11/24 SLAPO-PBIND(5)