01-17-2020
Check firewall-cmd or iptables -L (depending on linux release and type) rules for specific rules, containing IP addresses in questions.
This should help, if linux firewall is used.
If not, other advice given here (ss netstat nmap) should provide reasonable info.
Please, when asking such question in future, please specify your operating system and version.
This will help us help you.
Regards
Peasant.
This User Gave Thanks to Peasant For This Post:
8 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
is there a command in unix/linux that allows you to sample what the historic byte rate is from a local IP to a client IP. (1 Reply)
Discussion started by: cubs0729
1 Replies
2. Shell Programming and Scripting
Hi, need help how to count unique destination for the source ip. The file is contains 4 number of fields. Example of the file is here
src ip dest ip #of flows total bytes
192.168.6.0 88.0.33.2 12 128
192.168.6.0 88.0.33.2 1 168
192.168.6.0 ... (5 Replies)
Discussion started by: new_buddy
5 Replies
3. IP Networking
Hi all,
I have some doubts in selecting the interface to transfer packets and receive the packets.
--> Multiple interfaces :
--------------------
1) 0.0.0.0 --------> wild card address.
2) x.x.x.x --------> valid address.(192.168.1.156)
3) ff.ff.ff.ff -------->... (0 Replies)
Discussion started by: vijaypdp2006
0 Replies
4. Shell Programming and Scripting
Move all files starting with a specific name to different directory.
This shell script program should have three parameters
File Name
Source Directory
Destination Directory
User should be able to enter ‘AB_CD*' in file name parameter. In this case all the files starting with AB_CD will... (1 Reply)
Discussion started by: chetancrsp18
1 Replies
5. Linux
I'd like to specify a different build and deployment path for files, by default the same path is used for both build and install, I wasn't able to find a way to make these different. With Solaris pkgadd, one can specify different paths in prototype, so I would assume something like that is possible... (0 Replies)
Discussion started by: tiburblium
0 Replies
6. Solaris
Hi Everyone,
I am using solaris 10.I am facing a different problem here with tlsftp.I have intalled all steps for tlsftp and able to connect to the destination server from the source server.It worked for some days.But recently when i am connectin it is giving below error.I am... (0 Replies)
Discussion started by: muraliinfy04
0 Replies
7. UNIX for Advanced & Expert Users
hi All,
i have 2 server setup now for Rsync, i configured Rsync on both of the server and it worked well when i did run from source to destination. and while running back from destination to source it produced this error:
bash-3.2$ ksh rsync_bravo_db.ksh usa0300uz1247.apps.mc.xerox.com... (0 Replies)
Discussion started by: lovelysethii
0 Replies
8. Shell Programming and Scripting
Hi Guys,
how to count number of files successfully copied while coping files from source to destination path
ex:10 files from source to target location copying
if 8 files copied successfully then
echo successfully copied=8
failure=2 files
if two files get error to coping files from... (23 Replies)
Discussion started by: sravanreddy
23 Replies
LEARN ABOUT DEBIAN
fwb_iosacl
fwb_pix(1) Firewall Builder fwb_pix(1)
NAME
fwb_ipt - Policy compiler for Cisco IOS ACL
SYNOPSIS
fwb_iosacl [-vV] [-d wdir] [-4] [-6] [-i] -f data_file.xml object_name
DESCRIPTION
fwb_iosacl is firewall policy compiler component of Firewall Builder (see fwbuilder(1)). Compiler reads objects definitions and firewall
description from the data file specified with "-f" option and generates resultant Cisco IOS ACL configuration file. The configuration is
written to the file with the name the same as the name of the firewall object, plus extension ".fw". Compiler generates extended access
lists for Cisco routers running IOS v12.x using "ip access-list <name>" syntax. Compiler also generates "ip access-group" commands to
assign access lists to interfaces. Generated ACL configuration can be uploaded to the router manually or using built-in installer in the
fwbuilder(1) GUI.
The data file and the name of the firewall objects must be specified on the command line. Other command line parameters are optional.
OPTIONS
-4 Generate iptables script for IPv4 part of the policy. If any rules of the firewall refer to IPv6 addresses, compiler will skip these
rules. Options "-4" and "-6" are exclusive. If neither option is used, compiler tries to generate both parts of the script,
although generation of the IPv6 part is controlled by the option "Enable IPv6 support" in the "IPv6" tab of the firewall object
advanced settings dialog. This option is off by default.
-6 Generate iptables script for IPv6 part of the policy. If any rules of the firewall refer to IPv6 addresses, compiler will skip these
rules.
-f FILE
Specify the name of the data file to be processed.
-d wdir
Specify working directory. Compiler creates file with ACL configuration in this directory. If this parameter is missing, then gen-
erated ACL will be placed in the current working directory.
-v Be verbose: compiler prints diagnostic messages when it works.
-V Print version number and quit.
-i When this option is present, the last argument on the command line is supposed to be firewall object ID rather than its name
URL
Firewall Builder home page is located at the following URL: http://www.fwbuilder.org/
BUGS
Please report bugs using bug tracking system on SourceForge:
http://sourceforge.net/tracker/?group_id=5314&atid=105314
SEE ALSO
fwbuilder(1), fwb_pix(1), fwb_ipfw(1), fwb_ipf(1), fwb_ipt(1) fwb_pf(1)
FWB
fwb_pix(1)