03-19-2003
Shorewall
I recently started working with Shorewall (
www.shorewall.net). It uses IPTables and IPChains. You may find it useful!
Ciao,
N
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I have already compiled the kernel and configured it to run as a firewall. My computer has 2 NICs and is on two seperate networks. I can ping both networks from my computer, but workstations on one network can not ping workstations on the other.
What Scripts or commands do I need to install ? (2 Replies)
Discussion started by: Deuce
2 Replies
2. IP Networking
ON A LINUX NETWORK, HOW DO I ASSIGN IP ADDRESSES TO OTHER TERMINALS AND AFTER THAT HOW I CAN DENY/GRANT ACCESS TO TERMINALS ON A LAN TO MY TERMINAL.PLEASE SPECIFY THE EXACT COMMANDS.kINDLY HELP ME (3 Replies)
Discussion started by: ameya_shaligram
3 Replies
3. Shell Programming and Scripting
could anybody please tell me the best fire wall for linux . (3 Replies)
Discussion started by: Raom
3 Replies
4. UNIX for Advanced & Expert Users
I have set up a linux (red hat 9) box as my main internet router. I am also running a DNS server on it. What are the rules i have to implement to allow DNS queries through the firewall from outside so that the outside world can see my domains? (1 Reply)
Discussion started by: frankkahle
1 Replies
5. Cybersecurity
HI all,
I have setup IPTables firewall/Router and my home network, with address space 192.168.10.XXX
Form my private network hosts, i can ping the gateway ( 192.168.10.101 ) , but the reverse is not happening.
Can someone help me as of what i need to do, so that i can ping my private... (1 Reply)
Discussion started by: chandan_m
1 Replies
6. IP Networking
i have a linux server runnig oracle applications.
i need to access this server from putty using ssh through internet.
i did by registering my static ip with the dnydns.org and i am able to connect to the server.
but now there is no security to authenticate any user as any one knowing the... (6 Replies)
Discussion started by: u.n.i.x
6 Replies
7. UNIX for Advanced & Expert Users
Hi All,
I successfully configured a DEBIAN Lenny bridged firewall
using ebtables.
The bridged interface is br0.
The ethernet interface are eth0 & eth1 respectively.
All the traffic are transparently passing my firewall but i need to find & block temporarily the bandwidth abusers.
Can... (1 Reply)
Discussion started by: coolatt
1 Replies
8. Shell Programming and Scripting
Hi,
I need to know what kind of firewall settings does the linux box have? Is port 25 blocked in any way?
Linux techx 3.10.0-514.10.2.el7.x86_64 #1 SMP Fri Mar 3 00:04:05 UTC 2017 x86_64 x86_64 x86_64 GNU/Linux
I'm coming from this thread. (1 Reply)
Discussion started by: mohtashims
1 Replies
9. Linux
I' m playng a little retrocomputing.
I have setup a virtual machine with SCO unix(3.2v4.2) on qemu
The machine start, the novell2000 card(ne2k_pci,ne2k_isa) unfortunately not,probably driver issue.
So I try the slirp with this procedure
On SCO
netconfig
add chain..sl ..etc
On... (2 Replies)
Discussion started by: Linusolaradm1
2 Replies
LEARN ABOUT DEBIAN
fwb_pix
fwb_pix(1) Firewall Builder fwb_pix(1)
NAME
fwb_ipt - Policy compiler for Cisco PIX
SYNOPSIS
fwb_pix -fdata_file.xml [-V] [-dwdir] [-i] [-v] [-xc] [-xt] object_name
DESCRIPTION
fwb_pix is firewall policy compiler component of Firewall Builder (see fwbuilder(1)). Compiler reads objects definitions and firewall
description from the data file specified with "-f" option and generates resultant Cisco PIX configuration file. The configuration is writ-
ten to the file with the name the same as the name of the firewall object, plus extension ".fw".
The data file and the name of the firewall objects must be specified on the command line. Other command line parameters are optional.
OPTIONS
-f FILE
Specify the name of the data file to be processed.
-d wdir
Specify working directory. Compiler creates file with PIX configuration in this directory. If this parameter is missing, then PIX
configuration will be placed in the current working directory.
-v Be verbose: compiler prints diagnostic messages when it works.
-V Print version number and quit.
-i When this option is present, the last argument on the command line is supposed to be firewall object ID rather than its name
-xc When output file name is determined automatically (i.e. flags -o or -O are not present), the file name is composed of the cluster
name and member firewall name rather than just member firewall name. This is used mostly for testing when the same member firewall
object can be a part of different clusters with different configurations.
-xt This flag makes compiler treat all fatal errors as warnings and continue processing rules. Generated configuration script most
likely will be incorrect but will include error message as a comment; this flag is used for testing and debugging.
URL
Firewall Builder home page is located at the following URL: http://www.fwbuilder.org/
BUGS
Please report bugs using bug tracking system on SourceForge:
http://sourceforge.net/tracker/?group_id=5314&atid=105314
SEE ALSO
fwbuilder(1), fwb_ipf(1), fwb_ipt(1) fwb_pf(1)
FWB
fwb_pix(1)