09-06-2005
If you just don't want people using ssh to connect to your machines, look at
this (i.e. use hosts.deny and hosts.allow).
Also, please don't use all caps when posting. It makes the post hard to read, and some people find it rude.
Cheers
ZB
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I have already compiled the kernel and configured it to run as a firewall. My computer has 2 NICs and is on two seperate networks. I can ping both networks from my computer, but workstations on one network can not ping workstations on the other.
What Scripts or commands do I need to install ? (2 Replies)
Discussion started by: Deuce
2 Replies
2. Cybersecurity
Does anyone know where I can find some Documentation on building a linux firewall. (4 Replies)
Discussion started by: aojmoj
4 Replies
3. Shell Programming and Scripting
could anybody please tell me the best fire wall for linux . (3 Replies)
Discussion started by: Raom
3 Replies
4. UNIX for Advanced & Expert Users
I have set up a linux (red hat 9) box as my main internet router. I am also running a DNS server on it. What are the rules i have to implement to allow DNS queries through the firewall from outside so that the outside world can see my domains? (1 Reply)
Discussion started by: frankkahle
1 Replies
5. Cybersecurity
HI all,
I have setup IPTables firewall/Router and my home network, with address space 192.168.10.XXX
Form my private network hosts, i can ping the gateway ( 192.168.10.101 ) , but the reverse is not happening.
Can someone help me as of what i need to do, so that i can ping my private... (1 Reply)
Discussion started by: chandan_m
1 Replies
6. IP Networking
i have a linux server runnig oracle applications.
i need to access this server from putty using ssh through internet.
i did by registering my static ip with the dnydns.org and i am able to connect to the server.
but now there is no security to authenticate any user as any one knowing the... (6 Replies)
Discussion started by: u.n.i.x
6 Replies
7. UNIX for Advanced & Expert Users
Hi All,
I successfully configured a DEBIAN Lenny bridged firewall
using ebtables.
The bridged interface is br0.
The ethernet interface are eth0 & eth1 respectively.
All the traffic are transparently passing my firewall but i need to find & block temporarily the bandwidth abusers.
Can... (1 Reply)
Discussion started by: coolatt
1 Replies
8. Shell Programming and Scripting
Hi,
I need to know what kind of firewall settings does the linux box have? Is port 25 blocked in any way?
Linux techx 3.10.0-514.10.2.el7.x86_64 #1 SMP Fri Mar 3 00:04:05 UTC 2017 x86_64 x86_64 x86_64 GNU/Linux
I'm coming from this thread. (1 Reply)
Discussion started by: mohtashims
1 Replies
9. Linux
I' m playng a little retrocomputing.
I have setup a virtual machine with SCO unix(3.2v4.2) on qemu
The machine start, the novell2000 card(ne2k_pci,ne2k_isa) unfortunately not,probably driver issue.
So I try the slirp with this procedure
On SCO
netconfig
add chain..sl ..etc
On... (2 Replies)
Discussion started by: Linusolaradm1
2 Replies
LEARN ABOUT DEBIAN
lire::firewall
Firewall(3pm) LogReport's Lire Documentation Firewall(3pm)
NAME
Lire::Firewall - supplies a subroutine enabling TCP and UDP portnumber-to-name mapping
SYNOPSIS
use Lire::Firewall qw/:firewall_number2names /;
DESCRIPTION
The Lire::Firewall::firewall_number2names converts numbers for network services, as commonly found in firewall log files, to their
descriptive names.
firewall_revolve FIXME TODO
It takes a firewall Lire dlf object as argument, and operates on its to_port, from_port and protocol properties.
TCP services, UDP services and ICMP types are supported.
SEE ALSO
RPC 792 for ICMP types.
VERSION
$Id: Firewall.pm,v 1.5 2006/07/23 13:16:27 vanbaal Exp $
COPYRIGHT
Copyright (C) 2000, 2001, 2002 Stichting LogReport Foundation LogReport@LogReport.org
This file is part of Lire.
Lire is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free
Software Foundation; either version 2 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with this program (see COPYING); if not, check with
http://www.gnu.org/copyleft/gpl.html.
AUTHOR
Francis J. Lacoste <flacoste@logreport.org>. The first Lire implementation of a TCP and UDP portnumber-to-name mapping was written by
Plamen Bozukov.
Lire 2.1.1 2006-07-23 Firewall(3pm)