9 More Discussions You Might Find Interesting
1. Cybersecurity
Hey Guys,
I am looking for a good firewall software to implement in medium/large office, with at least 150 users.
I was hopping you guys could help me on this one.
Regards, (4 Replies)
Discussion started by: andrevicente
4 Replies
2. Linux
Dear All
I have put my windows machine behind my centos firewall server with just one NIC. At now, the windows machine can ping 192.9.9.3 but cannot resolve valid url (like www.google.com). I have set DNS for it as well. Can you please let me know what is the missing step?
Thank you (6 Replies)
Discussion started by: hadimotamedi
6 Replies
3. SuSE
Is there a command line interface to the firewall? (4 Replies)
Discussion started by: jgt
4 Replies
4. AIX
Please help me in creating the script in AIX.
requirement is;
The new component's main function is to extract the data from DB2 tables and company's firewall directly.
The component function needs to check the timestamp in the DB2 tables ((CREDAT and CRETIM) with the requested timestamp and... (1 Reply)
Discussion started by: priyanka3006
1 Replies
5. AIX
The main function is to extract the data from DB2 tables and FTPed to outside the company's firewall directly.
pls find the attachment and help me out..i have only one day to do this (1 Reply)
Discussion started by: priyanka3006
1 Replies
6. Cybersecurity
hi everyone
I am a newbee to firewall scripting. cannot understand how to write rules per host. in ip6tables.
anyone plz:( (2 Replies)
Discussion started by: xecutioner
2 Replies
7. Shell Programming and Scripting
Here is my situation. You can make all kinds of comments about how I am doing it and why from the networking standpoint, but I am really only looking for comments on how to make it work. Of course, any other ideas for how to do this would be welcome.
I have an iptables firewall that allows only... (1 Reply)
Discussion started by: manouche
1 Replies
8. Cybersecurity
Would it be possible to restrict access to internet pages in the following way?
A machine:
IP = 128.1.17.123
Only pages from domains of the type "go.jp" and "ne.jp" are viewable. All others are not viewable or only partly viewable.
B machine:
IP = 128.1.17.146
Regardless of the domain... (4 Replies)
Discussion started by: mntamago
4 Replies
9. Cybersecurity
Just out of curiosity, I see a lot of people here use Linux IPTables as their firewall.
Anyone here use something else like OpenBSD PF or *BSD IPF, IPFW?
I'm quite fond of OpenBSD and their Packet Filters. I find their syntax much easier to manage and from my personal experience, I find them... (5 Replies)
Discussion started by: tarballed
5 Replies
APF(1) General Commands Manual APF(1)
NAME
apf - easy iptables based firewall system
SYNOPSIS
apf
DESCRIPTION
This manual page documents briefly the apf command. This manual page was written for the Debian distribution because the original program
does not have a manual page.
Advanced Policy Firewall (APF) is an iptables (netfilter) based firewall system designed around the essential needs of today's Internet
deployed servers and the unique needs of custom deployed Linux installations. The configuration of APF is designed to be very informative
and present the user with an easy to follow process, from top to bottom of the configuration file. The management of APF on a day-to-day
basis is conducted from the command line with the 'apf' command, which includes detailed usage information and all the features one would
expect from a current and forward thinking firewall solution.
OPTIONS
apf follow the usual GNU command line syntax, with long options starting with two dashes (`-'). A summary of options is included below.
-s|--start
load all firewall rules
-r|--restart
stop (flush) & reload firewall rules
-l|--list
list all firewall rules
-t|--status
output firewall status log
-e|--refresh
refresh & resolve dns names in trust rules
-a <HOST CMT|--allow <HOST COMMENT>
add host (IP/FQDN) to allow_hosts.rules and immediately load new rule into firewall
-d <HOST CMT|--deny <HOST COMMENT>
add host (IP/FQDN) to deny_hosts.rules and immediately load new rule into firewall
-u <HOST>|--remove <HOST>
remove host from [glob]*_hosts.rules and immediately remove rule from firewall
-o|--ovars
output all configuration options
COPYRIGHT
Copyright (C) 1999-2007, R-fx Networks <proj@r-fx.org>
Copyright (C) 2007, Ryan MacDonald <ryan@r-fx.org> This program may be freely redistributed under the terms of the GNU GPL
This manual page was written by Giuseppe Iuculano <giuseppe@iuculano.it>, for the Debian project (but may be used by others).
August 17, 2008 APF(1)