8 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Consolidate several lines of a CSV file with firewall rules
Hi guys.
I have a CSV file, which I created using an HTML export from a Check Point firewall policy.
Each rule is represented as several lines, in some cases. That occurs when a rule has several address sources, destinations or... (4 Replies)
Discussion started by: starriol
4 Replies
2. UNIX for Dummies Questions & Answers
Alright... this question comes from the fact that I'm trying to setup postfix to relay messages to Office 365 SMTP but its giving me connection refused... I read that if you have doubts if your port is open or not you should telnet to them so thats what I did.
This is a Red Hat 6.3 box.
My... (4 Replies)
Discussion started by: RedSpyder
4 Replies
3. Cybersecurity
Dear Sir,
I want to test the VOIP Telephony system installed in a IP PBX server behind a NAT router. This NAT router connects to a modem (with NAT as well), and then the modem (with static public IP assigned by the ISP, e.g. 219.45.67.80) directly connects to the Internet. There are several... (0 Replies)
Discussion started by: qiubosu
0 Replies
4. UNIX for Dummies Questions & Answers
Hi ,
facing problem for mysql start in mysql cluster
server 1 when starts mysql It starts successfully
then
server 2 when starts mysql unable start
so I look to check both server 1 and server 2 iptable
below results
For Server 1
# iptables -L -n
Chain INPUT (policy ACCEPT)... (0 Replies)
Discussion started by: kaushik02018
0 Replies
5. UNIX for Dummies Questions & Answers
Dear all,
I wish to place make a very simple FIREWALL with IPTABLES. There are some issues and points to make before I do, so this post is just to see if it can be done. I know it wont be the best solution but it may be OK.
1. We have two Windows servers in a datacenter without a firewall... (1 Reply)
Discussion started by: Bradley Porter
1 Replies
6. UNIX for Advanced & Expert Users
Hello,
I would like to modify my firewall configuration for being able to handle 2 internet connections in my Red zone.
I would then like to configure some selecting routing rules depending on the internal source.
Actual configuration:
=====================
1 router A (ISP)... (1 Reply)
Discussion started by: el70
1 Replies
7. Cybersecurity
UTIN Firewall script for Linux 2.4.x and iptables
==============================================
#!/bin/sh
#
# rc.firewall - UTIN Firewall script for Linux 2.4.x and iptables
#
# Copyright (C) 2001 Oskar Andreasson <bluefluxATkoffeinDOTnet>
#
# This program is free software; you can... (5 Replies)
Discussion started by: binhnx2000
5 Replies
8. UNIX for Dummies Questions & Answers
I have already compiled the kernel and configured it to run as a firewall. My computer has 2 NICs and is on two seperate networks. I can ping both networks from my computer, but workstations on one network can not ping workstations on the other.
What Scripts or commands do I need to install ? (2 Replies)
Discussion started by: Deuce
2 Replies
APF(1) General Commands Manual APF(1)
NAME
apf - easy iptables based firewall system
SYNOPSIS
apf
DESCRIPTION
This manual page documents briefly the apf command. This manual page was written for the Debian distribution because the original program
does not have a manual page.
Advanced Policy Firewall (APF) is an iptables (netfilter) based firewall system designed around the essential needs of today's Internet
deployed servers and the unique needs of custom deployed Linux installations. The configuration of APF is designed to be very informative
and present the user with an easy to follow process, from top to bottom of the configuration file. The management of APF on a day-to-day
basis is conducted from the command line with the 'apf' command, which includes detailed usage information and all the features one would
expect from a current and forward thinking firewall solution.
OPTIONS
apf follow the usual GNU command line syntax, with long options starting with two dashes (`-'). A summary of options is included below.
-s|--start
load all firewall rules
-r|--restart
stop (flush) & reload firewall rules
-l|--list
list all firewall rules
-t|--status
output firewall status log
-e|--refresh
refresh & resolve dns names in trust rules
-a <HOST CMT|--allow <HOST COMMENT>
add host (IP/FQDN) to allow_hosts.rules and immediately load new rule into firewall
-d <HOST CMT|--deny <HOST COMMENT>
add host (IP/FQDN) to deny_hosts.rules and immediately load new rule into firewall
-u <HOST>|--remove <HOST>
remove host from [glob]*_hosts.rules and immediately remove rule from firewall
-o|--ovars
output all configuration options
COPYRIGHT
Copyright (C) 1999-2007, R-fx Networks <proj@r-fx.org>
Copyright (C) 2007, Ryan MacDonald <ryan@r-fx.org> This program may be freely redistributed under the terms of the GNU GPL
This manual page was written by Giuseppe Iuculano <giuseppe@iuculano.it>, for the Debian project (but may be used by others).
August 17, 2008 APF(1)