8 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Consolidate several lines of a CSV file with firewall rules
Hi guys.
I have a CSV file, which I created using an HTML export from a Check Point firewall policy.
Each rule is represented as several lines, in some cases. That occurs when a rule has several address sources, destinations or... (4 Replies)
Discussion started by: starriol
4 Replies
2. UNIX for Dummies Questions & Answers
Alright... this question comes from the fact that I'm trying to setup postfix to relay messages to Office 365 SMTP but its giving me connection refused... I read that if you have doubts if your port is open or not you should telnet to them so thats what I did.
This is a Red Hat 6.3 box.
My... (4 Replies)
Discussion started by: RedSpyder
4 Replies
3. Cybersecurity
Dear Sir,
I want to test the VOIP Telephony system installed in a IP PBX server behind a NAT router. This NAT router connects to a modem (with NAT as well), and then the modem (with static public IP assigned by the ISP, e.g. 219.45.67.80) directly connects to the Internet. There are several... (0 Replies)
Discussion started by: qiubosu
0 Replies
4. UNIX for Dummies Questions & Answers
Hi ,
facing problem for mysql start in mysql cluster
server 1 when starts mysql It starts successfully
then
server 2 when starts mysql unable start
so I look to check both server 1 and server 2 iptable
below results
For Server 1
# iptables -L -n
Chain INPUT (policy ACCEPT)... (0 Replies)
Discussion started by: kaushik02018
0 Replies
5. UNIX for Dummies Questions & Answers
Dear all,
I wish to place make a very simple FIREWALL with IPTABLES. There are some issues and points to make before I do, so this post is just to see if it can be done. I know it wont be the best solution but it may be OK.
1. We have two Windows servers in a datacenter without a firewall... (1 Reply)
Discussion started by: Bradley Porter
1 Replies
6. UNIX for Advanced & Expert Users
Hello,
I would like to modify my firewall configuration for being able to handle 2 internet connections in my Red zone.
I would then like to configure some selecting routing rules depending on the internal source.
Actual configuration:
=====================
1 router A (ISP)... (1 Reply)
Discussion started by: el70
1 Replies
7. Cybersecurity
UTIN Firewall script for Linux 2.4.x and iptables
==============================================
#!/bin/sh
#
# rc.firewall - UTIN Firewall script for Linux 2.4.x and iptables
#
# Copyright (C) 2001 Oskar Andreasson <bluefluxATkoffeinDOTnet>
#
# This program is free software; you can... (5 Replies)
Discussion started by: binhnx2000
5 Replies
8. UNIX for Dummies Questions & Answers
I have already compiled the kernel and configured it to run as a firewall. My computer has 2 NICs and is on two seperate networks. I can ping both networks from my computer, but workstations on one network can not ping workstations on the other.
What Scripts or commands do I need to install ? (2 Replies)
Discussion started by: Deuce
2 Replies
fwb_pix(1) Firewall Builder fwb_pix(1)
NAME
fwb_ipt - Policy compiler for Cisco IOS ACL
SYNOPSIS
fwb_iosacl [-vV] [-d wdir] [-4] [-6] [-i] -f data_file.xml object_name
DESCRIPTION
fwb_iosacl is firewall policy compiler component of Firewall Builder (see fwbuilder(1)). Compiler reads objects definitions and firewall
description from the data file specified with "-f" option and generates resultant Cisco IOS ACL configuration file. The configuration is
written to the file with the name the same as the name of the firewall object, plus extension ".fw". Compiler generates extended access
lists for Cisco routers running IOS v12.x using "ip access-list <name>" syntax. Compiler also generates "ip access-group" commands to
assign access lists to interfaces. Generated ACL configuration can be uploaded to the router manually or using built-in installer in the
fwbuilder(1) GUI.
The data file and the name of the firewall objects must be specified on the command line. Other command line parameters are optional.
OPTIONS
-4 Generate iptables script for IPv4 part of the policy. If any rules of the firewall refer to IPv6 addresses, compiler will skip these
rules. Options "-4" and "-6" are exclusive. If neither option is used, compiler tries to generate both parts of the script,
although generation of the IPv6 part is controlled by the option "Enable IPv6 support" in the "IPv6" tab of the firewall object
advanced settings dialog. This option is off by default.
-6 Generate iptables script for IPv6 part of the policy. If any rules of the firewall refer to IPv6 addresses, compiler will skip these
rules.
-f FILE
Specify the name of the data file to be processed.
-d wdir
Specify working directory. Compiler creates file with ACL configuration in this directory. If this parameter is missing, then gen-
erated ACL will be placed in the current working directory.
-v Be verbose: compiler prints diagnostic messages when it works.
-V Print version number and quit.
-i When this option is present, the last argument on the command line is supposed to be firewall object ID rather than its name
URL
Firewall Builder home page is located at the following URL: http://www.fwbuilder.org/
BUGS
Please report bugs using bug tracking system on SourceForge:
http://sourceforge.net/tracker/?group_id=5314&atid=105314
SEE ALSO
fwbuilder(1), fwb_pix(1), fwb_ipfw(1), fwb_ipf(1), fwb_ipt(1) fwb_pf(1)
FWB
fwb_pix(1)