Zone ipf question


 
Thread Tools Search this Thread
Operating Systems Solaris Zone ipf question
# 8  
Old 08-17-2012
jubilee,
I already have the IP address set. Look at my 1st post. I was just asking if for advice on where and how to set the ipf filters.

Everyone,
My co-worker tried to set the ipf rules on the non-global zone in the zone and the ipf service went into maintenance mode. We also had an issue when we tryed to use the interface name with :1. Fir example if we use the interface name e1000g0:1 we get an error. If we use e1000g0 for the non-glabal zone we don't get the error.

Thanks for everyone's help.
Login or Register to Ask a Question

Previous Thread | Next Thread

9 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Solaris 10: I forgot to detach a zone before zpool export. Uninstall zone?

Dear all, recently, I migrated a solaris zone from one host to another. The zone was inside of a zpool. The zpool cotains two volumes. I did the following: host1: $ zlogin zone1 shutdown -y -g0 -i0 #Zone status changes from running to installed $ zpool export zone1 host2: $ zpool... (2 Replies)
Discussion started by: custos
2 Replies

2. Solaris

Zone Cluster Question

I have a question about losing a node in a zone cluster. Hopefully I can explain enough for someone to answer. Let's say I have a zone cluster spread over 3 physical nodes. If Node1 crashes, would I be correct in assuming I would lose all zones on Node1? If I lost Node1 below, would I lose... (4 Replies)
Discussion started by: MasonJ
4 Replies

3. UNIX for Advanced & Expert Users

ipf/ipnat NAT/port forward issues

I've been going crazy trying to get this working. Here's the situation: we have a Solaris 10 box that connects an internal network to an external network. We're using ipf/ipnat on it. We've added a couple of new boxes to the internal network (192.168.1.100, .101) and want to be able to get to port... (1 Reply)
Discussion started by: spakov
1 Replies

4. Solaris

Zone failes to boot due to mount issue, dir exists in zone.

I have two physical servers, with zones that mount local storage. We were using "raw device" in the zonecfg to point to a metadevice on the global zone (it was not mounted in the global zone at any point). It failed to mount on every boot because the directory existed in the zone. I... (6 Replies)
Discussion started by: BG_JrAdmin
6 Replies

5. Cybersecurity

IPF pass in connection to port 21 even with no explicit rule

I'm running IPF on solaris 10 bash-3.00# ipf -V #display ipf version ipf: IP Filter: v4.1.9 (592) Kernel: IP Filter: v4.1.9 Running: yes Log Flags: 0 = none set Default: pass all, Logging: available Active list: 1 Feature mask: 0x107 with the following rules bash-3.00# ipfstat -o -i... (0 Replies)
Discussion started by: h@foorsa.biz
0 Replies

6. Solaris

IPF on Solaris 10 prior 10 8/07 releases

I'm trying to enable IPF ( ip filter ) on solaris 10 release 6/06 Solaris 10 6/06 s10s_u2wos_09a SPARC so i enabled svc:/network/ipfilter:default it was disabled by default and svc:/network/pfil:default was enabled and online there only one config file under etc $/etc/ipf/ipf.conf i... (1 Reply)
Discussion started by: h@foorsa.biz
1 Replies

7. Solaris

Some Question's about Zone

Hi all, i am new learner in Zoning and virtualization Technology and i have some question's about it i create zone using this step zonecfg -z app-apache create set zonepath=/zone_adm/app-apache add net set address=192.168.1.250 set physical=bge0 end set autoboot=true verify commit... (13 Replies)
Discussion started by: coxmanchester
13 Replies

8. Solaris

ipf.conf question

OK I am running solaris 10. I made some changes to my ipf.conf file and issued the command: ipf -Fa -f /etc/ipf/ipf.conf to flush out the old and bring in the new changes. When I ran ipfstat -ioh to verify it had brought in the new rule set I saw something I wasn't expecting to see. I... (3 Replies)
Discussion started by: NewSolarisAdmin
3 Replies

9. Solaris

Question regarding Zone Migration

I have a general question regarding Zone Migration. I have an older system that is currently running a zone configured with ProFTPD & SSL. If I want to migrate or clone that zone to another (much newer) system, will I still have to setup & configure ProFTPD & SSL on the new system? (3 Replies)
Discussion started by: em23
3 Replies
Login or Register to Ask a Question
ipf(1M)                                                                                                                                    ipf(1M)

NAME
ipf - alter packet filtering lists for IP packet input and output SYNOPSIS
ipf [-AdDEInoPrsvVyzZ] [-l block | pass | nomatch] [-T optionlist] [-F i | o | a | s | S] -f filename [-f filename...] The ipf utility opens the filenames listed (treating a hyphen (-) as stdin) and parses the file for a set of rules which are to be added or removed from the packet filter rule set. If there are no parsing problems, each rule processed by ipf is added to the kernel's internal lists. Rules are added to the end of the internal lists, matching the order in which they appear when given to ipf. ipf's use is restricted through access to /dev/ipauth, /dev/ipl, and /dev/ipstate. The default permissions of these files require ipf to be run as root for all operations. The following options are supported: -A Set the list to make changes to the active list (default). -d Turn debug mode on. Causes a hex dump of filter rules to be generated as it processes each one. -D Disable the filter (if enabled). Not effective for loadable kernel versions. -E Enable the filter (if disabled). Not effective for loadable kernel versions. -F i | o | a Specifies which filter list to flush. The parameter should either be i (input), o (output) or a (remove all filter rules). Either a single letter or an entire word starting with the appropriate letter can be used. This option can be before or after any other, with the order on the command line determining that used to execute options. -F s | S To flush entries from the state table, use the -F option in conjuction with either s (removes state information about any non-fully established connections) or S (deletes the entire state table). You can specify only one of these two options. A fully established con- nection will show up in ipfstat -s output as 4/4, with deviations either way indicating the connection is not fully established. -f filename Specifies which files ipf should use to get input from for modifying the packet filter rule lists. -I Set the list to make changes to the inactive list. -l pass | block | nomatch Toggles default logging of packets. Valid arguments to this option are pass, block and nomatch. When an option is set, any packet which exits filtering and matches the set category is logged. This is most useful for causing all packets that do not match any of the loaded rules to be logged. -n Prevents ipf from making any ioctl calls or doing anything which would alter the currently running kernel. -o Force rules by default to be added/deleted to/from the output list, rather than the (default) input list. -P Add rules as temporary entries in the authentication rule table. -r Remove matching filter rules rather than add them to the internal lists. -s Swap the currently active filter list to be an alternative list. -T optionlist Allows run-time changing of IPFilter kernel variables. To allow for changing, some variables require IPFilter to be in a disabled state (-D), others do not. The optionlist parameter is a comma-separated list of tuning commands. A tuning command is one of the following: list Retrieve a list of all variables in the kernel, their maximum, minimum, and current value. single variable name Retrieve its current value. variable name with a following assignment To set a new value. Examples follow: # Print out all IPFilter kernel tunable parameters ipf -T list # Display the current TCP idle timeout and then set it to 3600 ipf -D -T fr_tcpidletimeout,fr_tcpidletimeout=3600 -E # Display current values for fr_pass and fr_chksrc, then set # fr_chksrc to 1. ipf -T fr_pass,fr_chksrc,fr_chksrc=1 -v Turn verbose mode on. Displays information relating to rule processing. -V Show version information. This will display the version information compiled into the ipf binary and retrieve it from the kernel code (if running or present). If it is present in the kernel, information about its current state will be displayed; for example, whether logging is active, default filtering, and so forth). -y Manually resync the in-kernel interface list maintained by IP Filter with the current interface status list. -z For each rule in the input file, reset the statistics for it to zero and display the statistics prior to them being zeroed. -Z Zero global statistics held in the kernel for filtering only. This does not affect fragment or state statistics. /dev/ipauth /dev/ipl /dev/ipstate Links to IP Filter pseudo devices. /etc/ipf/ipf.conf Location of ipf startup configuration file. /usr/share/ipfilter/examples/ Contains numerous IP Filter examples. See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWipfu | +-----------------------------+-----------------------------+ |Interface Stability |Evolving | +-----------------------------+-----------------------------+ ipfstat(1M), ipmon(1M), ipnat(1M), ipf(4), attributes(5) Needs to be run as root for the packet filtering lists to actually be affected inside the kernel. To view license terms, attribution, and copyright for IP Filter, the default path is /usr/lib/ipf/IPFILTER.LICENCE. If the Solaris operat- ing environment has been installed anywhere other than the default, modify the given path to access the file at the installed location. 25 Jul 2005 ipf(1M)