I am relatively new to UNIX. From the UNIX machine is there anyway of finding out to what and all other machines is the firewall open.
We usually do telnet <machine_name> <port> to fidn out if the firewall is open. Is there anyway i can get an entire list.
Below is what i did to open the firewall port on
# sudo firewall-cmd --zone=public --add-port=27012/tcp --permanent
Warning: ALREADY_ENABLED: 27012:tcp
success
# sudo firewall-cmd --reload
success
# firewall-cmd --list-all
public
target: default
icmp-block-inversion: no
... (10 Replies)
Alright... this question comes from the fact that I'm trying to setup postfix to relay messages to Office 365 SMTP but its giving me connection refused... I read that if you have doubts if your port is open or not you should telnet to them so thats what I did.
This is a Red Hat 6.3 box.
My... (4 Replies)
First post, sorry to be a bother but this one has been dogging me. I have a process user (java application server) that trips a resource limit every couple weeks and need help finding what limit we're hitting.
First, this is what's running:
This is the error when jobs are run or the... (0 Replies)
Hi,
So that potential responders will have an idea of what they're dealing with let me say that while I am a UNIX newbie I have been in IT for over 10 years.
We have several SUN boxes running ver 5 of the OS that have been sitting dormant for some time as they were part of a now defunct... (3 Replies)
fwb_ipt(1) Firewall Builder fwb_ipt(1)NAME
fwb_ipt - Policy compiler for iptables
SYNOPSIS
fwb_ipt -fdata_file.xml [-4] [-6] [-V] [-dwdir] [-i] [-ooutput.fw] [-Ofw1_id,fw1_output.fw[,fw2_id,fw2_output.fw]] [-v] [-xc] [-xnN] [-xpN]
[-xt] object_name
DESCRIPTION
fwb_ipt is a firewall policy compiler component of Firewall Builder (see fwbuilder(1)). Compiler reads objects definitions and firewall
description from the data file specified with "-f" option and generates resultant iptables script. The script is written to the file with
the name the same as the name of the firewall object, plus extension ".fw".
The data file and the name of the firewall objects must be specified on the command line. Other command line parameters are optional.
OPTIONS -4 Generate iptables script for IPv4 part of the policy. If any rules of the firewall refer to IPv6 addresses, compiler will skip these
rules. Options "-4" and "-6" are exclusive. If neither option is used, compiler tries to generate both parts of the script,
although generation of the IPv6 part is controlled by the option "Enable IPv6 support" in the "IPv6" tab of the firewall object
advanced settings dialog. This option is off by default.
-6 Generate iptables script for IPv6 part of the policy. If any rules of the firewall refer to IPv6 addresses, compiler will skip these
rules.
-f FILE
Specify the name of the data file to be processed.
-o output.fw
Specify output file name
-O fw1_id,fw1_output.fw[,fw2_id,fw2_output.fw]
The argument is a comma separated list of firewall object IDs and corresponding output file names. This option is used by fwbuilder
GUI while compiling firewall clusters.
-d wdir
Specify working directory. Compiler creates file with iptables script in this directory. If this parameter is missing, then ipta-
bles script will be placed in the current working directory.
-v Be verbose: compiler prints diagnostic messages when it works.
-V Print version number and quit.
-i When this option is present, the last argument on the command line is supposed to be firewall object ID rather than its name
-xc When output file name is determined automatically (i.e. flags -o or -O are not present), the file name is composed of the cluster
name and member firewall name rather than just member firewall name. This is used mostly for testing when the same member firewall
object can be a part of different clusters with different configurations.
-xt This flag makes compiler treat all fatal errors as warnings and continue processing rules. Generated configuration script most
likely will be incorrect but will include error message as a comment; this flag is used for testing and debugging.
-xp N Debugging flag: this causes compiler to print detailed description of the policy rule number "N" as it precesses it, step by step.
-xn N Debugging flag: this causes compiler to print detailed description of the NAT rule number "N" as it precesses it, step by step.
URL
Firewall Builder home page is located at the following URL: http://www.fwbuilder.org/
BUGS
Please report bugs using bug tracking system on SourceForge:
http://sourceforge.net/tracker/?group_id=5314&atid=105314
SEE ALSO fwbuilder(1), fwb_ipf(1), fwb_pf(1)FWB fwb_ipt(1)