Read about sonicwall firewall configuration, The latest news, videos, and discussion topics about sonicwall firewall configuration from alibabacloud.com
1. Enterprise and Array
Enterprise is a logical concept, similar to the domain in Windows, is the embodiment of enterprise management model in firewall software
An array is a combination of a set of ISA computers. All members of the array share the same configuration, simplifying the management of the firewall
Network structure
The network structure includes:
default:1. Ports below 1023-These are the standard ports to keep, and are primarily used by some system services, such as FTP, SSH, Telnet, HTTP, and NIS.2.NFS Server Port (2049)-NFS has been disabled on both the remote server and the local client.3. The local X Window system that is set up for the remote x client is displayed.4.X Font Server port (XFS is not listening on the network; it is disabled by default in the font server).If you want to allow access to resources such as RealAudio, but s
Absrtact: This article describes the first time the author contact Cisco PIX Firewall, summed up the Basic Firewall configuration 10 aspects of content.
Hardware firewall, is the network between the wall, to prevent illegal intrusion, filtering information, etc., structurally speaking, is simply a PC-style computer hos
When the ORACLE database was recently installed under CentOS Linux, it was shown that the EM installation failed because of the network port, so it was intended to shut down the firewall first.
It's nice to see the configuration instructions for the firewall. Perform the "Setup" command to start the text mode configuration
works inside the kernel, while iptables allows you to define the table structure of the rule set.
However, iptables rules are a little "complicated", so Ubuntu provides the UFW setting tool to simplify some iptables settings, and its background is still iptables. UFW is short for uncomplicated firewall. For some complicated settings, you still need to go to iptables.
UFW-related files and folders include:
/Etc/UFW/: contains some UFW environment
, these configurations are the same as configuring IP addresses with commands, and restarting them will lose effect.) how to save them.
[Root @ tp ~] #/Etc/rc. d/init. d/iptables save
In this way, you can write it to the/etc/sysconfig/iptables file. After writing, remember to repeat the firewall to make it work.
[Root @ tp ~] # Service iptables restart
Now there are no configurations in the IPTABLES configuration
installation, the network authentication method (NIS and LDAP) will not work.
"No Firewall"
No firewall gives full access without any security checks. Security checks are disabled for certain services. It is recommended that you select this only if you are running in a trusted network (not the Internet), or if you want to do a detailed firewall
, with the same level of security services being provided, the PIX configuration is much simpler than setting up a proxy server. In theory, all you need to do is specify an IP address and an address library for external access, an IP address and network mask for internal connections, RIP, timeouts, and other collateral security information. Here is a PIX firewall actual
The basic function of a firewall is done by six commands. In general, unless there is a special security requirement, this six command can basically handle the configuration of the firewall. The following author on the combination of Cisco firewall, to talk about the Basic Firewall
parentheses will not be displayed.sudo UFW statusUFW Use Example:Allow Port 53$ sudo ufw allow 53Disable Port 53$ sudo ufw delete Allow 53Allow Port 80$ sudo ufw allow 80/tcpDisable Port 80$ sudo ufw delete Allow 80/tcpAllow SMTP ports$ sudo ufw allow SMTPRemove licensing for SMTP ports$ sudo ufw delete allow SMTPAllow a specific IP$ sudo ufw allow from 192.168.254.254Delete the above rule$ sudo ufw delete allow from 192.168.254.254The Linux 2.4 Kernel later provides a very good
Cd/usr/lib/firewalld/services directory to store the defined Network service and port parameters, system parameters, can not be modified.
cd/etc/firewalld/services/
Systemctl Status Firewall View Firewall service status
Firewall-cmd--state View the status of firewall
Firewall
I. Introduction of APF Firewall
APF is a Linux under the Iptables firewall, by the R-FX networks development and maintenance, the implementation code is basically shell. Personally think this is the most easy-to-use and powerful firewall script under Linux. Similar levels are Bastille,firehol,kill my firewall, and so
??Vi/etc/sysconfig/iptables-A input-m state–state new-m tcp-p Tcp–dport 80-j Accept (consent 80 port via firewall)-A input-m state–state new-m tcp-p Tcp–dport 3306-j Accept (consent 3306 port via firewall)Special tips:Very many netizens add these two rules to the last line of the firewall configuration. Cause the
Because hacker technology is becoming more and more public, professional, various attacks increasingly frequent, the virus is becoming more and more rampant, major network security incidents are increasing. As the first gate of enterprise security protection, Firewall has become an important part of enterprise network security protection.
However, when we examine the security situation of our country's enterprise network, we still find that there are
Turn on the Redis port and modify the firewall configuration file Vi/etc/sysconfig/iptablesJoin Port Configuration-A rh-firewall-1-input-m state--state new-m tcp-p TCP--dport 6379-j ACCEPT-A rh-firewall-1-input-m state--state new-m tcp-p TCP--dport 6379:7000-j ACCEPT//Open p
Turn on the Redis port and modify the firewall configuration file Vi/etc/sysconfig/iptablesJoin Port Configuration-A rh-firewall-1-input-m state--state new-m tcp-p TCP--dport 6379-j ACCEPT-A rh-firewall-1-input-m state--state new-m tcp-p TCP--dport 6379:7000-j ACCEPT//Open p
Vi/etc/sysconfig/iptables-A input-m state–state new-m tcp-p tcp–dport 80-j ACCEPT (allow 80 ports through the firewall)-A input-m state–state new-m tcp-p tcp–dport 3306-j ACCEPT (Allow 3306 ports through the firewall)Special Note: Many netizens add these two rules to the last line of the firewall configuration, causing
Vi/etc/sysconfig/iptables-A input-m state–state new-m tcp-p tcp–dport 80-j ACCEPT (allow 80 ports through the firewall)-A input-m state–state new-m tcp-p tcp–dport 3306-j ACCEPT (Allow 3306 ports through the firewall)Special Tips:Many netizens add these two rules to the last line of the firewall configuration, causing
This article to introduce some practical knowledge, that is how to configure the security policy in fire. However, it should be noted that the specific configuration of the firewall is not uniform, do not say that different brands, is the same brand different models are not exactly the same, so this can only be some general firewall
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.