[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: IP Masquerading & ipfwadm
> From: Erez Doron <erez@savan.com>
> To: Michael L. Collins <mcollins@alpha.cs.uttyl.edu>
>
Erez, your document looks fantastic.
It looks like it is of practical use, and
I intend on using it.
I do have one question:
> #Flush all old firewall commands
> /sbin/ipfwadm -F -f
> /sbin/ipfwadm -I -f
> /sbin/ipfwadm -O -f
>
> #set defualt rule to deny-all
> /sbin/ipfwadm -F -p deny
> /sbin/ipfwadm -I -p deny
> /sbin/ipfwadm -O -p deny
>
>
> # I trust my local users, so i allow all connections from
> # eth0 and loopback, if you do not, you have to add some rules here
>
I'm not clear on what you are refering to here.
Could you give us an example?
Thanks,
Michael