[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: IP Masquerading & ipfwadm




> From: Erez Doron <erez@savan.com>
> To: Michael L. Collins <mcollins@alpha.cs.uttyl.edu>
>

Erez, your document looks fantastic.
It looks like it is of practical use, and 
I intend on using it.

I do have one question:

> #Flush all old firewall commands
> /sbin/ipfwadm -F -f
> /sbin/ipfwadm -I -f
> /sbin/ipfwadm -O -f
> 
> #set defualt rule to deny-all
> /sbin/ipfwadm -F -p deny
> /sbin/ipfwadm -I -p deny
> /sbin/ipfwadm -O -p deny
> 
> 
> # I trust my local users, so i allow all connections from
> # eth0 and loopback, if you do not, you have to add some rules here
> 
I'm not clear on what you are refering to here.
Could you give us an example?

Thanks,

Michael