Changeset 1aacd4b5 for postlfs/security/firewalling/masqrouter.xml
- Timestamp:
- 09/11/2003 07:44:39 PM (21 years ago)
- Branches:
- 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 12.0, 12.1, 6.0, 6.1, 6.2, 6.2.0, 6.2.0-rc1, 6.2.0-rc2, 6.3, 6.3-rc1, 6.3-rc2, 6.3-rc3, 7.10, 7.4, 7.5, 7.6, 7.6-blfs, 7.6-systemd, 7.7, 7.8, 7.9, 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, basic, bdubbs/svn, elogind, gnome, kde5-13430, kde5-14269, kde5-14686, kea, ken/TL2024, ken/inkscape-core-mods, ken/tuningfonts, krejzi/svn, lazarus, lxqt, nosym, perl-modules, plabs/newcss, plabs/python-mods, python3.11, qt5new, rahul/power-profiles-daemon, renodr/vulkan-addition, systemd-11177, systemd-13485, trunk, upgradedb, v5_0, v5_0-pre1, v5_1, v5_1-pre1, xry111/intltool, xry111/llvm18, xry111/soup3, xry111/test-20220226, xry111/xf86-video-removal
- Children:
- acfc391
- Parents:
- 945f944
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
postlfs/security/firewalling/masqrouter.xml
r945f944 r1aacd4b5 7 7 make sure that there are no servers running on it, especially not X11 et 8 8 al. And, as a general principle, the box itself should not access any untrusted 9 service <footnote><para>Think of a name server giving answers that make your9 service (Think of a name server giving answers that make your 10 10 bind crash, or, even worse, that implement a worm via a 11 buffer-overflow .</para></footnote>.</para>11 buffer-overflow).</para> 12 12 13 < para><screen><userinput>cat > /etc/rc.d/init.d/firewall << "EOF"</userinput>13 <screen><userinput><command>cat > /etc/rc.d/init.d/firewall << "EOF"</command> 14 14 #!/bin/sh 15 15 … … 78 78 # activate IP-Forwarding 79 79 echo 1 > /proc/sys/net/ipv4/ip_forward 80 < userinput>EOF</userinput></screen></para>80 <command>EOF</command></userinput></screen> 81 81 82 82 <para>With this script your intranet should be sufficiently
Note:
See TracChangeset
for help on using the changeset viewer.