首页 | 资讯动态 | linux基础 | 系统管理 | 网络管理 | 编程开发 | linux数据库 | 服务器技术 | linux相关 | linux认证 | 嵌入式 | 下载中心 | 专题 | linux招聘 | 镜像站
OKLinux中文技术站
·设为首页
·加入收藏
·联系我们
系统管理: 中文环境 系统管理 桌面应用 内核技术 | Linux基础: 基础入门 安装配置 常用命令 经验技巧 软件应用 | Linux数据库: Mysql Postgre Oracle DB2 Sybase other
网络管理: 网络安全 网络应用 Linux服务器 环境配置 黑客安全 | 编程开发: PHP CC++ Python Perl Shell 嵌入式开发 java jsp | PHP技术: PHP基础 PHP技巧 PHP应用 PHP文摘
Linux资讯 Linux招聘 Linux专题 Apache | Linux相关: 硬件相关 Linux解决方案 Linux认证 企业应用 其它Unix | 相关下载: 资料下载 参考手册 开发工具 服务器类 软路由 其它
 技术搜索:
会员中心 注册会员 高级搜索  
  → 当前位置:首页>网络管理>网络安全>正文

Ubuntu下配置shorewall防火墙

http://www.oklinux.cn  2008-03-15  来源: linuxidc   会员收藏  游客收藏  【 】 

# 0 emerg
#
# For most Shorewall logging, a level of 6 (info) is appropriate. Shorewall
# log messages are generated by NetFilter and are logged using facility
# 'kern' and the level that you specifify. If you are unsure of the level
# to choose, 6 (info) is a safe bet. You may specify levels by name or by
# number.
#
# If you have built your kernel with ULOG target support, you may also
# specify a log level of ULOG (must be all caps). Rather than log its
# messages to syslogd, Shorewall will direct netfilter to log the messages
# via the ULOG target which will send them to a process called 'ulogd'.
# ulogd is available with most Linux distributions (although it probably isn't
# installed by default). Ulogd is also available from
# http://www.gnumonks.org/projects/ulogd and can be configured to log all
# Shorewall message to their own log file
################################################################################
#
# LOG FILE LOCATION
#
# This variable tells the /sbin/shorewall program where to look for Shorewall
# log messages. If not set or set to an empty string (e.g., LOGFILE="") then
# /var/log/messages is assumed.
#
# WARNING: The LOGFILE variable simply tells the 'shorewall' program where to
# look for Shorewall messages.It does NOT control the destination for
# these messages. For information about how to do that, see
#
# http://www.shorewall.net/shorewall_logging.html
LOGFILE=/var/log/messages
#
# LOG FORMAT
#
# Shell 'printf' Formatting template for the --log-prefix value in log messages
# generated by Shorewall to identify Shorewall log messages. The supplied
# template is expected to accept either two or three arguments; the first is
# the chain name, the second (optional) is the logging rule number within that
# chain and the third is the ACTION specifying the disposition of the packet
# being logged. You must use the %d formatting type for the rule number; if your
# template does not contain %d then the rule number will not be included.
#
# If you want to integrate Shorewall with fireparse, then set LOGFORMAT as:
#
# LOGFORMAT="fp=%s:%d a=%s "
#
# If not specified or specified as empty (LOGFORMAT="") then the value
# "Shorewall:%s:%s:" is assumed.
#
# CAUTION: /sbin/shorewall uses the leading part of the LOGFORMAT string (up
# to but not including the first '%') to find log messages in the 'show log',
# 'status' and 'hits' commands. This part should not be omitted (the
# LOGFORMAT should not begin with "%") and the leading part should be
# sufficiently unique for /sbin/shorewall to identify Shorewall messages.
LOGFORMAT="Shorewall:%s:%s:"
#
# LOG FORMAT Continued
#
# Using the default LOGFORMAT, chain names may not exceed 11 characters or
# truncation of the log prefix may occur. Longer chain names may be used with
# log tags if you set LOGTAGONLY=Yes. With LOGTAGONLY=Yes, if a log tag is
# specified then the tag is included in the log prefix in place of the chain
# name.
#
LOGTAGONLY=No
#
# LOG RATE LIMITING
#
# The next two variables can be used to control the amount of log output
# generated. LOGRATE is expressed as a number followed by an optional
# `/second', `/minute', `/hour', or `/day' suffix and specifies the maximum
# rate at which a particular message will occur. LOGBURST determines the
# maximum initial burst size that will be logged. If set empty, the default
# value of 5 will be used.
#
# If BOTH variables are set empty then logging will not be rate-limited.
#
# Example:
#
# LOGRATE=10/minute
# LOGBURST=5
#
# For each logging rule, the first time the rule is reached, the packet
# will be logged; in fact, since the burst is 5, the first five packets
# will be logged. After this, it will be 6 seconds (1 minute divided by
# the rate of 10) before a message will be logged from the rule, regardless
# of how many packets reach it. Also, every 6 seconds which passes without
# matching a packet, one of the bursts will be regained; if no packets hit
# the rule for 30 seconds, the burst will be fully recharged; back where
# we started.
#
LOGRATE=
LOGBURST=
#
# LOG ALL NEW
#
# This option should only be used when you are trying to analyze a problem.
# It causes all packets in the Netfilter NEW state to be logged as the
# first rule in each builtin chain. To use this option, set LOGALLNEW to
# the log level that you want these packets logged at (e.g.,
# LOGALLNEW=debug).
#
LOGALLNEW=
#
# BLACKLIST LOG LEVEL
#
# Set this variable to the syslogd level that you want blacklist packets logged
# (beware of DOS attacks resulting from such logging). If not set, no logging
# of blacklist packets occurs.
#
# See the comment at the top of this section for a description of log levels
共8页: 上一页 [1] [2] 3 [4] [5] [6] [7] [8] 下一页

上一篇:Ubuntu下Mplayer安装设置及相应编码安装   下一篇:Linux系统中试试安装杀毒软件AntiVir


收藏于收藏夹】 【评论】 【推荐】 【打印】 【关闭
相关文档
·Linux系统中试试安装杀毒软件AntiVir
·Ubuntu中UFW防火墙的安装及使用
·安全不可小视 DDoS攻击全面认识
·服务器虚拟化安全管理10大步骤
·安全学习之SUSE 防火墙设置
·手工搞定那可恶的ARP病毒
·Linux主机安全设置经验之谈
·下周慎防AUTO地鼠器病毒 Linux系统不受影响
·Linux主机防DDOS和CC攻击的方案探析
·Linux操作系统安全知识集
·Linux主机开启后门的几种办法
·Linux服务器安全技术分析
·Linux系统在企业安全管理中的应用
·Linux少病毒主要原因是编写出来找不到攻击谁?
·简单设置让你的Linux系统更安全
·Linux安全之网上惊现傻瓜型病毒制作工具
发表评论
密码: 匿名评论
评论内容:

(不超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规)
 
  最新文档
·Linux系统中试试安装杀毒软件AntiVir
·Ubuntu中UFW防火墙的安装及使用
·安全不可小视 DDoS攻击全面认识
·服务器虚拟化安全管理10大步骤
·安全学习之SUSE 防火墙设置
·手工搞定那可恶的ARP病毒
·Linux主机安全设置经验之谈
·下周慎防AUTO地鼠器病毒 Linux系统不受
·Linux主机防DDOS和CC攻击的方案探析
·Linux操作系统安全知识集
·Linux主机开启后门的几种办法
·Linux服务器安全技术分析
  阅读排行
·为Linux服务器部署高效防毒软件
·从Linux内核的漏洞角度考虑系统安全
·用Apache Proxy的指令改进LAMP安全性
·linux安全:Linux ACL 体验
·玩转Ubuntu Linux之加密文件系统篇
·通过Linux工具来全面保障无线网络安全
·操作系统安全防护技巧介绍之Linux篇
·使用SSL 保护VNC应用程序
·通过Linux系统伪装方法加固系统安全
·MPPE加密VPN服务器详解
·使用mod_proxy改进LAMP 安全
·增强Linux/Unix服务器系统安全性介绍
·构筑Unix系统防火墙体系的多种解决方案
·在breezy安装AntiVir的全攻略
·Linux操作系统下的网络安全工具详细介
网摘收藏: