首页 | 资讯动态 | linux基础 | 系统管理 | 网络管理 | 编程开发 | linux数据库 | 服务器技术 | linux相关 | linux认证 | 嵌入式 | 下载中心 | 专题 | linux招聘 | 镜像站
OKLinux中文技术站
·设为首页
·加入收藏
·联系我们
系统管理: 中文环境 系统管理 桌面应用 内核技术 | Linux基础: 基础入门 安装配置 常用命令 经验技巧 软件应用 | Linux数据库: Mysql Postgre Oracle DB2 Sybase other
网络管理: 网络安全 网络应用 Linux服务器 环境配置 黑客安全 | 编程开发: PHP CC++ Python Perl Shell 嵌入式开发 java jsp | PHP技术: PHP基础 PHP技巧 PHP应用 PHP文摘
Linux资讯 Linux招聘 Linux专题 Apache | Linux相关: 硬件相关 Linux解决方案 Linux认证 企业应用 其它Unix | 相关下载: 资料下载 参考手册 开发工具 服务器类 软路由 其它
 技术搜索:
会员中心 注册会员 高级搜索  
  → 当前位置:首页>网络管理>网络安全>正文

Ubuntu下配置shorewall防火墙

http://www.oklinux.cn  2008-03-15  来源: linuxidc   会员收藏  游客收藏  【 】 

PKTTYPE=Yes
#
# DROP INVALID PACKETS
#
# Netfilter classifies packets relative to its connection tracking table into
# four states:
#
# NEW - thes packet initiates a new connection
# ESTABLISHED - thes packet is part of an established connection
# RELATED - thes packet is related to an established connection; it may
# establish a new connection
# INVALID - the packet does not related to the table in any sensible way.
#
# Recent 2.6 kernels include code that evaluates TCP packets based on TCP
# Window analysis. This can cause packets that were previously classified as
# NEW or ESTABLISHED to be classified as INVALID.
#
# The new kernel code can be disabled by including this command in your
# /etc/shorewall/init file:
#
# echo 1 > /proc/sys/net/ipv4/netfilter/ip_conntrack_tcp_be_liberal
#
# Additional kernel logging about INVALID TCP packets may be obtained by
# adding this command to /etc/shorewall/init:
#
# echo 1 > /proc/sys/net/ipv4/netfilter/ip_conntrack_log_invalid
#
# Traditionally, Shorewall has dropped INVALID TCP packets early. The DROPINVALID
# option allows INVALID packets to be passed through the normal rules chains by
# setting DROPINVALID=No.
#
# If not specified or if specified as empty (e.g., DROPINVALID="") then
# DROPINVALID=Yes is assumed.
DROPINVALID=No
#
# RFC 1918 BEHAVIOR
#
# Traditionally, the RETURN target in the 'rfc1918' file has caused 'norfc1918'
# processing to cease for a packet if the packet's source IP address matches
# the rule. Thus, if you have:
#
# SUBNETS TARGET
# 192.168.1.0/24 RETURN
#
# then traffic from 192.168.1.4 to 10.0.3.9 will be accepted even though you
# also have:
#
# SUBNETS TARGET
# 10.0.0.0/8 logdrop
#
# Setting RFC1918_STRICT=Yes will cause such traffic to be logged and dropped
# since while the packet's source matches the RETURN rule, the packet's
# destination matches the 'logdrop' rule.
#
# If not specified or specified as empty (e.g., RFC1918_STRICT="") then
# RFC1918_STRICT=No is assumed.
#
# WARNING: RFC1918_STRICT=Yes requires that your kernel and iptables support
# 'conntrack state' match.
RFC1918_STRICT=No
#
# MACLIST caching
#
# If your iptables and kernel support the "Recent Match" (see the output of
# "shorewall check" near the top), you can cache the results of a 'maclist'
# file lookup and thus reduce the overhead associated with MAC Verification
# (/etc/shorewall/maclist).
#
# When a new connection arrives from a 'maclist' interface, the packet passes
# through then list of entries for that interface in /etc/shorewall/maclist. If
# there is a match then the source IP address is added to the 'Recent' set for
# that interface. Subsequent connection attempts from that IP address occuring
# within $MACLIST_TTL seconds will be accepted without having to scan all of
# the entries. After $MACLIST_TTL from the first accepted connection request,
# the next connection request from that IP address will be checked against
# the entire list.
#
# If MACLIST_TTL is not specified or is specified as empty (e.g,
# MACLIST_TTL="" or is specified as zero then 'maclist' lookups will not
# be cached.
MACLIST_TTL=
################################################################################
# P A C K E T D I S P O S I T I O N
################################################################################
#
# BLACKLIST DISPOSITION
#
# Set this variable to the action that you want to perform on packets from
# Blacklisted systems. Must be DROP or REJECT. If not set or set to empty,
# DROP is assumed.
#
BLACKLIST_DISPOSITION=DROP
#
# MAC List Disposition
#
# This variable determines the disposition of connection requests arriving
# on interfaces that have the 'maclist' option and that are from a device
# that is not listed for that interface in /etc/shorewall/maclist. Valid
# values are ACCEPT, DROP and REJECT. If not specified or specified as
# empty (MACLIST_DISPOSITION="") then REJECT is assumed
MACLIST_DISPOSITION=REJECT
#
# TCP FLAGS Disposition
#
# This variable determins the disposition of packets having an invalid
# combination of TCP flags that are received on interfaces having the
# 'tcpflags' option specified in /etc/shorewall/interfaces or in
# /etc/shorewall/hosts. If not specified or specified as empty
# (TCP_FLAGS_DISPOSITION="") then DROP is assumed.
TCP_FLAGS_DISPOSITION=DROP
#LAST LINE -- DO NOT REMOVE

共8页: 上一页 [1] [2] [3] [4] [5] [6] [7] 8 下一页

上一篇:Ubuntu下Mplayer安装设置及相应编码安装   下一篇:Linux系统中试试安装杀毒软件AntiVir


收藏于收藏夹】 【评论】 【推荐】 【打印】 【关闭
相关文档
·Linux系统中试试安装杀毒软件AntiVir
·Ubuntu中UFW防火墙的安装及使用
·安全不可小视 DDoS攻击全面认识
·服务器虚拟化安全管理10大步骤
·安全学习之SUSE 防火墙设置
·手工搞定那可恶的ARP病毒
·Linux主机安全设置经验之谈
·下周慎防AUTO地鼠器病毒 Linux系统不受影响
·Linux主机防DDOS和CC攻击的方案探析
·Linux操作系统安全知识集
·Linux主机开启后门的几种办法
·Linux服务器安全技术分析
·Linux系统在企业安全管理中的应用
·Linux少病毒主要原因是编写出来找不到攻击谁?
·简单设置让你的Linux系统更安全
·Linux安全之网上惊现傻瓜型病毒制作工具
发表评论
密码: 匿名评论
评论内容:

(不超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规)
 
  最新文档
·Linux系统中试试安装杀毒软件AntiVir
·Ubuntu中UFW防火墙的安装及使用
·安全不可小视 DDoS攻击全面认识
·服务器虚拟化安全管理10大步骤
·安全学习之SUSE 防火墙设置
·手工搞定那可恶的ARP病毒
·Linux主机安全设置经验之谈
·下周慎防AUTO地鼠器病毒 Linux系统不受
·Linux主机防DDOS和CC攻击的方案探析
·Linux操作系统安全知识集
·Linux主机开启后门的几种办法
·Linux服务器安全技术分析
  阅读排行
·为Linux服务器部署高效防毒软件
·从Linux内核的漏洞角度考虑系统安全
·用Apache Proxy的指令改进LAMP安全性
·linux安全:Linux ACL 体验
·玩转Ubuntu Linux之加密文件系统篇
·通过Linux工具来全面保障无线网络安全
·操作系统安全防护技巧介绍之Linux篇
·使用SSL 保护VNC应用程序
·通过Linux系统伪装方法加固系统安全
·MPPE加密VPN服务器详解
·使用mod_proxy改进LAMP 安全
·增强Linux/Unix服务器系统安全性介绍
·构筑Unix系统防火墙体系的多种解决方案
·在breezy安装AntiVir的全攻略
·Linux操作系统下的网络安全工具详细介
网摘收藏: