亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? firewalls.html

?? FreeBSD操作系統的詳細使用手冊
?? HTML
?? 第 1 頁 / 共 3 頁
字號:
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta name="generator" content="HTML Tidy, see www.w3.org" /><title>Firewalls</title><meta name="GENERATOR" content="Modular DocBook HTML Stylesheet Version 1.7" /><link rel="HOME" title="FreeBSD 使用手冊" href="index.html" /><link rel="UP" title="安全" href="security.html" /><link rel="PREVIOUS" title="Kerberos5" href="kerberos5.html" /><link rel="NEXT" title="OpenSSL" href="openssl.html" /><link rel="STYLESHEET" type="text/css" href="docbook.css" /><meta http-equiv="Content-Type" content="text/html; charset=GB2312" /></head><body class="SECT1" bgcolor="#FFFFFF" text="#000000" link="#0000FF" vlink="#840084"alink="#0000FF"><div class="NAVHEADER"><table summary="Header navigation table" width="100%" border="0" cellpadding="0"cellspacing="0"><tr><th colspan="3" align="center">FreeBSD 使用手冊</th></tr><tr><td width="10%" align="left" valign="bottom"><a href="kerberos5.html"accesskey="P">后退</a></td><td width="80%" align="center" valign="bottom">章 14. 安全</td><td width="10%" align="right" valign="bottom"><a href="openssl.html"accesskey="N">前進</a></td></tr></table><hr align="LEFT" width="100%" /></div><div class="SECT1"><h1 class="SECT1"><a id="FIREWALLS" name="FIREWALLS">14.8. Firewalls</a></h1><i class="AUTHORGROUP"><span class="CONTRIB">Contributed by</span> Gary Palmer 和 AlexNash.</i> <p>Firewalls are an area of increasing interest for people who are connected to theInternet, and are even finding applications on private networks to provide enhancedsecurity. This section will hopefully explain what firewalls are, how to use them, andhow to use the facilities provided in the FreeBSD kernel to implement them.</p><div class="NOTE"><blockquote class="NOTE"><p><b>注:</b> People often think that having a firewall between your internal network andthe ``Big Bad Internet'' will solve all your security problems. It may help, but a poorlyset up firewall system is more of a security risk than not having one at all. A firewallcan add another layer of security to your systems, but it cannot stop a really determinedcracker from penetrating your internal network. If you let internal security lapsebecause you believe your firewall to be impenetrable, you have just made the crackers jobthat much easier.</p></blockquote></div><div class="SECT2"><h2 class="SECT2"><a id="AEN20074" name="AEN20074">14.8.1. What Is a Firewall?</a></h2><p>There are currently two distinct types of firewalls in common use on the Internettoday. The first type is more properly called a <span class="emphasis"><iclass="EMPHASIS">packet filtering router</i></span>. This type of firewall utilizes amulti-homed machine and a set of rules to determine whether to forward or blockindividual packets. A multi-homed machine is simply a device with multiple networkinterfaces. The second type, known as a <span class="emphasis"><i class="EMPHASIS">proxyserver</i></span>, relies on daemons to provide authentication and to forward packets,possibly on a multi-homed machine which has kernel packet forwarding disabled.</p><p>Sometimes sites combine the two types of firewalls, so that only a certain machine(known as a <span class="emphasis"><i class="EMPHASIS">bastion host</i></span>) isallowed to send packets through a packet filtering router onto an internal network. Proxyservices are run on the bastion host, which are generally more secure than normalauthentication mechanisms.</p><p>FreeBSD comes with a kernel packet filter (known as IPFW), which is what the rest ofthis section will concentrate on. Proxy servers can be built on FreeBSD from third partysoftware, but there is such a variety of proxy servers available that it would beimpossible to cover them in this section.</p><div class="SECT3"><h3 class="SECT3"><a id="FIREWALLS-PACKET-FILTERS"name="FIREWALLS-PACKET-FILTERS">14.8.1.1. Packet Filtering Routers</a></h3><p>A router is a machine which forwards packets between two or more networks. A packetfiltering router is programmed to compare each packet to a list of rules before decidingif it should be forwarded or not. Most modern IP routing software includes packetfiltering functionality that defaults to forwarding all packets. To enable the filters,you need to define a set of rules.</p><p>To decide whether a packet should be passed on, the firewall looks through its set ofrules for a rule which matches the contents of the packet's headers. Once a match isfound, the rule action is obeyed. The rule action could be to drop the packet, to forwardthe packet, or even to send an ICMP message back to the originator. Only the first matchcounts, as the rules are searched in order. Hence, the list of rules can be referred toas a ``rule chain''.</p><p>The packet-matching criteria varies depending on the software used, but typically youcan specify rules which depend on the source IP address of the packet, the destination IPaddress, the source port number, the destination port number (for protocols which supportports), or even the packet type (UDP, TCP, ICMP, etc).</p></div><div class="SECT3"><h3 class="SECT3"><a id="FIREWALLS-PROXY-SERVERS"name="FIREWALLS-PROXY-SERVERS">14.8.1.2. Proxy Servers</a></h3><p>Proxy servers are machines which have had the normal system daemons (<bclass="APPLICATION">telnetd</b>, <b class="APPLICATION">ftpd</b>, etc) replaced withspecial servers. These servers are called <span class="emphasis"><iclass="EMPHASIS">proxy servers</i></span>, as they normally only allow onward connectionsto be made. This enables you to run (for example) a proxy <bclass="APPLICATION">telnet</b> server on your firewall host, and people can <bclass="APPLICATION">telnet</b> in to your firewall from the outside, go through someauthentication mechanism, and then gain access to the internal network (alternatively,proxy servers can be used for signals coming from the internal network and headingout).</p><p>Proxy servers are normally more secure than normal servers, and often have a widervariety of authentication mechanisms available, including ``one-shot'' password systemsso that even if someone manages to discover what password you used, they will not be ableto use it to gain access to your systems as the password expires immediately after thefirst use. As they do not actually give users access to the host machine, it becomes alot more difficult for someone to install backdoors around your security system.</p><p>Proxy servers often have ways of restricting access further, so that only certainhosts can gain access to the servers. Most will also allow the administrator to specifywhich users can talk to which destination machines. Again, what facilities are availabledepends largely on what proxy software you choose.</p></div></div><div class="SECT2"><h2 class="SECT2"><a id="AEN20099" name="AEN20099">14.8.2. What Does IPFW Allow Me toDo?</a></h2><p>IPFW, the software supplied with FreeBSD, is a packet filtering and accounting systemwhich resides in the kernel, and has a user-land control utility, <spanclass="CITEREFENTRY"><span class="REFENTRYTITLE">ipfw</span>(8)</span>. Together, theyallow you to define and query the rules used by the kernel in its routing decisions.</p><p>There are two related parts to IPFW. The firewall section performs packet filtering.There is also an IP accounting section which tracks usage of the router, based on rulessimilar to those used in the firewall section. This allows the administrator to monitorhow much traffic the router is getting from a certain machine, or how much WWW traffic itis forwarding, for example.</p><p>As a result of the way that IPFW is designed, you can use IPFW on non-router machinesto perform packet filtering on incoming and outgoing connections. This is a special caseof the more general use of IPFW, and the same commands and techniques should be used inthis situation.</p></div><div class="SECT2"><h2 class="SECT2"><a id="AEN20110" name="AEN20110">14.8.3. Enabling IPFW onFreeBSD</a></h2><p>As the main part of the IPFW system lives in the kernel, you will need to add one ormore options to your kernel configuration file, depending on what facilities you want,and recompile your kernel. See "Reconfiguring your Kernel" (<ahref="kernelconfig.html">&#181;&#218; 8 章</a>) for more details on how to recompile yourkernel.</p><div class="WARNING"><blockquote class="WARNING"><p><b>警告</b>IPFW defaults to a policy of <var class="LITERAL">deny ip from any toany</var>. If you do not add other rules during startup to allow access, <spanclass="emphasis"><i class="EMPHASIS">you will lock yourself out</i></span> of the serverupon rebooting into a firewall-enabled kernel. We suggest that you set <varclass="LITERAL">firewall_type=open</var> in your <tt class="FILENAME">/etc/rc.conf</tt>file when first enabling this feature, then refining the firewall rules in <ttclass="FILENAME">/etc/rc.firewall</tt> after you have tested that the new kernel featureworks properly. To be on the safe side, you may wish to consider performing the initialfirewall configuration from the local console rather than via <bclass="APPLICATION">ssh</b>. Another option is to build a kernel using both the <varclass="LITERAL">IPFIREWALL</var> and <varclass="LITERAL">IPFIREWALL_DEFAULT_TO_ACCEPT</var> options. This will change the defaultrule of IPFW to <var class="LITERAL">allow ip from any to any</var> and avoid thepossibility of a lockout.</p></blockquote></div><p>There are currently four kernel configuration options relevant to IPFW:</p><div class="VARIABLELIST"><dl><dt><var class="LITERAL">options IPFIREWALL</var></dt><dd><p>Compiles into the kernel the code for packet filtering.</p></dd><dt><var class="LITERAL">options IPFIREWALL_VERBOSE</var></dt><dd><p>Enables code to allow logging of packets through <span class="CITEREFENTRY"><spanclass="REFENTRYTITLE">syslogd</span>(8)</span>. Without this option, even if you specifythat packets should be logged in the filter rules, nothing will happen.</p></dd><dt><var class="LITERAL">options IPFIREWALL_VERBOSE_LIMIT=10</var></dt><dd><p>Limits the number of packets logged through <span class="CITEREFENTRY"><spanclass="REFENTRYTITLE">syslogd</span>(8)</span> on a per entry basis. You may wish to usethis option in hostile environments in which you want to log firewall activity, but donot want to be open to a denial of service attack via syslog flooding.</p><p>When a chain entry reaches the packet limit specified, logging is turned off for thatparticular entry. To resume logging, you will need to reset the associated counter usingthe <span class="CITEREFENTRY"><span class="REFENTRYTITLE">ipfw</span>(8)</span>utility:</p><pre class="SCREEN"><samp class="PROMPT">#</samp> <kbd class="USERINPUT">ipfw zero 4500</kbd></pre><p>Where 4500 is the chain entry you wish to continue logging.</p></dd><dt><var class="LITERAL">options IPFIREWALL_DEFAULT_TO_ACCEPT</var></dt><dd><p>This changes the default rule action from ``deny'' to ``allow''. This avoids thepossibility of locking yourself out if you happen to boot a kernel with <varclass="LITERAL">IPFIREWALL</var> support but have not configured your firewall yet. It isalso very useful if you often use <span class="CITEREFENTRY"><spanclass="REFENTRYTITLE">ipfw</span>(8)</span> as a filter for specific problems as theyarise. Use with care though, as this opens up the firewall and changes the way itworks.</p></dd></dl></div><div class="NOTE"><blockquote class="NOTE"><p><b>注:</b> Previous versions of FreeBSD contained an <varclass="LITERAL">IPFIREWALL_ACCT</var> option. This is now obsolete as the firewall codeautomatically includes accounting facilities.</p></blockquote></div></div><div class="SECT2"><h2 class="SECT2"><a id="AEN20174" name="AEN20174">14.8.4. Configuring IPFW</a></h2><p>The configuration of the IPFW software is done through the <spanclass="CITEREFENTRY"><span class="REFENTRYTITLE">ipfw</span>(8)</span> utility. Thesyntax for this command looks quite complicated, but it is relatively simple once youunderstand its structure.</p><p>There are currently four different command categories used by the utility:addition/deletion, listing, flushing, and clearing. Addition/deletion is used to buildthe rules that control how packets are accepted, rejected, and logged. Listing is used toexamine the contents of your rule set (otherwise known as the chain) and packet counters(accounting). Flushing is used to remove all entries from the chain. Clearing is used tozero out one or more accounting entries.</p><div class="SECT3"><h3 class="SECT3"><a id="AEN20185" name="AEN20185">14.8.4.1. Altering the IPFWRules</a></h3><p>The syntax for this form of the command is:</p><p><tt class="COMMAND">ipfw</tt> [-N] command [index] action [log] protocol addresses[options]</p><br /><br /><p>There is one valid flag when using this form of the command:</p><div class="VARIABLELIST"><dl><dt>-N</dt><dd><p>Resolve addresses and service names in output.</p></dd></dl></div><p>The <span class="emphasis"><i class="EMPHASIS">command</i></span> given can be

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久久综合色婷婷| 一本色道亚洲精品aⅴ| 日韩亚洲欧美成人一区| 调教+趴+乳夹+国产+精品| 91精品国产综合久久香蕉麻豆| 亚洲成人av在线电影| 欧美一区二区人人喊爽| 美国欧美日韩国产在线播放| 2020国产精品| www.日韩av| 亚洲国产日韩a在线播放性色| 制服丝袜日韩国产| 国产一区二区三区四| 中文字幕一区二区三区精华液| 在线精品视频免费播放| 日本欧美一区二区三区| 国产蜜臀97一区二区三区| 91丨九色丨国产丨porny| 日韩中文字幕麻豆| 久久久欧美精品sm网站| 色婷婷久久久亚洲一区二区三区| 亚洲国产婷婷综合在线精品| 久久久噜噜噜久噜久久综合| 91在线国产福利| 免费成人在线播放| 国产精品国产三级国产普通话蜜臀 | 国产成人精品一区二| 亚洲人成精品久久久久久| 正在播放亚洲一区| 国产麻豆精品在线| 亚洲综合激情网| 久久久久久97三级| 欧美午夜一区二区三区免费大片| 看片网站欧美日韩| 亚洲色图视频网站| 精品久久一区二区| 在线中文字幕一区| 国产福利一区在线| 日韩高清不卡一区二区| 国产精品久久毛片a| 欧美大片在线观看一区| 一本色道久久综合亚洲91| 成人av在线一区二区三区| 午夜电影一区二区三区| 国产精品色哟哟网站| 91精品国产91综合久久蜜臀| 97se狠狠狠综合亚洲狠狠| 紧缚捆绑精品一区二区| 亚洲成人动漫av| 亚洲天堂福利av| 国产日本一区二区| 精品精品国产高清a毛片牛牛| 欧美日韩中文一区| 色狠狠色噜噜噜综合网| 风流少妇一区二区| 韩国在线一区二区| 欧美aaa在线| 亚洲777理论| 亚洲一区二区av在线| 亚洲特级片在线| 国产精品三级久久久久三级| 久久影院电视剧免费观看| 欧美精品乱人伦久久久久久| 色婷婷精品大在线视频| jvid福利写真一区二区三区| 国产一区91精品张津瑜| 狂野欧美性猛交blacked| 日韩中文欧美在线| 视频在线观看国产精品| 亚洲不卡一区二区三区| 一区二区三区中文字幕精品精品| 中文字幕欧美激情一区| 国产日韩欧美精品在线| 国产喂奶挤奶一区二区三区| 久久奇米777| 久久精品日产第一区二区三区高清版| 日韩精品一区二区三区swag| 欧美精品 日韩| 91精品免费在线观看| 欧美一区二区精品久久911| 欧美一区日韩一区| 91精品国产品国语在线不卡 | 欧美久久久久久久久久| 在线亚洲精品福利网址导航| 在线精品视频一区二区| 欧美精品在线观看一区二区| 777亚洲妇女| 精品日韩一区二区三区免费视频| 日韩欧美一级二级三级久久久| 日韩欧美一级在线播放| 久久久亚洲午夜电影| 国产精品乱子久久久久| 自拍偷拍国产精品| 亚洲国产精品久久一线不卡| 日韩vs国产vs欧美| 韩国一区二区视频| a级高清视频欧美日韩| 在线观看免费成人| 91精品国产丝袜白色高跟鞋| 精品国产乱码久久久久久蜜臀 | 中文字幕欧美激情| 亚洲日本电影在线| 亚洲成av人片www| 精品一区二区综合| 成人午夜电影网站| 在线观看精品一区| 日韩欧美一区二区视频| 中文字幕精品一区二区精品绿巨人| 中文字幕亚洲不卡| 视频一区国产视频| 国产福利一区在线| 欧美中文字幕亚洲一区二区va在线| 91精品国产综合久久久久久久 | 亚洲综合久久av| 麻豆国产欧美日韩综合精品二区| 国产成都精品91一区二区三| 在线看国产日韩| 精品国产乱码久久久久久久| 亚洲三级免费电影| 久久99精品国产91久久来源| 97成人超碰视| 欧美大片国产精品| 亚洲欧美区自拍先锋| 麻豆国产欧美一区二区三区| 91农村精品一区二区在线| 日韩欧美不卡一区| 亚洲免费成人av| 激情丁香综合五月| 欧美三级视频在线观看| 欧美极品少妇xxxxⅹ高跟鞋 | 奇米色一区二区| 成人av电影免费在线播放| 日韩欧美在线123| 亚洲一级二级在线| 成人av资源下载| 日韩欧美中文字幕制服| 亚洲一二三专区| 欧美丰满嫩嫩电影| 日韩理论片在线| 国产福利一区二区三区视频| 欧美日韩大陆在线| 最近日韩中文字幕| 国产精品一区二区在线播放 | 97久久精品人人爽人人爽蜜臀| 91精品视频网| 亚洲国产精品一区二区尤物区| 成人黄色电影在线| 国产丝袜美腿一区二区三区| 免费在线观看一区| 欧美精品99久久久**| 一区二区三区在线观看国产 | 亚洲欧美电影院| 国产91精品露脸国语对白| 日韩欧美国产精品一区| 亚洲bt欧美bt精品777| 欧洲精品视频在线观看| 亚洲免费色视频| 色婷婷激情综合| 亚洲男人电影天堂| 99vv1com这只有精品| 国产精品网站在线观看| 国产精品白丝av| 国产亚洲精品aa| 国产精品综合二区| 国产亚洲精品超碰| 国产一区二区三区香蕉| 久久久久久一级片| 国产精品自拍三区| 国产女人aaa级久久久级| 国产精品性做久久久久久| 久久久久久久久久美女| 国产成人综合在线| 欧美国产亚洲另类动漫| 成人av资源网站| 亚洲精品国产视频| 欧美三级中文字幕| 日韩国产在线观看| 欧美大片在线观看| 粗大黑人巨茎大战欧美成人| 国产精品美女一区二区三区 | 亚洲蜜桃精久久久久久久| 日本大香伊一区二区三区| 亚洲综合色视频| 欧美一区二区在线免费观看| 精品一区二区免费| 中日韩免费视频中文字幕| 91美女片黄在线观看91美女| 亚洲国产精品一区二区www在线| 欧美乱妇20p| 狠狠色综合播放一区二区| 国产亚洲欧美一区在线观看| av电影在线观看一区| 亚洲成人一二三| 精品国产一区二区三区久久影院| 国产成人精品免费在线| 亚洲欧美另类久久久精品| 欧美精品久久久久久久多人混战| 久久成人免费网| 亚洲人成影院在线观看| 欧美一区二区精美|