亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? firewalls.html

?? FreeBSD操作系統的詳細使用手冊
?? HTML
?? 第 1 頁 / 共 3 頁
字號:
<p>Attempt to resolve given addresses and service names.</p></dd><dt>-S</dt><dd><p>Show the set each rule belongs to. If this flag is not specified, disabled rules willnot be listed.</p></dd></dl></div></div><div class="SECT3"><h3 class="SECT3"><a id="AEN20428" name="AEN20428">14.8.4.3. Flushing the IPFWRules</a></h3><p>The syntax for flushing the chain is:</p><p><tt class="COMMAND">ipfw</tt> flush</p><br /><br /><p>This causes all entries in the firewall chain to be removed except the fixed defaultpolicy enforced by the kernel (index 65535). Use caution when flushing rules; the defaultdeny policy will leave your system cut off from the network until allow entries are addedto the chain.</p></div><div class="SECT3"><h3 class="SECT3"><a id="AEN20435" name="AEN20435">14.8.4.4. Clearing the IPFW PacketCounters</a></h3><p>The syntax for clearing one or more packet counters is:</p><p><tt class="COMMAND">ipfw</tt> zero [<var class="REPLACEABLE">index</var>]</p><br /><br /><p>When used without an <var class="REPLACEABLE">index</var> argument, all packetcounters are cleared. If an <var class="REPLACEABLE">index</var> is supplied, theclearing operation only affects a specific chain entry.</p></div></div><div class="SECT2"><h2 class="SECT2"><a id="AEN20446" name="AEN20446">14.8.5. Example Commands for <bclass="APPLICATION">ipfw</b></a></h2><p>This command will deny all packets from the host <ttclass="HOSTID">evil.crackers.org</tt> to the telnet port of the host <ttclass="HOSTID">nice.people.org</tt>:</p><pre class="SCREEN"><samp class="PROMPT">#</samp> <kbdclass="USERINPUT">ipfw add deny tcp from evil.crackers.org to nice.people.org 23</kbd></pre><p>The next example denies and logs any TCP traffic from the entire <ttclass="HOSTID">crackers.org</tt> network (a class C) to the <ttclass="HOSTID">nice.people.org</tt> machine (any port).</p><pre class="SCREEN"><samp class="PROMPT">#</samp> <kbdclass="USERINPUT">ipfw add deny log tcp from evil.crackers.org/24 to nice.people.org</kbd></pre><p>If you do not want people sending X sessions to your internal network (a subnet of aclass C), the following command will do the necessary filtering:</p><pre class="SCREEN"><samp class="PROMPT">#</samp> <kbdclass="USERINPUT">ipfw add deny tcp from any to my.org/28 6000 setup</kbd></pre><p>To see the accounting records:</p><pre class="SCREEN"><samp class="PROMPT">#</samp> <kbd class="USERINPUT">ipfw -a list</kbd></pre>or in the short form <pre class="SCREEN"><samp class="PROMPT">#</samp> <kbd class="USERINPUT">ipfw -a l</kbd></pre><br /><br /><p>You can also see the last time a chain entry was matched with:</p><pre class="SCREEN"><samp class="PROMPT">#</samp> <kbd class="USERINPUT">ipfw -at l</kbd></pre></div><div class="SECT2"><h2 class="SECT2"><a id="AEN20476" name="AEN20476">14.8.6. Building a Packet FilteringFirewall</a></h2><div class="NOTE"><blockquote class="NOTE"><p><b>注:</b> The following suggestions are just that: suggestions. The requirements ofeach firewall are different and we cannot tell you how to build a firewall to meet yourparticular requirements.</p></blockquote></div><p>When initially setting up your firewall, unless you have a test bench setup where youcan configure your firewall host in a controlled environment, it is strongly recommendyou use the logging version of the commands and enable logging in the kernel. This willallow you to quickly identify problem areas and cure them without too much disruption.Even after the initial setup phase is complete, I recommend using the logging for `deny'as it allows tracing of possible attacks and also modification of the firewall rules ifyour requirements alter.</p><div class="NOTE"><blockquote class="NOTE"><p><b>注:</b> If you use the logging versions of the <tt class="COMMAND">accept</tt>command, be aware that it can generate <span class="emphasis"><iclass="EMPHASIS">large</i></span> amounts of log data. One log entry will be generatedfor every packet that passes through the firewall, so large FTP/http transfers, etc, willreally slow the system down. It also increases the latencies on those packets as itrequires more work to be done by the kernel before the packet can be passed on. <bclass="APPLICATION">syslogd</b> will also start using up a lot more processor time as itlogs all the extra data to disk, and it could quite easily fill the partition <ttclass="FILENAME">/var/log</tt> is located on.</p></blockquote></div><p>You should enable your firewall from <tt class="FILENAME">/etc/rc.conf.local</tt> or<tt class="FILENAME">/etc/rc.conf</tt>. The associated manual page explains which knobsto fiddle and lists some preset firewall configurations. If you do not use a presetconfiguration, <tt class="COMMAND">ipfw list</tt> will output the current ruleset into afile that you can pass to <tt class="FILENAME">rc.conf</tt>. If you do not use <ttclass="FILENAME">/etc/rc.conf.local</tt> or <tt class="FILENAME">/etc/rc.conf</tt> toenable your firewall, it is important to make sure your firewall is enabled before any IPinterfaces are configured.</p><p>The next problem is what your firewall should actually <span class="emphasis"><iclass="EMPHASIS">do</i></span>! This is largely dependent on what access to your networkyou want to allow from the outside, and how much access to the outside world you want toallow from the inside. Some general rules are:</p><ul><li><p>Block all incoming access to ports below 1024 for TCP. This is where most of thesecurity sensitive services are, like finger, SMTP (mail) and telnet.</p></li><li><p>Block <span class="emphasis"><i class="EMPHASIS">all</i></span> incoming UDP traffic.There are very few useful services that travel over UDP, and what useful traffic thereis, is normally a security threat (e.g. Suns RPC and NFS protocols). This has itsdisadvantages also, since UDP is a connectionless protocol, denying incoming UDP trafficalso blocks the replies to outgoing UDP traffic. This can cause a problem for people (onthe inside) using external archie (prospero) servers. If you want to allow access toarchie, you will have to allow packets coming from ports 191 and 1525 to any internal UDPport through the firewall. <b class="APPLICATION">ntp</b> is another service you mayconsider allowing through, which comes from port 123.</p></li><li><p>Block traffic to port 6000 from the outside. Port 6000 is the port used for access toX11 servers, and can be a security threat (especially if people are in the habit of doing<tt class="COMMAND">xhost +</tt> on their workstations). X11 can actually use a range ofports starting at 6000, the upper limit being how many X displays you can run on themachine. The upper limit as defined by RFC 1700 (Assigned Numbers) is 6063.</p></li><li><p>Check what ports any internal servers use (e.g. SQL servers, etc). It is probably agood idea to block those as well, as they normally fall outside the 1-1024 rangespecified above.</p></li></ul><p>Another checklist for firewall configuration is available from CERT at <ahref="http://www.cert.org/tech_tips/packet_filtering.html"target="_top">http://www.cert.org/tech_tips/packet_filtering.html</a></p><p>As stated above, these are only <span class="emphasis"><iclass="EMPHASIS">guidelines</i></span>. You will have to decide what filter rules youwant to use on your firewall yourself. We cannot accept ANY responsibility if someonebreaks into your network, even if you follow the advice given above.</p></div><div class="SECT2"><h2 class="SECT2"><a id="IPFW-OVERHEAD" name="IPFW-OVERHEAD">14.8.7. IPFW Overhead andOptimization</a></h2><p>Many people want to know how much overhead IPFW adds to a system. The answer to thisdepends mostly on your rule set and processor speed. For most applications dealing withEthernet and small rule sets, the answer is ``negligible''. For those of you that needactual measurements to satisfy your curiosity, read on.</p><p>The following measurements were made using 2.2.5-STABLE on a 486-66. (While IPFW haschanged slightly in later releases of FreeBSD, it still performs with similar speed.)IPFW was modified to measure the time spent within the <varclass="LITERAL">ip_fw_chk</var> routine, displaying the results to the console every 1000packets.</p><p>Two rule sets, each with 1000 rules, were tested. The first set was designed todemonstrate a worst case scenario by repeating the rule:</p><pre class="SCREEN"><samp class="PROMPT">#</samp> <kbdclass="USERINPUT">ipfw add deny tcp from any to any 55555</kbd></pre><p>This demonstrates a worst case scenario by causing most of IPFW's packet check routineto be executed before finally deciding that the packet does not match the rule (by virtueof the port number). Following the 999th iteration of this rule was an <varclass="LITERAL">allow ip from any to any</var>.</p><p>The second set of rules were designed to abort the rule check quickly:</p><pre class="SCREEN"><samp class="PROMPT">#</samp> <kbdclass="USERINPUT">ipfw add deny ip from 1.2.3.4 to 1.2.3.4</kbd></pre><p>The non-matching source IP address for the above rule causes these rules to be skippedvery quickly. As before, the 1000th rule was an <var class="LITERAL">allow ip from any toany</var>.</p><p>The per-packet processing overhead in the former case was approximately2.703&nbsp;ms/packet, or roughly 2.7&nbsp;microseconds per rule. Thus the theoreticalpacket processing limit with these rules is around 370&nbsp;packets per second. Assuming10&nbsp;Mbps Ethernet and a ~1500&nbsp;byte packet size, we would only be able to achieve55.5% bandwidth utilization.</p><p>For the latter case each packet was processed in approximately 1.172&nbsp;ms, orroughly 1.2&nbsp;microseconds per rule. The theoretical packet processing limit herewould be about 853&nbsp;packets per second, which could consume 10&nbsp;Mbps Ethernetbandwidth.</p><p>The excessive number of rules tested and the nature of those rules do not provide areal-world scenario -- they were used only to generate the timing information presentedhere. Here are a few things to keep in mind when building an efficient rule set:</p><ul><li><p>Place an <var class="LITERAL">established</var> rule early on to handle the majorityof TCP traffic. Do not put any <var class="LITERAL">allow tcp</var> statements beforethis rule.</p></li><li><p>Place heavily triggered rules earlier in the rule set than those rarely used (<spanclass="emphasis"><i class="EMPHASIS">without changing the permissiveness of thefirewall</i></span>, of course). You can see which rules are used most often by examiningthe packet counting statistics with <tt class="COMMAND">ipfw -a l</tt>.</p></li></ul></div></div><div class="NAVFOOTER"><hr align="LEFT" width="100%" /><table summary="Footer navigation table" width="100%" border="0" cellpadding="0"cellspacing="0"><tr><td width="33%" align="left" valign="top"><a href="kerberos5.html"accesskey="P">后退</a></td><td width="34%" align="center" valign="top"><a href="index.html"accesskey="H">起點</a></td><td width="33%" align="right" valign="top"><a href="openssl.html"accesskey="N">前進</a></td></tr><tr><td width="33%" align="left" valign="top"><b class="APPLICATION">Kerberos5</b></td><td width="34%" align="center" valign="top"><a href="security.html"accesskey="U">上一級</a></td><td width="33%" align="right" valign="top">OpenSSL</td></tr></table></div></body></html>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产精品三级视频| 色域天天综合网| 亚洲男人的天堂在线aⅴ视频| 精品免费国产一区二区三区四区| 91激情五月电影| 色综合天天做天天爱| 99re8在线精品视频免费播放| 国产一区二区三区蝌蚪| 国产精品亚洲а∨天堂免在线| 国产一区二区三区在线观看免费| 亚洲成人三级小说| 亚洲成av人片一区二区三区| 亚洲综合偷拍欧美一区色| 亚洲国产精品尤物yw在线观看| 亚洲午夜在线观看视频在线| 亚洲h精品动漫在线观看| 亚洲综合免费观看高清完整版| 亚洲制服丝袜av| 日精品一区二区| 狠狠色综合播放一区二区| 国产99一区视频免费| 北条麻妃一区二区三区| 欧洲激情一区二区| 欧美一个色资源| 欧美国产激情一区二区三区蜜月| 国产精品第13页| 一区二区三区精密机械公司| 午夜精品久久久久久久蜜桃app| 婷婷国产在线综合| 免费的成人av| 国产.欧美.日韩| 欧美日韩中文字幕精品| 精品成人在线观看| 中文字幕亚洲欧美在线不卡| 亚洲国产成人va在线观看天堂| 久久激情五月激情| 99久精品国产| 精品精品国产高清一毛片一天堂| 国产精品伦理在线| 日韩不卡在线观看日韩不卡视频| 国产黄人亚洲片| 在线观看三级视频欧美| 制服丝袜亚洲精品中文字幕| 国产人成一区二区三区影院| 亚洲国产成人porn| 成人小视频免费观看| 欧美电影影音先锋| 中文字幕一区二区三| 麻豆91在线看| 欧美在线视频全部完| 久久久久亚洲蜜桃| 日韩黄色免费网站| 91免费在线看| 久久女同精品一区二区| 爽爽淫人综合网网站| av在线不卡免费看| 欧美精品一区二区三区蜜臀 | 国产成人在线视频免费播放| 色综合久久久久久久| 日韩三级伦理片妻子的秘密按摩| 亚洲男同1069视频| 国产成人啪午夜精品网站男同| 在线播放视频一区| 亚洲一区在线观看网站| caoporen国产精品视频| 久久久91精品国产一区二区精品| 日韩av电影免费观看高清完整版在线观看| 成人一区二区三区在线观看| 精品国产伦一区二区三区观看方式 | 26uuu国产电影一区二区| 亚洲欧美激情小说另类| 成人h动漫精品一区二区| 精品国产精品一区二区夜夜嗨| 午夜视频在线观看一区| 欧美在线不卡视频| 成人免费视频在线观看| 成人黄色av电影| 亚洲国产精品t66y| 成人深夜福利app| 欧美国产禁国产网站cc| 99精品热视频| 国产精品电影院| 色综合久久99| 亚洲夂夂婷婷色拍ww47| 在线观看国产日韩| 亚洲大片一区二区三区| 欧美日韩在线不卡| 喷白浆一区二区| 日韩欧美国产午夜精品| 国产在线看一区| 国产欧美一区二区精品性色| 成人亚洲一区二区一| 亚洲欧洲精品一区二区三区 | 另类专区欧美蜜桃臀第一页| 91精品国产品国语在线不卡| 六月婷婷色综合| 久久久久久久久久久黄色| 成人综合婷婷国产精品久久免费| 国产精品久久久久久久久果冻传媒 | 一区二区欧美在线观看| 欧美三级在线视频| 麻豆精品国产传媒mv男同| 精品国产免费久久| 色中色一区二区| 麻豆91在线播放免费| 欧美国产精品久久| 精品视频一区三区九区| 美国精品在线观看| 国产精品网站一区| 欧美伦理视频网站| 国产精品综合在线视频| 夜夜嗨av一区二区三区| 日韩美女在线视频| 99久久久免费精品国产一区二区| 亚洲午夜精品在线| 欧美mv日韩mv| 色婷婷精品大视频在线蜜桃视频| 日本一区中文字幕| 亚洲人成亚洲人成在线观看图片| 欧美日韩国产在线观看| 丁香激情综合国产| 日韩激情在线观看| 亚洲精品国产无套在线观| 精品日韩欧美在线| 91福利小视频| 成人免费观看av| 精一区二区三区| 亚洲精品高清在线| 中文子幕无线码一区tr| 日韩亚洲欧美成人一区| 91啪亚洲精品| 大陆成人av片| 国内久久精品视频| 五月婷婷另类国产| 亚洲欧美日韩一区二区| 久久精品视频在线免费观看| 欧美精品三级在线观看| 91国产福利在线| 成a人片亚洲日本久久| 激情都市一区二区| 日韩一区精品视频| 亚洲成人av免费| 一区二区在线免费| 亚洲欧美偷拍卡通变态| 国产亚洲欧洲一区高清在线观看| 欧美一区二区精品久久911| 欧美专区亚洲专区| 色香蕉成人二区免费| 欧美男人的天堂一二区| 91视频精品在这里| 91免费看片在线观看| caoporen国产精品视频| 99久久综合色| 91丨九色丨尤物| 97超碰欧美中文字幕| 9l国产精品久久久久麻豆| 粉嫩av亚洲一区二区图片| 国产高清精品网站| 懂色av中文字幕一区二区三区| 国产精品综合网| 国产成+人+日韩+欧美+亚洲| 国模一区二区三区白浆| 国产一区不卡精品| 风间由美一区二区av101| 国产v综合v亚洲欧| fc2成人免费人成在线观看播放| 成人综合在线视频| 色激情天天射综合网| 欧美午夜电影在线播放| 91精品午夜视频| 欧美tickling挠脚心丨vk| 久久久久九九视频| 国产日韩欧美一区二区三区乱码 | 不卡的av电影| 色综合av在线| 69堂成人精品免费视频| 精品国产乱码久久久久久闺蜜| 久久九九国产精品| 亚洲女人小视频在线观看| 亚洲成av人片| 国产精品69毛片高清亚洲| jizz一区二区| 欧美日本一区二区三区| 久久久亚洲精华液精华液精华液 | 91丨porny丨户外露出| 欧美三级韩国三级日本三斤| 日韩欧美国产一二三区| 亚洲啪啪综合av一区二区三区| 性久久久久久久久久久久| 国产在线乱码一区二区三区| 色综合久久99| 久久影院午夜片一区| 一区二区三区国产| 极品少妇一区二区三区精品视频 | 欧美中文字幕一区二区三区亚洲| 欧美精品久久一区二区三区| 国产亚洲成年网址在线观看| 亚欧色一区w666天堂| 国产成人av一区二区三区在线观看| 色吊一区二区三区|