Ömer bey iyi günler,
firewall.rules dosyanizi calistiriyor musunuz? 
ve calistirirken preprocessor olarak cpp yi gosteriyor musunuz?

ipfw show
komutunu calistirarak aktif olan kurallari gonderebilir misiniz?

elinizdeki kurallari calistirmak icin;
ipfw -p cpp firewall.rules
seklinde yazin

Saygilarimla,

Ozkan KIRIK
EnderUNIX Yazilim Gelistirme Takimi
Yazilim Gelistiricisi
Web  : http://www.enderunix.org
Haber: http://haber.enderunix.org
Ipucu: http://ipucu.enderunix.org

Ömer Koyun <[EMAIL PROTECTED]>  :

> selam
> &nbsp;
> &nbsp;firewall.rules dosyası bu şekilde
> &nbsp;
> #define oif&nbsp; rl0#define oip&nbsp; 10.0.0.205#define onet 
> 10.0.0.205:255.255.255.0
> #define iif1&nbsp; rl1#define iip1&nbsp; 192.168.0.205#define inet1 
> 192.168.0.0/24
> add allow tcp from any to any 1000 via rl0add allow udp from any to any 1000 
> via rl0
> add deny all from any to 0.0.0.0/8 via oifadd deny all from any to 
> 169.254.0.0/16 via oifadd deny all from any to 192.0.2.0/24 via 
> oif&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; add deny all from any to 224.0.0.0/4 via 
> oif&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; add deny all from any to 240.0.0.0/4 via 
> oif&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
> /**&nbsp;Network Address Translation.&nbsp; This rule is placed here 
> deliberately&nbsp;so that it does not interfere with the surrounding 
> address-checking&nbsp;rules.&nbsp; If for example one of your internal LAN 
> machines had its IP&nbsp;address set to 192.0.2.1 then an incoming packet for 
> it after being&nbsp;translated by natd(8) would match the `deny' rule 
> above.&nbsp; Similarly&nbsp;an outgoing packet originated from it before 
> being translated would&nbsp;match the `deny' rule below.**/add divert natd 
> all from any to any via oif
> &nbsp;Stop draft-manning-dsua-03.txt (1 May 2000) nets (includes 
> RESERVED-1,&nbsp;DHCP auto-configuration, NET-TEST, MULTICAST (class D), and 
> class E)&nbsp;on the outside interface**/add deny all from 0.0.0.0/8 to any 
> via oifadd deny all from 169.254.0.0/16 to any via oifadd deny all from 
> 192.0.2.0/24 to any via oifadd deny all from 224.0.0.0/4 to any via oifadd 
> deny all from 240.0.0.0/4 to any via oif
> /************************//** Check dynamic rule/************************/add 
> check-state&nbsp;/** Allow TCP through if setup succeeded **/add allow tcp 
> from any to any established&nbsp; 
> /** Allow IP fragments to allow through **/&nbsp; add allow all from any to 
> any frag
> /** Allow setup of SMTP **/add allow tcp from any to any 25add allow tcp from 
> any 25 to any
> /** Allow setup of POP3 **/add allow tcp from any to any 110add allow tcp 
> from any 110 to any
> /** Allow setup of IMAP4 **/add allow tcp from any to any 143 setup
> /** Allow setup of ssh **/add allow tcp from any to any 22 established
> /** Allow setup of HTTP **/add allow tcp from any to any 80,443,8443 setup
> add allow tcp from any to any 1000 via rl0add allow udp from any to any 1000 
> via rl0add allow tcp from any to any 5555 via rl0add allow udp from any to 
> any 5555 via rl0add allow tcp from any to any 6800-7000 via rl0add allow udp 
> from any to any 6800-7000 via rl0add allow tcp from any to any 4899 via 
> rl0add allow udp from any to any 4899 via rl0add allow tcp from any to any 
> 5631 via rl0add allow udp from any to any 5632 via rl0add allow udp from any 
> to any 53 via rl0add allow udp from any 53 to any via rl0
> /** Set Loopback for DNS **/add allow udp from any to any 53 via lo0add allow 
> udp from any 53 to any via lo0
> /** Set Loopback for SNMP **/add allow udp from any to any 161 via lo0add 
> allow udp from any 161 to any via lo0
> /** Blocked TCP and UDP Ports **/add deny tcp from any to any 135add deny udp 
> from any to any 1434add deny tcp from any to any 2025add deny tcp from any to 
> any 1243add deny tcp from any to any 27374add deny udp from any to any 31337
> /** Allow setup of any other TCP connection **/add allow tcp from any to any 
> setup
> /**************************//** Allow UDP to 
> outside/**************************/add allow udp from oip to any out via oif 
> keep-stateadd allow udp from oip to any in via oif keep-state
> /**************************//** Allow ping to 
> outside/**************************/add allow icmp from any to any 
> /*******************************//** Log all unrecognize 
> attempt/*******************************/add deny all from any to not oip in 
> via oifadd deny log all from any to any
> add deny tcp from 192.168.0.1 to anyAhmet FIRAT &lt;[EMAIL PROTECTED]&gt; 
> wrote:
> 
> 
> 
> 
> kenelde ipfw iin neler var neler yazdiniz ? onlari iletebilirmisniiz ?
> 
> ----- Original Message ----- 
> From:








---------------------------------------------------------------------
Cikmak icin, e-mail: [EMAIL PROTECTED]
Liste arsivi: http://lists.enderunix.org
Turkiye'nin ilk FreeBSD kitabi: http://www.acikakademi.com/freebsd.php


Cevap