On 30 Dec 2000, at 20:06, Charles Steinkuehler wrote:
> The use of shell-functions for building the rules for a DMZ would be
> quite handy here, as you could have a generic 'add this function to
> the DMZ rules', and a 'wrapper' shell function would call the
> appropriate lower-level functions ba
> I'm starting to lose my mind... :-)
You've probably got a ways to go to catch up with the rest of us :)
> I'm trying to develop a simple firewall tool which at its core relies
> on shell functions rather than shell variables and specially-
> formatted configuration files. Trouble
> It just so happens I've got a lot of relevant Check Point experience here
> :-)
>
> First thing you should do is think about your goals -- SOHO use
> and large-scale corporate use present different needs. The DMZ is a
> lare-scale corporate item (e.g. I'm getting paid so I might as well spend
>
David -- Some random, fragmentary responses to your concerns. Take them for
what they are worth.
At 05:26 PM 12/29/00 -0600, David Douthitt wrote:
..
>* Protected net: what about limiting internal users access to outside?
What about it? One method is to block outgoing packets to and replies from
It just so happens I've got a lot of relevant Check Point experience here
:-)
First thing you should do is think about your goals -- SOHO use
and large-scale corporate use present different needs. The DMZ is a
lare-scale corporate item (e.g. I'm getting paid so I might as well spend
as much time
I'm starting to lose my mind... :-)
I'm trying to develop a simple firewall tool which at its core relies
on shell functions rather than shell variables and specially-
formatted configuration files. Trouble is, my head is starting to
HURT with all these different possibilities. He