I guess machine under attack, how to secure firewall?

May 22 15:05:22 www ipfw: 12300 Accept TCP 207.138.126.176:80 10.129.0.37:49922 in via en0
May 22 15:05:22 www ipfw: 12300 Accept TCP 207.138.126.176:80 10.129.0.37:49921 in via en0
May 22 15:07:05 www ipfw: 12300 Accept TCP 61.62.22.252:38016 10.129.0.37:22 in via en00
Hello I am new with the firewall of the mac os x server, the log has repored a lot of connections ( from non registered servers in whois, or some machines in remote countries) .
en0 is the ethernet address for the internet connection 10,129,0,x (address from an internet supplier), 192.168.x.x. is my internal lan.
What is the best way to secure the firewall andthe server in the mac server admin console?
In the service-Edit services for... is there any precedence ?
In the service-edit services for, I have the listing: any, 10-net, 192-168-net,192.168.3-net,192.168,4-net, 10.129.0.37 (This is also the order of my ip address groups)
I am using stealth mode, in advanced, but what are the advanced rules that I must apply?
thanks a lot
Dual 2 GHz PowerPC G5   Mac OS X (10.4.9)   4GB DDR SDRAM, MAC OS X Server

10.x.x.x is a private/lan rfc-1918 address.
http://www.faqs.org/rfcs/rfc1918.html
What is doing the routing between 10.129.x.x and 192.168.x.x ?
Don't forward any incoming traffic at your Router that you don't want to be dealing with.
Whatever you do, secure ssh properly. In fact, don't forward ssh traffic from your router if you don't need to. Change the port at the router if you need external ssh access. And then only allow ssh via shared key(s)
http://www.afp548.com/article.php?story=20040816224717742
http://www.google.com/search?client=safari&rls=en&q=securing+ssh

Similar Messages

  • HT201363 Good evening ...  I have an account in appel and I have purchased a card  But I can not buy applications because the applications you want to push it under the answers to security questions and I forgot the answers to these questions  How can I c

    Good evening ...
    I have an account in appel and I have purchased a card
    But I can not buy applications because the applications you want to push it under the answers to security questions and I forgot the answers to these questions
    How can I change my answers to security questions??

    Hello, yazanalmasri0.
    If you need to reset your security questions and have a rescue email attached to your Apple ID, this article will help you with this issue.
    Rescue email address and how to reset Apple ID security questions
    http://support.apple.com/kb/HT5312
    If you are still unable to reset your security questions or do not have a rescue email associated with your account, you will need to reach out to our account security team. 
    Apple ID: Contacting Apple for help with Apple ID account security
    http://support.apple.com/kb/HT5699
    Cheers,
    Jason H.

  • Help, I am under attack.

    Today I have discovered some data in a database that makes me
    think that some is trying an sql injection attack on one of my
    websites.
    I use SP’s and Cfqueryparam to protect myself against
    this type of attack and as a general rule before doing anything I
    strip out all banned charters from in coming data. So I don’t
    have the original statement, but I do have code (without banned
    chars) in my database.
    I have captured the users IP address and looked it up as
    coming from Indonesia.
    I am now wonder what my next step should be.
    I am considering creating a banned IP table so that when a
    new user comes to my site I check the table, if their IP is in the
    table I will send them somewhere else. If the IP is a fixed address
    it will be permanently listed in my table, if not I will ban the IP
    for a short time to stop an immediate attack. It may also be worth
    pointing out that we don’t trade in Indonesia.
    I guess my questions are:
    Does this sound like a good idea or is there a better way?
    How can I tell if an IP is fixed or not?
    Has any one else come across this problem, if so how did you
    deal with it?

    nick010 wrote:
    > Today I have discovered some data in a database that
    makes me think that some
    > is trying an sql injection attack on one of my websites.
    >
    > I use SP?s and Cfqueryparam to protect myself against
    this type of attack and
    > as a general rule before doing anything I strip out all
    banned charters from in
    if you're using cfqueryparam religiously (are you?) &
    your website is still
    standing then i would imagine your current security is
    "effective". what makes
    you think you're under attack? have you seen malicious sql
    code?
    > I have captured the users IP address and looked it up as
    coming from
    > Indonesia.
    you might try geoLocator:
    http://www.sustainablegis.com/projects/geoLocator/
    to
    determine the country from their incoming IP & some other
    data we can squeeze
    out of their browser (correct >90%++ of the time). if he's
    the only user from
    indo, you can ban the whole country (as long as his IPs
    originate from there).
    be sure to update the inetAddressLocator.jar from:
    http://javainetlocator.sourceforge.net/
    don't recall if the zip file on my site has the latest jar.

  • Backing up an encrypted drive with Time Machine under Snow Leopard

    In a nutshell, my question is “Can I back up an encrypted drive using Time Machine under Snow Leopard, and if so, how do I access its data from a previous day?”
    I have a 1Tb USB drive connected to my MacBook, which runs Snow Leopard. The drive is formatted as Mac OS Extended (Journaled). This drive is included in the drives that Time Machine backs up. I used Disk Utility to create an encrypted drive on the USB drive (998Gb), also formatted as Mac OS Extended (Journaled). The encrypted drive is not on TimeMachine’s list of excluded files/drives.
    When I go into Time Machine, I can see the USB drive and the encrypted drive in the side bar. I can access the files on the encrypted drive as long as I’m looking at how it stands now. But if I move backward in time, the encrypted drive is grayed out and inaccessible.  If I click on the USB drive, I get a window that tells me it is 75.9Gb in size, and nothing else is available to me.
    When I open the back-up drive in Finder and navigate to Backups.backupdb > macbook name > some date and time, I see my MacBook’s hard drive and the USB drive. The encrypted drive is not shown. When I click on the USB drive, I see an entry for drivename.sparsebundle. When I click on that I’m prompted for the password for the encrypted drive. When I enter it, I get a warning telling me that the disk image could not be opened and that the encrypted drive has no mountable file systems.
    Is my encrypted drive really be backed-up and if so, how do I access the backed-up data? 

    Having received a bunch of views but no replies over the last 5 days, I decided to venture into my local Apple store and ask this same question. The response I got from the geniuses was that you can't get a reliable back-up of an encrypted drive using Time Machine under Snow Leopard. So, my only alternative is to copy the encrypted drive's contents elsewhere, unencrypt the drive, and then copy the contents back. This is what I expected, but not what I wanted to hear.

  • Need help on how to secure my wireless connection.....

    im new to the wireless thing and im trying to figure all this stuff out. i bought the wireless g 2.4 broadband router  because i have a wireless notebook and everthing has been going fine until recently. i have excellent connection but my speed keeps going up and down but it use to stay on 54 Mbps or 48 Mbps (my notebook connection) can tell me whats wrong on that part? Another issue is how do i manually go about securing my connection because i feel like anybody can use my connection  and that my desktop computer that houses the connection is vulnerable. All these problems started ever since a suspicious vehicle was stopping around my house. please help

    Hi…First of all hardwire your computer with your router and then Login in router setup page through your internet explorer by typing in 192.168.1.1 in Internet Explorer > address bar > skip username and enter ‘admin’ as password > click ok. You will get router setup page in front of you, click Wireless Tab > click 2nd Sub Tab under Wireless as ‘Wireless Security’, enable wireless security, select WEP and security mode, wireless encryption level as 64 Bit 10 hex digits, and type in 10 digit number without any spaces, symbols and alphabets in WEP Key 1 box. And that’s your wireless network key or password. Do not change any other settings on that page and click save settings and then exit the page. As a result your wireless network is secured. Use that 10 digit number when your wireless computer will demand it while connecting to your wireless network.

  • How to Enable firewall on Solaris 10 SPARC Machine?

    Hi All,
    I have installed Solaris 10 SPARC & by default the firewall is disabled.
    Now i need to enable firewall?
    Can i know how to enable firewall Solaris 10 SPARC Machine?
    Also can i know how to open up specific TCP & UDP ports?

    What exactly are you looking for? By default Solaris is a secure operating system, but can be tuned to be more or less secure. The link above on IP Filtering is one way to make a system more secure, and is can be used to set up a firewall.
    -- Alan

  • How to secure oracle database

    how to secure oracle database,
    I am having the oracle database which will be packed as package in a machine and will be delivered to client place , need to ensure that the client will not access the database by any means.
    Even he breaks the password (he should not break but despite client has broken the password) and went inside the database, he should not be able to see the databases Procedures ,views,functions and triggers.
    Can we Encrypt this,if so can client will be able to decrypt the same?
    Is there a way to secure the database from the client not to access the database.
    Thanks!

    933663 wrote:
    so how can i secure when there is an option to unwrap ,then there is no use in using the wrap right?Yes, because when there is a lock there is a key, when there is wrap there is unwrap, when there is encrypt there is decrypt. We can not be rest assure for hack the code. I think you should think and explore above security options which are provided by Oracle itself which have lock and key by Oracle itself; which i have mentioned in my previous post.
    You just think that if that is that much easy and cheap, then why Oracle have developed above options/features by expending many dollors..!!!
    Regards
    Girish Sharma

  • In "About This Mac, on OSX MAVERICKS, under "Storage" How do you find out what is in "other" ? how do you delete what is in "other" without loosing important files?

    In "About This Mac, on OSX MAVERICKS, under "Storage" How do you find out what is in "other" ? how do you delete what is in "other" without loosing important files?

    About "Other":
        http://pondini.org/OSX/LionStorage.html
    Hope this helps.
    1. Start up in Safe Mode
        http://support.apple.com/kb/PH11212
    2. Empty Trash.
        http://support.apple.com/kb/PH10677
    3. Delete "Recovered Messages", if any.
        Hold the option key down and click "Go" menu in the Finder menu bar.
        Select "Library" from the dropdown.
        Library > Mail > V2 > Mailboxes
        Delete "Recovered Messages", if any.
        Empty Trash. Restart.
    4. Repair Disk
        Steps 1 through 7
        http://support.apple.com/kb/PH5836
    5. Disk space / Time Machine ?/ Local Snapshots
       http://support.apple.com/kb/ht4878
    6. Re-index Macintosh HD
       System Preferences > Spotlight > Privacy
       http://support.apple.com/kb/ht2409

  • Running  javafx on a 64 bit machine under Windows 7

    I want to run javafx on a 64 bit machine under Windows 7. I receive the following log when running simple "Hello World" program:
    init:
    deps-jar:
    compile:
    jar:
    standard-run:
    Error occurred during initialization of VM
    Unable to load native library: Can't load AMD 64-bit .dll on a IA 32-bit platform
    BUILD FAILED (total time: 0 seconds)
    Looking at sys requirements for javafx, I see that only 32 bit windows is supported. I did, though, succeed in doing a (64 Bit) build within netbeans after added a JAVA_HOME environment variable to point to my JDK directory (from Win 64 bit download).
    Please can anyone explain what I need to do so that (preferably) a javafx application runs 64 bit or if no choice how I can direct a 32 bit run without effecting most of the development tools that do support 64 bit?
    By the way, when running from command line:
    +"D:\Program Files\NetBeans 6.8\javafx2\javafx-sdk\bin\javafx.exe" -version+
    I receive same error as above:
    Error occurred during initialization of VM
    Unable to load native library: Can't load AMD 64-bit .dll on a IA 32-bit platform
    David Ziants

    I also tried adding to my system environment path variable: %JAVA_HOME%\bin;%JAVA_HOME%\jre\bin;and this did not help.
    My webstart properties are:
    $label=Web Start
    execution.target=jnlp
    javafx.profile=desktopbut I think the matter is more basic because I also receive the same error from the command line:
    "D:\Program Files\NetBeans 6.8\javafx2\javafx-sdk\bin\javafx.exe" -versionas I already mentioned.

  • Suspect network under attack by icmp

    All
    I am now supect that the pix is under high volume of ping, as if i disable the ping from outside world on wan router, the performace of the network is improved.
    Does PIX can do with some control on if under icmp attack can temp limit or drop the packet from inside and outside world.
    so that the inside affected client and attack from outside world can be prevent.
    tks all

    HI .. you could try enabling the ips built-in signtures supported by the PIX. These are used to protect against common attacks.
    " Cisco PIX Firewall includes an IP-only intrusion detection feature. It provides visibility at
    network perimeters or for locations where additional security between network segments is
    required.
    The PIX IDS identifies more than 53 common attacks using signatures to detect patterns of
    misuse in network traffic. Traffic passing through the PIX Firewall can be identified to be
    audited, logged, and/or dropped.
    After it is configured, the IDS feature watches packets and sessions as they flow through the
    firewall, scanning each for a match with any of the IDS signatures. When suspicious activity
    is detected, the PIX Firewall responds immediately and can be configured to do the following:
    1. Send an alarm to a syslog server.
    2. Drop the packet.
    3. Reset the TCP connection. "
    I suggest you check the command reference for the use of ip audit command !!!
    I hope it helps .. please rate it if it does !!!

  • I received a message "blocked because of ISP attack" how do I fix to get to site

    I have rebooted...cleared the search history, etc

    I don't know what the site is, but take a look at the attached.  some site are under attack.
    http://arstechnica.com/security/2014/06/under-ddos-feedly-buckles-but-defies-att ackers-extortion-demands/

  • If I don't want to use my Seagate hard drive anymore for Time Machine...How do I go about this?

    I want to use the external hard drive still, but not as my back up disk for Time Machine anymore. How do I make it so that my Macbook doesn't associate this specific external hard drive with TM when I plug it in?
    Thanks

    chenango232 wrote:
    Missing a pretty big step here....  How does one install a new OS on an external drive?  You can't install an OS without first booting into an OS.  I don't have a disk to boot to, but have gotten as far as downloading the install software.  Perhaps the answer you should be providing is that I need to create an install disk somehow?
    Is not the current HDD in your MBP a boot drive?  If so and you have Yosemite installed, you can boot into the recovery partition.  From the 4 option menu you can use Disk Utility.  If you have the NEW HDD connected to the MBP it will appear in Disk Utility.  Click on that drive to format in Disk Utility>Erase.  After formatting, go to the 'Reinstall OSX' option and install the OSX onto the external HDD.  When finished swap the drives.
    Ciao

  • My iPhone 5 has broken and is being replaced with a new iPhone tomorrow. However, My carrier (orange) will b picking up my broken iPhone and I am unsure how to secure the content and icloud data on the broken phone. Is there a way to display the data?

    My iPhone 5 has broken and is being replaced with a new iPhone tomorrow. However, My carrier (orange) will b picking up my broken iPhone and I am unsure how to secure the content and icloud data on the broken phone. Is there a way to disable the data held on it and ensure that if it is fixed, nobody can use/see my data and access my account?

    Hi Gazpan,
    Thanks for visiting Apple Support Communities.
    I recommend using the steps in this article to back up your iPhone if possible:
    iOS: Back up and restore your iOS device with iCloud or iTunes
    http://support.apple.com/kb/ht1766
    You may also find this advice helpful for your situation:
    What to do before selling or giving away your iPhone, iPad, or iPod touch
    http://support.apple.com/kb/ht5661
    If you no longer have your iOS device
    If you're using iCloud and Find My iPhone on the device, you can erase the device remotely and remove it from your account by signing in to icloud.com/find, selecting the device, and clicking Erase. When the device has been erased, click Remove from Account.
    If you're unable to complete either of the above steps, you should change your Apple ID password. Changing your password won't remove any personal information that is cached on the device, but it will make sure that the new owner can't delete your information from iCloud.
    Cheers,
    Jeremy

  • I installed lion on my MB '08. Since then, the machine stocks form time to time. sometimes three or four times a day. Due Lion is an app as well I would like to uninstall it to try how the machine works. How can I uninstall Lion from my MacBook '08 ?

    I installed lion on my MB '08. Since then, the machine stocks form time to time. sometimes three or four times a day. Due Lion is an app as well I would like to uninstall it to try how the machine works. How can I uninstall Lion from my MacBook '08 ?

    Restore the backup you took before the upgrade.
    Allan

  • How to secure one page not entire application?

    Hi there,
    I'm looking for some guidance on how to secure individual pages on my site. I've read a number of articles discussing creating a login using the Application.cfc. The thing is this approach locks down the entire site. I only want to secure a page. In my scenario, if the user hasn't logged in, and goes to a profile.cfm page, they will be asked to login. Once they login, they will then be directed to the profile.cfm page.
    Any and all advice would be greatly appreciated.
    Thanks.
    Novian

    Hi, Novian,
    An option that come directly to mind is to check for the specific page to be locked down in onRequestStart of your Application.cfc.
    This approach is relatively easy to implement but may not be the best approach (don't know how it might affect performance or something else). Basically, use a conditional in your onRequestStart method to see if the page being requested by the user is the page that needs to be secured. Something along the lines of:
    <cffunction name="onRequestStart">
         <cfargument name="target_page" />
         <cfif target_page is 'super-secure-page.cfm'>
              <!--- security stuff --->
         </cfif>
    </cffunction>
    There are, of course, other options but this was a quick and easy one that came right to mind.

Maybe you are looking for

  • The flash of my new iphone5 camera dosent work. What can i do?

    When i take a photo with flash on the flash dont work at all. Can somebody tell me what to do please?. Thanks.

  • Problem mapping collection of enums

    we get the following error: org.apache.openjpa.util.MetaDataException: Type "class com.project.model.util.enumeration.HaeftelseSaerligeLaanevilkaar" is an enumeration and therefore cannot be made persistent. we are using the following annotation: @ja

  • Deleting photos form iPhone?

    i got some photos on my iphone from my computer how do i remove them?

  • JSP to write javascript code

    somebody in the net say : " You could however have JSP write javascript code when creating the page that would set the javascript variables with values from your JSP variables. " how can we do that ?? can somebody show me a sample code ??

  • Duplicate Clips appears in recorded media files

    I use my Panasonic AG-AC120EN for video recording on 32GB SanDisk ULTRA card., and I get about 3 hours 13 Mts of HD recording. Last week I recorded an Event  of about  2hours 30 mts duration my Card file shows it has used  21.1 GB When I brought my c