<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ipfilter in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/4998765#M739028</link>
    <description>Shalom,&lt;BR /&gt;&lt;BR /&gt;Go with an ipfilter configuration that first rejects allpass through, and then accepts only 80 and 443.&lt;BR /&gt;&lt;BR /&gt;This will limit traffic to your machine to those two ports alone.&lt;BR /&gt;&lt;BR /&gt;This alone is not enough to prevent hacking but it will limit their options. Its still possible to exploit web server flaws and gain access to the box.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
    <pubDate>Tue, 22 Aug 2006 06:54:32 GMT</pubDate>
    <dc:creator>Steven E. Protter</dc:creator>
    <dc:date>2006-08-22T06:54:32Z</dc:date>
    <item>
      <title>ipfilter</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/4998762#M739025</link>
      <description>My company using hpux v11i v2, if i've build up a apache http, and use ipf as firewall. &lt;BR /&gt;Port 80, 443 &lt;BR /&gt;I try to check ipf log which pass through those ports, and check apache log whether it contains executable command  ....././passwd, ././chmod , etc. &lt;BR /&gt;&lt;BR /&gt;My question is what i am checking is enough or not?  &lt;BR /&gt;&lt;BR /&gt;Thanks a lot</description>
      <pubDate>Tue, 22 Aug 2006 04:37:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/4998762#M739025</guid>
      <dc:creator>BenCheer.com</dc:creator>
      <dc:date>2006-08-22T04:37:07Z</dc:date>
    </item>
    <item>
      <title>Re: ipfilter</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/4998763#M739026</link>
      <description>Hi,&lt;BR /&gt;seems you are checking all the correct files, but what are you trying to prevent/detect.</description>
      <pubDate>Tue, 22 Aug 2006 04:55:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/4998763#M739026</guid>
      <dc:creator>Peter Godron</dc:creator>
      <dc:date>2006-08-22T04:55:01Z</dc:date>
    </item>
    <item>
      <title>Re: ipfilter</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/4998764#M739027</link>
      <description>Hi , &lt;BR /&gt;My supervisor want me to prevent hacking from internet.&lt;BR /&gt;</description>
      <pubDate>Tue, 22 Aug 2006 05:19:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/4998764#M739027</guid>
      <dc:creator>BenCheer.com</dc:creator>
      <dc:date>2006-08-22T05:19:32Z</dc:date>
    </item>
    <item>
      <title>Re: ipfilter</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/4998765#M739028</link>
      <description>Shalom,&lt;BR /&gt;&lt;BR /&gt;Go with an ipfilter configuration that first rejects allpass through, and then accepts only 80 and 443.&lt;BR /&gt;&lt;BR /&gt;This will limit traffic to your machine to those two ports alone.&lt;BR /&gt;&lt;BR /&gt;This alone is not enough to prevent hacking but it will limit their options. Its still possible to exploit web server flaws and gain access to the box.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Tue, 22 Aug 2006 06:54:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/4998765#M739028</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2006-08-22T06:54:32Z</dc:date>
    </item>
    <item>
      <title>Re: ipfilter</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/4998766#M739029</link>
      <description>if i try put a firewall(such as checkpoint) in front of unix then put the web server (unix) within DMZ, is it much more better?&lt;BR /&gt;&lt;BR /&gt;thx</description>
      <pubDate>Wed, 23 Aug 2006 00:36:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/4998766#M739029</guid>
      <dc:creator>BenCheer.com</dc:creator>
      <dc:date>2006-08-23T00:36:08Z</dc:date>
    </item>
    <item>
      <title>Re: ipfilter</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/4998767#M739030</link>
      <description>I'd also suggest going through your http.conf file and removing any module support you don't need, and the functionality you don't use.  Also, you may consider using HP-UX Bastille to harden your system further.&lt;BR /&gt;&lt;BR /&gt;-R</description>
      <pubDate>Tue, 05 Sep 2006 14:28:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/4998767#M739030</guid>
      <dc:creator>Robert Fritz</dc:creator>
      <dc:date>2006-09-05T14:28:11Z</dc:date>
    </item>
    <item>
      <title>Re: ipfilter</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/4998768#M739031</link>
      <description>Thanks</description>
      <pubDate>Wed, 06 Sep 2006 18:07:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/4998768#M739031</guid>
      <dc:creator>BenCheer.com</dc:creator>
      <dc:date>2006-09-06T18:07:20Z</dc:date>
    </item>
  </channel>
</rss>

