<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPFilter in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/2801107#M754286</link>
    <description>There is also a log first option that you should use with the keep state option that will keep this type of reverse traffic out of your logs. Look at the ipf.5 man page for the specific recommendation. I noticed that your log option was not in the ipf rule, so it would look like&lt;BR /&gt;&lt;BR /&gt;pass in quick log first ...&lt;BR /&gt;&lt;BR /&gt;GL,&lt;BR /&gt;C</description>
    <pubDate>Fri, 06 Sep 2002 12:21:49 GMT</pubDate>
    <dc:creator>Craig Rants</dc:creator>
    <dc:date>2002-09-06T12:21:49Z</dc:date>
    <item>
      <title>IPFilter</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/2801104#M754283</link>
      <description>Hi:&lt;BR /&gt;&lt;BR /&gt;I have just installed the above and have a problem understanding how to inteprete SMNP traffic. The rule I have defined is as follows :&lt;BR /&gt;&lt;BR /&gt;pass in quick on lan1 proto udp from any to ###.###.###.### port = 161 keep state&lt;BR /&gt;&lt;BR /&gt;But I am finding the following entries in the logfile :&lt;BR /&gt;&lt;BR /&gt;06/09/2002 11:49:36.593635 lan1 @0:22 p ###.###.71.3,161 -&amp;gt; ###.###.71.6,56825 PR udp len 20 111  IN&lt;BR /&gt;&lt;BR /&gt;Now I was under the impression that the rule would accept a connection on port 161 and then when this is handed off to another port the IPFilter would keep a track of all further communication. The entry in the logfile seems otherwise. Am I missing something?</description>
      <pubDate>Fri, 06 Sep 2002 09:46:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/2801104#M754283</guid>
      <dc:creator>Phil Daws_2</dc:creator>
      <dc:date>2002-09-06T09:46:28Z</dc:date>
    </item>
    <item>
      <title>Re: IPFilter</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/2801105#M754284</link>
      <description>Hi Phil,&lt;BR /&gt;&lt;BR /&gt;"state" is not that usefull on UDP, especially SNMP. and "SNMP-Traps" come in on UDP/162, UDP/161 is for get/set commands.&lt;BR /&gt;&lt;BR /&gt;HTH,&lt;BR /&gt;Wodisch&lt;BR /&gt;</description>
      <pubDate>Fri, 06 Sep 2002 10:42:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/2801105#M754284</guid>
      <dc:creator>Wodisch</dc:creator>
      <dc:date>2002-09-06T10:42:12Z</dc:date>
    </item>
    <item>
      <title>Re: IPFilter</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/2801106#M754285</link>
      <description>Thank you, but this does still not explain why the messages are appearing when I am allowing inbound SNMP?</description>
      <pubDate>Fri, 06 Sep 2002 12:19:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/2801106#M754285</guid>
      <dc:creator>Phil Daws_2</dc:creator>
      <dc:date>2002-09-06T12:19:39Z</dc:date>
    </item>
    <item>
      <title>Re: IPFilter</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/2801107#M754286</link>
      <description>There is also a log first option that you should use with the keep state option that will keep this type of reverse traffic out of your logs. Look at the ipf.5 man page for the specific recommendation. I noticed that your log option was not in the ipf rule, so it would look like&lt;BR /&gt;&lt;BR /&gt;pass in quick log first ...&lt;BR /&gt;&lt;BR /&gt;GL,&lt;BR /&gt;C</description>
      <pubDate>Fri, 06 Sep 2002 12:21:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/2801107#M754286</guid>
      <dc:creator>Craig Rants</dc:creator>
      <dc:date>2002-09-06T12:21:49Z</dc:date>
    </item>
    <item>
      <title>Re: IPFilter</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/2801108#M754287</link>
      <description>Okay understand that. But at the end of my ruleset I have :&lt;BR /&gt;&lt;BR /&gt;pass in log on lan1 from any to ###.###.71.6                                                        # Log all other traffic!&lt;BR /&gt;&lt;BR /&gt;So as I define my ruleset it should log everything else. So based on the SNMP rule I have it should not log anything. As I said it seems that the initial connection on port 161 occurs, it hands off the connection to another port, and then IPfilter picks this up and reports it. All the requests are coming from Cisco switches.</description>
      <pubDate>Fri, 06 Sep 2002 12:28:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/2801108#M754287</guid>
      <dc:creator>Phil Daws_2</dc:creator>
      <dc:date>2002-09-06T12:28:10Z</dc:date>
    </item>
    <item>
      <title>Re: IPFilter</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/2801109#M754288</link>
      <description>Lets just say that IPF/9000 does not work exactly the same as say ipf for Solaris or ipchains on Linux.  I have the same frustration, and I was told by HP that the solution is the log first option with the keep state, I don't think that's what I should have to do, but ...&lt;BR /&gt;&lt;BR /&gt;Also, beware of the version you are using, get the lastest possible 3.05.04, although the website says you are downloading 3.05.05, there are kernel panic issues with the earlier versions that have cause some of my servers to reboot.&lt;BR /&gt;&lt;BR /&gt;Anything else let us know.&lt;BR /&gt;&lt;BR /&gt;C</description>
      <pubDate>Fri, 06 Sep 2002 12:34:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/2801109#M754288</guid>
      <dc:creator>Craig Rants</dc:creator>
      <dc:date>2002-09-06T12:34:19Z</dc:date>
    </item>
    <item>
      <title>Re: IPFilter</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/2801110#M754289</link>
      <description>This would be okay if I was logging SNMP traffic but as you can see from the rule it doesnt. The only rule for logging is the final one so that I can see what other traffic is coming in and add rules as necessary.</description>
      <pubDate>Fri, 06 Sep 2002 13:24:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/2801110#M754289</guid>
      <dc:creator>Phil Daws_2</dc:creator>
      <dc:date>2002-09-06T13:24:23Z</dc:date>
    </item>
    <item>
      <title>Re: IPFilter</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/2801111#M754290</link>
      <description>Is your catch all logging rule the 22nd rule of group 0?  Because that is the rule that is catching your traffic, "@0:22" is the indicator of this. This may be one of the little things that they have to work through on an young product.&lt;BR /&gt;&lt;BR /&gt;C</description>
      <pubDate>Fri, 06 Sep 2002 13:28:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/2801111#M754290</guid>
      <dc:creator>Craig Rants</dc:creator>
      <dc:date>2002-09-06T13:28:37Z</dc:date>
    </item>
    <item>
      <title>Re: IPFilter</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/2801112#M754291</link>
      <description>Here is our current ruleset with the bits '#' out :&lt;BR /&gt;&lt;BR /&gt;pass out quick proto tcp from ###.###.71.6 to any keep state                                     # Allow all outbound TCP traffic&lt;BR /&gt;pass out quick proto udp from ###.###.71.6 to any keep state                                     # Allow all outbound UDP traffic&lt;BR /&gt;pass out quick proto icmp from ###.###.71.6 to any keep state                                    # Allow all outbound ICMP traffic&lt;BR /&gt;pass in quick on lan1 proto icmp from any to ###.###.71.6 icmp-type echo                         # Allow Ping ICMP&lt;BR /&gt;pass in quick on lan1 proto icmp from any to ###.###.71.6 icmp-type echorep                      # Allow Ping ICMP&lt;BR /&gt;pass in quick on lan1 proto icmp from any to ###.###.71.6 icmp-type 11                           # Allow Traceroute ICMP&lt;BR /&gt;pass in quick on lan1 proto tcp from any to ###.###.71.6 port = 2531                             # HP Operations Java GUI&lt;BR /&gt;pass in quick on lan1 proto tcp from any to ###.###.71.6 port = 5555                             # HP OmniBack&lt;BR /&gt;pass in quick on lan1 proto tcp from any to ###.###.71.6 port = 25                               # SMTP Traffic&lt;BR /&gt;pass in quick on lan1 proto tcp/udp from ###.###.71.62 to ###.###.71.6 port = 53                 # Allow DNS traffic from ns1.###.###&lt;BR /&gt;pass in quick on lan1 proto tcp/udp from ###.###.71.63 to ###.###.71.6 port = 53                 # Allow DNS traffic from ns2.###.###&lt;BR /&gt;pass in quick on lan1 proto tcp/udp from ###.###.164.104 to ###.###.71.6 port = 53               # Allow DNS traffic from NT Primary DNS&lt;BR /&gt;pass in quick on lan1 proto tcp/udp from ###.###.164.116 to ###.###.71.6 port = 53               # Allow DNS traffic from NT Secondary DNS&lt;BR /&gt;pass in quick on lan1 proto tcp/udp from ###.###.164.132 to ###.###.71.6 port = 53               # Allow DNS traffic from Win2K ADS Primary&lt;BR /&gt;pass in quick on lan1 proto tcp/udp from ###.###.164.133 to ###.###.71.6 port = 53               # Allow DNS traffic from Win2K ADS Secondary&lt;BR /&gt;pass in quick on lan1 proto udp from any to ###.###.71.6 port = 161 keep state                   # Allow SNMP traffic&lt;BR /&gt;pass in quick on lan1 proto tcp/udp from any to ###.###.71.6 port = 6000 keep state              # Allow X11 traffic&lt;BR /&gt;pass in quick on lan1 proto tcp from any to ###.###.71.6 port = 23 flags S keep state            # Allow Telnet traffic&lt;BR /&gt;pass in quick on lan1 proto tcp from any to ###.###.71.6 port = 1529 flags S keep state          # Allow OEM traffic&lt;BR /&gt;block in quick on lan1 proto 54 from any to ###.###.71.6                                         # Block Protocol 54&lt;BR /&gt;block in quick on lan1 proto icmp from any to ###.###.71.6                                       # Block all other ICMP traffic&lt;BR /&gt;block in quick on lan1 proto tcp/udp from any to ###.###.71.6 port = 137                         # Block NetBios&lt;BR /&gt;block in quick on lan1 proto tcp/udp from any to ###.###.71.6 port = 513                         # Block inbound rlogin&lt;BR /&gt;block in quick on lan1 proto tcp/udp from any to ###.###.71.6 port = 514                         # Block inbound rsh&lt;BR /&gt;block in log quick on lan1 proto tcp/udp from any to ###.###.71.6 port = 53                      # Block other DNS traffic&lt;BR /&gt;block in quick on lan1 proto tcp from any to ###.###.71.6 with short                             # Block short packets&lt;BR /&gt;pass in log first quick on lan1 from any to ###.###.71.6                                         # Log all other traffic!&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Line 24 would point to the last line if you exclude the pass outs at the top. So it would seem like a little buglet that needs ironing out.</description>
      <pubDate>Fri, 06 Sep 2002 13:58:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/2801112#M754291</guid>
      <dc:creator>Phil Daws_2</dc:creator>
      <dc:date>2002-09-06T13:58:49Z</dc:date>
    </item>
    <item>
      <title>Re: IPFilter</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/2801113#M754292</link>
      <description />
      <pubDate>Fri, 06 Sep 2002 15:46:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/2801113#M754292</guid>
      <dc:creator>Craig Rants</dc:creator>
      <dc:date>2002-09-06T15:46:04Z</dc:date>
    </item>
    <item>
      <title>Re: IPFilter</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/2801114#M754293</link>
      <description>You have about 70 posts that you haven't responded to:&lt;BR /&gt;&lt;A href="http://forums.itrc.hp.com/cm/TopSolutions/1,,BR669256!1!questions,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/TopSolutions/1,,BR669256!1!questions,00.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;live free or die&lt;BR /&gt;harry</description>
      <pubDate>Sun, 08 Sep 2002 11:50:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/2801114#M754293</guid>
      <dc:creator>harry d brown jr</dc:creator>
      <dc:date>2002-09-08T11:50:58Z</dc:date>
    </item>
    <item>
      <title>Re: IPFilter</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/2801115#M754294</link>
      <description>Think I have pretty much applied points to everything now! A few are still open questions though.</description>
      <pubDate>Mon, 09 Sep 2002 06:45:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/2801115#M754294</guid>
      <dc:creator>Phil Daws_2</dc:creator>
      <dc:date>2002-09-09T06:45:37Z</dc:date>
    </item>
    <item>
      <title>Re: IPFilter</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/2801116#M754295</link>
      <description>I have tried to script my config file like yours using groups for each protocol. But when I try and load it I get the following error :&lt;BR /&gt;&lt;BR /&gt;ioctl(add/insert rule): No such process&lt;BR /&gt;&lt;BR /&gt;As soon as I take out the group entries it works fine ?&lt;BR /&gt;</description>
      <pubDate>Mon, 09 Sep 2002 08:42:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter/m-p/2801116#M754295</guid>
      <dc:creator>Phil Daws_2</dc:creator>
      <dc:date>2002-09-09T08:42:10Z</dc:date>
    </item>
  </channel>
</rss>

