fwcheck_psad man page

fwcheck_psad — look for iptables rules that log and block unwanted packets.

Synopsis

fwcheck_psad [options]

Description

fwcheck_psad parses the iptables ruleset on the underlying system to see if iptables has been configured to log and block unwanted packets by default. This program is  called by psad , but can also be executed manually from the command line.

Options

--config

Specify path to the psad configuration file. By default this is /etc/psad/psad.conf.

--fw-file

Allow the user to analyze a specific rulset from a file rather than the local policy.

--fw-analyze

Analyze the local iptables ruleset and exit.

--no-fw-search-all

Look for specific log prefix defined through the FW_MSG_SEARCH variable(s) in the configuration file.

--Lib-dir

Specify path to psad lib directory.

--help

Display the help message.

See Also

iptables(8), psad(8)

Author

Michael Rash <mbr@cipherdyne.org>

Bugs

Send bug reports to mbr@cipherdyne.org.  Suggestions and/or comments are always welcome as well.

Distribution

psad is distributed under the GNU General Public License (GPL), and the latest version may be downloaded from: http://www.cipherdyne.org/

Info

Aug, 2008 Debian GNU/Linux