Tip:
Highlight text to annotate it
X
Hi, I'm Dave Tansley.
I work as an [IBM] p Series administrator for a global insurance company.
Today I want to talk to you about one of my articles called
"Using TCP wrappers to control access."
It covers how to compile, deploy and administer the TCP wrappers utility.
TCP wrappers are often referred to as "wrappers."
They allow you to control TCP-based programs' incoming access to your box.
To start with, though, only TCPD daemons that were run
from inetd.conf could be controlled by wrappers.
However, as wrappers are so popular, utilities like SSH, VSFTPD, mail,
and many more are designed wrappers aware.
Wrappers uses the allow-and-deny rules to either allow or deny access.
For programs that were built with wrapper awareness -- for example, SSH --
it is SSH's responsibility to directly consult the host allow or the host deny files
and adhere to the rules on whether to allow or deny access.
Either grant or deny, the event is logged under syslog.
I'm Dave Tansley.
We hope you enjoy reading my article.