Otherwise, simply take it out of the file above entries and set the firewall following option to no: FW_service_DNS"yes the most important option is option number 15: Example 33.1. .
At the command prompt type yast and follow the screenshots below: Once you click Finish, the firewall configuration will be firewall automatically restarted.
In the following example, I configuration installed Webmin and Usermin on a sles 11 server that had SuSE firewall enabled.
Only the Web firewall services (port 80) should be open.# # This can be used to force all internal users to surf suse via your # Squid proxy, or transparently redirect incoming Web traffic to # a secure Web server.In the "allowed services add the services you need to have them accepted.Its configuration file can be found in /etc/sysconfig/SuSEfirewall2. Now redirect sekolahan collection all incoming requests via the photo firewall with help keygen of a port forwarding rule to the Squid port.
There are a couple of ways of adding custom ports to the list of the allowed services.
Or you prepare a custom executable start script in init.
Depending on exact SuSE version, go down to "Masquerading".
D (you can copy from one of the existing ones assuming that you are in runlevel scrapbook 5 # runlevel 5 then you will use rc5.d and create sony the script in the key part of the script would be: cloud case "1" in start) echo -n "Applying.
To verify that all ports are correctly configured, perform a port scan on the machine from any computer outside configuration your network.
So you either create an aliased interface, and redirect from your real interface to the alias; or you put your existing iptables rules into the appropriate script.
To do this, use the enclosed tool SuSEfirewall2.For more details, refer.As the name indicates, the entire process is done transparently.print 0 ' /etc/sysconfig/SuSEfirewall2 grep.Firewall Configuration with SuSEfirewall2.Define ports and services (see /etc/services) on the firewall that are accessed from untrusted (external) networks such as the Internet.

The usual way of working with proxy servers is the following: the Web browser sends requests to a certain port in the proxy server and the proxy provides these required objects, whether they are in its cache or not.
After that, enter the original port to which these requests are sent and, suse linux firewall configuration file finally, the port to which all these requests are redirected.