Alter packet filtering lists for IP packet input and output


ipf [-6AdDEInoPrsUvVyzZ] [-l block|pass|nomatch]  
    [-F i|o|a|s|S] -f filename [-f filename [...]]

Runs on:



Parse IPv6 rules and have them loaded.
Set the list to make changes to the active list (default).
Turn debug mode on. Cause a hexdump of filter rules as it processes each one.
Disable the filter (if enabled). Not effective for loadable TCP/IP stack versions.
Enable the filter (if disabled). Not effective for loadable TCP/IP stack versions.
Specify which filter list to flush. The parameter should be i (input), o (output), or a (remove all filter rules). Use either a single letter or an entire word starting with the appropriate letter.
Flush entries from the state table. Use in conjunction with either s (removes state information about any non-fully established connections) or S (deletes the entire state table). A fully established connection show up in ipfstat -s with output as 4/4.
-f filename
Specify the files ipf should use to get input from for modifying the packet filter rule lists.
Set the list to make changes to the inactive list.
Toggle the default logging of packets. Valid arguments to this option are pass, block, and nomatch.
Prevent ipf from actually making any ioctl() calls or doing anything that would alter the currently running TCP/IP stack.
Force rules by default to add to or delete from the output list, rather than the (default) input list.
Add rules as temporary entries in the authentication rule table.
Remove matching filter rules rather than add them to the internal lists.
Swap the active filter list in use to the "other" list.
Block any packets traveling along the data stream that aren't recognized as IP packets. They are printed out on the console.
Turn verbose mode on. Display information relating to rule processing.
Show version information.
Resync the interface list in the TCP/IP stack maintained by IP Filter with the current interface status list.
Reset the statistics to zero. Also, display the statistics before they are zeroed.
Hold the zero global statistics for filtering only (this doesn't affect fragment or state statistics).


The ipf utility opens the listed filenames (treating "-" as stdin) and parses the file for a set of rules to be added or removed from the packet filter rule set.

Each rule processed by ipf is added to the TCP/IP stack's internal lists if there are no parsing problems. Rules are added to the end of the internal lists, matching the order in which they appear when given to ipf.


Depending on the error, the utility displays messages indicating:

See also:

ipfs, ipfstat, ipmon, ipnat, lsm-ipfilter-*.so

"Setting up a firewall" in the Securing Your System chapter of the Neutrino User's Guide