Lines Matching full:services
18 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
36 IP addresses and to isolate services such as NFS or SMBFS (Windows
168 The idea here is that you can bind internal services
170 those services from the Internet.
171 The only services you run on
180 reign on our internal network when operating services through
202 # NOTE: heavily loaded services running through the firewall may require
242 # exposed services to exposed IPs but can safely bind internal
243 # services to internal IPs.
309 # SPECIFIC SERVICES ALLOWED FROM SPECIFIC LANS
312 # access to specific services running on the firewall itself.
320 # GENERAL SERVICES ALLOWED TO CROSS INTERNAL AND EXPOSED LANS
322 # We allow specific UDP services through: DNS lookups, ntalk, and ntp.
323 # Note that internal services are protected by virtue of having
325 # really only apply to services bound to exposed IPs. We have
338 # Allow similar services for TCP. Again, these only apply to
339 # services bound to exposed addresses. NOTE: we allow 'auth'
343 # when connecting to remote services that do reverse ident lookups.
383 .Sh PORT BINDING INTERNAL AND EXTERNAL SERVICES
384 We have mentioned multi-homing hosts and binding services to internal or
387 host with multiple IP addresses assigned to it, you can bind services run
395 If the firewall is providing file sharing services to the
399 way the file sharing services will not be made available to other LAN
408 to indirectly bind services that do not otherwise give you the option.