Look for iptables rules that log and block unwanted packets.
fwcheck_psad [options]
fwcheck_psad parses the iptables ruleset on the underlying system to see if iptables has been configured to log and block unwanted packets by default. This program is called by psad , but can also be executed manually from the command line.
-\^-config
Specify path to the psad configuration file. By default this is /etc/psad/psad.conf.
-\^-fw-file
Allow the user to analyze a specific rulset from a file rather than the local policy.
-\^-fw-analyze
Analyze the local iptables ruleset and exit.
-\^-no-fw-search-all
Look for specific log prefix defined through the FW_MSG_SEARCH variable(s) in the configuration file.
-\^-Lib-dir
Specify path to psad lib directory.
-\^-help
Display the help message.
Michael Rash <[email protected]>
Send bug reports to [email protected]. Suggestions and/or comments are always welcome as well.
psad is distributed under the GNU General Public License (GPL), and the latest version may be downloaded from: http://www.cipherdyne.org/