Administering TCP/IP Networks, IPMP, and IP Tunnels in Oracle® Solaris 11.2

Exit Print View

Updated: July 2014
 
 

Configuring TCP Wrappers

TCP wrappers add a measure of security for service daemons by standing between the daemon and incoming service requests. TCP wrappers log successful and unsuccessful connection attempts. Additionally, TCP wrappers can provide access control, allowing or denying the connection, depending on where the request originates. You can use TCP wrappers to protect daemons such as Secure Shell (SSH), Telnet, and the File Transfer Protocol (FTP). The sendmail application can also use TCP wrappers, as described in Support for TCP Wrappers From Version 8.12 of sendmail in Managing sendmail Services in Oracle Solaris 11.2 .

How to Use TCP Wrappers to Control Access to TCP Services

The tcpd program implements TCP wrappers.

  1. Become the root role.
  2. Set TCP wrappers to enabled.
    # inetadm -M tcp_wrappers=TRUE
  3. Configure the TCP wrappers access control policy.

    For instructions, refer to the hosts_access (3) man page, which can be found in the /usr/sfw/man directory.