Solved

netstat showing some strange connections, how can I stop the connection

Posted on 2006-06-28
6
1,570 Views
Last Modified: 2013-12-27
MY solaris web server is showing some strange connections when using "netstat -a" a lot of IP's coming from Bejing China with the state being "TIME_WAIT". How can I disconect these?
0
Comment
Question by:mslibrarycommission
  • 3
  • 2
6 Comments
 
LVL 12

Expert Comment

by:stefan73
ID: 17008447
Hi mslibrarycommission,
You can't, they will disconnect automatically. You may want to reconfigure your firewall if you dislike visitors from Bejing, though.
Enjoy,

Stefan
0
 
LVL 10

Expert Comment

by:Nukfror
ID: 17009917
There is nothing strange about a TIME_WAIT connection.  Its perfectly normal.  As stefan73 suggested, they will go away on their own.  This is a short description of what the TIME_WAIT state is:

http://www.unixguide.net/network/socketfaq/2.7.shtml
0
 
LVL 1

Author Comment

by:mslibrarycommission
ID: 17010145
SO, the ONLY way to refuse or drop that connection is at the firewall?
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 10

Expert Comment

by:Nukfror
ID: 17011862
Yes, firewall is the best way.
0
 
LVL 1

Author Comment

by:mslibrarycommission
ID: 17012382
I know it's the best way , but I woould like to know how to do it on the Solaris box.
0
 
LVL 10

Accepted Solution

by:
Nukfror earned 500 total points
ID: 17013710
Firewall on the Solaris box ?  If you are using Solaris 10, it comes with IPFilter.  Solaris 9 and below work very nicely with IPFilter added.

http://coombs.anu.edu.au/~avalon/
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
IBM AIX Cannot Install AIX ToolKit Applications for Linux 11 142
replace content of certain columns in a *.csv file by a defined string 12 67
Access_log 17 101
Linux hostname change 2 56
In tuning file systems on the Solaris Operating System, changing some parameters of a file system usually destroys the data on it. For instance, changing the cache segment block size in the volume of a T3 requires that you delete the existing volu…
FreeBSD on EC2 FreeBSD (https://www.freebsd.org) is a robust Unix-like operating system that has been around for many years. FreeBSD is available on Amazon EC2 through Amazon Machine Images (AMIs) provided by FreeBSD developer and security office…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now