Status -> System logs -> SettingsMake sure Log packets blocked by the default rule is not checkedCheck Show log entries in reverse orderIncrease to 500 Number of log entries to showStatus -> System logs -> Settings -> Firewall Dynamic ViewYou don't have to hit refreshNormal ViewMake sure to hit refresh if you expect a rule was triggered by your or others actionsFirewall -> RulesUnder the interface(s) you want to debugCreate a default deny rule at the end of the rule listChoose Log packets that are handled by this ruleGive the rule a very unique nameFor other rules you want to debugChoose Log packets that are handled by this ruleGive the rule a very unique nameHang out on Status -> System logs -> Firewall -> Dynamic ViewTweak rules until you see the result you desirePackets blocked that should be blockedPackets allowed that should be allowedClick on the red/green blocked/accepted iconsWill show a pop-up for the rule triggered, showing the unique name you …
Make sure seamless ssh keys are setup to your bastion server for your usernameNot covered hereSee: http://www.ualberta.ca/CNS/RESEARCH/LinuxClusters/pka-putty.htmlSession -> Host Name -> mytargetserver.mydomain.comConnection -> ProxyProxy Type -> LocalTelnet command, or local proxy
command c:/program files (x86)/putty/plink.exe myproxy.mydomain.com
-l myusername -agent -nc %host:%portadjust this path to plink.exe to match your local setuphint: install the complete putty install package, not just puttyTunnels L8081 mytargetserver.mydomain.com:8081
Hint: always hit "Save", no matter what you do, or however inconvenient it was designed to be.
netcatprints only what is sent by the remote hosttelnetnot suitable for arbitrary binary data reserves some bytes as control characters quits when its input runs outyou may not see what the other end sendsdoesn't do UDP