TCP Wrappers

Top - Help

Copyright(c), 1995 - Management Analytics and Others - All Rights Reserved



TCP wrappers are used to control and log access to network services.
The TCP wrapper access control list ends with a line denying all access not previously permitted.
The TCP wrapper access control list does not have any entries allowing unlimited access to services.
The TCP wrapper access control list is properly configured to allow only desired services from desired hosts. Where wildcards are used, every computer covered by the wildcard is properly permitted the specified access.
All inbound network services operate through TCP wrappers.
TCP wrappers produce logfiles that are regularly analyzed.
TCP wrappers are configured to refuse access from hosts whose DNS reports a different IP address from the address claimed in the packet header.

With maximum value of