DoorStop X Firewall
User's Guide

Appendices

Notes on installation

The installation procedure described in Getting Started will not work if your browser is set to not auto-open downloaded files. In this case, use the instructions below.

If you wish to keep the DoorStop installer for possible future use, drag it out of the trash to an appropriate location on your drive and follow the instructions below.

To use the installer, double-click it to cause a disk image to be created and mounted on your desktop. Close the disk image's window, select the mounted disk image, and type cmd-D (the Finder's Duplicate command under the File menu). A folder containing the contents of the disk image is created. You can then unmount the disk image and copy the folder to the Applications folder.

 

TCP & UDP Port Numbers of commonly used Macintosh services (6, Port Numbers)

For the latest information on port numbers, see the list on our Web site.

 

Log file format (12, Features)

Apr 22 16:28:08 iMac ipfw: 58 Deny TCP 192.168.1.101:54394 192.168.1.102:23 in via en0
Apr 22 16:28:09 iMac ipfw: 64001 Accept UDP 192.168.1.101:50147 239.255.255.253:548 in via en0

 

Sample Log Lines

date time machine name ipfw rule # result protocol source address:port dest address:port direction interface
Apr 22 16:28:08 iMac ipfw: 58 Deny TCP 192.168.1.101:54394 192.168.1.102:23 in via en0
Apr 22 16:28:09 iMac ipfw: 64001 Accept UDP 192.168.1.101:50147 239.255.255.253:548 in via en0

Note that DoorStop X writes a special line at the beginning of every new log file. This line contains the year of the date on which the log file was created, and may be used by future versions of Who's There?

There may also be entries in the log file that are not firewall entries at all. These will have formats different from that indicated above, and can be ignored.

 

Reading the log file

DoorStop's log file may contain information useful in spotting potential security violations, although log files also tend to be large and difficult to read. The simplest way to analyze a log file for patterns that may indicate suspicious activity is to use a firewall log analysis tool, like Open Door's Who's There? Firewall Advisor. Who's There? reads in the entire log file, and summarizes its contents in ways that make it easy to identify patterns in the access attempts made to your machine.

 

DoorStop and multiple users on Lion

On Mac OS X 10.7 (Lion), DoorStop maintains a separate configuration for each user who runs the DoorStop application. Every user who runs the DoorStop application will get DoorStop's Setup Assistant the first time they run the app, and that user's configuration will be stored with that user. The user's configuration will remain in effect, even across reboots, until another user logs in and runs the DoorStop app.


Back to Table of Contents
Back to Troubleshooting