|
DoorStop X Firewall User's Guide Appendices |
Notes on installation
The installation procedure described in Getting Started will not work if your browser is set to not auto-open downloaded files. In this case, use the instructions below.
If you wish to keep the DoorStop installer for possible future use, drag it out of the trash to an appropriate location on your drive and follow the instructions below.
To use the installer, double-click it to cause a disk image to be created and mounted on your desktop. Close the disk image's window, select the mounted disk image, and type cmd-D (the Finder's Duplicate command under the File menu). A folder containing the contents of the disk image is created. You can then unmount the disk image and copy the folder to the Applications folder.
TCP & UDP Port Numbers of commonly used Macintosh services (6, Port Numbers)
For the latest information on port numbers, see the list on our Web site.
Log file format (12, Features)
Apr 22 16:28:08 iMac ipfw: 58 Deny TCP 192.168.1.101:54394 192.168.1.102:23
in via en0
Apr 22 16:28:09 iMac ipfw: 64001 Accept UDP 192.168.1.101:50147
239.255.255.253:548 in via en0
Sample Log Lines
date
time
machine name
ipfw rule #
result
protocol
source address:port
dest address:port
direction
interface
Apr 22
16:28:08
iMac ipfw:
58
Deny
TCP
192.168.1.101:54394
192.168.1.102:23
in
via en0
Apr 22
16:28:09
iMac ipfw:
64001
Accept
UDP
192.168.1.101:50147
239.255.255.253:548
in
via en0
Note that DoorStop X writes a special line at the beginning of every new log file. This line contains the year of the date on which the log file was created, and may be used by future versions of Who's There?
There may also be entries in the log file that are not firewall entries at all. These will have formats different from that indicated above, and can be ignored.
DoorStop's log file may contain information useful in spotting potential security violations, although log files also tend to be large and difficult to read. The simplest way to analyze a log file for patterns that may indicate suspicious activity is to use a firewall log analysis tool, like Open Door's Who's There? Firewall Advisor. Who's There? reads in the entire log file, and summarizes its contents in ways that make it easy to identify patterns in the access attempts made to your machine.
DoorStop and multiple users on Lion
On Mac OS X 10.7 (Lion), DoorStop maintains a separate configuration for each user who runs the DoorStop application. Every user who runs the DoorStop application will get DoorStop's Setup Assistant the first time they run the app, and that user's configuration will be stored with that user. The user's configuration will remain in effect, even across reboots, until another user logs in and runs the DoorStop app.