kernun — signpost to Kernun firewall manual pages


Kernun is a flexible toolkit that makes it possible to build secure network firewalls combining application-specific proxy gateways with stateful packet filtering and address translation (NAT), virtual private networks, network IDS and detailed log analysis.

Individual application proxies, important aspects of the configuration, as well as internal interfaces implemented in Kernun support libraries are documented in their respective manual pages.

The best way to start using the Kernun firewall is to read the Kernun Firewall Handbook, especially the tutorial. After learning Kernun firewall basics, detailed information can be found in these manual pages, which are available also as the reference part of the Handbook. The most important administrative tasks are covered by the following manual pages: kat(8), cml(8), and kernun.cml(5). It may be also helpful to examine the initial configuration in /usr/local/kernun/conf/kernun.cml, which is generated after the installation, and configuration samples that can be found in /usr/local/kernun/conf/samples.


The Kernun firewall consists of:


Components of the Kernun firewall have the following common features:

integrated configuration

It covers key system components and all proxies. See kat(8), cml(8), kernun.cml(5).

hot-standby backup firewalls

See cluster(7).

intrusion detection/prevention system

See ips(7).

name resolving

See resolving(7).

sophisticated logging

See logging(7).


See auth(7).

fine-grain access-control

See access-control(7), host-matching(7), data-matching(7), time-matching(7).

data content inspection

See antivirus(7).

document type recognition

See doctype-identification(7).

runtime monitoring

See monitoring(7).

enhanced network I/O with traffic shaping

See netio(7), traffic-shaping(7).

efficient process management

See application(5), tcpserver(7), udpserver(7).

network transparency

See transparency(7), port-range-listen(7), listen-on(5).

administrative accounts with two levels of privileges

The administrator accounts have privileges equivalent to the root user. The auditor accounts are allowed to view the configuration and logs, but do not have privileges to manipulate the state of the firewall (change configuration, start or stop proxies, etc.). See system(5).

See Also

Kernun: monitor(1), rrd(1), sum-stats(1), switchlog(1), dns-proxy.cfg(5), ftp-proxy.cfg(5), gk-proxy.cfg(5), h323-proxy.cfg(5), http-proxy.cfg(5), imap4-proxy.cfg(5), kernun.cml(5), listen-on(5), pop3-proxy.cfg(5), application(5), smtp-proxy.cfg(5), sqlnet-proxy.cfg(5), system(5), tcp-proxy.cfg(5), udp-proxy.cfg(5), access-control(7), antivirus(7), auth(7), cluster(7), configuration(7), data-matching(7), doctype-identification(7), host-matching(7), ips(7), logging(7), monitoring(7), netio(7), port-range-listen(7), resolving(7), tcpserver(7), time-matching(7), traffic-shaping(7), transparency(7), udpserver(7), atrmon(8), cml(8), dns-proxy(8), ftp-proxy(8), gk-proxy(8), h323-proxy(8), http-proxy(8), icap-server(8), imap4-proxy(8), kat(8), pf-control(8), pop3-proxy(8), smtp-proxy(8), sqlnet-proxy(8), tcp-proxy(8), udp-proxy(8)

FreeBSD: intro(1), logsurfer(1), spamassassin(1), suricata(1) pf.conf(5), openvpn(8), dhcpd(8), named(8), ntpd(8), pfctl(8), snmpd(8),


This man page is a part of Kernun Firewall.
Copyright © 2000–2023 Trusted Network Solutions, a. s.
All rights reserved.