chloe K wrote:
> Hi all
>    
>   ks there iptables rules to limit attack?
>    
>   Thank you
> 
There are examples using the recent and limit modules on the Wiki 
(Securing SSH page):

http://wiki.centos.org/HowTos/Network/SecuringSSH#head-a296ec93e31637aa349538be07b37f67d836688a

It should be easy to adapt these as required.

_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

Reply via email to