--On Friday, July 17, 2020 6:43 AM +0530 Kaushal Shriyan
wrote:
Please refer to my pastebin link https://paste.centos.org/view/cd55a9a6.
Basically I want to allow the below mentioned ruleset on the server
(CentOS Linux release 8.2.2004 (Core)) and drop the rest of the network
traffic from 0.0.
On Fri, Jul 17, 2020 at 2:41 AM Kenneth Porter
wrote:
> --On Thursday, July 16, 2020 10:41 PM +0530 Kaushal Shriyan
> wrote:
>
> > I have run the below command but I am still able to connect from the
> > internet. Do I need to add any drop traffic policy using nft?
>
> A single rule doesn't tell
--On Thursday, July 16, 2020 10:41 PM +0530 Kaushal Shriyan
wrote:
I have run the below command but I am still able to connect from the
internet. Do I need to add any drop traffic policy using nft?
A single rule doesn't tell us enough. Dump the entire firewall to a
pastebin and post the lin
Am 16.07.20 um 18:11 schrieb Kaushal Shriyan:
On Thu, Jul 16, 2020 at 9:25 PM Phil Perry wrote:
On 16/07/2020 16:48, Kaushal Shriyan wrote:
Hi,
I am running CentOS Linux release 8.2.2004 (Core) on a remote server. I
am
running the below iptables command to allow SSH port 22 from a specific
the issue by other means, it may be necessary.
From: CentOS on behalf of Phil Perry
Sent: Thursday, July 16, 2020 10:54 AM
To: centos@centos.org
Subject: [EXTERNAL] Re: [CentOS] Iptables rules not working
CAUTION: This email originated from outside of the organi
On Thu, Jul 16, 2020 at 9:25 PM Phil Perry wrote:
> On 16/07/2020 16:48, Kaushal Shriyan wrote:
> > Hi,
> >
> > I am running CentOS Linux release 8.2.2004 (Core) on a remote server. I
> am
> > running the below iptables command to allow SSH port 22 from a specific
> > source IP 219.91.200.59
> >
On 16/07/2020 16:48, Kaushal Shriyan wrote:
Hi,
I am running CentOS Linux release 8.2.2004 (Core) on a remote server. I am
running the below iptables command to allow SSH port 22 from a specific
source IP 219.91.200.59
iptables -A INPUT -m tcp -p tcp -s 219.91.200.59 --dport 22 -j ACCEPT
servi
Am 16.07.2020 um 17:48 schrieb Kaushal Shriyan:
Hi,
I am running CentOS Linux release 8.2.2004 (Core) on a remote server. I am
running the below iptables command to allow SSH port 22 from a specific
source IP 219.91.200.59
iptables -A INPUT -m tcp -p tcp -s 219.91.200.59 --dport 22 -j ACCEPT
s
Hi,
I am running CentOS Linux release 8.2.2004 (Core) on a remote server. I am
running the below iptables command to allow SSH port 22 from a specific
source IP 219.91.200.59
iptables -A INPUT -m tcp -p tcp -s 219.91.200.59 --dport 22 -j ACCEPT
> service iptables save
The above iptables ruleset
On Monday 29 March 2010 16:48, m.r...@5-cent.us wrote:
> I've got a server with several ip's on eth0. I want to block all traffic
> *except* to port 80 on them, but not on any other IPs, so that
> eth0 is www.xxx.yyy.zzz
> eth0:1 is www.xxx.yyy.ggg
> eth0:2 is www.xxx.yyy.hhh
>
> I've tried
> I want to drop *anything* other than to port 80.
>
Can't you set up a default rule of drop, and then allow port 80?
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
> Maybe, I am not understanding you, but if you just want port 80 to be
> available on each of those machines, all you needs is to have this in your
> iptables:
> -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 80 -j
> ACCEPT
>
> :-)
I want to drop *anything* other than to port 8
Maybe, I am not understanding you, but if you just want port 80 to be
available on each of those machines, all you needs is to have this in your
iptables:
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 80 -j
ACCEPT
:-)
On Mon, Mar 29, 2010 at 1:48 PM, wrote:
> I've got a serv
>> However, I can telnet to www.xxx.yyy.hhh 443. What's wrong with the
>> rules?
>
> from other machine? from localhost ?
>From other machines.
mark
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
> However, I can telnet to www.xxx.yyy.hhh 443. What's wrong with the rules?
from other machine? from localhost ?
--
Eero,
RHCE
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
I've got a server with several ip's on eth0. I want to block all traffic
*except* to port 80 on them, but not on any other IPs, so that
eth0 is www.xxx.yyy.zzz
eth0:1 is www.xxx.yyy.ggg
eth0:2 is www.xxx.yyy.hhh
I've tried
-A RH-Firewall-1-INPUT -p tcp -d www.xxx.yyy.ggg --dport ! 80 -j DROP
-A RH
Kai Schaetzl пишет:
> There are numerous tutorials out there how to use ratelimiting. Just
> google.
>
> Kai
>
>
Does anyone know how to implement some functional provided by
patch-o-matic without patching the kernel ?
centos5.2 box # iptables -A INPUT -p tcp --syn --dport 80 -m connlimit
--
chloe K wrote:
> Hi all
>
> ks there iptables rules to limit attack?
>
> Thank you
>
There are examples using the recent and limit modules on the Wiki
(Securing SSH page):
http://wiki.centos.org/HowTos/Network/SecuringSSH#head-a296ec93e31637aa349538be07b37f67d836688a
It should be e
Chloe K wrote on Thu, 26 Feb 2009 13:45:55 -0500 (EST):
> Can I know how to define the "SSH_CHECK"
> and white list?
There are numerous tutorials out there how to use ratelimiting. Just
google.
Kai
--
Kai Schätzl, Berlin, Germany
Get your web at Conactive Internet Services: http://www.conac
chloe K wrote:
> Thank you
>
> Can I know how to define the "SSH_CHECK"
> and white list?
>
> I only know to use iptables -A
>
> Thank you
>
Hello,
When you're entering the rules from the CLI, the first time you
reference a chain, you need to use -N (for "new") instead of -A (for
"append"
Thank you
Can I know how to define the "SSH_CHECK"
and white list?
I only know to use iptables -A
Thank you
Andrew Hull wrote:
chloe K wrote:
> Hi all
>
> ks there iptables rules to limit attack?
>
> Thank you
>
Hi,
Below is an example that I use to limit the rate of new
chloe K wrote:
> Hi all
>
> ks there iptables rules to limit attack?
>
> Thank you
>
Hi,
Below is an example that I use to limit the rate of new connections to a
particular port/service. You should be able to mold this to work with
whatever service you would like to protect.
Add the first
On Thu, February 26, 2009 10:52 am, chloe K wrote:
> Hi all
>
> ks there iptables rules to limit attack?
>
> Thank you
>
>
> -
Could you give a little more info?
Bo Lynch
___
CentOS mailing list
CentOS@centos.org
http
Hi all
ks there iptables rules to limit attack?
Thank you
-
Be smarter than spam. See how smart SpamGuard is at giving junk email the boot
with the All-new Yahoo! Mail ___
CentOS mailing list
CentOS@ce
24 matches
Mail list logo