"Bryan K. Walton" wrote:
>
> Feb 22 17:21:43 cortafuegos kernel: Packet log: input DENY eth0 PROTO=6
> 66.28.69.136:80 66.222.30.128:62556 L=48 S=0x00 I=162
> 0 F=0x4000 T=51 (#26)
>
> Can anyone help me pinpoint my problem? I am really scratching my head
> on this one.
Those numbers on the end
You only need to enable it on the PC thats connected to the internet . (Unless
i you
want multiple levels of firewalls ??)
check out the following site it has a mailing list for ipchains, i joined and
occasionally have a read thru, its slowly starting to make sense to me , must be
absorbing it s
On 20/1/2000 dyer wrote:
Are the deny's perhaps UDP packets?
no, they are tcp, I have not yet tried to do anything about udp packets.
looking closer at the way portmapper seems to do things, it appears
to me that any rpc service that is registered is given a random port,
not necessarly pri
Ethan Benson wrote:
> hi,
>
>
>
> what i tried was adding 3 new rules to the very beginning of the input chain
>
> ipchains -I input 1 -p tcp -i ppp0 -d 0.0.0.0/0 53 -j ACCEPT
> ipchains -I input 2 -p tcp -i ppp0 -d 0.0.0.0/0 113 -j ACCEPT
> ipchains -I input 3 -l -p tcp -y -i ppp0 0.0.0.0/0 :102
4 matches
Mail list logo