Re: [SLUG] question

From: Jim Wildman (jim@rossberry.com)
Date: Thu Jun 27 2002 - 20:20:29 EDT


It would help if you would throw a -v on that iptables listing so it will
show which interfaces and more information about the traffic types.

------------------------------------------------------------------------
Jim Wildman, CISSP jim@rossberry.com
http://www.rossberry.com

On Sat, 27 Apr 2002, diego henao wrote:

>
> If someone wants to check out the server, the address is
> www.cabezas.darktech.org.
> RULES
>
> [root@CaBe root]# iptables --list
> Chain INPUT (policy DROP)
> target prot opt source destination
> ACCEPT all -- anywhere anywhere
> ACCEPT all -- 192.168.0.0/24 anywhere
> drop-and-log-it all -- 192.168.0.0/24 anywhere
> ACCEPT all -- anywhere
> 6535138hfc140.tampabay.rr.comstate RELATED,ESTABLISHED
> drop-and-log-it all -- anywhere anywhere
>
> Chain FORWARD (policy DROP)
> target prot opt source destination
> ACCEPT all -- anywhere anywhere state
> RELATED,ESTABLISHED
> ACCEPT all -- anywhere anywhere
> drop-and-log-it all -- anywhere anywhere
>
> Chain OUTPUT (policy DROP)
> target prot opt source destination
> ACCEPT all -- anywhere anywhere
> ACCEPT all -- 6535138hfc140.tampabay.rr.com 192.168.0.0/24
> ACCEPT all -- 192.168.0.0/24 192.168.0.0/24
> drop-and-log-it all -- anywhere 192.168.0.0/24
> ACCEPT all -- 6535138hfc140.tampabay.rr.com anywhere
> drop-and-log-it all -- anywhere anywhere
>
> Chain drop-and-log-it (5 references)
> target prot opt source destination
> LOG all -- anywhere anywhere LOG level
> info
> DROP all -- anywhere anywhere
> [root@CaBe root]#
>
>



This archive was generated by hypermail 2.1.3 : Fri Aug 01 2014 - 13:04:45 EDT