It would help if you would throw a -v on that iptables listing so it will
show which interfaces and more information about the traffic types.
------------------------------------------------------------------------
Jim Wildman, CISSP jim@rossberry.com
http://www.rossberry.com
On Sat, 27 Apr 2002, diego henao wrote:
>
> If someone wants to check out the server, the address is
> www.cabezas.darktech.org.
> RULES
>
> [root@CaBe root]# iptables --list
> Chain INPUT (policy DROP)
> target prot opt source destination
> ACCEPT all -- anywhere anywhere
> ACCEPT all -- 192.168.0.0/24 anywhere
> drop-and-log-it all -- 192.168.0.0/24 anywhere
> ACCEPT all -- anywhere
> 6535138hfc140.tampabay.rr.comstate RELATED,ESTABLISHED
> drop-and-log-it all -- anywhere anywhere
>
> Chain FORWARD (policy DROP)
> target prot opt source destination
> ACCEPT all -- anywhere anywhere state
> RELATED,ESTABLISHED
> ACCEPT all -- anywhere anywhere
> drop-and-log-it all -- anywhere anywhere
>
> Chain OUTPUT (policy DROP)
> target prot opt source destination
> ACCEPT all -- anywhere anywhere
> ACCEPT all -- 6535138hfc140.tampabay.rr.com 192.168.0.0/24
> ACCEPT all -- 192.168.0.0/24 192.168.0.0/24
> drop-and-log-it all -- anywhere 192.168.0.0/24
> ACCEPT all -- 6535138hfc140.tampabay.rr.com anywhere
> drop-and-log-it all -- anywhere anywhere
>
> Chain drop-and-log-it (5 references)
> target prot opt source destination
> LOG all -- anywhere anywhere LOG level
> info
> DROP all -- anywhere anywhere
> [root@CaBe root]#
>
>
This archive was generated by hypermail 2.1.3 : Fri Aug 01 2014 - 13:04:45 EDT