On Sun, Aug 05, 2001 at 09:57:33PM +0100, P Kirk wrote: > > [EMAIL PROTECTED]:~$ cat /etc/init.d/firewall > > echo "1" > /proc/sys/net/ipv4/ip_forward > > /sbin/ipchains -P forward DENY > > /sbin/ipchains -A forward -i ppp0 -s 192.168.0.0/24 -j MASQ
But doesn't this just masquerade the outgoing connection, and responses? This won't help if a PTP client tries to initiate a connection with me while I'm behind the firewall. Mike -- Michael P. Soulier <[EMAIL PROTECTED]> "With sufficient thrust, pigs fly just fine. However, this is not necessarily a good idea. It is hard to be sure where they are going to land, and it could be dangerous sitting under them as they fly overhead." -- RFC 1925
pgpbqmDxSWmTY.pgp
Description: PGP signature