On Sun, Aug 05, 2001 at 09:57:33PM +0100, P Kirk wrote:
> 
> [EMAIL PROTECTED]:~$ cat /etc/init.d/firewall
> 
> echo "1" > /proc/sys/net/ipv4/ip_forward
> 
> /sbin/ipchains -P forward DENY
> 
> /sbin/ipchains -A forward -i ppp0 -s 192.168.0.0/24 -j MASQ

    But doesn't this just masquerade the outgoing connection, and responses?
This won't help if a PTP client tries to initiate a connection with me while
I'm behind the firewall. 

    Mike

-- 
Michael P. Soulier <[EMAIL PROTECTED]> 
"With sufficient thrust, pigs fly just fine. However, this is not necessarily a
good idea. It is hard to be sure where they are going to land, and it could be
dangerous sitting under them as they fly overhead." -- RFC 1925

Attachment: pgpbqmDxSWmTY.pgp
Description: PGP signature

Reply via email to