On Du, 12 oct 14, 17:18:10, Joe wrote: > > You basically have two options, to use a firewall tool, or to hack a > script yourself. The existing tools, last time I looked, aren't really > that versatile, they are intended to make simple firewalls using a GUI. > That's reasonable, because once you want something a bit unusual, any > tool is likely to be no easier to use than the iptables commands > themselves. I've (long ago) driven the 'sophisticated' Windows ISA > firewall, and honestly, I'd rather have produced a list of iptables > rules, when at least I'd have known for sure what was going on, and in > what order.
shorewall Kind regards, Andrei -- http://wiki.debian.org/FAQsFromDebianUser Offtopic discussions among Debian users and developers: http://lists.alioth.debian.org/mailman/listinfo/d-community-offtopic http://nuvreauspam.ro/gpg-transition.txt
signature.asc
Description: Digital signature