Grant <[EMAIL PROTECTED]> writes:

>> > iptables -P INPUT DROP
>> > iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
>> > iptables -A FORWARD -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
>>
>> This line is only needed if you want to forward packets to another
>> iface/device (i.e. when your laptop is acting as a router and the input
>> interface is eth0).
>
> Alright I guess I'll just set up shorewall on the laptop with a config
> similar to the router's.  Maybe I'll set up shorewall on the other
> system in my local network while I'm at it.

Wait... I'm pretty sure there are a few lines of IPTABLES code that
will do what you want.

I remember using something with IPTABLES that made any connections
from internet only happen in response to requests from your localhost.
I don't remember the lines now but someone might post it.

Wouldn't the above and not running any unnecessary services be pretty
good protection for what your after?

I've hooked up to many networks while traveling without anything at
all (Except not running any unnecessary services) with windows based
laptop and never had a bit of trouble.  So I'd expect a linux based
host to do even better.

-- 
[EMAIL PROTECTED] mailing list

Reply via email to