In the ipchains HowTo, it mentions that source address verification can be
turned using a little script.  This apparently eliminates IP spoofing
without having to write specific rules for IPChains.  As a relative
new-comer, I am looking for some feedback regarding this.  Should I or
should I not have ip spoof proofing rules in my firewall? 

-------------------------------------

Robby Tanner B.E., B.Sc.
Project Engineer
Wardrop Engineering, Inc.
203-2121 Airport Dr.
Saskatoon, SK
Canada
S7L 6W5

Phone: (306) 244-4712
Fax:     (306) 244-4754




_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to