On 19 Nov 2002, at 9:11, Josh Rehman wrote:
> The input chain is for incoming packets. It is unlikely that kazza
> clients use a special port - they probably take the first one available,
> just like web clients.
>
> If the client does essentially port scanning (to find a good server
> port), the
fying a different initial port.
> -Original Message-
> From: Jeff [mailto:[EMAIL PROTECTED]]
> Sent: Tuesday, November 19, 2002 9:18 AM
> To: Fadel
> Cc: debian user list
> Subject: Re: Blocking Kazaa with iptables
>
> Fadel, 2002-Nov-19 13:13 -0300:
> > Hi there
Title: RE: Blocking Kazaa with iptables
I'm not sure blocking the input chain would resolve the problem.
iptables doesn't work the same way as ipchains. In iptables input and output are used to where iptables live and forward to the subnet behind the firewall.
You could block all
Fadel, 2002-Nov-19 13:13 -0300:
> Hi there,
>
> I got a trouble in my network while trying to block Kazaa.
> I tried to drop port 1214 with this rule:
>
> iptables -A FORWARD --dport 1214 -j DROP
>
> but this doesn't work. so I did sniffing to see what kind of packets and
> ports kazaa uses and
4 matches
Mail list logo