Re: iptables and networking

2013-06-30 Thread Pascal Hambourg
Hello, Pol Hallen a écrit : > > This is my full iptables config: > > iptables -F > iptables -t nat -F > iptables -t mangle -F > iptables -X OK. > iptables -P OUTPUT ACCEPT Should be DROP as well. > iptables -P FORWARD DROP > iptables -P INPUT DROP OK. > iptables -A INPUT -f -j DROP Useles

Re: iptables and networking

2013-06-20 Thread Steven Post
On Thu, 2013-06-20 at 12:53 +0200, Pol Hallen wrote: [...] > > Hi Steven and thanks for your reply :-) You're welcome. > > This is my full iptables config: [... snip iptables rules...] > > with this way my actually server runs perfectly. Is there other rules to > block ddos attack, or other ty

Re: iptables and networking

2013-06-20 Thread Pol Hallen
> For the FORWARD chain, see below. > If you only have these 2 rules, your server will be able to connect to > other machines and the internet, but it will not accept new connections. > If your server needs to be accessed by others (webserver, running SSH, > printing server, etc.) you need to defin

Re: iptables and networking

2013-06-19 Thread Steven Post
On Wed, 2013-06-19 at 20:07 +0200, Pol Hallen wrote: > Hey all :-) > > take again iptables, I need to configure another server. > > On my server I've: > > eth0Link encap:Ethernet HWaddr 00:55:d0:c4:f8:1b > inet addr:192.168.1.100 Bcast:192.168.1.255 Mask:255.255.255.0 > > route