Hello,
Pol Hallen a écrit :
>
> This is my full iptables config:
>
> iptables -F
> iptables -t nat -F
> iptables -t mangle -F
> iptables -X
OK.
> iptables -P OUTPUT ACCEPT
Should be DROP as well.
> iptables -P FORWARD DROP
> iptables -P INPUT DROP
OK.
> iptables -A INPUT -f -j DROP
Useles
On Thu, 2013-06-20 at 12:53 +0200, Pol Hallen wrote:
[...]
>
> Hi Steven and thanks for your reply :-)
You're welcome.
>
> This is my full iptables config:
[... snip iptables rules...]
>
> with this way my actually server runs perfectly. Is there other rules to
> block ddos attack, or other ty
> For the FORWARD chain, see below.
> If you only have these 2 rules, your server will be able to connect to
> other machines and the internet, but it will not accept new connections.
> If your server needs to be accessed by others (webserver, running SSH,
> printing server, etc.) you need to defin
On Wed, 2013-06-19 at 20:07 +0200, Pol Hallen wrote:
> Hey all :-)
>
> take again iptables, I need to configure another server.
>
> On my server I've:
>
> eth0Link encap:Ethernet HWaddr 00:55:d0:c4:f8:1b
> inet addr:192.168.1.100 Bcast:192.168.1.255 Mask:255.255.255.0
>
> route
4 matches
Mail list logo