Assuming your default policy is drop or the last rule in your chain a
log/drop, then yes, the second rule would be redundant.  Stick with rule
3 and ESTABLISHED/RELATED.  Of course, no TCP based services on this
machine will work...

Phillip, I didn't post the entire file.


The default policy on the INPUT chain is DROP. I do allow incoming ssh & ftp from a couple of Linux servers that I manage. All other TCP traffic on the external interface is stopped by the "-p tcp --syn -j DROP" rule. I also have the rule "-t nat -A POSTROUTING -o $EXTERNAL_IF -j MASQUERADE" coz this machine is a server for a couple of machines connected to its local (non-internet) interface.

The rules also contain the usual stuff so the internal interfaces work i.e.
iptables -A INPUT -i lo -j ACCEPT
iptables -A INPUT -i $INTERNAL_IF_1 -j ACCEPT

From your response I assume that this setup would make the system safe from unwanted/unexpected incoming traffic that originates from well known ports. What do these attacks do to fools firewalls anyway? Are there firewalls out there that let in traffic if it appears to originate from a well known port.

jmb


-- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Reply via email to