On Fri, Mar 17, 2000 at 03:38:23PM +0100, Mikael Schmidt wrote:
> At 03:47 PM 3/16/00, you wrote:
> >Assuming that eth0 is your internal interface, and eth1 is your public 
> >interface, then to deny your internal packets from leaving your site, 
> >place the following near the top of your ruleset, after you flush your 
> >rules, set your default policies and do your spoofing checks:
> >
> >ipchains -A output -i eth1 -S 192.168.0.0/16 -D 0/0 -j DENY -l
> 
> seems that this wouldn't do the trick for me... it is still leaking out and 
> causing a conflict for my isp. anyother good ideas?

First of all this has to be at the top of your output ruleset and it should
deny every wrong package:



... all your normal ipchains rules
ipchains -I output -i eth1 -S ! 1.2.3.4 -D 0/0 -j DENY -o

This will deny all packets which are not coming from your official IP
Address 1.2.3.4


Greetings
Bernd
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to