Willie Wong <wwong <at> math.princeton.edu> writes:



> I built my tables using the commandline. A good quick intro guide is
> at http://www.gentoo.org/doc/en/home-router-howto.xml , section 5. 

Nice ref.


> My philosophy is common sense. I white list those ips that I want to
> be able to access the services. I black list those I don't. For
> services like ssh, I pray that my efforts are secure enough. 

I'm re-visiting much of  what I do with IP tables and using a whitelist  seems
like a very keen idea, particularly on firewalls with limited resources compared
to the  network bandwidth they are attached to.


thanks for sharing your approach,


James



Reply via email to