> > # cat /etc/ipchains.input
> >  $IPCH -I input -j DENY -p all -s 0/0 -d 255.255.255.255 -i
> $EXTERN_IF
> >
> > Exactly what does the ipchain statement say?  Exactly what
> does it deny?
> > Obviously I'm not at all familiar with ipchaining...  and I
> want to understand
> > it fully before I implement it...
>
> $IPCH                 -- /etc/ipfilter.conf:
> IPCH="/sbin/ipchains --no-warnings"
> -d 255.255.255.255    -- destination address
> -i $EXTERN_IF         -- interface via which a packet is received
> -I input              -- Insert one or more rules in the
> selected chain as the given
> rule number
> -j DENY                       -- what to do if the packet
> matches this rule
> -p all                        -- protocol  of the rule or of
> the packet to check
> -s 0/0                        -- Source specification
>
> I struggled with this for sometime last December, after being dragged
> into attbi.com.  Since it is possible that that source ip can
> change and
> that I have never found any reason to _log_ packets broadcast to the
> entire universe (e.g., -d 255.255.255.255); therefore, I conclude that
> such packets deserve anonymity in that great bit bucket somewhere near
> /dev/null . . .
>

How is this implemented in DCD 102?  In the network.conf file?  I understand
that I can type the ipchain command at the command prompt.  However that is
good only until it is rebooted and I'd like to make that a permanent solution.

~Doug



_______________________________________________
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user

Reply via email to