David A. Bandel babbled on about: > I have firewalls in a number of places (companies, organizations, > individuals). Each one custom rules. Some things (almost) never change, > and those are the basis for the scripts I provided LJ with my article. My > recommendation: decide exactly what you want to do and implement those > rules. Don't use a canned script. If you don't know what you want, > perhaps you shouldn't try (alone), but get someone knowledgeable to help.
exactly. I know what I want open and to whom. that I can probably implement. I just wanted to see what this list thought was decent starting points to examine how others are doing the iptables things. > > For those who enjoyed my basic Netfilter article, I'll have another (more > advanced) article RSN. what's the URL of the previous article? also, post the new URL when it goes online please. thanks! -- Douglas J Hunley (doug at hunley.homeip.net) - Linux User #174778 Admin: Linux StepByStep - http://linux.nf /* After several hours of tedious analysis, the following hash * function won. Do not mess with it... -DaveM */ 2.2.16 /usr/src/linux/fs/buffer.c _______________________________________________ Linux-users mailing list Archives, Digests, etc at http://linux.nf/mailman/listinfo/linux-users