David A. Bandel babbled on about:
> I have firewalls in a number of places (companies, organizations,
> individuals).  Each one custom rules.  Some things (almost) never change,
> and those are the basis for the scripts I provided LJ with my article.  My
> recommendation:  decide exactly what you want to do and implement those
> rules. Don't use a canned script.  If you don't know what you want,
> perhaps you shouldn't try (alone), but get someone knowledgeable to help.

exactly. I know what I want open and to whom. that I can probably implement. 
I just wanted to see what this list thought was decent starting points to 
examine how others are doing the iptables things.

>
> For those who enjoyed my basic Netfilter article, I'll have another (more
> advanced) article RSN.

what's the URL of the previous article? also, post the new URL when it goes 
online please. thanks!
-- 
Douglas J Hunley (doug at hunley.homeip.net) - Linux User #174778
Admin: Linux StepByStep - http://linux.nf

/* After several hours of tedious analysis, the following hash
 * function won.  Do not mess with it... -DaveM
 */
        2.2.16 /usr/src/linux/fs/buffer.c
_______________________________________________
Linux-users mailing list
Archives, Digests, etc at http://linux.nf/mailman/listinfo/linux-users

Reply via email to