chloe K wrote: > Hi all > > ks there iptables rules to limit attack? > > Thank you > There are examples using the recent and limit modules on the Wiki (Securing SSH page): http://wiki.centos.org/HowTos/Network/SecuringSSH#head-a296ec93e31637aa349538be07b37f67d836688a It should be easy to adapt these as required. _______________________________________________ CentOS mailing list CentOS@xxxxxxxxxx http://lists.centos.org/mailman/listinfo/centos