Some say that DROP is the ideal manner to deal with non authorized requests, but using DROP let the atacker know the ports which are filtered. Using REJECT simply add one step to all proccess, sending the reject signal back to the oringin. What your perspective about it? _______________________________________________ LARTC mailing list / LARTC@xxxxxxxxxxxxxxx http://mailman.ds9a.nl/mailman/listinfo/lartc HOWTO: http://lartc.org/