If the FORWARD chain is not blocking these faulty packets it might mean that the packets are being generated on the firewall itself. Try to block them on the OUTPUT chain as well and see what happens. The next step would be to figure out why you get them. What is the src and dst of the packets? Anything meaningful? Ramin On Tue, Jul 15, 2003 at 12:16:44PM -0500, Geffrey Velasquez wrote: > Hello Friends, > > I have in my IDS logs packets comming from outside to DMZ servers with > source port 0 and destination port 0. > > The IDS is located in the DMZ network, and I have an iptables > firewall, kernel-2.4.18-26.1.99_kb2c.1foo over RH 8 (that is the > kernel with superfreeswan patches). > > I tried with this couple of rules on top of FORWARD chain: > > $IPT -A FORWARD -p tcp --sport 0 -j LOG --log-prefix "Zero: " > $IPT -A FORWARD -p tcp --sport 0 -j DROP > > also: > > $IPT -A FORWARD -p tcp --sport 0 --dport 0 -j LOG --log-prefix "Cero: " > $IPT -A FORWARD -p tcp --sport 0 --dport 0 -j DROP > > After that I continue viewing the bad packets on IDS, how could I > filter this kind of packets? > > > -- > Best regards, > Geffrey mailto:g_netfilter@xxxxxxxxxxx >