RE: please advise on this rule

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Source field doesn't matter since traffic destined for the internal
(private) network will only pass through that chain if you define DNAT
rules for them.

The port 80 rule seems ok, but trusting something like that where a user
can change their IP's or use different port numbers, it is pretty light
security for anyone who knows what they are doing.

-----Original Message-----
From: Payal Rathod [mailto:payal-iptables@xxxxxxxxxxxx] 
Sent: Wednesday, August 13, 2003 11:25 AM
To: netfilter@xxxxxxxxxxxxxxxxxxx
Subject: please advise on this rule

Hi,
Does this FORWARD chain look ok in a simple NAT network where the Linux
box is connected to the net.

Chain FORWARD (policy DROP)
target     prot opt source               destination
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0          state
RELATED,ESTABLISHED
REJECT     tcp  --  192.168.10.1         0.0.0.0/0          tcp dpt:80
reject-with icmp-port-unreachable


Is source 0/0 OK? Should be be 192.168.10.0/24 ?
Will the third rule block outgoing connection from 192.168.10.1 to any
server at port 80?

Thanks a lot and eagerly waiting for the reply.
With warm regards,
-Payal

-- 
"Visit GNU/Linux Success Stories"
http://payal.staticky.com
Guest-Book Section Updated.




[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux