Dear Faheem, As longh as I understand the rule: iptables -A RH-Lokkit-0-50-INPUT -p tcp -m tcp --syn -j REJECT it will reject ALL except INVALID, even 'Established' and 'Related' connections, which you should allways allow. To avoid this I'd put just before it something like iptables -A RH-Lokkit-0-50-INPUT -p tcp -m state --state RELATED,ESTABLISHED -j ACCEPT and maybe the same rule but for UDP packets. bye, legar, from Argentina > > On Fri, 2003-09-12 at 00:11, Faheem Mitha wrote: > > Dear People, > > [....] > > in /etc/rc*, where the chain is defined (/in /etc/default/lokkit) by > > > > #!/bin/sh > > PATH=/sbin:$PATH > > iptables -N RH-Lokkit-0-50-INPUT > > iptables -F RH-Lokkit-0-50-INPUT > > iptables -A RH-Lokkit-0-50-INPUT -i lo -j ACCEPT > > iptables -A RH-Lokkit-0-50-INPUT -p udp -m udp -s 207.69.188.185 > > --sport 53 -d 0/0 -j ACCEPT > > iptables -A RH-Lokkit-0-50-INPUT -p udp -m udp -s 207.69.188.186 > > --sport 53 -d 0/0 -j ACCEPT > > iptables -A RH-Lokkit-0-50-INPUT -p udp -m udp -s 207.69.188.187 > > --sport 53 -d 0/0 -j ACCEPT > > iptables -A RH-Lokkit-0-50-INPUT -p tcp -m tcp --syn -j REJECT > > iptables -A RH-Lokkit-0-50-INPUT -p udp -m udp -j REJECT > > [.....] > > > > Thanks in advance for any reply. > > Faheem. > --