Thanks for the port scanner help.... Now I would like to know about the IP Spoofing rule, how does it works? - iptables -A INPUT -s 192.168.1.0/24 -i ! eth0 -j DROP - iptables -A INPUT ! -s 192.168.1.0/24 -i eth0 -j DROP I don´t know how can it block ip spoofing attack... Takashi