Georgi Alexandrov wrote: > [...] > About the ICMP - it's good (my opinion) to let at least those three icmp > types so we have proper network functions. > reference: http://www.faqs.org/docs/iptables/icmptypes.html > > About the logging - If you want for example to log all the auth requests > (tcp/113) made to your machine, we will put the following rule above the > -j REJECT one: > > iptables -A INPUT -p tcp --syn --dport 113 -j LOG --log-prefix "Auth > Request" > iptables -A INPUT -p tcp --syn --dport 113 -j REJECT --reject-with > tcp-reset > Well, that's exactly what I needed. > > This way we will have all auth requests logged and then rejected. > You can examine the example rc.firewall script at > iptables-tutorial.frozentux.net for some more logging examples. > > regards, > Georgi Alexandrov > > Thanks for the references. I'm going to them more carefully. -- Volkm@r