On Saturday 18 June 2005 11:46, Netfilter wrote: > What's the best way to block these IP's? I'm not sure what your question is. I see a few main possibilities about which you might be asking. I'll address those. > -A INPUT -p tcp -s 213.0.0.0/32 -i eth1 -j DROP > > or > > -A INPUT -p tcp -s 218.0.0.0 -i eth1 -j DROP Maybe you don't understand CIDR notation, and thus don't know what these do. A /32 netmask means "this IP only" in English. 32 bits of netmask is 255.255.255.255. Both forms are the same! If you want to block all IP's starting with 213 or 218, those won't do it. You would need to use /8 or smaller. 218.0.0.0/8 is 218.0.0.0 through 218.255.255.255; 218.0.0.0/7 is 218.0.0.0 through 219.255.255.255. Rusty's Networking Concepts HOWTO might help. Generally the best strategy for firewalling is to choose what to allow and let everything else hit a DROP or REJECT policy or rule. Here the Packet Filtering HOWTO has examples which might help. Note as well that all your examples are only limiting TCP traffic, and only if coming in your eth1 interface. Furthermore there are common misunderstandings concerning the role of INPUT as opposed to FORWARD. If you're wanting to block traffic from or to NAT users, your INPUT rules will not do it. Again this is explained in the Packet Filtering HOWTO. When I have common rules I want called from both INPUT and FORWARD, I use a new chain ... # iptables -N Common # iptables -vA Common -s 218.0.0.0/7 -j DROP [ ... other rules as wanted ... ] # iptables -vA INPUT -j Common # iptables -vA FORWARD -j Common You can of course limit the type of traffic sent to the chain with matches on the calling rule. HTH, and if not you, HTH someone else. -- mail to this address is discarded unless "/dev/rob0" or "not-spam" is in Subject: header