It shouldn't matter. You can add rules that jump to a chain, as long as the chain exists, even if empty. Then later you can add rules to that chain. This should also work as well. We tarpit all data which should never come through our firewalls. We also disabled tracking for the same. We don't want the firewall wasting resources on this garbage. Another trick that we do is we also dedicate a high/low IP for catching things like SQL, HTTP, VNC, RDC, etc. This was things walking the network will sometimes get hung, if they are not threaded. YMMV (some of this is off the top of my head or pulled form a iptables-save -- order is preserved, please consult man for exact syntax) iptables -t raw -A PREROUTING -i eth0 -p tcp -m multiport \ --dports 135,139,445 -j NOTRACK iptables -N filter_tarpit iptables -A INPUT -i eth0 -j filter_tarpit iptables -A FORWARD -i eth0 -j filter_tarpit iptables -A filter_tarpit -p tcp -m multiport \ --dports 135,139,445 \ -j LOG --log-prefix "TARPIT: " --log-level 6 iptables -A filter_tarpit -p tcp -m multiport \ --dports 135,139,445 -j TARPIT Hope this helps, Gary Wayne Smith > -----Original Message----- > From: netfilter-bounces@xxxxxxxxxxxxxxxxxxx [mailto:netfilter- > bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of Eric > Sent: Friday, December 16, 2005 10:20 PM > To: netfilter mailing list > Subject: tarpit before or after adding chain? > > I'm a little confused about when to add the TARPIT trap. >