Blaster Worm and Firewall Rules

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



W32.Blaster.Worm is going around, and on my mixed network I have 2
Windows machines. Using IPTABLES, I drop (by default) all incoming
packets from the internet including those for ports 69 UDP, 135-139 TCP,
444, 445 and 593 TCP. My FORWARD chain explicitly allows packets in on a
per-service basis.

I'm thinking maybe I better block outbound traffic on these ports too.
Does doing this make any sense?

Is there a way I can just monitor traffic on these ports for a while to
get a sense of what is happening on my network?

Thanks 

Bob Cochran

Attachment: signature.asc
Description: This is a digitally signed message part


[Index of Archives]     [Fedora Users]     [Centos Users]     [Kernel Development]     [Red Hat Install]     [Red Hat Watch]     [Red Hat Development]     [Red Hat Phoebe Beta]     [Yosemite Forum]     [Fedora Discussion]     [Gimp]     [Stuff]     [Yosemite News]

  Powered by Linux