iptables -t filter -I INPUT -s 192.168.1.2/32 -j REJECT iptables -t filter -I FORWARD -s 192.168.1.2/32 -j REJECT should do what you want. the first limits traffic to the router, the second prevents the router from forwarding any traffic originating from the server. you may also consider limiting traffic to the server. -- Please do not send copies of list mail to me; I read the list! .''`. martin f. krafft <madduck@debian.org> : :' : proud Debian developer, admin, user, and author `. `'` `- Debian - when you have better things to do than fixing a system Invalid/expired PGP subkeys? Use subkeys.pgp.net as keyserver!
Attachment:
signature.asc
Description: Digital signature