[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: 2 ipchains questions



Do something like:

# for initialisation - deny everything that will not be allowed later...

ipchains -P input DENY
ipchains -P forward DENY
ipchains -P output DENY
ipchains -F

# allow local things

ipchains -A input -j ACCEPT -i lo
ipchains -A output -j ACCEPT -i lo

# allow SSH connections from eth1 (and reply packets)

ipchains -A input -j ACCEPT -p tcp -i eth1 -s 0.0.0.0/0 1024: -d <IP of eth1> 22
ipchains -A output -j ACCEPT -p tcp -i eth1 -d 0.0.0.0/0 1024: -s <IP of eth1> 22

AFAIR you don't have to worry about response packets from masqueraded
connections. They will bypass the input and output chains.

For the timeout of masquerading see the -S option of ipchains. I think it is
not the best idea to make connections never time out (quite sure it is not
even possible) because you will eventually run out of port numbers. Just set
it to a reasonable high value - like one hour - don't know what the max is.

	Tobias

On Sun, May 27, 2001 at 03:23:58PM -0500, Andrew Perrin wrote:
> I now have a DSL connection, and as such would like to use ipchains to do
> the following:
> 
> 1.) Deny all incoming packets coming in on eth1 (the card connected to the
> DSL gateway) except those destined for port 22 (ssh) or ICMP packets, or
> of course packets responding to outgoing packets; and
> 
> 2.) Make masqueraded connections from other machines on my private network
> never time out.



Reply to: