On Sun, Aug 05, 2001 at 09:57:33PM +0100, P Kirk wrote:
>
> patrick@enterprise:~$ cat /etc/init.d/firewall
>
> echo "1" > /proc/sys/net/ipv4/ip_forward
>
> /sbin/ipchains -P forward DENY
>
> /sbin/ipchains -A forward -i ppp0 -s 192.168.0.0/24 -j MASQ
But doesn't this just masquerade the outgoing connection, and responses?
This won't help if a PTP client tries to initiate a connection with me while
I'm behind the firewall.
Mike
--
Michael P. Soulier <msoulier@storm.ca>
"With sufficient thrust, pigs fly just fine. However, this is not necessarily a
good idea. It is hard to be sure where they are going to land, and it could be
dangerous sitting under them as they fly overhead." -- RFC 1925
Attachment:
pgpBhtNyaMKhM.pgp
Description: PGP signature