The command 'iptables -A INPUT -s <blacklisted IP> -p all -j DROP' will block all access to anything from the IP you specify in <blacklisted IP>
Cheers, -- Personal: Trevor Lauder Web: http://www.thelauders.net E-Mail: [EMAIL PROTECTED] Work: Trevor Lauder Technical Services Specialist Wireless Networks Inc. Web: http://www.wirelessnetworksinc.com E-Mail: [EMAIL PROTECTED] Jesse Kline said: > On Mon, 2003-02-03 at 13:45, Trevor Lauder wrote: >> Not neccessarily. Does 'ps -A | grep sshd' show a sshd proccess >> running when no one is logged into the system via ssh? If your router >> doesn't > > Yes. So since it's running on it's own, that would indicate that it's > not part of inetd, right? > >> allow you that kind of fine-tuning then I would just use a local rule >> on your computer. You don't need to have any kind of firewalling >> setup, as long as you have netfilter compiled into your kernel and the >> iptables package installed you can just create specific rules to block >> that IP. > > Forgive my ignorance, but how would I go about doing that?
