The command 'iptables -A INPUT -s <blacklisted IP> -p all -j DROP' will
block all access to anything from the IP you specify in <blacklisted IP>

Cheers,

-- 
Personal:

Trevor Lauder
Web: http://www.thelauders.net
E-Mail: [EMAIL PROTECTED]

Work:

Trevor Lauder
Technical Services Specialist
Wireless Networks Inc.
Web: http://www.wirelessnetworksinc.com
E-Mail: [EMAIL PROTECTED]

Jesse Kline said:
> On Mon, 2003-02-03 at 13:45, Trevor Lauder wrote:
>> Not neccessarily.  Does 'ps -A | grep sshd' show a sshd proccess
>> running when no one is logged into the system via ssh?  If your router
>> doesn't
>
> Yes. So since it's running on it's own, that would indicate that it's
> not part of inetd, right?
>
>> allow you that kind of fine-tuning then I would just use a local rule
>> on your computer.  You don't need to have any kind of firewalling
>> setup, as long as you have netfilter compiled into your kernel and the
>> iptables package installed you can just create specific rules to block
>> that IP.
>
> Forgive my ignorance, but how would I go about doing that?


Reply via email to