Adam Williams <[EMAIL PROTECTED]> writes:


[...]

> 
> You don't need to do this if you use: 
> # ipchains -A output -i  $EXTERNAL_INTERFACE -s $IPADDR -j ACCEPT,
>  which would allow any packets out of your machine. To allow the 
> packets coming back from the remote machine port 25, you could do this:
> 

> ipchains -A input -i $EXTERNAL_INTERFACE -p tcp ! -y \
>       -s $ANYWHERE 25 --destination-port 25 -j ACCEPT

I was unclear as to how "!" worked but your post helped clarify it for
me. I see now that these rules work in pairs.  One allows the
outbound packets ... the other allows the replies to it.


[...]

> > 
> > So thinking I need to restart something I run:
> > 
> > /etc/rc.d/init.d/inet restart
> > /etc/rc.d/init.d/network reload
> >
> 
> Do you also restart the firewall?
> 

No, in my case that would Flush any rules that had been added at the
command line, and only start the rules in the firewall script I think.

>From firewall script:
    # Remove all existing rules belonging to this filter
    ipchains -F

    # Set the default policy of the filter to deny.
    ipchains -P input  DENY
    ipchains -P output REJECT
    ipchains -P forward DENY


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to