It sounds like you either don't have a chain named INPUT, or you don't 
have support for the DROP target.  Both of those are pretty standard 
things to have.  If you are using a vendor-delivered version of iptables 
(like a stock install from Red Hat or CentOS), you might have a chain 
called RH-Firewall-1-INPUT or something like that, instead of INPUT.

     - Dave

Hüseyin Cerik wrote:
> hello neph we tested this script one he gives a error
> 
> iptables -A INPUT -p udp -m udp --dport 27015 -m length --length 28 -j DROP
> ->>> iptables: No chain/target/match by that name
> 
> can u help me ?
> 
> 
> 
> Nephyrin Zey schrieb:
>> Linux/iptables users- this firewall rule will completely stop the
>> attack (tested):
>> -A INPUT -p udp -m udp --dport 27015 -m length --length 28 -j DROP
>>
>> Repeat for any ports your servers run on besides 27015
>>
>> - Neph
>>

-- 

Dave Parker
Utica College
Integrated Information Technology Services
(315) 792-3229
Registered Linux User #408177


_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux

Reply via email to