On 10/03/2014 15:24, Thinker Rix wrote:
Yes, just do this under linux and have iptables installed with a default policy of deny for INPUT and OUTPUT rules. Iptables will not affect guests using bridged networking. You can add exceptions to your firewall to all ssh / management of some sort from a secured IP address.For this reason I am interested in turning things upside down, having the host secured and the isolated VM connected to the network. Should the VM be infected/infiltrated, the intruder could not get out of the box of the VM.
-- Regards, Giles Coochey, CCNP, CCNA, CCNAS NetSecSpec Ltd +44 (0) 8444 780677 +44 (0) 7983 877438 http://www.coochey.net http://www.netsecspec.co.uk gi...@coochey.net
smime.p7s
Description: S/MIME Cryptographic Signature
------------------------------------------------------------------------------ Learn Graph Databases - Download FREE O'Reilly Book "Graph Databases" is the definitive new guide to graph databases and their applications. Written by three acclaimed leaders in the field, this first edition is now available. Download your free book today! http://p.sf.net/sfu/13534_NeoTech
_______________________________________________ VBox-users-community mailing list VBox-users-community@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/vbox-users-community _______________________________________________ Unsubscribe: mailto:vbox-users-community-requ...@lists.sourceforge.net?subject=unsubscribe