Hi Giles, Thank you for your time!
On 2014-03-10 19:27, Giles Coochey wrote: > On 10/03/2014 15:24, Thinker Rix wrote: >> For this reason I am interested in turning things upside down, having >> the host secured and the isolated VM connected to the network. Should >> the VM be infected/infiltrated, the intruder could not get out of the >> box of the VM. >> >> > Yes, just do this under linux and have iptables installed with a > default policy of deny for INPUT and OUTPUT rules. Iptables will not > affect guests using bridged networking. > You can add exceptions to your firewall to all ssh / management of > some sort from a secured IP address. I see, so the physical interface of the host stands "beside" (i.e. on the same level) of the virtual bridge that virtualbox creates as a virtual interface for the VMs? This would be great, I would just lock up the host with iptables "drop all" in all directions and be done?! Great! Thank you very much! Cheers Thinker Rix ------------------------------------------------------------------------------ Learn Graph Databases - Download FREE O'Reilly Book "Graph Databases" is the definitive new guide to graph databases and their applications. Written by three acclaimed leaders in the field, this first edition is now available. Download your free book today! http://p.sf.net/sfu/13534_NeoTech _______________________________________________ VBox-users-community mailing list VBox-users-community@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/vbox-users-community _______________________________________________ Unsubscribe: mailto:vbox-users-community-requ...@lists.sourceforge.net?subject=unsubscribe