Hi Giles,

Thank you for your time!

On 2014-03-10 19:27, Giles Coochey wrote:
> On 10/03/2014 15:24, Thinker Rix wrote:
>> For this reason I am interested in turning things upside down, having
>> the host secured and the isolated VM connected to the network. Should
>> the VM be infected/infiltrated, the intruder could not get out of the
>> box of the VM.
>>
>>
> Yes, just do this under linux and have iptables installed with a 
> default policy of deny for INPUT and OUTPUT rules. Iptables will not 
> affect guests using bridged networking.
> You can add exceptions to your firewall to all ssh / management of 
> some sort from a secured IP address.

I see, so the physical interface of the host stands "beside" (i.e. on 
the same level) of the virtual bridge that virtualbox creates as a 
virtual interface for the VMs?
This would be great, I would just lock up the host with iptables "drop 
all" in all directions and be done?! Great!

Thank you very much!

Cheers
Thinker Rix


------------------------------------------------------------------------------
Learn Graph Databases - Download FREE O'Reilly Book
"Graph Databases" is the definitive new guide to graph databases and their
applications. Written by three acclaimed leaders in the field,
this first edition is now available. Download your free book today!
http://p.sf.net/sfu/13534_NeoTech
_______________________________________________
VBox-users-community mailing list
VBox-users-community@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/vbox-users-community
_______________________________________________
Unsubscribe:  
mailto:vbox-users-community-requ...@lists.sourceforge.net?subject=unsubscribe

Reply via email to