mi sono anche fatto un nmap<br><br>(The 1651 ports scanned but not shown below are in state: closed)<br>PORT STATE SERVICE<br>21/tcp open ftp<br>22/tcp open ssh<br>53/tcp open domain<br>80/tcp open http
<br>113/tcp filtered auth<br>135/tcp filtered msrpc<br>139/tcp filtered netbios-ssn<br>445/tcp filtered microsoft-ds<br>1025/tcp filtered NFS-or-IIS<br>1457/tcp open valisys-lm<br>5000/tcp filtered UPnP<br>
10000/tcp open snet-sensor-mgmt<br><br><br>quella 53 e quella 1457 sono necessarie?<br><br>ciao gg<br><br><div><span class="gmail_quote">2006/6/20, gigiv <<a href="mailto:gigiv2@gmail.com">gigiv2@gmail.com</a>>:
</span><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;"><div>ciao<br><br>sto cercando di mettermi assieme uno script per settare iol firewall
<br><br>con iptables -L ricevo<br>------------------------------------------------------------------------------------------<br><br>Chain INPUT (policy DROP)
<br>target prot opt source destination <br>ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED <br>ACCEPT all -- anywhere anywhere
<br>ACCEPT all -- anywhere anywhere <br>DROP all -- <a href="http://192.168.0.0/24" target="_blank" onclick="return top.js.OpenExtLink(window,event,this)">192.168.0.0/24</a> anywhere
<br>DROP all -- <a href="http://172.16.0.0/12" target="_blank" onclick="return top.js.OpenExtLink(window,event,this)">
172.16.0.0/12</a> anywhere <br>DROP all -- <a href="http://10.0.0.0/8" target="_blank" onclick="return top.js.OpenExtLink(window,event,this)">10.0.0.0/8</a> anywhere <br>DROP all --
<a href="http://127.0.0.0/8" target="_blank" onclick="return top.js.OpenExtLink(window,event,this)">127.0.0.0/8</a> anywhere
<br>ACCEPT icmp -- anywhere anywhere icmp echo-request limit: avg 1/sec burst 5 <br>DROP icmp -- anywhere anywhere icmp echo-request <br>ACCEPT tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,ACK/RST limit: avg 1/sec burst 5
<br>ACCEPT tcp -- anywhere anywhere tcp flags:SYN,RST,ACK/SYN limit: avg 1/sec burst 5 <br>ACCEPT tcp -- anywhere anywhere tcp dpt:ssh flags:SYN,RST,ACK/SYN <br>ACCEPT tcp -- anywhere anywhere tcp dpt:10000 flags:SYN,RST,ACK/SYN
<br>ACCEPT tcp -- anywhere anywhere tcp dpt:ftp flags:SYN,RST,ACK/SYN <br>ACCEPT tcp -- anywhere anywhere tcp dpt:ftp-data flags:SYN,RST,ACK/SYN <br>ACCEPT tcp -- anywhere anywhere tcp dpt:4661
<br>ACCEPT tcp -- anywhere anywhere tcp dpt:4662 <br>ACCEPT udp -- anywhere anywhere udp dpt:4665 <br><br>Chain FORWARD (policy DROP)<br>target prot opt source destination
<br>ACCEPT all -- anywhere anywhere <br>ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED <br>DROP all -- anywhere anywhere
<br>ACCEPT tcp -- anywhere ciccio tcp dpt:4662 <br>LOG all -- anywhere anywhere LOG level alert prefix `FORWARD: ' <br><br>Chain OUTPUT (policy ACCEPT)<br><br>
-------------------------------------------------------------------<br><br>secondo me la 2 e 3 della catena INPUT<br>e la 1 della FORWARD non vanno bene (nel senso che passa di tutto)<br><br><br>ho ragione?<br><br>qualcuno gentilmente mi da' conferma
<br><br><br>ciao grazie<br><br>gg<br>
</div></blockquote></div><br>