> Thanks Robert:
> After I posted the message I kept working at it and came up with
> $IPCHAINS -A forward -p tcp -s that-pesky-host -d 0/0 www -j DENY
> where $IPCHAINS is defined as /sbin/ipchains. Essetially I came up with
> what you suggested and it works
> very well. Thanks for the help.
> > try this
> > ipchains -I forward 1 -p tcp -s that-pesky-host -d 0/0 80 -j REJECT
> > I am running Slackware Linux 4.0 and have a masquerading firewall
> > running and working. I used cwrulug.Ian Hall-Beyer's script to get
> > everything running and it seems to be just fine. I need a specific
> > rule
> > to block http access for one specific internal IP address. I want to
> > leave other web services intact for that and all other internal IP's..
> > Thanks.
> > Dan Malcolm
I have a similar ipchains rule (also a pesky local host, a WIN2000 beta)
but I put it in the input chain instead of the forward chain. Why let it
in at all if you know up front that it will be denied/rejected? Also,
in my case I found that it was name server requests causing a problem so
I ended up with:
ipchains -I input -p udp -s the-pesky-host -d 0/0 53 -J REJECT
Robert Paulsen http://paulsen.home.texas.net
If my return address contains "ZAP." please remove it. Sorry for the
inconvenience but the unsolicited email is getting out of control.