From mboxrd@z Thu Jan 1 00:00:00 1970 From: Paul Annesley Subject: Re: Policy Accept + Allow Multiple IP's Date: Mon, 15 Nov 2004 18:11:00 +1100 Message-ID: <99fb0588041114231136b9056e@mail.gmail.com> References: <41994F2D.70105@wildcash.com> <99fb058804111423054365bd85@mail.gmail.com> Reply-To: Paul Annesley Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <99fb058804111423054365bd85@mail.gmail.com> List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: netfilter-bounces@lists.netfilter.org Errors-To: netfilter-bounces@lists.netfilter.org Content-Type: text/plain; charset="us-ascii" To: netfilter@lists.netfilter.org ---------- Forwarded message ---------- From: Paul Annesley Date: Mon, 15 Nov 2004 18:05:17 +1100 Subject: Re: Policy Accept + Allow Multiple IP's To: Rudi Starcevic On Mon, 15 Nov 2004 16:51:57 -0800, Rudi Starcevic wrote: > Hi, > > I have an Iptables firewall with a default policy of accept. > > I want to allow only certain IP's ssh access. > > So far I have this rule which allows 1 ip: > > iptables -A INPUT -p tcp --dport 22 -s ! xxx.xxx.xxx.xxx -j DROP > > I'm not sure how to list more that 1 allowable IP. > > This is a production box I've inherited so I'm hoping to work with I already > have but may need to look at changing the default policy to drop or > something. Perhaps you should look at making the policy DROP and allowing specific traffic.. However what you're after can be done with two rules.. something like; iptables -A INPUT -p tcp --dport 22 -s x.x.x.x -j ACCEPT iptables -A INPUT -p tcp --dport 22 -j DROP > > Please advise, many thanks. > Regards Rudi > >