Skip to Content
Linux Firewalls, Third Edition
book

Linux Firewalls, Third Edition

by Steve Suehring, Robert Ziegler
September 2005
Intermediate to advanced
552 pages
13h 30m
English
Sams
Content preview from Linux Firewalls, Third Edition

Logging Dropped Incoming Packets

Any packet matching a rule can be logged by using the -j LOG target. Logging a packet has no effect on the packet's disposition, however. The packet must match an accept or drop rule. Some of the rules presented previously had logging enabled, before matching the packet a second time to drop it. Some of the IP address spoofing rules are examples.

Rules can be defined for the explicit purpose of logging certain kinds of packets. Most typically, packets of interest are suspicious packets indicating some sort of probe or scan. Because all packets are denied by default, if logging is desired for certain packet types, explicit rules must be defined before the packet falls off the end of the chain and the default policy ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Linux Firewalls

Linux Firewalls

Michael Rash

Publisher Resources

ISBN: 0672327716Purchase book