Hi All, I'm in the process of setting up a new Virtual Private Server and am using Plesk to configure to firewall (among other things). I have the firewall configured how I want it within Plesk. However, when I SSH into the box and list the firewall rules (using iptables -L -n) I get way more rules than I setup within Plesk. I'm thinking that there must be several rules that were there beforehand as default from the hosting provider. One thing I do notice, however, is that for a given chain (in this case Input chain) the very first rule is: -A INPUT -j VZ_INPUT The INPUT chain looks something like this (as given by iptables -L -n): Chain INPUT (policy DROP) target prot opt source destination VZ_INPUT all -- 0.0.0.0/0 0.0.0.0/0 ACCEPT tcp -- 190.93.240.0/20 0.0.0.0/0 tcp dpt:80 ACCEPT tcp -- 108.162.192.0/18 0.0.0.0/0 tcp dpt:80 blah, blah..... Chain VZ_INPUT (1 references) target prot opt source destination ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:4643 ... all the rest of the rules I entered in Plesk.... VZ_INPUT is a user-defined rule that Plesk puts in and that chain has all the rules I entered in the Plesk panel. My question is: if the above VZ_INPUT rule is the very first rule in the INPUT chain, does that mean for all input packets jump to the VZ_INPUT chain and process those rules, thus bypassing all the other inputs? The same sort of layout is also present for the OUTPUT & FORWARD chains. Any thoughts are appreciated. Thanks, Peter