\_ [root@arrakis dsaxena]# ipchains -L
\_ Chain input (policy ACCEPT):
\_ target prot opt source destination ports
\_ DENY tcp ------ anywhere anywhere any ->
\_ 0:1024
\_ ACCEPT tcp ------ anywhere dyn-dsl1-148-phx.bazillion.com
\_ any -> smtp
\_ ACCEPT tcp ------ anywhere dyn-dsl1-148-phx.bazillion.com
\_ any -> nameserver
\_ ACCEPT tcp ------ anywhere dyn-dsl1-148-phx.bazillion.com
\_ any -> www
\_ Chain forward (policy ACCEPT):
\_ target prot opt source destination ports
\_ MASQ all ------ anywhere 192.168.0.0/24 n/a
\_ MASQ all ------ 192.168.0.0/24 anywhere n/a
\_ Chain output (policy ACCEPT):
Is it just me, or should that DENY rule come *after* you tell it what
you want to accept? Either that or set global system INPUT policy to
DENY. If you feed ipchains -nvL, you'll get a long listing including
some amusing things like packet counts matched by the rule, IIRC.
David