I
believe what you are trying to do with the above rules would be accomplished by
Code:
$IPT -p tcp -I FORWARD -s Foo.bar.not.valid -j ACCEPT
$IPT -p udp -I FORWARD -s Foo.bar.not.valid -j ACCEPT
or if you would rather allow all protocols (not just udp and tcp), you could use the single line:
Code:
$IPT -I FORWARD -s Foo.bar.not.valid -j ACCEPT
In either case, the FORWARD chain will accept packets coming from
Foo.bar.not.valid regardless of destination address or port. The "/32" after the address is permissible but not mandatory, so I removed it for clarity. I also dropped the unnecessary (in this case) destination address for the same reason.
For the above rules to have any effect, you either need a DROP or REJECT policy on the FORWARD chain or you need a subsequent rule that DROPs or REJECTs packets. I still am unsure whether this accomplishes your overall goal (that would depend on other details you have not provided) but the rules will ACCEPT the packets I outlined above.