This should work for you.
Quote:
setup default policies of DROP for the input chain and REJECT for the other 2 default chains.
|
iptables -F
iptables -X
iptables -N LOG_DROP
#Default policies..
iptables -P INPUT DROP
iptables -P FORWARD DROP
iptables -P OUTPUT ACCEPT
Quote:
deny any packets from/to the following networks and log them
|
#Log rules...
iptables -A INPUT -i eth0 -s 10.0.0.0/8 -j LOG_DROP
iptables -A INPUT -i eth0 -s 224.0.0.0/4 -j LOG_DROP
iptables -A INPUT -i eth0 -s 240.0.0.0/5 -j LOG_DROP
iptables -A INPUT -i eth0 -s 172.16.0.0/12 -j LOG_DROP
#Drop them...
iptables -A INPUT -i eth0 -s 10.0.0.0/8 -j DROP
iptables -A INPUT -i eth0 -s 224.0.0.0/4 -j DROP
iptables -A INPUT -i eth0 -s 240.0.0.0/5 -j DROP
iptables -A INPUT -i eth0 -s 172.16.0.0/12 -j DROP
Quote:
ii) allow any input/output traffic over the loopback interface ie lo
|
# Allow loopback connections.
iptables -A INPUT -i lo -j ACCEPT
# Rules for logging packets.
iptables -A LOG_DROP -j LOG --log-prefix "[IPTABLES DROP] : " --log-tcp-options --log-ip-options --log-level 3
Edit your syslog.conf file by adding these two lines...
# Log rc.firewall packets.
kern.3 /var/log/firewall
Restart syslogd and your done.