From owner-freebsd-questions Sat Aug 8 09:34:37 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id JAA29482 for freebsd-questions-outgoing; Sat, 8 Aug 1998 09:34:37 -0700 (PDT) (envelope-from owner-freebsd-questions@FreeBSD.ORG) Received: from vmuniz.ml.org (dyn2-206cable.hg.singa.pore.net [202.169.244.206] (may be forged)) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id JAA29474 for ; Sat, 8 Aug 1998 09:34:33 -0700 (PDT) (envelope-from freebsd@vmuniz.ml.org) Received: from dyn2-206cable.hg.singa.pore.net (freebsd@dyn2-206cable.hg.singa.pore.net [202.169.244.206] (may be forged)) by vmuniz.ml.org (8.8.8/8.8.8) with SMTP id AAA00455 for ; Sun, 9 Aug 1998 00:34:28 +0800 (SGT) (envelope-from freebsd@vmuniz.ml.org) Date: Sun, 9 Aug 1998 00:34:24 +0800 (SGT) From: kevin To: freebsd-questions@FreeBSD.ORG Subject: block port scan Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG Hi guys, I tried to block port scan attacks from outside network by using ipfw but seem doesnt work, even when i applied this rule ( ipfw add deny all from any to any). Cant think of other better method to block port scan attacks except ipfw. The portscan client i used to try on my box is 'nmap' (http://www.dhp.com/~fyodor/nmap/). Any suggestion will be appreciated. Thanks kevin To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message