From owner-freebsd-stable Thu Jan 13 4: 0:50 2000 Delivered-To: freebsd-stable@freebsd.org Received: from smtppzh.pzh.nl (webshield.pzh.nl [194.178.168.50]) by hub.freebsd.org (Postfix) with SMTP id 5D35A155E2 for ; Thu, 13 Jan 2000 04:00:46 -0800 (PST) (envelope-from MULHUIJZEN@PZH.NL) Received: FROM smtp.pzh.nl BY smtppzh.pzh.nl ; Thu Jan 13 12:59:43 2000 0000 Received: from PZH40-1-Message_Server by smtp.pzh.nl with Novell_GroupWise; Thu, 13 Jan 2000 12:59:46 +0100 Message-Id: X-Mailer: Novell GroupWise 5.5.2 Date: Thu, 13 Jan 2000 12:59:23 +0100 From: "ROGIER MULHUIJZEN" To: , Subject: Re: portmap Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Disposition: inline Sender: owner-freebsd-stable@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG Sure, have a look at /etc/rc.firewall and/or 'man 8 ipfw' You just configure IPFW to drop incoming packets for the portmap port. And if you want certain hosts to be able to use portmap, you add rules with a higher priority that allow those same packets if they come from a certain host. DocWilco >>> Gawel 01/13 12:15 PM >>> Hello, I 've got it several times: portmap[16116]: connect from 195.31.252.2 to dump(): request from unauthorized host. It is harmless but annoying. Is there any way to prevent portman listening requests on a NIC, ip, etc. besides using hosts.allow? Thanks, Gawel To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message