bugzilla-daemon at bugzilla.netfilter.org
2011-Mar-16 23:04 UTC
[Bug 667] Rule compression opportunity
http://bugzilla.netfilter.org/show_bug.cgi?id=667 Jozsef Kadlecsik <kadlec at netfilter.org> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |kadlec at netfilter.org --- Comment #2 from Jozsef Kadlecsik <kadlec at netfilter.org> 2011-03-17 00:04:01 --- As Jan wrote, you can collect all entries in a set say "banned" and then you can use the rules iptables -A INPUT -m set --match-set banned src -j DROP iptables -A OUTPUT -m set --match-set banned dst -j DROP And similarly, in the FORWARD chain. So with ipset the issue can be solved nicely. -- Configure bugmail: http://bugzilla.netfilter.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug. You are watching all bug changes.