This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

pf rule not working?

for nearly a week now ip 61.238.158.21 originating from Hong Kong has been hammering a sip attack on my pbx, I have created the following packet rule but I don't see the ip being blocked by packet rule, just shows "default drop" which is filling up my logs fast, that's why I know with the pf rule I can instruct it too not log traffic. Here is the PF rule I created:

Position 1
Source: host 61.238.158.21
service: any
Destination: any

any ideas?? 

Derek "Astaro newbie"


This thread was automatically locked due to age.
Parents
  • Hi,
    ANY doesn't include any of Astaro's interface addresses, nor the Network and Broadcast addresses.

    I am guessing it's because those addresses are on different IPTables chains so they are setup separately.

    Barry
Reply
  • Hi,
    ANY doesn't include any of Astaro's interface addresses, nor the Network and Broadcast addresses.

    I am guessing it's because those addresses are on different IPTables chains so they are setup separately.

    Barry
Children
No Data