Sorry for replying to Christian's response, missed the original message. * Christian Schmidt (christian.schmidt@chemie.uni-hamburg.de) [020411 11:53]:
If your system is running a 2.2series kernel you have to use the "ipchains" command, in case aof kernel 2.4.x you should have a look at "iptables".
You'll want something like the following if you don't already have any rules with chains: ipchains -I input -y --proto tcp -s 0.0.0.0/0.0.0.0 \ -d {ip of external interface} 548 -j DENY Access through the loopback interface we still be allowed. You'll probably need to load the ipchains module (echo "/sbin/insmod ipchains" >> /etc/init.d/boot.local && insmod ipchains). You may also want to look at the SuSEfirewall script wich makes it very easy to setup a nice packet filter. -- -ckm