iptables: No chain/target/match by that name
Hello! I started to build a little iptables/firewall script. but when i run it i get that error: iptables: No chain/target/match by that name I found helpon the web, but they just say that i need to load a module. Well, why doesn´t it say which module it needs? ### Flush Tables iptables -F FORWARD iptables -F INPUT iptables -F OUTPUT ### default policies iptables -P FORWARD DROP iptables -P OUTPUT ACCEPT iptables -P INPUT DROP ### the local loopback interface (-i lo) is open to all the various types ### of IP packets (-p all). iptables -A INPUT -i lo -p all -j ACCEPT ### Ping iptables -A INPUT -p icmp -j DROP ### Block all Incomming Packets with SYN Flag iptables -A INPUT -p tcp ! --syn -j ACCEPT ### Allow serices iptables -A INPUT -p tcp --dport 22 -j ACCEPT ### Block ANY connections from gateway iptables -A INPUTn -s 192.168.10.3 -j DROP Thank you! Spiekey
Hi, your problem is that extra "n" in your last line change iptables -A INPUTn -s 192.168.10.3 -j DROP to iptables -A INPUT -s 192.168.10.3 -j DROP and you'll find one less error Karl ----- Original Message ----- From: spiekey To: suse-security@suse.com Sent: Mittwoch, 31. Oktober 2001 09:50 Subject: [suse-security] iptables: No chain/target/match by that name Hello! I started to build a little iptables/firewall script. but when i run it i get that error: iptables: No chain/target/match by that name I found helpon the web, but they just say that i need to load a module. Well, why doesn´t it say which module it needs? ### Flush Tables iptables -F FORWARD iptables -F INPUT iptables -F OUTPUT ### default policies iptables -P FORWARD DROP iptables -P OUTPUT ACCEPT iptables -P INPUT DROP ### the local loopback interface (-i lo) is open to all the various types ### of IP packets (-p all). iptables -A INPUT -i lo -p all -j ACCEPT ### Ping iptables -A INPUT -p icmp -j DROP ### Block all Incomming Packets with SYN Flag iptables -A INPUT -p tcp ! --syn -j ACCEPT ### Allow serices iptables -A INPUT -p tcp --dport 22 -j ACCEPT ### Block ANY connections from gateway iptables -A INPUTn -s 192.168.10.3 -j DROP Thank you! Spiekey
participants (2)
-
Karl Bergkemper
-
spiekey