Andriusman

1# y 3# http://gr8idea.info/os/tutorials/security/iptables4.html

You will notice it says "Chain INPUT (Policy DROP)," "Chain FORWARD (Policy DROP)" and "Chain OUTPUT (Policy DROP)."

This setup will function the same as the previous one. However, as more rules are added, and it gets more complicated, anything overlooked will be dropped, making the computer more secure.

A ver si leemos mejor...