>From the iptables manual:
recent
Allows you to dynamically create a list of IP addresses and then
match against that list in a few different ways.
For example, you can create a "badguy" list out of people
attempting to connect to port 139 on your firewall and then DROP all
future packets from them without considering them.
[...]
Steve’s ipt_recent website (http://snowman.net/projects/ipt_recent/)
also has some examples of usage.
I think that's what you were looking for ;)
--
Calin
Key fingerprint = 37B8 0DA5 9B2A 8554 FB2B 4145 5DC1 15DD A3EF E857
=================================================
What's so funny?