Dropbox via iptables verhindern

Haloman

Lt. Commander
Registriert
Jan. 2005
Beiträge
1.469
Hallo,

würde gerne Dropbox über die IP sperren. Hab das ganze gerade mal per iptables probiert.

Dafür wurde folgender Befehl verwendet:

iptables -A INPUT -s ipadresse -j DROP

für die Ipadresse habe ich folgendes eingesetzt:

199.47.216.0/22
207.171.160.0/19
66.228.118.0/24
50.16.0.0/14

Leider funktioniert das syncronisieren immer noch.

Mache ich da was falsch? Oder muss der Befehl anders aussehen da der Server über zwei NICs verfügt?

Gruß
 
Ich nehme an, du hast weiter oben in den iptables Regeln eine ACCEPT Regel auf "related" Verbindungen. Du müsstest diese Rule daher ganz nach oben verfrachten (-I statt -A). Abgesehen davon würde ich vielleicht auch eher OUTPUT blockieren, damit es gar nicht erst zu einer Verbindungsaufnahme kommt.
 
versuch mal:

iptables -A INPUT -m iprange --src-range 66.228.118.0-66.228.118.255 -j DROP
 
@Ravenier
hat leider nicht funktioniert.

die daten werden immer noch in Dropbox syncronisiert.

Jetzt bin ich mir auch nicht sicher ob es vllt an den IPs liegt die ich sperre oder es am Befehl scheitert.

@bu1137
Ich habe nur den Befehl "iptables -A INPUT(bzw. OUTPUT) -s ipadresse -j DROP" benutzt. Sollte ich das ganze mal als
iptables -I INPUT -s ipadresse -j DROP testen?

Ich nehme an, du hast weiter oben in den iptables Regeln eine ACCEPT Regel auf "related" Verbindungen
Sowas habe ich nicht. Wie würde das denn aussehen?

Gruß
 
Zeig uns vielleicht einfach mal am besten, wie deine aktuellen Firewall Rules aussehen:

iptables -n -v --line-numbers -L
 
Code:
Chain INPUT (policy DROP 0 packets, 0 bytes)
num   pkts bytes target     prot opt in     out     source               destination
1    62297 9769K ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0
2     819K  176M ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           state ESTABLISHED
3     1111 62456 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED
4    33489 3493K input_int  all  --  eth0   *       0.0.0.0/0            0.0.0.0/0
5    21299 2951K input_ext  all  --  eth1   *       0.0.0.0/0            0.0.0.0/0
6        0     0 input_int  all  --  *      *       0.0.0.0/0            0.0.0.0/0
7        0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-IN-ILL-TARGET '
8        0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0
9        0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           source IP range 199.47.216.1-199.47.219.254
10       0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           source IP range 207.171.160.1-207.171.191.254
11       0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           source IP range 66.228.118.1-66.228.118.254
12       0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           source IP range 50.16.0.1-50.19.255.254

Chain FORWARD (policy DROP 0 packets, 0 bytes)
num   pkts bytes target     prot opt in     out     source               destination
1     5038  244K TCPMSS     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp flags:0x06/0x02 TCPMSS clamp to PMTU
2    71734   11M forward_int  all  --  eth0   *       0.0.0.0/0            0.0.0.0/0
3     108K  199M forward_ext  all  --  eth1   *       0.0.0.0/0            0.0.0.0/0
4        0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-FWD-ILL-ROUTING '
5        0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain OUTPUT (policy ACCEPT 118 packets, 276K bytes)
num   pkts bytes target     prot opt in     out     source               destination
1    62297 9769K ACCEPT     all  --  *      lo      0.0.0.0/0            0.0.0.0/0
2        0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           source IP range 199.47.216.1-199.47.219.254
3        0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           source IP range 50.16.0.1-50.19.255.254
4        0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           source IP range 66.228.118.1-66.228.118.254
5        0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           source IP range 207.171.160.1-207.171.191.254

Chain forward_ext (1 references)
num   pkts bytes target     prot opt in     out     source               destination
1        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 0
2      347 19432 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 3
3        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 11
4        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 12
5        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 14
6        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 18
7        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 3 code 2
8        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 5
9        0     0 ACCEPT     all  --  *      *      !192.168.0.0/16       192.168.2.0/26      state RELATED,ESTABLISHED
10       0     0 ACCEPT     all  --  *      *       192.168.2.0/26      !192.168.0.0/16      state NEW,RELATED,ESTABLISHED
11       0     0 ACCEPT     all  --  *      *      !192.168.0.0/16       192.168.2.192/26    state RELATED,ESTABLISHED
12       0     0 ACCEPT     all  --  *      *       192.168.2.192/26    !192.168.0.0/16      state NEW,RELATED,ESTABLISHED
13       0     0 ACCEPT     all  --  *      *      !192.168.0.0/16       192.168.3.0/26      state RELATED,ESTABLISHED
14       0     0 ACCEPT     all  --  *      *       192.168.3.0/26      !192.168.0.0/16      state NEW,RELATED,ESTABLISHED
15    108K  199M ACCEPT     all  --  *      *      !192.168.0.0/16       192.168.3.128/26    state RELATED,ESTABLISHED
16       0     0 ACCEPT     all  --  *      *       192.168.3.128/26    !192.168.0.0/16      state NEW,RELATED,ESTABLISHED
17       0     0 ACCEPT     all  --  *      *      !192.168.0.0/16       192.168.2.0/26      state RELATED,ESTABLISHED
18       0     0 ACCEPT     all  --  *      *       192.168.2.0/26      !192.168.0.0/16      state NEW,RELATED,ESTABLISHED
19       0     0 ACCEPT     all  --  *      *      !192.168.0.0/16       192.168.2.192/26    state RELATED,ESTABLISHED
20       0     0 ACCEPT     all  --  *      *       192.168.2.192/26    !192.168.0.0/16      state NEW,RELATED,ESTABLISHED
21       0     0 ACCEPT     all  --  *      *      !192.168.0.0/16       192.168.3.0/26      state RELATED,ESTABLISHED
22       0     0 ACCEPT     all  --  *      *       192.168.3.0/26      !192.168.0.0/16      state NEW,RELATED,ESTABLISHED
23       0     0 ACCEPT     all  --  *      *      !192.168.0.0/16       192.168.3.128/26    state RELATED,ESTABLISHED
24       0     0 ACCEPT     all  --  *      *       192.168.3.128/26    !192.168.0.0/16      state NEW,RELATED,ESTABLISHED
25       0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 PKTTYPE = multicast LOG flags 6 level 4 prefix `SFW2-FWDext-DROP-DEFLT '
26       0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           PKTTYPE = multicast
27       0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           PKTTYPE = broadcast
28       0     0 LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-FWDext-DROP-DEFLT '
29       0     0 LOG        icmp --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-FWDext-DROP-DEFLT '
30       0     0 LOG        udp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 state NEW LOG flags 6 level 4 prefix `SFW2-FWDext-DROP-DEFLT '
31       0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain forward_int (1 references)
num   pkts bytes target     prot opt in     out     source               destination
1        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 0
2        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 3
3        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 11
4        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 12
5        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 14
6        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 18
7        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 3 code 2
8        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 5
9        0     0 ACCEPT     all  --  *      *      !192.168.0.0/16       192.168.2.0/26      state RELATED,ESTABLISHED
10       0     0 ACCEPT     all  --  *      *       192.168.2.0/26      !192.168.0.0/16      state NEW,RELATED,ESTABLISHED
11       0     0 ACCEPT     all  --  *      *      !192.168.0.0/16       192.168.2.192/26    state RELATED,ESTABLISHED
12       0     0 ACCEPT     all  --  *      *       192.168.2.192/26    !192.168.0.0/16      state NEW,RELATED,ESTABLISHED
13       0     0 ACCEPT     all  --  *      *      !192.168.0.0/16       192.168.3.0/26      state RELATED,ESTABLISHED
14       0     0 ACCEPT     all  --  *      *       192.168.3.0/26      !192.168.0.0/16      state NEW,RELATED,ESTABLISHED
15       0     0 ACCEPT     all  --  *      *      !192.168.0.0/16       192.168.3.128/26    state RELATED,ESTABLISHED
16   71724   11M ACCEPT     all  --  *      *       192.168.3.128/26    !192.168.0.0/16      state NEW,RELATED,ESTABLISHED
17       0     0 ACCEPT     all  --  *      *      !192.168.0.0/16       192.168.2.0/26      state RELATED,ESTABLISHED
18       0     0 ACCEPT     all  --  *      *       192.168.2.0/26      !192.168.0.0/16      state NEW,RELATED,ESTABLISHED
19       0     0 ACCEPT     all  --  *      *      !192.168.0.0/16       192.168.2.192/26    state RELATED,ESTABLISHED
20       0     0 ACCEPT     all  --  *      *       192.168.2.192/26    !192.168.0.0/16      state NEW,RELATED,ESTABLISHED
21       0     0 ACCEPT     all  --  *      *      !192.168.0.0/16       192.168.3.0/26      state RELATED,ESTABLISHED
22       0     0 ACCEPT     all  --  *      *       192.168.3.0/26      !192.168.0.0/16      state NEW,RELATED,ESTABLISHED
23       0     0 ACCEPT     all  --  *      *      !192.168.0.0/16       192.168.3.128/26    state RELATED,ESTABLISHED
24       0     0 ACCEPT     all  --  *      *       192.168.3.128/26    !192.168.0.0/16      state NEW,RELATED,ESTABLISHED
25       0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 PKTTYPE = multicast LOG flags 6 level 4 prefix `SFW2-FWDint-DROP-DEFLT '
26       0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           PKTTYPE = multicast
27       0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           PKTTYPE = broadcast
28       0     0 LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-FWDint-DROP-DEFLT '
29       0     0 LOG        icmp --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-FWDint-DROP-DEFLT '
30       0     0 LOG        udp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 state NEW LOG flags 6 level 4 prefix `SFW2-FWDint-DROP-DEFLT '
31      10   400 reject_func  all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain input_ext (1 references)
num   pkts bytes target     prot opt in     out     source               destination
1    19053 2134K DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           PKTTYPE = broadcast
2        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           icmp type 4
3        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           icmp type 8
4        1    52 LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp dpt:22 flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-INext-ACC-TCP '
5        1    52 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:22
6        0     0 LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp dpt:444 flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-INext-ACC-TCP '
7        0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:444
8        3   180 LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp dpt:443 flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-INext-ACC-TCP '
9       15   900 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:443
10       0     0 LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp dpt:25 flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-INext-ACC-TCP '
11       0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:25
12       0     0 LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp dpt:1677 flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-INext-ACC-TCP '
13       0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:1677
14       0     0 LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp dpt:3000 flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-INext-ACC-TCP '
15       0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:3000
16       0     0 LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp dpt:5900 flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-INext-ACC-TCP '
17       0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:5900
18       0     0 LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp dpt:5901 flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-INext-ACC-TCP '
19       0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:5901
20       0     0 LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp dpt:5902 flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-INext-ACC-TCP '
21       0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:5902
22       0     0 LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp dpt:5903 flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-INext-ACC-TCP '
23       0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:5903
24       0     0 LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp dpt:5905 flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-INext-ACC-TCP '
25       0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:5905
26       0     0 LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp dpt:3389 flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-INext-ACC-TCP '
27       0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:3389
28       0     0 LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp dpt:5902 flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-INext-ACC-TCP '
29       0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:5902
30       0     0 LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp dpts:5800:5899 flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-INext-ACC-TCP '
31       0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpts:5800:5899
32       0     0 LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp dpts:5900:5999 flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-INext-ACC-TCP '
33       0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpts:5900:5999
34       0     0 LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp dpt:5801 flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-INext-ACC-TCP '
35       0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:5801
36       0     0 LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp dpt:5901 flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-INext-ACC-TCP '
37       0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:5901
38       0     0 LOG        tcp  --  *      *       192.168.3.131        0.0.0.0/0           tcp spt:5904 dpt:5904 state NEW limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-INext-ACC '
39       0     0 ACCEPT     tcp  --  *      *       192.168.3.131        0.0.0.0/0           tcp spt:5904 dpt:5904
40     557  104K LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 PKTTYPE = multicast LOG flags 6 level 4 prefix `SFW2-INext-DROP-DEFLT '
41    2182  814K DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           PKTTYPE = multicast
42       0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           PKTTYPE = broadcast
43       6   360 LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-INext-DROP-DEFLT '
44       0     0 LOG        icmp --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-INext-DROP-DEFLT '
45       1    78 LOG        udp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 state NEW LOG flags 6 level 4 prefix `SFW2-INext-DROP-DEFLT '
46      48  2078 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain input_int (2 references)
num   pkts bytes target     prot opt in     out     source               destination
1    33489 3493K ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain reject_func (1 references)
num   pkts bytes target     prot opt in     out     source               destination
1       10   400 REJECT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           reject-with tcp-reset
2        0     0 REJECT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0           reject-with icmp-port-unreachable
3        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           reject-with icmp-proto-unreachable
 
Wenn du im OUTPUT eine Rule einfügst, dann musst du natürlich nicht die source-ip sondern die destination ip blockieren ;)
 
Wäre die Regel dann sowas wie:

iptables -A OUTPUT -j DROP -d 199.47.216.0/22 ?
 
Ja. Und mittels

iptables -n -v --line-numbers -L OUTPUT

würdest du sehen, ob die Rule irgendwelche Pakete blockiert hat (pkts/bytes).
 
Darf man fragen, wieso du das vorhast?
Die Synchronisation kann man ganz einfach mit Rechtsklick unterbrechen.
 
@boarder-winterman

Natürlich darft du fragen :D. Hier ist der ein oder andere der sich Dropbox einfach installiert hat. Die Nutzung soll jetzt aber unterbunden werden. Da aber einige das nicht aufgeben wollen dachte ich mir iptables könnte vllt. klappen :).

Gruß
 
Der eine oder andere? Soll das heissen, deine Kiste oder was auch immer das für ein Linux Gerät ist, agiert als Router? Dann müssten die Rules natürlich in die Forward Table...
 
Zurück
Oben