?
Solved

IPTABLES and TRANSPARENT BRIDGE problem - URGENT !!!

Posted on 2004-03-30
4
Medium Priority
?
396 Views
Last Modified: 2008-03-10
Hi,
We configure a slack with a transparent bridge, but IPTABLES dont block traffic passing throught the bridge.

Are there any known problem to use iptables in a transparente bridge?  Any solution for this problem?

Please, it's urgent.


Regards,
Luiz
0
Comment
Question by:ipsystems
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 1

Expert Comment

by:emisery
ID: 10720806
i'm not sure if I understand exactly what the problem is that you are seeking help with, but by design a transparent bridge will broadcast to all connected ports any frames that it does not recognize an internal address associated with it.  Therefore, the ip table will not cause the bridge to block any traffic, rather quite the opposite.  Not sure if this is any help...
0
 

Author Comment

by:ipsystems
ID: 10722919

I already solve the problem.

Both bridge interfaces does not have an IP address and the iptables is not capable to "see" this traffic.

I installed ebtables (ebtables.sourceforge.net) and the probles was solved.


Regards,
Luiz
0
 

Author Comment

by:ipsystems
ID: 10722920

Please admin, close this question.
0
 

Accepted Solution

by:
WesLennon earned 0 total points
ID: 11508125
Question will be placed in PAQ.

Wes Lennon
Director of Community Services
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
The well known Cerber ransomware continues to spread this summer through spear phishing email campaigns targeting enterprises. Learn how it easily bypasses traditional defenses - and what you can do to protect your data.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question