| Hi,   Reading up on many 
articles in the mailing list and wikki and on the web I still can't figure out 
how to secure dom0 without affecting the domU instances.   How can I only allow 
(or even disallow altogether) dom0 traffic while not affecting domU 
instances?   I tried creating a 
new chain just for dom0   -A FORWARD -m 
physdev  --physdev-in vif0.0 -j NODE   while it appears the 
traffic for dom0 goes on to this rule it appears if I setup the chain as what's 
listed below.  performing a nmap still shows all ports are 
open.   # allow icmp 
packets-A NODE -p icmp --icmp-type any -j ACCEPT
 # allow existing 
traffic through -A NODE -i vif0.0 -m 
state --state ESTABLISHED,RELATED -j ACCEPT # allow DNS traffic 
through -A NODE -p 50 -j 
ACCEPT-A NODE -p 51 -j ACCEPT
 -A NODE -m 
state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT # reject all other 
ports-A NODE -j REJECT --reject-with 
icmp-host-prohibited
   Anyone have any 
ideas how to secure dom0??   Thanks.   
-L   -- Larry Ludwig Empowering Media 1-866-792-0489 x600 Have you visited our customer service 
blog? _______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users |