How To Use Etc Hosts Deny
When tcp wrappers are configured only authorized systems may utilize the services of the host machine.
How to use etc hosts deny. Otherwise access will be denied when a daemon client pair matches an entry in the etc hosts deny file. Etc hosts allow if allow will not check 2. Use etc hosts allow and etc hosts deny to define rules that selectively allow or deny clients access to server daemons on local system. Otherwise access will be granted. Hosts deny blocks those ips accessing services on your computer but you are accessing their server.
You could use iptables or edit your etc hosts like this. You can have only one rule per service in hosts allow and hosts deny file. A non existing access control file is treated as if it were an empty file. Any changes to hosts allow and hosts deny file takes immediate effect. Tcp wrappers provide transparency to the client and to the wrapped network service as both are unaware that tcp wrappers are in use.
Thus access control can be turned off by providing no access control files. Etc hosts deny when a client attempts to connect to a network service on a remote system these files are used to determine whether client access is allowed or denied. If not found then go to 2 etc hosts deny. Tcp wrappers make use out of the etc hosts allow and etc hosts deny file.