We're running an IKEv2 VPN on a Ubuntu server. One of our users has run a NetScan while using our VPN, which has upset the server provider.
This is what the server provider has recommended:
We would recommend that you set up a local firewall and block outgoing traffic to the following prefixes
https://www.rfc-editor.org/rfc/rfc1918
> 10.0.0.0/8
> 172.16.0.0/12
> 192.168.0.0/16
Please block this range of RFC1918 on your server. We would like to avoid further network abuse from your end.
Is this as simple as
iptables -A FORWARD -d 10.0.0.0/8 -j REJECT
iptables -A FORWARD -d 172.16.0.0/12 -j REJECT
iptables -A FORWARD -d 192.168.0.0/16 -j REJECT
Or am I simplifying this?