Displaying 5 results from an estimated 5 matches for "alphamosa".
2005 May 21
10
pb with iptables snat script
hi list,
oh it''s not really a problem.
Each time i fire shorewall, i run a custom iptables script:
(for the openvpn machines to have route back from my bridge/fw -
$SOURCEIP is the ip of my OpenVPN/Fw/bridge)
iptables -A POSTROUTING -t nat -s 10.8.0.0/16 -j SNAT --to-source
$SOURCEIP
i wish to better integrate it within shorewall, so is there any config
files that could achieve the
2007 Apr 18
2
[Bridge] bridge+filter+failover+rules&state sync+traffic shaping
hi list!
i'm trying to find a convenient way to build a redundant filtering
bridge under linux
i looked at carp project, but carp doesn't support bridge
now i thing the most appropriate way is using stp or rstp
it seems that 2.6 kernel supports stp but what about rstp?
I read some docs about stp, but they are rather outdated (2001 and
kernel 2.2)
there are several problems indeed:
*
2005 May 18
0
translation of a SNAT iptables script to the shorewall way
hi list,
any idea how i can transcribe this simple iptables script to shorewall
config? wich files should be modified ?
iptables -A POSTROUTING -t nat -s 10.8.0.0/16 -j SNAT --to-source
$SOURCEIP
2008 Jun 30
0
Simple linux samba server setup for authenticating users on MacOSX LDAP
Hi list,
is it possible to simply authenticate users against a LDAP MacOSX
server.
The samba service runs on a Linux server
The LDAP service runs on MacOSX server
I want the samba users to be authenticated through samba-ldap, MacOSX
hosts the LDAP server.
I don't want the Linux Samba server to add/modify any group/account on
LDAP. I don't want the Samba server to be primary controler,
2004 Oct 18
2
bridging and masquerading
hi list,
i got a small problem.
here is my setup:
WAN
|
|
| bridged
$FW-------DMZ
|
| masqueraded
|
LOCAL
my shorewall machine ($FW) got three interfaces: eth0 eth1 eth2
* eth0 is connected to the WAN
* eth1 is connected to my DMZ
* eth2 is connected to LOCAL network
i manage a whole C class (public adresses) in my DMZ, let''s say
X.Y.Z.0/24
* my router