Displaying 20 results from an estimated 88 matches for "jaws".
Did you mean:
aws
2008 Jul 14
2
question about a small "for" loop
R 2.5.1 on WinXP
I'm trying to create new variables in a dataframe called jaw, as powers
of jaw$age up to the sixth power, and name them
jaw$age.(--the digit corresponding to the power--)
Obviously none of these work (silly for me to try, I suppose):
for (i in 2:6) {
jaw$age.'i' <- jaw$age^i
}
for (i in 2:6) {
jaw$age.i <- jaw$age^i
}
for (i in 2:6) {
2011 Jul 22
32
Shorewall 4.4.22 Beta 3
Beta 3 is now available for testing.
Corrections in this release:
1) Corrections included in Shorewall 4.4.21.1.
2) Several problems reported by Steven Springl.
The rest is largely cleanup of the new rule infrastructure.
-Tom
--
Tom Eastep \ When I die, I want to go like my Grandfather who
Shoreline, \ died peacefully in his sleep. Not screaming like
Washington, USA \
2011 Jul 22
32
Shorewall 4.4.22 Beta 3
Beta 3 is now available for testing.
Corrections in this release:
1) Corrections included in Shorewall 4.4.21.1.
2) Several problems reported by Steven Springl.
The rest is largely cleanup of the new rule infrastructure.
-Tom
--
Tom Eastep \ When I die, I want to go like my Grandfather who
Shoreline, \ died peacefully in his sleep. Not screaming like
Washington, USA \
2012 Feb 11
6
"ERROR: Invalid action" for FTP
OS: Debian Lenny (kernel 2.6.26-2-686
Shorewall: 4.0.15 (installed from Debian repository)
I have an FTP server behind Debian system I am using for a firewall and I am wanting to use Shorewall on it (the Debian firewall). Following the instructions for configuring FTP (at <http://www.shorewall.net/FTP.html>), I have the following rule in my /etc/shorewall/rules file:
FTP(DNAT) net
2012 Jun 06
5
Error when upgrade from shorewall-4.4.13-3 to shorewall-4.5.2.3-1
Dear All,
I try to upgrade, my old shorewall from 4.4.13-3 to 4.5.2.3-1 on CentOS,
after upgrade i can''t start shorewall with this message:
"/Shorewall: Address Ranges require the Multiple Match capability in
your kernel and iptables/"
I try to search on the net about this, but no still no light. Somebody
can help me?
Great appreciate for any help.
Regards,
2012 Jul 05
11
testing shorewall6 on a virtual machine
I want to test shorewall6 in a scenario with several virtual machines. Each virtual machine has the interface eth0.
With IPv4, I would assign an IP-alias to eth0:1 and so would have eth0 and eth0:1 as interfaces for shorewall6.
How is this done with IPv6?
Viele Grüße
Andreas Rittershofer
--
------------------------------------------------------------------------------
Live Security
2012 Jul 31
11
A lot of kernel martian source messages in /var/log/messages
Hi all:
I see a lot of the errors below in /var/log/messages on my firewall:
Aug 1 00:47:44 munin kernel: [109008.257109] martian source 192.168.1.5 from 127.0.0.1, on dev eth1
Aug 1 00:48:44 munin kernel: [109068.257384] martian source 192.168.1.5 from 127.0.0.1, on dev eth1
Aug 1 00:49:44 munin kernel: [109128.257509] martian source 192.168.1.5 from 127.0.0.1, on dev eth1
Aug 1 00:50:44
2012 Feb 24
7
how to compare shorewall config versus live iptables rules?
Greetings,
I''m new to Shorewall but not to working with Iptables. Shorewall is the
simplest firewall front end I have found thus far. I''m currently trying
to build a Cfengine policy to maintain Shorewall configurations. My
main problem at them moment is confirming that the running iptables
rules match what Shorewall originally built.
If I understand Shorewall correctly the
2012 May 18
11
Shorewall 4.5.4 Beta 3
4.5.4 Beta 3 is now available for testing. I apologize for the
back-to-back Betas but I guess it''s better to find these problems during
the Beta period rather than later.
Problems corrected:
1) This release includes all defect repairs from Shorewall 4.5.3.1.
2) When EXPORTMODULES=No in shorewall.conf, the following errors were
issued:
/usr/share/shorewall/modules: line 19:
2012 May 18
11
Shorewall 4.5.4 Beta 3
4.5.4 Beta 3 is now available for testing. I apologize for the
back-to-back Betas but I guess it''s better to find these problems during
the Beta period rather than later.
Problems corrected:
1) This release includes all defect repairs from Shorewall 4.5.3.1.
2) When EXPORTMODULES=No in shorewall.conf, the following errors were
issued:
/usr/share/shorewall/modules: line 19:
2012 May 31
5
Shorewall + squid + multi isp
Hello all,
I''m reading the nice documentation about shorewall with multi isp. And I wonder about squid (non transparent) and shorewall
Can I use on same machine, squid with ldap ident, dansguardian, and shorewall with multi-isp (four or five) ? Perhaps there is a problem because squid mask source IP, shorewall can maintain and load balance sessions for the same source IP ?
Thanks Fred
2012 May 08
19
Shorewall, TPROXY, Transparent Squid and Multiples ISP
Hello,
I wonder if someone could use the TPROXY with Shorewall and
transparent Squid with using the routing rules on shorewall
(tcrules) for hosts / networks (LAN) with multiples providers (WANs)
directly from the internal network on port 80 (with TPROXY
transparent squid or REDIRECT).
On this issue, the routing rules is not work propertly because the
source is the
2012 Jun 13
3
Default Route disappear
Hi
I have a default route to 192.168.1.1 as soon as I start shorewall the
default route dissapear. What do I need to do to have it not disappear.
Kind Regards
My network setup
/etc/network/interfaces:
# The primary network interface
auto eth0
iface eth0 inet static
address 192.168.1.17
netmask 255.255.255.0
network 192.168.1.0
broadcast 192.168.1.255
2012 Feb 26
6
Continuous pings going through a full DROP policy
For a same configuration in which the default policy is drop and only
one connection is accepted in rules, continuous pinging to devices
will stop squarely in 4.0.15 as soon as a very basic firewall is
enabled whereas in 4.4.26.1, pinging will still continue after the
firewall is enabled.
All tests are done with proper reboot of the unit3 where the firewall
is applied:
unit1 <---> eth4
2011 Jul 25
4
ipsets
I haven''t debugged this enough to understand what is happening, but I
observe the following:
someipset = bitmap:ip,mac
1) br0:+someipset
2) br0:+someipset[2]
The first 1) doesn''t match anything in rules or tcrules, the second 2)
matches fine. (Also using +someipset[1] doesn''t match anything)
Is it possible/sensible/feasible to have shorewall figure out the
2012 Jul 13
4
Multiple Wifi Profiles
This may not necessarily be the best place to ask this, but I''ve tried the Admin Guide, LinuxQuestions and Debian forums and no one knows.
Running Debian Testing, and I need to set up two profiles for my wifi adapter, one for home and one for any open AP. I''m using the manual method of configuring, editing the /etc/wpa_supplicant/wpa_supplicant.conf and /etc/network/interfaces
2012 Sep 03
10
Shorewall 4.5.8 Beta 1
Shorewall 4.5.8 Beta 1 is now available for testing.
----------------------------------------------------------------------------
I. P R O B L E M S C O R R E C T E D I N T H I S R E L E A S E
----------------------------------------------------------------------------
1) This release includes the defect repair from Shorewall 4.5.7.1.
2) The restriction that TTL and HL rules could
2012 Sep 03
10
Shorewall 4.5.8 Beta 1
Shorewall 4.5.8 Beta 1 is now available for testing.
----------------------------------------------------------------------------
I. P R O B L E M S C O R R E C T E D I N T H I S R E L E A S E
----------------------------------------------------------------------------
1) This release includes the defect repair from Shorewall 4.5.7.1.
2) The restriction that TTL and HL rules could
2012 Apr 30
4
Shorewall under xen
Hi All
It''s about time to upgrade my shorewall routers again so thinking of possible
changes.
In our main office have managed switches and 5 xen servers.
I''m thinking of running the firewall/router under xen.
Don''t have all the details figured out but this is roughly what I''m thinking
of:
Set up separate vlan for the two isps and plug isps into the switch.
2012 Jun 05
2
Anti DDOS rules
Hi,
How can I tell shorewall to block any ip address if it generate x no of
request within x no of seconds. I want to filter SYN, ICMP and HTTP Get
floods etc. Is it possible have a minimum local level deterrence against
ddos attacks at firewall level?
--
AzfarHashmi
Cloudways
Your Managed Cloud
e: azfar.hashmi@cloudways.com
w: www.cloudways.com <http://www.cloudways.com>
PGP