search for: keep_state

Displaying 7 results from an estimated 7 matches for "keep_state".

Did you mean: sleep_state
2004 Mar 24
2
multipath routing
I have a private lan that is connected to the world via 3 dsl lines. I put up a linux box that handles all the dsl lines, lan gateway and all is working well...until...one of the dsl lines goes down. My routing table is: x.x.x.x dev ppp0 proto kernel scope link src x.x.x.x x.x.x.x dev ppp1 proto kernel scope link src x.x.x.x x.x.x.x dev ppp2 proto kernel scope link src x.x.x.x
2004 Feb 06
3
Multiple uplinks - load balancing
...-P OUTPUT ACCEPT $IPTABLES -t mangle -P PREROUTING ACCEPT $IPTABLES -t mangle -P INPUT ACCEPT $IPTABLES -t mangle -P OUTPUT ACCEPT $IPTABLES -t mangle -P FORWARD ACCEPT $IPTABLES -t mangle -P POSTROUTING ACCEPT $IPTABLES -t nat -F $IPTABLES -t mangle -F $IPTABLES -t filter -F $IPTABLES -t filter -X keep_state $IPTABLES -t nat -X keep_state $IPTABLES -t filter -N keep_state $IPTABLES -t filter -A keep_state -m state --state RELATED,ESTABLISHED -j ACCEPT $IPTABLES -t filter -A keep_state -j RETURN $IPTABLES -t nat -N keep_state $IPTABLES -t nat -A keep_state -m state --state RELATED,ESTABLISHED -j ACCEPT...
2005 Jul 28
1
multiple uplinks works on linux router but not on clients
...it needs to be, also for the connected pc''s. But that''s not working. All traceroutes on client machine are going through the same router: 192.168.20.1->192.168.32.1->internet I used following firewall rules, but that shouldn''t be the problem: iptables -t filter -N keep_state iptables -t filter -A keep_state -m state --state RELATED,ESTABLISHED -j ACCEPT iptables -t filter -A keep_state -j RETURN iptables -t nat -N keep_state iptables -t nat -A keep_state -m state --state RELATED,ESTABLISHED -j ACCEPT iptables -t nat -A keep_state -j RETURN iptables -t nat -A POSTROUT...
2005 Feb 16
11
Load Balancer setting for Public Servers
...10.0.0/24 table 30 ip rule add prio 40 table 40 ip route add default table 40 proto static nexthop via 213.244.0.1 dev eth1 weight 1 nexthop via 222.240.0.1 dev eth2 weight 1 nexthop via 201.10.0.1 dev eth3 weight 1 iptables -t nat -A POSTROUTING -s 10.0.0.0/24 -j MASQUERADE iptables -t filter -N keep_state iptables -t filter -A keep_state -m state --state RELATED,ESTABLISHED -j ACCEPT iptables -t filter -A keep_state -j RETURN iptables -t nat -N keep_state iptables -t nat -A keep_state -m state --state RELATED,ESTABLISHED -j ACCEPT iptables -t nat -A keep_state -j RETURN iptables -t nat -A PREROUTING...
2005 Jun 22
1
3 internet connexions - Problem with my script
...ot; GWE3="192.168.2.1" echo 1 > /proc/sys/net/ipv4/ip_forward iptables -t nat -A POSTROUTING -o $IFE1 -s $NWI/$NMI -j MASQUERADE iptables -t nat -A POSTROUTING -o $IFE2 -s $NWI/$NMI -j MASQUERADE iptables -t nat -A POSTROUTING -o $IFE3 -s $NWI/$NMI -j MASQUERADE iptables -t filter -N keep_state iptables -t filter -A keep_state -m state --state RELATED,ESTABLISHED -j ACCEPT iptables -t filter -A keep_state -j RETURN iptables -t nat -N keep_state iptables -t nat -A keep_state -m state --state RELATED,ESTABLISHED -j ACCEPT iptables -t nat -A keep_state -j RETURN iptables -t nat -A PREROUT...
2001 Nov 19
7
firewall
hallo samba i have samba installed on a linux SuSE e-mail server II. i need to know witch port i have to open in my firewall to be able to connect the samba share via NT's explore my samba share om linux03 is [home] = /home/users and a connect from my NT4.0 workstation explore with \\linux03\home where is a firewall between my linux03 server with samba and my NT4.0 workstation. Med venlig
2004 Apr 19
2
two WANs one LAN
...t; /dev/null 2>&1 ping -c 1 cc.dd.69.94 > /dev/null 2>&1 sleep 60 done root@scyther:~# root@scyther:~# iptables -v -L Chain INPUT (policy ACCEPT 1251 packets, 83120 bytes) pkts bytes target prot opt in out source destination 10141 1037K keep_state all -- any any anywhere anywhere Chain FORWARD (policy ACCEPT 824 packets, 68747 bytes) pkts bytes target prot opt in out source destination 1416 142K keep_state all -- any any anywhere anywhere Chain OUTPUT (policy ACCEPT...