search for: mascarading

Displaying 4 results from an estimated 4 matches for "mascarading".

2003 Jul 08
1
Questions about corARMA
Hi, I'm a new member here in the list. I am a graduate from University of Georgia. Recently in doing analysis using lme on a dataset, I found several questions: 1. How to express the equation when the correlation structure is very complicated. For exmaple, if the fixed is y(t)=0.03x1(t)+1.5x2(t)(I omitted "hat" and others). And the model with corARMA(p=2,q=3) is proper. What will be
2004 Nov 24
1
Tinc on OsX, slowly getting there....
...s running. See BranchB for more info. tinc-up.pl #!/usr/bin/perl system "ifconfig tun0 192.168.3.2 192.168.0.0 netmask 255.255.0.0"; system "route add 192.168.0.0/16 192.168.3.2"; BrancA The CPU with the tinc demon on the office network. The office network is behind a mascarading firewall with public IP 123.123.123.7 The tinc host has a static IP of 10.20.30.1 (configured from OsX GUI System Preference:Network) The firewall is setup to forward all traffic to 123.123.123.7 to 10.20.30.1, on port 655 Furthermore, the preexisting office network is 192.168.2.0/24 The tinc ho...
2004 Nov 22
1
Tinc on OsX, partial success
...t = 192.168.2.1/32 Address = 222.222.222.203 TCPOnly = yes -----BEGIN RSA PUBLIC KEY----- ... -----END RSA PUBLIC KEY----- tinc-up #!/bin/sh ifconfig $INTERFACE 192.168.2.1 192.168.2.1 netmask 255.255.0.0 BrancA The CPU with the tinc demon on the office network. The office network is behind a mascarading firewall with public IP 123.123.123.7 The tinc host has a static IP of 10.20.30.1 (configured from OsX GUI System Preference:Network) The firewall is setup to forward all traffic to 123.123.123.7 to 10.20.30.1, on port 655 Furthermore, the preexisting office network is 192.168.3.0/24 The tinc ho...
2005 Sep 29
20
maclist problem on a firewall/bridge/router system with masquerading
Hy, sorry for my poor english i think i''m having a very unusual problem and very dificult to track, but i''ll try to explain it as best as i can. here is my scenario: a firewall/bridge composed of 3 ethernet devices and 1 virtual one. my bridge (br0 ) is composed of eth0, eth1 and tap0 br0:eth0 is my connection to my router (200.244.92.1) br0:eth1 is my connection to my