Displaying 20 results from an estimated 9000 matches similar to: "custom route for forwarded traffic"
2007 Sep 19
1
major packet loss with htb
Hi,
got a 25/25Mbit connection which is quite stuffed. So I applied htb rules.
Uplink:
class htb 1:1 root rate 24500Kbit ceil 24500Kbit burst 4661b/8 mpu 0b
overhead 0b cburst 4661b/8 mpu 0b overhead 0b level 7
Sent 430600689269 bytes 730147320 pkt (dropped 0, overlimits 0 requeues 0)
rate 23057Kbit 5520pps backlog 0b 0p requeues 0
lended: 199673949 borrowed: 0 giants: 0
tokens: -964
2007 Oct 31
0
[Fwd: Re: custom route for forwarded traffic]
Aleksander Kamenik wrote:
> Hi,
> If I add a rule to the main routing table in the users network''s
> firewall for servers network''s external IP to go through the VPN, I will
> break the VPN connection (kind of like the chicken and egg problem).
>
This true only for cases like L3 IPSec where traffic to be encrypted is
based on src/dst IP combo. If you had a VPN
2007 Sep 25
7
DNAT PREROUTING issue with IPTABLES
Hi,
I have an DNAT ISSUE with PREROUTING.
This is my setup.
I have 2 firewalls running iptables.
Pls asume 1.2.3.4/29 is the internet interace of FIRST firewall.
2.3.4.5/29 is the internet interface of SECOND firewall. it has DMZ zone. in
that DMZ zone, mail server runnig @ 192.168.100.3
Now I want to DNAT port 25 of FISRT firewall ( i.e - its ip address -
1.2.3.4/29) to the internet ip
2007 Oct 29
6
Fair que between 255 users
Hello guys
I have a subnet with 255 users, which need to share 1 single slow internet
connection, so i would like to implement a kind of *fair queuing *on the
UPLOAD between them, which means that they all share the connection
equally..
The tools that i have available is: A linux box with IPROUTE2,HTB and TC..
I have looked at some examples, and my first idea was to make 255 entries in
2005 May 04
4
OpenSwan traffic shaping with HTB & sfq
Hi All,
I''ve got an interoffice IPSEC VPN in place that I''m trying to give
priority to terminal service (tcp 3389) traffic.
I''ve created rules at each end, but have hit a bit of a dillemma. As
the data is encrypted I must also give highest priority to protocol 50
otherwise the priority is lost as the packet gets encrypted.
When I do this however, I can''t
2007 Oct 06
7
ipp2p segmentation fault
Hi all.
On Sep 26th I decided to try and get ipp2p working on my machine that acts as a gateway for my Internet connection.
This machine is running Debian.
I performed the install by doing the following steps:
- I installed the Debian package called linux-source-2.6.22 for my Linux kernel source and unpacked the resulting tar.bz2 file.
- From the netfilter.org site I downloaded the following
2004 Sep 03
3
traffic queueing and ipsec vpn
Hi all, ive been reading lartc howto, im new about traffic shaping/police.
As far as red (chapter 9 complete) i saw that first the packet passes at the
ingress qdisc, then it passes to the ip stack if the packet is directed to
the box or its forwarded (is my case), then it falls to the egress
classifier/s.
Now, i understand if i have an ipsec vpn at the outside interface, the
egress
2010 Oct 14
2
degree symbol using X11 on Xubuntu 10.04
Dear all,
I am having exactly the same problem as Andy on an Intel Mac (see below
/ https://stat.ethz.ch/pipermail/r-sig-mac/2009-May/006208.html) with
the degree symbol. I am using R version 2.11.1 (2010-05-31) on Xubuntu
10.04 with Windows fonts copied from /WINDOWS/Fonts and included via
'sudo dpkg-reconfigure fontconfig' and 'sudo fc-cache'.
Any help would be highly
2009 Jan 09
1
[Fwd: Excluding data with apply]
Dear all,
I've got many responses to my initial question, which is stated below.
However, from those responses it has become clear that I need to
rephrase my problem. All responses dealt with subscripting the data
matrix before 'apply' is run on it. But this is not want I wanted to do.
'apply' cycles through rows or columns of a matrix, and runs a function
on each row or
2005 Apr 27
5
26sec kame ipsec tunnel : packets leave unencrypted...
Hi everyone,
First of all, this is my first post in this ML, so I''m not sure that this
is the right place for my question (please don''t shoot me down ;)). For
the record, I''ve been reading and using LARTC for almost 3 years now, and
it''s a great help for anyone who wants to learn linux networking.
My problem:
I want to setup a tunnel for the following
2007 Apr 18
2
[Bridge] Re: Policy match with a bridge
Tom Eastep wrote:
> | Have you applied the ipsec+netfilter patches ? Without them, packets
> are
> | only seen encrypted in the OUTPUT chain.
> |
> Yes -- the ipsec+netfilter patches are applied. Here is the same test
> with the bridge removed and the local ip address transfered to one of
> the network cards:
The problem is ipv4_sabotage_out in the briding code. It
2005 Sep 24
1
Encrypt some services with ipsec
Hi all,
I have two prodction servers with FreeBSD 5.4 (all security patches
are applied). They running some services like dns, ssh, http, ftp, etc.
But I woukd like to encrypt some services for some hosts with ipsec when
it is accessed. For example:
- DNS resolution: not encrypted.
- DNS replication master-slave: encrypted by ipsec.
- Telnet: encrypted by ipsec for some hosts. Deny
2005 Jan 20
5
glm and percentage data with many zero values
Dear all,
I am interested in correctly testing effects of continuous environmental
variables and ordered factors on bacterial abundance. Bacterial
abundance is derived from counts and expressed as percentage. My problem
is that the abundance data contain many zero values:
Bacteria <-
2015 Apr 26
2
Route traffic through private IP for only certain hosts
Hi
I am having a weird problem which I cant figure out - so I was hoping
someone here could give me a hand.
First off the end goal is that a specific server in my network runs an
IPSEC connection to another company and I want all other servers to route
traffic for the IP on that network through this single server.
Server 1 in this example is the server that runs the IPSEC connection.
(CentOS
2004 Jun 05
50
[Bug 877] ssh 3.8.1p1 client cannot disable encryption with "-c none"
http://bugzilla.mindrot.org/show_bug.cgi?id=877
Summary: ssh 3.8.1p1 client cannot disable encryption with "-c
none"
Product: Portable OpenSSH
Version: 3.8.1p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo:
2005 Mar 14
1
Significance of Principal Coordinates
Dear all,
I was looking for methods in R that allow assessing the number of
significant principal coordinates. Unfortunatly I was not very
successful. I expanded my search to the web and Current Contents,
however, the information I found is very limited.
Therefore, I tried to write code for doing a randomization. I would
highly appriciate if somebody could comment on the following approach.
2005 Mar 10
4
Gregmisc
Dear all,
I use R 2.0.1 on Windows XP professional. When I want to load the
'Gregmisc' library I get the following error message:
Error in library(pkg, character.only = TRUE) : 'gregmisc' is not a
valid package -- installed < 2.0.0?
Can anybody tell me what's wrong with this package?
Cheers, Christian
2003 Aug 18
2
Grandstream, SIP encryption
On the Granstream 102 box that I have in front of me, there is a
"feature list" on the side. One of the features has grabbed my
attention:
" - optional voice encryption (model 102D)"
Now, digging through Grandstream's site, I see that it's not offered
quite yet. However, sending mail to their standard "information"
email address has resulted in no
2009 Jan 08
2
Excluding data with apply
Dear all,
'Apply' is a great thing for running functions on rows or columns of a
matrix:
X <- rnorm(20, mean = 0, sd = 1)
dim(X) <- c(5,4)
apply(X,2,sum)
Is there a way to use apply for excluding rows or columns from a matrix
to run functions on the remaining rows or columns? I know, I could do
this with a 'for' loop, but 'apply' would be much easier and
2007 Dec 12
2
Dump Unencrypted SSL Traffic
I've got an application that I can run under wine. It uses SSL to
communicate with a server. Since it's using SSL I can't just sniff
the network packets. What would be the best way to have wine be able
to dump the unencrypted data to a file for analysis? If this
requires modifying code, which files should I look at?
--
Anish Mistry
amistry at am-productions.biz
AM Productions