Displaying 20 results from an estimated 3000 matches similar to: "Source-depending DNAT"
2004 Dec 21
3
FTP server not on port 21 problems - I do have read the FAQ
Hi!
I use standard Bering 2.2.2. I am trying to get my FTP-server to work
with another portnumber than 21 (On port 21 all works great, but I´m
really interested in running two FTP-servers, so I want to figure this one
out first).
Read the FAQ: http://www.shorewall.net/FTP.html and now I got this setup:
In Rules: DNAT net loc:192.168.3.2 tcp 99
In Shorewalls modules.conf (tried
2005 Dec 04
0
DNAT for ongoing UDP flows
Hi,
i need to dynamically change the destination IP address
of UDP packets for an ongoing UDP flow. That means
when the flow starts for the first time no change
is needed and after some time a change of the destination
IP address must be done to redirect the packets to another
machine dynamically. For new flows this could be done using e.g.:
iptables -t nat -A OUTPUT/PREROUTING -p udp
2004 Apr 30
3
Syslinux 1.75, LEAF Bering 1.2, Compaq 2266
I have been using the LEAF Bering firewall for a year or so. It boots
with Syslinux 1.75. But Bering is too large for a 1440KB floppy, so it
formats the diskette as 1680KB. Recently I found a small Compaq 2266 box
to replace a larger Compaq 7170 to run the firewall. But when I try to
boot the Bering diskette on the 2266 I get the following message:
Loading Linux ............
Boot failed:
2008 Aug 12
0
i am is Ruby greenhorn
hello , i am is Ruby greenhorn
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups "Ruby on Rails: Spinoffs" group.
To post to this group, send email to rubyonrails-spinoffs-/JYPxA39Uh5TLH3MbocFFw@public.gmane.org
To unsubscribe from this group, send email to
2004 May 10
1
Re: Grub to Syslinux
>That should work, *IF*:
>
>a) hda5 is a FAT12/16 filesystem;
>b) hda5 is <= cyl 1024.
>
> -hpa
I got thinking booting off a logical partition might not be allowed, so I
changed the LEAF/Bering logical partition to a primary, hda4. Then I ran
"syslinux d:" from a Win98SE DOS-box to (try to) initialize the
partition's boot record. And added this from a
2004 Mar 26
0
RE: Does anyone know a PPPoE Server for Bering?
Does anyone know a PPPoE Server for Bering ?
I don''t know anything about Bering (a quick search shows an Internet
Firewall device and Floppy distro...) but anyways; I have had luck
with RP-PPPoE (http://www.roaringpenguin.com/products/rp-pppoe/)
which does include a PPPoE server. I have my pppd patched to support
RADIUS so that it can talk to my FreeRadius rig in the testing
lab....
IF
2002 Oct 28
0
Upnp ( linux-igd) on bering
Hi,
I''m trying let the windows clients behind my leaf ( bering rc4) talk through msn messenger.
I found linux-igd.sourceforge.net that seems to be the missing piece...
I used the ideas from www.wix.net.nz/LEAF/glibc.html to build a leaf cd using the redhat 7.3 glibc
( It''s alot easier to test applications because I can simply copy the binary ( and the .so) on the bering
2007 Jul 16
1
[LLVMdev] not to break 'for' statement into basic blocks
Thank you so much but could you tell me a little bit more in detail about that you suggested?
Sorry, I'm just a greenhorn.
Thanks,
Seung J. Lee
---- Original message ----
>Date: Sat, 14 Jul 2007 21:26:14 -0500
>From: "David A. Greene" <greened at obbligato.org>
>Subject: Re: [LLVMdev] not to break 'for' statement into basic blocks
>To: llvmdev at
2010 Feb 17
2
Clustering apache
I'm a greenhorn when it comes to clustering in RHEL/CentOS and recently setup an active/standby clustering using Apache & Heartbeat. It seems to be a good entry step into clustering however after testing it I was disappointed in that the resource manager does not start httpd on node2 if httpd on node1 is dead (only starts httpd on node2 if the heartbeat daemon on node1 is dead). Is there
2004 Aug 28
0
Shorewall 2.1.7
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
In this release:
1) Dynamic Ipsec Zones now work.
2) Output Traffic Accounting by user/group is supported (thanks to
Tuomas Jormola).
3) The following negative test options are added in /etc/shorewall/ipsec
and /etc/shorewall/masq:
reqid!=<number>
spi!=<number>
proto!=esp|ah|ipcomp
mode!=tunnel|transport
2002 Jul 08
1
FWD: dns woes
---------- Original Message ----------------------------------
From: "Jim Van Eeckhoutte" <jim@vaneeckhoutte.com>
Reply-To: <jim@vaneeckhoutte.com>
Date: Mon, 8 Jul 2002 15:27:14 -0700
this is shorewall status output:
tcp 6 431899 ESTABLISHED src=192.168.20.5 dst=64.4.12.45 sport=2185 dport=1863 src=64.4.12.45 dst=63.25.123.58 sport=1863 dport=2185 [ASSURED] use=1
2013 May 21
2
[Bug 821] New: Rosa
https://bugzilla.netfilter.org/show_bug.cgi?id=821
Summary: Rosa
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P5
Component: iptables
AssignedTo: netfilter-buglog at lists.netfilter.org
ReportedBy: andoandre at gmail.com
2013 Sep 10
4
[Bug 850] New: DNAT applied even after deleting the IP Tables DNAT Rule
https://bugzilla.netfilter.org/show_bug.cgi?id=850
Summary: DNAT applied even after deleting the IP Tables DNAT
Rule
Product: iptables
Version: 1.4.x
Platform: All
OS/Version: All
Status: NEW
Severity: major
Priority: P5
Component: iptables
AssignedTo: netfilter-buglog at
2004 Jun 28
6
URGENT: Shorewall Security Vulnerability
Javier Fernández-Sanguino Peña has discovered an exploitable
vulnerability in the way that Shorewall handles temporary files and
directories. The vulnerability can allow a non-root user to cause
arbitrary files on the system to be overwritten. LEAF Bering and Bering
uClibc users are generally not at risk due to the fact that LEAF boxes
do not typically allow logins by non-root users.
For 2.0
2005 Jun 22
0
Issue migrating from 1.4.6c to 2.4.0 with all zone in DNAT rule
Hi all,
net : internet zone
dmz : DMZ zone
Lan : local network zone
in 1.4.6c this rule :
DNAT all lan:10.0.0.1 tcp http - 192.0.0.1
does generate the following iptables rules in nat table :
Chain OUTPOUT
DNAT tcp -- 0.0.0.0/0 192.0.0.1 tcp dpt:http to:10.0.0.1
Chain net_dnat
DNAT tcp -- 0.0.0.0/0 192.0.0.1 tcp dpt:http to:10.0.0.1
Chain dmz_dnat
2009 Sep 05
3
Selecting biological data
Hello all,
I am new to R but have some experience with MATLAB and am trying to make the switch. I generally find the two languages easy to adapt but there are a few routine tasks which I would like to run smoother in R and I am having trouble finding a help resource. Could someone suggest a guide to filtering, selecting, sorting, and processing biological matrix data? Here is a rudimentary
2005 Jun 01
0
SNAT (or MASQUERADING) and DNAT question
Hi,
The private adresses (192.168.254.0/255.255.255.0) of my network are sent
dynamically by dhcp on my network. The dhcp server is on the firewall which
address is 192.168.254.1/255.255.255.255 (this address is static).
I''ve got a rsync server on this network which is on a separe server. His
address is 192.168.254.200/255.255.255.255 (this address is static).
I want that the users
2006 Apr 14
0
[Bug 471] New: UDP stream DNAT problem
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=471
Summary: UDP stream DNAT problem
Product: netfilter/iptables
Version: linux-2.6.x
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: NAT
AssignedTo: laforge@netfilter.org
ReportedBy:
2004 Sep 10
1
Is ProxyARP or NAT entries really neccesary for DNAT to work?
I have been trying to get DNAT to work and I actually have succeeded
too, however, not how I thought it would work when reading through the
documentation.
1. No matter what I do I cannot get DNAT to work unless I have an entry
in eiter the nat or the proxyarp file. Is that really how it''s supposed
to be? I can''t find anything about it in the documentation.
2. Also, in the
2020 Apr 18
4
[Bug 1423] New: iptables-translate silently discards --ctstate DNAT
https://bugzilla.netfilter.org/show_bug.cgi?id=1423
Bug ID: 1423
Summary: iptables-translate silently discards --ctstate DNAT
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component: iptables over nftable