6 Topics

Member Avatar for
Member Avatar for James_43

Hi all, I'm having a lot of trouble with building a network for my virtualised OS's. The server has two physical NICs for LAN and WAN. The host has IP 10.0.0.1. I use the following iptables to bridge them. iptables -t nat -A POSTROUTING -o wan -j MASQUERADE iptables -A …

Member Avatar for James_43
0
395
Member Avatar for CoolAtt

Hi All, I need help with iptables to allow a specific IP to access a destination (FaceBook) The following rule blocks facebook access to everyone in the company(this rule works successfully): iptables -A FORWARD -p all -d $ip -j REJECT (The ip address is read from a text file.) Now …

Member Avatar for CoolAtt
0
344
Member Avatar for janet@123

Hi, I have a topology (attached with this post) in which: Linux machine 2 has two virtual interfaces eth0 and eth1. eth0 is connected to the external switch. In Linux machine 1, I've added the default gateway as: route add default gw 192.168.100.10 so that all the packets leaving Linux …

0
147
Member Avatar for tuxhats

The script below is what I have. It does not block other computers that are not in this firewall Check_Mac list. Where is the mistake? Thanks!!! tuxhats #!/bin/sh IPT="/sbin/iptables" # Change to your server ip like this LAN="10.229.2.0/24" , leave the "0/24" alone LAN="10.229.1.0/24" $IPT -P INPUT DROP $IPT -P …

0
128
Member Avatar for san_fran_crisko

Hi, I'm trying to use either one or two old embedded x86 devices to build a NAT server, however many it takes. It's a bit unique in the sense that I need full transparency (i.e. no firewall) and fully duplex NAT. I have a network switch which is separated in …

Member Avatar for san_fran_crisko
0
259
Member Avatar for jindalarpan

Hi am i having a acquirement of forward the ip address and port number to some different ip from windows machine. I know there could be many ways through which t can be done at network layer but that requires too much of changes. is it possible to do the …

Member Avatar for lasitha2005d
0
183

The End.