Is 10.2.2 address publicly registered to your organization. Try doing a
traceroute to see what you are really pinging. If you want to use forwarding
you can use ipmasqadm.

/===============================\
| Micky Mimo                    |
| Systems Specialist            |
| (781) 457 - 1317              |
| [EMAIL PROTECTED]         |
\===============================/


-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Rajesh Divakaran
Sent: Wednesday, October 25, 2000 8:12 AM
To: [EMAIL PROTECTED]
Subject: IPCHAINS...!! HELP Req..!!



I 'm running IPchains firewalls. and IP MASQ on my RHL 6.1 box
I want to allow a specifice sunbet of a Network from outside world to enter
my internal network
for eg:
i have a  10.2.2.x  internal network and now i want a  149.2.x.x  network to
be able to access my Internal 10.2.2.x machines and network.

Now my RHL 6.1 box has 2 NICs one has the 10.2.2.x IP's and another has a
Internet IP ... i.e 64.2.4.x

now how do i make the packets from 149.2.x.x network to be forwarded to
10.2.2.x network...????

so that ppl in 149.2.x.x  will be abel to access  my 10.2.2.x network
machine.

Now i have reached a stage where ppl from 149.2.x.x can ping my 10.2.2.x
machines and vice versa.. but when i try to access those machines thru
telnet (i'm sure that machien i trying to access has Telnet serviece runing)
or Windows NT.. i'm not able to. i.e. application layer communication is not
happeiing..!!

Rajesh @ Wisor Telecom
Bangalore, India
Voice: +91-80-5525823/821   Ext.4102
---------------------------------------------------------
Your motivation seminar worked !!  I've stopped firing employees.
                               I now motivate them to quit on their own !!!
----- Original Message -----
From: Bennett Samowich <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Wednesday, October 25, 2000 3:57 PM
Subject: Security policy resources


> Greetings,
>
> Would anyone kindly point me to some resources, either on-line or book
> form, that detail the creation of an effective security policy.  I have
> found several resources for creating usage policies and now I need to
> concentrate on our security policy.  It is my understanding that it is
this
> policy that is used when creating firewall, IDS, etc rules.
>
> Thanks in advance,
> - Bennett
>
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to