Is 10.2.2 address publicly registered to your organization. Try doing a
traceroute to see what you are really pinging. If you want to use forwarding
you can use ipmasqadm.
/===============================\
| Micky Mimo |
| Systems Specialist |
| (781) 457 - 1317 |
| [EMAIL PROTECTED] |
\===============================/
-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Rajesh Divakaran
Sent: Wednesday, October 25, 2000 8:12 AM
To: [EMAIL PROTECTED]
Subject: IPCHAINS...!! HELP Req..!!
I 'm running IPchains firewalls. and IP MASQ on my RHL 6.1 box
I want to allow a specifice sunbet of a Network from outside world to enter
my internal network
for eg:
i have a 10.2.2.x internal network and now i want a 149.2.x.x network to
be able to access my Internal 10.2.2.x machines and network.
Now my RHL 6.1 box has 2 NICs one has the 10.2.2.x IP's and another has a
Internet IP ... i.e 64.2.4.x
now how do i make the packets from 149.2.x.x network to be forwarded to
10.2.2.x network...????
so that ppl in 149.2.x.x will be abel to access my 10.2.2.x network
machine.
Now i have reached a stage where ppl from 149.2.x.x can ping my 10.2.2.x
machines and vice versa.. but when i try to access those machines thru
telnet (i'm sure that machien i trying to access has Telnet serviece runing)
or Windows NT.. i'm not able to. i.e. application layer communication is not
happeiing..!!
Rajesh @ Wisor Telecom
Bangalore, India
Voice: +91-80-5525823/821 Ext.4102
---------------------------------------------------------
Your motivation seminar worked !! I've stopped firing employees.
I now motivate them to quit on their own !!!
----- Original Message -----
From: Bennett Samowich <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Wednesday, October 25, 2000 3:57 PM
Subject: Security policy resources
> Greetings,
>
> Would anyone kindly point me to some resources, either on-line or book
> form, that detail the creation of an effective security policy. I have
> found several resources for creating usage policies and now I need to
> concentrate on our security policy. It is my understanding that it is
this
> policy that is used when creating firewall, IDS, etc rules.
>
> Thanks in advance,
> - Bennett
>
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]