Thanks a lot for all your answers (esp. Peter Gutmann, Brian Denehy and Alan Olsen). You're very right about the operation of that Plug Proxy. My main reason for that question posted to the list was the URL (yes, so that I can further find out about that) where I can find the manual. doco. about that plug proxy as I am troubleshooting it. FYI. The machine which has that plug proxy running on is a bastion host on the DMZ with the following set up: internal <--> FW <--> |bastion| <--> internet int. if. of bastion: a.b.c.d ext. if. of bastion: e.f.g.h I can "redirect" ,say, telnet service to an external host via internal if of the bastion using the plug proxy: plug -i a.b.c.d -l 23 x.y.z.w:23 Then telnet to a.b.c.d will actually get me to x.y.z.w This is axactly what you guys explained to me. But for some other "rederiction", I got the error: "Bastion plug [<pid>] a.b.c.d <port> Server bind: Address already in use" which I could not figure out. That plug proxy doesn't seem to be TIS-FWTK or anything I've known of as my reply to Alan Olsen. There's no netperm-table and nothing regarding that plug in the /etc/inetd.conf So any one on the list could identify what that plug proxy is, how to install that, where could I find that. etc. Thanks a lot indeed for all responses so far. It's great, LIST ! Vy :) -----Original Message----- From: Peter Gutmann [mailto:[EMAIL PROTECTED]] Sent: Thursday, 1 March 2001 0:18 To: Vy Mai Subject: Re: Plug You should do everything to check out this program. However, I seem to recall using this program on a firewall that I built a while ago. What it does is to act like the old plug-gw from the TIS firewall. Meaning that it builds a connection from the tcp port listed in the -l flag from the interface listed in the -i flag and sends it to the ip.address:port on another machine. For example... In the second instance port 119 is the NNTP (usenet new reader port) which is connected to the NNTP port on the machine whith the address 192.16.13.141 One simple way to test this, is to telnet to port 119 on the machine that this is running on (your firewall I assume) and then look on the firewall with netstat and see the connection. Hope this helps... Peter Gutmann On Wed, Feb 28, 2001 at 03:21:35PM +1100, Vy Mai wrote: > Hi List, > > Has anyone knew this service: > > webbast02@[/] # ps -ef | grep plug > root 150 1 0 Nov 14 ? 0:00 /opt/local/bin/plug -i > 195.164.40.75 -l 12000 205.57.240.71:12000 > root 146 1 0 Nov 14 ? 0:00 /opt/local/bin/plug -l 119 > 192.16.13.141:119 > > It's on a legacy system w/o any doco. (The IPs above being changed) > I would be very appreciative if you could tell me briefly what it is and any > URL with discussion about that. > > Much appreciated. > > Vy > > - > [To unsubscribe, send mail to [EMAIL PROTECTED] with > "unsubscribe firewalls" in the body of the message.] -- Peter Gutmann [EMAIL PROTECTED] Home 631-669-3893 Cell 631-553-0652 - [To unsubscribe, send mail to [EMAIL PROTECTED] with "unsubscribe firewalls" in the body of the message.]
