sec eroute
will let you see all 4 tunnels, not just 1 and you have to know that
routes are in place to allow traffic to flow in all 4 directions.
- --
Jason A. Pattie
[EMAIL PROTECTED]
Xperience, Inc. (http://www.xperienceinc.com)
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.4 (GNU/Linux)
Comme
higher priority traffic when present.
| which means they get set to the rate value, and unless you've changed
| the way it calculates it's percentage rate values, the sum of the leaf
| rates can exceed the parent.
| which i believe can lead to weird and/or bad behaviour.
Hmm. Guess I
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Am I silently being told that this is the wrong question to ask of this
list? :)
Jason A. Pattie wrote:
| Hello, been awhile since I've written.
|
| I now have a situation where I get to use traffic shaping for a client.
| ~ We implemente
something
like P2PWall, I think. There are even extensions that have been
integrated with the IPCop firewall distro to block Kazaa (couldn't get
them to work, but that's a different story).
- --
Jason A. Pattie
[EMAIL PROTECTED]
Xperience, Inc. (http://www.xperienceinc.com)
-BEGIN P
essor and RAM, especially).
The company I work for has worked on integrating antivirus support into
DansGuardian in order to allow for scanning all incoming web content for
virii. We also use MailScanner/SpamAssassin.
You can check them out at http://www.pcxperience.org.
- --
Jason A. Pattie
[
ev $DEV2 parent 1: protocol ip prio 10 u32 \
~ match ip sport 3389 0xffff \
~ flowid 1:10
Are these even valid?
Thank you for your time.
- --
Jason A. Pattie
[EMAIL PROTECTED]
Xperience, Inc. (http://www.xperienceinc.com)
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.
to the name you provide. It apparently only works when the
device is available (i.e., loaded as a module or detected by the kernel)
and down. I.e., it cannot be in an UP state. With a little
experimentation, you can insert the nameif command into your startup
scripts and all your problems dissappear
squerade the address from 10.4.2.0 onto
> 10.4.7.0
> and vice-versa.
> Am I missing something obvious?
> Cheers,
> Dave.
>
>
> --
> This message has been scanned for viruses and
> dangerous content by *MailScanner* <http://www.mailscanner.info/>, and is
> be
also. Is their any thing that
can be done to send B'cast also. Any help here will be much appriciated.
I am working though Xmas to get this working :(
>
> raj
>
> ___
> LARTC mailing list / [EMAIL PROTECTED]
> http://mailman.ds9a.nl
the script, in this way the rule will
> be threated first, see with "ip rule" the order
ok.
> hope that helps
thanks.
--
Jason A. Pattie
[EMAIL PROTECTED]
--
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.
__
how to route internally for some
reason even though the source address is the iDSL which it show know
everything it needs to know about in order to route it back into the
internal network.
Does routing table 1 need to have routes to the internal network? I
wouldn't think so, but I could
the route using
>>either the 'route' command or 'ip route'.
>>
>If you try to add different metric to the different
>alternative routes this is not possible by design. All alternative
>routes have same metric valu
a metric to the route using
either the 'route' command or 'ip route'.
--
Jason A. Pattie
[EMAIL PROTECTED]
___
LARTC mailing list / [EMAIL PROTECTED]
http://mailman.ds9a.nl/mailman/listinfo/lartc HOWTO: http://lartc.org/
13 matches
Mail list logo