WHOA! that works!
I had no idea you could use the bitmask option like that! Thank You.
Although I haven't tested for any unwanted behavior... I'll get back
to you if i find any.
On Mon, Jul 9, 2012 at 3:10 PM, Stuart Henderson wrote:
> On 2012-07-09, Simon Perreault wrote:
>> On 2012-07-09 10
On 2012-07-09, Simon Perreault wrote:
> On 2012-07-09 10:17, Stuart Henderson wrote:
>> On 2012-07-09, Fil DiNoto wrote:
>>> But i was wondering if I could achieve something that would work for
>>> ALL the addresses behind the router as well without creating
>>> individual rules for each address.
On 2012-07-09 10:17, Stuart Henderson wrote:
On 2012-07-09, Fil DiNoto wrote:
But i was wondering if I could achieve something that would work for
ALL the addresses behind the router as well without creating
individual rules for each address. Something like this:
pass in on egress proto tcp fr
2012/7/9 Stuart Henderson
> On 2012-07-09, Fil DiNoto wrote:
> > I am trying to achieve something I thought would be simple, but
> > haven't had any luck.
> >
> >
> > I have an OpenBSD 5.0 router/firewall with public IP X.X.X.A
> >
> > Behind it are a mix of OpenBSD and Linux systems, all with p
On 2012-07-09, Fil DiNoto wrote:
> I am trying to achieve something I thought would be simple, but
> haven't had any luck.
>
>
> I have an OpenBSD 5.0 router/firewall with public IP X.X.X.A
>
> Behind it are a mix of OpenBSD and Linux systems, all with public IP. NO NAT.
>
> I run ssh on an altern
I am trying to achieve something I thought would be simple, but
haven't had any luck.
I have an OpenBSD 5.0 router/firewall with public IP X.X.X.A
Behind it are a mix of OpenBSD and Linux systems, all with public IP. NO NAT.
I run ssh on an alternate port, XXX22. However, from a certain
locatio
6 matches
Mail list logo