In review, I'd like to grant full access to the internet for all
computers on LAN (private, wired, my machines) and LAN2 (wireless
segment - friends, families, neighbors). I'd like to make LAN
invisible as far as LAN2 is concerned, yet allow my laptop to access
LAN when it is attached to
if I remember the protocol correctly, IPSec has a checksum that's embedded
into it to show if the packet has been altered. NAT alters the crap out of
the packet to make it traverse the network, hence breaking the IPSec
security and therefore making it a worthless packet.
meaning IPSec into a
I should probably qualify that 'could' as a 'should' :) Based on what
I know of the enc(4) code you _should_ be able to NAT coming out of
the tunnel, it's performing the NAT after IPSec hands it off to the OS
- I think the return path will get NAT'd before IPSec handling, but
I'm not 100%
Getting back into it here and I have been looking
to grab the latest
SNAP and test it in the lab ... but they seem to
have disappeared
fron Scott's dir. Can someone point me to them?
--
David L. Strout
Engineering Systems Plus, LLC
David Strout wrote:
Getting back into it here and I have been looking to grab the latest
SNAP and test it in the lab ... but they seem to have disappeared fron
Scott's dir. Can someone point me to them?
--
David L. Strout
Engineering Systems Plus, LLC
As has been discussed myriad times
David Strout wrote:
Getting back into it here and I have been looking to grab the latest
SNAP and test it in the lab ... but they seem to have disappeared fron
Scott's dir. Can someone point me to them?
http://snapshots.pfsense.org/
Users of Small Office and Home Office networks are quickly finding the
need for more advanced features such as VLAN's
These people are graduating from the basic Netgear and Linksys gear, and
needing the features of pfSense. pf docs are not clear in the VLAN area.
We can make the Docs better.
so im having some problems getting it to work. the dhcp part is working
and the phones had already been configured once so it remembers the
previous config, however, the dhcp server is not passing along the tftp
server name value like it should. i added this line to my dhcpd.conf
option
Hi,
i have 1,600 local user of wireless using captive portal. In 3 hours, there
are 100 user connected when i checking in captive portal status. Sometimes,
my server get stuck, so i have to reboot my server. Right know i'm using HP
DL140 G2 with 2.8 GHZ xeon processor and 1GB RAM.
What can I do to make sure the new zoneinfo file(s) are being used?
I'm not sure from LJ's message what to look for.
Thanks,
Stephan
On Feb 27, 2007, at 11:43 AM, Scott Ullrich wrote:
Anyone wanting to update their TZ can issue the following commands:
fetch -o /usr/share/
This is how I deal with wireless to internet acess but not lan.
add a rule that says:
Pass WLAN-subnet to destination NOT (!) LAN
(meaning if it's not rying to acess lan then it's all good)
You can also add rules to drop connections from WLAN clients to
destination firewall when port is 80/22
AHA!
Holger, Espen, Thank you.
Holger, apologies - I had that first rule that passed LAN2 Traffic to
WAN and everything else... I didn't realize it was working against
me. Now I realize that I only need two rules on the LAN2 net to do
what I was aiming for.
Success.
Mahalo,
Jeremy
On
12 matches
Mail list logo