I use a cheap router, I have to use Port Forwarding to get it to work, I
do that even in my smart router, its the only way to get it to work that
I know of, with static IP's, I find cheap routers do not work all that
well, but if the address for the gateway, i.e. the router, is in the
same class of IP's, it should work, if its outside that range it may
not, i.e. router is 143.107.58.1, so your gate way is the same, now any
router should pass on traffic to that class, so figure out the subnet
mask to get to 177, off the top of my head I would say a Class C,
depending on what Mask you are using, i.e. 255.255.255.240, if you use 0
class mask, some routers will not work right, the network guys can
figure this out, I just use programmable router, i.e. smart router, that
you can add VLans to so you know all traffic is routed correctly,
otherwise you have to have the router setup correctly, and I found I
don't need a static IP to the computer, as long as I can do Port
Forwarding in the Router.
Keep in mind you might get NAT'd out, meaning you can assess it only
from localhost while on the machine, and can not access the Static IP
from the machine, but from outside the network it works fine, that's
because you are behind the NAT, if you want to fix that, you will have
to setup reverse DNS entries, and have to be in the same class of IP's
as your Router, and have a DNS server, which can be the same computer as
long as it has DNS setup, and its setup correctly, DNS is the issue you
are describing here, I would look here first, make sure that the DNS
server has forward and reverse DNS entries, you can use a proxy if you
want to test it from the same machine, it sounds like you do not have
DNS setup correctly.
On Mon, 2012-08-20 at 13:51 -0700, Jason H wrote:
> A lot of cheap firewalls are too dumb to get the routing right. When
> using an external IP internally, they get confused. The packet makes
> it to the router that sees the internal network has a packet going out
> to the external interface (it's not on the local after all) and sends
> it out (if it makes it that far) and does not figure out that it's
> supposed to back in over the other physical interface. Smarter routers
> will figure that out. Cheap ones won't.
>
>
>
> Try it from a phone, not on company WiFi.
>
>
>
>
> ______________________________________________________________________
> From: John Robson <[email protected]>
> To: [email protected]
> Sent: Monday, August 20, 2012 4:30 PM
> Subject: Re: [Wt-interest] Site not access outside the company
>
>
>
> I use:
>
> $ cmake -DEXAMPLES_CONNECTOR="wt;wthttp"
>
> $ ./test.wt --docroot . --http-address=0.0.0.0 --http-port 10100
>
> And Firewall Stoped:
>
> iptables -P INPUT ACCEPT
> iptables -P FORWARD ACCEPT
> iptables -P OUTPUT ACCEPT
>
> But 143.107.58.177:10100 just work local.
>
> Maybe this is a internal problem here...
>
> John
>
> On 08/20/2012 12:30 PM, Nagaev Boris wrote:
> > Hello!
> >
> > You are likely to use wt-http connector.
> > What IP address are you passing to it? If you are passing
> > "--http-address=127.0.0.1", then it is the reason.
> >
> > 127.0.0.1 is address of local interface, which is unreachable by
> other machines.
> > Specify "--http-address=0.0.0.0" to make is reachable by others.
>
>
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and
> threat landscape has changed and how IT managers can respond.
> Discussions
> will include endpoint security, mobile security and the latest in
> malware
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> witty-interest mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/witty-interest
>
>
>
>
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and
> threat landscape has changed and how IT managers can respond. Discussions
> will include endpoint security, mobile security and the latest in malware
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________ witty-interest mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/witty-interest
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and
threat landscape has changed and how IT managers can respond. Discussions
will include endpoint security, mobile security and the latest in malware
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
witty-interest mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/witty-interest