stop it! stop it!....
the 10.0.0.0/8 has not been 'registered' to ANYONE since the last dayz
of the 'arpanet'....
please stop propagating bs...
piranha...for a reason
>From: "mimo" <[EMAIL PROTECTED]>
>To: "Rajesh Divakaran" <[EMAIL PROTECTED]>, <[EMAIL PROTECTED]>
>Subject: RE: IPCHAINS...!! HELP Req..!!
>Date: Wed, 25 Oct 2000 11:15:54 -0400
>
>Is 10.2.2 address publicly registered to your organization. Try doing a
>traceroute to see what you are really pinging. If you want to use
>forwarding
>you can use ipmasqadm.
>
>/===============================\
>| Micky Mimo |
>| Systems Specialist |
>| (781) 457 - 1317 |
>| [EMAIL PROTECTED] |
>\===============================/
>
>
>-----Original Message-----
>From: [EMAIL PROTECTED]
>[mailto:[EMAIL PROTECTED]]On Behalf Of Rajesh Divakaran
>Sent: Wednesday, October 25, 2000 8:12 AM
>To: [EMAIL PROTECTED]
>Subject: IPCHAINS...!! HELP Req..!!
>
>
>
>I 'm running IPchains firewalls. and IP MASQ on my RHL 6.1 box
>I want to allow a specifice sunbet of a Network from outside world to enter
>my internal network
>for eg:
>i have a 10.2.2.x internal network and now i want a 149.2.x.x network
>to
>be able to access my Internal 10.2.2.x machines and network.
>
>Now my RHL 6.1 box has 2 NICs one has the 10.2.2.x IP's and another has a
>Internet IP ... i.e 64.2.4.x
>
>now how do i make the packets from 149.2.x.x network to be forwarded to
>10.2.2.x network...????
>
>so that ppl in 149.2.x.x will be abel to access my 10.2.2.x network
>machine.
>
>Now i have reached a stage where ppl from 149.2.x.x can ping my 10.2.2.x
>machines and vice versa.. but when i try to access those machines thru
>telnet (i'm sure that machien i trying to access has Telnet serviece
>runing)
>or Windows NT.. i'm not able to. i.e. application layer communication is
>not
>happeiing..!!
>
>Rajesh @ Wisor Telecom
>Bangalore, India
>Voice: +91-80-5525823/821 Ext.4102
>---------------------------------------------------------
>Your motivation seminar worked !! I've stopped firing employees.
> I now motivate them to quit on their own
>!!!
>----- Original Message -----
>From: Bennett Samowich <[EMAIL PROTECTED]>
>To: <[EMAIL PROTECTED]>
>Sent: Wednesday, October 25, 2000 3:57 PM
>Subject: Security policy resources
>
>
> > Greetings,
> >
> > Would anyone kindly point me to some resources, either on-line or book
> > form, that detail the creation of an effective security policy. I have
> > found several resources for creating usage policies and now I need to
> > concentrate on our security policy. It is my understanding that it is
>this
> > policy that is used when creating firewall, IDS, etc rules.
> >
> > Thanks in advance,
> > - Bennett
> >
> > -
> > [To unsubscribe, send mail to [EMAIL PROTECTED] with
> > "unsubscribe firewalls" in the body of the message.]
>
>-
>[To unsubscribe, send mail to [EMAIL PROTECTED] with
>"unsubscribe firewalls" in the body of the message.]
>
>-
>[To unsubscribe, send mail to [EMAIL PROTECTED] with
>"unsubscribe firewalls" in the body of the message.]
_________________________________________________________________________
Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com.
Share information about yourself, create your own public profile at
http://profiles.msn.com.
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]