Make sure your diald.conf file is truely including the correct
filter file (just a verification - path, filename, etc...)
Add the following to your Filter File.
ignore udp udp.source=udp.netbios-ns,udp.dest=udp.netbios-ns
ignore udp udp.dest=udp.netbios-ns
ignore udp udp.source=udp.netbios-ns
ignore udp udp.dest=udp.netbios-ssn
ignore udp udp.source=udp.netbios-ssn
ignore udp udp.dest=udp.netbios-dgm
ignore udp udp.source=udp.netbios-dgm
ignore tcp tcp.dest=tcp.netbios-ns
ignore tcp tcp.source=tcp.netbios-ns
ignore tcp tcp.dest=tcp.netbios-ssn
ignore tcp tcp.source=tcp.netbios-ssn
ignore tcp tcp.dest=tcp.netbios-dgm
ignore tcp tcp.source=tcp.netbios-dgm
You may already have part of this section in your filter,
so start there. Otherwise, just insert the above. Also,
get rid of any filter entries that allow NETBIOS traffic.
Also, if you have DNS enabled on your Windows machines,
they will try to use DNS for NETBIOS Name Resolution
(this is in addition to NETBIOS-NS). This will also activate
your link.
To inhibit the Windows 9x Machines from using DNS for NETBIOS
Name Resolution, you will need to modify the Registry. Using
REGEDIT, goto the following Registry Subkey:
HKEY_LOCAL_MACHINE
System
CurrentControlSet
Services
VXD
MSTCP
Edit the EnableDNS Parameter and set it to "0". NOTE: This
only turns off NETBIOS Name Resolution via DNS. Standard
DNS will continue to work.
Note, this will also cause your Network Control Panel TCP/IP Configuration
Dialogue to indicate DNS is disabled. If you need to change your
DNS Settings you will have to modify them via the Registry. They
are all under the MSTCP SubKey.
With NT, goto the Network Control Panel TCP/IP Protocol Configuration,
Properties, WINS Address Configuration. Disable NETBIOS Name
Resolution via DNS by unchecking the "Enable DNS for Windows
Resolution" CheckBox.
Jeff
----- Original Message -----
From: <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Tuesday, November 30, 1999 11:36 PM
Subject: windows bringing up the link
> Gents,
>
> I am a fairly new member of this list. I have just set up my linux
machine at
> home with ipmasquerading and diald. Everything works fine, EXCEPT: when I
am
> on a windows machine and double click my network neighborhood, it brings
up the
> link. I have sniffed the lan and found that the packets that are doing
this
> are the port 137, 138 and 139 that windows uses for netbios
communications. I
> have tried changing the standard.filter file, and have tried different
> variations on the ipchains for trying to drop these packets. But so far I
have
> not hit the right combination. Can anyone give me some pointers?
>
> TIA,
>
> ----------------------------------
> Dave McFerren: [EMAIL PROTECTED]
>
> "It never hurts to help" Eek the Cat
> ----------------------------------
>
> -
> To unsubscribe from this list: send the line "unsubscribe linux-diald" in
> the body of a message to [EMAIL PROTECTED]
>
-
To unsubscribe from this list: send the line "unsubscribe linux-diald" in
the body of a message to [EMAIL PROTECTED]