Linux-Networking Digest #267, Volume #11         Mon, 24 May 99 17:13:42 EDT

Contents:
  Re: IP Masquerading Connecting but not working (Jonathan Marks)
  Re: *BSD or Linux Based Computer Telephony development Products ("Lee Sharp")
  Re: Practice firewall ("Doug Pitek")
  Re: Small private network woes - Still not working (Ray)
  Re: Frog! @home (Ted Potter)
  Re: Samba and printing. (Jake Kim)
  Re: Multiple nic's ([EMAIL PROTECTED])
  Stop netbios port 137, 138, 139 to bring up diald (Wayne Chan)
  Re: Newbie -  please help (Dennis Wetzig)

----------------------------------------------------------------------------

From: Jonathan Marks <[EMAIL PROTECTED]>
Subject: Re: IP Masquerading Connecting but not working
Date: Mon, 24 May 1999 17:02:35 GMT

Hi,

Firstly, word on the street (or should I say wire) is that the 2.2.8 kernel is
somewhat problematic. - see www.kernel.org.  I here 2.2.5 is the least
problematic, 2.2.9 has
just been released, claims to not be problematic, but it has only out there for
a few days.

I guess we are not the only two people who will struggle to get this to work.  I
am writing a manual on how to implement a masquerading firewall.  I'll share
some of this 'to be published' info with you.

The network options with which to compile the kernel that I used to get ipmasq
to work:
#
# Networking options
#
CONFIG_PACKET=y
CONFIG_NETLINK=y
CONFIG_RTNETLINK=y
CONFIG_NETLINK_DEV=y
CONFIG_FIREWALL=y
CONFIG_FILTER=y
CONFIG_UNIX=y
CONFIG_INET=y
CONFIG_IP_MULTICAST=y
CONFIG_IP_ADVANCED_ROUTER=y
# CONFIG_IP_MULTIPLE_TABLES is not set
# CONFIG_IP_ROUTE_MULTIPATH is not set
# CONFIG_IP_ROUTE_TOS is not set
CONFIG_IP_ROUTE_VERBOSE=y
# CONFIG_IP_ROUTE_LARGE_TABLES is not set
# CONFIG_IP_PNP is not set
CONFIG_IP_FIREWALL=y
CONFIG_IP_FIREWALL_NETLINK=y
CONFIG_NETLINK_DEV=y
CONFIG_IP_TRANSPARENT_PROXY=y
CONFIG_IP_MASQUERADE=y
CONFIG_IP_MASQUERADE_ICMP=y
CONFIG_IP_MASQUERADE_MOD=y
# CONFIG_IP_MASQUERADE_IPAUTOFW is not set
CONFIG_IP_MASQUERADE_IPPORTFW=y
# CONFIG_IP_MASQUERADE_MFW is not set
CONFIG_IP_ROUTER=y
# CONFIG_NET_IPIP is not set
# CONFIG_NET_IPGRE is not set
# CONFIG_IP_MROUTE is not set
CONFIG_IP_ALIAS=y
# CONFIG_ARPD is not set
CONFIG_SYN_COOKIES=y
CONFIG_INET_RARP=y
CONFIG_SKB_LARGE=y
# CONFIG_IPV6 is not set
# CONFIG_IPX is not set
# CONFIG_ATALK is not set
# CONFIG_X25 is not set

Note:  I've turned off IPAUTOFW, and turned on IPPORTFW.  IPPORTFW is the most
appropriate port forwarding option, all the others are legacy.  Remember to
select kernel modules and make the modules too.

Have you seen the IP-masq Howto - the latest V1.71 which is still in draft and
can be found at 'www.ecst.csuchico.edu/~dranch/LINUX/index-linux.html', as well
as his TrinityOS tomb. 'www.ecst.csuchico.edu/~dranch/LINUX/TrinityOS.wri.

Check that the networking is running correctly.  ifconfig should display
something
like the following.  (eth0 - internet, eth1 private network).

eth0      Link encap:Ethernet  HWaddr 00:00:E8:D3:D7:65
          inet addr:24.113.94.87  Bcast:24.113.95.255  Mask:255.255.254.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:3361523 errors:0 dropped:0 overruns:0 frame:3
          TX packets:82074 errors:0 dropped:0 overruns:0 carrier:0
          collisions:692 txqueuelen:100
          Interrupt:12 Base address:0x240

eth1      Link encap:Ethernet  HWaddr 00:00:E8:D3:D9:C0
          inet addr:192.168.0.254  Bcast:192.168.0.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:301646 errors:0 dropped:0 overruns:0 frame:0
          TX packets:316820 errors:0 dropped:0 overruns:0 carrier:0
          collisions:30 txqueuelen:100
          Interrupt:11 Base address:0x300

lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          UP LOOPBACK RUNNING  MTU:3924  Metric:1
          RX packets:82 errors:0 dropped:0 overruns:0 frame:0
          TX packets:82 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0

netstat -rn should display something similar to:  Note the the last gateway
entry.

Kernel IP routing table
Destination     Gateway         Genmask         Flags   MSS Window  irtt Iface
192.168.0.254   0.0.0.0         255.255.255.255 UH        0 8192       0 eth1
24.113.94.87    0.0.0.0         255.255.255.255 UH        0 8192       0 eth0
192.168.0.0     0.0.0.0         255.255.255.0   U         0 0          0 eth1
24.113.94.0     0.0.0.0         255.255.254.0   U         0 0          0 eth0
127.0.0.0       0.0.0.0         255.0.0.0       U         0 8192       0 lo
0.0.0.0         24.113.94.1     0.0.0.0         UG        0 8192       0 eth0

Great, now try pinging an address on the internet (metalab.unc.edu) and a
private ip address from the ipmasq box.

Now from a box on the private network, ping the private interface -
192.168.0.254
in my case, and the internet interface 24.113.94.87, in my case.

Now from a box on the private network, attempt to ping an address on the
internet (metalab.unc.edu).  The DNS should work - ie. returns the ip address,
but the ping attempts all timeout.

Having got this far, I followed the ip-masq howto  advise of making a call to
rc.firewall from rc.local.  My rc.firewall looks like:
/etc/rc.d/rc.firewall
#!/bin/sh
#
#/etc/rc.d/rc.firewall
#
#Created by Jonathan Marks, 5/21/99

# Do not need to do a depmod, as this is done in rc.sysinit
#/sbin/depmod -a

# Lets install the required ip_masq modules
#/sbin/modprobe ip_masq_cuseeme
/sbin/modprobe ip_masq_ftp
/sbin/modprobe ip_masq_irc
#/sbin/modprobe ip_masq_quake
/sbin/modprobe ip_masq_raudio
#/sbin/modprobe ip_masq_user
#/sbin/modprobe ip_masq_vdolive

# Flush old firewall rules - just in case
/sbin/ipchains -F
# Masquerading firewall timeouts: tcp conns 2hrs, tcp after fin pkt 10s, udp
120s
/sbin/ipchains -M -S 7200 10 120

# Set up ipchains for simple masqerading firewall
/sbin/ipchains -P forward DENY
/sbin/ipchains -A forward -s 192.168.0.0/24 -j MASQ

# Port forwarding - first flush out any forwards - just in case
/usr/sbin/ipmasqadm portfw -f

# Add port forwarding for http, smtp and ftp to henry
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 80 -R 192.168.0.3 80
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 25 -R 192.168.0.3 25
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 21 -R 192.168.0.3 21

# ICQ tcp return port setup
#  First to Hershel
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2000 -R 192.168.0.6 2000
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2001 -R 192.168.0.6 2001
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2002 -R 192.168.0.6 2002
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2003 -R 192.168.0.6 2003
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2004 -R 192.168.0.6 2004
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2005 -R 192.168.0.6 2005
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2006 -R 192.168.0.6 2006
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2007 -R 192.168.0.6 2007
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2008 -R 192.168.0.6 2008
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2009 -R 192.168.0.6 2009
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2010 -R 192.168.0.6 2010
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2011 -R 192.168.0.6 2011
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2012 -R 192.168.0.6 2012
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2013 -R 192.168.0.6 2013
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2014 -R 192.168.0.6 2014
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2015 -R 192.168.0.6 2015
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2016 -R 192.168.0.6 2016
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2017 -R 192.168.0.6 2017
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2018 -R 192.168.0.6 2018
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2019 -R 192.168.0.6 2019

#  Secondly to Hercules
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2020 -R 192.168.0.1 2020
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2021 -R 192.168.0.1 2021
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2022 -R 192.168.0.1 2022
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2023 -R 192.168.0.1 2023
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2024 -R 192.168.0.1 2024
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2025 -R 192.168.0.1 2025
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2026 -R 192.168.0.1 2026
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2027 -R 192.168.0.1 2027
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2028 -R 192.168.0.1 2028
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2029 -R 192.168.0.1 2029
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2030 -R 192.168.0.1 2030
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2031 -R 192.168.0.1 2031
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2032 -R 192.168.0.1 2032
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2033 -R 192.168.0.1 2033
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2034 -R 192.168.0.1 2034
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2035 -R 192.168.0.1 2035
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2036 -R 192.168.0.1 2036
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2037 -R 192.168.0.1 2037
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2038 -R 192.168.0.1 2038
/usr/sbin/ipmasqadm portfw -a -P tcp -L 24.113.94.87 2039 -R 192.168.0.1 2039

Notes on rc.firewall
1.  Flush out ipchains and portfw.  This is useful if this file is run
    manually, after bootup (say during debugging / testing).
2.  The syntax of portfw is different to that in the ip_masq howto. Check out
    the ipmasqadm man page and run 'ipmasqadm portfw -h'

Now lets confirm that the settings are all ok.

do a 'lsmod', this is what I see:
============================================
Module                  Size  Used by
ip_masq_raudio          2884   0
ip_masq_irc             1336   0  (unused)
ip_masq_ftp             2128   0
nfsd                  150212   8  (autoclean)
lockd                  30736   1  (autoclean) [nfsd]
sunrpc                 50688   1  (autoclean) [nfsd lockd]
msdos                   8176   1  (autoclean)
fat                    26228   1  (autoclean) [msdos]
============================================
The ip_masq_... modules are installed

do a 'ipchains -L'
============================================
Chain input (policy ACCEPT):
Chain forward (policy DENY):
target     prot opt     source                destination           ports
MASQ       all  ------  192.168.0.0/24        anywhere              n/a
Chain output (policy ACCEPT):
============================================
This will be strengthened later.

lastly do a 'ipmasqadm portfw -l'
============================================
prot localaddr            rediraddr               lport    rport  pcnt  pref
TCP  cr324145-a           hercules                 2039     2039    10    10
TCP  cr324145-a           hercules                 2038     2038    10    10
TCP  cr324145-a           hercules                 2037     2037    10    10
TCP  cr324145-a           hercules                 2036     2036    10    10
TCP  cr324145-a           hercules                 2035     2035    10    10
TCP  cr324145-a           hercules                 2034     2034    10    10
TCP  cr324145-a           hercules                 2033     2033    10    10
TCP  cr324145-a           hercules                 2032     2032    10    10
TCP  cr324145-a           hercules                 2031     2031    10    10
TCP  cr324145-a           hercules                 2030     2030    10    10
TCP  cr324145-a           hercules                 2029     2029    10    10
TCP  cr324145-a           hercules                 2028     2028    10    10
TCP  cr324145-a           hercules                 2027     2027    10    10
TCP  cr324145-a           hercules                 2026     2026    10    10
TCP  cr324145-a           hercules                 2025     2025    10    10
TCP  cr324145-a           hercules                 2024     2024    10    10
TCP  cr324145-a           hercules                 2023     2023    10    10
TCP  cr324145-a           hercules                 2022     2022    10    10
TCP  cr324145-a           hercules                 2021     2021    10    10
TCP  cr324145-a           hercules                 2020     2020    10    10
TCP  cr324145-a           hershel                  2019     2019    10    10
TCP  cr324145-a           hershel                  2018     2018    10    10
TCP  cr324145-a           hershel                  2017     2017    10    10
TCP  cr324145-a           hershel                  2016     2016    10    10
TCP  cr324145-a           hershel                  2015     2015    10    10
TCP  cr324145-a           hershel                  2014     2014    10    10
TCP  cr324145-a           hershel                  2013     2013    10    10
TCP  cr324145-a           hershel                  2012     2012    10    10
TCP  cr324145-a           hershel                  2011     2011    10    10
TCP  cr324145-a           hershel                  2010     2010    10    10
TCP  cr324145-a           hershel                  2009     2009    10    10
TCP  cr324145-a           hershel                  2008     2008    10    10
TCP  cr324145-a           hershel                  2007     2007    10    10
TCP  cr324145-a           hershel                  2006     2006    10    10
TCP  cr324145-a           hershel                  2005     2005    10    10
TCP  cr324145-a           hershel                  2004     2004    10    10
TCP  cr324145-a           hershel               cfinger  cfinger    10    10
TCP  cr324145-a           hershel                  2002     2002    10    10
TCP  cr324145-a           hershel                  2001     2001    10    10
TCP  cr324145-a           hershel                  2000     2000    10    10
TCP  cr324145-a           henry                     ftp      ftp    10    10
TCP  cr324145-a           henry                    smtp     smtp    10    10
TCP  cr324145-a           henry                     www      www    10    10
==============================================

Now from a host (that is configured correctly) on the private network, ping
a external site, say metalab.unc.edu (choose a not so busy site or busy time).

If that works, attempt to ftp an external site from a host on the private
network. - same with http.  Refer to the ipmasq Howto to trouble shoot if
there are problems.



Nigel Sim wrote:

> At this stage the information I have is a little vague but there may be
> enough here for someone to offer some suggestions.
> I had a working IP masquerading server running Debian 2.1 (Kernel 2.0.36). I
> upgraded the kernel to 2.2.8 (by hand compiling it etc, as opposed to using
> the package manager, for which 2.2.8 wasn't available). Things still worked.
> I then, in order to install the ICQ masquerading module, installed (using
> dselect) ipautofw (Automatic Packet Forwarding i believe) and on top of that
> I installed Squid with the idea to set up a caching http proxy. It was after
> the next restart that my IP masquerading, although it on the surface
> appeared to work, really didn't.
> From the computers on the local network you can start to connect to a web
> site but it will not get beyond "Site found, waiting for reply". Simularly
> when checking email it can connect, authorise and then say downloading
> message 1 of 10, but it doesn't get beyond that (ie, no progress into the
> download). ICQ also works a little. It connects, you can see who is on, but
> when you try to get someones info it complains you are not on the internet.
> The rules in IPChains havn't changed since it was working.
> Any Suggestions?
>
> Thanks
> Nigel


------------------------------

From: "Lee Sharp" <[EMAIL PROTECTED]>
Subject: Re: *BSD or Linux Based Computer Telephony development Products
Date: Mon, 24 May 1999 20:01:58 GMT

Hans Lambermont <[EMAIL PROTECTED]> wrote in article
<[EMAIL PROTECTED]>...
> In article
<[EMAIL PROTECTED]>,
>       Gong Wei <[EMAIL PROTECTED]> writes:

> > Is there any commercial products for computer telephony development on
> > *BSD and/or Linux exists today?
 
> http://www.quicknet.net have cards+(linux) drivers, and they are working
> with the http://www.openh323.org group afaik.

   Also check http://www.linuxtelephony.org/ for some other pointers.  A
nice portal...

                        Lee
-- 
SCSI is *NOT* magic. There are *fundamental technical reasons* why it is
necessary to sacrifice a young goat to your SCSI chain now and then. *
Black holes are where God divided by zero. - I am speaking as an
individual, not as a representative of any company, organization or other
entity.  I am solely responsible for my words.




------------------------------

From: "Doug Pitek" <[EMAIL PROTECTED]>
Subject: Re: Practice firewall
Date: Mon, 24 May 1999 15:33:39 -0400

a modem?!?

Mark Swope <[EMAIL PROTECTED]> wrote in message
news:YAh23.1824$[EMAIL PROTECTED]...
> My company is considering setting up an old box
> as a Linux Firewall.  However, my boss requested
> that we set it up to "test" it before we go on line.
>
> Can anyone think of a good way to set up a firewall,
> w/o a "live" connection to the Internet so that we
> can test operations and administration?
>
> Currently we don't have a dedicated connection
> to the internet, just a dynamic ISDN connection
> to our ISP...
>
> Thanks for suggestions,
> Mark Swope
>
>



------------------------------

From: [EMAIL PROTECTED] (Ray)
Subject: Re: Small private network woes - Still not working
Date: Mon, 24 May 1999 17:36:45 GMT


Your routing looks fine to me.  Are you sure you don't have a cabling
problem?  Can you see the transmit lights on the hub blink when you ping (by
ip address)?  Could you try connecting the two cards directly using a
cross-over cable?

-- 
Ray



On Sun, 23 May 1999 11:12:32 -0500, James R. Barnett, Jr. <[EMAIL PROTECTED]> wrote:
>Hi,
>       I appreciate all the help I have gotten but I still can't seem to find
>the problem. I am desparate and frustrated. If anyone could lookover the output
>of these commands and could post some suggestions, I would be very grateful.
>
>here is the output of route -n by arson (192.168.1.1):
>
>Kernel IP routing table
>Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
>208.128.7.17    0.0.0.0         255.255.255.255 UH    0      0        0 ppp0
>192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        3 eth0
>127.0.0.0       0.0.0.0         255.0.0.0       U     0      0        0 lo
>0.0.0.0         208.128.7.17    0.0.0.0         UG    0      0        8 ppp0
>
>here is ifconfig:
>
>lo        Link encap:Local Loopback  
>          inet addr:127.0.0.1  Bcast:127.255.255.255  Mask:255.0.0.0
>          UP BROADCAST LOOPBACK RUNNING  MTU:3584  Metric:1
>          RX packets:47 errors:0 dropped:0 overruns:0 frame:0
>          TX packets:47 errors:0 dropped:0 overruns:0 carrier:0
>          collisions:0 
>
>eth0      Link encap:Ethernet  HWaddr 00:10:5A:0B:50:2F  
>          inet addr:192.168.1.1  Bcast:192.168.1.255  Mask:255.255.255.0
>          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
>          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
>          TX packets:56 errors:0 dropped:0 overruns:0 carrier:0
>          collisions:0 
>          Interrupt:10 Base address:0x300 
>
>ppp0      Link encap:Point-to-Point Protocol  
>          inet addr:208.128.7.90  P-t-P:208.128.7.17  Mask:255.255.255.0
>          UP POINTOPOINT RUNNING  MTU:1500  Metric:1
>          RX packets:342 errors:1 dropped:1 overruns:0 frame:0
>          TX packets:318 errors:0 dropped:0 overruns:0 carrier:0
>          collisions:0 
>          Memory:12ec038-12ecc04 
>
>here is the output of route -n by tireiron (192.168.1.2):
>
>Kernel IP routing table
>Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
>192.168.1.1     0.0.0.0         255.255.255.255 UH    0      0      144 eth0
>192.168.1.0     0.0.0.0         255.255.255.0   U     0      0        5 eth0
>127.0.0.0       0.0.0.0         255.0.0.0       U     0      0       15 lo
>0.0.0.0         192.168.1.1  0.0.0.0         UG    0      0       26 eth0
>
>Here is the ifconfig for tireiron:
>
>lo        Link encap:Local Loopback  
>          inet addr:127.0.0.1  Bcast:127.255.255.255  Mask:255.0.0.0
>          UP BROADCAST LOOPBACK RUNNING  MTU:3584  Metric:1
>          RX packets:104337 errors:0 dropped:0 overruns:0 frame:0
>          TX packets:104337 errors:0 dropped:0 overruns:0 carrier:0
>          collisions:0 
>
>eth0      Link encap:Ethernet  HWaddr 00:10:5A:0C:9E:1C  
>          inet addr:192.168.1.2  Bcast:192.168.1.255  Mask:255.255.255.0
>          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
>          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
>          TX packets:258 errors:0 dropped:0 overruns:0 carrier:0
>          collisions:0 
>          Interrupt:10 Base address:0x300 
>
>Please, please, PLEASE help if you can. I have been working on this
>considerably every day for a week and feel like I am getting nowhere.
>
>Thanks in advance,
>
>James

------------------------------

From: [EMAIL PROTECTED] (Ted Potter)
Subject: Re: Frog! @home
Date: Mon, 24 May 1999 12:41:06 GMT
Reply-To: [EMAIL PROTECTED]


Perhaps the bad setting they refer to is the ip address they
gave you. I would check to be sure it is valid.





On Tue, 11 May 1999 00:52:56 GMT, ruben <[EMAIL PROTECTED]> wrote:

>Hi!
>
>We regard frogs as "ugly". As a mater of fact they are 
>very interesting creatures!
>
>By other hand, I have a frog in my house system.
>I use @home ISP (cable)
>
>I have two computers with two IP addresses.
>I use a Linksys hub (5) and two iqual Linksys LNE cards
>
>Coputer names aare
>
>Like this:
>
>1-  cc123456-a
>2-  cc123456-b
>
>The two computers can "see" each other.
>But the cc123456-b can not connect to Internet,
>
>If I use  name cc123456-a in the second computer.
>(after turning off the first),
>
>I get connection!
>
>If I use -b in the main computer, I CAN'T get on
>
>@home Customer Service told me that my second computer
>has a 'bad' setting.
>
>I can't swallow that because I only have to change the 
>last letter, a or b, to get the problem in each computer.
>
>Any hints?
>
>
>Thaaaaaaaanks!
>
>ruben


------------------------------

From: Jake Kim <[EMAIL PROTECTED]>
Crossposted-To: comp.os.linux.setup,comp.os.linux.admin,comp.os.linux.misc
Subject: Re: Samba and printing.
Date: 24 May 1999 20:31:23 GMT

In comp.os.linux.networking Nitin Mule <[EMAIL PROTECTED]> wrote:
: If you want to load all the printers, add this to your [global] section.
: Specify appropriate values for your system.

:  printing = bsd
:  load printers = yes
:  printcap name = /etc/printcap

Finally mine works.  Key was "printing = bsd".  Thanks.

Jake
[EMAIL PROTECTED]

------------------------------

From: [EMAIL PROTECTED]
Subject: Re: Multiple nic's
Date: Mon, 24 May 1999 20:39:01 GMT

Haven't done it, can't help directly, but maybe the "Mini-HowTo on
using multiple Ethernet adapters with Linux" will apply. It's at:

http://cesdis.gsfc.nasa.gov/linux/misc/multicard.html


"Tommy �s�n" <[EMAIL PROTECTED]> wrote:

>I have a machine with one RTL8029 based Nic and three RTL8019 Nic's.
>If i try to set up the RTL8019 based cards in netconf using different
>adresses it seems to work.
>But the next time i run netconf all the cards have the same io/irq
>adfresses!!
>
>Has anyone seen this before and is willing to help.
>
>/Tommy
>
>


------------------------------

From: Wayne Chan <[EMAIL PROTECTED]>
Subject: Stop netbios port 137, 138, 139 to bring up diald
Date: Tue, 25 May 1999 00:49:08 +0800

Hi all,

When I do a network neighborhood browsing in my Windows machine and try
to go into some shared folders on another Windows machines. My linux box
with diald will start dialling out to my ISP. How can I deny those
netbios packet from port 137, 138 & 139 in the diald.defs?

Regards,
Wayne


------------------------------

From: Dennis Wetzig <[EMAIL PROTECTED]>
Subject: Re: Newbie -  please help
Date: 24 May 1999 19:51:30 GMT


Hi, 

> I am using SuSE Linux 6.0 on both mashines. The network cards are recognized
> by the kernel (I think so). I am using the tulip driver with the "options=0"
> parameter. My problem is that I cant even ping the other mashine. I already
> read the net-howto but that didn't solve my problem either. Please help!!!!

did you use ifconfig? That the kernel recognizes the card does not
yet mean that it can actually use it.

You need to run ifconfig to assign an address to that card, set a
subnet mask, set a broadcast address, an MTU, etc. 

Also you need to set a routing table entry to tell the system that it
can access that particular network through that netdevice. 

You can run route and ifconfig without parameters to check the current
settings. 

There is the "Linux Networking Guide" (or something like that) out
there from the LDP...I think it might help you.

If you already did ifconfig and route, well then it's hard to say what
went wrong ;)

Hope that helps, 

        Dennis

------------------------------


** FOR YOUR REFERENCE **

The service address, to which questions about the list itself and requests
to be added to or deleted from it should be directed, is:

    Internet: [EMAIL PROTECTED]

You can send mail to the entire list (and comp.os.linux.networking) via:

    Internet: [EMAIL PROTECTED]

Linux may be obtained via one of these FTP sites:
    ftp.funet.fi                                pub/Linux
    tsx-11.mit.edu                              pub/linux
    sunsite.unc.edu                             pub/Linux

End of Linux-Networking Digest
******************************

Reply via email to