Virtual Networking between Debian and Microsoft Windows systems
First of all, I'm not really looking for a detailed HOW-TO on how I
could build this system, although if there is such a thing I will
gladly read it. I'm mainly seeking discussion on the various methods
of implementing this system an
Virtual Networking between Debian and Microsoft Windows systems
First of all, I'm not really looking for a detailed HOW-TO on how I
could build this system, although if there is such a thing I will
gladly read it. I'm mainly seeking discussion on the various methods
of implementing this system a
Thor wrote:
Hi
I'm not sure I understand you correctly, but how about this:
## 0 == LOG
## 1 == DROP
## 2 == LOG & DROP
LOGTCP=2;
if [ $LOGTCP -eq 0 ]; then
#Log forbidden TCP datagrams
iptables -A TCP --protocol tcp -m limit --limit 1/minute \
--limit-burst 4 -j LOG --log-level DE
Thor wrote:
>Hi
>
>
>>I'm not sure I understand you correctly, but how about this:
>>
>>## 0 == LOG
>>## 1 == DROP
>>## 2 == LOG & DROP
>>LOGTCP=2;
>>if [ $LOGTCP -eq 0 ]; then
>>#Log forbidden TCP datagrams
>>iptables -A TCP --protocol tcp -m limit --limit 1/minute \
>> --limit-burst
On the question:
What about doing security updates automatically?
I don't know about the rest of you, but here is my opinion...
As a sysadmin, programmer, jack of to many trades I maintain a
number of systems under a number of different operating systems.
As such I have to keep track of b
On Fri Sep 07 2001 at 02:14:05PM +0200 'Marcin Krotkiewski' <[EMAIL PROTECTED]>
wrote:
> I'm quite aware this post is somewhat off-topic, but I couldn't find a
> proper list. Still I hope someone will be able to help me.
You should rather try the linux-net list.
$ echo subscribe linux-net | m
hi,
I'm quite aware this post is somewhat off-topic, but I couldn't find a
proper list. Still I hope someone will be able to help me.
And here is the problem...
How can I divide my network throughput between the users (not necessarily
evenly)?
I would like to limit the maximum speed with which s
On the question:
What about doing security updates automatically?
I don't know about the rest of you, but here is my opinion...
As a sysadmin, programmer, jack of to many trades I maintain a
number of systems under a number of different operating systems.
As such I have to keep track of
On Fri Sep 07 2001 at 02:14:05PM +0200 'Marcin Krotkiewski' <[EMAIL PROTECTED]> wrote:
> I'm quite aware this post is somewhat off-topic, but I couldn't find a
> proper list. Still I hope someone will be able to help me.
You should rather try the linux-net list.
$ echo subscribe linux-net | m
hi,
I'm quite aware this post is somewhat off-topic, but I couldn't find a
proper list. Still I hope someone will be able to help me.
And here is the problem...
How can I divide my network throughput between the users (not necessarily evenly)?
I would like to limit the maximum speed with which s
Hi
> I'm not sure I understand you correctly, but how about this:
>
> ## 0 == LOG
> ## 1 == DROP
> ## 2 == LOG & DROP
> LOGTCP=2;
> if [ $LOGTCP -eq 0 ]; then
> #Log forbidden TCP datagrams
> iptables -A TCP --protocol tcp -m limit --limit 1/minute \
> --limit-burst 4 -j LOG --log-le
I'm not sure I understand you correctly, but how about this:
## 0 == LOG
## 1 == DROP
## 2 == LOG & DROP
LOGTCP=2;
if [ $LOGTCP -eq 0 ]; then
#Log forbidden TCP datagrams
iptables -A TCP --protocol tcp -m limit --limit 1/minute \
--limit-burst 4 -j LOG --log-level DEBUG --log-prefix '
Hi
> I'm not sure I understand you correctly, but how about this:
>
> ## 0 == LOG
> ## 1 == DROP
> ## 2 == LOG & DROP
> LOGTCP=2;
> if [ $LOGTCP -eq 0 ]; then
> #Log forbidden TCP datagrams
> iptables -A TCP --protocol tcp -m limit --limit 1/minute \
> --limit-burst 4 -j LOG --log-l
Hi,
Once again I've re-written my firewall script. Only this time I've
attempted to make use of a few loops and if statements to make my script
prettier. I have no formal education in programming at all!! Please be
patient with me :-D For reference I have been using some of the well
writte
I'm not sure I understand you correctly, but how about this:
## 0 == LOG
## 1 == DROP
## 2 == LOG & DROP
LOGTCP=2;
if [ $LOGTCP -eq 0 ]; then
#Log forbidden TCP datagrams
iptables -A TCP --protocol tcp -m limit --limit 1/minute \
--limit-burst 4 -j LOG --log-level DEBUG --log-prefix
15 matches
Mail list logo