Jonathan,
A cursory look through your config looks ok, similar to mine (which *is*
working ;-).
One question, could the packets be being dropped by a firewall? Are you
running ipf/ipfirewall/ipfw?
Jonathan Reeder wrote:
First off, sorry if this has come through twice, I tried to send it last
we
First off, sorry if this has come through twice, I tried to send it last
week but don't think it made it through:
I've got MPD v3.18 up and running on my FreeBSD 4.9. All seems to be going
well, clients can connect via PPTP, but once connected, they cannot actually
access my internal network. So
On Wed, 15 Sep 2004, Eric W. Bates wrote:
>
>
> Sten Spans wrote:
>
> >
> > What about:
> >
> > ipfw add allow tcp from evil/24 to any port 445 setup limit src-addr 4
> > ipfw add allow tcp from evil/24 to any port 139 setup limit src-addr 4
> >
> > To limit the amount of evil connections, place a
Sten Spans wrote:
What about:
ipfw add allow tcp from evil/24 to any port 445 setup limit src-addr 4
ipfw add allow tcp from evil/24 to any port 139 setup limit src-addr 4
To limit the amount of evil connections, place above the regular
keep-state rule.
That looks good. I should have RTFM.
Is it
On Tue, 14 Sep 2004, Pat Lashley wrote:
> --On Tuesday, September 14, 2004 20:59:43 -0400 "Eric W. Bates" <[EMAIL PROTECTED]>
> wrote:
>
> > It's a small store. Folks with broken computers bring the
> > machines in because "It doesn't work". They usually don't
> > know what is wrong with any giv
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Pat Lashley wrote:
| --On Tuesday, September 14, 2004 20:59:43 -0400 "Eric W. Bates"
| <[EMAIL PROTECTED]> wrote:
|
|> It's a small store. Folks with broken computers bring the
|> machines in because "It doesn't work". They usually don't
|> know what