| Forum Home | ||||
| Press F1 | ||||
| Thread ID: 40447 | 2003-12-08 08:07:00 | Mandrake 9.1 Gateway - attn. bmason | [linux] mb0o53 (4863) | Press F1 |
| Post ID | Timestamp | Content | User | ||
| 198412 | 2003-12-09 09:02:00 | If you are running a linux host do a traceroute on your DNS server. You will probably need to su to root. If you are doing it from a Windows machine you can do tracert. This will give you each of the IP addresses the packet travels through to get to the source. One of them should be the smoothwall box, but looking at the information you have already given I suspect that it won't. ;) |
Gorela (901) | ||
| 198413 | 2003-12-09 09:53:00 | > Primary DNS: 202.27.184.3 This should ideally be the IP of smoothwalls green interface so that DNS requests will go through its server which caches requests. > Secondary DNS: 202.27.184.5 Or blank if you don't want to set it. |
bmason (508) | ||
| 198414 | 2003-12-09 10:09:00 | Smoothwall should be the first entry in the traceroute. On linux the command is "traceroute", on windows "tracert". eg for me (smoothie is 192.168.0.1): # traceroute www.google.com traceroute to www.google.com (216.239.57.99), 30 hops max, 38 byte packets 1 seabiscuit (192.168.0.1) 22.874 ms 2.013 ms 1.752 ms 2 202-0-46-161.paradise.net.nz (202.0.46.161) 107.656 ms 105.969 ms 109.916 ms 3 202-0-46-166.paradise.net.nz (202.0.46.166) 109.901 ms 106.057 ms 109.720 ms etc... The "route" command should also show you, again for me the default gateway is set to smoothie: # route Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 192.168.0.0 * 255.255.255.0 U 0 0 0 eth0 127.0.0.0 * 255.0.0.0 U 0 0 0 lo default seabiscuit 0.0.0.0 UG 0 0 0 eth0 Does your router have any configuration options to restrict which computers can connect to it directly? |
bmason (508) | ||
| 198415 | 2003-12-10 03:43:00 | ok i have got it all working now :) thanks guys for the help, one more thing, i use dc++, to be active without smoothie, i had to pinhole a port in the router to use, which was port 666, how do i go about pinholing this port in smoothie? | [linux] mb0o53 (4863) | ||
| 198416 | 2003-12-10 09:22:00 | On the router you will need to pinhole it to the smoothie machine . Then set up smoothie to forward the port too . On the web interface its under networking . Since its a privileged port (< 1024), you will also need to allow it on the external servifce access page (this step may not be necessary with 2 . 0) . The smoothwall manual/online help has more detailed instructions . |
bmason (508) | ||
| 198417 | 2003-12-10 09:59:00 | ok, have it all working now, thanks a lot :) | [linux] mb0o53 (4863) | ||
| 198418 | 2003-12-10 10:57:00 | I just visited www.grc.com to test the firewall using ShieldsUP!, but failed in some areas: Solicited TCP Packets: RECEIVED (FAILED) As detailed in the port report below, one or more of your system's ports actively responded to our deliberate attempts to establish a connection. It is generally possible to increase your system's security by hiding it from the probes of potentially hostile hackers. Please see the details presented by the specific port links below, as well as the various resources on this site, and in our extremely helpful and active user community. the port that responded, even though it was closed to connections, was port 0, how can i stop this port responding? Also how do i stop people being able to access my reverse DNS (port-***-**-***-***.jet.net.nz) Any help would be appreciated, -jordan |
[linux] mb0o53 (4863) | ||
| 1 2 | |||||