10-30-2007
Quote:
Originally Posted by
arunchaudhary19
As porter said that disabling firewall solves the problem of socket connection with the server
Ok, so we've established that there is no routing problem here. But now I am confused! You said that disabling the firewall solves the problem of socket connection. Then work with the firewall disabled (or better, allow access to your host to access the server, while still blocking other connections). Are you looking for a way to connect even if the firewall is blocking? I'm afraid that's not possible.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
We need to add our remote office to our linux routing table.
Our internal office ip addresses are all in the range of 198.9.200.x
with an subnet mask of 255.255.255.0
the remote office has ip addresses in the range of 192.168.0.0 and also a subnet mask of 255.255.255.0
when i use the... (3 Replies)
Discussion started by: progressdll
3 Replies
2. UNIX for Dummies Questions & Answers
I not able to ping outside the internet. i am able to ping my 192. ip address. when i try to ping a 68. ip address i get no route to host. what should i do to correct this issue. I have sco openserver 5.05 (6 Replies)
Discussion started by: scoman2
6 Replies
3. Red Hat
I get below error when using telnet and ssh ??
Why ? the ip address of linux server is 10.155.25.22 =tstgcota ??
# netstat -rn
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
192.168.75.0 0.0.0.0 255.255.255.0 U 0 0... (6 Replies)
Discussion started by: chuikingman
6 Replies
4. Programming
Hello,
My program should connect to a server. here's the code :
int main(int argc, char *argv){
int sock = socket(AF_INET, SOCK_STREAM, 0);
if(sock == -1){
perror("socket()");
exit(errno);
}
printf("retour socket = %d",sock);
struct sockaddr... (1 Reply)
Discussion started by: nowayy
1 Replies
5. AIX
Hi,
I have a system with network interfaces en0 and en1
en0:
physical ip: 1.1.1.10
virtual ip1: 192.168.100.11
virtual ip2: 192.168.100.12
en1:
physical ip: 1.1.1.20
virtual ip1: 192.168.100.20
virtual ip2: 192.168.100.21
default gateway ist 192.168.100.254
when I open a... (12 Replies)
Discussion started by: funksen
12 Replies
6. IP Networking
I have a unix machine that operates some CNC machines, I need to hook up my windows machine through core ftp to load programs onto the box.
The card i need to route to for the FTP on unix is tu1
I need to check the routing tables on the unix box to see which IP address will automatically... (2 Replies)
Discussion started by: moticulus
2 Replies
7. UNIX for Dummies Questions & Answers
A linux box is supposed to emailing the results of backups to the windows exchange server, but nothing arrives. it never has, as the muppet who set up the Windows domain knew nothing about linux. I know only slightly more than that...
pretty sure sendmail is the daemon running to handle mail. it... (0 Replies)
Discussion started by: Noewon
0 Replies
8. UNIX for Advanced & Expert Users
Hi,
I have installed RHEL4 using vmware workstation..
Host OS: Windows XP
Guest OS: RHEL4
Pls refer step 17 & 18 in below link...
ORACLE-BASE - Red Hat Enterprise Linux 4 and Centos 4 Installation
1) If i choose to assign IP automatically (using DHCP) means, i am able to connect RHEL4... (3 Replies)
Discussion started by: thomasraj87
3 Replies
9. Red Hat
Hi All,
I am new to Redhat Enterprise Linux 6 version. I am facing an issue with my lab server which is having RHEL6
lab1:root> uname -a
Linux lab1 2.6.32-358.18.1.el6.x86_64 #1 SMP Fri Aug 2 17:04:38 EDT 2013 x86_64 x86_64 x86_64 GNU/Linux
I am getting this error for every 18 minutes 30... (0 Replies)
Discussion started by: go2suresh1979
0 Replies
10. Shell Programming and Scripting
In program, I want to telnet the ports present in telnet.txt file and capture screenshot of open port which is opened on new terminal.
Problems:
Escape character is '^]' and Connection closed by foreign host.
Loop is not working properly. It only take one ports and closed the connection.
... (9 Replies)
Discussion started by: sk151993
9 Replies
LEARN ABOUT DEBIAN
pyroman
PYROMAN(8) System Manager's Manual PYROMAN(8)
NAME
pyroman - a firewall configuration utility
SYNOPSIS
pyroman
[ -hvnspP ] [ -r RULESDIR ] [ -t SECONDS ]
[ --help ] [ --version ] [ --safe ] [ --no-act ]
[ --print ] [ --print-verbose ] [ --rules=RULESDIR ]
[ --timeout=SECONDS ] [ safe ]
DESCRIPTION
pyroman is a firewall configuration utility.
It will compile a set of configuration files to iptables statements to setup IP packet filtering for you.
While it is not necessary for operating and using Pyroman, you should have understood how IP, TCP, UDP, ICMP and the other commonly used
Internet protocols work and interact. You should also have understood the basics of iptables in order to make use of the full
functionality.
pyroman does not try to hide all the iptables complexity from you, but tries to provide you with a convenient way of managing a complex
networks firewall. For this it offers a compact syntax to add new firewall rules, while still exposing access to add arbitrary iptables
rules.
OPTIONS
-r RULESDIR,--rules=RULES
Load the rules from directory RULESDIR instead of the default directory (usually /etc/pyroman )
-t SECONDS,--timeout=SECONDS
Wait SECONDS seconds after applying the changes for the user to type OK to confirm he can still access the firewall. This implies
--safe but allows you to use a different timeout.
-h, --help
Print a summary of the command line options and exit.
-V, --version
Print the version number of pyroman and exit.
-s, --safe, safe
When the firewall was committed, wait 30 seconds for the user to type OK to confirm, that he can still access the firewall (i.e. the
network connection wasn't blocked by the firewall). Otherwise, the firewall changes will be undone, and the firewall will be
restored to the previous state. Use the --timeout=SECONDS option to change the timeout.
-n, --no-act
Don't actually run iptables. This can be used to check if pyroman accepts the configuration files.
-p, --print
Instead of running iptables, output the generated rules.
-P, --print-verbose
Instead of running iptables, output the generated rules. Each statement will have one comment line explaining how this rules was
generated. This will usually include the filename and line number, and is useful for debugging.
CONFIGURATION
Configuration of pyroman consists of a number of files in the directory /etc/pyroman. These files are in python syntax, although you do
not need to be a python programmer to use these rules. There is only a small number of statements you need to know:
add_host
Define a new host or network
add_interface
Define a new interface (group)
add_service
Add a new service alias (note that you can always use e.g. www/tcp to reference the www tcp service as defined in /etc/services)
add_nat
Define a new NAT (Network Address Translation) rule
allow Allow a service, client, server combination
reject Reject access for this service, client, server combination
drop Drop packets for this service, client, server combination
add_rule
Add a rule for this service, client, server and target combination
iptables
Add an arbitrary iptables statement to be executed at beginning
iptables_end
Add an arbitrary iptables statement to be executed at the end
Detailed parameters for these functions can be looked up by caling
cd /usr/share/pyroman
pydoc ./commands.py
BUGS
None known as of pyroman-0.4 release
AUTHOR
pyroman was written by Erich Schubert <erich@debian.org>
SEE ALSO
iptables(8), iptables-restore(8) iptables-load(8)
PYROMAN(8)