Sponsored Content
Special Forums IP Networking publishing 192.168 address internally Post 302177312 by vertical98 on Thursday 20th of March 2008 04:26:19 PM
Old 03-20-2008
publishing 192.168 address internally

OK this is what I want to do:

On server1 I want to type <ping server2> and be able to get:

pinging 192.168.0.12 ...... etc.

and by server2, I mean one-word, not server2.example.com

I know if I add the addresses to /etc/hosts I can achieve this, but I would like to not have to update all the hosts files when I add a server or change an IP.

I have 2 nameservers with tinydns running on the external nic and dnscache running on the internal.

So, is it possible to get dnscache / tinydns to publish a one-word alias that points to 192 addresses?

Thanks

Alan

addendum: The original reason I wanted to do this is I want to use the software from Unattended.sourceforge.net.
This is what they say:

Now please extend the configuration of your dns server. The Unattended server must be reachable with the name "ntinstall". Please configure an appropriate alias (CNAME). There may be problem when connecting to Windows 2000 or Windows Server 2003-based computer using this alias. Please look at following MS article

You will find plenty of documentation about this on the net.

Well, I found lots on Cnames pointing to FQDNs (ie Yahoo!) but nothing about ntinstall pointing to 192.168.0.12.

Again any help would appreciated.

Last edited by vertical98; 03-20-2008 at 07:19 PM.. Reason: Added more info
 

7 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

how does sleep work internally?

hi can someone explain how the sleep() function actually works, like where is it defined, wat files does it refer etc...? (1 Reply)
Discussion started by: meetbhattu
1 Replies

2. HP-UX

XIO: fatal IO error 232 (Connection reset by peer) on X server "192.168.1.239:0.0"

Hi All... I'm newbie here..., i have problem when installing oracle9206, i use HPUX 11.11, i'm using Xmanager enterprise 2.1 for forwarding from server A to my laptop # export DISPLAY=192.168.1.239:0.0 # echo $DISPLAY output ==> 192.168.1.239:0.0 at the oracle directory, i execute ... (3 Replies)
Discussion started by: grimanda
3 Replies

3. Shell Programming and Scripting

cat/delete per line any word "192.168.1.12"

Hi All Can u help me.. My problem is delete word per line sample: cat /tmp/file.txt monitor 192.168.1.11 Copying files in current directory 1 monitor 192.168.1.1 Copying files in current directory 2 monitor 192.168.1.12 Copying files in current directory 3 monitor 192.168.1.14... (1 Reply)
Discussion started by: carnegiex
1 Replies

4. AIX

Mail bounced back externally - internally ok.

I am unable to send mail externally. It gets refused from any mail server. Here's my current config: oslevel -s 5300-07-05-0831 ******** mail -v foo@yahoo.com < /tmp/oracle.out Warning: .cf file is out of date: sendmail AIX5.3/8.13.4 supports version 10, .cf file is version 9... (3 Replies)
Discussion started by: gravy26
3 Replies

5. Red Hat

How to expose a box on the 63.x subnet with a route to the 192?

Hi all, I'm trying to expose a CentOS box on the 63.x subnet with a route to the 192 as our firewall doesn't allow a VPN. Would someone please let me know how I can do this? Thanks (0 Replies)
Discussion started by: tezarin
0 Replies

6. Shell Programming and Scripting

Matching filenames and modifying them internally

hi i am trying to match filenames and modify the files internally depending on the match the filenames are something like this cm01FEB2012bhav cm01AUG2012bhav ... Internally the file(cm01FEB2012bhav) looks like this 20MICRONS,EQ,64.1,65.7,62.45,63.7,64.5,64.1,113043,01-FEB-2012... (4 Replies)
Discussion started by: adarsh1993
4 Replies

7. Cybersecurity

DSL Modem 192.168.a.b botnet member me?

I need a hint or a clue. Some four weeks or even more I try to change the password for my wifi access of the DSL Router without success. I access 192.168.x.x and filling in username as well as the password I am stuck. Literally nothing happens and the support line tells me that this is not... (2 Replies)
Discussion started by: 1in10
2 Replies
SHOREWALL-EXCLUSION(5)						  [FIXME: manual]					    SHOREWALL-EXCLUSION(5)

NAME
exclusion - Exclude a set of hosts from a definition in a shorewall configuration file. SYNOPSIS
!address-or-range[,address-or-range]... !zone-name[,zone-name]... DESCRIPTION
The first form of exclusion is used when you wish to exclude one or more addresses from a definition. An exclaimation point is followed by a comma-separated list of addresses. The addresses may be single host addresses (e.g., 192.168.1.4) or they may be network addresses in CIDR format (e.g., 192.168.1.0/24). If your kernel and iptables include iprange support, you may also specify ranges of ip addresses of the form lowaddress-highaddress No embedded whitespace is allowed. Exclusion can appear after a list of addresses and/or address ranges. In that case, the final list of address is formed by taking the first list and then removing the addresses defined in the exclusion. Beginning in Shorewall 4.4.13, the second form of exclusion is allowed after all and any in the SOURCE and DEST columns of /etc/shorewall/rules. It allows you to omit arbitrary zones from the list generated by those key words. Warning If you omit a sub-zone and there is an explicit or explicit CONTINUE policy, a connection to/from that zone can still be matched by the rule generated for a parent zone. For example: /etc/shorewall/zones: #ZONE TYPE z1 ip z2:z1 ip ... /etc/shorewall/policy: #SOURCE DEST POLICY z1 net CONTINUE z2 net REJECT /etc/shorewall/rules: #ACTION SOURCE DEST PROTO DEST # PORT(S) ACCEPT all!z2 net tcp 22 In this case, SSH connections from z2 to net will be accepted by the generated z1 to net ACCEPT rule. In most contexts, ipset names can be used as an address-or-range. Beginning with Shorewall 4.4.14, ipset lists enclosed in +[...] may also be included (see shorewall-ipsets[1] (5)). The semantics of these lists when used in an exclusion are as follows: o !+[set1,set2,...setN] produces a packet match if the packet does not match at least one of the sets. In other words, it is like NOT match set1 OR NOT match set2 ... OR NOT match setN. o +[!set1,!set2,...!setN] produces a packet match if the packet does not match any of the sets. In other words, it is like NOT match set1 AND NOT match set2 ... AND NOT match setN. EXAMPLES
Example 1 - All IPv4 addresses except 192.168.3.4 !192.168.3.4 Example 2 - All IPv4 addresses except the network 192.168.1.0/24 and the host 10.2.3.4 !192.168.1.0/24,10.1.3.4 Example 3 - All IPv4 addresses except the range 192.168.1.3-192.168.1.12 and the network 10.0.0.0/8 !192.168.1.3-192.168.1.12,10.0.0.0/8 Example 4 - The network 192.168.1.0/24 except hosts 192.168.1.3 and 192.168.1.9 192.168.1.0/24!192.168.1.3,192.168.1.9 Example 5 - All parent zones except loc any!loc FILES
/etc/shorewall/hosts /etc/shorewall/masq /etc/shorewall/rules /etc/shorewall/tcrules SEE ALSO
shorewall(8), shorewall-accounting(5), shorewall-actions(5), shorewall-blacklist(5), shorewall-hosts(5), shorewall_interfaces(5), shorewall-ipsets(5), shorewall-maclist(5), shorewall-masq(5), shorewall-nat(5), shorewall-netmap(5), shorewall-params(5), shorewall-policy(5), shorewall-providers(5), shorewall-proxyarp(5), shorewall-rtrules(5), shorewall-routestopped(5), shorewall-rules(5), shorewall.conf(5), shorewall-secmarks(5), shorewall-tcclasses(5), shorewall-tcdevices(5), shorewall-tcrules(5), shorewall-tos(5), shorewall-tunnels(5), shorewall-zones(5) NOTES
1. shorewall-ipsets http://www.shorewall.net/manpages/shorewall-ipsets.html [FIXME: source] 06/28/2012 SHOREWALL-EXCLUSION(5)
All times are GMT -4. The time now is 06:14 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy