Sponsored Content
Operating Systems OS X (Apple) OS X Support RSS Using iChat with a firewall or NAT router Post 302246519 by Linux Bot on Monday 13th of October 2008 10:20:02 PM
Old 10-13-2008
Using iChat with a firewall or NAT router

When using iChat with NAT routers and firewalls, certain ports must be open to allow video and audio conferencing behind a firewall. Some devices have these ports open by default, while others require configuration. Note: This article lists all ports used by iChat, not just those used by audio/visual content. A list of individual port functions can be found in "'Well known' TCP and UDP ports used by Apple software products".

More from Apple OS X Support ...
 

6 More Discussions You Might Find Interesting

1. Cybersecurity

Help needed in IPTables firewall/router setup - Linux

HI all, I have setup IPTables firewall/Router and my home network, with address space 192.168.10.XXX Form my private network hosts, i can ping the gateway ( 192.168.10.101 ) , but the reverse is not happening. Can someone help me as of what i need to do, so that i can ping my private... (1 Reply)
Discussion started by: chandan_m
1 Replies

2. Solaris

building solaris-based enterprise router-firewall project

hi guys, its been a while since my last visit here, could not keep up the pace on this ever changing industry :) i'd just doing my home research under vmware to make a solaris-based router-firewall using zones - doing a lot of reading about zones & review solaris zone functionality. and... (4 Replies)
Discussion started by: stdout
4 Replies

3. UNIX for Dummies Questions & Answers

Remote Unix printing to my WinXP works with no router. How can I make it work through my router?

I set up remote printing on a clients Unix server to my Windows XP USB printer. My USB printer is connected directly to my PC (no print server and no network input on printer). With my Win XP PC connected to my cable modem (without the router), i can do lp -dhp842c /etc/hosts and it prints. I... (7 Replies)
Discussion started by: jmhohne
7 Replies

4. IP Networking

NAT Forwarding Issue Endian and Vyatta Firewall

I've experienced this same issue with both the Endian Firewall Appliance and a Vyatta Firewall Appliance. Conversely, it works with a Draytek Firewall/Router. I am trying to forward port 80 traffic to my internal web server which is located on the /24 subnet. I have an external static IP which... (0 Replies)
Discussion started by: mboudro
0 Replies

5. IP Networking

Solaris 11 Express NAT/Router IP Fragments

Upon replacing my linux router/server with a Solaris one I've noticed very poor network performance. The server itself has no issues connecting to the net, but clients using the server as a router are getting a lot of IP fragments as indicated from some packet sniffing I conducted. Here was my... (3 Replies)
Discussion started by: vectox
3 Replies

6. IP Networking

iptables nat/masquerade - how to act as a basic firewall?

edit: SOLVED - see below for solution Hi there, I've inherited a gob of Linux hosts and so am learning linux from the bottom of the deep end of the pool (gotta say I'm warming up to Linux though - it's not half bad) Right now iptables is confusing me and I could use some pointers as to how... (0 Replies)
Discussion started by: Smiling Dragon
0 Replies
RFC6056(7)					       BSD Miscellaneous Information Manual						RFC6056(7)

NAME
rfc6056 -- port randomization algorithms DESCRIPTION
The rfc6056 algorithms are used in order to randomize the port allocation of outgoing UDP packets, in order to provide protection from a series of ``blind'' attacks based on the attacker's ability to guess the sequence of ephemeral ports associated with outgoing packets. For more information consult RFC 6056. The individual algorithms are described below: The RFC 6056 algorithms The following algorithms are available: bsd This is the default NetBSD port selection algorithm, which starts from anonportmax and proceeds decreasingly through the avail- able ephemeral ports. random_start Select ports randomly from the available ephemeral ports. In case a collision with a local port is detected, the algorithm proceeds decreasingly through the sequence of ephemeral ports until a free port is found. Note that the random port selection algorithms are not guaranteed to find a free port. random_pick Select ports randomly from the available ephemeral ports. In case a collision with a local port is detected the algorithm tries selecting a new port randomly until a free port is found. hash Select ports using a md5(3) hash of the local address, the foreign address, and the foreign port. Note that in the case of a bind(2) call some of this information might be unavailable and the port selection is delayed until the time of a connect(2) call, performed either explicitly or up calling sendto(2). doublehash Select ports using a md5(3) hash of the local address, foreign address, and foreign port coupled with a md5(3) hash of the same components obtained using a separate table that is associated with a subset of all outgoing connections. The same considera- tions regarding late connection as in the case of hash apply. randinc Use random increments in order to select the next port. SYSCTL CONTROLS
The following sysctl controls are available for selecting the default port randomization algorithm: sysctl name Type Changeable net.inet.udp.rfc6056.available string no net.inet.udp.rfc6056.selected string yes net.inet6.udp6.rfc6056.available string no net.inet6.udp6.rfc6056.selected string yes SOCKET OPTIONS
The socket option UDP_RFC6056ALGO at the IPPROTO_UDP level can be used with a string argument specifying the algorithm's name in order to select the port randomization algorithm for a specific socket. For more info see setsockopt(2). SEE ALSO
setsockopt(2), sysctl(3), sysctl(7) HISTORY
The rfc6056 algorithms first appeared in NetBSD 6.0. BSD
August 25, 2011 BSD
All times are GMT -4. The time now is 03:18 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy