11-22-2012
So I have to add static route in S1 & S3 ? How can I tell S2 not to forward?Actually, I m new in unix environment. Would you please help me with command so that I can apply those in the terminal of S1 & S3.
FYI, from S3 I can only ping 192.168.100.1 not 10.10.8.48
Thanks for your reply & assistance.
Regards,
Imran
---------- Post updated at 06:05 PM ---------- Previous update was at 12:38 PM ----------
Can I use port forwarding to resolve this issue?
On S2 if I configure port forwarding like this 192.168.100.1:1443 -> 10.10.8.26:443, I will be able to access the application from S3 through https to 192.168.100.1:1443 ?
9 More Discussions You Might Find Interesting
1. IP Networking
:confused: HI,
We have 2 servers ( win 2003 + sun 5.8 ) and we run a rsh from the NT to the UNIX.
The program runs a shell script on the UNIX and waits for the answer in the EOF.
How ever, after period of appx 2 min there is a reply "Recv failed:Connection reset by peer".
while the... (5 Replies)
Discussion started by: eyalush
5 Replies
2. Shell Programming and Scripting
I use ssh to work on the server (OS X 10.4.x) remotely from home (Debian / OS X 10.5.3). If I leave my machine idle, I get disconnected after a couple of minutes. I get the following error message:
Read from remote host "server name": Connection reset by peer
Connection to "server name" closed.... (2 Replies)
Discussion started by: osxhawk
2 Replies
3. Shell Programming and Scripting
hi
i am connecting to a remote server using sftp protocol.
i am using the command like "sftp USER01@122.10.12.45"
then i got the error "Couldn't read packet: Connection reset by peer"
please help its very urgent (5 Replies)
Discussion started by: Satyak
5 Replies
4. IP Networking
hi all.
am running postgresql in a vm on debian server.
i have some client programs connecting to the db.
when i check the logs of postgresql i see "connection reset by peer"
can someone help me with this issue...
thanks. (1 Reply)
Discussion started by: coolatt
1 Replies
5. Solaris
hi everyone.
As a solaris/unix beginner, I am trying a peer-to-peer connection with my Sun and Windows.
Here is my setup:
-Windows XP
-Sun System (Netra T1) which is connected to the console of the WinXP machine.
-Windows XP has wireless connection which enables me to access internet ... (3 Replies)
Discussion started by: graboid888
3 Replies
6. UNIX for Advanced & Expert Users
Hello
I'm facing the above problem while doing a performance run. I've a script which I'm launching from my windows desktop using mozilla. The script will invoke backend action on a Solaris host which in turn feeds the records to a driver located on a linux box(Cent OS).
What's happening is... (1 Reply)
Discussion started by: subramanyab
1 Replies
7. IP Networking
I am looking for advice on a router. I am new to Linux and am trying to use Limewire and Ktorent and can make no connection. Limewire indicates I have a firewall. I have a Linksys router WRK54G and my guess is that is the problem. I have spent hours upon hours trying to get it to work using info... (0 Replies)
Discussion started by: Paul K
0 Replies
8. UNIX for Dummies Questions & Answers
I have created a script to cat the contents of a log file and pipe it to head and tail so I can get specific lines.
When I do this I sometimes randomly get the error
"cat: write error: Connection reset by peer". It is completely sporatic and sometimes it doesnt happen and sometimes it does... (4 Replies)
Discussion started by: atelford
4 Replies
9. Red Hat
Hi Guys,
I can't SSH to a remote system - connection reset by peer..any ideas ?
-The Source is Linux, the Remote is Windows
-The remote has OpenSSH running on Port 22 - Telnet confirms port is open
-User1 has a RSA2 Key (2048) key, which is capture in the 1010101-pub.key specified by the... (1 Reply)
Discussion started by: stevie_velvet
1 Replies
LEARN ABOUT CENTOS
ipsec__updown
_UPDOWN(8) Executable programs _UPDOWN(8)
NAME
ipsec__updown - kernel and routing manipulation script
SYNOPSIS
_updown is invoked by pluto when it has brought up a new connection. This script is used to insert the appropriate routing entries for
IPsec operation on some kernel IPsec stacks, such as KLIPS and MAST, and may do other necessary work that is kernel or user specific, such
as defining custom firewall rules. The interface to the script is documented in the pluto man page.
VARIABLES
The _updown is passed along a number of variables which can be used to act differently based on the information:
PLUTO_VERSION
indicates what version of this interface is being used. This document describes version 1.1. This is upwardly compatible with version
1.0.
PLUTO_VERB
specifies the name of the operation to be performed, which can be one of prepare-host, prepare-client, up-host, up-client, down-host or
down-client. If the address family for security gateway to security gateway communications is IPv6, then a suffix of -v6 is added to
this verb.
PLUTO_CONNECTION
is the name of the connection for which we are routing.
PLUTO_NEXT_HOP
is the next hop to which packets bound for the peer must be sent.
PLUTO_INTERFACE
is the name of the ipsec interface to be used.
PLUTO_ME
is the IP address of our host.
PLUTO_MY_CLIENT
is the IP address / count of our client subnet. If the client is just the host, this will be the host's own IP address / max (where max
is 32 for IPv4 and 128 for IPv6).
PLUTO_MY_CLIENT_NET
is the IP address of our client net. If the client is just the host, this will be the host's own IP address.
PLUTO_MY_CLIENT_MASK
is the mask for our client net. If the client is just the host, this will be 255.255.255.255.
PLUTO_PEER
is the IP address of our peer.
PLUTO_PEER_CLIENT
is the IP address / count of the peer's client subnet. If the client is just the peer, this will be the peer's own IP address / max
(where max is 32 for IPv4 and 128 for IPv6).
PLUTO_PEER_CLIENT_NET
is the IP address of the peer's client net. If the client is just the peer, this will be the peer's own IP address.
PLUTO_PEER_CLIENT_MASK
is the mask for the peer's client net. If the client is just the peer, this will be 255.255.255.255.
PLUTO_MY_PROTOCOL
lists the protocols allowed over this IPsec SA.
PLUTO_PEER_PROTOCOL
lists the protocols the peer allows over this IPsec SA.
PLUTO_MY_PORT
lists the ports allowed over this IPsec SA.
PLUTO_PEER_PORT
lists the ports the peer allows over this IPsec SA.
PLUTO_MY_ID
lists our id.
PLUTO_PEER_ID
lists our peer's id.
PLUTO_PEER_CA
lists the peer's CA.
SEE ALSO
ipsec(8), ipsec_pluto(8).
HISTORY
Man page written for the Linux FreeS/WAN project <http://www.freeswan.org/> by Michael Richardson. Original program written by Henry
Spencer.
AUTHOR
Paul Wouters
placeholder to suppress warning
libreswan 12/16/2012 _UPDOWN(8)