Sponsored Content
Full Discussion: iptables question
Special Forums IP Networking iptables question Post 302840887 by DGPickett on Tuesday 6th of August 2013 04:17:44 PM
Old 08-06-2013
How did port 14450 get involved? Does the sender have a specific from port? How does port 33333 relate to the iptables?
 

8 More Discussions You Might Find Interesting

1. IP Networking

IPtables

Hey guys, I have just started using IP tables and was wondering if anyone could direct me to any good online resources as I am totally new to this. Thanks. (1 Reply)
Discussion started by: 182x
1 Replies

2. Linux

iptables question need help

Description i used iptables firewall is a month,running is favorable.it is failed when i connecting to my server on time.the servers' web service and all ports did not connect.i remote login the other server and through intranet address login this server then i restart iptables .but through... (0 Replies)
Discussion started by: proceed
0 Replies

3. IP Networking

Need help with iptables

Trying to create a whitelist to limit bandwidth. My sync speed is 1536/256 kbps. Simple rules in order: 1. Do not limit (or set to 1536/256) MAC 00:00:00:00:00 (computer is in 192.168.1.0/24). 2. Do not limit (or set to 1536/256) MAC 00:00:00:00:01 (computer is in 192.168.1.0/24). 3. Do not... (1 Reply)
Discussion started by: kripz
1 Replies

4. IP Networking

Iptables

What should be the iptables rule so that only the subnet 64.61.11.224/255.255.255.248 may access the mysql port 3306 (1 Reply)
Discussion started by: proactiveaditya
1 Replies

5. IP Networking

IPTables question

Hope someone can help cus m really stuck. Im pretty good at making basic IPTables rules to get what i need done, but this one has me beat. I have only 1 Nic in my linux box , and its setup as a trunk to my switch. I have 5 vlans setup on it: eth0.1000 eth0.1001 eth0.1002 eth0.1003... (0 Replies)
Discussion started by: UKShark
0 Replies

6. UNIX for Dummies Questions & Answers

help with iptables

Hi, On the IPTABLES, I did iptables --flush. I want to start fresh. Now I only want two things. Allow one ip address to this server. Allow port 443 as incoming from every where. Please advice how to do this. This is what I did so for. iptables -I INPUT -i eth0 -s 1.2.3.4 -j ACCEPT... (5 Replies)
Discussion started by: samnyc
5 Replies

7. Cybersecurity

iptables question.

I am setting up a new squid daemon to run on my server. I want to make sure that everyone inside my network can access squid but I want to make sure everyone on the internet is blocked. eth0 is connected to my internal LAN via: 192.168.0.5/255.255.255.0 eth1 is connected to the internet via:... (1 Reply)
Discussion started by: nondescriptciti
1 Replies

8. UNIX for Advanced & Expert Users

Multi-table iptables Question

I have a question regarding IPTables packet flow, that I am hoping I can get an answer to. We have a fairly advanced implementation of IPTables that I am trying to convert into a third party product and I am not quite certain on the packet flow in the current IPTables implementation. We are... (2 Replies)
Discussion started by: knightfirefx
2 Replies
UDPLITE(4)						   BSD Kernel Interfaces Manual 						UDPLITE(4)

NAME
udplite -- Lightweight User Datagram Protocol SYNOPSIS
#include <sys/types.h> #include <sys/socket.h> #include <netinet/udplite.h> int socket(AF_INET, SOCK_DGRAM, IPPROTO_UDPLITE); DESCRIPTION
The UDP-Lite protocol provides a partial checksum which allows corrupted packets to be transmitted to the receiving application. This has advantages for some types of multimedia transport that may be able to make use of slightly damaged datagrams, rather than having them dis- carded by lower-layer protocols. UDP-Lite supports a number of socket options which can be set with setsockopt(2) and tested with getsockopt(2): UDPLITE_SEND_CSCOV This option sets the sender checksum coverage. A value of zero indicates that all sent packets will have full checksum coverage. A value of 8 to 65535 limits the checksum coverage of all sent packets to the value given. UDPLITE_RECV_CSCOV This option is the receiver-side analogue. A value of zero instructs the kernel to drop all received packets not having full checksum coverage. A value of 8 to 65535 instructs the kernel to drop all received packets with a partial checksum coverage smaller than the value specified. ERRORS
A socket operation may fail with one of the following errors returned: [EISCONN] when trying to establish a connection on a socket which already has one, or when trying to send a datagram with the desti- nation address specified and the socket is already connected; [ENOTCONN] when trying to send a datagram, but no destination address is specified, and the socket has not been connected; [ENOBUFS] when the system runs out of memory for an internal data structure; [EADDRINUSE] when an attempt is made to create a socket with a port which has already been allocated; [EADDRNOTAVAIL] when an attempt is made to create a socket with a network address for which no network interface exists. SEE ALSO
getsockopt(2), recv(2), send(2), socket(2) BSD
October 1, 2014 BSD
All times are GMT -4. The time now is 09:51 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy