Sponsored Content
Top Forums UNIX for Dummies Questions & Answers Making webpy framework accessible from outside the local network Post 302879790 by bakunin on Sunday 15th of December 2013 10:48:23 AM
Old 12-15-2013
This is what i expected:

Quote:
Originally Posted by frad
eth0 Link encap:Ethernet HWaddr dc:0e:a1:ba:82:1c
inet addr:192.168.178.** Bcast:192.168.178.*** Mask:255.255.255.0
You see, 192.168.178.x is exactly what i have written about above: you can't make that accessible from the internet (directly), because you absolutely need NAT in between this server and the internet. Usually you request and receive the right to use a certain IP-range (from the biggest networks down to single addresses) from some authority administrating the superset of this network/address. Ultimately this ends up at IANA (Internet Assigned Numbers Authority), which is responsible for the whole TCP/IP-Address range.

"Private Address Space" means, that everybody is entitled to use these addresses without asking anybody, but in return is not guaranteed to have a unique address. Unique addresses are the basis for the internet, though, and all network hardware (routers, routing switches, ...) is required to be able to filter these adresses. Actually exactly this is done at every internet providers network entrance. Even if you manage to get such packet out of your local network it would be dropped silently at the first router it encounters.

What your router/modem now does is called NAT (Network Address Translation): when it connects to your provider it is given a single official IP-address for its "outside"-interface. The "inside"-interface gets some local (private) address. When one of your systems try to connect to somewhere outside the router intercepts these packets, rewrites them using its official "outside"-IP and connects to the requested server itself. As an answer comes back it rewrites the package again using its "inside" address and then transmits it into the local network. This way the local addresses are never seen outside the local network.

This means you have to configure your router accordingly to allow for requests from outside to be directed to your webserver inside and the requests and answers be rewritten properly.

Further it means that you need to register your router at some dynamic DNS service (Dyn-DNS or something equivalent) because the IP address your router gets is perhaps not always the same. In this case your service should at least be reachable via a constant name (say "your.service.com") even if this name resolves to some dynamic IP address.

Before i forget: some Internet providers explicitly forbid in their contracts to advertise a service (=operate a server) from standard connection (this makes technically no sense, but so it is), so make sure your attempts do not constitute a breach of contract. You might lose your internet connection.

I hope this helps.

bakunin
 

2 More Discussions You Might Find Interesting

1. IP Networking

ssh server is attachable from local network not from another network

hello i have a ubuntu ssh server that i can acess from any of my comnputers but only if they are on the same wireless network as the server. i tested trhis my tehtehring my samsung blackjack to my windows partition and installing openssh to windows it works when windows is on the wireless but no... (1 Reply)
Discussion started by: old noob
1 Replies

2. Infrastructure Monitoring

SF4800 SC not accessible thru network

Hi All, I have my SC setup as attached below but I am having problem accessing the port thru network. sc0 was accessible only after i failed over the configuratios to sc1 (now then sc1 was not pingable :(). Just wondering is there anything wrong with my sc settings? Appreciate your advice. ... (4 Replies)
Discussion started by: honmin
4 Replies
CARP(4) 						   BSD Kernel Interfaces Manual 						   CARP(4)

NAME
carp -- Common Address Redundancy Protocol SYNOPSIS
device carp DESCRIPTION
The carp interface is a pseudo-device that implements and controls the CARP protocol. CARP allows multiple hosts on the same local network to share a set of IP addresses. Its primary purpose is to ensure that these addresses are always available, but in some configurations carp can also provide load balancing functionality. A carp interface can be created at runtime using the ifconfig carpN create command or by configuring it via cloned_interfaces in the /etc/rc.conf file. To use carp, the administrator needs to configure at minimum a common virtual host ID (VHID) and virtual host IP address on each machine which is to take part in the virtual group. Additional parameters can also be set on a per-interface basis: advbase and advskew, which are used to control how frequently the host sends advertisements when it is the master for a virtual host, and pass which is used to authenticate carp advertisements. The advbase parameter stands for ``advertisement base''. It is measured in seconds and specifies the base of the advertisement interval. The advskew parameter stands for ``advertisement skew''. It is measured in 1/256 of seconds. It is added to the base advertisement interval to make one host advertise a bit slower that the other does. Both advbase and advskew are put inside CARP adver- tisements. These configurations can be done using ifconfig(8), or through the SIOCSVH ioctl(2). Additionally, there are a number of global parameters which can be set using sysctl(8): net.inet.carp.allow Accept incoming carp packets. Enabled by default. net.inet.carp.preempt Allow virtual hosts to preempt each other. It is also used to failover carp interfaces as a group. When the option is enabled and one of the carp enabled physical interfaces goes down, advskew is changed to 240 on all carp interfaces. See also the first example. Disabled by default. net.inet.carp.log Value of 0 disables any logging. Value of 1 enables logging state changes of carp interfaces. Values above 1 enable logging of bad carp packets. Default value is 1. net.inet.carp.arpbalance Balance local traffic using ARP (see below). Disabled by default. net.inet.carp.suppress_preempt A read only value showing the status of preemption suppression. Preemption can be suppressed if link on an inter- face is down or when pfsync(4) interface is not synchronized. Value of 0 means that preemption is not suppressed, since no problems are detected. Every problem increments suppression counter. ARP level load balancing The carp has limited abilities for load balancing the incoming connections between hosts in Ethernet network. For load balancing operation, one needs several CARP interfaces that are configured to the same IP address, but to a different VHIDs. Once an ARP request is received, the CARP protocol will use a hashing function against the source IP address in the ARP request to determine which VHID should this request belong to. If the corresponding CARP interface is in master state, the ARP request will be replied, otherwise it will be ignored. See the EXAMPLES section for a practical example of load balancing. The ARP load balancing has some limitations. First, ARP balancing only works on the local network segment. It cannot balance traffic that crosses a router, because the router itself will always be balanced to the same virtual host. Second, ARP load balancing can lead to asym- metric routing of incoming and outgoing traffic, and thus combining it with pfsync(4) is dangerous, because this creates a race condition between balanced routers and a host they are serving. Imagine an incoming packet creating state on the first router, being forwarded to its destination, and destination replying faster than the state information is packed and synced with the second router. If the reply would be load balanced to second router, it will be dropped due to no state. EXAMPLES
For firewalls and routers with multiple interfaces, it is desirable to failover all of the carp interfaces together, when one of the physical interfaces goes down. This is achieved by the preempt option. Enable it on both host A and B: sysctl net.inet.carp.preempt=1 Assume that host A is the preferred master and 192.168.1.x/24 is configured on one physical interface and 192.168.2.y/24 on another. This is the setup for host A: ifconfig carp0 create ifconfig carp0 vhid 1 pass mekmitasdigoat 192.168.1.1/24 ifconfig carp1 create ifconfig carp1 vhid 2 pass mekmitasdigoat 192.168.2.1/24 The setup for host B is identical, but it has a higher advskew: ifconfig carp0 create ifconfig carp0 vhid 1 advskew 100 pass mekmitasdigoat 192.168.1.1/24 ifconfig carp1 create ifconfig carp1 vhid 2 advskew 100 pass mekmitasdigoat 192.168.2.1/24 Because of the preempt option, when one of the physical interfaces of host A fails, advskew is adjusted to 240 on all its carp interfaces. This will cause host B to preempt on both interfaces instead of just the failed one. In order to set up an ARP balanced virtual host, it is necessary to configure one virtual host for each physical host which would respond to ARP requests and thus handle the traffic. In the following example, two virtual hosts are configured on two hosts to provide balancing and failover for the IP address 192.168.1.10. First the carp interfaces on host A are configured. The advskew of 100 on the second virtual host means that its advertisements will be sent out slightly less frequently. ifconfig carp0 create ifconfig carp0 vhid 1 pass mekmitasdigoat 192.168.1.10/24 ifconfig carp1 create ifconfig carp1 vhid 2 advskew 100 pass mekmitasdigoat 192.168.1.10/24 The configuration for host B is identical, except the advskew is on virtual host 1 rather than virtual host 2. ifconfig carp0 create ifconfig carp0 vhid 1 advskew 100 pass mekmitasdigoat 192.168.1.10/24 ifconfig carp1 create ifconfig carp1 vhid 2 pass mekmitasdigoat 192.168.1.10/24 Finally, the ARP balancing feature must be enabled on both hosts: sysctl net.inet.carp.arpbalance=1 When the hosts receive an ARP request for 192.168.1.10, the source IP address of the request is used to compute which virtual host should answer the request. The host which is master of the selected virtual host will reply to the request, the other(s) will ignore it. This way, locally connected systems will receive different ARP replies and subsequent IP traffic will be balanced among the hosts. If one of the hosts fails, the other will take over the virtual MAC address, and begin answering ARP requests on its behalf. SEE ALSO
inet(4), pfsync(4), rc.conf(5), ifconfig(8), sysctl(8) HISTORY
The carp device first appeared in OpenBSD 3.5. The carp device was imported into FreeBSD 5.4. BSD
January 5, 2010 BSD
All times are GMT -4. The time now is 01:56 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy