02-29-2016
Thank you for the quick responses.
Yeah, that's right. We could use private IPs, but because of legally issues every user has to be addressed with a public ip, that only belongs to him. We can't just open a private subnet for all users. So if one of the users does something illegal with his account, he is in charge and not we, part of the ISP. (because the only thing visible to the outside would be the public IP of our Server)
Or is my thinking totally off the track?
Last edited by mrgruen; 02-29-2016 at 10:51 AM..
10 More Discussions You Might Find Interesting
1. IP Networking
I'm new to this forum, so please be gentle !
I need to get my IBM RS running AIX4.3 onto the internet to a particular ftp server, through a NT server running proxy services.
This NT server is directly connected to our internet router vis a secondary NIC on the NT server.
When I add the route... (2 Replies)
Discussion started by: garry
2 Replies
2. UNIX for Dummies Questions & Answers
Using Redhat Linux Enterprise AS 4
can someone teach me how to setup a dns server for my webserver?
i've registered a domainname at mydomain.com
but when i type in the domain i register i cannot enter to my webserver.
someone told me that it is related with the DNS setting on my server.
i've... (2 Replies)
Discussion started by: kaixiang88
2 Replies
3. AIX
I know that IBM's official stance is that NIM does not work on etherchannel environment, but has anyone able to get around it?
I'm working on a p5-590 LPAR system, and the NIM master and clients are all on the same frame.
Any help is appreciated. (1 Reply)
Discussion started by: pdtak
1 Replies
4. HP-UX
I am running HP_UX 11.23 with 4 NIC cards (this is our TSM server)
I have 4 subnets we are backing across. trying to keep traffic on their subnets. I only have one route statment should I add more.
route add net 123.99.8.0 netmask 255.255.255.0 123.99.8.254
route add net 123.99.67.0 netmask... (2 Replies)
Discussion started by: myork
2 Replies
5. AIX
Hi All,
I know there is a way to do this in routers. The question is whether it is posisble to do this in AIX.
For our Web Focus ODBC connection to the Disaster Recovery servers, we want to restrict the access to the ODBC ports so that only the IP address of the Web Focus server can get to... (1 Reply)
Discussion started by: strunz
1 Replies
6. IP Networking
We have a client that is bringing in a MPLS router into our network. Right now they connect to our site using a tunnel between our two firewalls. I have a policy in place that locks them down to 4 specific servers (the servers have a gateway of 10.199.1.1 w/ a subnet of /24). Keep that in mind.... (2 Replies)
Discussion started by: sdotsen
2 Replies
7. Linux
Dear Sir
I am a newbie in the world of IP telephony. I have been working with Asterisk PBX (SIP) and Cisco Call Manager (MGCP) but now I am learning on how to work GNUGK for H.323 Gatekeeper.
I am having a problem, configuring static call routing on GNUGK
in the section
... (0 Replies)
Discussion started by: mfondoum
0 Replies
8. UNIX for Dummies Questions & Answers
hi guys
This is suse 11 sp1
I have a Server that has 4 NICs, I've created 2 bonds
bond0(eth0-eth1) - 10.10.10.2
bond1(eth2-eth3) - 10.10.10.3
Each bound goes to a Storage Device which is directly connected
so bond0 goes to Storage_Controller_1 and 2 like this
Server_bond0 <-------->... (2 Replies)
Discussion started by: karlochacon
2 Replies
9. Ubuntu
Hi everyone,
Hopefully there is someone here that can help me with the problem I got.
At my office I have 1 ubuntu firewall/gateway and several networks.
On the firewall/gateway I have three network cards, one for internet, one for network 192.168.100.0 and one for network 172.20.1.0
We... (0 Replies)
Discussion started by: thbor83
0 Replies
10. UNIX and Linux Applications
Hi Friends,
I am trying to connect to remote server via proxy server and transfer files from my server .
the proxy server is windows.
I wanted to know is that is it possible?
I am using command to connect is
/usr/local/bin/sftp -o "ProxyCommand nc proxyserver.com 8080"(E-Mail... (6 Replies)
Discussion started by: mallayanala
6 Replies
route(8c) route(8c)
Name
route - manually manipulate the routing tables
Syntax
/etc/route [ -f ] [ -n ] command args ]
Description
The program is used to manipulate the network routing tables manually. However, normally it is not needed, as the system routing table
management daemon, should tend to this task.
The program accepts two commands: add, to add a route and delete, to delete a route.
All commands have the following syntax:
/etc/route command [ net | host ] destination gateway [ metric ]
In this syntax, destination is a host or network for which the route is to, gateway is the gateway to which packets should be addressed,
and metric is an optional count indicating the number of hops to the destination. The metric is required for add commands. It must be
zero if the destination is on a directly-attached network, and nonzero if the route utilizes one or more gateways.
When adding a route with metric 0, the gateway given is the address of this host on the common network, indicating the interface to be used
for transmission. Routes to a particular host are distinguished from routes to a network by interpreting the Internet address associated
with destination. The optional keywords net and host force the destination to be interpreted as a network or host, respectively. If the
destination has a local address part of INADDR_ANY, then the route is assumed to be to a network. Otherwise, it is presumed to be a route
to a host. If the route is to a destination connected via a gateway, the metric should be greater than 0. All symbolic names specified
for a destination or gateway are looked up first as a host name using If this lookup fails, is then used to interpret the name as that of a
network.
The command uses a raw socket and the SIOCADDRT and SIOCDELRT ioctls to do its work. As such, only the superuser can modify the routing
tables.
Options
-f Flushes the routing tables of all gateway entries. If is used with one of the commands described above, the tables are flushed prior
to the command's application.
-n Prevents attempts to print host and network names symbolically when reporting actions.
Restrictions
The change operation is not implemented. Therefore, you should first add the new route, and then delete the old one.
Diagnostics
add [host | network] %s: gateway %s flags %x"
The specified route is being added to the tables. The values printed are from the routing table entry supplied in the ioctl call. If the
gateway address used was not the primary address of the gateway (the first one returned by the gateway address is printed numerically as
well as symbolically.
delete [ host | network] %s: gateway %s flags %x
The specified route is being deleted from the tables. The values printed are from the routing table entry supplied in the ioctl call. If
the gateway address used was not the primary address of the gateway (the first one returned by the gateway address is printed numerically
as well as symbolically.
%s %s done
When the flag is specified, each routing table entry that is deleted is indicated with a message of this form.
Network is unreachable
An attempt to add a route failed because the gateway listed was not on a directly-connected network. The next-hop gateway must be given.
not in table
A delete operation was attempted for an entry which was not present in the tables.
routing table overflow
An add operation was attempted, but the system was low on resources and was unable to allocate memory to create the new entry.
See Also
intro(4n), routed(8c)
route(8c)