Sponsored Content
Full Discussion: IP Masquerading
Special Forums IP Networking IP Masquerading Post 39487 by davidg on Wednesday 20th of August 2003 05:54:09 AM
Old 08-20-2003
Your gateway should be resolveable in the /etc/hosts-file
Also /etc/nsswitch.conf should point to :

hosts files .......

Regs David
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Sendmail Masquerading

Hi, I'm trying to get my mails sent from the address user@domain instead of user@hostname.domain. Should be simple masquerading configuration in sendmail config files, but this is where I fall (newbie). The sendmail.cf is not recommended for editing. There should be some kind of .mc file that... (0 Replies)
Discussion started by: shimpanzo
0 Replies

2. Linux

postfix configuration issues...specifically masquerading (lack of )

postfix configuration issues...specifically masquerading (lack of ) Mail sent to our intranet arrives correctly (me@domain.com). Mail sent to our intranet arrives correctly (me@domain.com). Anything going outside does not, so my tests get rejected (me@hostname.com) :( any assistance... (5 Replies)
Discussion started by: mr_manny
5 Replies

3. IP Networking

selective masquerading

I am running Linux 2.6.20 on i686 architecture. I want to be able to masquerade different hosts on my LAN to different external interfaces. Specifically, I want one specific host to masquerade through a vpn tunnel while the other hosts simply masquerade over the regular ISP interface. I only... (4 Replies)
Discussion started by: NESter
4 Replies

4. SCO

Sendmail masquerading

I am having a problem with my sendmail configuration I have masquerading on but when I send a mail to multiple people it masquerades my email but not the others? see the sample below: From: name@vegena.net Sent: Friday, July 24, 2009 9:42 AM To: name2@atksco1.vegena.net;... (0 Replies)
Discussion started by: garycrow
0 Replies

5. IP Networking

howto start with gateway / router / masquerading

Hi there, I have only basic knowledge in Unix but I'm eager to learn. I have a new complex (for me) exercice and I have no idea how to start. I have a regular network on witch I'm trying to plug another network. Here is an image of the physical network.... (7 Replies)
Discussion started by: chebarbudo
7 Replies

6. AIX

Mutt/Sendmail Masquerading Problem on AIX 5.3

We are running Unix AIX 5.3 and I have been asked to masquerade the sender name on our email processing. We have one domain name and many users: user1@domainname user2@domainname user3@domainname We use mutt/sendmail to do our email processing. I discovered that using genericstable within... (1 Reply)
Discussion started by: FHMARTINS
1 Replies

7. UNIX for Dummies Questions & Answers

Sending mail as another user (username masquerading)

I have sendmail as the smtp server. I want that all mails sent from user1 actually appears to come from user2(also should be reflected in mail header). How can i accomplish the task by tweaking sendmail or are there any other means to do so? (4 Replies)
Discussion started by: proactiveaditya
4 Replies

8. AIX

sendmail masquerading on AIX.

Hello all, I have a requirement wherein I need to change the "received from" address parameter for outgoing mails from an AIX server. I tried using the option to specify the "reply-to" address, still my relay server rejects the mails as the "received from" address still contains . I know,... (1 Reply)
Discussion started by: thisissouvik
1 Replies

9. Red Hat

Sendmail - Masquerading multiple domains with different addresses

Hello Friends, I am running Sendmail 8.14 on rhel6. I have one simple question regarding domain masquerading, i would want to masquerade different domains with different addresses. By that what i mean is that lets say i have 3 domains as home.com, example.com, test.com and i would want to... (0 Replies)
Discussion started by: Rohit Bhanot
0 Replies
SA-CHECK_SPAMD.RAW(1)					User Contributed Perl Documentation				     SA-CHECK_SPAMD.RAW(1)

NAME
sa-check_spamd - spamd monitoring script for use with Nagios, etc. SYNOPSIS
sa-check_spamd [options] Options: -c secs, --critical=secs Critical ping response threshold -h, -?, --help Print usage message -H hostname, --hostname=hostname Hostname of spamd service to ping -p port, --port=port Port of spamd service to ping --socketpath=path Connect to given UNIX domain socket -t secs, --timeout=secs Max time to wait for a ping response -v, --verbose Verbose debug output -V, --version Output version info -w secs, --warning=secs Warning ping response threshold DESCRIPTION
The purpose of this program is to provide a tool to monitor the status of "spamd" server processes. spamd is the daemonized version of the spamassassin executable, both provided in the SpamAssassin distribution. This program is designed for use, as a plugin, with the Nagios service monitoring software available from http://nagios.org. It might be compatible with other service monitoring packages. It is also useful as a command line utility or as a component of a custom shell script. OPTIONS
Options of the long form can be shortened as long as the remain unambiguous (i.e. --host can be used instead of --hostname). -c secs, --critical=secs Critical ping response threshold in seconds. If a spamd ping response takes longer than the value specified (in seconds) the program will exit with a value of 2 to indicate the critical status. This value must be at least as long as the value specified for warning and less than the value specified for timeout. -h, -?, --help Prints this usage message and exits. -H hostname, --hostname=hostname The hostname, or IP address, of the spamd service to ping. By default the hostname localhost is used. If --socketpath is set this value will be ignored. -p port, --port=port The port of the spamd service to ping. By default port 783 (the spamd default port number) is used. If --socketpath is set this value will be ignored. --socketpath=path Connect to given UNIX domain socket. Use instead of a hostname and TCP port. When set, any hostname and TCP port specified will be ignored. -t secs, --timeout=secs The maximum time to wait for a ping response. Once exceeded the program will exit with a value of 2 to indicate the critical status. The default timeout value is 45 seconds. The timeout must be no less than 1 second. This value must be greater than the values specified for both the critical and warning values. -v, --verbose Display verbose debug output on STDOUT. -V, --version Display version info on STDOUT. -w secs, --warning=secs Warning ping response threshold in seconds. If a spamd ping response takes longer than the value specified (in seconds), and does not exceed the critical threshold value, the program will exit with a value of 1 to indicate the warning staus. This value must be no longer than the value specified for critical and less than the value specified for timeout. EXIT CODES
The program will indicate the status of the spamd process being monitored by exiting with one of these values: 0 OK: A spamd ping response was received within all threshold times. 1 WARNING: A spamd ping response exceeded the warning threshold but not the critical threshold. 2 CRITICAL: A spamd ping response exceeded either the critical threshold or the timeout value. 3 UNKNOWN: An error, probably caused by a missing dependency or an invalid configuration parameter being supplied, occurred in the sa-check_spamd program. SEE ALSO
spamc(1) spamd(1) spamassassin(1) PREREQUISITES
"Mail::SpamAssassin" version 3.1.1 or higher (3.1.6 or higher recommended) AUTHOR
Daryl C. W. O'Shea, DOS Technologies <spamassassin@dostech.ca> LICENSE
sa-check_spamd is distributed under the Apache License, Version 2.0, as described in the file "LICENSE" included with the Apache SpamAssassin distribution and available at http://www.apache.org/licenses/LICENSE-2.0 perl v5.14.2 2014-02-14 SA-CHECK_SPAMD.RAW(1)
All times are GMT -4. The time now is 06:58 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy