maskarada i problemy z połączniem ze strona min. motorola.com
Marcin Majcherkiewicz
majszak at lep.pl
Mon Dec 3 00:56:55 CET 2001
Więc tak, mam zainstalowane PLD. Wasza dystrybucja pracuje jako prosta bramka internetowa dla malej sieci- wszystko przez maskarade IP. Wczesniej uzywalem Slackware'a, ale po postanowilem poeksperymentowac...
I tak: ciagle mam problemy z konfiguracja BIND'a (konkretnie reverse DNS nie idzie, nie wiem gdzie mam blad, tym bardziej, ze pliki onfiguracyjne praktycznie zgralem z serwera gdzie to dzialalo...), ale to nie wazne... gorzej jest z maskarada! Przez dluzszy czas zastanawialem sie, dlaczego od strony sieci wewnetrznej nie moge wejsc na niektore strony, np. motorola.com, chip.pl. W pliku konfiguracyjnym network niewiele zmienialem, po prostu wlaczylem obsluge maskarady. Dziwne bylo to, ze wiekszosc serwerow byla dostepna. No i zaczalem sie bawic.. wlaczajac niektore opcje bez wiekszego zastanowienia. I co? Nagle wszystko zaczelo dzialac! Stad moja prosba... ponizej jest fragment "network"'a odnosnie ostawien IPv4. Mozecie mi powiedziec, ktora opcja odpowiada za to dziwne zachowanie? Cos wlaczylem, ale nie wiem co...
Z gory dzieki.
# Do you want enable IPv4 forwarding ?
IPV4_FORWARDING=yes
# Do you want to enable IPv4 anti spoofing ?
IPV4_ANTI_SPOOFING=
# Kernel should accept ICMP redirect messages ?
# The default is 'yes', if the kernel is configured for
# a regular host; and 'no' for a router configuration.
IPV4_ACCEPT_ICMP_REDIR=yes
# Kernel should accept source routed packets ?
# The default Is 'yes' for routers and 'no' for hosts.
IPV4_ACCEPT_SOURCE_ROUTE=yes
# Log packets with source addresses with no known route to kernel log ?
IPV4_LOG_MARTIANS=
# Do multicast routing ? The kernel needs to be compiled with
# CONFIG_MROUTE and a multicast routing daemon is required.
IPV4_MULTICAST=
# Do proxy ARP ?
IPV4_PROXY_ARP=
# Accept ICMP redirect messages only for gateways, listed in
# default gateway list ?
IPV4_ACCEPT_ICMP_REDIR_GATE=
# Send ICMP redirects to other hosts ?
IPV4_SEND_ICMP_REDIR=yes
# Ignore all ICMP echo requests ?
IPV4_IGN_ALL_ICMP=
# Ignore ICMP echo requests to broadcast and multicast addresses ?
IPV4_IGN_CAST_ICMP=
# Enable MTU discovery patch ? (KERNEL MUST SUPPORT THIS)
# MTU (maximal transfer unit) is the size of the chunks we send out
# over the net. "Path MTU Discovery" means that, instead of always
# sending very small chunks, we start out sending big ones and if we
# then discover that some host along the way likes its chunks smaller,
# we adjust to a smaller size.
IPV4_MTU_DISCOVERY=
# Enable debugging of IP masquerading ?
IPV4_MASQ_DEBUGGING=yes
# Bug-to-bug compatibility with some broken printers. On retransmit
# try to send bigger packets to work around bugs in certain TCP
# stacks. Can be turned off by setting IPV4_RETRANS_COLLAPSE to ,,yes''.
IPV4_RETRANS_COLLAPSE=
# Disable select acknowledgments after RFC2018 ?
# TCP may experience poor performance when multiple packets are lost
# from one window of data. With the limited information available
# from cumulative acknowledgments, a TCP sender can only learn about a
# single lost packet per round trip time. An aggressive sender could
# choose to retransmit packets early, but such retransmitted segments
# may have already been successfully received.
IPV4_NO_SELECT_ACK=
# Disable timestamps as defined in RFC1323 ?
# Timestamps are designed to provide compatible interworking with
# TCP's that do not implement the TCP Extensions for High Performance
IPV4_NO_TIMESTAMPS=
# Enable the strict RFC793 interpretation of the TCP urgent pointer field.
IPV4_RFC793=
# Enable SYN flood protection ?
IPV4_SYN_COOKIES=
# Disable window scaling as defined in RFC1323 ?
# The window scale extension expands the definition of the TCP
# window to 32 bits and then uses a scale factor to carry this
# 32-bit value in the 16-bit Window field of the TCP header.
IPV4_NO_WINDOW_SCALING=
# Enable dynamic socket address rewriting on interface address change.
# This is useful for dialup interface with changing IP addresses.
# (default no)
# IPV4_DYNAMIC_IP_PATCH_VALUE - value from 1 to 9
IPV4_DYNAMIC_IP_PATCH=
IPV4_DYNAMIC_IP_PATCH_VALUE=
# Range of ports used by TCP and UDP to choose the local
# port. Contains two numbers, the first number is the lowest port,
# the second number the highest local port. Default is "1024 4999".
# Should be changed to "32768 61000" for high-usage systems.
IPV4_LOCAL_PORT_RANGE="1024 4999"
___________________
Marcin Majcherkiewicz
majszak at lep.pl
-------------- next part --------------
An HTML attachment was scrubbed...
URL: /mailman/pipermail/feedback/attachments/20040626/1cc4e96d/attachment.html
More information about the feedback
mailing list