This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Pages: [1]
1
Installation and Upgrades / So... where is ebox 1.0??
« on: October 15, 2008, 05:02:53 pm »
I want it
2
Installation and Upgrades / Re: FTP server behind Ebox
« on: September 08, 2008, 05:19:22 pm »
And for the second one:
eth1 is my external
Code: [Select]
Chain INPUT (policy DROP 10 packets, 1759 bytes)
pkts bytes target prot opt in out source destination
313K 191M ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
1642K 1397M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
2325 105K ACCEPT icmp !f * * 0.0.0.0/0 0.0.0.0/0
44440 4642K inospoof all -- * * 0.0.0.0/0 0.0.0.0/0
44440 4642K iexternalmodules all -- * * 0.0.0.0/0 0.0.0.0/0
44440 4642K iexternal all -- * * 0.0.0.0/0 0.0.0.0/0
42338 4516K inoexternal all -- * * 0.0.0.0/0 0.0.0.0/0
42109 4476K imodules all -- * * 0.0.0.0/0 0.0.0.0/0
30709 3913K iintservs all -- * * 0.0.0.0/0 0.0.0.0/0
30709 3913K iglobal all -- * * 0.0.0.0/0 0.0.0.0/0
332 17171 idrop all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
545K 481M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
3 180 ACCEPT icmp !f * * 0.0.0.0/0 0.0.0.0/0
20200 1752K fnospoof all -- * * 0.0.0.0/0 0.0.0.0/0
20200 1752K fredirects all -- * * 0.0.0.0/0 0.0.0.0/0
20194 1752K fmodules all -- * * 0.0.0.0/0 0.0.0.0/0
20194 1752K ffwdrules all -- * * 0.0.0.0/0 0.0.0.0/0
19577 1720K fnoexternal all -- * * 0.0.0.0/0 0.0.0.0/0
19577 1720K fdns all -- * * 0.0.0.0/0 0.0.0.0/0
19035 1685K fobjects all -- * * 0.0.0.0/0 0.0.0.0/0
19035 1685K fglobal all -- * * 0.0.0.0/0 0.0.0.0/0
18207 1644K fdrop all -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy DROP 32 packets, 2128 bytes)
pkts bytes target prot opt in out source destination
313K 191M ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0
1319K 884M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
8 384 ACCEPT icmp !f * * 0.0.0.0/0 0.0.0.0/0
22243 1768K ointernal all -- * * 0.0.0.0/0 0.0.0.0/0
11455 959K omodules all -- * * 0.0.0.0/0 0.0.0.0/0
21 1140 oglobal all -- * * 0.0.0.0/0 0.0.0.0/0
21 1140 odrop all -- * * 0.0.0.0/0 0.0.0.0/0
Chain drop (4 references)
pkts bytes target prot opt in out source destination
18780 1701K DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain fdns (1 references)
pkts bytes target prot opt in out source destination
540 34523 ACCEPT udp -- * * 0.0.0.0/0 207.191.50.10 state NEW udp dpt:53
2 126 ACCEPT udp -- * * 0.0.0.0/0 207.191.1.10 state NEW udp dpt:53
Chain fdrop (4 references)
pkts bytes target prot opt in out source destination
18207 1644K drop all -- * * 0.0.0.0/0 0.0.0.0/0
Chain ffwdrules (1 references)
pkts bytes target prot opt in out source destination
282 14304 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
335 17632 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:443
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:3230:3235
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpts:3230:3235
Chain fglobal (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 216.253.106.59
0 0 ACCEPT all -- * * 216.253.106.59 0.0.0.0/0
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:465
5 264 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:25
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:587
83 4788 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:110
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:3230:3235
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpts:3230:3235
740 35760 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:443
Chain fmodules (1 references)
pkts bytes target prot opt in out source destination
Chain fnoexternal (1 references)
pkts bytes target prot opt in out source destination
0 0 fdrop all -- eth1 * 0.0.0.0/0 0.0.0.0/0 state NEW
Chain fnospoof (1 references)
pkts bytes target prot opt in out source destination
0 0 fdrop all -- * * 216.253.106.59 0.0.0.0/0 MAC ! 00:0C:29:E4:E4:E8
Chain fobjects (1 references)
pkts bytes target prot opt in out source destination
Chain fredirects (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT tcp -- eth1 * 0.0.0.0/0 10.2.3.252 state NEW tcp dpt:60100
6 312 ACCEPT tcp -- eth1 * 0.0.0.0/0 10.2.3.252 state NEW tcp dpt:21
0 0 ACCEPT tcp -- eth1 * 0.0.0.0/0 10.2.3.252 state NEW tcp dpt:1024
0 0 ACCEPT tcp -- eth1 * 0.0.0.0/0 10.2.3.252 state NEW tcp dpt:20
0 0 ACCEPT tcp -- eth1 * 0.0.0.0/0 10.2.3.252 state NEW tcp dpt:60000
Chain ftoexternalonly (0 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * eth1 0.0.0.0/0 0.0.0.0/0
0 0 fdrop all -- * * 0.0.0.0/0 0.0.0.0/0
Chain idrop (3 references)
pkts bytes target prot opt in out source destination
561 56742 drop all -- * * 0.0.0.0/0 0.0.0.0/0
Chain iexternal (1 references)
pkts bytes target prot opt in out source destination
42038 4470K RETURN all -- eth0 * 0.0.0.0/0 0.0.0.0/0
13 608 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 state NEW
2 120 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:443 state NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:465 state NEW
4 188 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:25 state NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:587 state NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:110 state NEW
2083 125K ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 state NEW
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:3230:3235 state NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpts:3230:3235 state NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 state NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:443 state NEW
Chain iexternalmodules (1 references)
pkts bytes target prot opt in out source destination
42038 4470K RETURN all -- eth0 * 0.0.0.0/0 0.0.0.0/0
Chain iglobal (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 state NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:443 state NEW
0 0 ACCEPT all -- * * 10.2.1.205 0.0.0.0/0 state NEW
3391 336K ACCEPT all -- * * 10.2.1.50 0.0.0.0/0 state NEW
0 0 ACCEPT all -- * * 10.2.3.251 0.0.0.0/0 state NEW
1953 221K ACCEPT all -- * * 10.2.3.252 0.0.0.0/0 state NEW
0 0 ACCEPT all -- * * 216.253.106.59 0.0.0.0/0 state NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:465 state NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:25 state NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:587 state NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:110 state NEW
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:3230:3235 state NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpts:3230:3235 state NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 state NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:631 state NEW
4796 1190K ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:138 state NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:138 state NEW
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:139 state NEW
840 43544 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:139 state NEW
8215 643K ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:137 state NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:137 state NEW
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:445 state NEW
364 18924 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:445 state NEW
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:123 state NEW
0 0 drop tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:389 state NEW
8985 719K ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53 state NEW
1833 724K ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:67 state NEW
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:69 state NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 state NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:443 state NEW
Chain iintservs (1 references)
pkts bytes target prot opt in out source destination
Chain imodules (1 references)
pkts bytes target prot opt in out source destination
22 1056 ACCEPT tcp -- eth0 * 10.2.1.50 0.0.0.0/0 state NEW tcp dpt:3128
0 0 DROP tcp -- eth0 * 10.2.1.50 0.0.0.0/0 state NEW tcp dpt:3129
0 0 ACCEPT tcp -- eth0 * 10.2.3.251 0.0.0.0/0 state NEW tcp dpt:3128
0 0 DROP tcp -- eth0 * 10.2.3.251 0.0.0.0/0 state NEW tcp dpt:3129
903 54180 ACCEPT tcp -- eth0 * 10.2.3.252 0.0.0.0/0 state NEW tcp dpt:3128
0 0 DROP tcp -- eth0 * 10.2.3.252 0.0.0.0/0 state NEW tcp dpt:3129
0 0 ACCEPT tcp -- eth0 * 216.253.106.59 0.0.0.0/0 state NEW tcp dpt:3128
0 0 DROP tcp -- eth0 * 216.253.106.59 0.0.0.0/0 state NEW tcp dpt:3129
10475 508K ACCEPT tcp -- eth0 * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:3129
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:3128
Chain inoexternal (1 references)
pkts bytes target prot opt in out source destination
229 39571 idrop all -- eth1 * 0.0.0.0/0 0.0.0.0/0 state NEW
Chain inointernal (0 references)
pkts bytes target prot opt in out source destination
Chain inospoof (1 references)
pkts bytes target prot opt in out source destination
0 0 idrop all -- * * 216.253.106.59 0.0.0.0/0 MAC ! 00:0C:29:E4:E4:E8
Chain odrop (1 references)
pkts bytes target prot opt in out source destination
21 1140 drop all -- * * 0.0.0.0/0 0.0.0.0/0
Chain oglobal (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 state NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:443 state NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:465 state NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:25 state NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:587 state NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:110 state NEW
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:3230:3235 state NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpts:3230:3235 state NEW
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 state NEW
Chain ointernal (1 references)
pkts bytes target prot opt in out source destination
5098 378K ACCEPT udp -- * * 0.0.0.0/0 207.191.50.10 state NEW udp dpt:53
1 70 ACCEPT udp -- * * 0.0.0.0/0 207.191.1.10 state NEW udp dpt:53
5689 431K ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:53
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:53
Chain omodules (1 references)
pkts bytes target prot opt in out source destination
5664 340K ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
0 0 ACCEPT tcp -- * eth0 0.0.0.0/0 0.0.0.0/0 state NEW tcp spt:137
4556 410K ACCEPT udp -- * eth0 0.0.0.0/0 0.0.0.0/0 state NEW udp spt:137
0 0 ACCEPT tcp -- * eth0 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:137
0 0 ACCEPT udp -- * eth0 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:137
0 0 ACCEPT tcp -- * eth0 0.0.0.0/0 0.0.0.0/0 state NEW tcp spt:138
728 179K ACCEPT udp -- * eth0 0.0.0.0/0 0.0.0.0/0 state NEW udp spt:138
0 0 ACCEPT tcp -- * eth0 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:138
0 0 ACCEPT udp -- * eth0 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:138
0 0 ACCEPT tcp -- * eth0 0.0.0.0/0 0.0.0.0/0 state NEW tcp spt:139
0 0 ACCEPT udp -- * eth0 0.0.0.0/0 0.0.0.0/0 state NEW udp spt:139
486 29160 ACCEPT tcp -- * eth0 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:139
0 0 ACCEPT udp -- * eth0 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:139
0 0 ACCEPT tcp -- * eth0 0.0.0.0/0 0.0.0.0/0 state NEW tcp spt:445
0 0 ACCEPT udp -- * eth0 0.0.0.0/0 0.0.0.0/0 state NEW udp spt:445
0 0 ACCEPT tcp -- * eth0 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:445
0 0 ACCEPT udp -- * eth0 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:445
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:443
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:25
eth1 is my external
3
Installation and Upgrades / Re: FTP server behind Ebox
« on: September 08, 2008, 05:18:48 pm »Code: [Select]
Chain PREROUTING (policy ACCEPT 47564 packets, 5118K bytes)
pkts bytes target prot opt in out source destination
58964 5681K premodules all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 DNAT tcp -- eth1 * 0.0.0.0/0 216.253.106.
58 tcp dpt:60100 to:10.2.3.252:60100
6 312 DNAT tcp -- eth1 * 0.0.0.0/0 216.253.106.
58 tcp dpt:21 to:10.2.3.252:21
0 0 DNAT tcp -- eth1 * 0.0.0.0/0 216.253.106.
58 tcp dpt:1024 to:10.2.3.252:1024
0 0 DNAT tcp -- eth1 * 0.0.0.0/0 216.253.106.
58 tcp dpt:20 to:10.2.3.252:20
0 0 DNAT tcp -- eth1 * 0.0.0.0/0 216.253.106.
58 tcp dpt:60000 to:10.2.3.252:60000
Chain POSTROUTING (policy ACCEPT 23173 packets, 1680K bytes)
pkts bytes target prot opt in out source destination
31727 2247K postmodules all -- * * 0.0.0.0/0 0.0.0.0/0
8554 567K SNAT all -- * eth1 !216.253.106.58 0.0.0.0/0
to:216.253.106.58
Chain OUTPUT (policy ACCEPT 30119 packets, 2159K bytes)
pkts bytes target prot opt in out source destination
Chain postmodules (1 references)
pkts bytes target prot opt in out source destination
Chain premodules (1 references)
pkts bytes target prot opt in out source destination
22 1056 REDIRECT tcp -- eth0 * 10.2.1.50 !10.2.1.1 tcp dpt:80 redir ports 3128
0 0 REDIRECT tcp -- eth0 * 10.2.3.251 !10.2.1.1 tcp dpt:80 redir ports 3128
902 54120 REDIRECT tcp -- eth0 * 10.2.3.252 !10.2.1.1 tcp dpt:80 redir ports 3128
0 0 REDIRECT tcp -- eth0 * 216.253.106.59 !10.2.1.1 tcp dpt:80 redir ports 3128
10471 508K REDIRECT tcp -- eth0 * 0.0.0.0/0 !10.2.1.1 tcp dpt:80 redir ports 3129
4
Installation and Upgrades / FTP server behind Ebox
« on: September 07, 2008, 12:56:27 am »
Hi there We are trying to setup an ftp server behind ebox. I have set port 21 and 20 forwarded to the machine, but when trying to connect it refuses the connection. I installed proftpd on ebox just to check and it works out of the box....so for some reason it seems that it is not forwarding the ports to the machine, I have no firewall on the ftp server and I can access it from other pc's inside the lan. What am I missing here?
5
Installation and Upgrades / Got it to work
« on: July 21, 2008, 07:50:14 pm »
BIG EDIT!!!
Ok. I got it to work now. It now stores a copy in the mailbox, what I did was
1. sudo nano /etc/postfix/virtual
2. added the mail addresses to forward. ie test@mydomain.com pepe@hotmail.com,test@mydomain.com
3. Save the file and edit the line virtual_alias_maps in /etc/postfix/main.cf. The original is:
virtual_alias_maps = ldap:valiases change it to virtual_alias_maps = hash:/etc/postfix/virtual, ldap:valiases
4. Run: sudo postmap /etc/postfix/virtual, then reload postfix: sudo postfix reload
And thats it, now all mail to test@mydomain.com goes to pepe@hotmail.com and a copy is stored for the original destination.
Ok. I got it to work now. It now stores a copy in the mailbox, what I did was
1. sudo nano /etc/postfix/virtual
2. added the mail addresses to forward. ie test@mydomain.com pepe@hotmail.com,test@mydomain.com
3. Save the file and edit the line virtual_alias_maps in /etc/postfix/main.cf. The original is:
virtual_alias_maps = ldap:valiases change it to virtual_alias_maps = hash:/etc/postfix/virtual, ldap:valiases
4. Run: sudo postmap /etc/postfix/virtual, then reload postfix: sudo postfix reload
And thats it, now all mail to test@mydomain.com goes to pepe@hotmail.com and a copy is stored for the original destination.
6
Installation and Upgrades / Re: Email forwarding
« on: July 15, 2008, 05:34:26 pm »
hmmm... meanwhile, is there a way to do this "manually"? I know in a common postfix install, you can do this by modifying
/etc/postfix/virtual , which is specified in main.cf by alias_maps I think. however, in ebox, it points to ldap:valiases.
/etc/postfix/virtual , which is specified in main.cf by alias_maps I think. however, in ebox, it points to ldap:valiases.
7
Installation and Upgrades / Email forwarding
« on: July 14, 2008, 11:11:44 pm »
How can I forward emails to example@hotmail account? I have set the mail server which is working nice so far, and I have an account but I cant figure out how to forward emails to another account.
8
Installation and Upgrades / Re: Allowing email server outside LAN
« on: July 09, 2008, 06:23:09 pm »
Hiya. Just say it kinda worked But now it seems Im having a problem with the firewall. Dunno if I should make a separate post So, I set the 'MailSystem' service (which is not internal) in Fw>Packet Filter>Rules for traffic coming out from ebox right? Well, after a few restarts it worked. then I added the http proxy module and enabled it, and internet worked but not the email. So I disabled the proxy module, restarted the computer and the mail still wasnt working. Now, here is the weird part: I removed the 'MailSystem' service and email started working how can I stop this behavior ? Do I need to reinstall?
----Nevermind, reconfiguring the module worked
----Nevermind, reconfiguring the module worked
9
Installation and Upgrades / Allowing email server outside LAN
« on: June 27, 2008, 05:07:41 pm »
Its me again! Ok, Our mail server is outside our LAN. I checked to see if the Mail System service was allowed in Firewall>Packet Filter> Filtering rules for int. networks. It is. I checked with nmap to see if ports 25 and 110 were open, they are. Port 80 is also open. But still I cant connect to e email server (it isnt down btw, I checked). So just for fun I set up ebox's mail server and it does work (send & receive). So, any ideas why it doesnt allow me to connect to the outside server?
Does it have something to do with the config.? (like SSL and all that). Any help is appreciated. Thanks
Does it have something to do with the config.? (like SSL and all that). Any help is appreciated. Thanks
10
Installation and Upgrades / Re: Configuring DHCP server
« on: June 26, 2008, 05:38:51 am »
Thanks so much sixstone, that worked
11
Installation and Upgrades / Re: Configuring DHCP server
« on: June 24, 2008, 04:39:19 pm »
Ok. The switch allows packet broadcasting. I can get my internet connection on the server through eth1 (my external ip is 216.xxx.xxx.58, but for some reason I havent discovered yet I have to specify 216.xxx.xxx.57 as gateway, otherwise I loose my connection). Eth0 is set as 10.2.1.1 and dhcp is enabled with ateway as ebox, dns search is "none" primary and secondary name servers are the same as sonicwall, but I cant get internet on the computers hooked to the switch.
12
Installation and Upgrades / Configuring DHCP server
« on: June 04, 2008, 10:25:35 pm »
Hi. I want to "bypass" my sonicwall and move dhcp and dns services to my server. My public IP is 216.x.x.x and my internal is 10.x.x.x on the sonicwall. I have set eth1 as 216.x.x.x and eth0 as 10.2.1.1 and installed dhcp and dns services, but when I hook it up it doesnt work... I dont know what Im missing. I have the wan connected to eth1 and eth0 to the switch (dunno if this is right though)On my dhcp config I have set 10.2.1.1 as default gateway, search domain as none, primary name server is opendns... I just dont know what Im doing wrong....
13
Installation and Upgrades / Re: File Sharing and Internet not working after reboot
« on: April 29, 2008, 11:29:35 pm »
Wait. I think this is a kubuntu issue. For some reason it locks down the hard drives and says "feature only available with hal" I think it doesnt let ebox users acces the roaming profiles or something like that (sorry, Im not very computer literate haha)
14
Installation and Upgrades / File Sharing and Internet not working after reboot
« on: April 29, 2008, 11:21:30 pm »
It has done this to me 2 times now. I configure file sharing and the dhcp server, everything works perfect. But when I need to reboot the server, the file sharing module stops and when I try to start it it gives me an error that says: An internal error has ocurred. This is most probably a bug, relevant information can be found in the logs. But there is nothing in the logs. It wont let me access the users or groups module. DHCP module is running but I cant get internet in my pc's. What am I doing wrong here? The interfaces seem ok, with the correct ip addreses. Im running ebox on kubuntu 8.04
15
Installation and Upgrades / Need help configuring ebox (Updated)
« on: March 29, 2008, 12:52:39 am »
Ok, Now Im able to send email, but whenever I try to send someone outside my domain, I get a relay acces denied error. Any ides why this is happening??
Pages: [1]