Hi Torsten,
tnx for the reply but I'm still having no success :(
ns1:/ # /usr/sbin/ipmasqadm portfw -l
prot localaddr rediraddr lport rport pcnt
pref
TCP ns1.storm.ie viking2.storm.ie ldap ldap 7
10
TCP ns1.storm.ie viking2.storm.ie ulp ulp 7
10
TCP ns1.storm.ie viking2.storm.ie msiccp msiccp 10
10
TCP ns1.storm.ie viking2.storm.ie imtc-mcs imtc-mcs 7
10
TCP ns1.storm.ie viking2.storm.ie h323hostcall h323hostcall
10 10
I have tried connecting to ns1.storm.ie from outside using NetMeeting 3.01
but it immediately returns 'The other party did not accept your call'. I
have also tried this with SuSEfirewall down - made no difference.
Any ideas what I might be doing wrong?
MR
Torsten
Mueller To: michael.ryan@storm.ie
Ok, I have added the ip_masq_h323.o module and re-started masquerading to load the module. SuSEfirewall is still in place as before. I can now use NetMeeting 3.01
on
a PC to connect to a hosted meeting outside the firewall.
My question now is how do I allow external NetMeeting clients connect to a NetMeeting host on our internal/private network. Any help much appreciated :)
MR
Hey,
i use a setup with a netmeeting kernel module and portforwarding.
Look at the masquearding howto, there's the lnk to the module.
Greetings Torsten
michael.ryan@storm.ie schrieb:
Trying to allow external sources connect to a machine on our private network which is acting as a NetMeeting host. Gateway is a SuSE 6.4 box, ip masquerading up and running SuSE firewall
2.1
Anyone done this before? any advice on how this can be done securely?
tnx in advance,
MR
-- To unsubscribe, e-mail: suse-security-unsubscribe@suse.com For additional commands, e-mail: suse-security-help@suse.com