How can I get sendmail to use a specific address as the *source* IP when sending outgoing mail? I am trying to get my reverse lookup right to get rid of "may be forged" messages in the header of outgoing mail.
one IP address on the computer where sendmail is running is set up correctly to...
As I re-read this post I realize that I did not actually ask a question. So to be clear...
Does the Cisco 2801 produce informational (6) level messages?
If so, any clue about what I have done wrong that the msgs are not being logged?
--BobG
I have enabled trap logging on a Cisco 2801 router (OS 12.3(8)T6) to a linux syslogd. I have done the same recently with a PIX515.
The problem is that I am not getting any informational (6) level msgs even though "logging trap informational" is set. I do get the lower level msgs in the syslog...
We have a PIX 515e running OS 7 a the hub. A Cisco 2801 on one spoke that's been working reliably.
I just added two SOHO spokes -- one with a Netgear FVX538 VPN router and one with a generic Linux box running CentOS4 using IPSEC Tools (setkey and racoon) to configure the kernel IPSEC support...
So is this situation pecular to the PIX, or is it common to all firewalls? I am still trying to get a sense of whether this is by design, or an unfortunate side effect of the PIX. Put another way, is this setup the best practice for all firewalls or just the PIX?
Chris, your description of why...
I don't like the split DNS approach because of 1) the complication to DNS (I do not know of a feature in bind 9 to make this easy -- it seems to require having a set of inside name servers with one set of data and another public set) and 2) not all applications nessesarily use domain names...
I know about the DNS splitting solution and I want to avoid it. We will chnage our DMZ to use our public class as a last resort.
>> the reason ... only staticly assigned to the
>> OUTSIDE interface.
So can we also repeat our static NATs assigning them to the inside interface (in addition to...
We have a PIX 515e (OS6.3) with outside,dmz and inside interfaces. Public IPs are static NAT'd to private adrresses in the dmz.
From inside our network we have to use the private IPs of the DMZ computers, instead of the public IPs that the rest of the world sees. I understand that this is a...
We have a PIX 515, with 3 interfaces -- outside, inside, and dmz. The 515 inside interface connects only to a 2600 router. the router has two other subnets (one a local switch and the other a private T1 to another location.
I want to be able to VPN into the LAN and be able to work as if I was...
I have found information about Hairpinning. Maybe I misunderstood the post I refered to because hairpinning is just the term for the feature that the 515 can't do that creates my poblem.
We also have a Cisco 2651 router sitting between the 515 and the inside lan (i.e the 515's inside interface...
We have a new PIX 515 setup with three interfaces, outside, inside and DMZ.
Problem:
When I VPN into the inside interface (Cisco client 4.05), I cannot access machines in the DMZ.
An old post on this forum suggests that the PIX can't do this yet but when the 7.x software comes out, it will...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.