Solved

Going outside of the firewall

Posted on 1997-05-06
3
245 Views
Last Modified: 2010-03-18
I just finish setting up a Linux workstation. It connect to our LAN no problem, but when it comes to go outside the firewall, it refuse it.

I know I have to put something in the PROFILE and setup a socks.conf fine, but I don't know how.

Any body can assist ???
0
Comment
Question by:mpoirier
3 Comments
 
LVL 1

Expert Comment

by:bcook
ID: 1584543
What version of linux have you installed ?

What type of firewall do you have - I assume that's it's a
socks firewall ?


0
 
LVL 3

Expert Comment

by:pc012197
ID: 1584544
But that's what a firewall is good for. Talk to the firewall-administrator if you want IP access to 'the other side'.

0
 

Accepted Solution

by:
rab earned 100 total points
ID: 1584545
Depending on how your firewall is set up, you need to install
"firewall-aware" versions of your client software that can
use the firewall as a proxy.  Normally, telnet, ftp, irc, and
a very few others are all that is needed.  Netscape and other
browsers contain configuration options to use a proxy.

Best advice is to read the Firewall-HOWTO.  You won't be able
to directly apply about half of it (setting up the firewall),
but the parts about setting up clients within the firewall will
solve your problems.
0

Featured Post

Connect further...control easier

With the ATEN CE624, you can now enjoy a high-quality visual experience powered by HDBaseT technology and the convenience of a single Cat6 cable to transmit uncompressed video with zero latency and multi-streaming for dual-view applications where remote access is required.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question