Solved

IPX Filtering, Blocking with linux

Posted on 1997-09-07
4
263 Views
Last Modified: 2010-03-18
NETWARE SRVR ----LINUX -----NETWARE SRVR
(A)--------------IPFWADM,IPX-------B

We have IPFWADM set up in a way that users on side B can
use all of the network resources on side A.  But Side A
cannot see side B at all.
We would like to be able to do the same with IPX.  Somehow be able to filter it, so that users on side B would be able to see all servers and use resources on side A but side A would not be able to see anything on side B.  

Can someone explain how to set this up in linux, what software to use etc.

Thanks
***Points will be increased if this turns out to be a hard
question or if somebody requests it
0
Comment
Question by:mark21
  • 3
4 Comments
 

Author Comment

by:mark21
ID: 1586471
Edited text of question
0
 

Author Comment

by:mark21
ID: 1586472
Edited text of question
0
 

Author Comment

by:mark21
ID: 1586473
Edited text of question
0
 
LVL 1

Accepted Solution

by:
jantypas earned 70 total points
ID: 1586474
Unfortunately, I know of no package on the Linux that performs IPX/SPX fitler tasks -- plenty that do IP but not IPX.  Remember, IP protocol knowledge was plublic knowledge, IPX required $$$ to get it...

Hate to say it, but $1000 will buy a Cisco 2501 that will exactly what you want and it's rock solid.

If you were adventurous, you could MODIFY the ip filter code to do it... you'd have to do something like this:

- Using the bpf-style fitlers in the kernel, have each filter watch for an IPX SAP.  If it finds it, check against a clist in the kernel filled with "allowed" stations.  If it finds a match, pass the frame, otherwise drop it.
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
How to enable SSH in Ubuntu. 7 94
Linux : when to add the entries in /etc/hosts file 22 95
Issue to mail 11 99
Set linux box as ip router 3 23
I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question