Solved

timeout

Posted on 2001-06-07
4
332 Views
Last Modified: 2010-04-20
i'm using redhat 7, and ipchains for the firewall,
i open all connection to outside
and allow all connection from other network(202.???.???.???) to inside (192.168.12.0/24)

INPUT         - ACCEPT
OUTPUT        - ACCEPT
FORWARD       - MASQ
From inside(192.168.12.0/24) to outside allow all
From other public 202.???.???.0/24 to inside allow all

all the connection is ok, but i always got problem with
mapping,
if i map a drive to other network (202.???.???.???) from the inside network (192.168.12.0/24) after sometime it will give a timeout, but then if you click again on the drive... it will be ok again...

i don't why this happen (the timeout)... can i set no timeout.. so the mapped drive will always connected?

thanks
0
Comment
Question by:ichen
  • 3
4 Comments
 
LVL 12

Accepted Solution

by:
j2 earned 100 total points
ID: 6166869
Your default policy for forwarding is MASQ. You cannot masquerade SMB traffic without getting the error you mention. You must create rules which opens (atleast) port 135-139 between the two nets WITHOUT masquerading (which most likely will break something else) But that is the breaks :)
0
 
LVL 1

Author Comment

by:ichen
ID: 6167079
create rules which opens port 135-139 without masquerading??
what do you mean by that?
ipchains -A forward -s 192?????? -d 203?????? 135:139 (without -j MASQ? is it??)
0
 
LVL 12

Expert Comment

by:j2
ID: 6167240
-A forward -s 192.168??? -d 203??? -p TCP --destination-port 135:139 -j ACCEPT and that has to come before the masquerade for the same network. And since you are using "dark" IP's (the 192.168 net) this probably will not wor, but it is the only way to get a reliable SMB connection. You also of cource need bidirectional routing between the networks.
0
 
LVL 12

Expert Comment

by:j2
ID: 6167243
oh, you need to add -b (bidirectional) to that rule aswell.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Little introduction about CP: CP is a command on linux that use to copy files and folder from one location to another location. Example usage of CP as follow: cp /myfoder /pathto/destination/folder/ cp abc.tar.gz /pathto/destination/folder/ab…
Fine Tune your automatic Updates for Ubuntu / Debian
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now