Solved

Routing problem

Posted on 2001-07-03
6
226 Views
Last Modified: 2010-03-18
How to describe a network which is behind the router so it can be visible from the Internet. How to do it if my router is CISCO or Linux server?
0
Comment
Question by:CyberGod
  • 3
  • 2
6 Comments
 
LVL 3

Expert Comment

by:superschlonz
Comment Utility
What exactly do you want to do ?
0
 
LVL 16

Expert Comment

by:The--Captain
Comment Utility
On either platform:

ip route <arguments>

In other words, please clarify your original question.

-Jon

0
 

Author Comment

by:CyberGod
Comment Utility
My connection behind the router is LAN with 132 computers. Is it posible if the local network is having
a class C network addresses (192.16.8.X.X) to visible from the internet if the router is Linux with
or without NAT enable?
0
Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

 
LVL 16

Accepted Solution

by:
The--Captain earned 200 total points
Comment Utility
The short answer - no.

Long answer:  Even if you have as many public addresses as you do RFC1918 addresses so you could NAT 1:1, you would still find that NAT/masquerading breaks some protocols, so if you mean "as visible as a directly connected host could be", than the answer is no.  If you are completely aware of everyone who might want to connect to you, then you could ask them to establish tunnels/VPNs, etc with the proper routing between yourself and them, and then they could certainly consider your RFC1918 network "fully visible", so in that case, the answer could be yes.

-Jon

0
 

Author Comment

by:CyberGod
Comment Utility
Jon, can you give me some more information about establishing tunnels/VPNs, with the proper
routing between my local network and outside world.
0
 
LVL 16

Expert Comment

by:The--Captain
Comment Utility
Yes, but I need much more info.  

Do you have public IP space?
What is your address range?
With whom do you wish to conecct, and with what services?
What network services do you wish to provide to others?

Please clarify,
-Jon
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now