Search Results

Search found 11207 results on 449 pages for 'ip ban'.

Page 62/449 | < Previous Page | 58 59 60 61 62 63 64 65 66 67 68 69  | Next Page >

  • Access my local server by hostname or servername

    - by S.M.09
    I have a local host server hosting a few applications in tomcat which comes through a apache proxy The client or User trying to access these application has to access them like 10.XXX.XXX.XX:8080/appName OR 10.XXX.XXX.XX/appName But I want to replace the ip address with soem other name related to my applications. But I cannot go and enter the host name of the server in each users /etc/host Nor do I want to be setting up DNS. Is there another way to do this. I am using ProxyPass XXX YYY to redirect all applications of tomcat to port 80

    Read the article

  • Looking for Recommendations on a Mid-Range IP KVM

    - by Joseph Sokoly
    I have currently been tasked with tracking down an IP KVM for our new data center, but I'm coming up blank on good reviews of KVMs. We're looking at a rack of 5 to 10 servers that would be hooked in. Does anyone have some recommendations on places to research KVMs, or have some of their own recommendations?

    Read the article

  • Grizzly server - works with IP, but not with domain name

    - by Hitchhiker
    I'm hosting a grizzly web service on a Windows 7 Pro machine (embedded in a regular Java process), and it is binding to http://my-domain-name. When trying to hit the service from another machine, requests to http://my-domain-name fail (fiddler shows error code 502), but requests to http://my-ip work. When the service runs on a Windows Server 2008 machine, this doesn't happen (both requests succeed). What could be the issue?

    Read the article

  • PAM module for authentication by IP or other password-disabling module

    - by Robin Rosenberg
    I'm looking for a Linux pam module that accepts any password for connections from a specific IP. I don't want to disable passwords completely. I need it for migration from one imap server to another (cyrus to zimbra) without knowing every password. I used such a module some six years ago. That was for imap migration too. Unfortunately I cannot recall the name of the module and can't find it by other means either. Any pointers?

    Read the article

  • can i use an ip-list include file for iptable blacklisting

    - by rubo77
    I would like to block all countries except mine in iptables, that is a lits with about 100.000 Entries. how can i define this blacklistfile in a script, so iptables blocks all those ip-ranges? maybe i can use http://www.ipdeny.com/ipblocks/data/countries/ that provides lists in the form 117.55.192.0/20 117.104.224.0/21 119.59.80.0/21 121.100.48.0/21 ... i want to be able to change the blacklistfile easily without having to change the iptables-script

    Read the article

  • What is the network address (x.x.x.0) used for?

    - by Shtééf
    It appears to be common practice to not use the first address in a subnet, that is the IP 192.168.0.0/24, or a more exotic example would be 172.20.20.64/29. The ipcalc tool I frequently use follows the same practice: $ ipcalc -n -b 172.20.20.64/29 Address: 172.20.20.64 Netmask: 255.255.255.248 = 29 Wildcard: 0.0.0.7 => Network: 172.20.20.64/29 HostMin: 172.20.20.65 HostMax: 172.20.20.70 Broadcast: 172.20.20.71 Hosts/Net: 6 Class B, Private Internet But why is that HostMin is not simply 64 in this case? The 64 address is a valid address, right? And whatever the answer, does the same apply to IPv6? Perhaps slightly related: it also appears possible to use a TCP port 0 and an UDP port 0. Are these valid or used anywhere?

    Read the article

  • How to reply some request from which routes its came from?

    - by tacoen
    I wonder if we can reply some request from which route its came from? My Situation is like this: eth0 192.168.10.1 --> gw: 192.168.10.254 nm: 24 eth1 192.168.11.1 --> gw: 192.168.11.254 nm: 24 Since this two IP is on the same machine, normally when we ping to 192.168.11.1 from 192.168.10.2. This machine will not reply to 192.168.10.2 because 192.168.10.0/24 it's on eth0, and the packets where requested via eth1. Can I make it works? I'm using Linux ubuntu, and the application will be listen to eth1 only.

    Read the article

  • How to configure multiple addresses on a single interface using Fedora 16

    - by cg.
    I upgraded from Fedora 14 to 16, recently. I had two static IP v4 addresses configured on my ethernet interface by creating two files in /etc/sysconfig/network-scripts: ifcfg-eth0 -> first address ifcfg-eth0:1 -> second address After the upgrade, this resulted in an error message during the boot process and in only the second address being successfully configured on the interface. So, what is the correct way to configure multiple addresses on a single interface on Fedora 16? I could not find anything on this subject in the documentation so far.

    Read the article

  • How to make all of my IPs works in HyperVM XEN?

    - by user758667
    I've installed HyperVM on CentOS 5.8 final to make XEN VPS. I have 5 IPs, and added them to an IPPool. They are from *.123 to *.126. But when I add Virtual machines, just the first one (which indicate to *.123 ip) works well. I mean I can ssh to it by "works well" and when I want ssh to the other ones ( *.124 *.125 ...) it says : ssh: connect to host *.124 port 22: Connection timed out after a while. I alos set gateway and netmask as it shows in my server IPAdresses for device eth0 (it doesn't make any difference if I set these or not, I get same error). What should I do now? Thanks.

    Read the article

  • Change ISP and MX static ip but no mail

    - by Tim the Enchanter
    We have recently changed our ISP, I have changed the MX record for our domain name to point to the new external static IP address for the router on the new ISP's connexion but I am not getting any mail (though sending works). Do I just have to wait will the change propagates? I am slightly concerned because I can connect to the web email service made visible through the new router, but not actually receive email. Have I missed something?

    Read the article

  • How can I have two web roots on one server, so I can point two domains to two different roots?

    - by Daniel F. Dietzel
    I usually ask my n00b questions on Stack Exchange, but now I'm setting up a VPS and have a question. My usual site.com points to my VPS's IP xxx.xxx.xxx.xxx. Now I have a different domain, and I'd like to point that to another location, say xxx.xxx.xxx.xxx/myname. However, when I try to add that as an "A" record in the DNS settings it won't let me. FYI I'm using chicagovps.net with ubuntu 11.10 and Nginx. Thanks!

    Read the article

  • VPN says connected but cannot ping tunnel ip

    - by Owl
    I have a VPN set up on a Symantec Gateway 320 and the status of the VPN is connected but the feature it provides is not working which means it is not actually connected..The only way to test it other than trying to use it in the program that utilizes it is to ping the remote subnet IP we use. mask numbers match, no settings have been changed it just stopped working.

    Read the article

  • Error when trying to access Shared files from iMac [closed]

    - by SatheeshJM
    I used to access all my Windows XP shared files on my Mac using Finder -- Window -- Connect to server. Now all of a sudden, an error crops up when I try to connect. I get the error "There was a problem connecting to the server "192.168.1.*" The server may not exist or it is unavailable at this time. Check the server name or IP address, check your internet connection and then try again. How can I remove this error and access my shared files from my Mac? P.S my network connections is fine.

    Read the article

  • Practical way to implement prevention of IP Spoofing

    - by user1369975
    I am an undergraduate Computer Science student and was hoping to gain some knowledge of ways to help prevent IP spoofing but all the resources I have tried out elaborate this concept in a theoretical way. I want to try out my hands at one of the techniques like: http://en.wikipedia.org/wiki/Port_knocking http://en.wikipedia.org/wiki/SYN_cookies How do I simulate this whole situation in my own system were I myself am the attacker and I myself have to defend it? And once I have gained an understanding of it, then how do I start translating that into programming terms?

    Read the article

  • apache: bypass authentication for a specific ip

    - by Tevez G
    In Apache I have set basic authentication for /protected location. Now i need to bypass authetication for a specific ip address but keep auth for others intact. Can anyone guide me on this one. Here is my current snippet of auth protected location. Location "/protected" Order allow,deny Allow from all AuthName "Protected folder" AuthType Basic AuthUserFile /etc/htpasswd require valid-user /Location

    Read the article

  • Why can a network address not be a valid host address?

    - by Goblinlord
    So... I have studied for CCNA and such and been working with IP networking at the least the past 8 years or so. I have always seen and been told that the network address for a subnet is not a valid host address. Now first I will start by saying I know this is true. My question is more... is there a technical reason it can not be used or was it just arbitrarily agreed upon when the specification was designed? I understand why a broadcast address can not be used (because it is ACTUALLY used). The thing is when I see a network address used it is normally only in routing which is specifically using NETWORK addresses. This being the case, (network addresses being used only when you are expecting a network address) is there some technical reason that they could not have the network address be an actual valid host address?

    Read the article

  • Mac has IP address, can connect to router but can't connect outside

    - by partition
    Weird problem, my MacBook can't connect anywhere right now! The router works, it gets an IP, it can log into to the router but it can't resolve anything! The router works as I connected another device to it and it connected to the net. The MacBook doesn't have any strange DNS configurations either, just 192.168.1.1 for the router I even tried tethering it to my phone, and it still would not connect to the net... help?

    Read the article

  • Opening a port to make a connection in Windows 7 [closed]

    - by jannes braet
    Possible Duplicate: trouble with opening a port to make a connection I have watched a video on how to open my ports in Windows 7. I followed the example by going to my "firewall" in "advanced settings" and I made new rules in "inbound rules" and in "outbound rules". I chose to allow connections to all ports, but if I try it with canyouseeme, then it says I can't find the configured port. Maybe it is because the site is wrong, but I don't really believe so. Could someone tell me how I open my ports so that I can connect to them and others to connect to them via the internet (if they have my ip-adress of course)?

    Read the article

  • Relation between TCP/IP Keep Alive and HTTP Keep Alive timeout values

    - by Suresh Kumar
    I am trying to understand the relation between TCP/IP and HTTP timeout values. Are these two timeout values different or same? Most Web servers allow users to set the HTTP Keep Alive timeout value through some configuration. How is this value used by the Web servers? is this value just set on the underlying TCP/IP socket i.e is the HTTP Keep Alive timeout and TCP/IP Keep Alive Timeout same? or are they treated differently? My understanding is (maybe incorrect): The Web server uses the default timeout on the underlying TCP socket (i.e. indefinite) and creates Worker thread that counts down the specified HTTP timeout interval. When the Worker thread hits zero, it closes the connection.

    Read the article

< Previous Page | 58 59 60 61 62 63 64 65 66 67 68 69  | Next Page >