[ previous ] [ next ] [ threads ]
 
 From:  "Greg Smith" <gsmith59 at pacbell dot net>
 To:  m0n0wall at lists dot m0n0 dot ch
 Subject:  Re: simple test not working ?
 Date:  Thu, 16 Dec 2004 20:27:51 -0800
Vincent,

It sounds like a limitation of the file server, regarding two clients
with the same IP address.  When you have two clients behind the
m0n0wall NAT makes both clients' packets come from the same IP address
(m0n0 WAN IP address).

And no, I'm not Windows bashing, because that's what I use every day.

Greg

-----Original Message-----

>I use monowall like router for bridging 2 lan. (192.168.9.0 (lan) and
>192.168.10.0 (wan) )
>
>I have dhcp server enabled on lan and open all the rules for any
traffic
>Wan -> LAN and LAN -> WAN.
>
>I test with two pc's in the lan area opening file (windows) on a
server
>in the WAN area.
>
>When only one open a file it works ..
>When two pc's open different file on the same server in the same times
>the connexion are broken.
>
>I have done test and doing all the same action in the WAN area without
>monowall and it give not problem.
>
>- So what is wrong ??????
>
>Here is my config file :
>
><?xml version="1.0"?>
><m0n0wall>
>	<version>1.4</version>
>	<system>
>		<hostname>wifigateway</hostname>
>		<domain>wireless.monalisa.fr</domain>
>		<username>admin</username>
>		<password>$1$dp69HP7c$06kTTer9mSV2x/krQn8DI/</password>
>		<timezone>Etc/UTC</timezone>
>		<time-update-interval>300</time-update-interval>
>		<timeservers>pool.ntp.org</timeservers>
>		<webgui>
>			<protocol>http</protocol>
>			<port/>
>			<certificate/>
>			<private-key/>
>		</webgui>
>		<dnsserver>192.168.10.64</dnsserver>
>		<dnsserver>192.168.10.10</dnsserver>
>		<disablefirmwarecheck/>
>	</system>
>	<interfaces>
>		<lan>
>			<if>fxp0</if>
>			<ipaddr>192.168.9.1</ipaddr>
>			<subnet>24</subnet>
>		</lan>
>		<wan>
>			<if>fxp1</if>
>			<mtu/>
>			<spoofmac/>
>			<ipaddr>192.168.10.7</ipaddr>
>			<subnet>24</subnet>
>			<gateway>192.168.10.1</gateway>
>		</wan>
>	</interfaces>
>	<staticroutes>
>		<route>
>			<interface>lan</interface>
>			<network>192.168.1.0/24</network>
>			<gateway>192.168.10.211</gateway>
>			<descr>vers lan 1 par contivity</descr>
>		</route>
>	</staticroutes>
>	<pppoe/>
>	<pptp/>
>	<bigpond/>
>	<dyndns>
>		<type>dyndns</type>
>		<username/>
>		<password/>
>		<host/>
>		<mx/>
>	</dyndns>
>	<dhcpd>
>		<lan>
>			<range>
>				<from>192.168.9.100</from>
>				<to>192.168.9.245</to>
>			</range>
>			<defaultleasetime>7500</defaultleasetime>
>			<maxleasetime>86400</maxleasetime>
>			<enable/>
>		</lan>
>	</dhcpd>
>	<pptpd>
>		<mode/>
>		<redir/>
>		<localip/>
>		<remoteip/>
>	</pptpd>
>	<dnsmasq/>
>	<snmpd>
>		<syslocation/>
>		<syscontact/>
>		<rocommunity>public</rocommunity>
>	</snmpd>
>	<diag>
>		<ipv6nat>
>			<ipaddr/>
>		</ipv6nat>
>	</diag>
>	<bridge>
>		<filteringbridge/>
>	</bridge>
>	<syslog>
>		<reverse/>
>		<nentries>100</nentries>
>		<remoteserver/>
>	</syslog>
>	<nat/>
>	<filter>
>		<rule>
>			<type>pass</type>
>			<interface>wan</interface>
>			<source>
>				<address>192.168.10.0/24</address>
>			</source>
>			<destination>
>				<address>192.168.9.0/24</address>
>			</destination>
>			<log/>
>			<descr>WAN vers LAN</descr>
>		</rule>
>		<rule>
>			<type>pass</type>
>			<interface>lan</interface>
>			<source>
>				<address>192.168.9.0/24</address>
>			</source>
>			<destination>
>				<address>192.168.10.0/24</address>
>			</destination>
>			<log/>
>			<descr>wireless vers WAN</descr>
>		</rule>
>		<rule>
>			<type>pass</type>
>			<interface>lan</interface>
>			<source>
>				<address>192.168.9.0/24</address>
>			</source>
>			<destination>
>				<address>192.168.1.0/24</address>
>			</destination>
>			<log/>
>			<descr>lan vers lan 1</descr>
>		</rule>
>		<tcpidletimeout/>
>	</filter>
>	<shaper/>
>	<ipsec/>
>	<aliases/>
>	<proxyarp/>
>	<wol/>
>	<captiveportal>
>		<page>
>			<htmltext> </htmltext>
>		</page>
>		<timeout>60</timeout>
>		<interface>lan</interface>
>		<idletimeout>60</idletimeout>
>		<httpsname/>
>		<certificate/>
>		<private-key/>
>		<redirurl/>
>		<radiusip/>
>		<radiusport/>
>		<radiusacctport/>
>		<radiuskey/>
>	</captiveportal>
></m0n0wall>