I know a couple of groups now have proper reverse delegation of DNS for their subnets… Wondering who to drop a line to so I can get 44.103.0.0/19 delegated to a.ns.mi6wan.net and b.ns.mi6wan.net ?
Didn’t see it in the portal or wiki and my notes from a few months ago are foggy...
--
Fredric Moses - W8FSM - WQOG498
fred(a)moses.bz
All,
I've added a new tool that I'd like you to test. This web application
should provide the registration code required by APRS software suites.
In order to use it, you must browse to:
http://kb3vwg-010.ampr.org/tools/aprscode
or
http://44.60.44.10/tools/aprscode
If you're on AMPRNet, you should be able to enter the callsign and look
up the registration code. If you access it from outside of AMPRNet, you
will be prompted for an access code (1234).
Please let me know how it works
73,
KB3VWG
Chris;
I tried to log on my account to do some notes and it says my account is
invalid...? Can you please double check and verify that it is still
valid? Thanks much!
--
The most difficult egg to beat is one that is hard boiled.
73 de Brian Rogers - N1URO
email: (see above)
Web: http://www.n1uro.net/
Ampr1: http://n1uro.ampr.org/
Ampr2: http://nos.n1uro.ampr.org
Linux Amateur Radio Services
axMail-Fax & URONode
http://uronode.sourceforge.nethttp://axmail.sourceforge.net
AmprNet coordinator for:
Connecticut, Delaware, Maine,
Maryland, Massachusetts,
New Hampshire, Pennsylvania,
Rhode Island, and Vermont.
Hello,
As someone new to the intricacies of port forwarding I have been puzzled
why I cannot maintain a connection when I have the entry shown below for
port 7300 active yet connections via port 6300 and 8000 work as
expected.
$IPTABLES -A FORWARD -d 44.131.8.0/27 -p tcp -m tcp --dport 6300:6310
-j ACCEPT
$IPTABLES -A FORWARD -d 44.131.8.0/27 -p tcp -m tcp --dport 7300:7310
-j ACCEPT
$IPTABLES -A FORWARD -d 44.131.8.0/27 -p tcp -m tcp --dport 8000:8011
-j ACCEPT
$IPTABLES -t nat -A PREROUTING -p tcp --dport 6300 -j DNAT
--to-destination 44.131.8.16:6300
#$IPTABLES -t nat -A PREROUTING -p tcp --dport 7300 -j DNAT
--to-destination 44.131.8.16:7300
$IPTABLES -t nat -A PREROUTING -p tcp --dport 8000 -j DNAT
--to-destination 44.131.8.16:8000
Placing a [ # ] as shown allows the connections.
Regards,
Ian..
A while ago Jason KY9J kindly sent me a copy of his script (which I have
since lost) to convert encap.txt to generate tunnels for a Cisco IOS
router.
Are you still subscribed to the list Jason or can anybody else help with
a copy of the script?
http://hamradio.ucsd.edu/mailman/private/44net/2012-November/000534.html
was the original thread.
Many thanks,
Nick G4IRX.
Whoever owns 44.131.160.1 you need to check your system configuration. It
cannot do anything with 255.255.255.255
Below what I am seeing
8:20:25.632390 IP 81.174.253.193 > 192.168.1.150: IP 44.131.160.1.5678 >
255.255.255.255.5678: UDP, length 120 (ipip-proto-4)
08:20:25.635667 IP 192.168.1.150 > 81.174.253.193: IP 44.135.90.2 >
44.131.160.1: ICMP host 255.255.255.255 unreachable, length 36
(ipip-proto-4)
--
cheers,
Don
- ve3zda
Could someone explain why the manual download of the gateways is different
than the what the portal shows?
A station had an ip address change yesterday and because I download daily I
manually changed to his new address. When the download took place this
morning his old address was sent and of course replaced the new one.
--
cheers,
Don
- ve3zda