On Wed, 2003-12-31 at 10:56, Scot L. Harris wrote: > On Wed, 2003-12-31 at 11:24, Craig White wrote: > > On Wed, 2003-12-31 at 01:01, Ow Mun Heng wrote: > > > Sorry.. Didn't finish my email .. see below > > > > > > > > On Tue, 2003-12-30 at 23:09, Ow Mun Heng wrote: > > > > > > I have 2 network cards. One is a wifi eth1 and another's LAN eth0. > > > > > > Both of these have different ip addresses and I just need them to > > > > > > be routed differently. > > > > > > > > > > > > eg: eth1 10.0.0.1 gw 10.0.0.10 <-company lan > > > > > > eth2 192.168.0.1 gw 192.168.0.10 <- wifi/internet > > Good explanation Craig. > > One thing that bothers me however, does the IT group at this company know > about a wifi interface being attached to their network? Due to the routing > question being asked I wonder if even minimal security precautions have been > taken to secure this wifi node? > > I was asked one time to connect up a wifi node to my company intranet and > refused at that time since I did not have the additional firewalls available > or the time needed to teach the users how to use ssh and/or VPN to the > internal network. --- security ;-) yeah well, the question was about routing - not security. Clearly a network administrator concerned with security would have plenty to say about this. In fact, that may already be the case...a network administrator with a watchful eye on security wouldn't allow any access by MAC addresses that weren't already registered. Thus even if the default gateway were set properly on the wireless router and on any computers using the wireless router, you still wouldn't get anywhere. If you had a desktop computer that you could use to route the traffic from the wireless router for you...but all of that is beyond the scope of the question. Craig -- Shrike-list mailing list Shrike-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/shrike-list