RE: How to use Route??

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 2003-12-31 at 13:12, Craig White wrote:
> On Wed, 2003-12-31 at 10:56, Scot L. Harris wrote:
> > On Wed, 2003-12-31 at 11:24, Craig White wrote:
> > > On Wed, 2003-12-31 at 01:01, Ow Mun Heng wrote:
> > > > Sorry.. Didn't finish my email .. see below 
> > > > 
> > > > > > On Tue, 2003-12-30 at 23:09, Ow Mun Heng wrote:
> > > > > > > I have 2 network cards. One is a wifi eth1 and another's LAN eth0.
> > > > > > > Both of these have different ip addresses and I just need them to 
> > > > > > > be routed differently.
> > > > > > > 
> > > > > > > eg: eth1 10.0.0.1 gw 10.0.0.10   		<-company lan
> > > > > > >     eth2 192.168.0.1 gw 192.168.0.10	<- wifi/internet
> > 
> > Good explanation Craig.  
> > 
> > One thing that bothers  me however, does the IT group at this company know
> > about a wifi interface being attached to their network?  Due to the routing 
> > question being asked I wonder if even minimal security precautions have been
> > taken to secure this wifi node?  
> > 
> > I was asked one time to connect up a wifi node to my company intranet and
> >  refused at that time since I did not have the additional firewalls available
> > or the time needed to teach the users how to use ssh and/or VPN to the 
> > internal network.  
> ---
> security ;-)
> 
> yeah well, the question was about routing - not security. 
> 
> Clearly a network administrator concerned with security would have
> plenty to say about this. In fact, that may already be the case...a
> network administrator with a watchful eye on security wouldn't allow any
> access by MAC addresses that weren't already registered. Thus even if
> the default gateway were set properly on the wireless router and on any
> computers using the wireless router, you still wouldn't get anywhere. If
> you had a desktop computer that you could use to route the traffic from
> the wireless router for you...but all of that is beyond the scope of the
> question.
> 
> Craig

Point understood.  But security should always be a concern.  And while
registering the MAC address helps, that can be overcome with just a
little effort.  Properly securing a wifi connection takes considerable
effort.  But I guess that discussion will be left for another question.
:)

-- 
Scot L. Harris <webid@xxxxxxxxxx>


-- 
Shrike-list mailing list
Shrike-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/shrike-list

[Index of Archives]     [Fedora Users]     [Centos Users]     [Kernel Development]     [Red Hat Install]     [Red Hat Watch]     [Red Hat Development]     [Red Hat Phoebe Beta]     [Yosemite Forum]     [Fedora Discussion]     [Gimp]     [Stuff]     [Yosemite News]

  Powered by Linux