From: "Jon" Received: from [192.168.100.201] (HELO mail.2rosenthals.com) by 2rosenthals.com (CommuniGate Pro SMTP 5.1.16) with ESMTP id 1867946 for os2-wireless_users@2rosenthals.com; Tue, 27 Oct 2009 16:20:48 -0400 Received-SPF: none (secmgr-ny.randr: 207.228.42.15 is neither permitted nor denied by domain of seadog.reno.nv.us) client-ip=207.228.42.15; envelope-from=jharrison@seadog.reno.nv.us; helo=pop1.greatbasin.net; Received: from pop1.greatbasin.net ([207.228.42.15]) by secmgr-ny.randr with esmtp (Exim 4.43) id 1N2sX8-00026U-5l for os2-wireless_users@2rosenthals.com; Tue, 27 Oct 2009 16:20:48 -0400 Received: from DP6550.seadog.reno.nv.us (seadog.reno.nv.us [216.82.144.188]) (authenticated bits=0) by pop1.greatbasin.net (8.13.8/8.13.8) with ESMTP id n9RKKiRo022848 for ; Tue, 27 Oct 2009 13:20:45 -0700 Received: from tyan@seadog.reno.nv.us (TYAN [192.168.1.35]) by DP6550.seadog.reno.nv.us (Weasel v1.78) for ; 27 Oct 2009 13:20:45 -0800 Message-ID: <100.08930a001b56e74a.010@seadog.reno.nv.us> To: "OS/2 Wireless Users Mailing List" Date: Tue, 27 Oct 2009 13:20:43 -0700 (PDT) In-Reply-To: References: Priority: Normal User-Agent: PMMail/3.05 (os/2; U; Warp 4.5; en-US; i386; ver 3.05.44.1423) X-Mailer: PMMail 3.05.44.1423 for OS/2 Warp 4.5 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Subject: Re: [OS2Wireless] eCS Firewall X-Spam-Score: -1.4 (-) X-Spam-Report: -1.4 ALL_TRUSTED Passed through trusted hosts only via SMTP On Mon, 26 Oct 2009 17:48:54 -0700 Bob wrote: > > > >I would use the same settings as what I use at home. > Bob: A bit easier said than done. User rules would probably be easy enough to= copy but IJFW has a number of preset rules based on it's selectable security level. For exam= ple, (and I'm sure you know this) the NAT engine drops unsolicited packets. When on the road, t= he wireless connection may be using NAT but I don't know if the AP is dropping those packets nor do = I know how to write a rule to do the same (or AFAIK, it may not even be possible for the simple OS/2= firewall to do this). Maybe most of the public AP's that you used block unsolicited packets in = the same manner but because that info can't be seen then it isn't known to be happening. Per= haps this is why in the many years of traveling you haven't had a problem=3F Anyway, thanks for the suggestion. Jon