From owner-freebsd-hackers Tue May 9 5: 1: 6 2000 Delivered-To: freebsd-hackers@freebsd.org Received: from liberty.bulinfo.net (liberty.bulinfo.net [212.72.195.7]) by hub.freebsd.org (Postfix) with SMTP id D978B37BE0B for ; Tue, 9 May 2000 05:00:53 -0700 (PDT) (envelope-from krassi@bulinfo.net) Received: (qmail 5599 invoked from network); 9 May 2000 12:00:47 -0000 Received: from pythia.bulinfo.net (HELO bulinfo.net) (212.72.195.5) by liberty.bulinfo.net with SMTP; 9 May 2000 12:00:47 -0000 Message-ID: <3917FDE8.F26FBDB6@bulinfo.net> Date: Tue, 09 May 2000 15:00:40 +0300 From: Krassimir Slavchev X-Mailer: Mozilla 4.7 [en] (X11; I; Linux 2.2.13 i686) X-Accept-Language: en MIME-Version: 1.0 To: freebsd-isp@freebsd.org, freebsd-hackers@freebsd.org Subject: Modem stuff? Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG Hi all, We have some FreeBSD based terminal servers with 32 modems each. How can deny +++ATH0 attacks to our Dial-Up clients? I have been already set S2=127(disable escape character) on servers modems, but clients modems also need to set S2 register. I try to set remote modems with ping containing pattern "+++ATS2=127&WO1\r", in many times successfully, but any of modems can not be set properly. It is possible to filter IP packets containing patterns like +++ATH0 or any other way to set S2 register remotely? Thanks in advance Regards -- Krassimir Slavchev Bulinfo Ltd. krassi@bulinfo.net (+359-2)963-3652 http://www.bulinfo.net (+359-2)963-3764 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message