

China Mobile GPRS/EDGE
APN: CMNET
no username, no password, no proxy.
your phone or device should automatically get the following settings from the network but if required to be set manually in your phone/device –
MCC: 460
MNC: either 00, 02 or 07 (China Mobile uses all three. Most of the time it is 0 or 2 but you can try all three and see which one works for you)
China Mobile MMS settings for new and smart phones where you can set the WAP and MMS settings in the same place.
APN: CMWAP
Proxy: 10.0.0.172
Port: 80
(sometimes you have to input the above setting as 10.0.0.172:80 in proxy field if port field does not exist in settings)
MMSC: http://mmsc.monternet.com
MMS Proxy: 10.0.0.172
MMS port: 9201
(sometimes you have to input the above setting as 10.0.0.172:9201 in proxy field if port field does not exist in settings)
MMS Protocol: 1.2
your phone or device should automatically get the following settings from the network but if required to be set manually in your phone/device –
MCC: 460
MNC: either 00, 02 or 07 (China Mobile uses all three. Most of the time it is 0 or 2 but you can try all three and see which one works for you)
APN Type: MMS
Configure only above settings and leave any other in your device on default.
China Mobile MMS settings for older or simple phones where you have to setup WAP and MMS settings in different places.
For WAP
APN: CMWAP
Proxy: 10.0.0.172
Port: 80
(sometimes you have to input the above setting as 10.0.0.172:80 in proxy field if port field does not exist in settings)
For MMS
MMSC: http://mmsc.monternet.com
MMS Proxy: 10.0.0.172
MMS port: 9201
(sometimes you have to input the above setting as 10.0.0.172:9201 in proxy field if port field does not exist in settings)
MMS Protocol: 1.2
your phone or device should automatically get the following settings from the network but if required to be set manually in your phone/device –
MCC: 460
MNC: either 00, 02 or 07 (China Mobile uses all three. Most of the time it is 0 or 2 but you can try all three and see which one works for you)
APN Type: MMS
If a setting exist asking which connection to use by default set the WAP connection you have configured. Also, configure only above settings and leave any other in your device on default.
Useful links for worldwide APNs:
http://code.google.com/p/cyanogenmod/wiki/APNlist
http://en.wikipedia.org/wiki/Mobile_network_code
When connecting to an L2TP/IPsec VPN which sits behind NAT you might get error 678 in Windows. To fix this the solution is as follows:
For Windows XP
http://support.microsoft.com/default.aspx?kbid=885407
Click Start, click Run, type regedit, and then click OK.
Locate and then click the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\IPsec
On the Edit menu, point to New, and then click DWORD Value.
In the New Value #1 box, type AssumeUDPEncapsulationContextOnSendRule, and then press ENTER.
Important This value name is case sensitive.
Right-click AssumeUDPEncapsulationContextOnSendRule, and then click Modify.
In the Value data box, type one of the following values:
0 (default)
A value of 0 (zero) configures Windows XP SP2 so that it cannot initiate IPsec-secured communications with responders that are located behind network address translators.
1
A value of 1 configures Windows XP SP2 so that it can initiate IPsec-secured communications with responders that are located behind network address translators.
2
A value of 2 configures Windows XP SP2 so that it can initiate IPsec-secured communications when both the initiators and the responders are behind network address translators.
Note This is the behavior of IPsec NAT-T in Windows XP without service packs installed and in Windows XP SP1.
Click OK, and then quit Registry Editor.
Restart the computer.
For Windows Vista
http://support.microsoft.com/kb/926179
Log on to the Windows Vista client computer as a user who is a member of the Administrators group.
Click Start, point to All Programs, click Accessories, click Run, type regedit, and then click OK. If the User Account Control dialog box is displayed on the screen and prompts you to elevate your administrator token, click Continue.
Locate and then click the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\PolicyAgent
Note You can also apply the AssumeUDPEncapsulationContextOnSendRule DWORD value to a Microsoft Windows XP Service Pack 2 (SP2)-based VPN client computer. To do this, locate and then click the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\IPSec
On the Edit menu, point to New, and then click DWORD (32-bit) Value.
Type AssumeUDPEncapsulationContextOnSendRule, and then press ENTER.
Right-click AssumeUDPEncapsulationContextOnSendRule, and then click Modify.
In the Value Data box, type one of the following values:
0
A value of 0 (zero) configures Windows so that it cannot establish security associations with servers that are located behind NAT devices. This is the default value.
1
A value of 1 configures Windows so that it can establish security associations with servers that are located behind NAT devices.
2
A value of 2 configures Windows so that it can establish security associations when both the server and the Windows Vista-based or Windows Server 2008-based VPN client computer are behind NAT devices.
Click OK, and then exit Registry Editor.
Restart the computer.
ClearOS multiwan provides simple GUI based method to add source based rules (if you want a LAN IP to always access through a particular WAN) but there is no facility to do a destination based rule (a particular site/IP to be always accessed via a particular WAB). This can be accomplished with editing related files via command line
following post in Clear Foundations Forums
example uses routing yahoo and google traffic via a specific WAN
1. first get the yahoo/google domains address (something like 209.191.64.0 – 209.191.127.255 for yahoo)
2. add to rc.local (etc/rc.d/rc.local ot rc.local.firewall) two line (one per rule):
route add -net 209.191.65.0 gw ip-wan1 netmask 255.255.128.0
route add -net 98.136.0.0 gw ip-wan2 netmask 255.255.0.0
3. reboot/ run rc singulair over the counter.local
Mahi ve mahi ve arz karan
Menu vu asmaani fitrat de
Vada mai hoke vi chukyan rava
Dola ve dola ve himat de
Rup:
Jo vi milay pyaar naal mila
Eh nafrat dil chon door karke
Je kam avay jaan meri ode
Ta hathaan ote dedaan jaan tarke
Q:
Insaani rishtaan nibhavan meh
Ghehraan noo apna banavan meh
Insaani rishtaan nibhavan meh
Ghehraan noo apna banavan
Chorus:
Mahi ve mahi ve arz karan
Menu vu asmaani fitrat de
Vada vi hoke vi chukyan rava
Dola ve dola ve himat de
Jo vi devay laake sar mathay
Mai jeendaan jevaan sari zindagani
Mai teri razaa de vich hoya raazi
Teri meharbaani
Kisi da vi haq meh na khavan
Aapni raah chalde jaavaan
Kisi da vi hakq meh na khavan
Aapni raah chalde jaavaan
Mahi ve mahi ve arz karan
Menu vu asmaani fitrat de
Vada mai hoke vi chukyan rava
Dola ve dola ve himat de
O Mahi veeeeeeeee
Mahi ve mahi ve arz karan
Menu vu asmaani fitrat de
Vada mai hoke vi chukyan rava
Dola ve dola ve himat de
O Mahi veeeeeeeee
O Dola veeeeeeeee
O Rabba veeeeeeee
if you switch on web proxy in ClearOS and have multiple networks (subnets) on your LAN remember to make following changes to your /etc/squid/squid.conf
in the squid file either find the following section
# INSERT YOUR OWN RULE(S) HERE TO ALLOW ACCESS FROM YOUR CLIENTS
# Example rule allowing access from your local networks. Adapt
# to list your (internal) IP networks from where browsing should
# be allowed
#acl our_networks src 192.168.1.0/24 192.168.2.0/24
#http_access allow our_networks
or anywhere make entriesas follows:
acl our_networks src 192.168.1.0/24 192.168.2.0/24
http_access allow our_networks
You can easily have a postfix relay server to manage emails for more than one domains but the aim here is to deliver an email coming in for one domain to two different servers. It is basically duplicating an email.
method 1:
After applying the canonical and masquerade mappings, the cleanup(8) daemon can generate optional BCC (blind carbon-copy) recipients. Postfix provides three mechanisms:
- always_bcc = address
- Deliver a copy of all mail to the specified address. In Postfix versions before 2.1, this feature is implemented by smtpd(8), qmqpd(8), or pickup(8).
- sender_bcc_maps = type:table
- Search the specified “type:table” lookup table with the envelope sender address for an automatic BCC address. This feature is available in Postfix 2.1 and later.
- recipient_bcc_maps = type:table
- Search the specified “type:table” lookup table with the envelope recipient address for an automatic BCC address. This feature is available in Postfix 2.1 and later.
Note: automatic BCC recipients are produced only for new mail. To avoid mailer loops, automatic BCC recipients are not generated for mail that Postfix forwards internally, nor for mail that Postfix generates itself.
Automatic BCC recipients (including always_bcc) can be turned off selectively for mail received by smtpd(8), qmqpd(8), or pickup(8), by overriding main.cf settings in the master.cf file. This feature is available in Postfix version 2.1 and later.
Example:
/etc/postfix/master.cf: 127.0.0.1:10026 inet n - n - - smtpd -o receive_override_options=no_address_mappings
Note: do not specify whitespace around the “=” here.
method 2:
Install
MailScanner and Spamassassin
Create a ruleset for non-spam emails
Ex.
{
To: domain.com deliver store-/var/archive/incoming/domain_com forward archive@domain.com
From: domain.com deliver store-/var/archive/outgoing/domain_com forward archive@domain.com
}
This will take any mail from domain.com deliver it to the intended user, store the email in a file in /var/archive/<direction>/domain_com and then send it to another email account.
If you want it to go to a seperate mail server you can edit the transport map for that subdomain that the mail is forwarded to point to another sub-domain and change “forward archive@domain.com” to “forward archive@archive.domain.com”.
You can also do per user for the ruleset so you could do something like this.
Ex.
{
To: user1@domain.com deliver store-/var/archive/incoming/domain_com forward user1@archive.domain.com
From: user1@domain.com deliver store-/var/archive/outgoing/domain_com forward user1@archive.domain.com
}
If you are really that concerned about it being the same “domain” the servers can “think” they are both part of the same domain but the server sending them the mail doesn’t have to. Just edit the hosts file of the server that is splitting the mail so it thinks it is on a subdomain.
method 3:
What you *should* look at is the content_filter. The content filter is a simple server program that listens to a specific port and gets mail from postfix. It then filters whatever needs filtering, and optionally sends stuff back to the postfix with various options included. In the filter program, I would then simply forward the mail to the new server, and feed the mail back into to local postfix for delivery. This way, you can have a sort of postfix tee Have a look at amavisd for how to implement this. Also Perl programming comes in handy in this case.
In general your content_filter would be something like
====<main.cf>====
content_filter=smtp-tee:127.0.0.1:10024
====<master.cf>====
smtp-tee unix – – y – 2 smtp -o smtp_data_done_timeout=1200
127.0.0.1:10025 inet n – n – – smtpd
-o content_filter=
-o my_networks=127.0.0.0/8
-o smtpd_recipient_restrictions=permit_mynetworks,rej ect
===========
This way, the server you implement listens on port 10024, gets the mail, and simply forwards it to port 25 on your new mail server. After that, it forwards it to port 10025 on the local server for further processing, that is: delivery.
Also, if you already have an antispam/antivirus configured, you can chain these elements (spamfilter and tee) by setting the content_filter parameter of one postfix input port to the other content_filter. So you can have antispam/antivirus checking done before you filter the mail to your tee.
method 4 (reported to not work in certain cases:
You can get postfix to send a copy of all email by adding this to your main.cf:
milter_default_action = tempfail
smtpd_milters = inet:ip_address_of_second_serverort_number
Our looks like:
milter_default_action = tempfail
smtpd_milters = inet:10.0.0.11:8092