You could also buy a Cisco Pix or something and just firewall off the interface you want to be secure so that only certain protocols get through.

Brent Ellis
Computing Services Group
Boston University
617-358-2486
interi@bu.edu
cashelp@bu.edu




On Aug 18, 2006, at 8:21 AM, Glenn Walker wrote:

The only way I've seen to do this in the past is with vfiler
(multistore).

Furthermore if the network is truly public (ie, security risk\internet),
I wouldn't connect any interface to it - there are more potential
problems that could happen other than access to data.

-----Original Message-----
From: owner-toasters@mathworks.com [mailto:owner-toasters@mathworks.com]
On Behalf Of Borzenkov, Andrey (FSC)
Sent: Friday, August 18, 2006 6:33 AM
To: toasters@mathworks.com
Subject: Disable CIFS for selected interface

We got an interesting question - how to disable CIFS for a single
interface?

More generally - customer has internal network with clients that access
filer using NFS or CIFS. This network is isolated and does not permit
sending any autosupport (via any protocol).

Customer would like to connect another interface to public network and
use it for administration and sending autosupport. The question is - how
to disable "normal" client access from public network?

regards

Andrey Borzenkov
Senior system engineer
Fujitsu Siemens Computers 
IT Product Services
Tel:    +7(495)737-2723  
Email:  Andrey.Borzenkov@fujitsu-siemens.com