On Sun, 29 Nov 1998, David A. Ranch wrote:
Hello!
>
>>How does one specify port ranges using ipportfw?
>
>>From my understanding, IPPORTFW cannot do ranges.
>You have to do it a port at a time.
>
>>What would be needed to specify a certain range
>>of ports for icq using ipportfw?
>
>You shouldn't need to. ICQ should MASQ fine.
>
Only parts of it do...inbound file transfers and chat requests, for
example, do not get through. I, too, am interested in how to do this.
UDP Port 4000 might be a key but I have no idea how to set it up....
John Mudge
>
>>And what are the major diffs between ipportfw and
>>ipautofw? Thanks!
>
>Fuzzy Fox sent this out a while ago which explains is
>pretty well..
>
>--
>> 1) ipautofw - From the docs, this seems to add a range of ports to the
>> masqerading list in the kernel whenever a packet is received on a
>> specific port. This is a kernel patch. Some people on the list
>> have complained of trouble with it, others have no problems.
>
>Ipautofw is an interesting beast. It can be run in one of several
>modes:
>
> a. It can wait until a machine behind the firewall sends a certain
> type of request out, then it can start redirecting return
> traffic, on a different port or range of ports, back to that
> originating host. This way, multiple machines behind the
> firewall can be serviced by a single port-forwarding request.
>
> b. It can be set up to forward a port or range of ports
> unconditionally, to a machine behind the firewall. This seems
> to be a more popular mode than the previous, since it's easier
> for people to set up.
>
>The problems that most people have, occur when they use that second
>mode. When running in this mode, ipautofw forwards all packets that
>appear on that port, or range of ports, regardless of the reason they
>are arriving. This can conflict with legitimate use of the machine,
>because a network connection originating on the firewall might attempt
>to make use of one of those ports as its "source" port, but when a
>remote machine tries to reply, the reply gets forwarded to the machine
>behind the firewall, so the connection times out. Since source ports
>are chosen in ascending order, the larger the range forwarded, the
>sooner this condition will happen, and the longer it will last.
>
>For this reason, ipautofw is considered to be deprecated, and ipportfw
>is considered the more useful solution.
>
>> 2) ipportfw - Again, haven't used it. As I understand it, this
>> package does things a little differently than ipautofw, in that it
>> sets up a permanent forward for the ports in question, not just
>> adding them in response to a packet send, and is considered by some
>> to be a bit more stable.
>
>Ipportfw is very stable and useful. It is smarter about how packets are
>forwarded, and does not have the "collision" problem stated above, so it
>will not interfere with the firewall's network connection attempts. It
>does not have the flexibility that ipautofw has, though; it can only
>forward to one machine behind the firewall for each particular port, and
>will not forward port ranges. You must forward each port in the range,
>individually. However, since most people don't seem to use that first
>mode of ipautofw, this isn't really too bad, and you can always use
>both, if you really want to. Ipautofw is deprecated, but doesn't seem
>to be going away, yet.
>
>> 3) redir - This is what I use. It only works for TCP connections (I
>> think), but if what you need is to redirect one TCP port to another
>> machine, it's just the ticket.
>
>The main problem, if you want to call it that, with a program like
>'redir', is that it will not masquerade the resulting connection.
>Basically, all connections to your internal machine will appear to be
>coming from the firewall's IP address. This may not seem like a big
>deal, but if you're running a web server, for instance, you won't be
>able to tell who's connecting to your web server. Every connection will
>appear as coming from your firewall, in your server logs. You'd have to
>do the connection logging on the firewall, which I don't think redir
>even bothers to do.
>
>> This has the distinct advantage of being very simple to understand,
>> and to NOT require kernel patches.
>
>This much is true, however, the kernel patches for these port-forwarders
>are quite stable and non-obtrusive (except for the above-mentioned
>problem with ipautofw).
>--
>.----------------------------------------------------------------------------.
>| David A. Ranch - Remote Access/Linux/PC hardware [EMAIL PROTECTED] |
>!---- ----!
>`----- For more detailed info, see http://www.ecst.csuchico.edu/~dranch -----'
>---------------------------------------------------------------------
>To unsubscribe, e-mail: [EMAIL PROTECTED]
>For additional commands, e-mail: [EMAIL PROTECTED]
>For daily digest info, email [EMAIL PROTECTED]
>
---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
For daily digest info, email [EMAIL PROTECTED]