6.Shutdown and reboot your machine and you're
ready
to go.

                    Linux IP Masquerading (2.2.x kernel)
                    (Thanks to Allen Rotton and Eric Jorgensen)
                       1.If you're using a firewall, then enable the
UDP:
51200, 51201,
                         and TCP: 51210.
                       2.In your /etc/rc.d/rc.local, add the following
lines
and reboot:
                         /usr/sbin/ipmasqadm autofw -A -v -u -r udp
51200
51201 -c
                         tcp 7175
                         /usr/sbin/ipmasqadm autofw -A -v -u -r tcp
51210
51210 -c
                         tcp 7175
                       3.Also, please take a look at
                         
http://my.ispchannel.com/~rottona/linux_dialpad.html

                    Linux 2.0.x or ShareTheNet
                    (Thanks to David Ruggiero)
                         In /etc/rc.d/rc.local (ShareTheNet users, use
"Advanced Setup,
                         Advanced Options, Manual Startup Commands"),
add
the
                         following lines:

                         #for dialpad.com
                         #external static IP address
                         IP_REAL="xxx.xxx.xxx.xxx"
                         #internal non-routable IP address of target PC
(e.g. 10.10.xx.xx
                         or 192.168.zz.zz)
                         TOIP_PC="zzz.zzz.zzz.zzz"
                         ipportfw -C
                         ipportfw -A -t$IP_REAL/51210 -R $TOIP_PC/51210
                         ipportfw -A -u$IP_REAL/51201 -R $TOIP_PC/51201
                         ipportfw -A -u$IP_REAL/51200 -R $TOIP_PC/51200
                         ipportfw -L
                         #end of dialpad.com setup

                    How to add UDP ports and TCP ports to Linux lines
                    (No, Linux isn't a network, but network users are
often
Linux users.
                    Here's the info. We need more Linux tips. If you
have
Dialpad working
                    with Linux, let us know! Your fellow Linux users
want to
know. Tip of
                    the cap to Akiko.)
                         You will need the kernel source, v.2.0.36 or
higher.
                           1.Unpack the kernel source to /usr/src/ with
the
following
                             command:
                             tar xvzf linux-2.0.x.tar.gz -C /usr/src
                             where the 'x' in 2.0.x is the current Linux
2.0
kernel. Once
                             finished, make sure that there is a
directory
or symbolic
                             link to /usr/src/linux/.
                           2.Apply any appropriate or optional patches
to
the kernel
                             source code. As of 2.0.36, IP Masq does not
require any
                             specific patching to get everything to
work.
Features such
                             as IPPORTFW, PPTP, and Xwindows forwarders
are
                             optional.
                         The following are the MINIMUM necessary options
to
be
                         compiled into the kernel. You will also need to
configure the
                         kernel to use your installed network interfaces
as
well. Please
                         refer to the Linux Kernel HOWTO and the README
file
in the
                         kernel source directory for further
instructions on
compiling a
                         kernel.
                         Please note the YES or NO ANSWERS to the
following
options.
                         Not all options will be available without the
proper kernel
                         patches described later in this HOWTO:
                           1.Prompt for development and/or incomplete
code/drivers
                             (CONFIG_EXPERIMENTAL) [Y/n/?]
                             YES: this will allow you to later select
the IP
Masquerade
                             feature code
                           2.Enable loadable module support
(CONFIG_MODULES)
                             [Y/n/?]
                             YES: allows you to load kernel IP MASQ
modules
                           3.Networking support (CONFIG_NET) [Y/n/?]
                             YES: Enables the network subsystem
                           4.Network firewalls (CONFIG_FIREWALL) [Y/n/?]
                             YES: Enables the IPFWADM firewall tool
                           5.TCP/IP networking (CONFIG_INET)
                             YES: Enables the TCP/IP protocol
                           6.IP: forwarding/gatewaying
(CONFIG_IP_FORWARD)
                             YES: Enables Linux network packet
forwarding
and
                             routing - Controlled by IPFWADM
                           7.IP: syn cookies (CONFIG_SYN_COOKIES)
[Y/n/?]
                             YES: HIGHLY recommended for basic network
security
                           8.IP: firewalling (CONFIG_IP_FIREWALL)
[Y/n/?]
                             YES: Enable the firewalling feature
                           9.IP: firewall packet logging
                             (CONFIG_IP_FIREWALL_VERBOSE) [Y/n/?]
                             YES: (OPTIONAL but HIGHLY recommended):
Allows
                             for the reporting of firewall hits
                           10.IP: masquerading (CONFIG_IP_MASQUERADE
                             [Y/n/?]
                             YES: Enable IP MASQ to re-address specific
internal to
                             external TCP/IP packets
                           11.IP: ipautofw masquerade support
(EXPERIMENTAL)
                             (CONFIG_IP_MASQUERADE_IPAUTOFW) [Y/n/?]
                             NO: IPautofw is a legacy method of TCP/IP
port
                             forwarding. Though it works, IPPORTFW is a
better
                             option. Because of this, IPAUTOFW is not
recommended.
                           12.IP: ipportfw masq support (EXPERIMENTAL)
                             (CONFIG_IP_MASQUERADE_IPPORTFW) [Y/n/?]
                             YES: This option is ONLY AVAILABLE VIA A
PATCH
                             for the 2.0.x kernels.
                             With this option, external computers on the
Internet can
                             directly communicate to specified internal
MASQed
                             machines. This feature is typically used to
access internal
                             SMTP, TELNET, and WWW servers. FTP port
                             forwarding will need an additional patch as
described in
                             the FAQ section. Additional information on
port
                             forwarding is available in the Forwards
section
of this
                             HOWTO.
                           13.IP: ICMP masquerading
                             (CONFIG_IP_MASQUERADE_ICMP) [Y/n/?]
                             YES: Enable support for masquerading ICMP
packets.
                             Though thought of as optional, many
programs
will NOT
                             function properly without ICMP support.
                           14.IP: loose UDP port managing (EXPERIMENTAL)
                             (CONFIG_IP_MASQ_LOOSE_UDP) [Y/n/?]
                             YES: This option is ONLY AVAILABLE VIA A
PATCH
                             for the 2.0.x kernels.
                             With this option, internally masqueraded
computers can
                             play NAT-friendly games over the Internet.
Explicit
                             details are given in the FAQ section of
this
HOWTO.
                           15.IP: always defragment
                             (CONFIG_IP_ALWAYS_DEFRAG) [Y/n/?]
                             YES: This feature optimizes IP MASQ
connections
-
                             HIGHLY recommended.
                           16.IP: optimize as router not host
(CONFIG_IP_ROUTER)
                             [Y/n/?]
                             YES: This optimizes the kernel for the
network
                             subsystem.
                           17.IP: Drop source routed frames
(CONFIG_IP_NOSR)
                             [Y/n/?]
                             YES: HIGHLY recommended for basic network
security.
                           18.Dummy net driver support (CONFIG_DUMMY)
                             [M/n/y/?]
                             YES: Though OPTIONAL, this option can help
when
                             debugging problems.
                           19./proc filesystem support (CONFIG_PROC_FS)
[Y/n/?]
                             YES: Required to enable the Linux network
forwarding
                             system.
                             Note: These are just the components you
need
for IP
                             Masquerade functionality. You will need to
also
select
                             whatever other options you need for your
specific
                             network and hardware setup. After compiling
the
kernel,
                             you need to also compile and install the IP
MASQ kernel
                             modules by doing the following.
                           20.Make modules; make modules_install
                           21.Next, add the following lines into your
/etc/rc.d/rc.local
                             file to load the IP Masquerade script. This
will enable IP
                             MASQ automatically after each reboot:
                             .
                             .
                             .
                             #rc.firewall script - Start IPMASQ and the
firewall
                             /etc/rc.d/rc.firewall

                    Connecting AOL v. 4.0 through a SOCKS proxy server
                    (Thanks to Dash and Theia. Additional comments by
Piper.)
                       1.Open your AOL (America Online) software.
                       2.Click the Setup button.
                       3.Click the Expert Setup button.
                       4.Click the Locations tab, if it isn't already at
the
front.
                       5.Click the ISP/LAN Connection item.
                       6.Click the Edit button.
                       7.Click the Manual Proxy Configuration radio
button.
                       8.Click the View button.
                       9.In the Server section, enter the IP address of
your
WinGate
                         machine in the Host: field
                      10.Enter 5190 in the Port: field
                      11.Click UDP. If UDP is not available, use TCP/IP
check box.
                      12.Click OK.
                      13.Click OK.
                      14.Click Close.
                      15.Finally, make sure you have a TCP mapping
service
configured
                         in WinGate with americaonline.aol.com set as
the
default
                         mapping on port 5190. The rest of AOL4
configurations don't
                         concern WinGate. 
-- 


  
  .--. `           
  |__| .-------.   Altoine Barker
  |=.| |.-----.|   Maximum Time, Inc
  |--| ||$SEND||   Chicago Based Enterprise
  |  | |'-----'|   http://www.maximumtime.com   
  |__|~')_____('

Reply via email to