-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Tim Wegner wrote:

| Jim Ford asked:
|
|> My Dachstein setup appears to be working fine but Azereus reports a
|> NAT problem. As I'm still struggling up the ipchains learning curve,
|> I don't want to fiddle with anything and unwittingly throw the doors
|> open to attackers. I'd welcome suggestions for an ipchains line to
|> fix this and allow other peers to download from my torrents.
|
| First see:
|
| http://btfaq.com/serve/cache/25.html
|
| This contains various ways to set up port forwarding for bittorrent.
| I
| found this by googling "bittorrent nat". There is all kinds of
| information on this subject.
|
| To get rid of the NAT problem warning, I did this in shorewall rules:

<snip>

| I realize this doesn't address Dachstein directly, but I hope it
| helps.

For Dachstein, you'll want to use the settings in the "Port Forwarding" part
of /etc/network.conf.  Either the INTERN_SERVERS variable or the
INTERN_SERVERn settings.  I'd probably use the latter, since you'll probably
want to forward several ports.  Something like the following should do the
trick:

INTERN_SERVER0="tcp ${EXTERN_IP} 6881 1.2.3.4"
INTERN_SERVER1="tcp ${EXTERN_IP} 6882 1.2.3.4"
INTERN_SERVER2="tcp ${EXTERN_IP} 6883 1.2.3.4"
INTERN_SERVER3="tcp ${EXTERN_IP} 6884 1.2.3.4"
INTERN_SERVER4="tcp ${EXTERN_IP} 6885 1.2.3.4"
INTERN_SERVER5="tcp ${EXTERN_IP} 6886 1.2.3.4"
INTERN_SERVER6="tcp ${EXTERN_IP} 6887 1.2.3.4"
INTERN_SERVER7="tcp ${EXTERN_IP} 6888 1.2.3.4"
INTERN_SERVER8="tcp ${EXTERN_IP} 6889 1.2.3.4"

NOTES:
Replace 1.2.3.4 with the IP of your Azereus machine

It is important that the INTERN_SERVERn variables start with the number zero
and increment naturally (ie: no missing numbers).  If you skip a number (ie:
0, 1, 3, 4), any rules after the 'hole' will not be implemented!

You also have to allow the ports through your firewall.  Dachstein allows
'high' tcp ports (greater than 1024) in by default, so in this case there's
nothing else to do.  If you were using a 'low' port (ie: port 80, 22, etc),
you would need to use the EXTERN_TCP_PORTS or EXTERN_TCP_PORTn settings to
allow the traffic through the firewall.

- --
Charles Steinkuehler
[EMAIL PROTECTED]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFDf5+3LywbqEHdNFwRAmOiAJ9zHmyhPtW7wZmBFNefALtBpSVXjQCgpdun
fEf643FyKfxY8GeGxIrzX5U=
=Gxwo
-----END PGP SIGNATURE-----


-------------------------------------------------------
This SF.Net email is sponsored by the JBoss Inc.  Get Certified Today
Register for a JBoss Training Course.  Free Certification Exam
for All Training Attendees Through End of 2005. For more info visit:
http://ads.osdn.com/?ad_id=7628&alloc_id=16845&op=click
------------------------------------------------------------------------
leaf-user mailing list: leaf-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/leaf-user
Support Request -- http://leaf-project.org/

Reply via email to