-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Tim Wegner wrote:
| Jim Ford asked: | |> My Dachstein setup appears to be working fine but Azereus reports a |> NAT problem. As I'm still struggling up the ipchains learning curve, |> I don't want to fiddle with anything and unwittingly throw the doors |> open to attackers. I'd welcome suggestions for an ipchains line to |> fix this and allow other peers to download from my torrents. | | First see: | | http://btfaq.com/serve/cache/25.html | | This contains various ways to set up port forwarding for bittorrent. | I | found this by googling "bittorrent nat". There is all kinds of | information on this subject. | | To get rid of the NAT problem warning, I did this in shorewall rules: <snip> | I realize this doesn't address Dachstein directly, but I hope it | helps. For Dachstein, you'll want to use the settings in the "Port Forwarding" part of /etc/network.conf. Either the INTERN_SERVERS variable or the INTERN_SERVERn settings. I'd probably use the latter, since you'll probably want to forward several ports. Something like the following should do the trick: INTERN_SERVER0="tcp ${EXTERN_IP} 6881 1.2.3.4" INTERN_SERVER1="tcp ${EXTERN_IP} 6882 1.2.3.4" INTERN_SERVER2="tcp ${EXTERN_IP} 6883 1.2.3.4" INTERN_SERVER3="tcp ${EXTERN_IP} 6884 1.2.3.4" INTERN_SERVER4="tcp ${EXTERN_IP} 6885 1.2.3.4" INTERN_SERVER5="tcp ${EXTERN_IP} 6886 1.2.3.4" INTERN_SERVER6="tcp ${EXTERN_IP} 6887 1.2.3.4" INTERN_SERVER7="tcp ${EXTERN_IP} 6888 1.2.3.4" INTERN_SERVER8="tcp ${EXTERN_IP} 6889 1.2.3.4" NOTES: Replace 1.2.3.4 with the IP of your Azereus machine It is important that the INTERN_SERVERn variables start with the number zero and increment naturally (ie: no missing numbers). If you skip a number (ie: 0, 1, 3, 4), any rules after the 'hole' will not be implemented! You also have to allow the ports through your firewall. Dachstein allows 'high' tcp ports (greater than 1024) in by default, so in this case there's nothing else to do. If you were using a 'low' port (ie: port 80, 22, etc), you would need to use the EXTERN_TCP_PORTS or EXTERN_TCP_PORTn settings to allow the traffic through the firewall. - -- Charles Steinkuehler [EMAIL PROTECTED] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFDf5+3LywbqEHdNFwRAmOiAJ9zHmyhPtW7wZmBFNefALtBpSVXjQCgpdun fEf643FyKfxY8GeGxIrzX5U= =Gxwo -----END PGP SIGNATURE----- ------------------------------------------------------- This SF.Net email is sponsored by the JBoss Inc. Get Certified Today Register for a JBoss Training Course. Free Certification Exam for All Training Attendees Through End of 2005. For more info visit: http://ads.osdn.com/?ad_id=7628&alloc_id=16845&op=click ------------------------------------------------------------------------ leaf-user mailing list: leaf-user@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/leaf-user Support Request -- http://leaf-project.org/