>       I have ipchains running with only these lines in the
> rc.local file
>
> # Starting IP MASQ/IP Chains
>
>    echo "Starting IP Chains"
>    ipchains -P forward DENY
>    ipchains -A forward -s 192.168.0.1/24  -j MASQ

Silly comment: for debugging and traffic monitoring I prefer to specify the
device that is masqueraded that way link up requests etc show the real ip
address rather than the address of the diald device.  BTW I use more than
one diald so that's why I wildcard the devices below.

# set policy
ipchains -P forward DENY
# clear any existing rules
ipchains -F forward
# masq local traffic out any ppp connection
ipchains -A forward -s 192.168.0.1/24 -i ppp+ -j MASQ
# forward any local traffic through any diald devices
ipchains -A forward -s 192.168.0.1/24 -i tap+ -j MASQ
ipchains -A forward -s 192.168.0.1/24 -i sl+ -j MASQ

>  the 192.168.0.1/24  I hope is for the linux router nubble at
> 192.168.0.1 port 24

The /24 designates the number of bits used in the netmask netmask (not a
port), it's as if you'd written 192.168.0.1/255.255.255.0

> the kernel is 2.2.36?  well anyway its redhat 6.1

kernel 2.2.x doesn't go that high.  Try 'uname -r' to get the version.
2.2.12-22 is likely.

ICMP masquerading is the default on RedHat kernels.

The next step is making sure you actually turned on forwarding.

'cat /proc/sys/net/ip4v/ip_forward' if it says '0' that's your problem.
'echo 1 > /proc/sys/net/ip4v/ip_forward' for now and edit
/etc/sysconfig/network so FORWARD_IPV4="yes" so it'll be done automatically
for you at the next reboot.

Lourdes


-
To unsubscribe from this list: send the line "unsubscribe linux-diald" in
the body of a message to [EMAIL PROTECTED]

Reply via email to