Jason, that worked pretty well.

I can access that interface from all 4 ip's now.  Looks like I'm half
done.

I tried the next step myself.  I'm actually using the older IPFWADM
program for my masquerading.

I just did:

# ipfwadm -F -i accept -S 64.50.146.19 -D 192.168.1.2
# ipfwadm -F -i accept -S 64.50.146.20 -D 192.168.1.3
# ipfwadm -F -i accept -S 64.50.146.21 -D 192.168.1.4
# ipfwadm -F -l -n
IP firewall forward rules, default policy: deny
type  prot source               destination          ports
acc   all  64.50.146.19         192.168.1.2          n/a
acc   all  64.50.146.20         192.168.1.3          n/a
acc   all  64.50.146.21         192.168.1.4          n/a
acc/m all  192.168.1.0/24       0.0.0.0/0            n/a
# 

It looks like it work magically -- that is it looks like anything coming
in from 64.50.146.19 would be sent to 192.168.1.2, etc.

But when I telnet to 64.50.146.19 I get the login MOTD for the
64.50.146.18 box.  So close :)

Brian

PS: After I wrote this mail, I'm now unable to access the box at all.
The telnet MOTD is displaying really slow, well no, now the box is
refusing all connections.  I assume the CPU is busy routing IP traffic
to itself or something equally uninteresting.

No big deal, I'll just see what I did to the box when I get home.

Actually, I think I know what I did wrong.  I had the wrong concept of
how ipfwadm instructs the kernel to forward packets.  I must have had it
backwards, or approaching it the wrong way.
-
To unsubscribe from this list: send the line "unsubscribe linux-net" in
the body of a message to [EMAIL PROTECTED]

Reply via email to