/* HINT: Search archives @ http://www.indyramp.com/masq/ before posting! 
/* ALSO: Don't quote this header. It makes you look lame :-) */


Sperry Russ [mailto:[EMAIL PROTECTED]] wrote:
> I am new to IPmasq and Linux.
Welcome.

> I have installed a Linux firewall program named Smoothwall 
> (Kernel 2.2.18).
Not familiar with it particularly, but lets see what we can do.

> The technical support at Callwave gave me this information:
> 
> "Our current protocol does not lend itself well to standard 
> firewall rules. The client software on your desktop sends 
> UDP packets from a random source port >1024 to port 9283 on 
> our server. The server responds from port 9283 to the port 
> >1024 that the client originated from. If you can control 
> access to UDP packets by source port and grant access to 
> those UDP packets coming from port 9283, you may find 
> success."
Well, most of the ipchains firewall scripts that I have seen set the rules
up so that this is exactly what happens.  A simplified description of what
ipchains does is this.  Any allowed outbound connection is remembered.  When
an response packet is received for a remembered outbound connection, it is
allowed in and sent to the originator of the communication.  From what
you've written, this is what they are looking for.  Perhaps a listing of
your active rules set will help.  As root run "ipchains -L >
/root/ipchains-list.txt".  This will output a copy of your ipchains rules
into a file in root's home directory called ipchains-list.txt.

Jamin W. Collins

_______________________________________________
Masq maillist  -  [EMAIL PROTECTED]
Admin requests can be handled at http://www.indyramp.com/masq-list/ -- 
THIS INCLUDES UNSUBSCRIBING!
or email to [EMAIL PROTECTED]

PLEASE read the HOWTO and search the archives before posting.
You can start your search at http://www.indyramp.com/masq/
Please keep general linux/unix/pc/internet questions off the list.

Reply via email to