Charles:

This worked beautifully.  Thanks. :)

- Mike

On Fri, 17 Mar 2000, Charles Galpin wrote:

> this should get you started. Stick this in /etc/rc.d/rc.local
> 
> # IP Masquerading
> echo "1" > /proc/sys/net/ipv4/ip_forward
> /sbin/modprobe ipip.o
> /sbin/modprobe ip_masq_ftp.o
> /sbin/modprobe ip_masq_raudio.o
> /sbin/modprobe ip_irc.o
> #/sbin/modprobe ip_masq_pptp.o
> 
> # sets timeouts to decent values
> # This sets the timeout for an open but inactive tcp connection to
> # 2 hours, a "properly" closed tcp connection to 2 minutes and an
> #open/inactive udp connection to 2 hours
> ipchains -M -S 7200 120 7200
> 
> /sbin/ipchains -P forward DENY
> /sbin/ipchains -A forward -j MASQ -s 192.168.1.0/24 -d 0.0.0.0/0
> 
> 
> this simply gets your intetnal machines masqueraded. As you know, you will
> want to implement additional rules for a firewall. 
> 
> hth
> charles
> 
> On Fri, 17 Mar 2000, Michael J. McGillick wrote:
> 
> > Evening:
> > 
> > I have two Ethernet cards in my Linux box.  I'm running ipchains.  So far,
> > I've not set up anything with a Firewall blocking any of the three chains,
> > input, output or forward.  They all have a default policy of accept. I 
> > would like to start by making it so that my internal network,
> > 192.168.1.0/24 can talk out to the Internet.  What are the rules that I
> > need to give to ipchains to do this?  I've read, but so far have only
> > managed to confuse myself further :)
> > 
> > - Mike
> 
> 
> 


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.

Reply via email to