on Tue, Jan 02, 2001 at 03:29:51AM -0600, Nathan E Norman ([EMAIL PROTECTED]) wrote: > On Tue, Jan 02, 2001 at 04:22:31AM -0500, D-Man wrote: > > > > This thread has invoked some curiosity in me. If I use ssh to forward > > X connections, does that mean I can use X through an IP masquerading > > router? > > Yup, if the box you're sitting at is inside the firewall. It's a bit > trickier the other way around.
In which case, the usual answer is to build a bridge through the firewall, either by initiating an outbound ssh session from your internal box, or by having an account on the firewall itself. See the Firewall-Piercing HOWTO for more info. Note that you should clear whatever methods you use with your organization's security policy. Personal or legal consequences may result. http://www.linuxdoc.org/HOWTO/mini/Firewall-Piercing.html -- Karsten M. Self <kmself@ix.netcom.com> http://kmself.home.netcom.com/ Evangelist, Zelerate, Inc. http://www.zelerate.org What part of "Gestalt" don't you understand? There is no K5 cabal http://gestalt-system.sourceforge.net/ http://www.kuro5hin.org
pgpHIzFVIbvdA.pgp
Description: PGP signature