Read, read, read, 
  Buy then read the book "Linux Firewalls" by Robert L.
Ziegler published by New Riders ISBN 0-7357-0900-9.  This
will explain the how-to and why of the plethora of ipchains
rules that will allow fine grained control of your
masqueraded connection.  This way my approach.

HTH

Bob Hartung

> ----- Original Message -----
> From: "harmit" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Sent: Tuesday, April 10, 2001 12:51 PM
> Subject: MASQUERADING
> 
> > Hi
> >
> > How can I use masquerading on linux 6.2 box .I have only one real IP .
> > Any help on this with steps  would behighly appreciated.
> > TIA
> >
> >
> >
> > _______________________________________________
> > Redhat-list mailing list
> > [EMAIL PROTECTED]
> > https://listman.redhat.com/mailman/listinfo/redhat-list
> >
> 
> _______________________________________________
> Redhat-list mailing list
> [EMAIL PROTECTED]
> https://listman.redhat.com/mailman/listinfo/redhat-list



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to