Read, read, read,
Buy then read the book "Linux Firewalls" by Robert L.
Ziegler published by New Riders ISBN 0-7357-0900-9. This
will explain the how-to and why of the plethora of ipchains
rules that will allow fine grained control of your
masqueraded connection. This way my approach.
HTH
Bob Hartung
> ----- Original Message -----
> From: "harmit" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Sent: Tuesday, April 10, 2001 12:51 PM
> Subject: MASQUERADING
>
> > Hi
> >
> > How can I use masquerading on linux 6.2 box .I have only one real IP .
> > Any help on this with steps would behighly appreciated.
> > TIA
> >
> >
> >
> > _______________________________________________
> > Redhat-list mailing list
> > [EMAIL PROTECTED]
> > https://listman.redhat.com/mailman/listinfo/redhat-list
> >
>
> _______________________________________________
> Redhat-list mailing list
> [EMAIL PROTECTED]
> https://listman.redhat.com/mailman/listinfo/redhat-list
_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list