Pentru oamenii cu de pe routere si masqerade cred ca atashu' asta
e util.
Je.
-- Attached file included as plaintext by Listar --
-- File: Everything.txt
Application Name Kernel Modules IPChains IPfwadm Comments
Active Worlds 2.0+ 2.0.36,2.2.x The latest Active Worlds programs now
seem to work through linux ipmasqing without any problems.
Age of Empires/Rise of Rome 2.0.36 ipmasqadm autofw -A -r upd 1100
7000 -h x.x.x.x ipmasqadm autofw -A -r tcp 1100 5000 -h x.x.x.x
ipmasqadm autofw -A -r udp 47624 47624 -h x.x.x.x ipautofw -A -r upd
1100 7000 -h x.x.x.x ipautofw -A -r tcp 1100 5000 -h x.x.x.x ipautofw
-A -r udp 47624 47624 -h x.x.x.x This can also work on Internet gaming
Zone
Age of Kings 2.0.36 ipmasqadm autofw -A -r upd 1100 7000 -h x.x.x.x
ipmasqadm autofw -A -r tcp 1100 5000 -h x.x.x.x ipmasqadm autofw -A -r
udp 47624 47624 -h x.x.x.x ipmasqadm autofw -A -r upd 1100 7000 -h
x.x.x.x ipmasqadm autofw -A -r tcp 1100 5000 -h x.x.x.x ipmasqadm
autofw -A -r udp 47624 47624 -h x.x.x.x See also Age of Empires...
Age of Wonders 2.2.12 ipmasqadm autofw -A -r tcp 47624 47625 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r tcp 2300 2400 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r udp 2300 2400 -h
www.xxx.yyy.zzz ipautofw -A -r tcp 47624 47625 -h www.xxx.yyy.zzz
ipautofw -A -r tcp 2300 2400 -h www.xxx.yyy.zzz ipautofw -A -r udp
2300 2400 -h www.xxx.yyy.zzz Standard DirectX 6.0. Game works well
from private host to private host. Had a bit of a look at heat.net but
didn\'t work.
Ages of Empire (Over the Zone) 2.0.36 ipmasqadm autofw -A -r udp 2300
2400 -h www.xxx.yyy.zzz ipmasqadm autofw -A -r tcp 2300 2400 -h
www.xxx.yyy.zzz ipautofw -A -r udp 2300 2400 -h www.xxx.yyy.zzz
ipautofw -A -r tcp 2300 2400 -h www.xxx.yyy.zzz These ipautofw
commands will work for AOE over the Zone. www.xxx.yyy.zzz is the ip of
the computer that will be running that game. Note that only one
computer will be able to play at a time. If anyone know how to make it
so more than one computer can play at the same time please email me
settings, thanks.
AIM V3.0 File Transfer 2.2.5 ipmasqadm autofw -A -r tcp 5190 5190 -c
5190 ipautofw -A -r tcp 5190 5190 -c 5190 AIM file transfer starts a
miniature server on port 5190 on the sending machine, to which the
receiving machine connects. I don\'t know enough about the internals
of ipautofw and the ipo masquerading kernel code to know if this will
support/handle multiple AIM clients simultaneously doing file sends
behind the same masq, but with only one machine trying to send a file
over AIM it works great with the ipautofw rule. [Note: multiples
internal machines are HIGHLY unlikely. -seg]
Air Warrior 3 2.0.36 Works fine out of the box -- even VOX.
AirWarrior 2 2.0.36 Works fine out of the box -- even VOX.
Alien vs. Predator 2.2.13 ipmasqadm autofw -A -u -r tcp 2300 2400 -h
xxx.xxx.xxx.xxx ipmasqadm autofw -A -u -r udp 2300 2400 -h
xxx.xxx.xxx.xxx ipmasqadm autofw -A -u -r tcp 7000 10000 -h
xxx.xxx.xxx.xxx ipmasqadm autofw -A -u -r udp 7000 10000 -h
xxx.xxx.xxx.xxx ipautofw -A -u -r tcp 2300 2400 -h xxx.xxx.xxx.xxx
ipautofw -A -u -r udp 2300 2400 -h xxx.xxx.xxx.xxx ipautofw -A -u -r
tcp 7000 10000 -h xxx.xxx.xxx.xxx ipautofw -A -u -r udp 7000 10000 -h
xxx.xxx.xxx.xxx I\'m not familiar with the syntax for ipfwadm, but the
ports that need to be forwarded are 2300-2400 for tcp and udp as well
as 7000-10000 for tcp and udp. I found info on http://www.avpnews.com
where they posted the info needed to get sygate working.
AllAdvantage ViewBar 2.2.13 Works out of the box using ip-chains setup
in the masquerade HOWTO. No special configuration needed.
Allegiance 2.2.13 ipmasqdm autofw -A -r tcp 47624 47624 -h
xxx.xxx.xxx.xxx ipmasqadm autofw -A -r tcp 2300 2400 -h
xxx.xxx.xxx.xxx ipmasqadm autofw -A -r udp 2300 2400 -h
xxx.xxx.xxx.xxx ipautofw -A -r tcp 47624 47624 -h xxx.xxx.xxx.xxx
ipautofw -A -r tcp 2300 2400 -h xxx.xxx.xxx.xxx ipautofw -A -r udp
2300 2400 -h xxx.xxx.xxx.xxx Thought this would be a pain after
viewing the README for this game, but it ended up being a simple
config, works fine. I just added the lies to a script called
rc.firewall under Slackware 7.0, and the script runs from rc.local on
bootup.
Allegiance (over Zone) 2.2.14 mfw ipchains -A input -p tcp -d 0/0
2300:2400 -m 1 -I ppp0 -j ACCEPT ipchains -A input -p udp -d 0/0
2300:2400 -m 1 -I ppp0 -j ACCEPT ipmasqadm mfw -A -m 1 -r internalip
This only allows the machine at \"internalIP\" to play. Replace -I
ppp0 with your external interface. This uses the ip fwmark
masq-forwarding modules (experimental).
Alpha Centauri 2.2.13 ipmasqadm autofw -A -r tcp 2300 2400 -h
192.168.1.242 ipmasqadm autofw -A -r udp 2300 2400 -h 192.168.1.242
ipautofw -A -r tcp 2300 2400 -h 192.168.1.242 ipautofw -A -r udp 2300
2400 -h 192.168.1.242 [Note: ip_masq_autofw is only needed for
ipfwadm. Ipchains doesn\'t use it. -seg] This setup works for me when
joining a game. I don\'t know if all ports between 2300 and 2400 are
necessary.
America Online 4.0 2.0.33 Everything works straight out of the box.
AOL 4.0 revisions tested, currently the software is in beta. Build
134.126a -- Internal Beta Buil 118 -- Preview both 16 an 32 bit
tested. 16 Bit also worked on WFW 3.11
America Online v3.0 2.0.30 AOL should work fine out of the box... I
have used it many times from behind the firewall without problems,
just setup you AOL for normal tcp/ip connections and it should work.
This is for the 3 win95 version. I have not tested the 3.1 or older
ones.
AOL Instant Messenger 2.0.30 Windows 95, Linux Java, and Mac versions
work fine. The windows 3.1 version is unable to connect.
Asheron\'s Call 2.2.5-15 Works without a hitch on a default RH 6.0 box
that was just freshly setup for masquerade. Tested it with two clients
running simultaneously, 2 different players, 2 different accounts.
Both can run simultaneously perfectly.
AtomTime 95 2.0.30 Works with no problems. Rather sluggish under masq.
I turned off \"Triple Request Time Check\" to speed things up.
Balder\'s Gate 2.0.36 ipmasqadm -A input -j ACCEPT -p tcp -i eth0 -s
any/0 1024:65535 -d www.xxx.yyy.zzz 47624^M ipmasqadm -A input -j
ACCEPT -p tcp -i eth0 -s any/0 47624 -d www.xxx.yyy.zzz 1024:65535^M
ipmasqadm -A input -j ACCEPT -p udp -i eth0 -s any/0 1024:65535 -d
www.xxx.yyy.zzz 47624^M ipmasqadm -A input -j ACCEPT -p udp -i eth0 -s
any/0 47624 -d www.xxx.yyy.zzz 1024:65535^M ipmasqadm -A input -j
ACCEPT -p tcp -i eth0 -s any/0 1024:65535 -d www.xxx.yyy.zzz
2300:2399^M ipmasqadm -A input -j ACCEPT -p tcp -i eth0 -s any/0
2300:2399 -d www.xxx.yyy.zzz 1024:65535^M ipmasqadm -A input -j ACCEPT
-p udp -i eth0 -s any/0 1024:65535 -d www.xxx.yyy.zzz 2300:2399^M
ipmasqadm -A input -j ACCEPT -p udp -i eth0 -s any/0 2300:2399 -d
www.xxx.yyy.zzz 1024:65535 ipfwadm: ipfwadm -I -a accept -P tcp -W
eth0 -S any/0 1024:65535 -D 47624 ipfwadm -I -a accept -P tcp -W eth0
-S any/0 47624 -D 1024:65535 ipfwadm -I -a accept -P udp -W eth0 -S
any/0 1024:65535 -D 47624 ipfwadm -I -a accept -P udp -W eth0 -S any/0
47624 -D 1024:65535 ipfwadm -I -a accept -P tcp -W eth0 -S any/0
1024:65535 -D 2300:2399 ipfwadm -I -a accept -P tcp -W eth0 -S any/0
2300:2399 -D 1024:65535 ipfwadm -I -a accept -P udp -W eth0 -S any/0
1024:65535 -D 2300:2399 ipfwadm -I -a accept -P udp -W eth0 -S any/0
2300:2399 -D 1024:65535 ipautofw: ipautofw -A -v -r tcp 47624 47624 -h
www.xxx.yyy.zzz ipautofw -A -v -r ucp 47624 47624 -h www.xxx.yyy.zzz
ipautofw -A -r tcp 2300 2399 -h www.xxx.yyy.zzz ipautofw -A -r udp
2300 2399 -h www.xxx.yyy.zzz This works for both joining and hosting a
game. The Gamespy Lite that comes with BG is a bit of a pain. I
haven\'t got that working right yet. I thing it uses ICMP. Any hints
for that are welcome.
Battle.Net 2.2.x The entry was previously sort of mentioned in the
\"Battle.Net\" entry for Blizzard games. No special setup is required
to use a remote bnetd server version 0.4.20 or later. (Where remote
means the server is outside oyour masq\'d network like the real
Battle.Net servers would be.) When the server is inside of your local
network or on your gateway, the configuration becomes somewhat
complicated. In that case, you will need to have a unique UDP port
forwarded for each internal game client machine, and you will need to
add a line for each of these clients into the gametrans configuration
file. Older versions of the game clients do not support this new
automatic setup. This includes Starcraft < 1.05 and Diablo < 1.07
BattleCom 2.0.36 ipmasqadm autofw -A -r tcp 47624 47625 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r tcp 2300 2400 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r udp 2300 2400 -h
www.xxx.yyy.zzz www.xxx.yyy.zzz = internal machine. ipautofw -A -r tcp
47624 47625 -h www.xxx.yyy.zzz ipautofw -A -r tcp 2300 2400 -h
www.xxx.yyy.zzz ipautofw -A -r udp 2300 2400 -h www.xxx.yyy.zzz
www.xxx.yyy.zzz = internal machine. This is all you need to get
BattleCom workig. These should also work for most DirectX 6.0 Games.
Battlefield Communicator 2.0.36 ipmasqadm autofw -A -r tcp 47624 47624
-h ipmasqadm autofw -A -r tcp 2300 2400 -h ipmasqadm autofw -A -r udp
2300 2400 -h ipautofw -A -r tcp 47624 47624 -h ipautofw -A -r tcp 2300
2400 -h ipautofw -A -r udp 2300 2400 -h see
http://www.shadowfactor.com/linuxmasq.html for more information.
BattleZone I 2.0.38 There is a patch out there called bz14-na4.zip
that used to be on Activisions WWW site. Simply install this patch on
your windows machine and BattleZone will start working. Super simple
and it works great.
BattleZone II 2.0.38 This game is based on Microsoft DirectPlay though
the setups on the Masq Apps page are way overkill. This setup works
well for me. Note: $extip is your EXTERNAL IP address on the Inet
$portfw is the IP address of the internal gaming machine --
/usr/local/sbin/ipportfw -C echo \" Enabling DirectPlay [TCP] to
$portfw4\" port=2300 while [$port -lt 2401 ] do
/usr/local/sbin/ipportfw -A -t$extip/$port -R $portfw/$port
port=$((port+1)) done port=1000 while [ $port -lt 1100 ] do
/usr/local/sbin/ipportfw -A -t$extip/$port -R $portfw/$port
port=$((port+1)) done echo \"Enabling DirectPlay [UDP] to $portfw..\"
port=2300 while [ $port -lt 2401] do /usr/local/sbin/ipportfw -A
-u$extip/$port -R $portfw/$port port=$((port+1)) done echo \"Enabling
DirectPlay [17700-17800 UDP] to $portfw..\" port=17700 while [ $port
-lt 17800] do /usr/local/sbin/ipportfw -A -u$extip/$port -R
$portfw/$port port=$((port+1)) done
Bay Networks VPN Client 2.2.13+vpn The Bay Networks VPN client, which
is a popular one, uses the IPSEC protocol WITHOUT the AH protocol
(which would prevent masquerading). Thus, you can run this
windows-based VPN client through a masq server with just the vpn patch
module.
Bottle Mail 1.2 for Windows 95 2.0.31 The people at Bottle Mail tell
me that hte application uses prots 25 and 80. I can only assume that
it sends you outgoing mail via SMTP and gets your incoming mail via
HTTP. I\'m a bit of a novice so maybe someone can contact them
directly if I\'ve missed anything pertinent. They\'re at
mailto:[EMAIL PROTECTED]
Citrix WinFrame Client 2.0.30 X Windows kind of client for Windows NT
Server. No additional configuration needed.
Citrix Winframe Client No additional configuration needed!
Citrix Winframe Server 2.0.30 ipmasqadm autofw -A -r tcp 1494 1494 -h
www.xxx.yyy.zzz ipautofw -A -r tcp 1494 1494 -h www.xxx.yyy.zzz
www.xxx.yyy.zzz is the ip of the citrix server. This allows a Citrix
Server with a masq\'d IP address to communicate with the outside
world.Tested with Winframe Server 1.6 sp5, win32 Client sp5
CivNet 2.2.x ipmasqadm portfw -a -P tcp -L aaa.bbb.ccc.ddd 1942 -R
192.168.eee.fff 1942 Once a normal masquerade system is setup, install
the ipmasqadm package. Execute the followin on the masq server:
ipmasqadm portfw -a -P tcp -L aaa.bbb.ccc.ddd 1942 -R 192.168.eee.fff
1942 aaa.bbb.ccc.ddd = the outbound IP address of the Masq server.
This is provided by your ISP. 192.168.eee.fff = the IP address of the
masq\'d client where the game is run. Next, locate the file SNET.ini
in your CivNet directory. Type this line: TCPPORT=1942 Start the game,
and when it suggests you IP address (probably something like
192.168.0.2), replace this with the outbound IP address of the Masq
server (the aaa.bbb.ccc.ddd above). This does work for joining games,
but it should work for hosting them too. However the latter has not
been tested yet. Please note that this solution is not perfect. When
the IP number of the masq server changes (ie. On reboot ), the
commands must be reissued.
Cleansweep 3.0 AutoUpdate 2.0.30 This is by Quarterdeck and it works
fine without any extra configuration.
COM/IP (Tactical Software) 2.2.13 All you have to do is to forward the
ports you configured Com/ip to work with. All ports in Com/IP are user
configurable.
Commandos by EIDOS 2.0.35 Works with standard IP masq configuration.
No modules necessary.
CU-SeeMe 2.0.30 ip_masq_cuseeme.o ipmasqadm autofw -A -r udp 7648 7649
-c udp 7648 -u or ipmasqadm autofw -A -r udp 7648 7649 -h
www.xxx.yyy.zzz Please note: for 2.0.30 there is an update to the
module located at ftp://ftp.waste.com/pub/cuseeme/ip_masq_cuseeme.c
Sean Mahrt wrote: Use this for Apple H.263 compression and the 5.3Kbit
audio... ipmasqadm autofw -A -r udp 24032 24033 -h www.xxx.yyy.zzz
ipautofw -A -r udp 7648 7649 -c udp 7648 -u or ipautofw -A -r udp 7648
7649 -h www.xxx.yyy.zzz Please note: for 2.0.30 there is an update to
the module located at
ftp://ftp.waste.com/pub/cuseeme/ip_masq_cuseeme.c Sean Mahrt wrote:
Use this for Apple H.263 compression and the 5.3Kbit audio... ipautofw
-A -r udp 24032 24033 -h www.xxx.yyy.zzz The first form will allow
calls to/from the last workstation to use port 7648 (the primary
cu-seeme port) . The second invocation of ipautofw will allow cu-seeme
calls only to/from www.xxx.yyy.zzz. I prefer the former invocation, as
it is more flexible because there is no need to specify a fixed
workstation IP. However, this invocation also requires a workstation
to have previously placed an outgoing call in order to receive
incoming calls.
Dark Reign 2.0.3x Reply from Activistion: \"ActiveNet Multiplayer
games such as Dark Reign, I\'76, Titanium NetMech/Mercnet and
Battlepack version of NetMech use the following UDP Ports: 21154,
21155, 21156. These ports must be opened up Bidirectionally.\" I
don\'t have DR, so if anyone can try these with DR and ipautofw
someone might benefit. :) NOTE: Stephen Tarr ([EMAIL PROTECTED])
writes that the application is actually using port 21157.
Decent 3 2.0.37 ipmasqadm autofw -A -r tcp 7170 7170 -h
xxx.xxx.xxx.xxx ipmasqadm autofw -A -r udp 2092 2092 -h
xxx.xxx.xxx.xxx #For game Tracker ipmasqadm autofw -A -r udp 3445 3445
-h xxx.xxx.xxx.xxx #for pxo chat ipautofw -A -r tcp 7170 7170 -h
xxx.xxx.xxx.xxx ipautofw -A -r udp 2092 2092 -h xxx.xxx.xxx.xxx #For
game Tracker ipautofw -A -r udp 3445 3445 -h xxx.xxx.xxx.xxx #for pxo
chat Straight from andy c, Outrage Entertainment.
Decent Freespace 0.0.0 should be: ipmasqadm autofw -A -r tcp 3999 3999
-h www.xxx.yyy.zzz ipmasqadm autofw -A -r udp 4000 4000 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r udp 7000 7000 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r udp 3493 3493 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r udp 3440 3440 -h
www.xxx.yyy.zzz but others have mentioned having problems... -seg
should be: ipautofw -A -r tcp 3999 3999 -h www.xxx.yyy.zzz ipautofw -A
-r udp 4000 4000 -h www.xxx.yyy.zzz ipautofw -A -r udp 7000 7000 -h
www.xxx.yyy.zzz ipautofw -A -r udp 3493 3493 -h www.xxx.yyy.zzz
ipautofw -A -r udp 3440 3440 -h www.xxx.yyy.zzz but others have
mentioned having problems... -seg I have got the ports neede for this
game to work. So I basically setup ipautofw -A -r port -h
wwww.xxx.yyy.zzz for every port. I\'m able to join games and create
games. However, wehn chatting after joining a game or creating a game,
the other people are not able to read my messages at all. Furthermore,
I\'m not able to actually get to the launch game screen. Perhaps I\'m
just not setting things right. Any help will be appreaciated. Here are
the ports I got from Volition support: Freespace Itself: udp/4000
tcp/3999 PXO Chat Server: udp/7000 PXO User Tracker: udp/3493 PXO Game
Tracker: udp/3440
Delta Force (Novalogic) 2.2.5 ipmasqadm autofw -A -r udp 3568 3569 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r udp 3568 3569 -h
www.xxx.yyy.zzz This might also need the Novaworld redirects. (See F22
Lighting)
Delta Force 2 (Novalogic) 2.2.10 ipmasqadm autofw -A -v -r udp 3568
3569 -h xxx.xxx.xxx.xxx ipautofw -A -v -r udp 3568 3569 -h
xxx.xxx.xxx.xxx Same as Delta Force.
Diablo (1.07+) 2.1.130 ipmasqadm autofw -A -r tcp 6112 6112 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r udp 6112 6112 -h
www.xxx.yyy.zzz [This is probably cleaner: (from starcraft) ipmasqadm
autofw -A -r udp 6112 6112 -c tcp 6112 -seg] ipautofw -A -r tcp 6112
6112 -h www.xxx.yyy.zzz ipautofw -A -r udp 6112 6112 -h
www.xxx.yyy.zzz [This is probably cleaner: (from starcraft) ipautofw
-A -r udp 6112 6112 -c tcp 6112 -seg] The 1.07 patch made the
Battle.Net comm much smarter. Now it acts like StarCraft.
Diablo (battle.net) 2.0.29 ipmasqadm autofw -A -r udp 6112 6112 -c tcp
116 ipmasqadm autofw -A -r udp 6112 6112 -c tcp 118 ipautofw -A -r udp
6112 6112 -c tcp 116 ipautofw -A -r udp 6112 6112 -c tcp 118 Not
extensively tested (it seemed to work ok). I don\'t play the game but
my roommate didn\'t have any problems (apart from the higher lag
time).
DialPad.Com 2.2.13 ipmasqadm autofw -A -r udp 51200 51201 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r tcp 51210 51210 -h
www.xxx.yyy.zzz Revised 19 May 2000. People seem to be having a
problem with the control port version. The above setting have been
verified.
DirectX Games 2.2.5-22 ipmasqadm autofw -A -v -r udp 2300 2400 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -v -r tcp 2300 2400 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -v -r tcp 47624 47624 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -v -r udp 47624 47624 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -v -r udp 28800 28900 -h
www.xxx.yyy.zzz ipautofw -A -v -r udp 2300 2400 -h www.xxx.yyy.zzz
ipautofw -A -v -r tcp 2300 2400 -h www.xxx.yyy.zzz ipautofw -A -v -r
tcp 47624 47624 -h www.xxx.yyy.zzz ipautofw -A -v -r udp 47624 47624
-h www.xxx.yyy.zzz ipautofw -A -v -r udp 28800 28900 -h
www.xxx.yyy.zzz Should work for all DirectX varients.
DNS behind IP Masq Host 2.0.30 This solutionis a bit advanced but it
is indended to set up DNS services inside your Masq firewall but still
allow requests to be made from the outside. For more info: DNS.txt
Drakan 2.2.20 This is a copy of the script I use. It\'s written for
redhat 6.x using kernels 2.2.x. $1 is my real internet address and the
192.168.1.2 is the machine running drakan. The script is called by
typeing \"script-name ip#\". The script only works with 12 players
connects. Just add more ports (up to 27074) for more users. There may
be an easier way to do this but I have yet to find it. #!/bin/sh
/sbin/ipmasqadm portfw -a -P udp -L $1 27045 -R 192.168.1.2 27045
/sbin/ipmasqadm portfw -a -P udp -L $1 27046 -R 192.168.1.2 27046
/sbin/ipmasqadm portfw -a -P udp -L $1 27047 -R 192.168.1.2 27047
/sbin/ipmasqadm portfw -a -P udp -L $1 27055 -R 192.168.1.2 27055
/sbin/ipmasqadm portfw -a -P udp -L $1 27056 -R 192.168.1.2 27056
/sbin/ipmasqadm portfw -a -P udp -L $1 27057 -R 192.168.1.2 27057
/sbin/ipmasqadm portfw -a -P udp -L $1 27058 -R 192.168.1.2 27058
/sbin/ipmasqadm portfw -a -P udp -L $1 27059 -R 192.168.1.2 27059
/sbin/ipmasqadm portfw -a -P udp -L $1 27060 -R 192.168.1.2 27060
/sbin/ipmasqadm portfw -a -P udp -L $1 27061 -R 192.168.1.2 27061
/sbin/ipmasqadm portfw -a -P udp -L $1 27062 -R 192.168.1.2 27062
/sbin/ipmasqadm portfw -a -P udp -L $1 27063 -R 192.168.1.2 27063
/sbin/ipmasqadm portfw -a -P udp -L $1 27064 -R 192.168.1.2 27064
/sbin/ipmasqadm portfw -a -P udp -L $1 27065 -R 192.168.1.2 27065
/sbin/ipmasqadm portfw -a -P udp -L $1 27066 -R 192.168.1.2 27066
/sbin/ipmasqadm portfw -a -P udp -L $1 27067 -R 192.168.1.2 27067
/sbin/ipmasqadm portfw -a -P udp -L 192.168.1.2 27045 -R $1 27045
/sbin/ipmasqadm portfw -a -P udp -L 192.168.1.2 27046 -R $1 27046
/sbin/ipmasqadm portfw -a -P udp -L 192.168.1.2 27047 -R $1 27047
/sbin/ipmasqadm portfw -a -P udp -L 192.168.1.2 27055 -R $1 27055
/sbin/ipmasqadm portfw -a -P udp -L 192.168.1.2 27056 -R $1 27056
/sbin/ipmasqadm portfw -a -P udp -L 192.168.1.2 27057 -R $1 27057
/sbin/ipmasqadm portfw -a -P udp -L 192.168.1.2 27058 -R $1 27058
/sbin/ipmasqadm portfw -a -P udp -L 192.168.1.2 27059 -R $1 27059
/sbin/ipmasqadm portfw -a -P udp -L 192.168.1.2 27060 -R $1 27060
/sbin/ipmasqadm portfw -a -P udp -L 192.168.1.2 27061 -R $1 27061
/sbin/ipmasqadm portfw -a -P udp -L 192.168.1.2 27062 -R $1 27062
/sbin/ipmasqadm portfw -a -P udp -L 192.168.1.2 27063 -R $1 27063
/sbin/ipmasqadm portfw -a -P udp -L 192.168.1.2 27064 -R $1 27064
/sbin/ipmasqadm portfw -a -P udp -L 192.168.1.2 27065 -R $1 27065
/sbin/ipmasqadm portfw -a -P udp -L 192.168.1.2 27066 -R $1 27066
/sbin/ipmasqadm portfw -a -P udp -L 192.168.1.2 27067 -R $1 27067
#last line
EGN V2.0+ 2.0.36 ipmasqadm autofw -A -r tcp 5000 6000 -h
www.xxx.yyy.zzz ipautofw -A -r tcp 5000 6000 -h www.xxx.yyy.zzz It
only uses the ports 5000 to 6000 TCP so you can only have one machine
running EGN, maybe that will change with newer versions of EGN.
Everquest 2.0.36 I have run two concurrent version of Everquest on the
same server with two different account using the \"default\" ipmasq
configuration.
Excite PAL 2.2.1 Works just fine with \"No Proxy\" selected.
F16 MRF (Novalogic) 2.2.5 ipmasqadm autofw -A -r udp 1039 8629 -h
www.xxx.yyy.zzz ipautofw -A -r udp 1039 8629 -h www.xxx.yyy.zzz
F22 Raptor (Novalogic) 2.0.33 ipmasqadm autofw -A -r udp 3874 3874 -h
www.xxx.yyy.zzz ipautofw -A -r udp 3874 3874 -h www.xxx.yyy.zzz I
needed to upgrade my version of Raptor to 1.00.16.12r, which at the
time of me writing this is still considered a beta. I have had nothing
but stability problems with the released version and reccommend
upgrading anyway. I have done some preliminary testing, used the game
now on the net for a couple days and found that this solved all my
problems connecting to the internet games with the above mentioned
release. Should I find some more information or changes to this I will
submit them asap.
Falcon 4.0 2.2.x ipchains -A input -p UDP -s 0/0 -d 192.168.10.10
2934:2935 -m 1 -j ACCEPT ipmasqadm mfw -A -m 1 -r 192.168.100.10
Falcon 4.0 uses UDP ports 2934-2935. These commands will allow
incoming UDP packets on those ports and will redirect to your intern
PC (running Falcon 4.0). If you are using another kernel version (or
other redirector module, like autofw) you need to use appropriate
commands to redirect ports 2934-2935 to you internal host. When
starting Falcon 4.0 use the following command line: falcon4 -IP \"your
linux real ip address\"
Fighter Ace Beta 2.0.31 ipmasqadm autofw -A -r udp 9001 9001 -h
www.xxx.yyy.zzz where 9001 = port being used on external server both
low and high repectively (use tcpdump to identify what port is
unreachable) where x = TCP/IP address of host machine inside the
firewall. ipautofw -A -r udp 9001 9001 -h www.xxx.yyy.zzz where 9001 =
port being used on external server both low and high repectively (use
tcpdump to identify what port is unreachable) where x = TCP/IP address
of host machine inside the firewall.
FlightSim98 2.0.35 ipmasqadm autofw -A -r udp 28800 28803 -h
192.168.x.x -u ipmasqadm autofw -A -r tcp 28800 28803 -h 192.168.x.x
-u ipmasqadm autofw -A -r udp 61000 65000 -h 192.168.x.x -u ipmasqadm
autofw -A -r tcp 61000 65000 -h 192.168.x.x -u ipmasqadm autofw -A -r
udp 1000 3000 -h 192.168.x.x -u ipmasqadm autofw -A -r tcp 1000 3000
-h 192.168.x.x -u ipmasqadm autofw -A -r udp 3782 3782 -h 192.168.x.x
-u ipautofw -A -r udp 28800 28803 -h 192.168.x.x -u ipautofw -A -r tcp
28800 28803 -h 192.168.x.x -u ipautofw -A -r udp 61000 65000 -h
192.168.x.x -u ipautofw -A -r tcp 61000 65000 -h 192.168.x.x -u
ipautofw -A -r udp 1000 3000 -h 192.168.x.x -u ipautofw -A -r tcp 1000
3000 -h 192.168.x.x -u ipautofw -A -r udp 3782 3782 -h 192.168.x.x -u
These are the ports that need to be forwarded to make FlightSim98 work
with the zone.com. The last port (3782) is for RogerWilco. I have
verified the setup and got all 8 players in a game with chat. Your
mileage may vary of course.
Freetel ipmasqadm autofw -A -r udp 21300 21303 ipautofw -A -r udp
21300 21303 UDP info courtesy of Freetel\'s own technical support page
on their web site. Tested with their \'freeware\' version on a Win95
Pentium II system.
FTP 2.0.30 ip_masq_ftp.o Module only needed for ported support -- PASV
works without the module. Command channel support through data
transfer since 2.0.30, as long as module is loaded. Supported as part
of the main kernel distirbution.
FTP Behind IP Masq Host 2.0.33 [EMAIL PROTECTED] ipmasqadm autofw
-A -r tcp 600 600 -h www.xxx.yyy.zzz ipautofw -A -r tcp 600 600 -h
www.xxx.yyy.zzz Another way to run an additional ftp server behind a
masquerading linux box is with ipautofw. Just set up your ftpd on the
masqueraded machine to listen to a port (i.e. 600).
Gamespy 2.0.x Works with plain IP-Masquerade and default modules.
Gamestorm 0 ipchains -F forward^M ipchains -P forward ACCEPT^M
ipchains -A forward -j MASQ -s 192.168.1.0/24 -d 0.0.0/0 ipfwadm -F -f
ipfwadm -F -p accept ipfwadm -F -a m -S 192.168.1.0/24 -D 0.0.0/0
Gamestorm (www.gamestorm.com) works fine with Air Warrior and Aliens
Online without any changes to the default installation. In using the
default installation, I am making hte assumption the IP Masquerading
was installed following an article by Tom Kunz titled: \"Setting up
your In-home network\". As you can see in the above, nothing real
special was make to configured IP Masquerading and no additional
tcp/udp ports were required.
gnuchess/xboard 2.0.33 Everything runs Ok!
GP500 2.2.13 Regular DirectPlay game that works with basic directplay
setup.
Half Life 2.x Half Life, Team Fortress, CounterStrike... Just works
without configuring anything (tested only 1 masq\'d game client.
Heat.net 2.0.33 ipmasqadm autofw -A -r tcp 1398 1398 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r tcp 5500 5600 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r tcp 1000 9000 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r udp 1398 1398 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r udp 5500 5600 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r udp 1000 9000 -h
www.xxx.yyy.zzz ipautofw -A -r tcp 1398 1398 -h www.xxx.yyy.zzz
ipautofw -A -r tcp 5500 5600 -h www.xxx.yyy.zzz ipautofw -A -r tcp
1000 9000 -h www.xxx.yyy.zzz ipautofw -A -r udp 1398 1398 -h
www.xxx.yyy.zzz ipautofw -A -r udp 5500 5600 -h www.xxx.yyy.zzz
ipautofw -A -r udp 1000 9000 -h www.xxx.yyy.zzz [NOTE: Ports
corrected: 8000-9000 -> 1000-9000! -seg] Here is what someone from
HEAT sent me when i asked what ports heat uses. Thanks for taking the
time to participate in HEAT as well as for forwarding your comments to
us. In regards to your post, please open up UDP/TCP ports 1398,
5500-5600, 1000-9000. That should do the trick. If you have any
additional comments, questions or thoughts, please feel free to
contact us again. Now i can get a game of duke 3d started, but as soon
as all the players get connected i get an out of sink error.. if any
one has better luck let me know.
HomeWorld 2.2.5-15 ipmasqadm autofw -A -r tcp 15001 15001 -h x.x.x.x
ipmasqadm autofw -A -r udp 15001 15001 -h x.x.x.x ipmasqadm autofw -A
-r tcp 15101 15101 -h x.x.x.x ipmasqadm autofw -A -r udp 15101 15101
-h x.x.x.x ipmasqadm autofw -A -r tcp 15200 15200 -h x.x.x.x ipmasqadm
autofw -A -r udp 15200 15200 -h x.x.x.x ipmasqadm autofw -A -r tcp
15300 15300 -h x.x.x.x ipmasqadm autofw -A -r udp 15300 15300 -h
x.x.x.x ipmasqadm autofw -A -r tcp 21000 21999 -h x.x.x.x ipmasqadm
autofw -A -r udp 21000 21999 -h x.x.x.x ipmasqadm autofw -A -r tcp
30000 30999 -h x.x.x.x ipmasqadm autofw -A -r udp 30000 30999 -h
x.x.x.x ipautofw -A -r tcp 15001 15001 -h x.x.x.x ipautofw -A -r udp
15001 15001 -h x.x.x.x ipautofw -A -r tcp 15101 15101 -h x.x.x.x
ipautofw -A -r udp 15101 15101 -h x.x.x.x ipautofw -A -r tcp 15200
15200 -h x.x.x.x ipautofw -A -r udp 15200 15200 -h x.x.x.x ipautofw -A
-r tcp 15300 15300 -h x.x.x.x ipautofw -A -r udp 15300 15300 -h
x.x.x.x ipautofw -A -r tcp 21000 21999 -h x.x.x.x ipautofw -A -r udp
21000 21999 -h x.x.x.x ipautofw -A -r tcp 30000 30999 -h x.x.x.x
ipautofw -A -r udp 30000 30999 -h x.x.x.x I got the above port
information to play on WON.net by sending email to technical support
of HomeWorld. However, I just tired the HomeWorld demo version. I
haven\'t got the full version yet.
Hotline Client 2.0.33 ipchains -A forward -j MASQ -s 192.168.1.0/24 -d
0.0.0.0/0 ipfwadm -F -a m -S 192.168.1.0/24 -D 0.0.0.0/0 If you\'re
useing masq, you don\'t need any settings at all. There\'s nothing to
redirect, no special commands to issue. It just works. The above line,
which is the standard \"turn on masq\" configuration makes everything
work without ever having to tune masq at all. I frequently have more
than one user on the same or different remote servers without any
problem at all.
Hotline Server 2.0.33 ipchains -A forward -j MASQ -b -p tcp -s
0.0.0.0/0 5500 -d www.xxx.yyy.zzz 5500 ipfwadm -F -a -m -b -P tcp -S
0.0.0.0/0 5500 -D www.xxx.yyy.zzz 5500 or redir www.xxxx.yyyy.zzzz
5500 5500 &
HTTP 2.0.30 This works. Nothing additional required. A lot of people
see MTU related problems. Caching proxy server is recommended (see
squid or apache). Default MTU of 1500 usually solves the problem.
HTTP Server behind IP Masq Host 2.0.30 I used redir instead of
ipmasqadm autofw: redir www.xxx.yyy.zzz listen_port 80 www.xxx.yyy.zzz
is the web server ip behind ipmasq host I used redir instead of
ipautofw: redir www.xxx.yyy.zzz listen_port 80 www.xxx.yyy.zzz is the
web server ip behind ipmasq host e.g. run on 192.168.1.1: redir
192.168.1.2 81 80 & url=> http://192.168.1.1:81/ will give you the
root web on 192.168.1.2
HTTP Server behind masq 2.2.7
IBS - Novaworld 2.0.35 ipmasqadm autofw -A -r udp 4533 4534
www.xxx.yyy.zzz NOTE: www.xxx.yyy.zzz is replace by the ip of the
machine engaging in net play. ipautofw -A -r udp 4533 4534
www.xxx.yyy.zzz NOTE: www.xxx.yyy.zzz is replace by the ip of the
machine engaging in net play. This setting runs contrary to the port
addresses stated by NovaLogic. I have verified that is works on
multiple systems. The IP_MASQ_FTP module is required for the ONLINE
updates upon entering the game. Enjoy.
iChat 2.0.30 The iChat Pager worked without any hassles at all. No
extra modules or commands needed.
ICQ 2.0.36,2.2.x Use the referenced module! Use the referenced module!
This is a great fix. The previous work arounds listed on this page
don\'t always work with ICQ, and it is a bit of a hassle to get all
the port ranges set up. This module takes care of everything, although
with the 2.0.x kernels there is some patching required (not with
2.2.x). The link to get this module is
http://members.tripod.com/~djsf/masq-icq and there are instructions
provided with the source.
ICU II Version 3 2.0.36 ipmasqadm autofw -A -r tcp 2000 2010 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r tcp 1015 1015 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r tcp 2069 2069 -h
www.xxx.yyy.zzz ipautofw -A -r tcp 2000 2010 -h www.xxx.yyy.zzz
ipautofw -A -r tcp 1015 1015 -h www.xxx.yyy.zzz ipautofw -A -r tcp
2069 2069 -h www.xxx.yyy.zzz Ports 2000 thru 2010, 1015, 2069: must be
open for data transfer in both directions and cannot be filtered if
the icuii is to work.
IDT Net2Phone (ver. 8.31) 2.0.30 ipmasqadm autofw -A -r udp 6613 6613
-h www.xxx.yyy.zzz ipautofw -A -r udp 6613 6613 -h www.xxx.yyy.zzz You
have to set TCPPORT=nnnnn and UDPPORT=mmmmm in the [CONFIG] section of
net2fone.ini. The program server seems to ignore the UDP settings, but
6613 worked for me. I had to use redir because two different servers
connect to the TCPPORT, and I could not make this work with ipautofw:
redir www.xxx.yyy.zzz nnnnn nnnnn & It is maybe possible to use this
scheme to set up multiple workstations on different ports.
IGames In response to one of the request on the request page, I sent a
message to TS at Igames. They replied with this letter: We use an
unlimited number of ports. They are created dynamically based on
whatever port numbers windows has available to it. The way our system
is designed prevents us from only having a few set port numbers. This
method works best to reduce load on or server and distribute it more
evenly across clients. Sorry, firewalls are not friends of Igames.
Chris Springer
InterCasino 2.0.30 Works perfectly, without any special
commands/modules. Watch out though, this is YOUR money...
Internet Phone 2.0.30 Works for me with this line in the inetd.conf:
22555 dgram udp wait root /usr/sbin/tcpd /usr/sbin/udpred
www.xxx.yyy.zzz 22555 where: www.xxx.yyy.zzz is the Windows box. Works
for me with this line in the inetd.conf: 22555 dgram udp wait root
/usr/sbin/tcpd /usr/sbin/udpred www.xxx.yyy.zzz 22555 where:
www.xxx.yyy.zzz is the Windows box. udpred can be found on the Links
page. Submitted by: Michael Gallo This allows Linux to forward udp
packets for ports 22555 used by IPhone to the host machine specified
by the IP Address xxx.xxx.xxx.xxx NOTE: This only works with ONE host
PC located behind the Linux firewall. This has been tested and works
for both incomming and outgoing calls.
Internet Phone 4.5 <> Addressing Server 2.0.33 ipmasqadm autofw -A -r
udp 22555 22566 -h www.xxx.yyy.zzz ipmasqadm autofw -A -r tcp 25793
25804 -h www.xxx.yyy.zzz ipmasqadm autofw -A -r tcp 1490 1501 -h
www.xxx.yyy.zzz ipautofw -A -r udp 22555 22566 -h www.xxx.yyy.zzz
ipautofw -A -r tcp 25793 25804 -h www.xxx.yyy.zzz ipautofw -A -r tcp
1490 1501 -h www.xxx.yyy.zzz In addition to the udpredir for incoming
calls. To access the addressing server, open the channels it works
with: 1. TCP Port 6670 (decimal) to remote system: The port used to
connect to the Internet Phone Servers. 2. UDP Port 22555 (decimal).
All audio is passed through this port on both local and remote
machine. 3. TCP Port 25793 (decimal) to remote system: The port used
to connect to the Addressing Server(for Version 4.X). 4. TCP Port
1490. This port is for the Conference engine (whiteboard/chat/file
transfer)(for Version 4.X).
Intuit TurboTax 97 2.0.33 On-line tax filing seemed to use http
protocol, according to diald-top status. Normal IP Masquerade
configuration worked.
IPhone 2.0.30 ipmasqadm autofw -A -r udp 22555 22555 ipautofw -A -r
udp 22555 22555 Untested, please let me know if it works or not.
IPhone 5.01 ipmasqadm autofw -A -r tcp 1490 1490 ipmasqadm autofw -A
-r tcp 6670 6670 ipmasqadm autofw -A -r tcp 25793 25793 ipmasqadm
autofw -A -r udp 22555 22555 ipautofw -A -r tcp 1490 1490 ipautofw -A
-r tcp 6670 6670 ipautofw -A -r tcp 25793 25793 ipautofw -A -r udp
22555 22555 The port info courtesy of Vocaltec\'s support area on
their web site. I tested the audo only (no video) on a Win95 Pentium
II system.
IPhone 5.01 ipmasqadm autofw -A -r tcp 1490 1490 ipmasqadm autofw -A
-r tcp 6670 6670 ipmasqadm autofw -A -r tcp 25793 25793 ipmasqadm
autofw -A -r udp 22555 22555 ipautofw -A -r tcp 1490 1490 ipautofw -A
-r tcp 6670 6670 ipautofw -A -r tcp 25793 25793 ipautofw -A -r udp
22555 22555 The port info courtesy of Vocaltec\'s support area on
their web site. I tested the audo only (no video) on a Win95 Pentium
II system.
IPhone 5.01 ipmasqadm autofw -A -r tcp 1490 1490 ipmasqadm autofw -A
-r tcp 6670 6670 ipmasqadm autofw -A -r tcp 25793 25793 ipmasqadm
autofw -A -r udp 22555 22555 ipautofw -A -r tcp 1490 1490 ipautofw -A
-r tcp 6670 6670 ipautofw -A -r tcp 25793 25793 ipautofw -A -r udp
22555 22555 The port info courtesy of Vocaltec\'s support area on
their web site. I tested the audo only (no video) on a Win95 Pentium
II system.
IPhone 5.01 ipmasqadm autofw -A -r tcp 1490 1490 ipmasqadm autofw -A
-r tcp 6670 6670 ipmasqadm autofw -A -r tcp 25793 25793 ipmasqadm
autofw -A -r udp 22555 22555 ipautofw -A -r tcp 1490 1490 ipautofw -A
-r tcp 6670 6670 ipautofw -A -r tcp 25793 25793 ipautofw -A -r udp
22555 22555 The port info courtesy of Vocaltec\'s support area on
their web site. I tested the audo only (no video) on a Win95 Pentium
II system.
IPhone 5.01 ipmasqadm autofw -A -r tcp 1490 1490 ipmasqadm autofw -A
-r tcp 6670 6670 ipmasqadm autofw -A -r tcp 25793 25793 ipmasqadm
autofw -A -r udp 22555 22555 ipautofw -A -r tcp 1490 1490 ipautofw -A
-r tcp 6670 6670 ipautofw -A -r tcp 25793 25793 ipautofw -A -r udp
22555 22555 The port info courtesy of Vocaltec\'s support area on
their web site. I tested the audo only (no video) on a Win95 Pentium
II system.
IPhone 5.01 ipmasqadm autofw -A -r tcp 1490 1490 ipmasqadm autofw -A
-r tcp 6670 6670 ipmasqadm autofw -A -r tcp 25793 25793 ipmasqadm
autofw -A -r udp 22555 22555 ipautofw -A -r tcp 1490 1490 ipautofw -A
-r tcp 6670 6670 ipautofw -A -r tcp 25793 25793 ipautofw -A -r udp
22555 22555 The port info courtesy of Vocaltec\'s support area on
their web site. I tested the audo only (no video) on a Win95 Pentium
II system.
IPhone 5.01 ipmasqadm autofw -A -r tcp 1490 1490 ipmasqadm autofw -A
-r tcp 6670 6670 ipmasqadm autofw -A -r tcp 25793 25793 ipmasqadm
autofw -A -r udp 22555 22555 ipautofw -A -r tcp 1490 1490 ipautofw -A
-r tcp 6670 6670 ipautofw -A -r tcp 25793 25793 ipautofw -A -r udp
22555 22555 The port info courtesy of Vocaltec\'s support area on
their web site. I tested the audo only (no video) on a Win95 Pentium
II system.
IPhone 5.01 ipmasqadm autofw -A -r tcp 1490 1490 ipmasqadm autofw -A
-r tcp 6670 6670 ipmasqadm autofw -A -r tcp 25793 25793 ipmasqadm
autofw -A -r udp 22555 22555 ipautofw -A -r tcp 1490 1490 ipautofw -A
-r tcp 6670 6670 ipautofw -A -r tcp 25793 25793 ipautofw -A -r udp
22555 22555 The port info courtesy of Vocaltec\'s support area on
their web site. I tested the audo only (no video) on a Win95 Pentium
II system.
IPhone 5.01 ipmasqadm autofw -A -r tcp 1490 1490 ipmasqadm autofw -A
-r tcp 6670 6670 ipmasqadm autofw -A -r tcp 25793 25793 ipmasqadm
autofw -A -r udp 22555 22555 ipautofw -A -r tcp 1490 1490 ipautofw -A
-r tcp 6670 6670 ipautofw -A -r tcp 25793 25793 ipautofw -A -r udp
22555 22555 The port info courtesy of Vocaltec\'s support area on
their web site. I tested the audo only (no video) on a Win95 Pentium
II system.
IPX 2.0.31
ftp://sunsite.unc.edu/pub/Linux/system/network/router/ipxbridge-0.2.ta
r.gz Sets up an IPX bridge between two networks. Run it on the
masquerading computer and it forwards IPX traffic on one interface to
the other. This package includes three versions (0.1, 0.1.1, 0.2). I
have had success with the first two, but not 0.2. It also looks
possible to patch this program in order to do the same for NetBEUI
traffic if you are forced to use it. :)
Iris Phone 2.5 2.0.30 ipmasqadm autofw -A -r tcp 4969 4970 -c tcp 4970
ipmasqadm autofw -A -r udp 4969 4970 -c udp 4970 ipautofw -A -r tcp
4969 4970 -c tcp 4970 ipautofw -A -r udp 4969 4970 -c udp 4970 This
allows for VIDEO and Directory services with Iris Phone 2.5. It should
work with the older version too... I only got to test it with the demo
ver because I did not want to pay $150 for it.
iVisit 2.2.9 ipmasqadm portfw -a -P udp -L 9943 -R 9943 ipmasqadm
portfw -a -P udp -L 9945 -R 9945 ipmasqadm portfw -a -P udp -L 56768
-R 56768 Works fine, will timeout masq if no packets are sent. For
incoming direct calls to 1 pc NOT using the directory use the above
configuration.
Kahn97 2.0.x If your running IP masq with a unix/linux box you can
download hte unix/linux kahn server from www.stargatenetworks.com then
install it and make your own server. Tell your net friends to add your
server to the servers list. You MUST connect to you kahn server by
using the LOCAL IP address of your box. Have fun!
Kali Kali has made a proxy server for linux! (Binary only) This means
you don\'t have to worry about ANY of the maq problems, and you get
unlimited concurrent players to boot. The proxy server also means you
can host your own games with people dialing into your linux box (as
ppp) and play say 4 players (two local ethernet, 2 dial in) without
using the net. (as the kali95 client can act as a user & host) You can
get it at: ftp://ftp.kali.net/pub/kali/kplnx15.tgz Then all you have
to do is set kali95 to use the proxy in file/settings. The kali web
site at http://www.kali.net has full details. There\'s also a linux
Kali server (unlimited users), but it costs $100.
Legal Crime (1.7beta+) 2.1.47 ipchains -A forward -j ACCEPT -s
192.168.1.0/24 10750 -d 0.0.0.0/0 -p udp^M ipchains -A forward -j
ACCEPT -s 192.168.1.0/24 10760 -d 0.0.0.0/0 -p udp ipfwadm -F -a
accept -S 192.168.1.0/24 10750 -D 0.0.0.0/0 -P udp ipfwadm -F -a
accept -S 192.168.1.0/24 10760 -D 0.0.0.0/0 -P udp Finally got Legal
Crime to work. Probably an easier way to do this, but for now it
works. E-mail me if there\'s an easier way to do this. Note: if you
don\'t open the ports, you will probably be able to see games, but
every game you join, you won\'t see anybody...
Lotus Domino 2.0.33 Added the following line to inetd.conf: 1352
stream tcp nowait root /usr/sbin/tcpd redir --inetd --syslog --name
notes www.xxx.yyy.zzz 1352 Added the following line to inetd.conf:
1352 stream tcp nowait root /usr/sbin/tcpd redir --inetd --syslog
--name notes www.xxx.yyy.zzz 1352 This will start redir on lotus notes
port from inetd and allow you to restrict it with wrappers.
Lotus Notes 2.0.30 No additional configuration needed.
Lotus Notes Client 4.6.3 2.2.10 No special configuration needed.
MechWarrior 3 2.2.5-15 ipmasqadm autofw -A -r tcp 47624 47624 -h
192.168.0.xxx ipmasqadm autofw -A -r udp 47624 47624 -h 192.168.0.xxx
ipmasqadm autofw -A -r tcp 2300 2400 -h 192.168.0.xxx ipmasqadm autofw
-A -r udp 2300 2400 -h 192.168.0.xxx where 192.168.0.xxx is the IP of
your windows box. ipautofw -A -r tcp 47624 47624 -h 192.168.0.xxx
ipautofw -A -r udp 47624 47624 -h 192.168.0.xxx ipautofw -A -r tcp
2300 2400 -h 192.168.0.xxx ipautofw -A -r udp 2300 2400 -h
192.168.0.xxx This can be placed into a script. See TrinityOS on the
links page!
Microsoft DirectPlay 2.0.33 ipmasqadm autofw -A -r tcp 1000 1095 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r udp 1000 1029 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r udp 1031 2210 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r udp 2220 3212 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r udp 3214 5000 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r udp 40000 60000 -h
www.xxx.yyy.zzz ipautofw -A -r tcp 1000 1095 -h www.xxx.yyy.zzz
ipautofw -A -r udp 1000 1029 -h www.xxx.yyy.zzz ipautofw -A -r udp
1031 2210 -h www.xxx.yyy.zzz ipautofw -A -r udp 2220 3212 -h
www.xxx.yyy.zzz ipautofw -A -r udp 3214 5000 -h www.xxx.yyy.zzz
ipautofw -A -r udp 40000 60000 -h www.xxx.yyy.zzz Games that work:
Total Annihalation,Twisted Metal 2,Moto Racer If you want to play Moto
Racer, change the first line to read: ipautofw -A -r tcp 1000 5000 -h
www.xxx.yyy.zzz Port 1030 is skipped because it used by ping and port
3213 is used by kproxy for Kali.
Microsoft NetMeeting 2.0 2.0.30 Primary TCP connections: This will
allow what microsoft calls the \'Primary TCPConnections\' to work.
This will allow such features as: applicationsharing, whiteboard,
chat, file transfer, and directory lookups. ipmasqadm autofw -A -r tcp
389 389 ipmasqadm autofw -A -r tcp 522 522 ipmasqadm autofw -A -r tcp
1503 1503 ipmasqadm autofw -A -r tcp 1720 1720 ipmasqadm autofw -A -r
tcp 1731 1731 You can make only outgoing calls. I have not tried
incomming calls but itmay work if you have previously connected to the
same user. Secondary TCP/UDP connections: This will allow what
microsoft calls the \'Secondary TCP and UDPConnections\' to work. This
will allow such features as: audio and videoconferencing using the
H.323 protocol. ipmasqadm autofw -A -r tcp 1024 65535ipmasqadm autofw
-A -r udp 1024 65535 Primary TCP connections: This will allow what
microsoft calls the \'Primary TCPConnections\' to work. This will
allow such features as: applicationsharing, whiteboard, chat, file
transfer, and directory lookups. ipautofw -A -r tcp 389 389 ipautofw
-A -r tcp 522 522 ipautofw -A -r tcp 1503 1503 ipautofw -A -r tcp 1720
1720 ipautofw -A -r tcp 1731 1731 You can make only outgoing calls. I
have not tried incomming calls but itmay work if you have previously
connected to the same user. Secondary TCP/UDP connections: This will
allow what microsoft calls the \'Secondary TCP and UDPConnections\' to
work. This will allow such features as: audio and videoconferencing
using the H.323 protocol. ipautofw -A -r tcp 1024 65535ipautofw -A -r
udp 1024 65535 This is a big security risk because of the large number
of ports that have to be opened. I have tested the voice portion to
work with FD audio. My video camera is on the fritz and was unable to
test that portion of the program. This is provided for informational
uses only and is not recomended. Primary ports must also be setup for
this to work. NOTE: Don\'t send Jim a message if you can\'t get it to
work. It does work and has been verified.
Midtown Madness 2.2.x ipmasqadm autofw -A -r tcp 47624 47624 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r tcp 2300 2400 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r udp 2300 2400 -h
www.xxx.yyy.zzz ipautofw -A -r tcp 47624 47624 -h www.xxx.yyy.zzz
ipautofw -A -r tcp 2300 2400 -h www.xxx.yyy.zzz ipautofw -A -r udp
2300 2400 -h www.xxx.yyy.zzz May be able to tighten this up a bit, but
it works 100% with the settings shown. [Note: looks like standard
DirectX, would try to tighten it. -seg]
Monopoly 2.0.30 Hosting a monopoly game does not work until I find out
the ports, but joining a game works fine.
Motocross Madness 2.2.1 ipmasqadm autofw -A -r udp 47624 47624 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r tcp 47624 47624 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r udp 2300 2400 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r tcp 2300 2400 -h
www.xxx.yyy.zzz ipautofw -A -r udp 47624 47624 -h www.xxx.yyy.zzz
ipautofw -A -r tcp 47624 47624 -h www.xxx.yyy.zzz ipautofw -A -r udp
2300 2400 -h www.xxx.yyy.zzz ipautofw -A -r tcp 2300 2400 -h
www.xxx.yyy.zzz For some stupid reason, Motocross Madness jumps
between tcp/udp ports 2300 and 240. Armed with a sniffer, I could not
detect any kind of pattern... So, this was as tight as I could get it.
It works, and for this great game, that\'s all that matters, right?
;-)
Mplayer Games Network 2.0.30 ipmasqadm autofw -A -r tcp 8000 8999 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r udp 8000 8999 -h
www.xxx.yyy.zzz ipautofw -A -r tcp 8000 8999 -h www.xxx.yyy.zzz
ipautofw -A -r udp 8000 8999 -h www.xxx.yyy.zzz I was looking through
the Mplayer web page, and I came across the port information. Mplayer
uses tcp and udp ports 8000-8999. I don\'t know of a control port, so
I used -h to route them to a particular local machine. This is
*untested* as I am not on Mplayer yet, but it should work. Try it and
e-mail me either way.
MS Netshow 2.0 2.0.30 No additional configuration needed.
MSN Gaming Zone 2.0.35 MS KB Article Q159301 Zone: Connecting to the
Zone Through a Firewall or Proxy Server To play DirectX games on the
MSN Gaming Zone through a network firewall or proxy server, the
following requirements must be met: DirectX 6.0 or later must be
installed on your computer. Your network administrator must configure
the proxy server or firewall to allow DirectX games to pass
information through the proxy server or firewall. The latest version
of DirectX is available as a free download from the following
Microsoft Web site: http://www.microsoft.com/directx For more
information about how to install the latest version of DirectX, please
see the following article in the Microsoft Knowledge Base: Q179113 How
to Download and Install DirectX To play DirectX games across a
firewall, verify that all computers in the game are running DirectX
6.0, and then ask your firewall administrator to configure the
firewall to use the following settings: Allow an initial outbound TCP
connection on port 47624. Allow subsequent inbound and outbound
connections on TCP and UDP ports 2300-2400. Set appropriate
permissions for DirectPlay (Client). Additionally, to play games on
the Zone, the following TCP ports on the firewall must be open: 28800
- 28912 For additional information about how to configure firewall or
proxy server support for DirectPlay 6.0 games, please see the
\"Firewall Support in DirectPlay 6.0\" topic in the DirectX 6.0 SDK
Help file.
Myth II demo 2.2.x ipmasqadm portfw -a -P tcp -L 3453 -R 3453
ipmasqadm portfw -a -P tcp -L 3453 -R 3453 Hosting Myth II demo games
(probably the full version, too) requires one ipmasqadm command on 2.2
kernels (I have no idea about 2.0 kernels). Works great, I\'ve tested
it a lot ;-) Just playing Myth II doesn\'t require any special
settings.
Myth: The Fallen Lords 2.0.31 ipmasqadm autofw -A -u -r tcp 3453 3453
-h xxx.yyy.zzz.www ipautofw -A -u -r tcp 3453 3453 -h xxx.yyy.zzz.www
This is for the full release of the game (not the demo, I\'m not even
sure if the demo supports networking). Joining games seems to work
fine without any ipautofw commands. The ipautofw command is only
needed to HOST a game. In actuality you can probably host a game on
any port and just replace the 3453 with the port you wish to host (I
haven\'t thoroughly tested).
Napster Option 1: ipmasqadm autofw -A -r tcp 6699 6699 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r tcp 6697 6697 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r tcp 4444 4444 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r tcp 5555 5555 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r tcp 6666 6666 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r tcp 7777 7777 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r tcp 8888 8888 -h
www.xxx.yyy.zzz Option 2: Charles Fisher writes: There is a better way
to forward napster than what you have in your instructions. I use:
/usr/sbin/ipmasqadm portfw -a -P tcp -L 1.2.3.4 6702 -R 192.168.1.130
6702 (the 1.2.3.4 is your internet ip address, and 6702 is the port to
forward). Doing it this way, the data never enters user-space, it is
all handled by the kernel, so it is faster. Also, the sending IP will
not be changed, so a netstat on the internal box will show the real ip
address, not the ip of the gateway. IMHO, this is a much better way to
do it. Be warned that portfw only works inside the firewall; you
can\'t re-forward back onto the internet. Derek Streeter writes: Redir
(or other newer port forwarding) is used to forward a single tcp port
to the private IP. This redirected port is then entered when setting
up Napster. If using redir, you need the followin gin /etc/inetd.conf:
napster1 stream tcp nowait root /usr/sbin/tcpd /usr/sbin/redir --inetd
192.168.0.x 6699 Then add napster1 tcp/6699 to /etc/services. Do this
with a different port for each host running napster. You may need to
add napster1 to /etc/hosts.allow.
Need for Speed 5 (Porsche) 2.2.10 ipmasqadm autofw -A -v -r udp 9395
9405 -h xxx.xxx.xxx.xxx ipautofw -A -v -r udp 9395 9405 -h
xxx.xxx.xxx.xxx These settings let you make a nfs5 server if you are
behind a firewall.
Need for Speed 5 (Porsche) 2.2.10 ipautofw -A -v -r udp 9395 9405 -h
xxx.xxx.xxx.xxx These settings let you make a nfs5 server if you are
behind a firewall.
Net2Phone 2.2.x ipmasqadm portfw -a -P tcp -L aaa.bbb.ccc.ddd 20000 -R
www.xxx.yyy.zzz 20000 ipmasqadm portfw -a -P udp -L aaa.bbb.ccc.ddd
20000 -R www.xxx.yyy.zzz 20000 where aaa.bbb.ccc.ddd is the
masquerading router, www.xxx.yyy.zzz is the pc running net2phone.
C:\\windows\\ne2phone.ini: [CONFIG] TCPPORT=20000 UDPPORT=20000
ipmasqadm portfw -a -P tcp -L aaa.bbb.ccc.ddd 20000 -R www.xxx.yyy.zzz
20000 ipmasqadm portfw -a -P udp -L aaa.bbb.ccc.ddd 20000 -R
www.xxx.yyy.zzz 20000 where aaa.bbb.ccc.ddd is the masquerading
router, www.xxx.yyy.zzz is the pc running net2phone.
C:\\windows\\ne2phone.ini: [CONFIG] TCPPORT=20000 UDPPORT=20000 Repeat
the same procedure for every masqueraded machine, just use a different
port for every machine.
Netrek 2.0.34 ip_masq_netrek.o ipmasqadm autofw -A -r udp 45000 45010
-h www.xxx.yyy.zzz -v ipautofw -A -r udp 45000 45010 -h
www.xxx.yyy.zzz -v Add \'baseUdpLocalPort: 45000\' to the .xtrekrc
file. [NOTE: Older entry for this application requrires
ip_masq_netrek.o! -seg] Just follow the Instructions and you should be
good to go. A very small kernel patch is neede din addition to hte
module. Because things may be different in kernels later than 2.0.30,
the patch may be unnecessary, or a different patch may be needed, or
neither.
Netstorm 2.2.13 ipmasqadm autofw -A -r udp 6790 6800 -h
xxx.xxx.xxx.xxx ipmasqadm autofw -A -r tcp 6790 6800 -h
xxx.xxx.xxx.xxx ipautofw -A -r udp 6790 6800 -h xxx.xxx.xxx.xxx
ipautofw -A -r tcp 6790 6800 -h xxx.xxx.xxx.xxx
NFS 2.0.30 This works through a normal masquerading setup, although it
can be very slow on the internet -- I think SMB is more efficient. Tim
Fletcher ([EMAIL PROTECTED]) writes: I have setup via port
fowarding of 111,635,2049 the appearance of a NFS server on the
firewall which is really on a different machine.
Novell Netware 2.0.33 ipchains -A forward -j REDIRECT 213 -p udp D
www.xxx.yyy.zzz 213^M ipmasqadm autofw -A -r 213 213 {-h
net.ware.serv.er}|{-c udp 213} ipfwadm -F -a accept -P udp -m D
www.xxx.yyy.zzz 213 ipautofw -A -r 213 213 {-h net.ware.serv.er}|{-c
udp 213} Port 213 is standard IPX port, this works to make a
connection between [Intra]Netware machines thru IPTUNNEL.NLM. You may
also connect ot a Netware/IP server by using port 43981 (0xABCD)
instead of 213.
Novell Netware/IP 2.0.36 For a default NWIP setup, a single client
connecting via linux IP masq can connect if the following ports are
forwarded on the linux side to the NWIP side: 43981/udp 43982/udp If
the client on the masq\'d network happens to be a Netware 4.x server
running NWIP or a Netware 5 server running NWIP migration agent then
port 396/tcp (an probably udp) will also need to be forwarded. Of
course then if you turn on IPX->NWIP forwarding, all machines can then
connect to the remote Netware network using IPX only. If you haven\'t
used the default ports in setting up NWIP on the Netware side of
things, you\'ll need to adjust the non-root ports to be forwarded
accordingly.
Nox 2.2.12-20 ipmasqadm autofw -A -r udp 18590 18599 -h
www.xxx.yyy.zzz Nox retail servers use UDP port 18590. Official Nox
server use ports 18590-18599 I haven\'t tested this myself, but from
what I read it should work. [ed - this guy TRUSTS the documentation?
The information at least has been verified.]
NT Logon 2.0.3x use PPTP to get hsi to work. Read the PPTP Masq docs
and the NT RK if you need help.
ntalkd Traditional Unix Talk Daemon ipmasqadm portfw -a -P udp -L
aaa.bbb.ccc.ddd 517 -R www.xxx.yyy.zzz 517 ipmasqadm portfw -a -P udp
-L aaa.bbb.ccc.ddd 518 -R www.xxx.yyy.zzz 518 where aaa.bbb.ccc.ddd is
the address of the masq server, www.xxx.yyy.zzz is the internal
machine address. ipmasqadm portfw -a -P udp -L aaa.bbb.ccc.ddd 517 -R
www.xxx.yyy.zzz 517 ipmasqadm portfw -a -P udp -L aaa.bbb.ccc.ddd 518
-R www.xxx.yyy.zzz 518 where aaa.bbb.ccc.ddd is the address of the
masq server, www.xxx.yyy.zzz is the internal machine address. First
off, make sure you kill off talkd and ntalkd from inetd.conf on the
firwall box. While this fixes incoming talk requests, it doesn\'t do
anything to fix outgoing talk requests.
ntalkd Traditional Unix Talk Daemon ipmasqadm portfw -a -P udp -L
aaa.bbb.ccc.ddd 517 -R www.xxx.yyy.zzz 517 ipmasqadm portfw -a -P udp
-L aaa.bbb.ccc.ddd 518 -R www.xxx.yyy.zzz 518 where aaa.bbb.ccc.ddd is
the address of the masq server, www.xxx.yyy.zzz is the internal
machine address. First off, make sure you kill off talkd and ntalkd
from inetd.conf on the firwall box. While this fixes incoming talk
requests, it doesn\'t do anything to fix outgoing talk requests.
OKbridge for Windows 2.0.30 ipchains -M -S 7200 0 0^M ipmasqadm autofw
-A -r tcp 1729 1729 -h www.xxx.yyy.zzz ipfwadm -M -s 7200 0 0 redir
www.xxx.yyy.zzz 1729 1729 This is a MS Windows app that lets you play
contract bridge over the Internet. OKbridge is a commercial service
with over 12,000 members. The 7200-minute TCP timeout setting is of
course variable. Redirecting port 1729 to the Windows machine is only
needed if you plan to serve a table, since a table server listens for
connections on that port. For this reason only one person behind the
firewall may serve at any given time, but this is no barrier to
playing in a game. Enjoy!
OnLive Talker! 2.0.30 ip_masq_raudio.o insmod ip_masq_raudio
ports=3060,3061 insmod ip_masq_raudio ports=3060,3061 If audio is
choppy in the Talker, set the connection to use 14.4kbps. A quick fix
for incomming audio only (no outgoing), is to set the connection
properties for 14.4kbps and \"USE TCP\". These settings are configured
from the System Tray.
OnLive Traveler! 2.0.30 ip_masq_raudio.o insmod ip_masq_raudio
ports=3060,3061 insmod ip_masq_raudio ports=3060,3061 If audio is
choppy in the Traveler, set the connection to use 14.4kbps. A quick
fix for incomming audio only (no outgoing), is to set the connection
properties for 14.4kbps and \"USE TCP\".
pcAnywhere v7.5 (patch 1) 2.0.30 ipmasqadm autofw -r tcp 5631 5632 -h
www.xxx.yyy.zzz ipmasqadm autofw -r udp 5631 5632 -h www.xxx.yyy.zzz
ipautofw -r tcp 5631 5632 -h www.xxx.yyy.zzz ipautofw -r udp 5631 5632
-h www.xxx.yyy.zzz The ipautofw is ONLY needed if you wish to be able
to take over a machine behind your firewall from the Internet. If you
only need to go from behind the firewall to a machine on the Internet,
no extra action is required.
Patch 1 on pcAnywhere uses registered ports 5631,5632. Prior to this
patch different (unregistered) ports were used. Make sure that all
your host machines running anywhere are upgraded to the same level.
I\'m not sure if the UDP stuff for ipautofw is needed but this is how
I have it working.
pcAnywhere version 8 should work as well.
Perl, Perl/TK GUI 2.2.x ,220); insert into ipchains (config,appid)
values( Check out http://thrish.com/ut/ipchains.html for more info.
This is some sort of Perl/TK GUI.
PhoneFree From Phonefree Tech Support: Hi, In order to allow PhoneFree
to work through a firewall you need the following information:
PhoneFree uses standard HTTP on port 8000 for communicating with our
servers. Port 8000 is used to avoid conflicts with ISPs that use
caching proxy servers on port 80. Standard FTP (PASV mode) on port 21
is used for voice mail and icon uploads. Here is a summary of ports
and servers used by PhoneFree. This is in addition to standard HTTP on
port 80 used by www.phonefree.com Voice mail and icon upload: ftp
server: cgi1.phonefree.com port: 21 HTTP server: cgi1.phonefree.com
Port: 8000 For actual voice conversations, which are done
peer-to-peer, you will need to open up the following ports through
your firewall: TCP 1035 UDP 1034 And the Active PhoneBook: TCP 2644
(Please note: if the below mentioned is a proxy server PhoneFree
won\'t work) PhoneFree Tech Support
PointCast 2.0 2.0.30 No additional configuration needed.
PowWow v3.2beta5 2.0.30 ipmasqadm autofw -A -r tcp 13223 13223 -c tcp
13223 -u ipmasqadm autofw -A -r udp 13223 13223 -c tcp 13223 -u
ipmasqadm autofw -A -r tcp 23213 23213 -c tcp 13223 -u ipautofw -A -r
tcp 13223 13223 -c tcp 13223 -u ipautofw -A -r udp 13223 13223 -c tcp
13223 -u ipautofw -A -r tcp 23213 23213 -c tcp 13223 -u Should allow
both incoming and outgoing connections. Voice works fine.
PPTP (Microsoft Point to Point Tunneling Protocol) 2.0.30 There is a
patch available if you are using a standard 2.0.30 kernel at
http://www.wolfenet.com/~jhardin and at
ftp://ftp.rubyriver.com/pub/jhardin/masquerade. For more information,
please talk a look at
http://www.wolfenet.com/~jhardin/ip_masq_pptp.html
Quake 2.0.30 ip_masq_quake.o Works really good (not too much lag
added) but only for one player per server.
Quake 2 2.0.31 ip_masq_quake.o Works like a charm with no special
setup. Just like Quakeworld for Quake 1. If you want to host a server
insall the ipportfw support located in \"Masq Links\" in your kernel
and then forward TCP and UDP port 27910 to you local Quake2 IP.
Quake 3 2.0.36 ipmasqadm autofw -A -r udp 27960 -h www.xxx.yyy.zzz
ipautofw -A -r udp 27960 -h www.xxx.yyy.zzz This rule will allow for a
Quake3 server to be run behind the linux masq machine onport 27960. I
did not have problems using Q3 as a client to other machines on the
Internet while using ip_masq_quake, however to run a server behind the
masq you must use this rule.
QuakeWorld 2.0.30 ipchains -A forward -j MASQ -s 192.168.1.0/24 -d
0.0.0.0/0 ipfwadm -F -a m -S 192.168.1.0/24 -D 0.0.0.0/0 I\'ve been
using the generic line for QuakeWorld and it works wonderfully.
Quicktime 4 and RTP/RTSP 2.0.38 ipmasqadm autofw -A -r tcp 554 554 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -R udp 6970 6999 -h
www.xxx.yyy.zzz Ipchains. IPautofw perhaps: ipautofw -A -r tcp 554 554
-h www.xxx.yyy.zzz ipautofw -A -R udp 6970 6999 -h www.xxx.yyy.zzz
Need QuickTime rtsp_proxy from
http://www.apple.com/quicktime/developers/rtspproxy.html You also need
a patch from http://www.neosoft.com/~lpb/rtsp_proxy_patch.gz Make sure
you run it with the name of your outside ip address: % ./rtsp_proxy
... -n gatehost ... &
Rainbow Six 2.0.35 ipmasqadm autofw -A -r tcp 2436 2438 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r udp 2436 2438 -h
www.xxx.yyy.zzz ipautofw -A -r tcp 2436 2438 -h www.xxx.yyy.zzz
ipautofw -A -r udp 2436 2438 -h www.xxx.yyy.zzz These ports can be
changed in the game. This is just with the default ports. Only for
normal LAN games -- for Internet it is MPlayer ports 8000-9000.
Real Audio 2.0.30 ip_masq_raudio.o Works in TCP mode without
application module. RealVideo should work, but has not been tested.
Supported as part of the main kernel distribution.
Real Player 2.0.30 ip_masq_raudio.o Both RealAudio and RealVideo work
great.
RealEncoder The RealEncoder works fine behind a masq wall as well.
I\'ve been doing a show now for 3 weeks everynight with no problem.
RealEncoder redir --inetd --timeout=120 www.xxx.yyyy.zzzz 7070 redir
--inetd --timeout=120 www.xxx.yyyy.zzzz 7070 Using RealServer +
RealEncoder under Windows95 behind an ipmasq\'d firewall is easy. Use
the above redir line, where www.xxx.yyy.zzz is the IP of the \'95 box.
The rest should be self explanatory. This works great for live
broadcasts as well. However, if you have the option of running
RealServer on the Linux box and RealEncoder on the Windows95 box, do
so -- I don\'t see why you couldn\'t. It\'s much more efficient this
way, and balances out the load between two systems versus one.
Red Alert unknown ipmasqadm autofw -A -r udp 5009 5009 -h
www.xxx.yyy.zzz ipautofw -A -r udp 5009 5009 -h www.xxx.yyy.zzz
www.xxx.yyy.zzz is the IP of machine running Red Alert
Red Baron 3D 2.0.36 Just works as soon as you use standard forwarding.
Remote Desktop 32 2.2.13 ipmasqadm autofw -A -r tcp 5044 5050 -h
www.xxx.yyy.zzz ipautofw -A -r tcp 5044 5050 -h www.xxx.yyy.zzz This
will allow a machine behind the linux masq machine to be controlled by
McAfee Remote Desktop 32. A machine behind the linux masq can control
any machine without needing to make an autofw rule.
Remotely Possible v3.2 2.0.30
Remotely Possible v3.2a (host) 2.0.32 ipmasqadm autofw -A -r tcp 799
799 -h www.xxx.yyy.zzz ipautofw -A -r tcp 799 799 -h www.xxx.yyy.zzz
You can also change the listening port in the RP host and adjust the
ipautofw command accordingly.
Rlogin/Rcp 0.0.0 ipmasqadm autofw -A -d tcp 512 1023 ipautofw -A -d
tcp 512 1023 [NOTE: I have issues using any of the \"r\" commands over
the internet. Better to use telnet and tcp wrappers, etc. -seg] This
little trick allows rlogin, but not rsh or rexec from masq\'d hosts to
external sites.
Roger Wilco 2.2.5-22 ipchains -A input -p udp -d www.xxx.yyy.zzz 3782
Rogue Spear 2.2.12 ipmasqadm autofw -A -r udp 2346 2348 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r tcp 2346 2348 -h
www.xxx.yyy.zzz ipautofw -A -r udp 2346 2348 -h www.xxx.yyy.zzz
ipautofw -A -r tcp 2346 2348 -h www.xxx.yyy.zzz Works perfectly if you
configure it to use a firewall, connecting directly to internet games
or via Mplayer. Tested with 2 clients inside the firewall. Use the
above ipautofw/ipchains scripts if you want to be the server.
Scour Media 2.0.34 ipmasqadm autofw -A -r tcp 139 139 -c tcp 139 -u
ipautofw -A -r tcp 139 139 -c tcp 139 -u This WILL mess up Samba if
running!!! You\'re actually better getting the Scour proxy perl script
from Scour but if you can\'t get it to run this does work.
Shout Cast Server 2.0.3x ipmasqadm autofw -A -r tcp -h www.xxx.yyy.zzz
ipautofw -A -r tcp -h www.xxx.yyy.zzz Just like any other tcp
listening app, punch a hole in your firewall.
SMB 2.0.30 This works fine through a normal masquerading setup. It
works like a charm -- but watch out for those TCP timeouts. Tim
Fletcher ([EMAIL PROTECTED]) writes: I have setup via port
fowarding of 137,138,139 the appearance of a SMB server on the
firewall which is really on a different machine.
Speak Freely v6.1b 2.0.30 ipmasqadm autofw -A -r udp 2074 2075 -c udp
2075 ipautofw -A -r udp 2074 2075 -c udp 2075 Available from
http://www.fourmilab.ch/speakfree/unix or
http://www.fourmilab.ch/speakfree/windows. Voice chat program which
runs on Windows as well as a number of unix flavours (including
Linux).
SQL*NET tools 2.0.x, 2.2.x ipmasqadm autofw -A -r tcp 1521 1521 -h
www.xxx.yyy.zzz ipautofw -A -r tcp 1521 1521 -h www.xxx.yyy.zzz 1521
is the default TCP port for Oracle. Your site may have changed it. THe
configuration is in $ORACLE_HOME/network/admin/listener.ora. This
recipe is for outside access to a masq server. Access to a non-masq\'d
server from a masq client requires no special configuration.
SSH 2.0.30 Works in personal authentication mode -- i.e. you use a
personal key, rather than a machine key (which is the pseudo rsh
mode). This is partially due to the machine address not matching the
key address, and also due to the port being remapped into a
non-priveleged region.
StarCraft (battle.net) 2.0.33 ipmasqadm autofw -A -r udp 6112 6112 -c
tcp 6112 ipautofw -A -r udp 6112 6112 -c tcp 6112 This has been tested
and works GREAT! I am using Redhat 5.0 and have not had problems yet.
Starseige Tribes 2.0.36,2.2.1 No configuration necessary. Kernel
2.0.36: ipautofw -A -r udp 28000 28001 ipautofw -A -r tcp 28000 28001
Kernel 2.2.1: No configuration necessary. Works fine using the above
to play.
SubSpace 2.0.29, 2.2.12 Multiple players can play at the same time
form behind the firewall without any special configuration. Verified
on 2.2.12 by Ramiro Vergara
SuperFTP (FXP) 2.0.xx ip_masq_ftp.o This requires a patched version of
the ip_masq_ftp module. You can get it at
http://www/algonet.se/~cyrano. This is my first ever Linux code, and
just two lines added! I changed ip_masq_ftp so that it doesn\'t change
PORT commands if the IP address is not 192.168.x.x (i.e. not on the
LAN). I know very little about C/Linux coding, but it does seem to
work. If you find that it doesn\'t work for you, tell me!
Symantec Live Update 2.0.31 ip_masq_ftp.o Although the latest (stable)
kernel version doesn\'t hurt, loading ip_masq_ftp.o was probably the
solution all along.
Tanarus 2.0.30 ipmasqadm autofw -A -r udp 1024 1280 -h www.xxx.yyy.zzz
ipautofw -A -r udp 1024 1280 -h www.xxx.yyy.zzz Apparently Tanarus
opens a port and tries to get the server end to connect to your
system. The port it connects to is dynamic.
Telnet 2.0.30 This just works. However, remember that there is an idle
timeout on TCP connections (default 15 minutes).
TetriNET 2.0.33 Version 1.13 of TetriNET (the online version of crak,
IMHO) works fine over IP Masq as a client, with no special setup. I
have not tested the server functionality yet, and what ipautofw or
ipfwadm commands are needed for it to work.
The 4th Coming 2.0.34 ipmasqadm autofw -A -r udp 11677 11677 -c udp
11677 -u ipmasqadm autofw -A -r udp 11679 11679 -c udp 11679 -u
ipautofw -A -r udp 11677 11677 -c udp 11677 -u ipautofw -A -r udp
11679 11679 -c udp 11679 -u This game is still in open beta and is to
be sold to ISP\'s who may or may not have the ability to change these
ports. But as of right now the programs I have talked to say these are
the ports .
TheDJ Player 2.0.30 ip_masq_raudio.o Works fine, because it works on
http and realaudio I know you can block out hte annoying ad\'s by
blocking out access to a set of IP addresses of some ad company (I
forgot now, but as if you click on them anyway!)
Tiberian Sun: Command and Conquer III 2.2.12 ipmsqadm autofw -A -r udp
1234 1234 -h xxx.xxx.xxx.xxx ipmsqadm autofw -A -r udp 1234 1234 -h
xxx.xxx.xxx.xxx The Port is realy 1234!!!! This is no Fake. Where
xxx.xxx.xxx.xxx is the IP of the machine running Tiberian Sun.
Timbuktu Pro 2.0.30 ipmasqadm autofw -A -r tcp 1417 1420 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r udp 407 407 -h www.xxx.yyy.zzz
ipautofw -A -r tcp 1417 1420 -h www.xxx.yyy.zzz ipautofw -A -r udp 407
407 -h www.xxx.yyy.zzz This works for incoming connections to a TB2
machine behind the firwall.
Timbuktu Pro Client 2.0.30 Works great, no special configuration. I
have tested version 2.0 & 3.0 on the Mac, and 1.5.1 on Windows NT.
Total Annihilation 2.0.30 ipmasqadm autofw -A -r udp 1000 5000 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r tcp 1000 5000 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r udp 47624 47624 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r udp 47624 47624 -h
www.xxx.yyy.zzz ipautofw -A -r udp 1000 5000 -h www.xxx.yyy.zzz
ipautofw -A -r tcp 1000 5000 -h www.xxx.yyy.zzz ipautofw -A -r udp
47624 47624 -h www.xxx.yyy.zzz ipautofw -A -r udp 47624 47624 -h
www.xxx.yyy.zzz The ipautofw commands let you host a game where only
one person can join and you cant connect to games. I\'ve tried for
hours and this is about as far as I can get with it.. Lets hope
CaveDog release the port information or a proxy. Submitted by:
[EMAIL PROTECTED] Kernel: 2.0.30pre10 ipautofw -A -r udp low high -h
www.xxx.yyy.zzz On the contrary, if you use TEN, you can find out the
range of random ports currently allocated for that session. The
command to use is ipautofw -M -l. Then you can specify this range in
the command ipautofw -A -r udp low high -h www.xxx.yyy.zzz. I have
been successful in hosting a 3 player game. Any more players
shouldn\'t be a problem (just depends on everyone\'s type of
connection).
Ultima Online BETA test 2.0.30 It worked the first time I tried, with
no changes to my usual setup! No additional configuration necessary.
Unreal 2.0.33 None for normal operation. For a server: ipmasqadm
autofw -A -r udp 7777 7777 -h www.xxx.yyy.zzz None for normal
operation. For a server: ipautofw -A -r udp 7777 7777 -h
www.xxx.yyy.zzz Works with any standard IP masq configuration. No
modules necessary. If you want to run an Unreal server and have it
accessible through a masquerading firewall the above auto-forward rule
sets this up.
Unreal Tournament 2.2.14 ipmasqadm autofw -A -r udp 7777 7777 -h
192.168.1.10 -v ipmasqadm autofw -A -r udp 7778 7778 -h 192.168.1.10
-v ipmasqadm autofw -A -r udp 7779 7779 -h 192.168.1.10 -v # for the
Master Server list: ipmasqadm autofw -A -r udp 27900 27900 -h
192.168.1.10 -v ipautofw -A -r udp 7777 7777 -h 192.168.1.10 ipautofw
-A -r udp 7778 7778 -h 192.168.1.10 ipautofw -A -r udp 7779 7779 -h
192.168.1.10 # for the Master Server list ipautofw -A -r udp 27900
27900 -h 192.168.1.10 Substitute 192.168.1.10 for your internal
server. I have not tested throughly on 2.0.x series. Works like a
charm for server inside of the network.
VDO Live 2.0.30 ip_masq_vdolive.o Protocol implementation is
relatively fragile -- may break if the protocol is modified in any
way! This is a side effect of the way that VDO implemeneted their
protocol! Supported as part of the main kernel distribution.
VDO Phone 2.0.30 ip_masq_vdolive You need to add/modify the
ip_masq_vdolive module to read: insmod ip_masq_vdolive
ports=7000,7010,32649 You need to add/modify the ip_masq_vdolive
module to read: insmod ip_masq_vdolive ports=7000,7010,32649 This is a
response to a request that I saw on the requests page. I have not
tested this for I don\'t have vdolive. The information on ports is
from their web page. My best guess on this one is that you will be
able to send requests but not receive.
VDO Video 1.2.13 Works for me with this line in the inetd.conf: 7080
dgram udp wait root /usr/sbin/tcpd /usr/sbin/udpred www.xxx.yyy.zzz
7080 www.xxx.yyy.zzz is the Windows box. udpred can be found on the
Links page. Works for me with this line in the inetd.conf: 7080 dgram
udp wait root /usr/sbin/tcpd /usr/sbin/udpred www.xxx.yyy.zzz 7080
www.xxx.yyy.zzz is the Windows box. udpred can be found on the Links
page. VDO must then be configured to use 7080 as a hardwired port and
everything works fine.
VNC remote display system 2.0.33 ipmasqadm autofw -A -v -r tcp 5900
590d -h www.xxx.yyy.zzz ipmasqadm autofw -A -v -r tcp 5800 580d -h
www.xxx.yyy.zzz (for the java viewer) ipautofw -A -v -r tcp 5900 590d
-h www.xxx.yyy.zzz ipautofw -A -v -r tcp 5800 580d -h www.xxx.yyy.zzz
(for the java viewer) Where d>0 and is the highest display number that
you wish to access, and www.xxx.yyy.zzz is the target machines IP
address. The standard viewer software works fine with outbound
connections and a standard masquerade setup. Incoming connections work
via ipautofw. Great app and its GPL\'d. Go get it!
VoxChat 2.0.30 ipmasqadm autofw -A -r udp 15000 15025 -h
www.xxx.yyy.zzz ipmasqadm autofw -A -r tcp 15000 15025 -h
www.xxx.yyy.zzz ipautofw -A -r udp 15000 15025 -h www.xxx.yyy.zzz
ipautofw -A -r tcp 15000 15025 -h www.xxx.yyy.zzz This works for
VoxChat v1.0-2.5. Where www.xxx.yyy.zzz is the IP of the client
running VoxChat. This allows for a total of 25 incomming audio
channels at one time. This may be much but you never know :)
VoxPhone 3.0 2.0.30 ipmasqadm autofw -A -p tcp 12380
www.xxx.yyy.zzz:12380 -v ipmasqadm autofw -A -p udp 12380
www.xxx.yyy.zzz:12380 -v ipautofw -A -p tcp 12380
www.xxx.yyy.zzz:12380 -v ipautofw -A -p udp 12380
www.xxx.yyy.zzz:12380 -v Voxphone 3.0 works fully (2 way voice,
conference, receive calls etc.) with the configuration above. Where
www.xxx.yyy.zzz is the win95 host behind masq which you want to use
Voxphone from. You can even receive incoming calls! Basically you just
tell the masq host to redirect all incoming tcp/udp traffic on port
12380 to the host www.xxx.yyy.zzz on port 12380. Note: The -p option
may not work on kernels below 2.0.30 as it may not be supported, also
check your ipautofw version and make sure it is a current one. I used
the -v option for a verbose output, so you can see a little more
clearly what you are doing.
Warbirds 2.01r3 2.0.33 ipmasqadm autofw -A -r tcp 912 912 -h
www.xxx.yyy.zzz ipautofw -A -r tcp 912 912 -h www.xxx.yyy.zzz This is
only required to HOST a Warbirds H2H session. No changes are needed to
join a H2H session.
Warcraft II battle.net edition 2.2.11 Works fine with the default
settings.
Webcam (TrueTech) 2.0.x redir www.xxx.yyy.zzz 2047 2047 where
www.xxx.yyy.zzz is the address of the win 9x machine. redir
www.xxx.yyy.zzz 2047 2047 where www.xxx.yyy.zzz is the address of the
win 9x machine.
Webcam32 2.0.32 ipmasqadm autofw -A -r tcp 81 81 -h www.xxx.yyy.zzz
redir 192.168.1.3 81 81 Webcam32 does server push from a definable
port on a windows machine. I used redir 192.168.1.3 81 81 so that port
81 request to 206.80.6.123 (the linux machine) are sent over to
192.168.1.3 (the windows machine).
Webforce Compcore MPEG-1 Player 2.0 2.0.33 ipmasqadm autofw -A -r udp
1024 65535 -c udp 6311 ipautofw -A -r udp 1024 65535 -c udp 6311 As
far as I can see, 6311 is the first addres that is tried. If this does
not succeed, 6313 is tried. I also saw 7813 come by later. Generally
speaking: 6311 works for me, but you may have to experiment with other
control ports.
WebPhone 3.0 2.0.33 ipmasqadm autofw -A -p tcp 21845
www.xxx.yyy.zzz:21845 ipmasqadm autofw -A -p tcp 21845
www.xxx.yyy.zzz:21845 ipautofw -A -p tcp 21845 www.xxx.yyy.zzz:21845
ipautofw -A -p tcp 21845 www.xxx.yyy.zzz:21845 Works with WebPhone
3.0. www.xxx.yyy.zzz is the IP of the client running WebPhone.
Westwood Chat 2.0.30 Westwood Chat works 100%, no problems
(3.3ver-4.0)
Windows Networking 2.2.x I\'ve make a patch for Samba which makes it
possible for you hosts on your private LAN to show up in the \'Network
Neighborhood\' of your public LAN. You can browse the network from
your provate LAN normally and poeple from the public LAN can browse
your private LAN (only if you want that of course). see
http://malt-whisky.student.utwente.nl/nbfw/ [Note: Be VERY careful
with stuff like this, I can\'t think of a case where I would want this
function... -seg]
Windows Networking We made this work a couple of months ago (before
upgrading to 2.0.30), but the remote party had to extablish a PPP
connection with our masquerading host. That way, he would appear in
our \"netwok Neighborhood\". I don\'t know if it can work without the
PPP link though.
Windows Networking If you add a line to the \"lmhosts\" file under
WFW/95/NT3.5x/NT4.0 with the client\'s IP, you will be able to map
drives to the computer. If under 95/NT you do a \"Find Computer\" for
hte name, it will show up under Network Neighborhood.
Windows Terminal Server 4.0 Just redirect port 3389 to the Windows
Terminal server behind the firewall.
Windows Update 2.0.36 ipchains -A forward -j MASQ -S
www.xxx.yyy.zzz/24 -D 0.0.0.0/0 where www.xxx.yyy.zzz is either: a)
The network number of your internal network, or b) The ip address of
the machine you want windows update to work on. ipfwadm -F -a m -s
www.xxx.yyy.zzz/24 -D 0.0.0.0/0 where www.xxx.yyy.zzz is either: a)
The network number of your internal network, or b) The ip address of
the machine you want windows update to work on.
Worms2 ipmasqadm autofw -A -r tcp 1000 3000 -h www.xxx.yyy.zzz
ipmasqadm autofw -A -r ucp 1000 1029 -h www.xxx.yyy.zzz ipmasqadm
autofw -A -r tcp 1031 2210 -h www.xxx.yyy.zzz ipmasqadm autofw -A -r
tcp 2220 3212 -h www.xxx.yyy.zzz ipautofw -A -r tcp 1000 3000 -h
www.xxx.yyy.zzz ipautofw -A -r ucp 1000 1029 -h www.xxx.yyy.zzz
ipautofw -A -r tcp 1031 2210 -h www.xxx.yyy.zzz ipautofw -A -r tcp
2220 3212 -h www.xxx.yyy.zzz It is possible that more may be needed,
or less may be needed...It is also possible that to host a game more
may be needed... The clue was on the Worms2 website...they say they
use MS DirectPlay...so using the DirectPlay ipautofw\'s already listed
and a couple of netstats let me narrow it down a little.
X Windows ipmasqadm autofw -A -r tcp 6000 6000 -h www.xxx.yyy.zzz^M
ipmasqadm autofw -A -r ucp 6000 6000 -h www.xxx.yyy.zzz redir
192.168.1.2 6000 6000 & X is based at port 6000 for screen 0, 6001 for
screen 1, and so on. I use redir to pass that information on to the
one host I have for displaying X though I image you could assign a
screen to each host you need.
X Windows Other information on X Windows... Better solution is to
tunnel the X protocol through another transport, which can also apply
compression and the like. I find the best way is to use ssh and
transport X through that (happens automagically), setting a
compression level is good for this unless you have serious bandwidth
available. Alternaltively, look at dxpc:
http://ccwf.cc.utexas.edu/~zvonler/dxpc
X Windows Mohammad Rezaei has written a proxy server for X. You can
get it at: ftp://ftp.x.org/contrib/INCOMING/xforward2.tar.gz
X Windows ipmasqadm autofw -A -r tcp 6000 6100 -c tcp 23 ipmasqadm
autofw -A -r tcp 6000 6100 -c udp 177 ipmasqadm autofw -A -r tcp 6000
6100 -c tcp 6000 ipautofw -A -r tcp 6000 6100 -c tcp 23 ipautofw -A -r
tcp 6000 6100 -c udp 177 ipautofw -A -r tcp 6000 6100 -c tcp 6000 This
is from the README that comes with ipautofw. Anyone can read it from
there but some may not realize that it is there. This information is
said to have come from John Fulmer ([EMAIL PROTECTED])
Yahoo Pager 2.0.33 ipmasqadm autofw -A -r tcp 5050 5050 -h
www.xxx.yyy.zzz ipautofw -A -r tcp 5050 5050 -h www.xxx.yyy.zzz Unlike
ICQ, Yahoo Pager appears to only use one tcp port, 5050. This will
change when they incorporate direct chat and file sending functions.
Do NOT use ICQ\'s ports, as Yahoo Pager and ICQ *WILL* crash if you
are unlucky enough for them to use the same port at the same time.
---
Send e-mail to '[EMAIL PROTECTED]' with 'unsubscribe rlug' to
unsubscribe from this list.