I had trouble with that, too, but I have used ipportfw to do this 
kind of redirection, like 
        ipportfw -A -t outside-ip/80 -R inside-ip/80
There's new syntax with ipmasqadm, but it's pretty close to that.

I missed the beginning of this thread, so I hope I'm not missing your 
point.
Charlie Shoemaker

> Subject:       Re:  [masq] Limitation problem....

> 
> >But I can't understand half of the rules....
> >And this is really boring for me...
> 
> Yeah.. it is pretty dry stuff.  I know where you are coming 
> from.
> 
> 
> 
> >> /sbin/ipfwadm -I -a accept -b -P tcp -S 192.168.0.7/32 80 -D 0.0.0.0/0
> >> 1024:65535
> >That did not work much more....
> 
> Try pulling the "-b" option out and try again.
> 
> 
> 
> >Hummmm... Where I can find a doc about
> >the difference between the different list,
> >and in particular -F -I and -O.
> >Or can you explain us (for all masq reader) clearly what is their 
> >aim???
> 
> Well, you could read the ipfwadm man page but its pretty ugly.
> 
> 
> How is this?  I just added it to my TrinityOS doc so if you 
> have anything to add to make it clearer, etc.. lemmie know.
> 
> --
> 
> Think of a IPFWADM or IPCHAINS ruleset like the following:
> 
>               - All interfaces (any network cards, the localhost
>                 interface, etc) on a Linux box have INPUT, OUTPUT,
>                 and FORWARD rules.
> 
>       For example:
> 
> 
>               - Say you have a packet from the Internet that 
>                 wants to reach your Linux box.
> 
>               1) The packet is sent from the remote computer
>                       on the Internet
> 
>               2) The packet is received on the INPUT rule on 
>                       the -External NIC card- of the Linux box
> 
>               3) If the packet is matched to allow the packet
>                       through:  
> 
>                          Some matching criteria can include:
>                               - source IP address
>                               - traffic on TCP and specific port 
>                               - traffic on TCP and specific port 
>                               - destination IP address
>                               - etc
> 
>                       then let the packet though.  If not matched, 
>                       its either REJECTED or DENIED.  You can 
>                       also log the fact that this packet was
>                       killed.
> 
>               4) If passed, the packet then goes to the Linux
>                       box to be processed.  Once the reply 
>                       traffic is calculated by TELNET, etc, this 
>                       output traffic is then sent to the OUTPUT 
>                       filter.
> 
>               5) If the packet is matched to allow the packet
>                       through, its let though.  (see #3 above).
>                       If not matched, its either REJECTED or 
>                       DENIED.  You can also log the fact that 
>                       this packet was killed.
> 
>               6) If passed, the packet leaves the Linux box to go
>                  over the Internet connection destined to that
>                  remote computer.
> 
>               NOTE:  As you've seen, I've left out the FORWARD 
>                       rule.  Basically, all that the FORWARD rule
>                       does is if the packet is matched to be
>                       allowed, the packet is FORWARDed directly
>                       to some other interface.  Once forwarded,
>                       the receiving interface will still try to
>                       match this packet against it's INPUT rule. 
> 
> 
>                                  +------------------------------+
>                                  |      Linux TCP/IP stack      |
>                                  |                              |
>                             +--->| Input:              Output:  |
>                             |    +------------------------------+
>                             |                             |
>                             |                             |
>            +----------- +   |           +------------+    |  
>            | Input      |   |           | Output     |    |
>            |  Rule      |   |           |  Rule      |    |
>            |            |   |           |            |    |
>    +-IN--->|  P a s s ? |---+       +---|  P a s s ? |<---+
>    |       |     or     |           |   |     or     |
>    ^       |Deny/Reject?|           |   |Deny/Reject?|
> --------   +------------+           |   +------------+
>   Send           |                  |          |
> --------         +--> Dump packet   |          +--> Dump packet   
> Remote            (possibly log it) |           (possibly log it)
> Internet                            |
> site                                |
> --------                            |
>  Receive <--------------------------+
> --------
> 
> 
> --David
> .----------------------------------------------------------------------------.
> |  David A. Ranch - Linux/Networking/PC hardware         [EMAIL PROTECTED]  |
> !----                                                                    ----!
> `----- For more detailed info, see http://www.ecst.csuchico.edu/~dranch -----'
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: [EMAIL PROTECTED]
> For daily digest info, email [EMAIL PROTECTED]
> 
---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
For daily digest info, email [EMAIL PROTECTED]

Reply via email to