Networks Admin

본문 바로가기

Networks Admin

Networks >> Networks Administration
[목차]
제4장 ip-masquerade를 이용한 인터넷 카페

    9. 영문판 HOWTO 문서

 

    Linux IP Masquerade mini HOWTO

    
    
      Linux IP Masquerade mini HOWTO
      Ambrose Au, ambrose@writeme.com
      v1.20, 10 November 1997
    
      This document describes how to enable IP masquerade feature on a Linux
      host, allowing connected computers that do not have registered Inter?
      net IP addresses to connect to the Internet through your Linux box.
    
      1.  Introduction
    
      1.1.  Introduction
    
      This document describes how to enable IP masquerade feature on a Linux
      host, allowing connected computers that do not have registered
      Internet IP addresses to connect to the Internet through your Linux
      box.  It is possible to connect your machines to the Linux host with
      ethernet, as well as other kinds of connection such as a dialup ppp
      link. This document will emphasize on ethernet connection, since it
      should be the most likely case.
    
           This document is intended for users using kernels 2.0.x.
           Development kernels 2.1.x are NOT covered.
    
      1.2.  Foreword, Feedback & Credits
    
      I find it very confusing as a new user setting up IP masquerade on a
      newer kernel, i.e. 2.x kernel.  Although there is a FAQ and a mailing
      list, there is no document dedicates on that; and there are some
      requests on the mailing list for such a HOWTO. So, I decided to write
      this up as a starting point for new users, and possibly a building
      block for knowledgeable users to build on for documentation. If you
      think I'm not doing a good job, feel free to tell me so that I can
      make it better.
    
      This document is heavily based on the original FAQ by Ken Eves , and
      numerous helpful messages in the IP Masquerade mailing list. And a
      special thanks to Mr. Matthew Driver whose mailing list message
      inspired me to set up IP Masquerade and eventually writing this.
    
      Please feel free to send any feedback or comments to
      ambrose@writeme.com if I'm mistaken on any information, or if any
      information is missing. Your invaluable feedback will certainly be
      influencing the future of this HOWTO!
    
      This HOWTO is meant to be a quick guide to get your IP Masquerade
      working in the shortest time.  As I am not a technical writer, you may
      find the information in this document not as general and objective as
      it can be.  The latest news and information can be found at the IP
      Masquerade Resource  web page that I
      maintained.  If you have any technical questions on IP Masquerade,
      please join the IP Masquerade Mailing List instead of sending email to
      me since I have limited time, and the developers of IP_Masq are more
      capable of answering your questions.
    
      The latest version of this document can be found at the IP Masquerade
      Resource , which also contains the HTML
      and postscript version:
    
      ?  http://ipmasq.home.ml.org/
    
      ?  Please refer to IP Masquerade Resource Mirror Sites Listing
          for other mirror
         sites available.
    
      1.3.  Copyright & Disclaimer
    
      This document is copyright(c) 1996 Ambrose Au, and it's a free
      document. You can redistribute it under the terms of the GNU General
      Public License.
    
      The information and other contents in this document are to the best of
      my knowledge. However, IP Masquerade is experimental, and there is
      chance that I make mistakes as well; so you should determine if you
      want to follow the information in this document.
    
      Nobody is responsible for any damage on your computers and any other
      losses by using the information on this document. i.e.
    
           THE AUTHOR IS NOT RESPONSIBLE FOR ANY DAMAGES INCURRED DUE
           TO ACTIONS TAKEN BASED ON THE INFORMATION IN THIS DOCUMENT.
    
      2.  Background Knowledge
    
      2.1.  What is IP Masquerade?
    
      IP Masquerade is a developing networking function in Linux. If a Linux
      host is connected to the Internet with IP Masquerade enabled, then
      computers connecting to it (either on the same LAN or connected with
      modems) can reach the Internet as well, even though they have no
      official assigned IP addresses.
    
      This allows a set of machines to invisibly access the Internet hidden
      behind a gateway system, which appears to be the only system using the
      Internet.  Breaking the security of a well set-up masquerading system
      should be considerably more difficult than breaking a good packet
      filter based firewall (assuming there are no bugs in either).
    
      2.2.  Current Status
    
      IP Masquerade is still at its experimental stages. However, kernels
      since 1.3.x had built-in support already. Many individuals and even
      companies are using it, with satisfactory results.
    
      Browsing web pages and telnet are reported to work well over IP
      Masquerade. FTP, IRC and listening to Real Audio are working with
      certain modules loaded. Other network streaming audio such as True
      Speech and Internet Wave work too. Some fellow users on the mailing
      list even tried video conferencing software.   Ping is now working,
      with the newly available ICMP patch
    
      Please refer to section 4.3 for a more complete listing of software
      supported.
    
      IP Masquerade works well with 'client machines' on several different
      OS and platforms. There are successful cases with systems using Unix,
      Windows 95, Windows NT, Windows for Workgroup(with TCP/IP package),
      OS/2, Macintosh System's OS with Mac TCP, Mac Open Transport, DOS with
      NCSA Telnet package, VAX, Alpha with Linux, and even Amiga with AmiTCP
      or AS225-stack.
    
      2.3.  Who Can Benefit From IP Masquerade?
    
      ?  If you have a Linux host connected to the Internet, and
    
      ?  if you have some computers running TCP/IP connected to that Linux
         box on a local subnet, and/or
    
      ?  if your Linux host has more than one modem and acts as a PPP or
         SLIP server connecting to others, which
    
      ?  those OTHER machines do not have official assigned IP addresses.
         (these machines are represented by OTHER machines hereby)
    
      ?  And of course, if you want those OTHER machines to make it onto the
         Internet without spending extra bucks :)
    
      2.4.  Who Doesn't Need IP Masquerade?
    
      ?  If your machine is a stand-alone Linux host connected to the
         Internet, then it is pointless to have IP Masquerade running, or
    
      ?  if you already have assigned addresses for your OTHER machines,
         then you don't need IP Masquerade,
    
      ?  and of course, if you don't like the idea of a 'free ride'.
    
      2.5.  How IP Masquerade Works?
    
      From IP Masquerade FAQ by Ken Eves:
    
        Here is a drawing of the most simple setup:
    
           SLIP/PPP         +------------+                         +-------------+
           to provider      |  Linux     |       SLIP/PPP          | Anybox      |
          <---------- modem1|            |modem2 ----------- modem |             |
            111.222.333.444 |            |           192.168.1.100 |             |
                            +------------+                         +-------------+
    
          In the above drawing a Linux box with ip_masquerading installed and
        running is connected to the Internet via SLIP/or/PPP using modem1.  It has
        an assigned IP address of 111.222.333.444.  It is setup that modem2 allows
        callers to login and start a SLIP/or/PPP connection.
    
          The second system (which doesn't have to be running Linux) calls into the
        Linux box and starts a SLIP/or/PPP connection.  It does NOT have an assigned
        IP address on the Internet so it uses 192.168.1.100. (see below)
    
          With ip_masquerade and the routing configured properly the machine
        Anybox can interact with the Internet as if it was really connected (with a
        few exceptions).
    
      Quoting Pauline Middelink:
        Do not forget to mention the ANYBOX should have the Linux box
        as its gateway (whether is be the default route or just a subnet
        is no matter). If the ANYBOX can not do this, the Linux machine
        should do a proxy arp for all routed address, but the setup of
        proxy arp is beyond the scope of the document.
    
      The following is an excerpt from a post on comp.os.linux.networking which
      has been edited to match the names used in the above example:
         o I tell machine ANYBOX that my slipped linux box is its gateway.
         o When a packet comes into the linux box from ANYBOX, it will assign it
           new source port number, and slap its own ip address in the packet
           header, saving the originals.  It will then send the modified packet
           out over the SLIP/or/PPP interface to the Internet.
         o When a packet comes from the Internet to the linux box, if the port
           number is one of those assigned above, it will get the original
           port and ip address, put them back in the packet header, and send the
           packet to ANYBOX.
         o The host that sent the packet will never know the difference.
    
      An IP Masquerading Example
    
      typical example is given in the diagram below:-
    
          +----------+
          |          |  Ethernet
          | abox     |::::::
          |          |2    :192.168.1.x
          +----------+     :
                           :   +----------+   PPP
          +----------+     :  1|  Linux   |   link
          |          |     ::::| masq-gate|:::::::::// Internet
          | bbox     |::::::   |          |
          |          |3    :   +----------+
          +----------+     :
                           :
          +----------+     :
          |          |     :
          | cbox     |::::::
          |          |4
          +----------+
    
          <-Internal Network->
    
      In this example there are 4 computer systems that we are concerned
      about (there is presumably also something on the far right that your
      IP connection to the internet comes through, and there is something
      (far off the page) on the internet that you are interested in exchang?
      ing information with).  The Linux system masq-gate is the masquerading
      gateway for the internal network of machines abox, bbox and cbox to
      get to the internet.  The internal network uses one of the assigned
      private network addresses, in this case the class C network
      192.168.1.0, with the linux box having address 192.168.1.1 and the
      other systems having addresses on that network.
    
      The three machines abox, bbox and cbox (which can, by the way, be
      running any operating system as long as they can speak IP - such as
      Windows 95, Macintosh MacTCP or even another linux box) can connect to
      other machines on the internet, however the masquerading system masq-
      gate converts all of their connections so that they appear to
      originate from masq-gate, and arranges that data coming back in to a
      masqueraded connection is relayed back to the originating system - so
      the systems on the internal network see a direct route to the internet
      and are unaware that their data is being masqueraded.
    
      2.6.  Requirements for Using IP Masquerade on Linux 2.x
    
           ** Please refer to IP Masquerade Resource
            for the latest information,
           since it is difficult to update the HOWTO frequently. **
    
      ?  Kernel 2.0.x source available from
         ftp://ftp.funet.fi/pub/Linux/kernel/src/v2.0/
         (Yes, you'll have to compile your kernel with certain supports....
         The latest stable kernel is recommended)
    
      ?  Loadable kernel modules, preferably 2.0.0 or newer available from
         http://www.pi.se/blox/modules/modules-2.0.0.tar.gz
         (modules-1.3.57 is the minimal requirement)
    
      ?  A well set up TCP/IP network
         covered in Linux NET-2 HOWTO
          and the Network
         Administrator's Guide 
    
      ?  Connectivity to Internet for your Linux host
         covered in Linux ISP Hookup HOWTO
         , Linux PPP
         HOWTO  and Linux
         PPP-over-ISDN mini-HOWTO
         
    
      ?  Ipfwadm 2.3 or newer available from
         ftp://ftp.xos.nl/pub/linux/ipfwadm/ipfwadm-2.3.tar.gz
         more information on version requirement is on the Linux Ipfwadm
         page 
    
      ?  You can optionally apply some IP Masquerade patches to enable other
         functionality.  More information availabe on IP Masquerade
         Resources  (these patches apply to all
         2.0.x kernels)
    
      3.  Setting Up IP Masquerade
    
           If your private network contains any vital information,
           think carefully before using IP Masquerade.  This may be a
           GATEWAY for you to get to the Internet, and vice versa for
           someone on the other side of the world to get into your net?
           work.
    
      3.1.  Compiling the Kernel for IP Masquerade Support
    
           ** Please refer to IP Masquerade Resource
            for the latest information,
           since it is difficult to update the HOWTO frequently. **
    
      ?  First of all, you need the kernel source (preferably stable kernel
         version 2.0.0 or above)
    
      ?  If this is your first time compiling the kernel, don't be scared.
         In fact, it's rather easy and it's covered in Linux Kernel HOWTO
         .
    
      ?  Unpack the kernel source to /usr/src/ with a command: tar xvzf
         linux-2.0.x.tar.gz -C /usr/src, where x is the patch level beyond
         2.0
         (make sure there is a directory or symbolic link called linux )
    
      ?  Apply appropriate patches.  Since new patches are coming out,
         details will not be included here.  Please refer to IP Masquerade
         Resources  for up-to-date information.
    
      ?  Refer to the Kernel HOWTO and the README file in the kernel source
         directory for further instructions on compiling a kernel
    
      ?  Here are the options that you need to compile in:
    
         Say YES to the following,
    
             * Prompt for development and/or incomplete code/drivers
               CONFIG_EXPERIMENTAL
               - this will allow you to select experimental IP Masquerade code compiled
                 into the kernel
    
             * Enable loadable module support
               CONFIG_MODULES
               - allows you to load modules
    
             * Networking support
               CONFIG_NET
    
             * Network firewalls
               CONFIG_FIREWALL
    
             * TCP/IP networking
               CONFIG_INET
    
             * IP: forwarding/gatewaying
               CONFIG_IP_FORWARD
    
             * IP: firewalling
               CONFIG_IP_FIREWALL
    
             * IP: masquerading (EXPERIMENTAL)
               CONFIG_IP_MASQUERADE
               - although it is experimental, it is a *MUST*
    
             * IP: ipautofw masquerade support (EXPERIMENTAL)
               CONFIG_IP_MASQUERADE_IPAUTOFW
               -recommended
    
             * IP: ICMP masquerading
               CONFIG_IP_MASQUERADE_ICMP
               - support for masquerading ICMP packets, optional.
    
             * IP: always defragment
               CONFIG_IP_ALWAYS_DEFRAG
               - highly recommended
    
             * Dummy net driver support
               CONFIG_DUMMY
               - recommended
    
      NOTE: These are just the component you need for IP Masquerade, select
      whatever other options you need for your specific setup.
    
      ?  After compiling the kernel, you should compile and install the
         modules:
    
           make modules; make modules_install
    
      ?  Then you should add a few lines into your /etc/rc.d/rc.local file
         (or any file you think is appropriate) to load the required modules
         reside in /lib/modules/2.0.x/ipv4/ automatically during each
         reboot:
    
                   .
                   .
                   .
           /sbin/depmod -a
           /sbin/modprobe ip_masq_ftp
           /sbin/modprobe ip_masq_raudio
           /sbin/modprobe ip_masq_irc
           (and other modules such as ip_masq_cuseeme, ip_masq_vdolive
            if you have applied the patches)
                   .
                   .
                   .
    
      Note: You can also load it manually before using ip_masq, but DON'T
      use kerneld for this, it will NOT work!
    
      3.2.  Assigning Private Network IP Address
    
      Since all OTHER machines do not have official assigned addressees,
      there must be a right way to allocate address to those machines.
    
      From IP Masquerade FAQ:
    
      There is an RFC (#1597) on which IP addresses are to be used on a non-
      connected network.  There are 3 blocks of numbers set aside
      specifically for this purpose. One which I use is 255 Class-C subnets
      at 192.168.1.n to 192.168.255.n .
    
           From RCF 1597:
    
           Section 3: Private Address Space
    
           The Internet Assigned Numbers Authority (IANA) has reserved the
           following three blocks of the IP address space for private networks:
    
                         10.0.0.0        -   10.255.255.255
                         172.16.0.0      -   172.31.255.255
                         192.168.0.0     -   192.168.255.255
    
           We will refer to the first block as "24-bit block", the second as
           "20-bit block", and to the third as "16-bit" block".  Note that the
           first block is nothing but a single class A network number, while the
           second block is a set of 16 contiguous class B network numbers, and
           third block is a set of 255 contiguous class C network numbers.
    
      So, if you're using a class C network, you should name your machines
      as 192.168.1.1, 1.92.168.1.2, 1.92.168.1.3, ..., 192.168.1.x
    
      192.168.1.1 is usually the gateway machine, which is your Linux host
      connecting to the Internet. Notice that 192.168.1.0 and 192.168.1.255
      are the Network and Broadcast address respectively, which are
      reserved. Avoid using these addresses on your machines.
    
      3.3.  Configuring the OTHER machines
    
      Besides setting the appropriate IP address for each machine, you
      should also set the appropriate gateway. In general, it is rather
      straight forward. You simply enter the address of your Linux host
      (usually 192.168.1.1) as the gateway address.
    
      For the Domain Name Service, you can add in any DNS available. The
      most apparent one should be the one that your Linux is using. You can
      optionally add any domain search suffix as well.
    
      After you have reconfigured those IP addresses, remember to restart
      the appropriate services or reboot your systems.
    
      The following configuration instructions assume that you are using a
      Class C network with 192.168.1.1 as your Linux host's address. Please
      note that 192.168.1.0 and 192.168.1.255 are reserved.
    
      3.3.1.  Configuring Windows 95
    
      1. If you haven't installed your network card and adapter driver, do
         so now.
    
      2. Go to 'Control Panel'/'Network'.
    
      3. Add 'TCP/IP protocol' if you don't already have it.
    
      4. In 'TCP/IP properties', goto 'IP Address' and set IP Address to
         192.168.1.x, (1 < x < 255), and then set Subnet Mask to
         255.255.255.0
    
      5. Add 192.168.1.1 as your gateway under 'Gateway'.
    
      6. Under 'DNS Configuration'/'DNS Server search order' add your the
         DNS that your Linux host uses (usually find in /etc/resolv.conf).
         Optionally, you can add the appropriate domain search suffix.
    
      7. Leave all the other settings as they are unless you know what
         you're doing.
    
      8. Click 'OK' on all dialog boxes and restart system.
    
      9. Ping the linux box to test the network connection: 'Start/Run',
         type: ping 192.168.1.1
         (This is only a LAN connection testing, you can't ping the outside
         world yet.)
    
      10.
         You can optionally create a HOSTS file in the windows directory so
         that you can use hostname of the machines on your LAN.  There is an
         example called HOSTS.SAM in the windows directory.
    
      3.3.2.  Configuring Windows for Workgroup 3.11
    
      1. If you haven't installed your network card and adapter driver, do
         so now.
    
      2. Install the TCP/IP 32b package if you don't have it already.
    
      3. In 'Main'/'Windows Setup'/'Network Setup', click on 'Drivers'.
    
      4. Highlight 'Microsoft TCP/IP-32 3.11b' in the 'Network Drivers'
         section, click 'Setup'.
    
      5. Set IP Address to 192.168.1.x (1 < x < 255), then set Subnet Mask
         to 255.255.255.0 and Default Gateway to 192.168.1.1
    
      6. Do not enable 'Automatic DHCP Configuration' and put anything in
         those 'WINS Server' input areas unless you're in a Windows NT
         domain and you know what you're doing.
    
      7. Click 'DNS', fill in the appropriate information mentioned in STEP
         6 of section 3.3.1, then click 'OK' when you're done with it.
    
      8. Click 'Advanced', check 'Enable DNS for Windows Name Resolution'
         and 'Enable LMHOSTS lookup' if you're using a look up host file,
         similar to the one mentioned in STEP 10 of section 3.3.1
    
      9. Click 'OK' on all dialog boxes and restart system.
    
      10.
         Ping the linux box to test the network connection: 'File/Run',
         type: ping 192.168.1.1
         (This is only a LAN connection testing, you can't ping the outside
         world yet.)
    
      3.3.3.  Configuring Windows NT
    
      1. If you haven't installed your network card and adapter driver, do
         so now.
    
      2. Go to 'Main'/'Control Panel'/'Network'
    
      3. Add the TCP/IP Protocol and Related Component from the 'Add
         Software' menu if you don't have TCP/IP service installed already.
    
      4. Under 'Network Software and Adapter Cards' section, highlight
         'TCP/IP Protocol' in the 'Installed Network Software' selection
         box.
    
      5. In 'TCP/IP Configuration', select the appropriate adapter, e.g.
         [1]Novell NE2000 Adapter.  Then set the IP Address to 192.168.1.x
         (1 < x < 255), then set Subnet Mask to 255.255.255.0 and Default
         Gateway to 192.168.1.1
    
      6. Do not enable 'Automatic DHCP Configuration' and put anything in
         those 'WINS Server' input areas unless you're in a Windows NT
         domain and you know what you're doing.
    
      7. Click 'DNS', fill in the appropriate information mentioned in STEP
         6 of section 3.3.1, then click 'OK' when you're done with it.
    
      8. Click 'Advanced', check 'Enable DNS for Windows Name Resolution'
         and 'Enable LMHOSTS lookup' if you're using a look up host file,
         similar to the one mentioned in STEP 10 of section 3.3.1
    
      9. Click 'OK' on all dialog boxes and restart system.
    
      10.
         Ping the linux box to test the network connection: 'File/Run',
         type: ping 192.168.1.1
         (This is only a LAN connection testing, you can't ping the outside
         world yet.)
    
      3.3.4.  Configuring UNIX Based Systems
    
      1. If you haven't installed your network card and recompile your
         kernel with the appropriate adapter driver, do so now.
    
      2. Install TCP/IP networking, such as the nettools package, if you
         don't have it already.
    
      3. Set IPADDR to 192.168.1.x (1 < x < 255), then set NETMASK to
         255.255.255.0, GATEWAY to 192.168.1.1, and BROADCAST to
         192.168.1.255
         For example, you can edit the /etc/sysconfig/network-scripts/ifcfg-
         eth0 file on a Red Hat Linux system, or simply do it through the
         Control Panel.
         (it's different in SunOS, BSDi, Slackware Linux, etc...)
    
      4. Add your domain name service (DNS) and domain search suffix in
         /etc/resolv.conf
    
      5. You may want to update your /etc/networks file depending on your
         settings.
    
      6. Restart the appropriate services, or simply restart your system.
    
      7. Issue a ping command: ping 192.168.1.1  to test the connection to
         your gateway machine.
         (This is only a LAN connection testing, you can't ping the outside
         world yet.)
    
      3.3.5.  Configuring DOS using NCSA Telnet package
    
      1. If you haven't installed your network card, do so now.
    
      2. Load the appropriate packet driver. For an NE2000 card, issue nwpd
         0x60 10 0x300, with your network card set to IRQ 10 and hardware
         address at 0x300
    
      3. Make a new directory, and then unpack the NCSA Telnet package:
         pkunzip tel2308b.zip
    
      4. Use a text editor to open the config.tel file
    
      5. Set myip=192.168.1.x (1 < x < 255), and netmask=255.255.255.0
    
      6. In this example, you should set hardware=packet, interrupt=10,
         ioaddr=60
    
      7. You should have at least one individual machine specification set
         as the gateway, i.e. the Linux host:
    
           name=default
           host=yourlinuxhostname
           hostip=192.168.1.1
           gateway=1
    
      8. Have another specification for a domain name service:
    
           name=dns.domain.com ; hostip=123.123.123.123; nameserver=1
    
      Note: substitute the appropriate information about the DNS that your
      Linux host uses
    
      9. Save your config.tel file
    
      10.
         Telnet to the linux box to test the network connection: telnet
         192.168.1.1
    
      3.3.6.  Configuring MacOS Based System Running MacTCP
    
      1. If you haven't installed the appropriate driver software for your
         Ethernet adapter, now would be a very good time to do so.
    
      2. Open the MacTCP control panel.  Select the appropriate network
         driver (Ethernet, NOT EtherTalk) and click on the 'More...' button.
    
      3. Under 'Obtain Address:', click 'Manually'.
    
      4. Under 'IP Address:', select class C from the popup menu. Ignore the
         rest of this section of the dialog box.
    
      5. Fill in the appropriate information under 'Domain Name Server
         Information:'.
    
      6. Under 'Gateway Address:', enter 192.168.1.1
    
      7. Click 'OK' to save the settings.  In the main window of the MacTCP
         control panel, enter the IP address of your Mac (192.168.1.x, 1 < x
         < 255) in the 'IP Address:' box.
    
      8. Close the MacTCP control panel.  If a dialog box pops up notifying
         you to do so, restart the system.
    
      9. You may optionally ping the Linux box to test the network
         connection.  If you have the freeware program MacTCP Watcher, click
         on the 'Ping' button, and enter the address of your Linux box
         (192.168.1.1) in the dialog box that pops up.  (This is only a LAN
         connection testing, you can't ping the outside world yet.)
    
      10.
         You can optionally create a Hosts file in your System Folder so
         that you can use the hostnames of the machines on your LAN.  The
         file should already exist in your System Folder, and should contain
         some (commented-out) sample entries which you can modify according
         to your needs.
    
      3.3.7.  Configuring MacOS Based System Running Open Transport
    
      1. If you haven't installed the appropriate driver software for your
         Ethernet adapter, now would be a very good time to do so.
    
      2. Open the TCP/IP Control Panel and choose 'User Mode ...' from the
         Edit menu. Make sure the user mode is set to at least 'Advanced'
         and click the 'OK' button.
    
      3. Choose 'Configurations...' from the File menu.  Select your
         'Default' configuration and click the 'Duplicate...' button.  Enter
         'IP Masq' (or something to let you know that this is a special
         configuration) in the 'Duplicate Configuration' dialog, it will
         probably say something like 'Deafault copy'.  Then click the 'OK'
         button, and the 'Make Active' button
    
      4. Select 'Ethernet' from the 'Connect via:' pop-up.
    
      5. Select the appropriate item from the 'Configure:' pop-up.  If you
         don't know which option to choose, you probably should re-select
         your 'Default' configuration and quit.  I use 'Manually'.
    
      6. Enter the IP address of your Mac (192.168.1.x, 1 < x < 255) in the
         'IP Address:' box.
    
      7. Enter 255.255.255.0 in the 'Subnet mask:' box.
    
      8. Enter 192.168.1.1 in the 'Router address:' box.
    
      9. Enter the IP addresses of your domain name servers in the 'Name
         server addr.:' box.
    
      10.
         Enter the name of your Internet domain (e.g. 'microsoft.com') in
         the 'Starting domain name' box under 'Implicit Search Path:'.
    
      11.
         The following procedures are optional.  Incorrect values may cause
         erratic behavior.  If your not sure, it's probably better to leave
         them blank, unchecked and/or un- selected.  Remove any information
         from those fields, if necessary.  As far as I know there is no way
         through the TCP/IP dialogs, to tell the system not to use a
         previously select alternate "Hosts" file.  If you know, I would be
         interested.
         Check the '802.3' if your network requires 802.3 frame types.
    
      12.
         Click the 'Options...' button to make sure that the TCP/IP is
         active.  I use the 'Load only when needed' option.  If you run and
         quit TCP/IP applications many times without rebooting your machine,
         you may find that unchecking the 'Load only when needed' option
         will prevent/reduce the effects on your machines memory management.
         With the item unchecked the TCP/IP protocol stacks are always
         loaded and available for use.  If checked, the TCP/IP stacks are
         automatically loaded when needed and un- loaded when not.  It's the
         loading and unloading process that can cause your machines memory
         to become fragmented.
    
      13.
         You may ping the Linux box to test the network connection.  If you
         have the freeware program MacTCP Watcher, click on the 'Ping'
         button, and enter the address of your Linux box (192.168.1.1) in
         the dialog box that pops up.  (This is only a LAN connection
         testing, you can't ping the outside world yet.)
    
      14.
         You can create a Hosts file in your System Folder so that you can
         use the hostnames of the machines on your LAN.  The file may or may
         not already exist in your System Folder.  If so, it should contain
         some (commented-out) sample entries which you can modify according
         to your needs.  If not, you can get a copy of the file from a
         system running MacTCP, or just create your own (it follows a subset
         of the Unix /etc/hosts file format, described on page 33 of RFC
         1035).  Once you've created the file, open the TCP/IP control
         panel, click on the 'Select Hosts File...' button, and open the
         Hosts file.
    
      15.
         Click the close box or choose 'Close' or 'Quit' from the File menu,
         and then click the 'Save' button to save the changes you have made.
    
      16.
         The changes take effect immediately, but rebooting the system won't
         hurt.
    
      3.3.8.  Configuring Novell network using DNS
    
      1. If you haven't installed the appropriate driver software for your
         Ethernet adapter, now would be a very good time to do so.
    
      2. Downloaded tcpip16.exe from
         
    
      3.
    
         edit c:\nwclient\startnet.bat
    
         SET NWLANGUAGE=ENGLISH
         LH LSL.COM
         LH KTC2000.COM
         LH IPXODI.COM
         LH tcpip
         LH VLM.EXE
         F:
    
      4.
    
         edit c:\nwclient\net.cfg
    
         Link Driver KTC2000
                 Protocol IPX 0 ETHERNET_802.3
                 Frame ETHERNET_802.3
                 Frame Ethernet_II
                 FRAME Ethernet_802.2
    
         NetWare DOS Requester
                    FIRST NETWORK DRIVE = F
                    USE DEFAULTS = OFF
                    VLM = CONN.VLM
                    VLM = IPXNCP.VLM
                    VLM = TRAN.VLM
                    VLM = SECURITY.VLM
                    VLM = NDS.VLM
                    VLM = BIND.VLM
                    VLM = NWP.VLM
                    VLM = FIO.VLM
                    VLM = GENERAL.VLM
                    VLM = REDIR.VLM
                    VLM = PRINT.VLM
                    VLM = NETX.VLM
    
         Link Support
                 Buffers 8 1500
                 MemPool 4096
    
         Protocol TCPIP
                 PATH SCRIPT     C:\NET\SCRIPT
                 PATH PROFILE    C:\NET\PROFILE
                 PATH LWP_CFG    C:\NET\HSTACC
                 PATH TCP_CFG    C:\NET\TCP
                 ip_address      xxx.xxx.xxx.xxx
                 ip_router       xxx.xxx.xxx.xxx
    
      5. and finally created
    
         c:\bin\resolv.cfg
    
         SEARCH DNS HOSTS SEQUENTIAL
         NAMESERVER 207.103.0.2
         NAMESERVER 207.103.11.9
    
      6. I hope this helps some people get their Novell Nets online, BTW
         this can be done using Netware 3.1x or 4.x
    
      3.3.9.  Configuring OS/2 Warp
    
      1. If you haven't installed the appropriate driver software for your
         Ethernet adapter, now would be a very good time to do so.
    
      2. Install the TCP/IP protocoll if you don't have it already.
    
      3. Go to Programms/TCP/IP (LAN) / TCP/IP Settings
    
      4. In 'Network' add your TCP/IP Address and set your Netmask
         (255.255.255.0)
    
      5. Under 'Routing' press 'Add'. Set the Type to 'default' and type the
         IP Address of your Linux Box in the Field 'Router Address'.
         (192.168.1.1).
    
      6. Set the same DNS (Nameserver) Address that your Linux host uses in
         'Hosts'.
    
      7. Close the TCP/IP control panel. Say yes to the following
         question(s).
    
      8. Reboot your system
    
      9. You may ping the Linux box to test the network configuration. Type
         packets are received all is ok.
    
      3.3.10.  Configuring Other Systems
    
      They should be following the same theory for setup.  Check the
      sections above.  If you're interested in writing about any of these
      systems, please send a detail setup instruction to
      ambrose@writeme.com.
    
      3.4.  Configuring IP Forwarding Policies
    
      At this point, you should have your kernel and other required packages
      installed, as well as your modules loaded. Also, the IP addresses,
      gateway, and DNS should be all set on the OTHER machines.
    
      Now, the only thing left to do is to use ipfwadm to forward
      appropriate packets to the appropriate machine:
    
           ** This can be accomplished in many different ways.  The
           following suggestions and examples worked for me, but you
           may have different ideas, please refer to section 4.4 and
           the ipfwadm manpages for more detail. **
    
           ipfwadm -F -p deny
           ipfwadm -F -a m -S yyy.yyy.yyy.yyy/x -D 0.0.0.0/0
    
      where x is one of the following numbers according to the class of your
      subnet, and yyy.yyy.yyy.yyy is your network address.
    
      netmask         | x  | Subnet
      ~~~~~~~~~~~~~~~~|~~~~|~~~~~~~~~~~~~~~
      255.0.0.0       | 8  | Class A
      255.255.0.0     | 16 | Class B
      255.255.255.0   | 24 | Class C
      255.255.255.255 | 32 | Point-to-point
    
      For example, if I'm on a class C subnet, I would have entered:
    
           ipfwadm -F -p deny
           ipfwadm -F -a m -S 192.168.1.0/24 -D 0.0.0.0/0
    
      Since bootp request packets comes without valid IP's once the client
      knows nothing about it, for people with a bootp server in the
      masquerade/firewall machine it is necessary to use the following
      before the deny command:
    
           ipfwadm -I -a accept -S 0/0 68 -D 0/0 67 -W bootp_clients_net_if_name -P udp
    
      You can also do it on a per machine basis.  For example, if I want
      192.168.1.2 and 192.168.1.8 to have access to the Internet, but not
      the other machines, I would have entered:
    
           ipfwadm -F -p deny
           ipfwadm -F -a m -S 192.168.1.2/32 -D 0.0.0.0/0
           ipfwadm -F -a m -S 192.168.1.8/32 -D 0.0.0.0/0
    
      Alternately, you can type the netmask instead of the value, e.g.
      192.168.1.0/255.255.255.0
    
      What appears to be a common mistake is to make the first command be
      this
    
      ipfwadm -F -p masquerade
    
      Do not make your default policy be masquerading - otherwise someone
      who can manipulate their routing will be able to tunnel straight back
      through your gateway, using it to masquerade their identity!
    
      Again, you can add these lines to the /etc/rc.local files, one of the
      rc files you prefer, or do it manually every time you need IP
      Masquerade.
    
      Please read section 4.4 for a detail guide on Ipfwadm
    
      3.5.  Testing IP Masquerade
    
      It's time to give it a try, after all these hard work. Make sure the
      connection of your Linux hosts to the Internet is okay.
    
      You can try browsing some 'INTERNET!!!' web sites on your OTHER
      machines, and see if you get it. I recommend using an IP address
      rather than a hostname on your first try, because your DNS setup may
      not be correct.
    
      For example, you can access the Linux Documentation Project site
      http://sunsite.unc.edu/mdw/linux.html with an entry of
      http://152.2.254.81/mdw/linux.html
    
      If you see that nice sailboat, then congratulations! It's working! You
      may then try one with hostname entry, and then telnet, ftp, Real
      Audio, True Speech, whatever supported by IP Masquerade.....
    
      So far, I have no trouble with the above settings, and it's full
      credit to the people who spend their time making this wonderful
      feature working.
    
      4.  Other IP Masquerade Issues and Software Support
    
      4.1.  Problems with IP Masquerade
    
      Some protocols will not currently work with masquerading because they
      either assume things about port numbers, or encode data in their data
      stream about addresses and ports - these latter protocols need
      specific proxies built into the masquerading code to make them work.
    
      4.2.  Incoming services
    
      Masquerading cannot handle incoming services at all.  There are a few
      ways of allowing them, but they are completely separate from
      masquerading, and are really part of standard firewall practice.
    
      If you do not require high levels of security then you can simply
      redirect ports.  There are various ways of doing this - I use a
      modified redir program (which I hope will be available from sunsite
      and mirrors soon). If you wish to have some level of authorisation on
      incoming connections then you can either use TCP wrappers or Xinetd on
      top of redir (0.7 or above) to allow only specific IP addresses
      through, or use some other tools.  The TIS Firewall Toolkit is a good
      place to look for tools and information.
    
      More details can be found at IP Masquerade Resource
      .
    
      4.3.  Supported Client Software and Other Setup Note
    
      ** The following list is not being maintained anymore.
      Please refer to this page  on
      applications that work thru Linux IP masquerading and IP
      Masquerade Resource  for more
      detail. **
    
      Generally, application that uses TCP and UDP should work.  If you have
      any suggestion, hints, or questions about applications with IP
      Masquerade, please visit this page on applications that work thru
      Linux IP masquerading  by Lee Nevo.
    
      4.3.1.  Clients that Work
    
      General Clients
    
         HTTP
            all supported platforms, surfing the web
    
         POP & SMTP
            all supported platforms, email client
    
         Telnet
            all supported platforms, remote session
    
         FTP
            all supported platforms, with ip_masq_ftp.o module (not all
            sites work with certain clients; e.g. some sites cannot be
            reached using ws_ftp32 but works with netscape)
    
         Archie
            all supported platforms, file searching client (not all archie
            clients are supported)
    
         NNTP (USENET)
            all supported platforms, USENET news client
    
         VRML
            Windows(possibly all supported platforms), virtual reality
            surfing
    
         traceroute
            mainly UNIX based platforms, some variations may not work
    
         ping
            all platforms, with ICMP patch
    
         anything based on IRC
            all supported platforms, with ip_masq_irc.o modules
    
         Gopher client
            all supported platforms
    
         WAIS client
            all supported platforms
    
      Multimedia Clients
    
         Real Audio Player
            Windows, network streaming audio, with ip_masq_raudio module
            loaded
    
         True Speech Player 1.1b
            Windows, network streaming audio
         Internet Wave Player
            Windows, network streaming audio
    
         Worlds Chat 0.9a
            Windows, Client-Server 3D chat program
    
         Alpha Worlds
            Windows, Client-Server 3D chat program
    
         Internet Phone 3.2
            Windows, Peer-to-peer audio communications, people can reach you
            only if you initiate the call, but people cannot call you
    
         Powwow
            Windows, Peer-to-peer Text audio whiteboard communications,
            people can reach you only if you initiate the call, but people
            cannot call you
    
         CU-SeeMe
            all supported platforms, with cuseeme modules loaded, please see
            IP Masquerade Resource  for detail
    
         VDOLive
            Windows, with vdolive patch
    
      Note: Some clients such as IPhone and Powwow may work even if you're
      not the one who initiate the call by using ipautofw package (refer to
      section 4.6)
    
      Other Clients
    
         NCSA Telnet 2.3.08
            DOS, a suite containing telnet, ftp, ping, etc.
    
         PC-anywhere for windows 2.0
            MS-Windows, Remotely controls a PC over TCP/IP, only work if it
            is a client but not a host
    
         Socket Watch
            uses ntp - network time protocol
    
         Linux net-acct package
            Linux, network administration-account package
    
      4.3.2.  Clients that do not Work
    
         Intel Internet Phone Beta 2
            Connects but voice travels one way (out) Traffic only
    
         Intel Streaming Media Viewer Beta 1
            Cannot connect to server
    
         Netscape CoolTalk
            Cannot connect to opposite side
    
         talk,ntalk
            will not work - requires a kernel proxy to be written.
    
         WebPhone
            Cannot work at present (it makes invalid assumptions about
            addresses).
    
         X  Untested, but I think it cannot work unless someone builds an X
            proxy, which is probably an external program to the masquerading
            code.  One way of making this work is to use ssh as the link and
            use the internal X proxy of that to make things work!
    
      4.3.3.  Platforms/OS Tested as on OTHER machines
    
      ?  Linux
    
      ?  Solaris
    
      ?  Windows 95
    
      ?  Windows NT (both workstation and server)
    
      ?  Windows For Workgroup 3.11 (with TCP/IP package)
    
      ?  Windows 3.1 (with Chameleon package)
    
      ?  Novel 4.01 Server
    
      ?  OS/2 (including Warp v3)
    
      ?  Macintosh OS (with MacTCP or Open Transport)
    
      ?  DOS (with NCSA Telnet package, DOS Trumpet works partially)
    
      ?  Amiga (with AmiTCP or AS225-stack)
    
      ?  VAX Stations 3520 and 3100 with UCX (TCP/IP stack for VMS)
    
      ?  Alpha/AXP with Linux/Redhat
    
      ?  SCO Openserver (v3.2.4.2 and 5)
    
      ?  IBM RS/6000 running AIX
    
      ?  (Anyone tried other platforms?)
    
      4.4.  IP Firewall Administration (ipfwadm)
    
      This section provides a more in-depth guide on using ipfwadm.
    
      This is a setup for a firewall/masquerade system behind a PPP link
      with a static PPP address follows. Trusted interface is 192.168.255.1,
      PPP interface has been changed to protect the guilty :).  I listed
      each incoming and outgoing interface individually to catch IP spoofing
      as well as stuffed routing and/or masquerading. Also anything not
      explicitly allowed is forbidden!
    
      #!/bin/sh
      #
      # /etc/rc.d/rc.firewall, define the firewall configuration, invoked from
      # rc.local.
      #
    
      PATH=/sbin:/bin:/usr/sbin:/usr/bin
    
      # testing, wait a bit then clear all firewall rules.
      # uncomment following lines if you want the firewall to automatically
      # disable after 10 minutes.
      # (sleep 600; \
      # ipfwadm -I -f; \
      # ipfwadm -I -p accept; \
      # ipfwadm -O -f; \
      # ipfwadm -O -p accept; \
      # ipfwadm -F -f; \
      # ipfwadm -F -p accept; \
      # ) &
    
      # Incoming, flush and set default policy of deny. Actually the default policy
      # is irrelevant because there is a catch all rule with deny and log.
      ipfwadm -I -f
      ipfwadm -I -p deny
      # local interface, local machines, going anywhere is valid
      ipfwadm -I -a accept -V 192.168.255.1 -S 192.168.0.0/16 -D 0.0.0.0/0
      # remote interface, claiming to be local machines, IP spoofing, get lost
      ipfwadm -I -a deny -V your.static.PPP.address -S 192.168.0.0/16 -D 0.0.0.0/0 -o
      # remote interface, any source, going to permanent PPP address is valid
      ipfwadm -I -a accept -V your.static.PPP.address -S 0.0.0.0/0 -D
      your.static.PPP.address/32
      # loopback interface is valid.
      ipfwadm -I -a accept -V 127.0.0.1 -S 0.0.0.0/0 -D 0.0.0.0/0
      # catch all rule, all other incoming is denied and logged. pity there is no
      # log option on the policy but this does the job instead.
      ipfwadm -I -a deny -S 0.0.0.0/0 -D 0.0.0.0/0 -o
    
      # Outgoing, flush and set default policy of deny. Actually the default policy
      # is irrelevant because there is a catch all rule with deny and log.
      ipfwadm -O -f
      ipfwadm -O -p deny
      # local interface, any source going to local net is valid
      ipfwadm -O -a accept -V 192.168.255.1 -S 0.0.0.0/0 -D 192.168.0.0/16
      # outgoing to local net on remote interface, stuffed routing, deny
      ipfwadm -O -a deny -V your.static.PPP.address -S 0.0.0.0/0 -D 192.168.0.0/16 -o
      # outgoing from local net on remote interface, stuffed masquerading, deny
      ipfwadm -O -a deny -V your.static.PPP.address -S 192.168.0.0/16 -D 0.0.0.0/0 -o
      # outgoing from local net on remote interface, stuffed masquerading, deny
      ipfwadm -O -a deny -V your.static.PPP.address -S 0.0.0.0/0 -D 192.168.0.0/16 -o
      # anything else outgoing on remote interface is valid
      ipfwadm -O -a accept -V your.static.PPP.address -S your.static.PPP.address/32 -D
      0.0.0.0/0
      # loopback interface is valid.
      ipfwadm -O -a accept -V 127.0.0.1 -S 0.0.0.0/0 -D 0.0.0.0/0
      # catch all rule, all other outgoing is denied and logged. pity there is no
      # log option on the policy but this does the job instead.
      ipfwadm -O -a deny -S 0.0.0.0/0 -D 0.0.0.0/0 -o
    
      # Forwarding, flush and set default policy of deny. Actually the default policy
      # is irrelevant because there is a catch all rule with deny and log.
      ipfwadm -F -f
      ipfwadm -F -p deny
      # Masquerade from local net on local interface to anywhere.
      ipfwadm -F -a masquerade -W ppp0 -S 192.168.0.0/16 -D 0.0.0.0/0
      # catch all rule, all other forwarding is denied and logged. pity there is no
      # log option on the policy but this does the job instead.
      ipfwadm -F -a deny -S 0.0.0.0/0 -D 0.0.0.0/0 -o
    
      You can block traffic to a particular site using the -I, -O or -F.
      Remember that the set of rules are scanned top to bottom and -a means
      "append" to the existing set of rules so any restrictions need to come
      before global rules. For example (and untested) :-
    
      Using -I rules. Probably the fastest but it only stops the local
      machines, the firewall itself can still access the "forbidden" site.
      Of course you might want to allow that combination.
    
      # reject and log local interface, local machines going to 204.50.10.13
      ipfwadm -I -a reject -V 192.168.255.1 -S 192.168.0.0/16 -D 204.50.10.13/32 -o
      # local interface, local machines, going anywhere is valid
      ipfwadm -I -a accept -V 192.168.255.1 -S 192.168.0.0/16 -D 0.0.0.0/0
    
      Using -O rules. Slowest because the packets go through masquerading
      first but this rule even stops the firewall accessing the forbidden
      site.
    
      # reject and log outgoing to 204.50.10.13
      ipfwadm -O -a reject -V your.static.PPP.address -S your.static.PPP.address/32 -D
      204.50.10.13/32 -o
      # anything else outgoing on remote interface is valid
      ipfwadm -O -a accept -V your.static.PPP.address -S your.static.PPP.address/32 -D
      0.0.0.0/0
    
      Using -F rules. Probably slower than -I and this still only stops
      masqueraded machines (i.e. internal), firewall can still get to
      forbidden site.
    
      # Reject and log from local net on PPP interface to 204.50.10.13.
      ipfwadm -F -a reject -W ppp0 -S 192.168.0.0/16 -D 204.50.10.13/32 -o
      # Masquerade from local net on local interface to anywhere.
      ipfwadm -F -a masquerade -W ppp0 -S 192.168.0.0/16 -D 0.0.0.0/0
    
      No need for a special rule to allow 192.168.0.0/16 to go to
      204.50.11.0, it is covered by the global rules.
    
      There is more than one way of coding the interfaces in the above
      rules.  For example instead of -V 192.168.255.1 you can code -W eth0,
      instead of -V your.static.PPP.address you can use -W ppp0. Personal
      choice and documentation more than anything.
    
      4.5.  IP Masquerade and Demand-Dial-Up
    
      1. If you would like to setup your network to automatically dial up
         the Internet, the diald demand dial-up package will be of great
         utility.
    
      2. To setup the diald, please check out the Setting Up Diald for Linux
         Page 
    
      3. Once diald and IP masq have been setup, you can go to any of the
         client machines and initiate a web, telnet or ftp session.
    
      4. Diald will detect the incoming request, then dial up your ISP and
         establish the connection.
    
      5. There is a timeout that will occur with the first connection.  This
         is inevitable if you are using analog modems.  The time taken to
         establish the modem link and the PPP connections will cause your
         client program to timeout.  This can be avoided if you are using an
         ISDN connection.  All you need to do is to terminate the current
         process on the client and restart it.
    
      4.6.  IPautofw Packet Fowarder
    
      IPautofw  is a
      generic forwarder of TCP and UDP for Linux masquerading.  Generally to
      utilize a package which requires UDP, a specific ip_masq module needs
      to be loaded; ip_masq_raudio, ip_masq_cuseeme, ...  Ipautofw acts in a
      more generic manner, it will forward any type of traffic including
      those which the application specific modules will not forward.  This
      may create a security hole if not administered correctly.
    
      5.  Miscellaneous
    
      5.1.  Getting Help
    
           ** Please TRY NOT TO send me email for IP Masquerade prob?
           lems or questions.  Due to personal work load, I cannot
           promise a reply for all non-website related questions.
           Please post your questions to the IP Masquerade mailing list
            instead
           (and I think this is the best source for help). Sorry about
           this, but I don't want to get you a reply after weeks.
    
      ?  IP Masquerade Resource page  should
         have enough information for setting up IP Masquerade
    
      ?  Joining IP masquerade mailing list (recommended)
         To subscribe, send a mail with subject "subscribe" (no quote) to
         masq-request@indyramp.com
         To unsubscribe, send a mail with subject "unsubscribe" (no quote)
         to masq-request@indyramp.com
         To get help on using the mailing list, send a mail with subject
         "archive help" or "archive dir" (no quote) to masq-
         request@indyramp.com
    
      ?  IP masquerade mailing list archive
          contains all the past messages
         sent to the mailing list.
    
      ?  This Linux IP Masquerade mini HOWTO
          for kernel 2.x (if
         you're using a 1.3.x or 2.x kernel)
    
      ?  IP Masquerade HOWTO for kernel 1.2.x
          if you're using
         an older kernel
    
      ?  IP masquerade FAQ 
         has some general information
    
      ?  X/OS Ipfwadm page  contains
         sources, binaries, documentation, and other information about the
         ipfwadm package
    
      ?  A page on applications that work thru Linux IP masquerading
          by Lee Nevo provides tips and tricks
         on getting applications to work with IP Masquerade.
    
      ?  LDP Network Administrator's Guide
          is a must for beginners trying
         to set up a network
    
      ?  Linux NET-2 HOWTO
          also has lots
         of useful information about Linux networking
    
      ?  Linux ISP Hookup HOWTO  and Linux PPP HOWTO
          gives you
         information on how to connect your Linux host to the Internet
    
      ?  Linux Ethernet-Howto  is a good source of information about setting up a LAN
         running ethernet
    
      ?  You may also be interested in Linux Firewalling and Proxy Server
         HOWTO 
    
      ?  Linux Kernel HOWTO  will guide you through the kernel compilation process
    
      ?  Other Linux HOWTOs  such as Kernel HOWTO
    
      ?  Posting to the USENET newsgroup: comp.os.linux.networking
    
      5.2.  Thanks to
    
      ?  Gabriel Beitler, gbeitler@aciscorp.com
         on providing section 3.3.8 (setting up Novel)
    
      ?  Ed Doolittle, dolittle@math.toronto.edu
         on suggestion to -V option in ipfwadm command for improved security
    
      ?  Matthew Driver, mdriver@cfmeu.asn.au
         on helping extensively on this HOWTO, and providing section 3.3.1
         (setting up Windows 95)
    
      ?  Ken Eves, ken@eves.com
         on the FAQ that provides invaluable information for this HOWTO
    
      ?  Ed. Lott, edlott@neosoft.com
         for a long list of tested system and software
      ?  Nigel Metheringham, Nigel.Metheringham@theplanet.net
         on contributing his version of IP Packet Filtering and IP
         Masquerading HOWTO, which make this HOWTO a better and technical
         in-depth document
         section 4.1, 4.2, and others
    
      ?  Keith Owens, kaos@ocs.com.au
         on providing an excellent guide on ipfwadm section 4.2
         on correction to ipfwadm -deny option which avoids a security hole,
         and clarified the status of ping over IP Masquerade
    
      ?  Rob Pelkey, rpelkey@abacus.bates.edu
         on providing section 3.3.6 and 3.3.7 (setting up MacTCP and Open
         Transport)
    
      ?  Harish Pillay, h.pillay@ieee.org
         on providing section 4.5 (dial-on-demand using diald)
    
      ?  Mark Purcell, purcell@rmcs.cranfield.ac.uk
         on providing section 4.6 (IPautofw)
    
      ?  Ueli Rutishauser, rutish@ibm.net
         on providing section 3.3.9 (setting up OS/2 Warp)
    
      ?  John B. (Brent) Williams, forerunner@mercury.net
         on providing section 3.3.7 (setting up Open Transport)
    
      ?  Enrique Pessoa Xavier, enrique@labma.ufrj.br
         on the bootp setup suggestion
    
      ?  developers of IP Masquerade for this great feature
    
           ?  Delian Delchev, delian@wfpa.acad.bg
    
           ?  Nigel Metheringham, Nigel.Metheringham@theplanet.net
    
           ?  Keith Owens, kaos@ocs.com.au
    
           ?  Jeanette Pauline Middelink, middelin@polyware.iaf.nl
    
           ?  David A. Ranch, trinity@value.net
    
           ?  Miquel van Smoorenburg, miquels@q.cistron.nl
    
           ?  Jos Vos, jos@xos.nl
    
           ?  And more who I may have failed to mention here (please
              let me know)
    
      ?  all users sending feedback and suggestion to the mailing list,
         especially the ones who reported errors in the document and the
         clients that are supported and not supported
    
      ?  I appologize if I have not included information that some fellow
         users sent me.  There are many suggestions and ideas sent to me,
         but I just do not have enough time to verify or I lost track of
         them.  I am trying my best to incorporate all the information sent
         to me into the HOWTO.  I thank you for the effort, and I hope you
         understand my situation.
    
      5.3.  Reference
    
      ?  IP masquerade FAQ by Ken Eves
    
      ?  IP masquerade mailing list archive by Indyramp Consulting
    
      ?  Ipfwadm page by X/OS
    
      ?  Various networking related Linux HOWTO
     
[목차]

Copyright © LEELAB.CO.KR. All rights reserved.