On 2008-03-03, kashani <[EMAIL PROTECTED]> wrote:

> I'm not aware of any iptables front end that will also manager
> policy based routing which is Cisco-ese and maybe general
> Network-ese for what you're trying to do. However I would use
> shorewall (or whatever you prefer) to do most of the work and
> then insert your custom rules where they need to go.

AFAICT, I only need to add 1 iptable rule to mark outbound
frames destined to particular ports.

> All policy routing regardless of actual implementation has you
> build an ACL of traffic you'd like messed with. Then you need
> to specify what happens to traffic that matches the ACL.
> However one thing the original how-to you linked left didn't
> completely spell out is NAT. You MUST NAT on each interface or
> you'll have all sorts of routing fun that does not work.

I don't understand why I have to do NAT.  Can you explain why?
(Or point me to docs that explain why?)

-- 
Grant Edwards                   grante             Yow!
                                  at               
BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-
                               visi.com            

-- 
gentoo-user@lists.gentoo.org mailing list

Reply via email to