On 2008-03-03, kashani <[EMAIL PROTECTED]> wrote: > I'm not aware of any iptables front end that will also manager > policy based routing which is Cisco-ese and maybe general > Network-ese for what you're trying to do. However I would use > shorewall (or whatever you prefer) to do most of the work and > then insert your custom rules where they need to go.
AFAICT, I only need to add 1 iptable rule to mark outbound frames destined to particular ports. > All policy routing regardless of actual implementation has you > build an ACL of traffic you'd like messed with. Then you need > to specify what happens to traffic that matches the ACL. > However one thing the original how-to you linked left didn't > completely spell out is NAT. You MUST NAT on each interface or > you'll have all sorts of routing fun that does not work. I don't understand why I have to do NAT. Can you explain why? (Or point me to docs that explain why?) -- Grant Edwards grante Yow! at BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI-BI- visi.com -- gentoo-user@lists.gentoo.org mailing list