Chris Johnson wrote:
> to enable it. To make this happen automatically at >startup, make sure that
> FORWARD_IPV4=true is in /etc/sysconfig/network.
I set FORWARD_IPV4=yes because it was
FORWARD_IPV4=no (and zeit says it should be yes
too -- I guess all our memories get fuzzy from
time to time :)
After looking at an old version of the ipmasq
howto and a little playing around, I've come to
the conclusion that the switch should be -W eth1
as that is the interface where the masqueraded
packets should come in through. :) -V 192.168.1.1
would also work to ensure they come from the right
place.
It now looks like so
ipfwadm -F -p deny
ipfwadm -F -a m -S 192.168.1.2/24 -D 0.0.0.0/0 -W
eth1
ipfwadm -F -a m -S 192.168.1.7/24 -D 0.0.0.0/0 -W
eth1
And yes I did have another machine hiding that I
wanted to give access to but didn't mention
because I though it would just add to the
confusion.
So it looks like everything is cool now. Thanks
zeit and Chris. :)
~Kevin
:)
---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
For daily digest info, email [EMAIL PROTECTED]