On Thu, Oct 18, 2001 at 05:44:30PM -0500, johndmiller wrote:
> I am running coyote. I also have at&t broadband as an isp. AT&T, as
> far as I know, is still blocking port 80 (and probably will). I would
> like to allow web request to port 8080 and have coyote forward it to
> port 80 and send it to the serve, whose address is 192.168.0.4. I
> have the following line in the rc.masquerade script
>
> /sbin/ipmasqadm portfw -a -P tcp -L ${IPADDR} 8080 -R 192.168.0.4 80
>
> when I run ./rc.masquerade I get
> "portfw: illegal local.address/ port specified"
Is your ${IPADDR} actually populated with something? Additionally,
you're still using 2.2.x kernels? It's so much easier w/netfilter in
2.4.x.
#! /bin/sh
EXT_IP_ADDR=209.209.209.209
INT_WEBSVR=192.168.0.4
PATH=/sbin:/usr/sbin:/bin:/usr/bin
iptables -t nat -A PREROUTING -j DNAT -p tcp \
-d ${EXT_IP_ADDR} 8080 --to-destination ${INT_WEBSVR}:80
# EOF
Good luck!
--
Chad Walstrom <chewie at wookimus.net> | a.k.a. ^chewie
http://www.wookimus.net/ | s.k.a. gunnarr
Key fingerprint = B4AB D627 9CBD 687E 7A31 1950 0CC7 0B18 206C 5AFD
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 232 bytes
Desc: not available
Url : http://shadowknight.real-time.com/pipermail/tclug-list/attachments/20011019/c152db2e/attachment.pgp