On Thu, Oct 18, 2001 at 05:44:30PM -0500, johndmiller wrote:
> I am running coyote.  I also have at&t broadband as an isp.  AT&T, as
> far as I know, is still blocking port 80 (and probably will).  I would
> like to allow web request to port 8080 and have coyote forward it to
> port 80 and send it to the serve, whose address is 192.168.0.4.  I
> have the following line in the rc.masquerade script
> 
> /sbin/ipmasqadm portfw -a -P tcp -L ${IPADDR} 8080 -R 192.168.0.4 80
> 
> when I run ./rc.masquerade I get
> "portfw: illegal local.address/ port specified"

Is your ${IPADDR} actually populated with something?  Additionally,
you're still using 2.2.x kernels?  It's so much easier w/netfilter in
2.4.x.

    #! /bin/sh
    EXT_IP_ADDR=209.209.209.209
    INT_WEBSVR=192.168.0.4
    PATH=/sbin:/usr/sbin:/bin:/usr/bin
    iptables -t nat -A PREROUTING -j DNAT -p tcp \
        -d ${EXT_IP_ADDR} 8080 --to-destination ${INT_WEBSVR}:80
    # EOF

Good luck!

-- 
Chad Walstrom <chewie at wookimus.net>                 | a.k.a. ^chewie
http://www.wookimus.net/                            | s.k.a. gunnarr
Key fingerprint = B4AB D627 9CBD 687E 7A31  1950 0CC7 0B18 206C 5AFD

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 232 bytes
Desc: not available
Url : http://shadowknight.real-time.com/pipermail/tclug-list/attachments/20011019/c152db2e/attachment.pgp