I have a three PC network, Linux (RH6.1), Win98, and NT40 (running
NAT32) connected to a cablemodem. I'm in the process of trying to
replace the NT box with Linux MASQ. I believe I have everything
installed and working but I think I have a config problem.
I now have the Linux PC (Toshiba Laptop with two PCMCIA NICs - one
connected to the cablemodem and the other to a 3COM hub) setup with
MASQ (I believe) connected to the hub on one NIC and my cablemodem
connected to the other. .
From the Linux MASQ PC I can ping the local PCs and I can ping any IP
or name on the internet. Netscape works ok out to the internet also.
From the MASQed PCs, I can ping the Linux NIC on the hub (local
network) and I can ping the Linux Nic attached to the cablemodem. I
cannot ping anything on the intenet, either IP or name from the MASQed
PCs.
cat /proc/sys/net/ipv4/ip_forward returns "1".
ifconfig returns:
eth0 Link encap:Ethernet HWaddr 00:80:C7:F1:5D:80
inet addr:24.64.128.226 Bcast:255.255.255.255
Mask:255.255.255.0
UP BROADCAST RUNNING MTU:1500 Metric:1
RX packets:944 errors:0 dropped:0 overruns:0 frame:0
TX packets:731 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:100
Interrupt:3 Base address:0x300
eth1 Link encap:Ethernet HWaddr 00:80:C7:E9:45:3D
inet addr:172.16.2.4 Bcast:172.16.2.255 Mask:255.255.255.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:1553 errors:0 dropped:0 overruns:0 frame:0
TX packets:122 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:100
Interrupt:5 Base address:0x310
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
UP LOOPBACK RUNNING MTU:3924 Metric:1
RX packets:22 errors:0 dropped:0 overruns:0 frame:0
TX packets:22 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
netstat -rn returns:
Kernel IP routing table
Destination Gateway Genmask Flags MSS Win irtt Iface
172.16.2.4 0.0.0.0 255.255.255.255 UH 0 0 0 eth1
172.16.2.0 0.0.0.0 255.255.255.0 U 0 0 0 eth1
24.64.128.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0
127.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 lo
0.0.0.0 24.64.128.1 0.0.0.0 UG 0 0 0 eth0
I'm using the basic rc.firewall from the HOW-TO and it looks like
this:
#!/bin/sh
#
# rc.firewall - Initial simple ip masq test for 2.2.X kernels
#
# Load all required IP MASQ modules
#
# NOTE: Only load the IP MASQ modules needed. All IP MASQ modules
# are shown below but are commented out from loading.
#
# Needed to initially load modules
#
/sbin/depmod -a
# Supports the proper masqu of FTP transfers using the PORT method
#
/sbin/modprobe ip_masq_ftp
#
# Supports the masq of RealAudio over UDP. Without this module,
# RealAudio will function but in TCP mode. This can cause a reduction
# in sound quality.
#
#/sbin/modprobe ip_masq_raudio
# Supports the masq of IRC DCC file transfers
#
#/sbin/modprobe ip_masq_irc
# Supports the masq of Quake and QuakeWorld by default. This is
# for multiple users behind the Linux MASQ server. For
# Quake I, II, and III, use the second example.
#
#Quake I / QuakeWorld (ports 26000 and 27000)
#/sbin/modprobe ip_masq_quake
#
#Quake I/II/III / QuakeWorld (ports 26000, 27000, 27910, 27960)
#/sbin/modprobe ip_masq_quake ports=26000,27000,27910,27960
# Supports the masq of the CuSeeme vidio conferencing software
#
#/sbin/modprobe ip_masq_vdolive
#CRITICAL: Enable IP forwarding since it is disabled by default since
#Redhat : You may try changing options in /etc/sysconfig/network from:
#FORWARD_IPV4=false
#to
#FORWARD_IPV4=true
#
echo "1" > /proc/sys/net/ipv4/ip_forward
#Dynamic IP users
#If you get your IP address dynamically from SLIP,PPP,or DHCP, enable
this following
#option. This enable dynamic-ip address hacking in IP MASQ, making
the life
#with Diald and similar probrams much easier.
echo "1" > /proc/sys/net/ipv4/ip_dynaddr
#MASQ timeouts
#
# 2 hrs timeout for TCP session timeouts
# 10 sec timeout for traffic after the TCP/IP "FIN" packet is received
# 160 sec timeout for UDP traffic (important for MASQ'ed ICQ users
#
/sbin/ipchains -M -S 7200 10 160
# DHCP For people who receive their IP address from either DHCP
# such as ADSL or CABLE MODEMS users.
#
/sbin/ipchains -A input -j ACCEPT -i eth1 -s 0/0 67 -d 0/0 68 -p udp
#
# Enable simple IP forwarding and Masq
#
/sbin/ipchains -P forward DENY
/sbin/ipchains -A forward -s 172.16.2.0/24 -j MASQ
I won't tell you how long I've been working on this laptop install of
RH 6.1 or how many books I've read and lists I've searched to reach
this point. Any help would be greatly appreciated.
Harry
take the backwards linux out of my email to reach me.