Re: ipmasqadm
On Sun, 5 Dec 1999 23:38:48 -0800 (PST), Dave Wiard wrote:
>could somebody give me some pointers on how to use ipmasqadm? i don't
Use it e.g. to forward accesses to a port on your firewall to an internal
machine like this:
/usr/sbin/ipmasqadm portfw -a -P tcp -L $EXT_IP ssh -R $INT_HOST ssh
The above means: redirect accesses to machine $EXT_IP/port ssh to machine
$INT_HOST, port ssh.
>seem to have a man page for it and 'usage: ipmasqadm MODULE [opts] '
>doesn't help me much. i don't have a lot of experience with loadable
>modules and such.
There IS a man page for it:
# dpkg -S ipmasqadm
[...]
netbase: /usr/man/man8/ipmasqadm.8.gz
# dpkg -l netbase
[...]
ii netbase 3.12-2 Basic TCP/IP networking binaries
You can get basic help by invoking the following:
# ipmasqadm portfw -h
Usage: portfw -a -P PROTO -L LADDR LPORT -R RADDR RPORT [-p PREF] add entry
portfw -d -P PROTO -L LADDR LPORT [-R RADDR RPORT] delete
entry
portfw -f clear
table
portfw -l list table
portfw <args> -n no names
PROTO is the protocol, can be "tcp" or "udp"
LADDR is the local interface receiving packets to be forwarded.
LPORT is the port being redirected.
RADDR is the remote address.
RPORT is the port being redirected to.
PREF is the preference level (load balancing, default=10)
and
# ipmasqadm autofw
Usage:
ipautofw <command> <options>
Valid commands:
-A add new autoforward entry
-D delete an autoforward entry
-F flush the autoforward table
Valid options:
-r <type> <low> <high> forwarding on ports <low> to <high> using
protocol <type> (tcp or udp)
-h <host> IP address of host to receive forwarded
packets
-d <type> <low> <high> specifies a set of ports which will not use
the default high range (60000+) masquerade
port area
-p <type> <visible> <host>:<hidden>
set up port bouncing from visible host port
to masqueraded host <host> on port
<hidden>,
protocol <type> (currently not supported)
-c <type> <port> specifies a control port and protocol
-u Do _not_ require that a host connect within
15 seconds of triggering the control port
-i Insecure mode; any host many connect after
implied by not using the -c option or
implied
by using the -h option
once the control port has been triggered
-v Verbose mode
and also
# ipmasqadm mfw
Usage: mfw -A -m FWMARK -r RADDR RPORT [-p PREF] add entry
mfw -D -m FWMARK [-r RADDR RPORT] delete entry
mfw -E -m FWMARK [-r RADDR RPORT] edit entry
mfw -S -m FWMARK force scheduling
mfw -F clear table
mfw -L list table
mfw <args> -n no names
FWMARK is the fwmark being redirected.
RADDR is the remote address.
RPORT is the port being redirected to.
PREF is the preference level (load balancing, default=10)
There should also be some docs under /usr/doc/ipportfw.
HTH,
Ralf
--
Sign the EU petition against SPAM: L I N U X .~.
http://www.politik-digital.de/spam/ The Choice /V\
of a GNU /( )\
Generation ^^-^^
Reply to: