[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: ipmasqadm



On Sun, 5 Dec 1999 23:38:48 -0800 (PST), Dave Wiard wrote:

>could somebody give me some pointers on how to use ipmasqadm?  i don't

Use it e.g. to forward accesses to a port on your firewall to an internal 
machine like this:

/usr/sbin/ipmasqadm portfw -a -P tcp -L $EXT_IP ssh -R $INT_HOST ssh

The above means: redirect accesses to machine $EXT_IP/port ssh to machine 
$INT_HOST, port ssh.

>seem to have a man page for it and 'usage: ipmasqadm MODULE [opts] '
>doesn't help me much.  i don't have a lot of experience with loadable
>modules and such.

There IS a man page for it:

# dpkg -S ipmasqadm   
[...]
netbase: /usr/man/man8/ipmasqadm.8.gz

# dpkg -l netbase
[...]
ii  netbase         3.12-2         Basic TCP/IP networking binaries


You can get basic help by invoking the following:

# ipmasqadm portfw -h
Usage: portfw -a -P PROTO -L LADDR LPORT -R RADDR RPORT [-p PREF] add entry
       portfw -d -P PROTO -L LADDR LPORT [-R RADDR RPORT]         delete 
entry
       portfw -f                                                  clear 
table
       portfw -l                                                  list table
       portfw <args> -n                                           no names

PROTO is the protocol, can be "tcp" or "udp"
LADDR is the local interface receiving packets to be forwarded.
LPORT is the port being redirected.
RADDR is the remote address.
RPORT is the port being redirected to.
PREF  is the preference level (load balancing, default=10)


and

# ipmasqadm autofw

Usage:
    ipautofw <command> <options>

Valid commands:
    -A                           add new autoforward entry
    -D                           delete an autoforward entry
    -F                           flush the autoforward table

Valid options:
    -r <type> <low> <high>       forwarding on ports <low> to <high> using
                                 protocol <type> (tcp or udp)

    -h <host>                    IP address of host to receive forwarded
                                 packets

    -d <type> <low> <high>       specifies a set of ports which will not use
                                 the default high range (60000+) masquerade
                                 port area

    -p <type> <visible> <host>:<hidden>
                                 set up port bouncing from visible host port
                                 to masqueraded host <host> on port 
<hidden>,
                                 protocol <type> (currently not supported)

    -c <type> <port>             specifies a control port and protocol

    -u                           Do _not_ require that a host connect within
                                 15 seconds of triggering the control port

    -i                           Insecure mode; any host many connect after
                                 implied by not using the -c option or 
implied
                                 by using the -h option
                                 once the control port has been triggered
    -v                           Verbose mode


and also

# ipmasqadm mfw        
Usage: mfw -A -m FWMARK -r RADDR RPORT [-p PREF] add entry
       mfw -D -m FWMARK [-r RADDR RPORT]         delete entry
       mfw -E -m FWMARK [-r RADDR RPORT]         edit entry
       mfw -S -m FWMARK                          force scheduling
       mfw -F                                    clear table
       mfw -L                                    list table
       mfw <args> -n                             no names

FWMARK is the fwmark being redirected.
RADDR is the remote address.
RPORT is the port being redirected to.
PREF  is the preference level (load balancing, default=10)


There should also be some docs under /usr/doc/ipportfw.

HTH,

Ralf


-- 
Sign the EU petition against SPAM:          L I N U X       .~.
http://www.politik-digital.de/spam/        The  Choice      /V\
                                            of a  GNU      /( )\
                                           Generation      ^^-^^



Reply to: