[ale] IP Masquerading Question
Ty Connell
ty.connell at outweb.com
Thu Jan 24 13:53:56 EST 2002
I believe it works like this... I'm sure I'll be corrected if not.
As a packet arrives from your internal network to your linux box, it
determines if it is addressed for this machine (i.e. the linux box), another
internal machine on your subnet (which it ignores), or for some outside
machine(where it will do something with it). The software will rewrite the
packet placing the mac address of the gateway nic on the outgoing packet.
It also changes the port number on the packet and makes an internal note to
itself that when a packet comes back destined for that port, it is meant for
the internal machine.
When a packet comes back, it will be addressed to the gateway nic, but will
have a port number for a service that does not exist on that box. The
ipmasq stuff recognizes this and rewrites the packet, sending it to your
internal network.
-----Original Message-----
From: bkruger at mindspring.com [mailto:bkruger at mindspring.com]
To: ale at ale.org
Sent: Thursday, January 24, 2002 1:47 PM
To: ale at ale.org
Subject: [ale] IP Masquerading Question
I was looking at installing Knology cable in my house. One of their plans
requires that you send them the MAC address of the NIC to them for access.
If this is the case, will IP masquerading for a small subnet "spoof" the MAC
address for all outward packets to the MAC of the NIC attached to the cable
modem? I've looked over some of the docs for IP Masquerading, but have not
been able to confirm/deny this. It is probably right under my nose....
Regards - Bob Kruger
---
This message has been sent through the ALE general discussion list.
See http://www.ale.org/mailing-lists.shtml for more info. Problems should be
sent to listmaster at ale dot org.
---
This message has been sent through the ALE general discussion list.
See http://www.ale.org/mailing-lists.shtml for more info. Problems should be
sent to listmaster at ale dot org.
More information about the Ale
mailing list