[ale] IP Masquerading Question
James P. Kinney III
jkinney at localnetsolutions.com
Thu Jan 24 15:23:24 EST 2002
WOW! A broadband provider that still supports transparent bridging.
By providing the mac address, they use that to act as the login/password
to establish a connection to their router. NAT in iptables will work
through that connection. So will MASQ in ipchains. The entire header is
rewritten so it comes from the bax. There is a table that corresponds to
outgoing packets that is checked for incomming packets. If it is a reply
then the corr3ect header is used to replace the one sent by the remote
server and the packet is passed to the inside network.
So, no overhead with pppoe and NAT, just NAT overhead which appears to
be rather light with 3 machines behind my network.
On Thu, 2002-01-24 at 13:46, bkruger at mindspring.com wrote:
> I was looking at installing Knology cable in my house. One of their plans requires that you send them the MAC address of the NIC to them for access.
>
> If this is the case, will IP masquerading for a small subnet "spoof" the MAC address for all outward packets to the MAC of the NIC attached to the cable modem? I've looked over some of the docs for IP Masquerading, but have not been able to confirm/deny this. It is probably right under my nose....
>
> Regards - Bob Kruger
>
> ---
> This message has been sent through the ALE general discussion list.
> See http://www.ale.org/mailing-lists.shtml for more info. Problems should be
> sent to listmaster at ale dot org.
>
--
James P. Kinney III \Changing the mobile computing world/
President and COO \ one Linux user /
Local Net Solutions,LLC \ at a time. /
770-493-8244 \.___________________________./
GPG ID: 829C6CA7 James P. Kinney III (M.S. Physics)
<jkinney at localnetsolutions.com>
Fingerprint = 3C9E 6366 54FC A3FE BA4D 0659 6190 ADC3 829C 6CA7
This is a digitally signed message part
More information about the Ale
mailing list