[ale] Networking implementation question
Pete Hardie
pete.hardie at gmail.com
Sun Mar 11 13:30:08 EDT 2007
All,
With the arrival of my oldest's teen years, and the unfortunate
influences of classmates and such, I'm trying to set up a variety of
filtering and monitoring tools so that should something
untoward happen online, I can get advance notice, and so I can block
the more egregious content. However, I'm relatively unskilled as a
network admin, so I am having trouble finding the exact tutorials for
what I want.
Here's the plan:
I have wireless bridging to the kids' computer, and to my ReplayTV in
the bedroom. I have
wired connectivity in the office to my machine, the wife's machine,
another ReplayTV, and the
wireless bridge. I want to put a recycled linux box between the
wireless bridge and my DSL modem/router, so that I can run squid,
squid-proxy, and various monitoring tools on the traffic from the
kids' machine, with the ability to let the bedroom Replay get out to
the Internet unobstructed.
ASCII Art diagram:
currently:
ReplayTV2---wireless bridge 2********
*
My 'puter----DSL Router *
wife's 'puter---------| *
ReplayTV1----------| *
wireless bridge 1--|*********************
*
kid's machine---wireless bridge 3*****
where - and | are wired links, and * is wireless
desired:
ReplayTV2---wireless bridge 2***************
*
My 'puter----DSL Router *
wife's 'puter---------| *
ReplayTV1----------| *
proxy box------------| *
|---------------------------wireless bridge 1--|**
*
kid's machine---wireless bridge 3**************
with the proxy box having 2 NICs
What I can't determine is which of IP Masquerade, IP-forwarding,
ethernet bridging, and routing is necessary for me to achieve this.
Any suggestions appreciated!
TIA,
--
Pete Hardie
--------
Better Living Through Bitmaps
More information about the Ale
mailing list