On Thu, Oct 18, 2001 at 05:44:30PM -0500, johndmiller wrote: > I am running coyote. I also have at&t broadband as an isp. AT&T, as > far as I know, is still blocking port 80 (and probably will). I would > like to allow web request to port 8080 and have coyote forward it to > port 80 and send it to the serve, whose address is 192.168.0.4. I > have the following line in the rc.masquerade script > > /sbin/ipmasqadm portfw -a -P tcp -L ${IPADDR} 8080 -R 192.168.0.4 80 > > when I run ./rc.masquerade I get > "portfw: illegal local.address/ port specified" Is your ${IPADDR} actually populated with something? Additionally, you're still using 2.2.x kernels? It's so much easier w/netfilter in 2.4.x. #! /bin/sh EXT_IP_ADDR=209.209.209.209 INT_WEBSVR=192.168.0.4 PATH=/sbin:/usr/sbin:/bin:/usr/bin iptables -t nat -A PREROUTING -j DNAT -p tcp \ -d ${EXT_IP_ADDR} 8080 --to-destination ${INT_WEBSVR}:80 # EOF Good luck! -- Chad Walstrom <chewie at wookimus.net> | a.k.a. ^chewie http://www.wookimus.net/ | s.k.a. gunnarr Key fingerprint = B4AB D627 9CBD 687E 7A31 1950 0CC7 0B18 206C 5AFD -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 232 bytes Desc: not available Url : http://shadowknight.real-time.com/pipermail/tclug-list/attachments/20011019/c152db2e/attachment.pgp