diff --git a/docs/FAQ.xml b/docs/FAQ.xml index 83475f6c2..db6846f08 100644 --- a/docs/FAQ.xml +++ b/docs/FAQ.xml @@ -519,9 +519,14 @@ DNAT net net:66.249.93.111:993 tcp 80 - 2 eth0:#ZONE INTERFACE BROADCAST OPTIONS net eth0 detect routeback - And in /etc/shorewall/masq;#INTERFACE SOURCE ADDRESS PROTO PORT + /etc/shorewall/masq;#INTERFACE SOURCE ADDRESS PROTO PORT eth0:66.249.93.111 0.0.0.0/0 206.124.146.176 tcp 993 + and in + /etc/shorewall/shorewall.conf: + + IP_FORWARDING=On + Like the hack in FAQ 2, this one results in all forwarded connections looking to the server (66.249.93.11) as if they originated on your firewall (206.124.146.176). @@ -1139,7 +1144,7 @@ DNAT loc dmz:192.168.2.4 tcp 80 - The DNS settings on the local systems are wrong or the user is running a DNS server on the firewall and hasn't enabled UDP and TCP port 53 from the local net to the firewall or from the firewall to - the Internet. + the Internet.