diff --git a/docs/FAQ.xml b/docs/FAQ.xml
index 83475f6c2..db6846f08 100644
--- a/docs/FAQ.xml
+++ b/docs/FAQ.xml
@@ -519,9 +519,14 @@ DNAT net net:66.249.93.111:993 tcp 80 - 2
eth0:#ZONE INTERFACE BROADCAST OPTIONS
net eth0 detect routeback
- And in /etc/shorewall/masq;#INTERFACE SOURCE ADDRESS PROTO PORT
+ /etc/shorewall/masq;#INTERFACE SOURCE ADDRESS PROTO PORT
eth0:66.249.93.111 0.0.0.0/0 206.124.146.176 tcp 993
+ and in
+ /etc/shorewall/shorewall.conf:
+
+ IP_FORWARDING=On
+
Like the hack in FAQ 2, this one results in all forwarded
connections looking to the server (66.249.93.11) as if they originated
on your firewall (206.124.146.176).
@@ -1139,7 +1144,7 @@ DNAT loc dmz:192.168.2.4 tcp 80 - The DNS settings on the local systems are wrong or the user is
running a DNS server on the firewall and hasn't enabled UDP and TCP
port 53 from the local net to the firewall or from the firewall to
- the Internet.
+ the Internet.