Red Hat Linux 6.X as an Internet Gateway for a Home Network
 Paul Ramsey <[email protected]>

 June 22, 2000

 A simple tutorial on configuring Red Hat 6 and related variants to
 operate as an internet gateway to a small home or office network. Top�
 ics covered include masquerading, DNS, DHCP, and basic security.

 ______________________________________________________________________

 Table of Contents


 1. Introduction

    1.1 Versions
    1.2 Copyright

 2. Plugging Things In

    2.1 With a Hub
    2.2 Without a Hub
    2.3 With Only One Network Card

 3. Configuring Networking

    3.1 Configuring a Network Driver
       3.1.1 Two Identical Network Cards
    3.2 Configuring the Inside Network
       3.2.1 The Network Device
       3.2.2 The DHCP Server
       3.2.3 The Client Computers
       3.2.4 The DNS Server
       3.2.5 Testing the Inside Network
    3.3 Configuring the Outside Network
       3.3.1 With a Static IP
       3.3.2 With DHCP
       3.3.3 Quirks and Anomalies
          3.3.3.1 PPP Over Ethernet (PPPoE)
          3.3.3.2 Stupid DHCP Tricks
          3.3.3.3 Road Runner
       3.3.4 Looking at the Network Entries
    3.4 Security

 4. Configuring Masquerading

 5. Problems

    5.1 ICQ Does Not Work
    5.2 I Have Caldera 2.X Not Red Hat 6.X
    5.3 I Want One of My Internal Machines to be my Web Server


 ______________________________________________________________________

 1.  Introduction

 This page contains a simple cookbook for setting up Red Hat 6.X as an
 internet gateway for a home network or small office network. The
 instructions are very simplified: no special cases will be discussed,
 and some assumptions will be made about which network addresses are to
 be used. The most important assumptions are:



 �  You have a fulltime Cable or ADSL connection to the Internet.

 �  You can successfully install Red Hat 6.X on at least one of your
    computers. Note that these directions are also valid for Red Hat
    derivatives, such as Mandrake 6.X which is distributed by MacMillan
    Publishing under a variety of labels.

 �  Your Linux computer has two network cards installed in it and both
    are compatible with Linux.

 �  You have an ethernet hub if you are networking more than one
    computer or a cross-over cable if you are only networking one
    computer.

 �  You know how to edit text files on your Linux machine.

 �  You can log into your machine as root. You know how to install RPM
    packages from your Linux CDROM.

 If you do not meet any of these assumptions, then this document
 probably isn't for you.

 There is nothing special that you have to do during the installation
 process.  Simply choose an installation which makes sense for you and
 go for it. This document gives directions on installing everything to
 do with networking from scratch, to avoid making any assumptions about
 what was installed or configured during installation. To ensure that
 things work and there is no confusion about what information goes
 where, all the configuration will be done by directly editing the
 system configuration files rather than using the GUI configuration
 tools provided with Red Hat. On the one hand, this might be a little
 harder than it has to be; on the other hand, your knowledge will be a
 good deal more transferable to different distributions and situations
 (like, what if X doesn't work, or you are setting up a headless
 server).

 1.1.  Versions

 The latest version of this document should always be available at
 http://www.coastnet.com/~pramsey/linux/homenet.html for the HTML
 version and http://www.coastnet.com/~pramsey/linux/homenet.sgml for
 the SGML version.


 �  December 21, 1999 : First version.

 �  January 2, 2000 : Incorporated suggestions from John Mellor on
    outside networking quirks.

 �  January 22, 2000 : Minor update about identical network cards and
    info on IP aliasing from Chris Lea.

 �  March 16, 2000 : Some information on name server security and on
    supporting Caldera from Nelson Gibbs.

 �  June 22, 1000 : Red Hat 6.2 configuration quirk documented. More
    PPPoE info from Kerr First.

 1.2.  Copyright

 Copyright � 2000, Paul Ramsey.

 This manual may be reproduced in whole or in part, without fee,
 subject to the following restrictions:


 �  The copyright notice above and this permission notice must be
    preserved complete on all complete or partial copies.

 �  Any translation or derived work must be approved by the author in
    writing before distribution.

 �  If you distribute this work in part, instructions for obtaining the
    complete version of this manual must be included, and a means for
    obtaining a complete version provided.

 �  Small portions may be reproduced as illustrations for reviews or
    quotes in other works without this permission notice if proper
    citation is given.


 Exceptions to these rules may be granted for academic purposes: Write
 to the author and ask. These restrictions are here to protect us as
 authors, not to restrict you as learners and educators.

 2.  Plugging Things In

 Depending on whether you are using a hub or not, your network topology
 will differ slightly. I am only covering networking with RJ45 cabling
 (the stuff that looks like phone cables on steroids) and not covering
 thin coax.  With thin coax you can network multiple machines without
 requiring a hub, but have to be more careful about terminating
 connections and so on. If you know networking already, these
 instructions will be largely redundant.

 2.1.  With a Hub

 If you have a hub, your network will look like this
 <http://www.coastnet.com/~pramsey/linux/w_hub.gif>.

 Connect the eth0 card on the Linux box to the cable modem or ADSL box
 using the cable supplied by the service provider during their install
 (or one you know works in that configuration. This is important
 because sometimes cable modems like to be connected with a crossover
 and sometimes they like a straight-through through cable: the one the
 company gives you is the one you want to use.

 Connect the eth1 card on the Linux box to the hub with a straight-
 through cable. Connect all your other computers to the hub with
 straight-through cables.

 2.2.  Without a Hub

 If you do not have a hub, you can still connect one computer to your
 Linux box, using a crossover cable. Your topology will look like this
 <http://www.coastnet.com/~pramsey/linux/wo_hub.gif>.

 Connect the eth0 card on the Linux box to the cable modem or ADSL box
 using the cable supplied by the service provider. Connect the eth1
 card on the Linux box to the other computer with a crossover cable.

 2.3.  With Only One Network Card

 This is not a recommended configuration (in this configuration your
 internal and external networks are on the same physical network, and
 are therefor theoretically more susceptible to cracking; in reality,
 the risk is probably very low), but it can be done. Your mileage may
 vary.

 The Linux kernel includes support for "IP aliasing", which allows an
 ethernet card to service two different IP addresses simultaneously.
 The stock kernels shipped with Red Hat and Mandrake include support
 for IP aliasing by default.  To set up your gateway with only one
 ethernet card, in all the subsequent code examples, simply replace
 eth1 with eth0:0.

 In a single-card situation, running a DHCP server is not recommended.

 Plug all your machines and your cable modem or ADSL box into the hub.
 Cross your fingers and continue.

 3.  Configuring Networking

 OK, by now you have installed Linux on your gateway computer. You may
 have even configured one of your networking cards, and set up
 connectivity to the Internet. However, we are going to start from
 scratch and pretend that nothing is configured at all.

 Log in as root. All the instructions given in this document assume you
 are logged in as root.

 The Linux kernel refers to your two ethernet cards as eth0 and eth1,
 so that is how I'll be referring to them from now on too. The trouble
 is, which one is which? Here's a "simple" way of figuring out,
 guaranteed to work at least 50% of the time: lay your computer on the
 desk with the motherboard horizontal and the back panel facing you (as
 you would if you were going to open it and do some work on it). The
 leftmost card is eth0 -- you might want to label it with some masking
 tape. Now, write down on a piece of paper the make and model of both
 eth0 and eth1.

 OK, let's see if eth0 and eth1 are recognized automatically by the
 kernel.  Type ifconfig eth0 and ifconfig eth1. In both cases, if the
 kernel is recognizing your card, you should see something like this
 (bearing in mind that the numbers and whatnot will be different):


 eth0   Link encap: Ethernet   HWaddr 00:60:67:4A:02:0A
        inet addr:0.0.0.0  Bcast:0.0.0.0  Mask:255.255.255.255
        UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
        RX packets:466 errors:0 dropped:0 overruns:0 frame:0
        TX packets:448 errors:0 dropped:0 overruns:0 carrier:0
        collisions:85 txqueuelen:100
        Interrupt:10 Base address:0xe400



 If the kernel is not recognizing your network card you will see
 something like this:


 eth0: error fetching interface information: Device not found.



 3.1.  Configuring a Network Driver

 If both of your cards were found, skip to the next section. Otherwise,
 read this section.

 OK, so one or both of your cards are not recognized by the kernel.
 This is not a problem, really. What we're going to have to do is tell
 the kernel more explicitly how to find your cards. There are lots of
 twists and turns here, and I'm not going to cover all of them.
 Remember, when the going gets tough, the tough turn to the Ethernet
 HOWTO. Here's some summary advice:
 �  You have a PCI network card. You are probably sitting pretty,
    assuming it is not so new and cutting edge that no drivers exist.
    You can often find out a great deal about your network cards (and
    other things) by reading through /proc/pci and noting down makes
    and models.

 �  You have an ISA network card. It is possible you will have to know
    the IO base address and the IRQ the card is operating on. You have
    manuals, right?  Right? If not, this would be a good time to surf
    to the manufacturer's web site and see if they have any online
    references. Or if you have an old DOS configuration diskette, boot
    to DOS and see if there is a setup program which will read and set
    the address and IRQ.

 �  You have an ISA Plug'n'Play card. You'll have to learn how to
    configure it first -- read the Plug'n'Play HOWTO. Fortunately,
    oncee you've configured your card you will know exactly what the IO
    base and IRQ are.

 Now, since you know what the make and model of eth0 and eth1 are you
 can go to the compatibility page of the Ethernet HOWTO and look up
 your card. Take note of the recommended driver, and any information
 about special options your card may require. Write it down.

 It's time to edit a configuration file! The file we will be editing is
 /etc/conf.modules. Open this file up in the text editor of your
 choice. Because there are so many possibilities and combinations of
 things which can go in this file, I'm going to give my own gateway as
 an example. I have a PCI 10/100Mb card based on the VIA Rhine chip,
 and a plain-jane 10Mb NE2000 ISA clone. I use the 100Mb card for the
 internal network and the 10Mb card for the external connection. My
 /etc/conf.modules file looks like this:


 alias parport_lowlevel parport_pc
 alias eth0 ne
 options ne io=0x300 irq=10
 alias eth1 via-rhine



 My conf.modules file is laid out as follows:


 �  The first line is there to configure my parallel port for printing.
    You probably have a similar line. Leave it alone.

 �  The second line (alias eth0 ne) tells the kernel to use the ne
    driver for the eth0 device.

 �  The third line (options ne io=0x300 irq=10) tells the ne driver at
    which io address and irq interrupt it will find the ISA card at. If
    you have ISA cards you will probably have to use this kind of
    directive, just replace the driver, io and irq directives with the
    correct information for your card.

 �  The fourth line (alias eth1 via-rhine) tells the kernel to use the
    via-rhine driver for eth1. Because my eth1 card is a PCI card, I do
    not need to provide io or irq information: the PCI subsystem
    configures the device automatically.

 You will want to ensure that you have alias entries in conf.modules
 for both your cards, and correct options lines for all your ISA cards.
 You may already have lines in conf.modules for any ethernet cards you
 configured during installation.
 When you have finished editing conf.modules, try ifconfig eth0 and
 ifconfig eth1 again. You may have to apply some trial and error if you
 are messing with IO addresses and IRQs without a manufacturers manual.

 3.1.1.  Two Identical Network Cards

 So, you were really really smart, bought two identical network cards
 for your Linux gateway, and now you cannot get them to work together?
 Do not worry, getting them to coexist is just a matter of using the
 correct syntax in /etc/conf.modules.  For this example, the addresses
 and IRQ numbers are made up, and I will assume that you have bought a
 matched pair of NE2000 clones (a common choice). Your
 /etc/conf.modules file should look like this:


 alias eth0 ne
 alias eth1 ne
 options ne io=0x330,0x360 irq=7,9



 The addressing options are all given on the same line, and the first
 number for each addressing type is for eth0, the second number for
 eth1.

 3.2.  Configuring the Inside Network

 The "inside network" is the network which all your home/office
 machines will talk on. The "outside network" is the big scary internet
 on the other side of the Linux box. By and large, the inside network
 will be completely insulated from the outside network by the Linux
 box, which will operate as a medium strength firewall.

 3.2.1.  The Network Device

 Now that your drivers are working and you can see both eth0 and eth1
 in ifconfig it is time to set up the internal home network. I am
 assuming that you are going to put your internal network on eth1 and
 your external device on eth0.

 Your internal network is going to be a private network and will
 therefor be on a special network reserved for internal networking:
 192.168.1.0. This is a "private Class C network", in case you want to
 impress your friends.

 First we need to make sure networking is turned on. Edit the file
 /etc/sysconfig/network and make sure the following lines exist:


 NETWORKING=yes
 FORWARD_IPV4=yes



 The first line tells Linux that we want the network devices brought up
 at boot time. The second line tells Linux to enable IP forwarding.
 This is required when we start configuring masquerading in Section 4.

 Redhat 6.2 Note: In order to properly support IP forwarding and
 masquerading, Red Hat 6.2 requires changes to the /etc/sysctl.conf
 file. Make sure the following lines exist and are set to the correct
 values:


 net.ipv4.ip_forward = 1
 net.ipv4.ip_always_defrag = 1



 All the network interface settings for Red Hat and Red Hat derivatives
 are contained in files in the /etc/sysconfig/network-scripts
 directory. Enter that directory, and create a new file ifcfg-eth1. Put
 the following into the ifcfg-eth1 file:


 DEVICE=eth1
 IPADDR=192.168.1.1
 ONBOOT=yes



 This code tells the networking scripts to configure eth1 at boot time
 and to give it a particular IP address. Activate your network with the
 new settings with the following command: /etc/rc.d/init.d/network
 restart

 3.2.2.  The DHCP Server

 A DHCP server will automatically configure devices on your internal
 home network with IP addresses. This is very useful for people with
 laptops: they can simply plug their machines in and be immediately
 properly configured. If you do not want a DHCP server on your internal
 network, just skip to the next section.

 First you need to be sure you have the DHCP server installed. Mount
 your Linux CD and install the dhcp RPM. Now edit the /etc/dhcpd.conf
 file and put the following (and only the following) in it:


 subnet 192.168.1.0 netmask 255.255.255.0 {
   range 192.168.1.2 192.168.1.60;
   default-lease-time 86400;
   max-lease-time 86400;
   option routers 192.168.1.1;
   option ip-forwarding off;
   option broadcast-address 192.168.1.255;
   option subnet-mask 255.255.255.0;
 }



 If you are going to set up your Linux box as a caching domain name
 server, insert the following option:


 option domain-name-servers 192.168.1.1;



 If you know your outside DNS addresses and you are not going to use
 the Linux box for DNS, insert the following option, where x.x.x.x and
 y.y.y.y are IP numbers of the DNS servers:



 option domain-name-servers x.x.x.x, y.y.y.y;



 If you are going to run Samba file sharing on the Linux box for your
 Windows computers, add the following options to use the Linux box as
 the default WINS and browsing server:


 option netbios-name-servers 192.168.1.1;
 option netbios-dd-server 192.168.1.1;
 option netbios-node-type 8;
 option netbios-scope "";



 Configuring Samba and WINS is well beyond the scope of this document.
 If you need some pointers, start with the SMB HOWTO and go on from
 there.

 There are still a few more steps. Next, edit the
 /etc/rc.d/init.d/dhcpd file and look for the following line:


 /sbin/route add -host 255.255.255.255 dev eth1



 Windows DHCP clients require a particular broadcast address in DHCP
 responses, and this command forces the Linux TCP/IP stack to produce
 it. If you cannot find that line in the file, add it. If you do find a
 line like that one, make sure that the device it references is eth1.

 The next step is to alter the /etc/rc.d/init.d/dhcpd file to use eth1
 as the default device. Replace the line:


 daemon /usr/sbin/dhcpd



 With:


 daemon /usr/sbin/dhcpd eth1



 OK, now we are ready to start up DHCP. First start the DHCP server
 with the command: /etc/rc.d/init.d/dhcpd start.

 Finally, we have to make sure that the DHCP server will start at re-
 boot time. Some RPM packages of the DHCP server do not include
 directives to ensure the server starts every time, so we'll make sure
 it gets started by invoking the command chkconfig dhcpd on.

 This command causes RedHat to add the dhcp startup script to the
 various runlevel directories under /etc/rc.d. In runlevels 3 and 5
 (multiuser console and multiuser X) the DHCP server is started. In
 runlevels 0, 1 and 6 (shutdown, single user and reboot) the DHCP
 server is stopped.
 3.2.3.  The Client Computers

 If you have set DHCP up, configuring your client computers is very
 easy: just enable DHCP configuration. For Windows computers, this
 involves opening the "Control Panel" and then the "Networking" option.
 Find the "TCP/IP" protocol and opt to "Configure" it. Check the box
 that says to "Configure TCP/IP address automatically", apply your
 changes, and reboot.

 Before you reboot, you might want to type the following command: tail
 -f /var/log/messages. This will watch the Linux system log
 continuously. If all goes well, when you reboot your Windows computer,
 you will see it request an IP address and see the DHCP server respond.
 Control-C exits the tail -f command.

 If you have not set up DHCP, configuration is still fairly easy.
 Again, open the "Networking" option from the "Control Panel", and
 choose to configure the TCP/IP protocol. You can assign your client
 computers any address in the 192.168.1.0 network except 192.168.1.0
 (the network address), 192.168.1.255 (the broadcast address) or
 192.168.1.1 (your Linux server). Never give two computers the same IP
 address. Set the "Gateway" address to 192.168.1.1, so that outgoing
 traffic is routed through your Linux gateway.

 The IP Masquerading HOWTO has very detailed information on client
 configuration in the Configuration Section.

 In general, to configure a client computer, either enable DHCP
 configuration, or manually assign it an address in the 192.168.1.X
 network with a gateway of 192.168.1.1. Let the DNS server be either
 192.168.1.1 if you are running a caching DNS server (see below) or
 point the DNS at the addresses assigned by your network provider.

 3.2.4.  The DNS Server

 Setting up your Linux box as a caching DNS server will (slightly)
 improve your netsurfing speed, because commonly used DNS addresses
 will get cached inside your network and not have to be retrieved from
 the outside.

 If you are interesting in doing full blown DNS, there is a great deal
 of complexity to be learned. There is a DNS HOWTO available, and the
 book DNS and BIND is a good (and very comprehensive) paper reference.

 In order for your client machines to take advantage of the caching
 server, they must be configured to use the Linux gateway as their
 primary DNS server.  The DHCP directives given in section 3.2.2 are
 one way to accomplish this.  If you are configuring your client
 computers by hand, you can change the DNS configurations in the same
 control tabs you used to set the IP address of the machine.

 To install the DNS server, first install the bind RPM, then install
 the caching-nameserver RPM. At this point, you are almost ready.

 As installed, the caching server will work fine, but if you know the
 IP addresses of the internet providers DNS servers you can improve
 performance slightly by editing the /etc/named.conf file and adding
 the following line after the directory line (where x.x.x.x and y.y.y.y
 are the primary and secondary DNS servers):


 forwarders { x.x.x.x; y.y.y.y; };



 This change makes your DNS server first query the ISPs DNS servers
 before traversing the internet in search of a given address. The ISPs
 servers often have a rich cache of DNS information and can provide a
 much faster answer than your server could.

 The named daemon has had some security problems over the past 12
 months, so it is very important that you have the latest version
 running, and make some changes to the default settings to enhance
 security.


 1. Check your version of bind and make sure it is at least 8.2.2. Go
    to the Red Hat Updates or Mandrake Updates sites to check for the
    latest version.

 2. Restrict access to your name server to just the local network by
    adding the line allow-query { 192.168.1/24; 127.0.0.1/32; }; to the
    /etc/named.conf file after the forwarders line.

 3. Avoid running your name server as root. If your server is running
    as root, an exploit of the server will grant the exploiter root
    privledges. If you run the server as a powerless user, like nobody,
    you can lower the risk of a name server exploit. To run your name
    server as nobody, edit the /etc/rc.d/init.d/named file and change
    the line daemon named to daemon named -u nobody -g nobody.

 Make sure your DNS server will start at boot time: chkconfig named on.
 Again, this ensures that the server will start in the usual runlevels
 (3 and 5) at boot time.

 OK, now you can start your DNS server: /etc/rc.d/init.d/named start

 3.2.5.  Testing the Inside Network

 Until we configure the outside network, the DNS service will not work
 (since it has to communicate with other DNS servers on the internet),
 but we can test out the basic internal connectivity with the ping
 program.

 On one of your client computers, open up a terminal (MSDOS) window,
 and type ping 192.168.1.1. This will send out packets to your Linux
 computer at regular intervals, and your Linux computer will reflect
 the packets back. If things are working right, you should see a set of
 packet return times.

 3.3.  Configuring the Outside Network

 Now we're ready to configure the outside network. Sometimes this will
 be difficult, depending on how well your internet provider supports
 Linux. If you have difficulty, there is an ADSL mini-HOWTO which
 covers ADSL issues in some detail.  If I can find a Cable Modem HOWTO,
 I will link to it also.

 The main problem with most outside connections is getting an IP
 address.  Some internet providers hand out static IP addresses to
 cable or ADSL subscribers, and in that case configuration is easy.
 However, most providers have now moved to dynamic configuration via
 (you guessed it) DHCP. This means that your Linux computer will likely
 be a DHCP server on your eth1 interface, and a DHCP client on your
 eth0 interface.

 Additionally, many providers have taken to providing their services in
 specialized non-standard ways which assume their customers will be
 using Windows.  Some of those cases will be discussed at the end of
 section 3.3.2.

 3.3.1.  With a Static IP

 If your internet provider has assigned you a static IP address, you
 are sitting pretty. First, create a new interface configuration file,
 /etc/sysconfig/network-scripts/ifcfg-eth0 and put the following in it:


 DEVICE=eth0
 IPADDR=x.x.x.x
 NETMASK=y.y.y.y
 ONBOOT=yes



 Just fill in x.x.x.x and y.y.y.y with the values given by your
 internet provider. Now edit the /etc/resolv.conf file and enter the
 following information:


 search provider_domain_here
 nameserver n.n.n.n
 nameserver m.m.m.m



 The provider_domain should be supplied by your internet provider. Also
 enter the primary and secondary DNS servers in the n.n.n.n and m.m.m.m
 lines.  If you have set up the Linux box as a DNS server, you can add
 a line before the other nameserver entries: nameserver 127.0.0.1. This
 will make your Linux server use the caching server before asking the
 outside servers for DNS information.

 3.3.2.  With DHCP

 If your internet provider uses DHCP configuration, you need to create
 a new interface configuration file, /etc/sysconfig/network-
 scripts/ifcfg-eth0and put the following in it:


 DEVICE=eth0
 BOOTPROTO=dhcp
 ONBOOT=yes



 Now make sure that the dhcpcd client daemon is installed on your
 system.  Go to your Linux CD and install the dhcpcd RPM package.

 It's time to test your new network configuration. Just use the command
 /etc/rc.d/init.d/network restart. Now test your outside connection
 with ping.  Ping a computer on the internet, like www.yahoo.com and
 see if anything comes back.

 3.3.3.  Quirks and Anomalies

 Your situation may differ from the very simple situations described
 above.  Here are some short remarks on the various difficulties and
 links to more authoritative resources and addressing them. Thanks to
 John Mellor for supplying the links and impetus for adding this
 section.



 3.3.3.1.  PPP Over Ethernet (PPPoE)

 Several ADSL providers (Bell Atlantic, for example) are now insisting
 that their new customers connect to the service using the "PPP over
 Ethernet" protocol (PPPoE). To this end, they provide a Windows client
 program: not very useful for Linux users. Fortunately, PPPoE is a
 simple protocol and several efforts are underway to support it under
 Linux.


 �  The Roaring Penguin PPPoE Client comes highly recommended by reader
    Kerr First.

 �  PPPoE on Linux for Bell Sympatico

 �  PPPoE on Linux for Sympatico (General Info) (Linux Info)

 3.3.3.2.  Stupid DHCP Tricks

 One of the favorite tricks network providers play is to tie your
 service to a unique hostname, or even a unique network interface card.
 This is presumably to keep you from plugging multiple computers into
 your ethernet port using a hub (of course, by using Linux and
 Masquerading you're getting the same effect with better security and
 the cable company has no way of knowing!).

 If the provider has given you a hostname and insisted that you set
 your Windows box with that name in order you use their service, then
 you'll have to make sure that your Linux box sends in that hostname
 when requesting an address from the DHCP server.

 The Red Hat DHCP client is called when you set the BOOTPROTO to dhcp
 in the interface configuration file, but it is called without
 reference to a hostname.  To call the program with a hostname, in Red
 Hat 6.1, edit the /etc/sysconfig/network file, and change the line:

 HOSTNAME=

 To read this:

 HOSTNAME=your_isp_assigned_name

 This may not work in some of the Red Hat variants. If it does not
 work, check the /sbin/ifup script and see if the call to dhcpcd and
 pump include a -h $HOSTNAME switch. If they do not, add them, so the
 calls look like /sbin/dhcpcd -i $DEVICE -h $HOSTNAME and /sbin/pump -i
 $DEVICE -h $HOSTNAME.

 3.3.3.3.  Road Runner

 The Road Runner cable service has a special login process which must
 be run before the server can be used. Fortunately, a detailed Linux
 Road Runner HOWTO is available.

 3.3.4.  Looking at the Network Entries

 Now you can admire your work. Type ifconfig to see all your configured
 devices. On my gateway computer, it looks like this:



 eth0  Link encap:Ethernet  HWaddr 00:60:67:4A:02:0A
       inet addr:24.65.182.43  Bcast:24.65.182.255  Mask:255.255.255.0
       UP BROADCAST RUNNING MULTICAST  MTU:1500 Metric:1
       RX packets:487167 errors:0 dropped:0 overruns:0 frame:0
       TX packets:467064 errors:0 dropped:0 overruns:0 carrier:0
       collisions:89 txqueuelen:100
       Interrupt:10 Base address:0xe400
 eth1  Link encap:Ethernet  HWaddr 00:80:C8:D3:30:2C
       inet addr:192.168.1.1  Bcast:192.168.1.255  Mask:255.255.255.0
       UP BROADCAST RUNNING MULTICAST  MTU:1500 Metric:1
       RX packets:284112 errors:0 dropped:0 overruns:0 frame:1
       TX packets:311533 errors:0 dropped:0 overruns:0 carrier:0
       collisions:37938 txqueuelen:100
       Interrupt:5 Base address:0xe800
 lo    Link encap:Local Loopback
       inet addr:127.0.0.1  Mask:255.0.0.0
       UP LOOPBACK RUNNING  MTU:3924  Metric:1
       RX packets:12598 errors:0 dropped:0 overruns:0 frame:0
       TX packets:12598 errors:0 dropped:0 overruns:0 carrier:0
       collisions:0 txqueuelen:0



 Note that the eth0 interface has a fancy outside IP address, and the
 eth1 address has a private internal address.

 You can look at the network routes by typing the route command. On my
 gateway computer it looks like this:


   Kernel IP routing table
   Destination     Gateway      Genmask         Flags Metric Ref Use Iface
   255.255.255.255 *            255.255.255.255 UH    0      0     0 eth1
   192.168.1.0     *            255.255.255.0   U     0      0     0 eth1
   24.65.182.0     *            255.255.255.0   U     0      0     0 eth0
   127.0.0.0       *            255.0.0.0       U     0      0     0 lo
   default         24.65.182.1  0.0.0.0         UG    0      0     0 eth0



 Here we can see the outside network is set up, the inside network is
 set up, the local device is set up, the special 255.255.255.255
 broadcast address is set up, and the default route is set up to point
 to the internet providers gateway. Perfect!

 Now you have the outside, and the inside. All the remains is to open
 the door between the two. First though, we have to make sure no
 monsters can get in from the outside.

 3.4.  Security

 One of the drawbacks of being permanently connected to the internet
 via ADSL or cable is that your computer is exposed to potential
 security threats 24 hours a day, 7 days a week. Using Linux as a
 gateway reduces the risks, because it hides all your other computers:
 as far as the rest of the internet is concerned, only your Linux box
 is available for connections. This means that your network is only as
 secure as your Linux box, so at this point I'll give a few basic tips
 to make your box more secure.

 First, you need to shut out all the bad guys. To do this, edit the
 file /etc/hosts.deny and make sure it looks just like this:


 #
 # hosts.deny  This file describes the names of the hosts which are
 #             *not* allowed to use the local INET services, as decided
 #             by the '/usr/sbin/tcpd' server.
 #
 #            The portmap line is redundant, but it is left to remind you that
 #        the new secure portmap uses hosts.deny and hosts.allow. In particular
 #             you should know that NFS uses portmap!
 ALL: ALL



 This tells the "TCP wrappers" -- which control 95% of incoming
 connections -- to deny all connections from all hosts. That's a pretty
 good rule! But, it will also keep you from connecting to your Linux
 box from inside your home network, which is annoying, so we will make
 one exception.  Edit the file /etc/hosts.allow and make sure it looks
 just like this:


 #
 # hosts.allow  This file describes the names of the hosts which are
 #              allowed to use the local INET services, as decided
 #              by the '/usr/sbin/tcpd' server.
 #
 ALL: 127.0.0.1
 ALL: 192.168.1.



 This tells the "TCP wrappers" that they can allow connections to all
 services from the local device (127.0.0.1) and from your home network
 (192.168.1.).

 You have now locked the monsters outside, with a strong padlock. If
 you want to put up bars and alarm systems, you will have to be alot
 more sophisticated.  The Security HOWTO is a good place to start if
 you want to learn more about securing your Linux box.

 4.  Configuring Masquerading

 All right! The preliminaries are over, this is where the magic begins.
 IP masquerading is one of the truly magical services Linux provides.
 There are commercial products for Windows which do the same thing, but
 not nearly as efficiently: an ancient 386 can merrily provide IP
 masquerading services to a whole medium sized office, but cannot even
 run Windows 95, let alone the add on masquerading package. (As an
 addendum, I read in some recent reviews that Windows 2000 will support
 "connection sharing" without addon software. It looks like the
 companies which sold connection sharing software have been "embraced
 and extended" by MicroSoft. However, I wouldn't recommend you try the
 Windows 2000 solution on a 386.)

 Linux has an extremely versatile firewalling capability, and we are
 going to be using it in the simplest and crudest possible manner. If
 you want to learn how to do firewalling like an expert, you should
 read both the Firewalling HOWTO for an understanding of the theory and
 the IPChains HOWTO for instructions on the new ipchains firewalling
 tool which ships with the Linux 2.2.X kernel (and by extension Red Hat
 6.X).  There is also now a very good IP Masquerading HOWTO available
 which has more details on masquerading tweaks.

 Configuring simple masquerading is very very easy once your internal
 and external networking is operational. Edit the /etc/rc.d/rc.local
 file and add the following lines to the bottom:


 # 1) Flush the rule tables.
 /sbin/ipchains -F input
 /sbin/ipchains -F forward
 /sbin/ipchains -F output
 # 2) Set the MASQ timings and allow packets in for DHCP configuration.
 /sbin/ipchains -M -S 7200 10 60
 /sbin/ipchains -A input -j ACCEPT -i eth0 -s 0/0 68 -d 0/0 67 -p udp
 # 3) Deny all forwarding packets except those from local network.
 #    Masquerage those.
 /sbin/ipchains -P forward DENY
 /sbin/ipchains -A forward -s 192.168.1.0/24 -j MASQ
 # 4) Load forwarding modules for special services.
 /sbin/modprobe ip_masq_ftp
 /sbin/modprobe ip_masq_raudio



 The last two lines insert kernel modules which allow FTP and RealAudio
 to work for computers on the inside network. There are other modules
 for special services which you can tack on if you need them:


 �  CUSeeMe (/sbin/modprobe ip_masq_cuseeme)

 �  Internet Relay Chat (/sbin/modprobe ip_masq_irc)

 �  Quake (/sbin/modprobe ip_masq_quake)

 �  VDOLive (/sbin/modprobe ip_masq_vdolive)

 Now you're ready to try masquerading! Run the rc.local script with the
 command /etc/rc.d/rc.local and you are ready to go! Sit down at one of
 your other computers and try some web surfing. With any luck,
 everything is now hunky dory.

 5.  Problems

 There are lots and lots of things which can go wrong using a simple
 document like this, because there are plenty of special cases. The
 majority of possible problems adhere to the configuration of the
 internal and external network devices.  I will try and respond to
 people with problems, figure out what went wrong and add links down
 here so that people with special case problems can track down help.
 Feel free to contact me at [email protected].

 5.1.  ICQ Does Not Work

 Some portions of ICQ work fine over masquerading. Other portions do
 not work well at all. There is a beta quality ICQ module under
 development, however, which addresses some (but not all) of the
 deficiencies of running ICQ over masquerading. The README file in the
 source code distribution describes how to compile the module. Once you
 have it compiled and installed, invoke /sbin/modprobe ip_masq_icq.

 5.2.  I Have Caldera 2.X Not Red Hat 6.X

 Well, firstly congratulations for bucking the trend! Secondly, Nelson
 Gibbs ([email protected]) sends good news, because most of these
 instructions will work for you. There are some important changes to
 note however:


 1. A GATEWAY=xxx.xxx.xxx.xxx statement in /etc/sysconfig/network-
    scripts/ifcfg-eth0 & eth1 for the interface (local interface uses
    remote interface IP address and remote interface uses service
    provider's gateway IP).

 2. Make sure /etc/sysconfig/daemons/dhcpd script lists ROUTE_DEVICE as
    eth1 not eth0.

 3. /etc/dhcpd.conf requires a subnet statement for both interfaces
    (I'm not entirely sure why as I made my second statement : subnet
    216.102.154.201 netmask 255.255.255.255 { } with no other options
    and the DHCP server listens and sends on eth0 and eth1 as well as
    the fallback). The DHCP server errors out if only one subnet is
    listed.

 4. Do not add host route 255.255.255.255, the /etc/rc.d/init.d/dhcpd
    script Caldera uses already fixes the problem. DO make sure to
    change all references to eth0 in the script to eth1.

 5.3.  I Want One of My Internal Machines to be my Web Server

 Piece of cake! However, you need to have a static IP address for this
 easy set of directions to work. If you have a dynamic IP address, you
 will need some additional scripting to ensure that your IP address
 gets updated in the port forwarding commands when the address changes.

 Bear in mind, forwarding an external port to an inside machine makes
 your "internal" machine less "internal" than before, but it can be
 done very transparently and with little or no performance degredation.
 One of the side effects of the IP masquerading code in the Linux
 kernel is the ability to do some pretty funky stuff with packets as
 they hit the network layer, and the ipmasqadm utility is built to take
 advantage of that.

 For some reason ipmasqadm is not shipped with all the Red Hat and
 Mandrake variants, so will probably have to retrieve it from the
 maintainer's web site -- there is an RPM available there as well as
 source code.

 Once you have the RPM, install it, and then add the following lines to
 your /etc/rc.d/rc.local file:


 /usr/sbin/ipmasqadm portfw -f
 /usr/sbin/ipmasqadm portfw -a -P tcp -L x.x.x.x 80 -R 192.168.1.x 80



 The first command flushes the port forwarding rules and the second
 command adds a forward from port 80 on the external interface to port
 80 on the internal machine. Note that the external static IP address
 goes in the x.x.x.x space and the internal machine IP address goes in
 the 192.168.1.x space.

 Now external requests for port 80 will be transparently sent to port
 80 of the internal machine. Note that you cannot test this by
 telnetting or connecting to your gateway's port 80 from one of your
 inside machine: the port forwarder only honors requests coming in on
 the external interface.