How do I allow incoming UDP, such as CUseeMe or Battlenet through my masquerading firewall?
Ipchains will not allow remotely initiated udp transmissions to connect to internal hosts, for the main reason that it doesn’t know which internal host the connection is for. Thus, something called ‘port forwarding’ must come into play. Port forwarding works under the assumption that connections to a particular port are always destined to the same host, and automatically forwards all packets to a specified port on to a specified internal host. To use port forwarding, you must download and install ipmasqadm, or ipautofw, depending on your kernel level. Special kernel options must also be enabled during compilation in order to use port forwarding. See the man pages for the respective commands to find out which particular kernel parameters are. Below is listed the proper syntax for each of the port forwarding tools: Battlenet: IPTables: /sbin/iptables -t nat -A PREROUTING -p TCP –dport 6112 -j DNAT –to-destination 10.0.0.2:6112 /sbin/iptables -t nat -A PREROUTING -p TCP –dport 6112 -j
Ipchains will not allow remotely initiated udp transmissions to connect to internal hosts, for the main reason that it doesn’t know which internal host the connection is for. Thus, something called ‘port forwarding’ must come into play. Port forwarding works under the assumption that connections to a particular port are always destined to the same host, and automatically forwards all packets to a specified port on to a specified internal host. To use port forwarding, you must download and install ipmasqadm, or ipautofw, depending on your kernel level. Special kernel options must also be enabled during compilation in order to use port forwarding. See the man pages for the respective commands to find out which particular kernel parameters are. Below is listed the proper syntax for each of the port forwarding tools: Battlenet: IPTables: /sbin/iptables -t nat -A PREROUTING -p TCP –dport 6112 -j DNAT –to-destination 10.0.0.2:6112 /sbin/iptables -t nat -A PREROUTING -p TCP –dport 6112 -j