From: Vicente Arteaga [mailto:varteaga@competitiveness.com]
You can masquerade incoming packets to port 22 of your ISDN line, to your server.
Automaticaly, the server will get replies and send them back through the ISDN line.
Dear Vicente, thank you for your answer first. But what would I have to do to masquerade the connection? What would the commands for a SuSE 7.2 based system look like? The routing table looks like this right now: 1.2.3.4 0.0.0.0 255.255.255.255 UH 0 0 0 ippp0 (static IP) 1.2.3.5 0.0.0.0 255.255.255.255 UH 0 0 0 ippp0 (static IP - Gateway provider) 1.2.3.6 0.0.0.0 255.255.255.255 UH 0 0 0 ippp0 (static IP of outside server) 192.168.200.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0 0.0.0.0 192.168.200.240 0.0.0.0 UG 0 0 0 eth0 The iptables rules look like this right now: iptables -t nat -A POSTROUTING -s 192.168.200.0/24 -j MASQUERADE -o ippp0 (masquerade connections to the outside world) iptables -A INPUT -s ! 192.168.200.0/24 -p tcp --destination-port 110 -j REJECT (deny connections to POP from outside) iptables -A INPUT -s ! 192.168.200.0/24 -p tcp --destination-port 6000 -j REJECT (deny connections to XServer from outside) iptables -A INPUT -s 192.168.200.0/24 -p tcp --destination-port 111 -j ACCEPT (allow connections to NFS from inside) iptables -A INPUT -s 1.2.3.6 -p tcp --destination-port 111 -j ACCEPT (that's a server in the outside world that I connect via NFS) iptables -A INPUT -p tcp --destination-port 111 -j REJECT (allow outside world to connect NFS) Would adding the following rule be sufficient? iptables -t nat -A POSTROUTING -s ! 1.2.3.6 -j MASQUERADE -o eth0 Thanks in advance! Andreas -- /------------------------------------------\ | the linux-society Andreas Achtzehn| | visit us at www.linux-society.de| | or call (+49)179-4948706| \------------------------------------------/