Skip to Content
Linux® Routing
book

Linux® Routing

by Joe Brockmeier, Dee-Ann LeBlanc, Ron McCarty
October 2001
Intermediate to advanced
350 pages
8h 42m
English
Sams
Content preview from Linux® Routing

IP Masquerading

In many cases, you’ll want to use a router to perform IP Masquerading. Typically IP Masquerading is used to connect a private network with “illegal” IP addresses to the outside world. This is particularly true when your location only has one public IP address through a dial-up line, DSL, cable modem, or whatever.

All of the traffic from one or more computers routed through a machine with a direct interface to the Net appears to come solely through that machine. The practical upshot of this, of course, is that a number of computers can share one connection to the Internet. This is cheaper and causes less of a security risk. Assume you have a computer behind your router/firewall with all of your credit card numbers and Aunt Grizzelda’s ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Make: Technology on Your Time Volume 10

Make: Technology on Your Time Volume 10

Mark Frauenfelder
What Employees Want Most in Uncertain Times

What Employees Want Most in Uncertain Times

Kristine W. Powers, Jessica B.B. Diaz

Publisher Resources

ISBN: 1578702674Purchase book