MASQD over PPP, but with 2 Valid IP's

Posted on 1998-01-29
Last Modified: 2010-03-18

I would like to set up a linux box with 2 valid ip's. the 1st ip would be for a network, and the 2nd would be routed to a Linux or NT Box( over a network card. Can this be done? Will Routing the 2nd ip to the linux/nt box conflict with the network?

here is a diagram:

            | ISP   |
      ISDN      []
            [](ppp0 with a valide class C IP)
      |Linux  Box  |
MASQ NIC  []      [] 2nd NIC With a valid Class C (eth1)      []
            |Linux or NT Masqd box|(

is this possible?


Question by:screen

Accepted Solution

sauron earned 100 total points
ID: 1587457
Yes, it's possible. I'm not clear on exactly what you want from your post, but you can set this sort of thing up. You can have a Linux box, with 2 NIC's, and for example give them and as addresses. You set the subnet mask for both to, and you can route between the two cards by simply enabling routing in the kernel. Then, you can add a ppp device, and use a valid class C from your ISP on this.

You then compile masquerading support into the kernel, and you use the firewalling rules to specify the masquerade policy, so you can specify that packets from the network are masqueraded, but packets from the network are not, or are blocked, or whatever you like.

This is all set up using ipfwadm rules. You'd probably also want dial on demand support, recent versions of pppd support this, but you might also want to look into diald, which can be found at

though it seems to be down at the moment.


Author Comment

ID: 1587458
yea But What about 2 valide class C's? What i need is 2 webservers (port 80), each on their 192.168.x.0 network. The Router would route(or in this case port forward) the 1st ip to, and the 2nd ip to

now ppp0 has 1 ip(in this case an ISDN line), howdo i "mount" the 2nd IP.

I think i can use IPFWADM to control which MASQD packet's goes to.


Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Exploits in Kali Linux 4 384
reserve ip address for mac address in ubuntu dhcp server 2 92
FTP output from Wireshak 6 98
route 2 traffic streams on single NIC 6 58
I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question