Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

How do I set up a Mac to use IP masquerading?

Posted on 1999-07-19
2
Medium Priority
?
302 Views
Last Modified: 2013-12-27
I am not very familiar with Macs.  I have never set up a
Mac to live on an ethernet system of any sort.  And, I
have not yet et up my IP Masquerade system, but when I do
my system will look like:

Linux system set up as IP masquerade host with two ehternet
cards.  One to the cable modem.  One to the local network.

What will I have to do to tell a Mac (a G3 powerbook if
that matters) how to be an IP masquearding client?

Thanks,
  Ken
0
Comment
Question by:klopter
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 10

Accepted Solution

by:
rbr earned 400 total points
ID: 1542844
The Mac don^t have to know, that masquerading is switched on on your Linux PC. Give your MAC in the control panels TCP/IP a valid IP of your LAN and set the router IP to the IP of your Linux network card. (subnet mask should be 255.255.255.0 in general). This should be enough.
0
 

Author Comment

by:klopter
ID: 1542845
I won't be able to verify this for a while but it sounds
like it will work.

Ken

0

Featured Post

On Demand Webinar: Networking for the Cloud Era

Did you know SD-WANs can improve network connectivity? Check out this webinar to learn how an SD-WAN simplified, one-click tool can help you migrate and manage data in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Although the iPhone has become an incredibly popular device in the cellular industry, the complex technology and software coordination required between Apple and the wireless carriers have seemed to leave many iPhone owners with technical issues. …
Article by: Justin
In light of the WannaCry ransomware attack that affected millions of Windows machines, you might wonder if your Mac needs protecting. Yes, it does and here is how to do it.
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…

721 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question