Solved

Mimic Internet Connection Sharing

Posted on 2000-04-05
4
208 Views
Last Modified: 2013-12-15
I've got an in-home network that is set up to share a cable modem connection using Windows 98 Internet Connection Sharing.  This service acts as a DHCP server, DNS passthrough, proxy server, and firewall for my internal network.

I want to emulate this in Linux.

I've read up on IP Masquerading, but I don't know if this is an adequate service.

Here is my question:
What services do I need to run (or download, install and run) to perform the same features as the W98 ICS?  I want to be able to add more clients to the internal network later, and if I can ge DHCP to do the network setup it would be TONS easier.

I'm not certian if ICS just passes through the DNS request to the DNS server or if it performs the DNS request for the client and translates in the proxy.

Thanks!
Hatton
0
Comment
Question by:kc5sig
  • 2
  • 2
4 Comments
 
LVL 40

Accepted Solution

by:
jlevie earned 100 total points
ID: 2688350
You can do the same thing that win98 does with it Internet Connection sharing, but it's not "one stop shopping". IP Masquerade will take care of firewalling and allowing the inside hosts to access the Internet from your "private inside network". You can set up a cacheing DNS and a DHCP server for the other features. The howtos (http://howto.tucows.com/howto.html) cover these farily well.
0
 
LVL 2

Author Comment

by:kc5sig
ID: 2688388
There is a Mini-Howto in that list that covers it *EXACTLY* how I wanted it!!!  If you're looking for this, then look for the Mini-Howto entitled "Red Hat Linux 6.X as an Internet Gateway for a Home Network", that covers the setup to a 'T'.

Thanks!
Hatton
0
 
LVL 2

Author Comment

by:kc5sig
ID: 2688395
0
 
LVL 40

Expert Comment

by:jlevie
ID: 2688736
The ipchains howto, though a bit more technical is also good to read.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This is the error message I got (CODE) Error caused by incompatible libmp3lame 3.98-2 with ffmpeg I've googled this error message and found out sometimes it attaches this note "can be treated with downgrade libmp3lame to version 3.97 or 3.98" …
Google Drive is extremely cheap offsite storage, and it's even possible to get extra storage for free for two years.  You can use the free account 15GB, and if you have an Android device..when you install Google Drive for the first time it will give…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question