Hmmm - sollte gehn, nachdem, was ich bei Google gefunden habe.
Ev hilft dir das weiter (bin kein SuSE User):
Zitat:
iVisit benötigt die Ports 9943, 9945 und 56768. Diese müssen in der Firewall offen sein.
#------------------------------------------------------------------------------
# Optional package: PORTFW
#
# If you set OPT_PORTFW='yes', you can also edit opt/etc/portfw.sh
#------------------------------------------------------------------------------
OPT_PORTFW='yes' # install port forwarding tools/modules
PORTFW_N='3' # how many portforwardings to set up
PORTFW_1=' 9943 192.168.6.X udp'
PORTFW_2='9945 192.168.6.X udp'
PORTFW_3='56768 192.168.6.X udp'
|
http://cruise.de/a.sta/fli4l/howto-voice-over-ip.html
Zitat:
|
Also, if you are running "IP Masquerade" on the Linux box for Network Address Translation (NAT), then you should enable its "Loose UDP" option. This allows a single UDP port on the NAT to interact simultaneously with multiple remote end-points (horny little bugger), and is necessary for iVisit to work properly.
|
http://www.ivisit.com/bb/ubb/Forum1/HTML/002425.html
Nachdem SuSE 8.0 aber einen 2.4er Kernel hat und iptables verwendet, sollte das weuterhelfen:
Zitat:
It reverts the masq/nat handling of UDP packets back to the "old" way...
(all below assumes UDP throughout)
old way:
machine A (behind NAT firewall) sends UDP query from port X to port Y on
machine B (ISP's DNS server, for example).
Firewall (machine C) rewrites packet to be from C on port Z, and sends it
on.
Machine C will now send *any* packet from *any* source on to machine A port X,
so long as it's aimed at port Z on machine C, until the masq timeout is reached.
new way:
machine C is a little more careful about the source IP/port of returning
traffic that it directs back to machine A (IP must == machine B, source port
must == Y).
OK? To implement looseUDP, you just need to remove the matching of source
IP/port in the UDP de-NATting code. Should be fairly simple...
|
http://lists.netfilter.org/pipermail...ry/006960.html