NAT Loopback Routers
From OpenSimulator
Line 56: | Line 56: | ||
--[[User:Hell Fire|Hell Fire]] | --[[User:Hell Fire|Hell Fire]] | ||
+ | |||
+ | If you use openWRT firmware on your router, check here: [[Users:Thomax:nat-loopback | OpenWRT NAT Loopback]] |
Revision as of 13:29, 18 July 2009
This page show a list of routers supporting NAT Loopback feature in order to be able to TP in your region when you host it at home on the same computer or local network. Please, feel free to contribute such a list especially if these routers are cheap :D
"D-Link DGL-4xxx series of routers have the largest available nat table of any router on the market"
"These routers range from 70$-180$ USD depending on where you live and purchase from."
- D-Link DGL-4500 : http://games.dlink.com/products/?pid=643
- D-Link DGL-4300 : http://games.dlink.com/products/?pid=370
- D-Link DGL-4100 : http://games.dlink.com/products/?pid=371
Other routers
- Linksys WRT54G : http://en.wikipedia.org/wiki/Linksys_WRT54G_series
- Arris TM502b : http://portforward.com/english/routers/port_forwarding/Arris/TM502b/
- NetGear WGR614 : has been confirmed to work out of the box
(note: NetGear WGR614 does not work with ISP required gateway modems)
Routers that users has experienced problems with
- Belkin F5D7230-4
(the router might work if 3rd party firmware is used, such as DD-WRT : http://www.dd-wrt.com/ )
For Linux based Netfilter (iptables) routers, you want to set up the NAT table with some extra entries The following script is something to get you started, you'll need to fix up the variables at the top to match your system and network.
#!/bin/bash # # vvvvv - Fix these! - vvvvv IPTABLES=/usr/sbin/iptables LAN_NETWORK=192.168.0.0/24 SERVER_IP=192.168.0.2 INTERNET_IP=100.100.100.100 REMOTING_PORT=8895 REGION_PORT=9000 # ^^^^^ - Fix these! - ^^^^^ # First, the Destination NAT, anything going to the external address on our ports, we redirect to the server # Note, if you have a double NAT running and this router doesn't actually have the internet IP address, you'll # need another set of PREROUTING-DNAT lines with the --destination (-d) set to the internet facing private address $IPTABLES -t nat -I PREROUTING -d $INTERNET_IP -p tcp --dport $REMOTING_PORT --jump DNAT --to-destination $SERVER_IP $IPTABLES -t nat -I PREROUTING -d $INTERNET_IP -p udp --dport $REGION_PORT --jump DNAT --to-destination $SERVER_IP $IPTABLES -t nat -I PREROUTING -d $INTERNET_IP -p tcp --dport $REGION_PORT --jump DNAT --to-destination $SERVER_IP # Second, the Source NAT, we need this so that returning packets to our LAN clients go back through the router first, # otherwise, the server will try to talk directly to the client and the client will reject them $IPTABLES -t nat -I POSTROUTING -s $LAN_NETWORK -d $SERVER_IP -p tcp --dport $REMOTING_PORT --jump SNAT --to-source $INTERNET_IP $IPTABLES -t nat -I POSTROUTING -s $LAN_NETWORK -d $SERVER_IP -p udp --dport $REGION_PORT --jump SNAT --to-source $INTERNET_IP $IPTABLES -t nat -I POSTROUTING -s $LAN_NETWORK -d $SERVER_IP -p tcp --dport $REGION_PORT --jump SNAT --to-source $INTERNET_IP
If you use openWRT firmware on your router, check here: OpenWRT NAT Loopback