if [ ${KERNEL_VERSION} < "2.4.x" ]; then
/bin/echo "1" > /proc/sys/net/ipv4/ip_forward
/bin/echo "1" > /proc/sys/net/ipv4/ip_dynaddr
/bin/echo "1" > /proc/sys/net/ipv4/ip_always_defrag
/bin/echo "1" > /proc/sys/net/ipv4/ip_masq_udp_dloose
/sbin/modprobe ip_masq_portfw
/sbin/modprobe ip_masq_autofw
/sbin/modprobe ip_masq_ftp
/sbin/modprobe ip_masq_irc
/sbin/modprobe ip_masq_raudio
for CHAIN in forward input output; do
${IPCHAINS} -F ${CHAIN}
done
${IPCHAINS} -P forward DENY
${IPCHAINS} -A forward -s ${NETWORK}/${NETMASK} -j MASQ
else
${IPTABLES} -F
${IPTABLES} -t nat -F
${IPTABLES} -t nat -A POSTROUTING -o ${WAN_IFACE} -j MASQUERADE
${IPTABLES} -A FORWARD -i ${LAN_IFACE} -j ACCEPT
/bin/echo "1" > /proc/sys/net/ipv4/ip_forward
/bin/echo "1" > /proc/sys/net/ipv4/ip_dynaddr
fi
Is this what you're looking for? Will require some tweaking on your part.
It's not graphical, and I call it rc.firewall, even though it's really just a simple ip masquerading setup. Hope this helps. If you really want a graphical tool, check out:
http://www.linux-firewall-tools.com/...all/index.html
-Bob