run iptables -t nat -A outbound -j RETURN ! -s 172.29.198.0/23
run iptables -t nat -A outbound -j RETURN -d 62.49.204.144/28
run iptables -t nat -A outbound -j RETURN -d 172.29.198.0/23
+
+## An awful hack.
+##run iptables -t nat -A outbound -j DNETMAP --reuse \
+## -s 172.29.199.44 --prefix 62.49.204.157
+##run iptables -t nat -A outbound -j DNETMAP --reuse \
+## -s 172.29.198.34 --prefix 62.49.204.157
+##run iptables -t nat -A outbound -j DNETMAP --reuse \
+## -s 172.29.198.11 --prefix 62.49.204.157
+##run iptables -t nat -A PREROUTING -j DNETMAP
+
run iptables -t nat -A outbound -j SNAT --to-source 62.49.204.158
run iptables -t nat -A POSTROUTING -j outbound
-## TCP MSS clamping to help given Demon's sluggish approach to fragmentation-
-## needed errors.
-run ip46tables -t mangle -A FORWARD -o ppp0 -p tcp --tcp-flags SYN,RST SYN \
- -j TCPMSS --clamp-mss-to-pmtu
-
## Set up NAT protocol helpers. In particular, SIP needs some special
## twiddling.
run modprobe nf_conntrack_sip \