Here is the firewall that seems to be working. It was installed with the roaring penguin package.I will put the whole thing here as it is not to long....
=====================================
#!/bin/sh
#
# firewall-masq This script sets up firewall rules for a machine
# acting as a masquerading gateway
#
# Copyright (C) 2000 Roaring Penguin Software Inc. This software may
# be distributed under the terms of the GNU General Public License, version
# 2 or any later version.
# Interface to Internet
EXTIF=ppp+
ANY=0.0.0.0/0
ipchains -P input ACCEPT
ipchains -P output ACCEPT
ipchains -P forward DENY
ipchains -F forward
ipchains -F input
ipchains -F output
# Deny TCP and UDP packets to privileged ports
ipchains -A input -l -i $EXTIF -d $ANY 0:1023 -p udp -j DENY
ipchains -A input -l -i $EXTIF -d $ANY 0:1023 -p tcp -j DENY
# Do masquerading
ipchains -A forward -j MASQ
echo 1 > /proc/sys/net/ipv4/ip_forward
# Mandrake-Security : if you remove this comment, remove the next line too.
echo 1 > /proc/sys/net/ipv4/conf/all/rp_filter
===================================
Here is piece of another script that I have been trying to get working
=================================
#!/bin/sh
#
# IPCHAINS-FIREWALL V1.8.0
#
# -------------------------------------------------- Ipchains Firewall Script -
#
# Original script by Ian Hall-Beyer (manuka@nerdherd.net)
#
# Contributors:
# terminus (cpm@dotquad.com) (ICQ & DHCP, @home testing)
# djv (djv@hotmail.com) Additions from other strong rulesets, for
# Linuxnewbie.org, modified on 28 Feb 00.
# ---------------------------------------------------------------- Interfaces -
# Local Interface
# This is the interface that is your link to the world
LOCALIF="ppp+"
# ------------------------------------------------------- Variable definition -
#
# Set the location of ipchains.
IPCHAINS="/sbin/ipchains"
# You shouldn't need to change anything in the rest of this section
LOCALIP=`ifconfig $LOCALIF | grep inet | cut -d : -f 2 | cut -d \ -f 1`
LOCALMASK=`ifconfig $LOCALIF | grep Mask | cut -d : -f 4`
LOCALNET="$LOCALIP/$LOCALMASK"
echo "------------------------------------"
echo "Setting up Mack-Daddy firewall on:"
echo "IP ($LOCALIF): $LOCALNET"
echo "------------------------------------"
REMOTENET="0/0"
# -------------------------------------- Flush everything, start from scratch -
echo -n "Flushing rulesets.."
# Incoming packets from the outside network
$IPCHAINS -F input
echo -n "."
# Outgoing packets from the internal network
$IPCHAINS -F output
echo -n "."
echo "Done!"
# ----------------------------------------------------------- Prevent Spoofs -
echo -n "Spoof protection.."
# Set up variables to make life easier
LOOPBACK="127.0.0.0/8" # reserved loopback address range
CLASS_A="10.0.0.0/8" # class A private networks
CLASS_B="172.16.0.0/12" # class B private networks
CLASS_C="192.168.0.0/16" # class C private networks
CLASS_D_MULTICAST="224.0.0.0/4" # class D multicast addresses
CLASS_E_RESERVED_NET="240.0.0.0/5" # class E reserved addresses
BROADCAST_SRC="0.0.0.0" # broadcast source address
BROADCAST_DEST="255.255.255.255" # broadcast destination address
# Refuse spoofed packets.
# Ignore blatantly illegal source addresses.
# Protect yourself from sending to bad addresses.
# Refuse spoofed packets pretending to be from the external address.
$IPCHAINS -A input -i $LOCALIF -s $LOCALIP -j DENY -l
echo -n "."
# Refuse packets claiming to be from a Class A private network
$IPCHAINS -A input -i $LOCALIF -s $CLASS_A -j DENY
$IPCHAINS -A input -i $LOCALIF -d $CLASS_A -j DENY
echo -n "."
================================
Thanks for any help that can be offered... I still can't get ktail to work

.....