Hi,
The simplest masquerading you can have is just to forward everything - the only problem is that you have no firewall functionality active on the linux box unless you have some 'input' and 'output' rules and thats not really a good idea nowadays with all those script kiddies out there...
echo 1 > /proc/sys/net/ipv4/ip_forward
/sbin/ipchains -F forward
/sbin/ipchains -P forward DENY
/sbin/ipchains -A forward -i eth1 -s 172.16.16.0/24 -j MASQ
(where 'eth1' is an example of whatever your internet interface is called and '172.16.16.0/24' is an example of your internal lan address range. Another example would be '192.168.0.0/16'. )
The above does not mention protocol so would masquerade all tcp/udp traffic passing through the linux box out of the -i interface. See -->
.
Note, however, what it says in the DC faq :
" To make Direct Connect work properly with your NATing router, you must enter your routers WAN IP address in Direct Connect's "Force Direct Connect to report this IP address" text box, and check associated check box. "
IP masquerading is a form of source NAT (network address translation) whereby all the packets that leave the linux box appear to have originated from that same linux box (i.e. its' internet interface IP address). So you might have to try setting that 'WAN address' as mentioned above. It could be even more complicated if you go from linux to a DSL router or suchlike because that itself may use another layer of NAT. Anyway, try it out....
Regards