IP spoofing can also be used for a broader distributed DOS attack. And as pointed out, all of your services to the internal network are possibly invaded from the outside. With two cards, you can stop this and more completely stop internal services from being available to external devices via spoofing. -- Kirk Wood Cpt.Kirk at 1tree.net ------------------ Seek simplicity -- and distrust it. Alfred North Whitehead