First: Sorry for the long post, but thought it might shed some light.
Second: Not sure we've got all the addresses we need and that some numbers haven't been transposed. Of course, if they ARE correct, whoever is engineering for @Home in this area should be taken out and flogged publicly.
<< I thought that you were talkin about that 3com router/gateway that takes the IP you have and makes several new ones... But if thats not the case then i have already tried that and the problem is that me being the Avid gamer like to play games on my LAN so one IP would not do the Job. >>
I usually approach my designs by thinking long and hard about this: public v. private (or internal v. external). This design approach is dependent not only on a network's physical layout, but PRIMARILY on the logical layout (especially when dealing with VLANs and QOS)
Think about your LAN like this:
Here is how your LAN is connected PHYSICALLY to the Internet:
public
======= INTERNET
=======
======= @home backbone 24.112.196.1?
=======
======= cable modem ?
=======
######## hub
########
######## Machine 1 24.112.169.119
######## Machine 2 24.112.198.38
######## Machine 3 ?
private
The "="s indicate what should be public space. The "#"s indicate what should be private space.
At first glance, since all your machines are on the same hub, it would make sense that any traffic between them would stay within the hub (private demarc point).
But LOGICALLY, your LAN is connected like this:
public
======= INTERNET
=======
===#### @home backbone 24.112.196.1?
===####
===#### cable modem ?
===####
######## hub
########
######## Machine 1 24.112.169.119
######## Machine 2 24.112.198.38
######## Machine 3 ?
private
OVERLAP LIKE THIS IS B-A-D
Essentially, EVERYTHING that you WANT to be treated as private traffic (ie: not traversing into public space) is in fact travelling like a mofo through public space. In effect, everything on your LAN is being publicicized (advertised on the Web). That means ALL YOUR LAN (ARE BELONG TO US...sorry, couldn't resist) traffic is being advertised on the Web, where it can easily be packet-sniffed, eavesdropped, logged, etc.
Ideally, you want to separate what traffic should be kept private from what traffic should be made public. To accomplish this, here is how your LAN should be connected both PHYSICALLY and LOGICALLY:
public
======= INTERNET
=======
======= @home backbone 24.112.196.1?
=======
======= cable modem ?
=======
===#### ROUTER 24.112.169?.119
########
######## hub
########
######## Machine 1
######## Machine 2 10.0.0.0 or other
######## Machine 3 private addressing
private
**Overlap like this is GOOD, since it occurs in a device designed to handle it appropriately.
Conclusion: People have already mentioned some important drawbacks/limitations of NAT routers, especially when trying to use applications that use port ranges or random port assignments to transmit/receive data. And most (if not all) of the routers in the price range we have been discussing are normally limited to only one DMZ host (fully advertised) or only one forwarding target per port or range. Which can be a drawback for Internet gaming from multiple machines. But none of that would hinder your ability at all to play LAN games (assuming you really mean "LAN" games--restricted to players on your own LAN).
Hope this helps.