I think if you used the transparent telnet proxy, with proxy
authentication, and appropriate access rules, you might be able to do

what you want.

However, I had bad luck in the past with server stability and
transparent telnet proxy, so I've rarely done anything with it.

Craig Johnson
Novell Support Connection SysOp
*** For a current patch list, tips, handy files and books on
BorderManager, go to http://nscsysop.hypermart.net ***