All of lore.kernel.org
 help / color / mirror / Atom feed
From: "Antonio Pérez" <aperlu@telefonica.net>
To: linux-kernel@vger.kernel.org
Cc: linux-net@vger.kernel.org
Subject: nat/masquerade with 2.6.x
Date: Sat, 11 Dec 2004 16:55:24 +0100	[thread overview]
Message-ID: <41BB186C.4000105@telefonica.net> (raw)
In-Reply-To: <20041211153922.GA29523@kroah.com>

Hello,
I have a local network with private directions, and a adsl conection. I 
want to do masquerade. Then I do:
   echo 1 > /proc/sys/net/ipv4/ip_forward
   iptables --table nat --append POSTROUTING --out-interface eth1 -j 
MASQUERADE
where eth1 is the interface conected to internet. This work perfectly 
with the kernels 2.4.x.
But one week ago I installed the kernel 2.6.8 and when I do :
   echo 1 > /proc/sys/net/ipv4/ip_forward
   iptables --table nat --append POSTROUTING --out-interface 
$ifc_internet -j MASQUERADE
the hosts of the internal network can do ping to internet, and this is 
normal, but they can not open any web or conection the msn , they
only can do ping. This is very stranger. I try the kernels 
2.6.7,2.6.7,2.6.8 and 2.6.9 and they do no work.

I know that the dns is working because when I do "ping www.google.es" 
from  internal host  this  work.
There are not other rules in the FORWARD chain, look:

   Chain INPUT (policy ACCEPT 2 packets, 100 bytes)
       pkts      bytes target     prot opt in     out     
source               destination

   Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
       pkts      bytes target     prot opt in     out     
source               destination

   Chain OUTPUT (policy ACCEPT 5958 packets, 2480411 bytes)
       pkts      bytes target     prot opt in     out     
source               destination

and if i do iptables -t nat -L -nvx, then:

   Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)
       pkts      bytes target     prot opt in     out     
source               destination

   Chain POSTROUTING (policy ACCEPT 1 packets, 60 bytes)
       pkts      bytes target     prot opt in     out     
source               destination
          0        0 MASQUERADE  all  --  *      eth1    
0.0.0.0/0            0.0.0.0/0

   Chain OUTPUT (policy ACCEPT 1 packets, 60 bytes)
       pkts      bytes target     prot opt in     out     
source               destination

And this is all,
Can somebody help me, please?
Sorry for my bad english.

  reply	other threads:[~2004-12-11 15:54 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2004-12-10 20:08 [Announce] Squashfs 2.1 released (compressed filesystem) Phillip Lougher
2004-12-11  1:33 ` Greg KH
2004-12-11  5:15   ` Phillip Lougher
2004-12-11 15:39     ` Greg KH
2004-12-11 15:55       ` Antonio Pérez [this message]
2004-12-13  1:28         ` proc/sys/net/ipv4/tcp_bic Antonio Pérez
2004-12-12 11:01 ` [Announce] Squashfs 2.1 released (compressed filesystem) Willy Tarreau
2004-12-14  4:30   ` Phillip Lougher

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=41BB186C.4000105@telefonica.net \
    --to=aperlu@telefonica.net \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-net@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.