Ok, my first guess would be that you have a problem with the routes on the 192.168.151.x network. My guess would be that on the 192.168.150.x clients you have route 0.0.0.0/0.0.0.0 192.168.150.3 (linuxbox) which would route the internet and lan or you have a route 192.168.151.0/255.255.255.0 192.168.150.3 (linuxbox) Correct? Then I assume the problem is in the 192.168.151.x network where I think you have these routes (and only these) 0.0.0.0/0.0.0.0 192.168.151.1 (don't know what this is, but your linux box uses it for internet i presume) If that assumption is correct the problem is in the 192.168.151.x network because it can not route back to the 192.168.150.x network. You can test this very easily. For example: 192.168.150.50 (client) <--> 192.168.150.3(eth0) (linux-box) (eth1) 192.168.151.3 <--> (client) 192.168.151.50 go to the client 192.168.150.50 there ping 192.168.150.3 atleast this should succeed (assuming there are no firewall rules to block it) then ping 192.168.151.3, if this works the routing on the linux box is ok, since you are pinging the network card in the other segment if that succeeds ping 192.168.151.50 (this all is assuming you have clients 192.168.150.50 & 192.168.151.50, but use any you like) if that fails it (probably) means there is no route back from 192.168.151.50 to 192.168.150.50 To do so on windows route add 192.168.150.0 mask 255.255.255.0 192.168.151.3 you can add /p (on some windows don't know if it'll work on all) to make it permanent (ie, won't be forgotten on reboot) hope this helps > -----Oorspronkelijk bericht----- > Van: Gary Hodder [mailto:vk2kcf@miacomputers.com]=20 > Verzonden: maandag 21 oktober 2002 11:36 > Aan: netfilter > Onderwerp: Re: Forwarding intranet ip's >=20 >=20 > Hi Ferry, >=20 > Trying to route clients 192.168.150 net to the router box on=20 > 192.168.151 net. The forward chain has iptables -t filter -A=20 > FORWARD -s 192.168.150.0/255.255.255.0 -j ACCEPT Tried=20 > iptables -t filter -A FORWARD -i eth0 -s=20 > 192.168.150.0/255.255.255.0 -o eth1 -j ACCEPT A client=20 > machine on 192.168.150 net can ping the 192.168.151.3=20 > interface but go no further. 150 net go through a 10/100 nway=20 > switch. 151 net goes through a dechub 900 with 900dm hub modules. >=20 >=20 > [root@sandy /]# ifconfig > eth0 Link encap:Ethernet HWaddr 00:40:95:30:4B:76 > inet addr:192.168.150.3 Bcast:192.168.150.255=20 > Mask:255.255.255.0 > UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 > RX packets:316759 errors:0 dropped:0 overruns:0 frame:0 > TX packets:388607 errors:0 dropped:0 overruns:11 carrier:0 > collisions:0 txqueuelen:100 > RX bytes:35469436 (33.8 Mb) TX bytes:123078370 (117.3 Mb) > Interrupt:10 Base address:0x2000 >=20 > eth1 Link encap:Ethernet HWaddr 00:40:F4:28:A0:E7 > inet addr:192.168.151.3 Bcast:192.168.151.255=20 > Mask:255.255.255.0 > UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 > RX packets:22265 errors:0 dropped:0 overruns:0 frame:0 > TX packets:21585 errors:0 dropped:0 overruns:0 carrier:0 > collisions:64 txqueuelen:100 > RX bytes:19189798 (18.3 Mb) TX bytes:6134499 (5.8 Mb) > Interrupt:11 Base address:0x4000 >=20 > lo Link encap:Local Loopback > inet addr:127.0.0.1 Mask:255.0.0.0 > UP LOOPBACK RUNNING MTU:16436 Metric:1 > RX packets:1786 errors:0 dropped:0 overruns:0 frame:0 > TX packets:1786 errors:0 dropped:0 overruns:0 carrier:0 > collisions:0 txqueuelen:0 > RX bytes:164845 (160.9 Kb) TX bytes:164845 (160.9 Kb) >=20 > [root@sandy /]# route -n > Kernel IP routing table > Destination Gateway Genmask Flags Metric=20 > Ref Use > Iface > 192.168.151.0 0.0.0.0 255.255.255.0 U 0 =20 > 0 0 > eth1 > 192.168.150.0 0.0.0.0 255.255.255.0 U 0 =20 > 0 0 > eth0 > 127.0.0.0 0.0.0.0 255.0.0.0 U 0 =20 > 0 0 > lo > 0.0.0.0 192.168.151.1 0.0.0.0 UG 0 =20 > 0 0 > eth1 >=20 > [root@sandy /]# lsmod > Module Size Used by Not tainted > msdos 5364 0 (autoclean) > vfat 9588 0 (autoclean) > fat 31864 0 (autoclean) [msdos vfat] > udf 85472 0 (autoclean) > nls_iso8859-1 2844 2 (autoclean) > isofs 25652 0 (autoclean) > inflate_fs 17892 0 (autoclean) [isofs] > sg 31276 0 (autoclean) > nfs 67328 0 (autoclean) > floppy 49340 0 > sr_mod 15096 0 (autoclean) > iptable_filter 1644 1 (autoclean) > iptable_mangle 2072 0 (autoclean) (unused) > iptable_nat 15224 0 (autoclean) (unused) > ip_conntrack 18400 1 (autoclean) [iptable_nat] > ip_tables 11672 5 [iptable_filter iptable_mangle > iptable_nat] > autofs4 9340 1 (autoclean) > parport_pc 21672 1 (autoclean) > lp 6720 0 (autoclean) > parport 23936 1 (autoclean) [parport_pc lp] > via82cxxx_audio 19036 1 > uart401 6628 0 [via82cxxx_audio] > ac97_codec 9928 0 [via82cxxx_audio] > sound 55732 0 [via82cxxx_audio uart401] > soundcore 3780 0 [via82cxxx_audio sound] > nfsd 66576 8 (autoclean) > lockd 46480 1 (autoclean) [nfs nfsd] > sunrpc 60188 1 (autoclean) [nfs nfsd lockd] > ip_vs 74328 0 (autoclean) > af_packet 13000 2 (autoclean) > 8139too 14472 2 (autoclean) > mii 1152 0 (autoclean) [8139too] > supermount 14340 1 (autoclean) > ide-cd 28712 0 > cdrom 26848 0 [sr_mod ide-cd] > ide-scsi 8212 0 > scsi_mod 90372 3 [sg sr_mod ide-scsi] > usb-uhci 21676 0 (unused) > usbcore 58304 1 [usb-uhci] > rtc 6560 0 (autoclean) > ext3 74004 3 > jbd 38452 3 [ext3] >=20 > [root@sandy /]# uname -a > Linux sandy.xxxxx.xxxx 2.4.19-16mdk #1 Fri Sep 20 18:15:05=20 > CEST 2002 i686 unknown unknown GNU/Linux Athlon 1000, 512mb=20 > ram. Box is Linux Mandrake 9.0. This is all behind another=20 > Linux router/firewall. >=20 > Gary. >=20 > On Mon, 2002-10-21 at 16:23, Ferry van Steen wrote: > > Where are you trying to route to, what are the=20 > IP's/Netmasks from the=20 > > network cards and what lines do you have in the FORWARD chain? I saw > you > > already did echo 1 > /proc/sys/net/ipv4/ip_forward > >=20 > >=20 > > > -----Oorspronkelijk bericht----- > > > Van: Gary Hodder [mailto:vk2kcf@miacomputers.com] > > > Verzonden: zondag 20 oktober 2002 3:22 > > > Aan: netfilter > > > Onderwerp: Forwarding intranet ip's > > >=20 > > >=20 > > > Hi all, > > >=20 > > > I am wanting to route 192.168.x.x ip's, the Linux kernel will > > > not do this and hasn't for a while. Is there a iptables rule=20 > > > to do this or a hack that will turn it back on in the kernel?=20 > > > I want to do all the ip accounting at the border router and=20 > > > masq from there. > > >=20 > > > Thanks > > > Gary. > > >=20 > > >=20 > > >=20 > > >=20 > > >=20 > > >=20 > > >=20 > >=20 >=20 >=20 >=20 >=20 >=20 >=20 >=20