> INET_IP="216.184.9.5" > #HTTP_IP="216.184.9.6" > PWWEB_IP="216.184.9.30" > PWODBC_IP="216.184.9.29" > INET_IFACE="eth2" > > LAN_IP="192.168.1.15" > LAN_IP_RANGE="192.168.1.0/24" > LAN_BCAST_ADRESS="192.168.1.255" > LAN_IFACE="eth0" > > DMZ_PWWEB_IP="192.168.0.2" > DMZ_PWSQL_IP="192.168.0.3" > DMZ_PWODBC_IP="192.168.0.4" > DMZ_IP="192.168.0.1" > DMZ_IFACE="eth1" > > $IPTABLES -A FORWARD -i $DMZ_IFACE -o $INET_IFACE -j ACCEPT > $IPTABLES -A FORWARD -i $INET_IFACE -o $DMZ_IFACE -m state \ > --state ESTABLISHED,RELATED -j ACCEPT > $IPTABLES -A FORWARD -i $LAN_IFACE -o $DMZ_IFACE -j ACCEPT > $IPTABLES -A FORWARD -i $DMZ_IFACE -o $LAN_IFACE -j ACCEPT These rules are pretty generous (well, except for nodes on your $LAN_IFACE...which aren't allowed to use the Internet at all?...is that a typo?). You're allowing the firewall to forward packets unfiltered from the DMZ to anywhere? Why even have a DMZ? If you want to be a little more secure you could do something like this instead: $iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT $iptables -A FORWARD -i $LAN_IFACE -m state --state NEW -j ACCEPT and then create rules only for NEW connections you want to allow in on either $INET_IFACE or $DMZ_IFACE. For example: $iptables -A FORWARD -m state --state NEW -i $INET_IFACE -p tcp -d $DMZ_PWWEB_IP --dport 80 -j ACCEPT > # > # PWWEB > # > $IPTABLES -A FORWARD -p TCP -i $INET_IFACE -o $DMZ_IFACE -d $DMZ_PWWEB_IP \ > --dport 80 -j allowed > $IPTABLES -A FORWARD -p ICMP -i $INET_IFACE -o $DMZ_IFACE -d $DMZ_PWWEB_IP \ > -j icmp_packets > # > # PWODBC > # > $IPTABLES -A FORWARD -p TCP -i $INET_IFACE -o $DMZ_IFACE -d $DMZ_PWODBC_IP \ > --dport 80 -j allowed > $IPTABLES -A FORWARD -p ICMP -i $INET_IFACE -o $DMZ_IFACE -d > $DMZ_PWODBC_IP \ > -j icmp_packets > # > # PWWEB > # > $IPTABLES -t nat -A PREROUTING -p TCP -i $INET_IFACE -d $PWWEB_IP > --dport 80 \ > -j DNAT --to-destination $DMZ_PWWEB_IP I think this is your problem. I could look at the man pages to figure out if that syntax is also correct but I'm too lazy;-)...it's usually done like this: $iptables -t nat -A PREROUTING -i $INET_IFACE -p tcp -d $PWWEB_IP --dport 80 -j DNAT --to $DMZ_PWWEB_IP Goodluck! Matt