It is against style to do anything like that in the NAT table. It is preferable to do it in the filter table, but if you must be lazy about it all, please use the mangle table instead, which does have a valid reason to filter certain traffic at times. The -I is to make sure no matching rules get called before we check that we want these packets at all. If you do the ordering yourself, then just make sure they are all ordered properly. iptables -t mangle -I POSTROUTING -o ppp0 -p tcp --dport 137:139 -j DROP iptables -t mangle -I POSTROUTING -o ppp0 -p udp --dport 137:139 -j DROP iptables -t mangle -I PREROUTING -i ppp0 -p tcp --dport 137:139 -j DROP iptables -t mangle -I PREROUTING -i ppp0 -p udp --dport 137:139 -j DROP -----Original Message----- From: Claus Regelmann [mailto:claus.regelmann@xxxxxxx] Sent: Thursday, September 11, 2003 2:03 PM To: netfilter@xxxxxxxxxxxxxxxxxxx; blueflux@xxxxxxxxxxx Subject: Filter in POSTROUTING Hello, There is a figure Oskar Andreassoons IPTABLES TUTORIAL (V1.1.19, chap. 3.1, pg.19) where both, the forwarded and the local output, join the postrouting chain. Why shoudnt it be possible to filter all outgoing e.g. smb traffic from a local network at that place with a command like >iptables -t nat -A POSTROUTING -o ppp0 -p tcp --dport 137:139 -j DROP >iptables -t nat -A POSTROUTING -o ppp0 -p udp --dport 137:139 -j DROP The same question applies to the PREROUTING chain for input >iptables -t nat -A PREROUTING -i ppp0 -p tcp --dport 137:139 -j DROP >iptables -t nat -A PREROUTING -i ppp0 -p udp --dport 137:139 -j DROP Thanks Claus