Is there any chance these packets are getting dropped before they get SNATTED? I don't know what your default policies are set to, nor your other rules, but I would look at this possibility first. I suggest you run tcpdump and follow these packets to see what is happening to them. Also, you might enable logging of these packets as well to get some additional information. -----Original Message----- From: netfilter-admin@xxxxxxxxxxxxxxxxxxx [mailto:netfilter-admin@xxxxxxxxxxxxxxxxxxx] On Behalf Of Brian Capouch Sent: Friday, January 30, 2004 11:05 PM To: netfilter@xxxxxxxxxxxxxxxxxxx Subject: SNAT: I'm going insane This ought to be the simplest thing in the world, and I have rules like this that work. I hope someone can see something glaringly wrong with what I'm doing here: I want to SNAT all traffic from an internal address (10.2.2.2) to an external one. So I add to my rules: iptables -t nat -I POSTROUTING -s 10.2.2.2 -j SNAT --to-source 206.230.187.15 I test and my ssh traffic is passing perfectly; I go out to machines on the net and they show me coming in from 206.230.187.15. But some--BUT NOT ALL--of my UDP traffic seems to be heading out without any change. A short sniff on the *output* interface shows: 02:31:56.696763 10.2.2.2.4569 > blah.blah.net.4569: udp 25 (DF) [tos 0x10] 02:31:58.699259 10.2.2.2.4569 > blah.blah.net.4569: udp 25 (DF) [tos 0x10] 02:32:06.704660 10.2.2.2.4569 > blah.blah.net.4569: udp 12 (DF) [tos 0x10 And the packet counters (which I reset for the test) show nothing passing through: 0 0 SNAT all -- * eth1 10.2.2.2 0.0.0.0/0 to:206.230.187.15 UDP traffic going to port 5036, which is heading from this same machine to the same remote endpoint machine, gets NATted perfectly. *************************************** Does anyone know what I'm doing wrong? Other similar rules in this same table seem to be doing just what they need to. . . . Thanks in advance for anyone who might be able to offer a potential explanation. B.