Guess I should read up on netfilter quite a bit more. So the state table is an automagic thing that re-writes the return packets.. thanks. > -----Original Message----- > From: Mark E. Donaldson [mailto:markee@xxxxxxxxxxxxxxx] > Sent: 31 January 2004 19:21 > To: Carl Farrington; netfilter@xxxxxxxxxxxxxxxxxxx > Subject: RE: SNAT: I'm going insane > > Why would you want to DNAT all the return packets? Assuming the > connection > was established from the inside, should not the state table handle this? > Now, if you are permitting a new connection from the outside, then you > would > of course want to DANT that through to the correct host. > > -----Original Message----- > From: netfilter-admin@xxxxxxxxxxxxxxxxxxx > [mailto:netfilter-admin@xxxxxxxxxxxxxxxxxxx] On Behalf Of Carl Farrington > Sent: Saturday, January 31, 2004 11:01 AM > To: netfilter@xxxxxxxxxxxxxxxxxxx > Subject: RE: SNAT: I'm going insane > > Sorry to hijack your discussion so to speak, but this has raised my > curiosity. Why would someone want to do this? And for it to work, > presumably > you would have 206.230.187.15 DNAT everything else back to > 10.2.2.2 ? > > Is it a bit like doing MASQ but without the full packet-modification? > > > -----Original Message----- > > From: Brian Capouch [mailto:brianc@xxxxxxxxxxx] > > Sent: 31 January 2004 07:05 > > To: netfilter@xxxxxxxxxxxxxxxxxxx > > Subject: SNAT: I'm going insane > > > > This ought to be the simplest thing in the world, and I have rules > like > > this that work. I hope someone can see something glaringly wrong with > > what I'm doing here: > > > > I want to SNAT all traffic from an internal address (10.2.2.2) to an > > external one. So I add to my rules: > > > > iptables -t nat -I POSTROUTING -s 10.2.2.2 -j SNAT --to-source > > 206.230.187.15 > > > > I test and my ssh traffic is passing perfectly; I go out to machines > on > > the net and they show me coming in from 206.230.187.15. > > > > But some--BUT NOT ALL--of my UDP traffic seems to be heading out > without > > any change. > > > > A short sniff on the *output* interface shows: > > > > 02:31:56.696763 10.2.2.2.4569 > blah.blah.net.4569: udp 25 (DF) [tos > > 0x10] > > > > 02:31:58.699259 10.2.2.2.4569 > blah.blah.net.4569: udp 25 (DF) [tos > > 0x10] > > > > 02:32:06.704660 10.2.2.2.4569 > blah.blah.net.4569: udp 12 (DF) [tos > 0x10 > > > > And the packet counters (which I reset for the test) show nothing > > passing through: > > > > 0 0 SNAT all -- * eth1 10.2.2.2 > > 0.0.0.0/0 to:206.230.187.15 > > > > UDP traffic going to port 5036, which is heading from this same > machine > > to the same remote endpoint machine, gets NATted perfectly. > > > > *************************************** > > > > Does anyone know what I'm doing wrong? Other similar rules in this > same > > table seem to be doing just what they need to. . . . > > > > Thanks in advance for anyone who might be able to offer a potential > > explanation. > > > > B. > >