On Saturday 13 March 2004 10:16 pm, Carsten Maass wrote: > Even if it's not completely clear to me why: the offending rule was > > $IPTABLES -t nat -A POSTROUTING -o $INET_IFACE -j SNAT --to-source $INET_IP > > It seems to do some kind of NATing to all traffic leaving the gateway. Er, why shouldn't it do this? The rule says "for any packet leaving $INET_IFACE, change the Source Address so that it is $INET_IP". Therefore all traffic leaving the gateway is going to be SNATted.... no surprise there? > When i narrowed it down to only match traffic which comes out of the LAN > it works like a charm: > > $IPTABLES -t nat -A POSTROUTING -s 192.168.3.0/24 -o $INET_IFACE -j SNAT > --to-source $INET_IP So the new rule will not SNAT anything which already has a source address other than 192.168.3.0/24 (such as, for example, $INET_IP). It seems to me that this is probably necessary because of the way your IPsec packets are now going twice through the same interface (in the old 2.4 FreeS/WAN implementation, they would go once through eth0, and once through ipsec0, but I believe this is no longer the case?) > Is this a bug? No, I'd say it's a literal interpretation of what the rule says :) Congratulations on working out what the problem was, though. Regards, Antony. -- Anything that improbable is effectively impossible. - Murray Gell-Mann, Nobel Prizewinner in Physics Please reply to the list; please don't CC me.