It didn't work. I'm getting somebody on my ISP to test it (offsite). The firewall IPs are: 10.30.7.147 for net (my ISP nats it) and 192.168.0.1 and my box i want to forward to is 192.168.0.2. It still doesn't work. Here's an updated ruleset: Chain INPUT (policy ACCEPT 3787 packets, 1815K bytes) pkts bytes target prot opt in out source destination 0 0 DROP tcp -- eth0 any anywhere anywhere tcp dpt:10000 0 0 DROP tcp -- eth0 any anywhere anywhere tcp dpt:631 3 144 DROP tcp -- eth0 any anywhere anywhere tcp dpt:http 0 0 DROP tcp -- eth0 any anywhere anywhere tcp dpt:smtp 0 0 DROP tcp -- eth0 any anywhere anywhere tcp dpt:ftp 0 0 ACCEPT icmp -- eth0 any anywhere anywhere icmp echo-reply 0 0 ACCEPT icmp -- eth0 any anywhere anywhere icmp destination-unreachable 0 0 ACCEPT icmp -- eth0 any anywhere anywhere icmp redirect 0 0 ACCEPT icmp -- eth0 any anywhere anywhere icmp echo-request 0 0 ACCEPT icmp -- eth0 any anywhere anywhere icmp time-exceeded 0 0 DROP icmp -- eth0 any anywhere anywhere Chain FORWARD (policy DROP 36 packets, 2291 bytes) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- any any anywhere anywhere state RELATED,ESTABLISHED 0 0 ACCEPT tcp -- any any 192.168.0.2 anywhere tcp dpt:ssh Chain OUTPUT (policy ACCEPT 3996 packets, 585K bytes) pkts bytes target prot opt in out source destination On Sun, 28 Mar 2004 22:24:12 +0100, Someone named Antony Stone <Antony@xxxxxxxxxxxxxxxxxxxx> wrote: > On Sunday 28 March 2004 10:07 pm, Cody Harris wrote: > > > I rewrote the rules following your suggestions. It still doesn't work: > > > > Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) > > target prot opt in out source destination > > ACCEPT all -- eth1 any anywhere anywhere > > Okay, that will allow all packets coming through from eth1 > > > ACCEPT tcp -- any any anywhere 192.168.0.2 > > tcp dpt:ssh state RELATED,ESTABLISHED > > That will allow packets coming through from 192.168.0.2 (which is plugged in > to eth1) to destination port 22. > > You have no rule to allow the reply packets back (and the above rule won't > allow the NEW packets through, either). > > Try this: > > iptables -F FORWARD > iptables -P FORWARD DROP > iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT > iptables -A FORWARD -s 192.168.0.2 -p tcp --dport 22 -j ACCEPT > > If that doesn't work tell us exactly how you are testing it - which machine is > the SSH client on, where is the server, what are the IP addresses... > > Regards, > > Antony. > > -- > It is also possible that putting the birds in a laboratory setting > inadvertently renders them relatively incompetent. > > - Daniel C Dennet > > Please reply to the list; > please don't CC me. > > -- +------------------+-----------------------------+ | Cody Harris | --------------------------- | | ---------------- | --------------------------- | +------------------+-------+---------------------+---+ | *Sigh*. No key. | +----------------------------------------------------+