The -L output is not enough, try iptables-save -t nat Also make sure you don't filter stuff in -t filter chain FORWARD And, did you echo 1 > /proc/sys/net/ipv4/ip_forward ? :D On Wed, 25 Aug 2004 21:05:07 +0200, Mardaga Stephan <smardaga@xxxxxxxxxx> wrote: > Hello, > > I'm new on this forum and hope you will help me. > > I'm building a Debian server and it is the basic stage. > I wish to run Iptables with masquerade. > > detailed problem report could be find @ this address : > http://homeusers.brutele.be/smardaga/masquerade/ > > resume : > > PC1 Debian Serveur PC2 > | Eth0 Eth1 | > |.1 .50| |.1 .2| > | | | | > | | | | > --------------------------- ------------------------- > 192.168.0.x/24 192.168.1.x/24 > > Masquerade don't work when pinging from PC2 (192.168.1.2) to PC1 > (192.168.0.1). PC1 receives icmp packet with IP source address 192.168.1.2. > > tcpdump on eth0 : > > 20:30:25.472725 192.168.1.2 > 192.168.0.1: icmp: echo request > 20:30:30.972679 192.168.1.2 > 192.168.0.1: icmp: echo request > 20:30:36.472321 192.168.1.2 > 192.168.0.1: icmp: echo request > 20:30:41.972217 192.168.1.2 > 192.168.0.1: icmp: echo request > 20:30:47.472049 192.168.1.2 > 192.168.0.1: icmp: echo request > 20:30:52.972084 192.168.1.2 > 192.168.0.1: icmp: echo request > > iptables release 1.2.6a > Linux 2.4.18-bf2.4 #1 Son Apr 14 09:53:28 CEST 2002 i686 unknown > > Chain PREROUTING (policy ACCEPT) > target prot opt source destination > > Chain POSTROUTING (policy ACCEPT) > target prot opt source destination > LOG all -- anywhere anywhere LOG level > warning > MASQUERADE all -- 192.168.1.0/24 anywhere > LOG all -- anywhere anywhere LOG level > warning > > Chain OUTPUT (policy ACCEPT) > target prot opt source destination > > Any help and/or suggestions will be accepted gratefully. > > Thanks in advance, > > Stephan Mardaga > > -- Bla bla