On Mon, March 13, 2006 12:02, Nilesh wrote: > Hi Rob, > > The default FORWARD policy is ACCEPT. If this is a firewall that is connected to the internet, you'd better set it to DROP (or have a last rule that says DROP or REJECT) and make it work with the state match (RELATED and ESTABLISHED)... > Yes I am trying the rules > > iptables -I PREROUTING -t nat -s 192.168.0.10 -p tcp > --dport 80 -j DNAT --to 192.168.0.3:3128 > iptables -I PREROUTING -t nat -s 192.168.0.10 -p tcp > --dport 3128 -j DNAT --to 192.168.0.3:3128 > > iptables -A FORWARD -s 192.168.0.10 -i eth1 -d > 192.168.0.1 -o eth1 -p tcp --sport 1024:65535 --dport > 3128 -j ACCEPT. You are PREROUTING to 192.168.0.3 but you allow forwarding to 192.168.0.1. That doesn't match and therefore this will not work. > Rob, I am trying to forward all request coming from IP > 192.168.0.10 port 3128 and 80 to 192.168.0.3 port > 3128. Let's keep it simple at first : you can always make the rule more restrictive if it works (and if you need to). $ipt -t nat -A PREROUTING -i eth1 -s 192.168.0.10 -p tcp \ --dport 3128 -j DNAT --to 192.168.0.3 $ipt -A FORWARD -i eth1 -s 192.168.0.10 -d 192.168.0.3 \ -p tcp --dport 3128 -j ACCEPT. I must say that I've never tried forwarding "back" to the same interface.. Don't know for sure if it's going to work. > so 192.168.0.10 will use the 192.168.0.3 proxy server > not the 192.168.0.1 proxy server. Please don't top-post. Gr, Rob > --- Rob Sterenborg <rob@xxxxxxxxxxxxxxx> wrote: > >> On Mon, March 13, 2006 09:53, Nilesh wrote: >> > Thanks Leandro, >> > >> > I have tried with this rules but unfortunately not >> > working. >> > Squid server running on the 192.168.0.3 and its >> > working fine. I have not installed any firewall >> on >> > the 192.168.0.3. >> > In my Internet browser settings If I chnage the >> > settings from 192.168.0.1:3128 to 192.168.0.3:3128 >> I >> > can surf the web. >> > but If I dont change to 192.168.0.3:3128 proxy >> > settings I get the connection timout error. >> > >> > I think DNAT is not working >> >> Probably you tell Netfilter to do DNAT, but are not >> allowing it. >> Do you have a FORWARD rule that allows this traffic >> or is your policy ACCEPT ? >> >> Please don't top-post. >> >> >> Gr, >> Rob >> >> >> > --- Leandro Silva <lansoweb@xxxxxxxxx> wrote: >> > >> >> Hello ! >> >> >> >> You can use something like that: >> >> >> >> iptables -I PREROUTING -t nat -s 192.168.0.10 -p >> tcp >> >> --dport 80 -j >> >> DNAT --to 192.168.0.3:3128 >> >> iptables -I PREROUTING -t nat -s 192.168.0.10 -p >> tcp >> >> --dport 3128 -j >> >> DNAT --to 192.168.0.3:3128 >> >> >> >> If you have iprange compiled for iptables you can >> >> use: >> >> >> >> iptables -I PREROUTING -t nat -m iprange >> --src-range >> >> 192.168.0.10-192.168.0.20 -p tcp --dport 80 -j >> DNAT >> >> --to >> >> 192.168.0.3:3128 >> >> iptables -I PREROUTING -t nat -m iprange >> --src-range >> >> 192.168.0.10-192.168.0.20 -p tcp --dport 3128 -j >> >> DNAT --to >> >> 192.168.0.3:3128 >> >> >> >> I hope this can help, >> >> Leandro >> >> >> >> 2006/3/11, Nilesh <niluforalways@xxxxxxxxx>: >> >> > Dear all, >> >> > >> >> > I have two squid proxy servers and two ISP >> >> > >> >> > 1) 192.168.0.1 port 3128 >> >> > 2) 192.168.0.3 port 3128 >> >> > >> >> > We have around 70 comps assigned IP's between >> >> > 192.168.0.4 to 192.168.0.250 >> >> > The default proxy we are using is 192.168.0.1 >> >> which is >> >> > on the ISP 1. >> >> > Now I have configured 192.168.0.3 squid proxy >> >> server >> >> > on ISP 2 line. >> >> > Both ISP 1 and ISP 2 are landing (connected) on >> >> the >> >> > same Switch. >> >> > >> >> > Now I want setup the request coming from IP >> range >> >> > (192.168.0.10 to 192.168.0.20) for the >> >> > 192.168.0.1:3128 >> >> > Will be forward to 192.168.0.3:3128 >> >> > So the users from this IP range will access >> only >> >> > 192.168.0.3 proxy server. >> >> > >> >> > Could any one please help me which rules should >> I >> >> use >> >> > in IPTABLES . >> >> > >> >> > I have attached herewith my rc.firewall file. >> >> > >> >> > Please help me. >> >> > >> >> > Regards >> >> > Nilesh.