RE: Troubleshooting SNAT

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The FC5 I referred to in my original message is my distro; it stands for 
"Fedora Core 5."  I will ask on that list next but I figured they were
generalists and this list had the iptables experts.

I'm not really a visual person, and prefer to understand what's going on 
under the hood, but thanks for the GUI idea.  My syntax seems to be
correct; as I said in my original message this works fine on another 
machine.

This is the only rule I have, so there is no script of other rules to
show.  The rule in my original message is the only one in play.  I 
should have mentioned that earlier.

I included the partial output from lsmod in my original message in case 
anyone on this list could point out a missing module.

 - Steve

James Shewey wrote:
> What distro are you using? Perhaps someone on that distro can offer
> some advice. Also, if you are a more visual person, you might think
> about kmyfirewall which is still gives you the conceptual overview
> while alleviating questions about whether you go the syntax right.
> Also, you might consider sending the script of your iptables rules to
> the list so that they can make sure there aren't any problems there. 
> Also, you can make sure you have all your kernel modules loaded using
> lsmod. 
> 
> On 2/12/07, Steve Brueckner <steve@xxxxxxxxxxxxxx> wrote:
>> Thanks, but using the --to-source switch seems to have the same
>> effect as just using --to.  And my attempt to use Masquerading
>> failed as well. 
>> 
>> I'm new to iptables, but it doesn't seem too complex as a user to try
>> to do this, so I really think the problem isn't with my usage of
>> iptables but that something is either broken or missing in my kernel.
>> 
>> I think what we need to do is some debugging, but I was hoping for
>> some ideas on how to do that from this list.
>> 
>> Thanks
>> 
>> Steve Brueckner, ATC-NY
>> 
>> James Shewey wrote:
>>> did you try "iptables -t nat -A POSTROUTING -o eth0 -j SNAT
>>> --to-source 192.168.1.221" 
>>> 
>>> Perhaps this will yeild better results.
>>> 
>>> You should also be able to do what you want with _all_ traffic that
>>> flows through the router too using the masquerade table. This may
>>> not work for you solution though.
>>> 
>>> 
>>> On 2/12/07, Steve Brueckner <steve@xxxxxxxxxxxxxx> wrote:
>>>> I have an FC5 (2.6.16.13-xen kernel) box with 2 interfaces:
>>>> eth0 is 192.168.1.221 (external network)
>>>> eth1 is 192.168.10.1 (internal network)
>>>> 
>>>> I've got to nat traffic through this box from host 192.168.10.2 to
>>>> host 192.168.1.12.  So I enabled ip forwarding and source nat on
>>>> the multi-homed box: # sysctl -w net.ipv4.ip_forward=1 # iptables
>>>> -t nat -A POSTROUTING -o eth0 -j SNAT --to 192.168.1.221
>>>> 
>>>> That didn't work; the packets were indeed forwarded but their
>>>> source address was unchanged (still 192.168.10.2):
>>>> # tcpdump -n -i eth0
>>>> 18:14:12.425317 IP 192.168.10.2 > 192.168.1.12: ICMP echo request,
>>>> id 2617, seq 9, length 64 
>>>> 
>>>> I also tried plain old Masquerading:
>>>> # iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE This also
>>>> does not change the packets' source address, but it does forward
>>>> them from eth1 to eth0 again. 
>>>> 
>>>> This similar command has a different but still incorrect effect:
>>>> # iptables -t nat -A POSTROUTING -j MASQUERADE It changes the
>>>> source address of the packets on eth1 but of course does not
>>>> forward them to eth0. 
>>>> 
>>>> Nothing seems to work.  Packets are either forwarded but without
>>>> new source IPs or they get new source IPs but aren't forwarded.
>>>> My filter table is wide open (no rules).
>>>> 
>>>> The same kernel can do SNAT just fine using Debian.  I'm starting
>>>> to think FC5 is missing something.  However, I seem to have the
>>>> following modules, which appear sufficient to me:
>>>> # lsmod | grep ip
>>>> ipt_MASQUERADE          3776  0
>>>> iptable_filter          3104  1
>>>> iptable_nat             8836  1
>>>> ip_nat                 18092  2 ipt_MASQUERADE,iptable_nat
>>>> ip_conntrack           55800  4
>>>> xt_state,ipt_MASQUERADE,iptable_nat,ip_nat nfnetlink 6520  2
>>>> ip_nat,ip_conntrack ip_tables              13636  2
>>>> iptable_filter,iptable_nat x_tables               13188  6
>>>> xt_state,ipt_MASQUERADE,xt_tcpudp,xt_physdev,iptable_nat,ip_tables
>>>> ipv6                  269056  14
>>>> 
>>>> Any ideas on how to proceed with troubleshooting this?
>>>> 
>>>> Thanks,
>>>> 
>>>> Steve Brueckner, ATC-NY



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux