> Is there a table/target I can use to accomplish this? No, it's an issue how you wire up your network or routing. iptables is out of reach here. And please refrain from top-posting. > > > On Mar 5, 2007, at 3:39 PM, Jan Engelhardt wrote: > >> >> > > > I'm hoping to get some help from the community, and I'm sure >> > > > I'm just >> > > > overlooking something simple. My goal is to forward smtp >> > > > traffic >> > > > destined for >> > > > one machine to another based on source. >> > > > >> > > > I have done this: echo 1 > /proc/sys/net/ipv4/ip_forward >> > > > >> > > > I've enabled the loading of iptable_nat in the iptables config >> > > > file. >> > > > >> > > > This is the base of what I'm using in my >> > > > /etc/sysconfig/iptables file. >> > > > Any >> > > > direction on what I'm missing would be greatly appreciated. >> > > > >> > > > :PREROUTING ACCEPT [1581:83538] >> > > > -A PREROUTING -s xxx.xxx.66.0/24 -i eth0 -p tcp -d >> > > > xxx.xxx.64.3 -- >> > > > dport 25 -j DNAT --to-destination xxx.xxx.65.15:25 >> > > >> > > Please show us the output of `ip a` and `ip r`. >> >> > [root@deathstar sysconfig]# ip a >> > 1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue >> > link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 >> > inet 127.0.0.1/8 brd 127.255.255.255 scope host lo >> > inet6 ::1/128 scope host >> > valid_lft forever preferred_lft forever >> > 2: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000 >> > link/ether 00:18:8b:35:ea:7a brd ff:ff:ff:ff:ff:ff >> > inet XXX.184.64.3/24 brd XXX.184.64.255 scope global eth0 >> > inet6 fe80::218:8bff:fe35:ea7a/64 scope link >> > valid_lft forever preferred_lft forever >> > 3: eth1: <BROADCAST,MULTICAST> mtu 1500 qdisc noop qlen 1000 >> > link/ether 00:18:8b:35:ea:78 brd ff:ff:ff:ff:ff:ff >> > 4: sit0: <NOARP> mtu 1480 qdisc noop >> > link/sit 0.0.0.0 brd 0.0.0.0 >> > [root@deathstar sysconfig]# ip r >> > XXX.184.64.0/24 dev eth0 proto kernel scope link src XXX.184.64.3 >> > 169.254.0.0/16 dev eth0 scope link >> > default via XXX.184.64.1 dev eth0 >> >> DNAT can logically not work in this setup, unless 65.15 routes received >> packets back to 64.3 for the un-DNATting. >> >> >> Jan >> -- > Jan --