Re: Problem with address forwarding

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Do you have MASQUERADE rule on POSTROUTING chain? Is ip_forward set to 1? Is web server's default route set to 192.168.155.122?

Jakub Nadolny <jakub.nadolny@xxxxxxxxxxxxx> kirjoitti Mon, 03 Dec 2007 16:44:39 +0200:

Unfortunatelly result is the same when I try to connect from outside of
local network.

So my configuration is like that:

web server      |        | server with NAT  |       |
192.168.155.123 |--------| 192.168.155.122  |-------| Internet
                |        | some.internet.ip |       |

Whether I connect from my local network (192.168.155.*) or from outside
result is the same.
In web browser I enter IP address - not domain name.

# iptables -t nat -L -n
Chain PREROUTING (policy ACCEPT)
target     prot opt source               destination
DNAT tcp -- 0.0.0.0/0 some.internet.ip tcp dpt:80 to:192.168.155.123:80

To be sure I have temporarly turned off all other rules:

# iptables -L -n
Chain INPUT (policy ACCEPT)
target     prot opt source               destination

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination


Do you have some suggestions?
-
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



--
Käytössä Operan vallankumouksellinen sähköpostiohjelma: http://www.opera.com/mail/
-
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux