ok a little more info, for debugs sake... root@charz-server:/home/charz# iptables -t nat -nvL Chain PREROUTING (policy ACCEPT 157 packets, 20335 bytes) pkts bytes target prot opt in out source destination 112 5904 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 to:10.0.10.1:80 0 0 DNAT tcp -- eth0 * 0.0.0.0/0 10.0.1.192 tcp dpt:80 to:10.0.10.1 Chain POSTROUTING (policy ACCEPT 8 packets, 795 bytes) pkts bytes target prot opt in out source destination 6 480 MASQUERADE 0 -- * * 0.0.0.0/0 10.0.10.1 0 0 SNAT tcp -- * eth0 10.0.10.1 0.0.0.0/0 tcp spt:80 to:10.0.1.192 Chain OUTPUT (policy ACCEPT 14 packets, 1275 bytes) pkts bytes target prot opt in out source destination again it seems only the first rulein the PREROUTING is executing as consecutive looks at this while trying to browse to the page show increment in pckts. again, thank you for your patience. On Tue, Jul 8, 2008 at 6:40 PM, Charles Romestant <cromestant@xxxxxxxxx> wrote: > ok i just saw that the little "diagram" I sent on OP had been moved > about when sent, so resending the interface information just in case. > > A: 10.0.1.200 > B : eth0 10.0.1.192, eth1 10.0.10.2 > C : eth0 10.0.10.1 > > > A and B are on the same subnet and B and C are on another subnet. > > The idea is to open the browser in A type 10.0.1.192 and get the web > server that is on C. > > I did what you suggested Mr Taylor, and still does not work. > > iptables -L lists this : > > > Chain INPUT (policy ACCEPT) > target prot opt source destination > > Chain FORWARD (policy ACCEPT) > target prot opt source destination > ACCEPT tcp -- anywhere Macintosh.local tcp dpt:www > ACCEPT tcp -- Macintosh.local anywhere tcp spt:www > > Chain OUTPUT (policy ACCEPT) > target prot opt source destination > > Chain fail2ban-ssh (0 references) > > > thank you again > > Charles > > On Tue, Jul 8, 2008 at 6:03 PM, Charles Romestant <cromestant@xxxxxxxxx> wrote: >> by the way, from B i can see the server on C, so it is not a NIC problem. >> >> thanks again. >> >> charles >> >> On Tue, Jul 8, 2008 at 6:02 PM, Charles Romestant <cromestant@xxxxxxxxx> wrote: >>> thanks for answer >>> >>> hmm tried it and still does not work... >>> >>> any ideas, at least to get some debug info... still can t see the >>> server from a browser on A. >>> >>> >>> On Tue, Jul 8, 2008 at 5:40 PM, Grant Taylor <gtaylor@xxxxxxxxxxxxxxxxx> wrote: >>>> On 07/07/08 16:49, Charles Romestant wrote: >>>>> >>>>> on C there is a web server, running on port 80, I want to be able to >>>>> access it through B from A. >>>>> >>>>> So basically the ruleset should be on B if its port 80, forward to port 80 >>>>> on C. >>>> >>>> These two rules should do the trick to get the traffic forwarded on through >>>> B to C. >>>> >>>> iptables -t nat -A PREROUTING -i eth0 -d 10.0.1.192 -p tcp --dport 80 -j >>>> DNAT --to-destination 10.0.10.1 >>>> iptables -t filter -A FORWARD -i eth0 -o eth1 -d 10.0.10.1 -p tcp --dport 80 >>>> -j ACCEPT >>>> >>>> You will need to make sure that the reply traffic back from C is allowed and >>>> appears to be from B. >>>> >>>> iptables -t filter -A FORWARD -i eth1 -o eth0 -s 10.0.10.1 -p tcp --sport 80 >>>> -j ACCEPT >>>> iptables -t nat -A POSTROUTING -o eth0 -s 10.0.10.1 -p tcp --sport 80 -j >>>> SNAT --to-source 10.0.1.192 >>>> >>>>> Any help would be appreciated, thank you in advance, >>>> >>>> You are welcome. >>>> >>>> >>>> >>>> Grant. . . . >>>> -- >>>> To unsubscribe from this list: send the line "unsubscribe netfilter" in >>>> the body of a message to majordomo@xxxxxxxxxxxxxxx >>>> More majordomo info at http://vger.kernel.org/majordomo-info.html >>>> >>> >>> >>> >>> -- >>> Charz >>> >> >> >> >> -- >> Charz >> > > > > -- > Charz > -- Charz -- To unsubscribe from this list: send the line "unsubscribe netfilter" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html