It started working after loading the module iptable_nat Does nftables rely on iptables? 2014-08-04 6:24 GMT+02:00 Vigneswaran R <vignesh@xxxxxxxxxxx>: > On 08/03/2014 04:05 PM, Matteo Croce wrote: >> >> Hi, >> >> I'm trying to setup a NAT on my router with nftables, my LAN is wlan0 >> with address 192.168.20.1 and a the LAN is eth0 with address >> 192.168.1.7, ip forwarding is enabled: >> >> [~]# ifconfig eth0 >> eth0 Link encap:Ethernet HWaddr 00:0d:b9:34:2b:e8 >> inet addr:192.168.1.7 Bcast:192.168.1.255 Mask:255.255.255.0 >> inet6 addr: fe80::20d:b9ff:fe34:2be8/64 Scope:Link >> UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 >> RX packets:353 errors:0 dropped:0 overruns:0 frame:0 >> TX packets:305 errors:0 dropped:0 overruns:0 carrier:0 >> collisions:0 txqueuelen:1000 >> RX bytes:39409 (38.4 KiB) TX bytes:39077 (38.1 KiB) >> >> [~]# ifconfig wlan0 >> wlan0 Link encap:Ethernet HWaddr 04:f0:21:0c:a3:7d >> inet addr:192.168.20.1 Bcast:192.168.20.255 >> Mask:255.255.255.0 >> inet6 addr: fe80::6f0:21ff:fe0c:a37d/64 Scope:Link >> UP BROADCAST RUNNING MULTICAST MTU:1612 Metric:1 >> RX packets:475 errors:0 dropped:0 overruns:0 frame:0 >> TX packets:232 errors:0 dropped:0 overruns:0 carrier:0 >> collisions:0 txqueuelen:1000 >> RX bytes:48202 (47.0 KiB) TX bytes:41345 (40.3 KiB) >> >> [~]# route -n >> Kernel IP routing table >> Destination Gateway Genmask Flags Metric Ref Use >> Iface >> 0.0.0.0 192.168.1.1 0.0.0.0 UG 0 0 0 >> eth0 >> 192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 >> eth0 >> 192.168.20.0 0.0.0.0 255.255.255.0 U 0 0 0 >> wlan0 >> [~]# cat /proc/sys/net/ipv4/ip_forward >> 1 >> >> I've setup nftables like this: >> >> [~]# nft -n list table nat >> table ip nat { >> chain postrouting { >> type nat hook postrouting priority 0; >> ip saddr 192.168.20.0/24 oif eth0 snat 192.168.1.7 >> } >> } >> >> It correctly forwards the packet with the new address, but doesn't >> send the replies back: >> >> [~]# tcpdump -pni wlan0 icmp >> IP 192.168.20.23 > 8.8.8.8: ICMP echo request, id 9107, seq 11, length 64 >> IP 192.168.20.23 > 8.8.8.8: ICMP echo request, id 9107, seq 12, length 64 >> IP 192.168.20.23 > 8.8.8.8: ICMP echo request, id 9107, seq 13, length 64 >> [~]# tcpdump -pni eth0 icmp >> IP 192.168.1.7 > 8.8.8.8: ICMP echo request, id 9107, seq 21, length 64 >> IP 8.8.8.8 > 192.168.1.7: ICMP echo reply, id 9107, seq 21, length 64 >> IP 192.168.1.7 > 8.8.8.8: ICMP echo request, id 9107, seq 22, length 64 >> IP 8.8.8.8 > 192.168.1.7: ICMP echo reply, id 9107, seq 22, length 64 >> IP 192.168.1.7 > 8.8.8.8: ICMP echo request, id 9107, seq 23, length 64 >> IP 8.8.8.8 > 192.168.1.7: ICMP echo reply, id 9107, seq 23, length 64 >> >> I can't see any problem in the configuration, any hint? > > > Just a thought.. Are you accepting packets in the FORWARD chain in both > directions (eth0 -> wlan0, wlan0 -> eth0)? > > Vignesh -- Matteo Croce OpenWrt Developer -- To unsubscribe from this list: send the line "unsubscribe netfilter" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html