I've done.
If you're referring to using your Linux box as a router, you'll have to change a line of /etc/sysctl.conf
Change this line:
net.ipv4.ip_forward = 0 to
net.ipv4.ip_forward = 1
If you're referring to something else, you'll have to be more explicit, such as including the output of:
iptables -L shows the policy RH based of the kernel. route -n shows the kernel IP routingtable
Regards, Msquared...
Many thanks for help. Here the outputs:
[root@kurt root]# iptables -L Chain INPUT (policy ACCEPT) target prot opt source destination RH-Lokkit-0-50-INPUT all -- anywhere anywhere
Chain FORWARD (policy ACCEPT) target prot opt source destination RH-Lokkit-0-50-INPUT all -- anywhere anywhere
Chain OUTPUT (policy ACCEPT) target prot opt source destination
Chain RH-Lokkit-0-50-INPUT (2 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere
ACCEPT udp -- ns0.03.net anywhere udp spt:domain
ACCEPT udp -- unused anywhere udp spt:domain
REJECT tcp -- anywhere anywhere tcp flags:SYN,RST,ACK/SYN reject-with icmp-port-unreachable
REJECT udp -- anywhere anywhere udp reject-with icmp-port-unreachable
[root@kurt root]# route -n
Kernel IP Routentabelle
Ziel Router Genmask Flags Metric Ref Use Iface
217.5.98.177 0.0.0.0 255.255.255.255 UH 0 0 0 ppp0
192.168.0.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0
169.254.0.0 0.0.0.0 255.255.0.0 U 0 0 0 eth0
127.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 lo
0.0.0.0 217.5.98.177 0.0.0.0 UG 0 0 0 ppp0
pings to ppp0 and eth0 from LAN ok but not any more.
Regards Kurt.
-- Shrike-list mailing list Shrike-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/shrike-list