On Mon, May 19, 2003 at 10:51:04PM +0100, Pedro Corte-Real wrote: > > iptables -N traffic > > iptables -A traffic -i eth0 > > iptables -A traffic -o eth0 > > > > iptables -A INPUT -j traffic > > iptables -A OUTPUT -j traffic > > I was trying to use this but it doesn't seam to account for masquerade > packets. Any way around this?
Simply add a new rule, for your masq'ed paquets...
iptables -A FORWARD -j traffic
The "IMPUT" chain is for paquets going inside your box
"OUTPUT" outside
"FORWARD" threw your box, and that are masq'ed.
--
__o
_`\<,_ Marc Demlenne Public Key on www.keyserver.net
(_)/ (_) GPG/768FA483 BFD8 E61B 180C 3E7A 3435 D393 B605 9979 768F A483
pgpghyIIIDUdo.pgp
Description: PGP signature

