Jason K Larson wrote:


Try such rules in POSTROUTING of the nat table, or in the OUTPUT or FORWARD chains of the filter table. Obviously these need to preceed any other rules that would move then to another chain or table as is likely happening with your INPUT chain.

I'd personally recommend POSTROUTING of the nat table.

FORWARD is actually the more correct chain to add such a rule to. Any packet that must be routed has to pass this chain. While post-routing certainly works, it's cleaner to put in in the forward chain as that's really where all firewalling decisions between any subnet can be made. For example, in the future you may decide to partition your network and firewall certain ports (virus vectors such as netbios) between these subnets as well as the outside world. FORWARD is the place where you would place these things.

OUTPUT, in my understanding, only applies to traffic originating from the firewall itself, not traffic passing through (traffic which is routed).


--
Jason K Larson


/*
PLUG: http://plug.org, #utah on irc.freenode.net
Unsubscribe: http://plug.org/mailman/options/plug
Don't fear the penguin.
*/





/*
PLUG: http://plug.org, #utah on irc.freenode.net
Unsubscribe: http://plug.org/mailman/options/plug
Don't fear the penguin.
*/

Reply via email to