hi,
* Knut Ove Hauge ([EMAIL PROTECTED]) wrote:
> But that is corrected now. I have redhat highest priority ipchanins
> firewall.But did this with masquerade.
> ipchains -P forward DENY
> ipchains -A forward -i eth0 -j MASQ
Use iptables instead of ipchains.
iptables can do much more in addition to what ipchain does. One interesting
feature it does is statefull filtering.
> Destination Gateway Genmask Flags Metric Ref Use
> Iface
> 192.168.0.0 * 255.255.255.0 U 0 0 0
> eth1
> 217.118.40.0 * 255.255.252.0 U 0 0 0
> eth0
> 127.0.0.0 * 255.0.0.0 U 0 0 0
> lo
> default r-osl-ds1-lo40. 0.0.0.0 UG 0 0 0
> eth0
Routing table on the linux machine seems ok.
what about the interface detail?
# /sbin/ifconfig
The details to be verified in the interface is
interface ipaddress
netmask address
any collisions
interrupt number (should not collide with any other device used)
> Assigned IP-adress 192.168.0.3
> Subnetmask 255.255.255.0
> Gateway 192.168.0.1 #my eth1 card
This seems ok
usually people do a mistake of assigning gateway ip to the interface
public ip(on the client machines). and the client machines static ip
to a different network (like 192.168.1.3).
thats the reason i had asked for the client config details
-cheers-
rk
--
---------------------------------------------
Ramakrishna | [EMAIL PROTECTED]
Exocore Consulting | http://www.exocore.com
Bangalore, India | +91 (80) 344-0397
---------------------------------------------
--
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe
https://listman.redhat.com/mailman/listinfo/redhat-list