> This is fairly useless information (it won't show interfaces,
> etc)... at a minimum, you should post the full output from both:
>
> iptables -t filter -nvL
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
959 170K ACCEPT all -- lo * 0.0.0.0/0
0.0.0.0/0
0 0 LOG all -- !lo * 127.0.0.0/8
0.0.0.0/0 LOG flags 0
level 4
0 0 ACCEPT all -- eth0 * 0.0.0.0/0
255.255.255.255
95 17285 ACCEPT all -- eth0 * 192.168.1.0/24
0.0.0.0/0
0 0 ACCEPT !tcp -- eth0 * 0.0.0.0/0
224.0.0.0/4
0 0 LOG all -- ppp0 * 192.168.1.0/24
0.0.0.0/0 LOG flags 0
level 4
0 0 DROP all -- ppp0 * 192.168.1.0/24
0.0.0.0/0
0 0 ACCEPT all -- ppp0 * 0.0.0.0/0
255.255.255.255
69921 45M ACCEPT all -- ppp0 * 0.0.0.0/0
203.54.249.3
0 0 LOG all -- * * 0.0.0.0/0
0.0.0.0/0 LOG flags 0
level 4
0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- eth0 ppp0 192.168.1.0/24
0.0.0.0/0
0 0 ACCEPT all -- ppp0 eth0 0.0.0.0/0
192.168.1.0/24
0 0 LOG all -- * ppp0 0.0.0.0/0
192.168.1.0/24 LOG flags 0
level 4
0 0 DROP all -- * ppp0 0.0.0.0/0
192.168.1.0/24
0 0 LOG all -- * * 0.0.0.0/0
0.0.0.0/0 LOG flags 0
level 4
0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0
Chain OUTPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
959 170K ACCEPT all -- * lo 0.0.0.0/0
0.0.0.0/0
38 8751 ACCEPT all -- * eth0 0.0.0.0/0
192.168.1.0/24
0 0 ACCEPT !tcp -- * eth0 0.0.0.0/0
224.0.0.0/4
0 0 LOG all -- * ppp0 0.0.0.0/0
192.168.1.0/24 LOG flags 0
level 4
0 0 DROP all -- * ppp0 0.0.0.0/0
192.168.1.0/24
72111 21M ACCEPT all -- * ppp0 203.54.249.3
0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0
0.0.0.0/0 LOG flags 0
level 4
0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0
> iptables -t nat -nvL
Chain PREROUTING (policy ACCEPT 933 packets, 152K bytes)
pkts bytes target prot opt in out source
destination
Chain POSTROUTING (policy ACCEPT 1147 packets, 69704 bytes)
pkts bytes target prot opt in out source
destination
18 4470 MASQUERADE all -- * * 192.168.1.0/24
0.0.0.0/0
Chain OUTPUT (policy ACCEPT 1165 packets, 74174 bytes)
pkts bytes target prot opt in out source
destination
> >From the sounds of it, your iptables configuration is messed up.
>
> C.
> --
> --==============================================--
> Crossfire | This email was brought to you
> [EMAIL PROTECTED] | on 100% Recycled Electrons
> --==============================================--
--
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug