Raoul Snyman wrote:
| route -n ghana:~ # route -n Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 165.146.128.1 0.0.0.0 255.255.255.255 UH 0 0 0 dsl0 192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 eth1 169.254.0.0 0.0.0.0 255.255.0.0 U 0 0 0 eth0 10.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 eth0 127.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 lo 0.0.0.0 165.146.128.1 0.0.0.0 UG 0 0 0 dsl0
Okay, that does seem to be correct. So, your 10.0.0.2 interface is actually an unused interface connected to no network at all. (^-^)
| cat /etc/resolv.conf ### BEGIN INFO # # Modified_by: pppd # Backup: /etc/resolv.conf.saved.by.pppd.dsl0 # Process: pppd # Process_id: 4182 # Script: /etc/ppp/ip-up # Saveto: # ### END INFO search worldviewafrica.org nameserver 196.25.255.34 nameserver 196.25.255.3
That one looks good also. Have you checked if your clients also have that nameserver? Or did you set up a local nameserver on your router?
| iptables -t nat -n -v -L # (only the router)
Chain POSTROUTING (policy ACCEPT 99 packets, 7214 bytes) ~ pkts bytes target prot opt in out source destination ~ 58 2648 MASQUERADE all -- * dsl0 0.0.0.0/0 0.0.0.0/0
This seems to indicate that you did set up masquerading. Strange. Okay, so let's start with one of your clients. Please set them up to have the same nameserver as the one in your router. The default gateway of your clients should be the internal ip of your router. /etc/resolv.conf search worldviewafrica.org nameserver 196.25.255.34 nameserver 196.25.255.3 default gateway: 192.168.1.250 Please check that you did actually set the correct gateway with the route -n output! If your client still can not ping to the internet, there is nothing left to try on the client side. If that doesn't work you need to set up the most simple masquerading rules possible: - deactivate and shut down the Susefirewall - reboot the router - execute the script below (after you are connected to the internet) masquerade.sh: # Forwarding activated echo 1 > /proc/sys/net/ipv4/ip_forward # Masquerading iptables -A POSTROUTING -t nat -o dsl0 -j MASQUERADE # Forwarding iptables -A FORWARD -i eth1 -o dsl0 -j ACCEPT Sandy