Try changing the parameter order as well as the chain that you're adding
to...
iptables -t nat -A POSTROUTING -o eth1 -j MASQUERADE
You had the option specifying the top level table in between the chain and
rule parameters of the -A switch.
HTH
----- Original Message -----
From:
I'll correct my statement : it shouldn't work - MASQUERADE is only valid
for POSTORUTING :-( ... but how do I do that instead ?
didn't find anything useful yet - even not at netfilter.org in the nat
howtos...
I need to masq locally generated outgoing packets for dynamic ip ...
-bruno
-- Check the headers for your unsubscription address For additional commands, e-mail: suse-security-help@suse.com Security-related bug reports go to security@suse.de, not here