Hi Andreas, Andreas Koenecke schrieb:
[...]
s ja eh nicht.
Poste doch mal die Ausgaben von:
- 'route -n' - 'iptables -t nat -L POSTROUTING -nv' - 'iptables -L FORWARD -nv'
Gruß
Andreas
gibt folgendes: route-> cyan:~ # route -n Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 0.0.0.0 192.168.2.1 255.255.255.255 UGH 0 0 0 eth0 192.168.2.0 0.0.0.0 255.255.255.0 U 0 0 0 eth1 169.254.0.0 0.0.0.0 255.255.0.0 U 0 0 0 eth0 192.168.0.0 0.0.0.0 255.255.0.0 U 0 0 0 eth0 127.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 lo 0.0.0.0 192.168.2.1 0.0.0.0 UG 0 0 0 eth1 0.0.0.0 192.168.2.1 0.0.0.0 UG 0 0 0 eth0 cyan:~ # postrouting-> cyan:~ # iptables -t nat -L POSTROUTING -nv Chain POSTROUTING (policy ACCEPT 3995 packets, 295K bytes) pkts bytes target prot opt in out source destination 94 13758 MASQUERADE all -- * eth1 0.0.0.0/0 0.0.0.0/0 cyan:~ # forward-> cyan:~ # iptables -L FORWARD -nv Chain FORWARD (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 0 0 TCPMSS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU 0 0 forward_int all -- eth0 * 0.0.0.0/0 0.0.0.0/0 0 0 forward_ext all -- eth1 * 0.0.0.0/0 0.0.0.0/0 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-FWD-ILL-ROUTING ' 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 cyan:~ # Ich habe bisher ausschließlich Yast zur Konfiguration benutzt. Peter