The setup looks like a fairly simple masquerade would let M2 out to the
internet.  If you are not worried about firewalls or other security items on
M1 you could try a simple setup like the one I have behind a firewall at a
friends house.  Here is the content of the /etc/sysconfig/iptables file that
loads on boot.

# Generated by iptables-save v1.2.3 on Mon Oct 29 00:08:50 2001
*mangle
:PREROUTING ACCEPT [3367:4638601]
:OUTPUT ACCEPT [2173:124171]
COMMIT
# Completed on Mon Oct 29 00:08:50 2001
# Generated by iptables-save v1.2.3 on Mon Oct 29 00:08:50 2001
*nat
:PREROUTING ACCEPT [82:6227]
:POSTROUTING ACCEPT [0:0]
:OUTPUT ACCEPT [7:418]
-A POSTROUTING -o eth0 -j MASQUERADE
COMMIT
# Completed on Mon Oct 29 00:08:50 2001
# Generated by iptables-save v1.2.3 on Mon Oct 29 00:08:50 2001
*filter
:INPUT ACCEPT [3367:4638601]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [2174:124223]
COMMIT
# Completed on Mon Oct 29 00:08:50 2001

It has been running awhile if memory serves me right I used 

iptables -A POSTROUTING -o eth0 -j MASQUERADE 

And when it worked I just saved it so the init script loads it on boot.

John B. Hough
[EMAIL PROTECTED]
[EMAIL PROTECTED]
[EMAIL PROTECTED]
[EMAIL PROTECTED]
Something is bound to reach me..... . . . .  .  . 



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to