The setup looks like a fairly simple masquerade would let M2 out to the internet. If you are not worried about firewalls or other security items on M1 you could try a simple setup like the one I have behind a firewall at a friends house. Here is the content of the /etc/sysconfig/iptables file that loads on boot.
# Generated by iptables-save v1.2.3 on Mon Oct 29 00:08:50 2001 *mangle :PREROUTING ACCEPT [3367:4638601] :OUTPUT ACCEPT [2173:124171] COMMIT # Completed on Mon Oct 29 00:08:50 2001 # Generated by iptables-save v1.2.3 on Mon Oct 29 00:08:50 2001 *nat :PREROUTING ACCEPT [82:6227] :POSTROUTING ACCEPT [0:0] :OUTPUT ACCEPT [7:418] -A POSTROUTING -o eth0 -j MASQUERADE COMMIT # Completed on Mon Oct 29 00:08:50 2001 # Generated by iptables-save v1.2.3 on Mon Oct 29 00:08:50 2001 *filter :INPUT ACCEPT [3367:4638601] :FORWARD ACCEPT [0:0] :OUTPUT ACCEPT [2174:124223] COMMIT # Completed on Mon Oct 29 00:08:50 2001 It has been running awhile if memory serves me right I used iptables -A POSTROUTING -o eth0 -j MASQUERADE And when it worked I just saved it so the init script loads it on boot. John B. Hough [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] Something is bound to reach me..... . . . . . . _______________________________________________ Redhat-list mailing list [EMAIL PROTECTED] https://listman.redhat.com/mailman/listinfo/redhat-list