hi, * Knut Ove Hauge ([EMAIL PROTECTED]) wrote: > But that is corrected now. I have redhat highest priority ipchanins > firewall.But did this with masquerade. > ipchains -P forward DENY > ipchains -A forward -i eth0 -j MASQ Use iptables instead of ipchains. iptables can do much more in addition to what ipchain does. One interesting feature it does is statefull filtering.
> Destination Gateway Genmask Flags Metric Ref Use > Iface > 192.168.0.0 * 255.255.255.0 U 0 0 0 > eth1 > 217.118.40.0 * 255.255.252.0 U 0 0 0 > eth0 > 127.0.0.0 * 255.0.0.0 U 0 0 0 > lo > default r-osl-ds1-lo40. 0.0.0.0 UG 0 0 0 > eth0 Routing table on the linux machine seems ok. what about the interface detail? # /sbin/ifconfig The details to be verified in the interface is interface ipaddress netmask address any collisions interrupt number (should not collide with any other device used) > Assigned IP-adress 192.168.0.3 > Subnetmask 255.255.255.0 > Gateway 192.168.0.1 #my eth1 card This seems ok usually people do a mistake of assigning gateway ip to the interface public ip(on the client machines). and the client machines static ip to a different network (like 192.168.1.3). thats the reason i had asked for the client config details -cheers- rk -- --------------------------------------------- Ramakrishna | [EMAIL PROTECTED] Exocore Consulting | http://www.exocore.com Bangalore, India | +91 (80) 344-0397 --------------------------------------------- -- redhat-list mailing list unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe https://listman.redhat.com/mailman/listinfo/redhat-list