hi,

* Knut Ove Hauge ([EMAIL PROTECTED]) wrote:
> But that is corrected now. I have redhat highest priority ipchanins
> firewall.But   did this with masquerade.
> ipchains -P forward DENY
> ipchains -A forward -i eth0 -j MASQ
        Use iptables instead of ipchains.
iptables can do much more in addition to what ipchain does. One interesting 
feature it does is statefull filtering.

> Destination     Gateway         Genmask         Flags Metric Ref    Use
> Iface
> 192.168.0.0     *               255.255.255.0   U     0      0        0
> eth1
> 217.118.40.0    *               255.255.252.0   U     0      0        0
> eth0
> 127.0.0.0       *               255.0.0.0       U     0      0        0
> lo
> default         r-osl-ds1-lo40. 0.0.0.0         UG    0      0        0
> eth0
        Routing table on the linux machine seems ok. 

what about the interface detail? 
        # /sbin/ifconfig   

        The details to be verified in the interface is
                interface ipaddress
                netmask address
                any collisions
                interrupt number (should not collide with any other device used)       
       
> Assigned IP-adress 192.168.0.3
> Subnetmask 255.255.255.0
> Gateway 192.168.0.1 #my eth1 card
        This seems ok

        usually people do a mistake of assigning  gateway ip to the interface
        public ip(on the client machines). and the client machines static ip 
        to a different network (like 192.168.1.3). 
        thats the reason i had asked for the client config details
        

-cheers-

rk
--
---------------------------------------------
Ramakrishna         | [EMAIL PROTECTED]                    
Exocore Consulting  | http://www.exocore.com            
Bangalore, India    | +91 (80) 344-0397 
---------------------------------------------



-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to