while MASQUERADE works, it is still best to use SNAT in static IP's

echo "1" > /proc/sys/net/ipv4/ip_forward
iptables -t nat -A POSTROUTING -s 192.168.0.0/24 -o eth1 -j SNAT --to
<PUBLIC_IP_HERE>

or if you want to specifically allow ip range from 192.168.0.1 to 100
you can simply say

iptables -t nat -A POSTROUTING -m iprange --src-range
192.168.0.1-192.168.0.100 -o eth1 -j SNAT --to <PUBLIC_IP_HERE>

By the way, you can also use squid to share internet connections


-jon-


On Tue, 29 Mar 2005 08:58:58 +0800, [EMAIL PROTECTED]
<[EMAIL PROTECTED]> wrote:
>  
> 
> In your iptables you can do it like: 
> 
> iptables -t nat -A POSTROUTING -s 192.168.0.0/255.255.255.0 -o eth1 -j
> MASQUERADE 
> iptables-save > /etc/sysconfig/iptables 
> 
> presto, you have a NAT router. 
>  
> 

-- 
Gabriel L. Briones III, ECE/RHCE
Linux User # 273591
09178501498
--
Philippine Linux Users' Group (PLUG) Mailing List
[email protected] (#PLUG @ irc.free.net.ph)
Official Website: http://plug.linux.org.ph
Searchable Archives: http://marc.free.net.ph
.
To leave, go to http://lists.q-linux.com/mailman/listinfo/plug
.
Are you a Linux newbie? To join the newbie list, go to
http://lists.q-linux.com/mailman/listinfo/ph-linux-newbie

Reply via email to