while MASQUERADE works, it is still best to use SNAT in static IP's echo "1" > /proc/sys/net/ipv4/ip_forward iptables -t nat -A POSTROUTING -s 192.168.0.0/24 -o eth1 -j SNAT --to <PUBLIC_IP_HERE>
or if you want to specifically allow ip range from 192.168.0.1 to 100 you can simply say iptables -t nat -A POSTROUTING -m iprange --src-range 192.168.0.1-192.168.0.100 -o eth1 -j SNAT --to <PUBLIC_IP_HERE> By the way, you can also use squid to share internet connections -jon- On Tue, 29 Mar 2005 08:58:58 +0800, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: > > > In your iptables you can do it like: > > iptables -t nat -A POSTROUTING -s 192.168.0.0/255.255.255.0 -o eth1 -j > MASQUERADE > iptables-save > /etc/sysconfig/iptables > > presto, you have a NAT router. > > -- Gabriel L. Briones III, ECE/RHCE Linux User # 273591 09178501498 -- Philippine Linux Users' Group (PLUG) Mailing List [email protected] (#PLUG @ irc.free.net.ph) Official Website: http://plug.linux.org.ph Searchable Archives: http://marc.free.net.ph . To leave, go to http://lists.q-linux.com/mailman/listinfo/plug . Are you a Linux newbie? To join the newbie list, go to http://lists.q-linux.com/mailman/listinfo/ph-linux-newbie
