<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: nat iptables rules in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/nat-iptables-rules/m-p/3835894#M24496</link>
    <description>Hi,&lt;BR /&gt;&lt;BR /&gt;echo-reply packets are not supposed to go into the nat table. I guess you will be able to see them in the INPUT, FORWARD and OUTPUT chains of the main table.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;cheers!&lt;BR /&gt;George</description>
    <pubDate>Thu, 03 Aug 2006 07:24:00 GMT</pubDate>
    <dc:creator>George Georgiev</dc:creator>
    <dc:date>2006-08-03T07:24:00Z</dc:date>
    <item>
      <title>nat iptables rules</title>
      <link>https://community.hpe.com/t5/operating-system-linux/nat-iptables-rules/m-p/3835887#M24489</link>
      <description>hi all,&lt;BR /&gt;I am trying to test iptables nat chains by matching ping command with LOG target.I am not getting any LOG matching the echo-reply; only i detect the echo-request packet in /var/log/messages.&lt;BR /&gt;&lt;BR /&gt;Does anyone have any idea ?&lt;BR /&gt; thanks</description>
      <pubDate>Wed, 02 Aug 2006 09:19:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/nat-iptables-rules/m-p/3835887#M24489</guid>
      <dc:creator>linuxtolinux</dc:creator>
      <dc:date>2006-08-02T09:19:14Z</dc:date>
    </item>
    <item>
      <title>Re: nat iptables rules</title>
      <link>https://community.hpe.com/t5/operating-system-linux/nat-iptables-rules/m-p/3835888#M24490</link>
      <description>What's the output of iptables -L?</description>
      <pubDate>Wed, 02 Aug 2006 11:18:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/nat-iptables-rules/m-p/3835888#M24490</guid>
      <dc:creator>George Liu_4</dc:creator>
      <dc:date>2006-08-02T11:18:48Z</dc:date>
    </item>
    <item>
      <title>Re: nat iptables rules</title>
      <link>https://community.hpe.com/t5/operating-system-linux/nat-iptables-rules/m-p/3835889#M24491</link>
      <description>Shalom,&lt;BR /&gt;&lt;BR /&gt;Quick fix:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.fs-security.com/" target="_blank"&gt;http://www.fs-security.com/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;This handy little product sets up iptables with logging. You can steal iptables code from it and I've used it as a firewall router for my supposedly sold business in the US and found it is unbreachable. It is much better than I am at writing iptables code.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Wed, 02 Aug 2006 11:46:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/nat-iptables-rules/m-p/3835889#M24491</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2006-08-02T11:46:14Z</dc:date>
    </item>
    <item>
      <title>Re: nat iptables rules</title>
      <link>https://community.hpe.com/t5/operating-system-linux/nat-iptables-rules/m-p/3835890#M24492</link>
      <description>hi &lt;BR /&gt;This is the output of the nat listing:&lt;BR /&gt;# /sbin/iptables -L -t nat&lt;BR /&gt;Chain PREROUTING (policy ACCEPT)&lt;BR /&gt;target     prot opt source               destination         &lt;BR /&gt;LOG        icmp --  anywhere             anywhere            icmp echo-request LOG level warning prefix `nat PREROUTING:' &lt;BR /&gt;LOG        icmp --  anywhere             anywhere            icmp echo-reply LOG level warning prefix `nat PREROUTING:' &lt;BR /&gt;&lt;BR /&gt;Chain POSTROUTING (policy ACCEPT)&lt;BR /&gt;target     prot opt source               destination         &lt;BR /&gt;LOG        icmp --  anywhere             anywhere            icmp echo-request LOG level warning prefix `nat POSTROUTING:' &lt;BR /&gt;LOG        icmp --  anywhere             anywhere            icmp echo-reply LOG level warning prefix `nat POSTROUTING:' &lt;BR /&gt;&lt;BR /&gt;Chain OUTPUT (policy ACCEPT)&lt;BR /&gt;target     prot opt source               destination         &lt;BR /&gt;LOG        icmp --  anywhere             anywhere            icmp echo-request LOG level warning prefix `nat OUTPUT:' &lt;BR /&gt;LOG        icmp --  anywhere             anywhere &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Regards</description>
      <pubDate>Thu, 03 Aug 2006 02:26:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/nat-iptables-rules/m-p/3835890#M24492</guid>
      <dc:creator>linuxtolinux</dc:creator>
      <dc:date>2006-08-03T02:26:44Z</dc:date>
    </item>
    <item>
      <title>Re: nat iptables rules</title>
      <link>https://community.hpe.com/t5/operating-system-linux/nat-iptables-rules/m-p/3835891#M24493</link>
      <description>are you sure that icmp is not drop in any rule before?&lt;BR /&gt;afaik NAT rules on the bottom, and iptables are first match wins(so if there is any rule before regarding icmp it's aplaid.)</description>
      <pubDate>Thu, 03 Aug 2006 02:30:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/nat-iptables-rules/m-p/3835891#M24493</guid>
      <dc:creator>g33k</dc:creator>
      <dc:date>2006-08-03T02:30:59Z</dc:date>
    </item>
    <item>
      <title>Re: nat iptables rules</title>
      <link>https://community.hpe.com/t5/operating-system-linux/nat-iptables-rules/m-p/3835892#M24494</link>
      <description>hi&lt;BR /&gt;I applied only the above nat rules only.&lt;BR /&gt;and all the other default policies are ACCEPT.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 03 Aug 2006 03:03:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/nat-iptables-rules/m-p/3835892#M24494</guid>
      <dc:creator>linuxtolinux</dc:creator>
      <dc:date>2006-08-03T03:03:19Z</dc:date>
    </item>
    <item>
      <title>Re: nat iptables rules</title>
      <link>https://community.hpe.com/t5/operating-system-linux/nat-iptables-rules/m-p/3835893#M24495</link>
      <description>I supose you'll answer yes but just to be sure that it's problem with iptables...&lt;BR /&gt;syslog is running?&lt;BR /&gt;packet forwarding is enabled?&lt;BR /&gt;ping is OK you are ping form system behind NAT some other system and getting answers?</description>
      <pubDate>Thu, 03 Aug 2006 05:04:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/nat-iptables-rules/m-p/3835893#M24495</guid>
      <dc:creator>g33k</dc:creator>
      <dc:date>2006-08-03T05:04:53Z</dc:date>
    </item>
    <item>
      <title>Re: nat iptables rules</title>
      <link>https://community.hpe.com/t5/operating-system-linux/nat-iptables-rules/m-p/3835894#M24496</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;echo-reply packets are not supposed to go into the nat table. I guess you will be able to see them in the INPUT, FORWARD and OUTPUT chains of the main table.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;cheers!&lt;BR /&gt;George</description>
      <pubDate>Thu, 03 Aug 2006 07:24:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/nat-iptables-rules/m-p/3835894#M24496</guid>
      <dc:creator>George Georgiev</dc:creator>
      <dc:date>2006-08-03T07:24:00Z</dc:date>
    </item>
    <item>
      <title>Re: nat iptables rules</title>
      <link>https://community.hpe.com/t5/operating-system-linux/nat-iptables-rules/m-p/3835895#M24497</link>
      <description>I would like you to post &lt;BR /&gt;&lt;BR /&gt;iptable -L&lt;BR /&gt;not &lt;BR /&gt;iptables -L -t nat&lt;BR /&gt;&lt;BR /&gt;reason: the icmp traffic could be in the earlier rules</description>
      <pubDate>Fri, 04 Aug 2006 13:45:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/nat-iptables-rules/m-p/3835895#M24497</guid>
      <dc:creator>George Liu_4</dc:creator>
      <dc:date>2006-08-04T13:45:42Z</dc:date>
    </item>
    <item>
      <title>Re: nat iptables rules</title>
      <link>https://community.hpe.com/t5/operating-system-linux/nat-iptables-rules/m-p/3835896#M24498</link>
      <description>THanks a lot</description>
      <pubDate>Mon, 07 Aug 2006 02:47:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/nat-iptables-rules/m-p/3835896#M24498</guid>
      <dc:creator>linuxtolinux</dc:creator>
      <dc:date>2006-08-07T02:47:06Z</dc:date>
    </item>
    <item>
      <title>Re: nat iptables rules</title>
      <link>https://community.hpe.com/t5/operating-system-linux/nat-iptables-rules/m-p/3835897#M24499</link>
      <description>If you have you log rule in the -t nat you will only see the initial packet as the reply is considered related and doesn hit the nat table &lt;BR /&gt;&lt;BR /&gt;have a look at &lt;BR /&gt;&lt;A href="http://l7-filter.sourceforge.net/PacketFlow.png" target="_blank"&gt;http://l7-filter.sourceforge.net/PacketFlow.png&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;place your log rule in the input or foward chain of the filter table (the detault one)&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Sun, 13 Aug 2006 22:32:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/nat-iptables-rules/m-p/3835897#M24499</guid>
      <dc:creator>Alexander Samad</dc:creator>
      <dc:date>2006-08-13T22:32:07Z</dc:date>
    </item>
  </channel>
</rss>

