iptables -t nat -F nic # iptables -F nic # # NAT nic # #iptables -t nat -A POSTROUTING --source 192.1.3.0/24 --destination 0.0.0.0/0 -j SNAT --to-source 192.1.2.254 nic # iptables -t nat -A POSTROUTING --source 192.1.3.0/24 --destination 0.0.0.0/0 -j MASQUERADE -o eth0 nic # # make sure that we never acidentially let non-NAT'ed ESP through. nic # iptables -N LOGDROP nic # iptables -A LOGDROP -j LOG nic # iptables -A LOGDROP -j DROP nic # iptables -I FORWARD 1 --proto 50 -j LOGDROP nic # iptables -I FORWARD 2 --destination 192.0.2.0/24 -j LOGDROP nic # iptables -I FORWARD 3 --source 192.0.2.0/24 -j LOGDROP nic # # route nic # iptables -I INPUT 1 --destination 192.0.2.0/24 -j LOGDROP nic # # Display the table, so we know it is correct. nic # iptables -t nat -L -n Chain PREROUTING (policy ACCEPT) target prot opt source destination Chain INPUT (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination Chain POSTROUTING (policy ACCEPT) target prot opt source destination MASQUERADE all -- 192.1.3.0/24 0.0.0.0/0 nic # iptables -L -n Chain INPUT (policy ACCEPT) target prot opt source destination LOGDROP all -- 0.0.0.0/0 192.0.2.0/24 Chain FORWARD (policy ACCEPT) target prot opt source destination LOGDROP esp -- 0.0.0.0/0 0.0.0.0/0 LOGDROP all -- 0.0.0.0/0 192.0.2.0/24 LOGDROP all -- 192.0.2.0/24 0.0.0.0/0 Chain OUTPUT (policy ACCEPT) target prot opt source destination Chain LOGDROP (4 references) target prot opt source destination LOG all -- 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 DROP all -- 0.0.0.0/0 0.0.0.0/0 nic # echo "initdone" initdone