iptables -t nat -F nic # iptables -F nic # # NAT nic # iptables -t nat -A POSTROUTING -s 192.1.3.0/24 -p udp --sport 4500 -j SNAT --to-source 192.1.2.254:3500-3700 nic # iptables -t nat -A POSTROUTING -s 192.1.3.0/24 -p udp --sport 500 -j SNAT --to-source 192.1.2.254:2500-2700 nic # iptables -t nat -A POSTROUTING --source 192.1.3.0/24 --destination 0.0.0.0/0 -j SNAT --to-source 192.1.2.254 nic # # make sure that we never acidentially let ESP through. nic # # nic # iptables -I FORWARD 1 --proto 50 -j DROP nic # iptables -I FORWARD 2 --destination 192.0.2.0/24 -j DROP nic # iptables -I FORWARD 3 --source 192.0.2.0/24 -j DROP nic # # route nic # iptables -I INPUT 1 --destination 192.0.2.0/24 -j DROP nic # # Display the table, so we know it is correct. nic # iptables -t nat -L -n Chain PREROUTING (policy ACCEPT) target prot opt source destination Chain INPUT (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination Chain POSTROUTING (policy ACCEPT) target prot opt source destination SNAT udp -- 192.1.3.0/24 0.0.0.0/0 udp spt:4500 to:192.1.2.254:3500-3700 SNAT udp -- 192.1.3.0/24 0.0.0.0/0 udp spt:500 to:192.1.2.254:2500-2700 SNAT all -- 192.1.3.0/24 0.0.0.0/0 to:192.1.2.254 nic # iptables -L -n Chain INPUT (policy ACCEPT) target prot opt source destination DROP all -- 0.0.0.0/0 192.0.2.0/24 Chain FORWARD (policy ACCEPT) target prot opt source destination DROP esp -- 0.0.0.0/0 0.0.0.0/0 DROP all -- 0.0.0.0/0 192.0.2.0/24 DROP all -- 192.0.2.0/24 0.0.0.0/0 Chain OUTPUT (policy ACCEPT) target prot opt source destination nic # echo "initdone" initdone