Hi Paul! The output is at the end of the message. --- Paul Howarth <paul@xxxxxxxxxxxx> ha scritto: > >>that your packet forwarding rules are broken. > What's > >>the output of: > >> > >># iptables -n -L > >> > >>on the machine connected to the cable modem? > > > > iptables -n -L > > Chain INPUT (policy ACCEPT) > > target prot opt source > destination > > ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 > tcp dpts:6881:6889 > > RH-Firewall-1-INPUT all -- 0.0.0.0/0 > 0.0.0.0/0 > > > > Chain FORWARD (policy ACCEPT) > > target prot opt source > destination > > RH-Firewall-1-INPUT all -- 0.0.0.0/0 > 0.0.0.0/0 > > ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 > > > > Chain OUTPUT (policy ACCEPT) > > target prot opt source > destination > > > > Chain RH-Firewall-1-INPUT (2 references) > > target prot opt source > destination > > ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 > > ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 > icmp type 255 > > ACCEPT esp -- 0.0.0.0/0 0.0.0.0/0 > > ACCEPT ah -- 0.0.0.0/0 0.0.0.0/0 > > ACCEPT udp -- 0.0.0.0/0 > 224.0.0.251 udp dpt:5353 > > ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 > udp dpt:631 > > ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 > state RELATED,ESTABLISHED > > ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 > state NEW tcp dpt:22 > > REJECT all -- 0.0.0.0/0 0.0.0.0/0 > reject-with icmp-host-prohibited > > Interesting; the first rule in the > RH-Firewall-1-INPUT chain would appear to > be accepting any packet, thus rendering the > remaining rules irrelevant. > However, I'm not an iptables expert and I don't use > Red Hat's firewall > utility, so maybe I'm misinterpreting that. > > What do you get from: > > # iptables -L -n -t nat Chain PREROUTING (policy ACCEPT) target prot opt source destination Chain POSTROUTING (policy ACCEPT) target prot opt source destination MASQUERADE all -- 0.0.0.0/0 0.0.0.0/0 Chain OUTPUT (policy ACCEPT) target prot opt source destination Thanks! Enrico ___________________________________ Nuovo Yahoo! Messenger: E' molto più divertente: Audibles, Avatar, Webcam, Giochi, Rubrica? Scaricalo ora! http://it.messenger.yahoo.it