On Mon, May 19, 2003 at 10:51:04PM +0100, Pedro Corte-Real wrote: > > iptables -N traffic > > iptables -A traffic -i eth0 > > iptables -A traffic -o eth0 > > > > iptables -A INPUT -j traffic > > iptables -A OUTPUT -j traffic > > I was trying to use this but it doesn't seam to account for masquerade > packets. Any way around this? Simply add a new rule, for your masq'ed paquets... iptables -A FORWARD -j traffic The "IMPUT" chain is for paquets going inside your box "OUTPUT" outside "FORWARD" threw your box, and that are masq'ed. -- __o _`\<,_ Marc Demlenne Public Key on www.keyserver.net (_)/ (_) GPG/768FA483 BFD8 E61B 180C 3E7A 3435 D393 B605 9979 768F A483
Attachment:
pgpBs2fwY8faz.pgp
Description: PGP signature