Posted on 2009-07-08
Last Modified: 2012-05-07

I have some rules as below:
-A POSTROUTING -s -p udp -m udp --dport 9112 -j SNAT --to-source

I will highly appreciate if someone can help me understand it.  I am not getting where this POSTROUTING chain does..
Question by:its_ns_04

Expert Comment

ID: 24803970
this is example of NAT first one belongs to Source Nat and second is for jump target MASQUERADE which is used for sharing internet from an public ip to local lan

though i dont know much about NAT hopefully some other will assist u better soon :-)
LVL 27

Accepted Solution

Nopius earned 500 total points
ID: 24813923
> -A POSTROUTING -s -p udp -m udp --dport 9112 -j SNAT --to-source

This rule allows LAN station 4.14 to access UDP destination port 9112 on any Internet host and it will be visible a 202.x.x.0, not as 192.x.x.14


This rule probably provides internet access to all LAN users from 1.0 network.


Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Cannot add a NFS Server to Veeam as a repository 11 172
Block sender e-mail address in Postfix 4 64
BASH script to modify crontab? 3 47
linux pull logs and export FTP 4 58
Introduction We as admins face situation where we need to redirect websites to another. This may be required as a part of an upgrade keeping the old URL but website should be served from new URL. This document would brief you on different ways ca…
Linux users are sometimes dumbfounded by the severe lack of documentation on a topic. Sometimes, the documentation is copious, but other times, you end up with some obscure "it varies depending on your distribution" over and over when searching for …
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

919 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now