以下是pc1上的iptables
*filter
:INPUT ACCEPT [0]
:FORWARD ACCEPT [0]
:OUTPUT ACCEPT [0]
:RH-Firewall-1-INPUT - [0]
-A INPUT -j RH-Firewall-1-INPUT
-A FORWARD -j RH-Firewall-1-INPUT
-A RH-Firewall-1-INPUT -i lo -j ACCEPT
-A RH-Firewall-1-INPUT -i eth0 -j ACCEPT
-A RH-Firewall-1-INPUT -i eth1 -j ACCEPT
-A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT
-A RH-Firewall-1-INPUT -p 50 -j ACCEPT
-A RH-Firewall-1-INPUT -p 51 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 3000 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 25 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 80 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 21 -j ACCEPT
-A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited
*nat
REROUTING ACCEPT [24751]

OSTROUTING ACCEPT [1088]

:OUTPUT ACCEPT [1086]
[1] -A POSTROUTING -s 192.168.0.0/255.255.255.0 -o eth0 -j SNAT --to 202.22.*.*
COMMIT
以下是pc2上的iptables
*filter
:INPUT ACCEPT [14288]
:FORWARD ACCEPT [0]
:OUTPUT ACCEPT [9261]
[0] -A FORWARD -s 172.16.0.0/255.255.0.0 -j ACCEPT
[0] -A FORWARD -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
COMMIT
# Completed on Wed Dec 1 12:02:10 2004
# Generated by iptables-save v1.2.7a on Wed Dec 1 12:02:10 2004
*nat
REROUTING ACCEPT [24751]

OSTROUTING ACCEPT [1088]

:OUTPUT ACCEPT [1086]
[1] -A POSTROUTING -s 172.16.0.0/255.255.0.0 -o eth0 -j MASQUERADE
COMMIT