Машина с виндой 192.168.0.2
sudo iptables-save
root@HomeServer:/etc# sudo iptables-save
# Generated by iptables-save v1.4.4 on Thu Dec 31 15:48:42 2009
*nat
:PREROUTING ACCEPT [916720:56233302]
:POSTROUTING ACCEPT [0:0]
:OUTPUT ACCEPT [874:74070]
-A POSTROUTING -o eth1 -j MASQUERADE
-A POSTROUTING -o ppp0 -j MASQUERADE
COMMIT
# Completed on Thu Dec 31 15:48:42 2009
# Generated by iptables-save v1.4.4 on Thu Dec 31 15:48:42 2009
*filter
:INPUT ACCEPT [3874618:256269668]
:FORWARD DROP [504:57899]
:OUTPUT ACCEPT [2940826:862866465]
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -i eth0 -m conntrack --ctstate NEW -j ACCEPT
COMMIT
# Completed on Thu Dec 31 15:48:42 2009
tcpdump -ni eth0 tcp port 4662
root@HomeServer:/etc# tcpdump -ni eth0 tcp port 4662
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes
15:53:51.408437 IP 192.168.0.2.2045 > 91.197.223.55.4662: Flags [S], seq 3968110941, win 65535, options [mss 1460,nop,nop,sackOK], length 0
15:53:54.398163 IP 192.168.0.2.2045 > 91.197.223.55.4662: Flags [S], seq 3968110941, win 65535, options [mss 1460,nop,nop,sackOK], length 0
15:54:00.433949 IP 192.168.0.2.2045 > 91.197.223.55.4662: Flags [S], seq 3968110941, win 65535, options [mss 1460,nop,nop,sackOK], length 0