... addresses (in other words,any network address of 10 .0.0.0/8, 17 2 .16 .0.0 /12 , or 19 2 .16 8.0.0 /16 ). Figure 5 .1, for example,shows how traffic from the 10 .1. 2.0 network and the 19 2 .16 8 .1. 0 network can ... from the 19 2 .16 8 .1. 0/24 and 10 .10 0 .10 0.0/24 net-works will be masqueraded as 66 .1. 5 .1/ 8 on eth0 .The –A option adds the rule to the forwardchain, and the –I option specifies the eth0 interface .The ... net-works, including the 12 8 .18 7.22.0 network. However, only traffic from the 12 8 .18 7.22.0 canreach the Internet.Figure 5 .1 shows that traffic from the 10 .1. 2.0 and 19 2 .16 8 .1. 0 networks cannot...