You make the firewall rules specific to the router interface eth0 so they don't effect eth1..
eg
/sbin/iptables -A INPUT -i eth0 -p udp --dport 4672 -j ACCEPT ## aMule UDP
/sbin/iptables -A INPUT -i eth0 -p tcp --dport 4662 -j ACCEPT ## aMule TCP
/sbin/iptables -A INPUT -i eth0 -p tcp --dport 21 -j ACCEPT ## FTP - Connection
/sbin/iptables -A INPUT -i eth0 -p tcp --dport 22 -j ACCEPT ## SSH
/sbin/iptables -A INPUT -i eth0 -m state --state ESTABLISHED,RELATED -j ACCEPT
/sbin/iptables -A INPUT -i lo -j ACCEPT
/sbin/iptables -A INPUT -i eth0 -j LOG --log-level 4 --log-prefix "ATTACK"
/sbin/iptables -A INPUT -i eth0 -j DROP
The last POSTROUTING rule is already being done by the previous POSTROUTING MASQUERADE rule, so is unnecessary.
Have a look at the tutorial at
http://iptables-tutorial.frozentux.n...-tutorial.html