" From: Jim Sandoz <[EMAIL PROTECTED]>
"
" andrew,
" to help, we need to know a little more about your config.
" see this ipf faq entry:
" http://www.phildev.net/ipf/IPFmail.html#mail3
oops! i have the faq but haven't read it as closely as i should...
" also, what does (as root)
" # /usr/sbin/ndd /dev/ip ip_forwarding
" report?
i did catch that one...
okay, here's the buttload --
btw i see that ipfstat reports 73 blocked outgoing packets, but this
isn't apparently related to the notebook; i just tried again and that
number didn't change.
# uname -a
SunOS tiamat 5.8 Generic_117350-25 sun4u sparc SUNW,Ultra-1
# isainfo -vk
64-bit sparcv9 kernel modules
# ifconfig -a
lo0: flags=1000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4> mtu 8232 index 1
inet 127.0.0.1 netmask ff000000
le0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 2
inet 10.0.0.1 netmask ff000000 broadcast 10.255.255.255
ether 8:0:20:82:be:ba
ipdptp0: flags=10088d1<UP,POINTOPOINT,RUNNING,NOARP,MULTICAST,PRIVATE,IPv4> mtu
1500 index 3
inet 216.41.37.11 --> 208.218.128.9 netmask ffffff00
ether 0:0:0:0:0:0
# netstat -rn
Routing Table: IPv4
Destination Gateway Flags Ref Use Interface
-------------------- -------------------- ----- ----- ------ ---------
208.218.128.9 216.41.37.11 UH 1 13 ipdptp0
10.0.0.0 10.0.0.1 U 1 80 le0
224.0.0.0 216.41.37.11 U 1 0 ipdptp0
default 216.41.37.11 U 1 61933 ipdptp0
127.0.0.1 127.0.0.1 UH 113179009 lo0
# netstat -i
Name Mtu Net/Dest Address Ipkts Ierrs Opkts Oerrs Collis Queue
lo0 8232 loopback localhost 3180254 0 3180254 0 0 0
le0 1500 arpanet tiamat.arpa 66168 0 13642 1 3 0
ipdptp0 1500 208.218.128.9 tiamat.an.bradford.ma.us 0 0 0 0 0
0
# netstat -s -P ip
IPv4 ipForwarding = 1 ipDefaultTTL = 255
ipInReceives =1783670 ipInHdrErrors = 1
ipInAddrErrors = 0 ipInCksumErrs = 0
ipForwDatagrams =278144 ipForwProhibits = 30429
ipInUnknownProtos = 0 ipInDiscards = 706
ipInDelivers =4648070 ipOutRequests =1336345
ipOutDiscards = 13 ipOutNoRoutes = 0
ipReasmTimeout = 60 ipReasmReqds = 0
ipReasmOKs = 0 ipReasmFails = 0
ipReasmDuplicates = 0 ipReasmPartDups = 0
ipFragOKs = 0 ipFragFails = 0
ipFragCreates = 0 ipRoutingDiscards = 0
tcpInErrs = 24 udpNoPorts = 13900
udpInCksumErrs = 3 udpInOverflows = 0
rawipInOverflows = 0 ipsecInSucceeded = 0
ipsecInFailed = 0 ipInIPv6 = 0
ipOutIPv6 = 0 ipOutSwitchIPv6 = 1359
# ipf -V
ipf: IP Filter: v3.4.35 (496)
Kernel: IP Filter: v3.4.35
Running: yes
Log Flags: 0 = none set
Default: pass all, Logging: available
Active list: 0
# ipfstat
dropped packets: in 0 out 0
non-data packets: in 13 out 13
no-data packets: in 0 out 0
non-ip packets: in 1 out 0
bad packets: in 0 out 0
copied messages: in 53 out 78
IPv6 packets: in 0 out 0
input packets: blocked 38849 passed 1783853 nomatch 43880 counted 0
short 0
output packets: blocked 73 passed 1614401 nomatch 408 counted 0 short 0
input packets logged: blocked 1764 passed 0
output packets logged: blocked 0 passed 0
packets logged: input 0 output 0
log failures: input 0 output 0
fragment state(in): kept 0 lost 0 not fragmented 0
fragment state(out): kept 0 lost 0 not fragmented 0
packet state(in): kept 6117 lost 0
packet state(out): kept 89650 lost 73
ICMP replies: 0 TCP RSTs sent: 0
Invalid source(in): 0
Result cache hits(in): 44158 (out): 18378
IN Pullups succeeded: 0 failed: 0
OUT Pullups succeeded: 1958 failed: 0
Fastroute successes: 0 failures: 0
TCP cksum fails(in): 0 (out): 0
Packet log flags set: (0)
none
# ipfstat -io
pass out on ipdptp0 proto tcp/udp from 216.41.37.11/32 to any keep state
pass out on ipdptp0 proto icmp from 216.41.37.11/32 to any keep state
block in log quick on ipdptp0 proto icmp from any to 216.41.37.11/32
block in log quick from any to any with ipopt
block in log quick proto tcp from any to any with short
block in on ipdptp0 from any to any
pass in on ipdptp0 proto tcp from 208.218.130.0/27 to 216.41.37.11/32 port = 25
flags S/FSRPAU keep state keep frags
pass in on ipdptp0 proto tcp from any to 216.41.37.11/32 port > 32767 flags
S/FSRPAU keep state keep frags head 100
block in from 0.0.0.0/8 to any group 100
block in from 10.0.0.0/8 to any group 100
block in from 127.0.0.0/8 to any group 100
block in from 169.154.0.0/16 to any group 100
block in from 172.16.0.0/12 to any group 100
block in from 192.0.2.0/24 to any group 100
block in from 192.168.0.0/16 to any group 100
block in from 216.41.37.11/32 to any group 100
block in from 224.0.0.0/3 to any group 100
# ipnat -slv
mapped in 311 out 194
added 73 expired 66
no memory 0 bad nat 0
inuse 0
rules 2
wilds 0
table ffffffff7fffe7b0 list 300000583c8
List of active MAP/Redirect filters:
map ipdptp0 10.0.0.0/8 -> 216.41.37.11/32 portmap tcp/udp auto
map ipdptp0 10.0.0.0/8 -> 216.41.37.11/32
List of active sessions:
List of active host mappings:
# ndd /dev/ip ip_forwarding
1
________________________________________________________________________
Andrew Hay the genius nature
internet rambler is to see what all have seen
[EMAIL PROTECTED] and think what none thought