> kernel: Packet log: input DENY wan PROTO=88 x.y.z.158:65535
> 224.0.0.10:65535 L=60 S=0xC0 I=0 F=0x0000 T=2 (#39)
>
> Yes, we know that protocol 88 is EIGRP.
>
> No, Ethernet <http://www.echogent.com/cgi-bin/fwlog.pl> does not
> recognize this.
>
> [1] Does this represent a problem?  Or, is this a candidate for Silent
> Deny?

Not a problem, unless you feel compelled to get a Cisco or other advnced
router running so you can start swapping routing info with your ISP...of
course they probably won't listen to you anyway (unless they don't know how
to properly configure their router).

Ideal candidate for the bit-bucket.

> [2] Dachstein Silent Deny handles *only* icmp, tcp and udp.  What is the
> best way to Silent Deny these?

Um...not exactly.  IPChains (and hence most of the network.conf settings)
only knows about icmp, tcp, and udp by NAME, but you can stick in arbitrary
protocols if you want.  From Dachstein network.conf:

# Traffic to completely ignore...define here to prevent filling your logs
# Space seperated list: protocol_srcip/mask_dstport
#SILENT_DENY="udp_207.235.84.1_route udp_207.235.84.0/24_37"

So you want something like:
SILENT_DENY="88_x.y.z.158"

<humor>Must be one of those new ipv6 addresses...is that base64
encoding?</humor>

Note the missing third field (port number), which only makes sense with
icmp/tcp/udp.  Leaving this blank prevents the error you would get trying to
specify a port with a custom protocol.

Not really obvious, but it should work...
Maybe I should make the comment something like:
# Space seperated list: protocol_srcip/mask[_dstport]

Charles Steinkuehler
http://lrp.steinkuehler.net
http://c0wz.steinkuehler.net (lrp.c0wz.com mirror)



_______________________________________________
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user

Reply via email to