Hello all, can someone tell me why i receive a lot of DENY messages for certain IP-Addresses and ports. I've upgraded to the latest LRP and Linux version 2.2.19.
I'm linked to a CABLE modem. If this is the reason (I'm receiving packets from other users on the same Cable segment), is there a way to remove these DENY messages from the log ? See DENY messages below. Thx a lot.. ----------- Dec 28 20:16:44 firewall syslogd 1.3-3#31.slink1: restart. Dec 28 20:16:44 firewall kernel: klogd 1.3-3#31.slink1, log source = /proc/kmsg started. Dec 28 20:16:44 firewall kernel: Cannot find map file. Dec 28 20:16:44 firewall kernel: Loaded 2 symbols from 11 modules. Dec 28 20:16:44 firewall kernel: Linux version 2.2.19-3-LEAF (root@debian) (gcc version 2.7.2.3) #1 Sat Dec 1 12:15:05 CST 2001 Dec 28 20:16:44 firewall kernel: BIOS-provided physical RAM map: Dec 28 20:16:44 firewall kernel: BIOS-e820: 0009fc00 @ 00000000 (usable) Dec 28 20:16:44 firewall kernel: BIOS-e820: 00c80000 @ 00100000 (usable) Dec 28 20:16:44 firewall kernel: Detected 75021 kHz processor. Dec 28 20:16:44 firewall kernel: Console: colour VGA+ 80x25 Dec 28 20:16:44 firewall kernel: Calibrating delay loop... 149.50 BogoMIPS Dec 28 20:16:44 firewall kernel: Memory: 11536k/13824k available (732k kernel code, 416k reserved, 396k data, 44k init) Dec 28 20:16:44 firewall kernel: Dentry hash table entries: 2048 (order 2, 16k) Dec 28 20:16:44 firewall kernel: Buffer cache hash table entries: 16384 (order 4, 64k) Dec 28 20:16:44 firewall kernel: Page cache hash table entries: 4096 (order 2, 16k) Dec 28 20:16:44 firewall kernel: CPU: Intel Pentium 75 - 200 stepping 05 Dec 28 20:16:44 firewall kernel: Checking 386/387 coupling... OK, FPU using exception 16 error reporting. Dec 28 20:16:44 firewall kernel: Checking 'hlt' instruction... OK. Dec 28 20:16:44 firewall kernel: Intel Pentium with F0 0F bug - workaround enabled. Dec 28 20:16:44 firewall kernel: POSIX conformance testing by UNIFIX Dec 28 20:16:44 firewall kernel: PCI: PCI BIOS revision 2.10 entry at 0xf6f41 Dec 28 20:16:44 firewall kernel: PCI: Using configuration type 1 Dec 28 20:16:44 firewall kernel: PCI: Probing PCI hardware Dec 28 20:16:44 firewall kernel: Linux NET4.0 for Linux 2.2 Dec 28 20:16:44 firewall kernel: Based upon Swansea University Computer Society NET3.039 Dec 28 20:16:44 firewall kernel: NET4: Unix domain sockets 1.0 for Linux NET4.0. Dec 28 20:16:44 firewall kernel: NET4: Linux TCP/IP 1.0 for NET4.0 Dec 28 20:16:44 firewall kernel: IP Protocols: ICMP, UDP, TCP Dec 28 20:16:44 firewall kernel: TCP: Hash tables configured (ehash 16384 bhash 16384) Dec 28 20:16:44 firewall kernel: Initializing RT netlink socket Dec 28 20:16:44 firewall kernel: Starting kswapd v 1.5 Dec 28 20:16:44 firewall kernel: Software Watchdog Timer: 0.05, timer margin: 60 sec Dec 28 20:16:44 firewall kernel: Real Time Clock Driver v1.09 Dec 28 20:16:44 firewall kernel: RAM disk driver initialized: 16 RAM disks of 6144K size Dec 28 20:16:44 firewall kernel: Floppy drive(s): fd0 is 1.44M Dec 28 20:16:44 firewall kernel: FDC 0 is a post-1991 82077 Dec 28 20:16:44 firewall kernel: RAMDISK: Compressed image found at block 0 Dec 28 20:16:44 firewall kernel: RAMDISK: Uncompressing root archive: done. Dec 28 20:16:44 firewall kernel: RAMDISK: Auto Filesystem - minix: 2048i 6144bk 68fdz(68) 1024zs 2147483647ms Dec 28 20:16:44 firewall kernel: VFS: Mounted root (minix filesystem). Dec 28 20:16:44 firewall kernel: RAMDISK: Extracting root archive: done. Dec 28 20:16:44 firewall kernel: Freeing unused kernel memory: 44k freed Dec 28 20:16:44 firewall kernel: eth0: 3c509 at 0x300 tag 1, 10baseT port, address 00 20 af 26 e8 df, IRQ 10. Dec 28 20:16:44 firewall kernel: 3c509.c:1.16 (2.2) 2/3/98 [EMAIL PROTECTED] Dec 28 20:16:44 firewall kernel: eth1: 3c509 at 0x280 tag 2, 10baseT port, address 00 a0 24 1f 29 9f, IRQ 11. Dec 28 20:16:44 firewall kernel: 3c509.c:1.16 (2.2) 2/3/98 [EMAIL PROTECTED] Dec 28 20:16:44 firewall kernel: eth0: Setting Rx mode to 1 addresses. Dec 28 20:16:44 firewall kernel: eth1: Setting Rx mode to 0 addresses. Dec 28 20:16:44 firewall kernel: eth1: Setting Rx mode to 1 addresses. Dec 28 20:16:50 firewall kernel: Packet log: input DENY eth0 PROTO=17 213.51.161.183:520 224.0.0.9:520 L=72 S=0x00 I=6570 F=0x0000 T=1 (#40) Dec 28 20:16:56 firewall kernel: Packet log: input DENY eth0 PROTO=17 213.51.163.24:49167 239.255.255.253:427 L=77 S=0x00 I=15425 F=0x0000 T=255 (#40) Dec 28 20:17:00 firewall kernel: Packet log: input DENY eth0 PROTO=17 213.51.163.24:49167 239.255.255.253:427 L=77 S=0x00 I=15426 F=0x0000 T=255 (#40) Dec 28 20:17:04 firewall kernel: Packet log: input DENY eth0 PROTO=17 213.51.163.24:49167 239.255.255.253:427 L=77 S=0x00 I=15427 F=0x0000 T=255 (#40) Dec 28 20:17:08 firewall kernel: Packet log: input DENY eth0 PROTO=17 213.51.163.24:49167 239.255.255.253:427 L=77 S=0x00 I=15428 F=0x0000 T=255 (#40) Dec 28 20:17:08 firewall kernel: Packet log: input DENY eth0 PROTO=2 213.51.161.114:65535 224.0.0.9:65535 L=28 S=0x00 I=5279 F=0x0000 T=1 (#40) Dec 28 20:17:08 firewall kernel: Packet log: input DENY eth0 PROTO=2 213.51.166.22:65535 224.0.0.9:65535 L=28 S=0x00 I=612 F=0x0000 T=1 (#40) Dec 28 20:17:08 firewall kernel: Packet log: input DENY eth0 PROTO=2 213.51.161.183:65535 224.0.0.9:65535 L=28 S=0x00 I=2133 F=0x0000 T=1 (#40) Dec 28 20:17:17 firewall kernel: Packet log: input DENY eth0 PROTO=17 213.51.161.183:520 224.0.0.9:520 L=72 S=0x00 I=6571 F=0x0000 T=1 (#40) Dec 28 20:17:27 firewall kernel: Packet log: input DENY eth0 PROTO=17 192.168.0.4:1250 255.255.255.255:161 L=84 S=0x00 I=29324 F=0x0000 T=128 (#10) Dec 28 20:17:40 firewall kernel: Packet log: input DENY eth0 PROTO=2 217.120.108.190:65535 239.255.255.250:65535 L=32 S=0x00 I=13 F=0x0000 T=1 O=0x00000494 (#40) Dec 28 20:17:40 firewall kernel: Packet log: input DENY eth0 PROTO=2 213.51.161.183:65535 224.0.0.9:65535 L=28 S=0x00 I=2134 F=0x0000 T=1 (#40) Dec 28 20:17:44 firewall kernel: Packet log: input DENY eth0 PROTO=17 213.51.161.183:520 224.0.0.9:520 L=72 S=0x00 I=6573 F=0x0000 T=1 (#40) Dec 28 20:17:51 firewall kernel: Packet log: input DENY eth0 PROTO=2 213.51.164.37:65535 239.255.255.250:65535 L=32 S=0x00 I=17 F=0x0000 T=1 O=0x00000494 (#40) Dec 28 20:17:51 firewall kernel: Packet log: input DENY eth0 PROTO=2 213.51.161.183:65535 224.0.0.9:65535 L=28 S=0x00 I=2135 F=0x0000 T=1 (#40) Dec 28 20:17:57 firewall kernel: Packet log: input DENY eth0 PROTO=17 192.168.0.4:1255 255.255.255.255:161 L=84 S=0x00 I=10151 F=0x0000 T=128 (#10) Dec 28 20:18:11 firewall kernel: Packet log: input DENY eth0 PROTO=17 213.51.161.183:520 224.0.0.9:520 L=72 S=0x00 I=6574 F=0x0000 T=1 (#40) Dec 28 20:18:38 firewall kernel: Packet log: input DENY eth0 PROTO=17 213.51.161.183:520 224.0.0.9:520 L=72 S=0x00 I=6575 F=0x0000 T=1 (#40) Dec 28 20:18:55 firewall kernel: Packet log: input DENY eth0 PROTO=2 213.51.167.84:65535 224.0.0.22:65535 L=40 S=0x00 I=35 F=0x0000 T=1 O=0x00000494 (#40) Dec 28 20:18:56 firewall kernel: Packet log: input DENY eth0 PROTO=2 213.51.167.84:65535 224.0.0.22:65535 L=40 S=0x00 I=39 F=0x0000 T=1 O=0x00000494 (#40) Dec 28 20:19:05 firewall kernel: Packet log: input DENY eth0 PROTO=17 213.51.161.183:520 224.0.0.9:520 L=72 S=0x00 I=6576 F=0x0000 T=1 (#40) Dec 28 20:19:14 firewall kernel: Packet log: input DENY eth0 PROTO=6 211.110.11.212:43453 213.51.164.22:515 L=60 S=0x00 I=33194 F=0x4000 T=51 SYN (#40) Dec 28 20:19:33 firewall kernel: Packet log: input DENY eth0 PROTO=17 213.51.161.183:520 224.0.0.9:520 L=72 S=0x00 I=6577 F=0x0000 T=1 (#40) Dec 28 20:19:44 firewall kernel: Packet log: input DENY eth0 PROTO=2 213.51.164.196:65535 239.255.255.250:65535 L=32 S=0x00 I=19 F=0x0000 T=1 O=0x00000494 (#40) Dec 28 20:19:44 firewall kernel: Packet log: input DENY eth0 PROTO=2 213.51.161.114:65535 224.0.0.9:65535 L=28 S=0x00 I=5280 F=0x0000 T=1 (#40) Dec 28 20:19:44 firewall kernel: Packet log: input DENY eth0 PROTO=2 213.51.166.22:65535 224.0.0.9:65535 L=28 S=0x00 I=613 F=0x0000 T=1 (#40) Dec 28 20:19:44 firewall kernel: Packet log: input DENY eth0 PROTO=2 213.51.161.183:65535 224.0.0.9:65535 L=28 S=0x00 I=2136 F=0x0000 T=1 (#40) Dec 28 20:20:00 firewall kernel: Packet log: input DENY eth0 PROTO=17 213.51.161.183:520 224.0.0.9:520 L=72 S=0x00 I=6578 F=0x0000 T=1 (#40) Dec 28 20:20:27 firewall kernel: Packet log: input DENY eth0 PROTO=2 213.51.160.23:65535 224.0.0.2:65535 L=32 S=0x00 I=3739 F=0x0000 T=1 O=0x00000494 (#40) Dec 28 20:20:27 firewall kernel: Packet log: input DENY eth0 PROTO=2 213.51.166.22:65535 224.0.0.9:65535 L=28 S=0x00 I=614 F=0x0000 T=1 (#40) Dec 28 20:20:27 firewall kernel: Packet log: input DENY eth0 PROTO=2 213.51.161.114:65535 224.0.0.9:65535 L=28 S=0x00 I=5281 F=0x0000 T=1 (#40) Dec 28 20:20:27 firewall kernel: Packet log: input DENY eth0 PROTO=2 217.120.20.89:65535 224.0.0.2:65535 L=32 S=0x00 I=10368 F=0x0000 T=1 O=0x00000494 (#40) Dec 28 20:20:27 firewall kernel: Packet log: input DENY eth0 PROTO=2 213.51.166.22:65535 224.0.0.9:65535 L=28 S=0x00 I=615 F=0x0000 T=1 (#40) Dec 28 20:20:27 firewall kernel: Packet log: input DENY eth0 PROTO=2 213.51.161.114:65535 224.0.0.9:65535 L=28 S=0x00 I=5282 F=0x0000 T=1 (#40) Dec 28 20:20:28 firewall kernel: Packet log: input DENY eth0 PROTO=2 213.51.161.183:65535 224.0.0.9:65535 L=28 S=0x00 I=2137 F=0x0000 T=1 (#40) Dec 28 20:20:28 firewall kernel: Packet log: input DENY eth0 PROTO=17 213.51.161.183:520 224.0.0.9:520 L=72 S=0x00 I=6580 F=0x0000 T=1 (#40) Dec 28 20:20:28 firewall kernel: Packet log: input DENY eth0 PROTO=17 213.51.165.77:42 224.0.1.24:42 L=47 S=0x00 I=50414 F=0x0000 T=2 (#40) Dec 28 20:20:36 firewall kernel: Packet log: input DENY eth0 PROTO=2 213.51.160.23:65535 224.0.0.2:65535 L=32 S=0x00 I=7835 F=0x0000 T=1 O=0x00000494 (#40) Dec 28 20:20:37 firewall kernel: Packet log: input DENY eth0 PROTO=2 213.51.166.22:65535 224.0.0.9:65535 L=28 S=0x00 I=616 F=0x0000 T=1 (#40) Dec 28 20:20:37 firewall kernel: Packet log: input DENY eth0 PROTO=2 213.51.161.114:65535 224.0.0.9:65535 L=28 S=0x00 I=5283 F=0x0000 T=1 (#40) Dec 28 20:20:54 firewall kernel: Packet log: input DENY eth0 PROTO=2 217.120.108.153:65535 239.255.255.250:65535 L=32 S=0x00 I=17 F=0x0000 T=1 O=0x00000494 (#40) Dec 28 20:20:55 firewall kernel: Packet log: input DENY eth0 PROTO=2 213.51.161.183:65535 224.0.0.9:65535 L=28 S=0x00 I=2138 F=0x0000 T=1 (#40) _______________________________________________ Leaf-user mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/leaf-user