Hi, I have setup the lrp firewall and a couple of my machines using mostly defaults in the network.conf file. I have tried several trial and error methods to get our printer recognized in this setup. I have and HP laserjet 4mp with an external print server... JetDirect EX plus. This print server (black box) needs to be configured using hp print server adm software from one of the machines on the network. I cannot get either of our pcs to locate the thing with ip address, hardware address or unspecified search. The test button on the print server shows that it wants to be 192.0.0.200 with default gateway 192.0.0.194. Anyone have any suggestions?
Here is the output of the various files and commands. Thanks for any help you may provide! John [EMAIL PROTECTED] Address: 1: lo: <LOOPBACK,UP> mtu 3924 qdisc noqueue link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 brd 127.255.255.255 scope global lo 2: brg0: <BROADCAST,MULTICAST> mtu 1500 qdisc noop link/ether fe:fd:0b:00:00:69 brd ff:ff:ff:ff:ff:ff 3: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100 link/ether 00:40:96:34:f6:f1 brd ff:ff:ff:ff:ff:ff inet 66.54.153.20/27 brd 66.54.153.255 scope global eth0 4: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100 link/ether 00:20:78:11:85:fe brd ff:ff:ff:ff:ff:ff inet 192.168.1.254/24 brd 192.168.1.255 scope global eth1 ---------------------------------------------------------------------------- Autofw: Type Prot Low High Vis Hid Where Last CPto CPrt Timer Flags ---------------------------------------------------------------------------- Filter: Chain input (policy DENY: 0 packets, 0 bytes): pkts bytes target prot opt tosa tosx ifname mark outsize source destination ports 0 0 DENY icmp ----l- 0xFF 0x00 * 0.0.0.0/0 0.0.0.0/0 5 -> * 0 0 DENY icmp ----l- 0xFF 0x00 * 0.0.0.0/0 0.0.0.0/0 13 -> * 0 0 DENY icmp ----l- 0xFF 0x00 * 0.0.0.0/0 0.0.0.0/0 14 -> * 0 0 DENY all ----l- 0xFF 0x00 eth0 0.0.0.0 0.0.0.0/0 n/a 0 0 DENY all ----l- 0xFF 0x00 eth0 255.255.255.255 0.0.0.0/0 n/a 0 0 DENY all ----l- 0xFF 0x00 eth0 127.0.0.0/8 0.0.0.0/0 n/a 0 0 DENY all ----l- 0xFF 0x00 eth0 224.0.0.0/4 0.0.0.0/0 n/a 0 0 DENY all ----l- 0xFF 0x00 eth0 10.0.0.0/8 0.0.0.0/0 n/a 0 0 DENY all ----l- 0xFF 0x00 eth0 172.16.0.0/12 0.0.0.0/0 n/a 0 0 DENY all ----l- 0xFF 0x00 eth0 192.168.0.0/16 0.0.0.0/0 n/a 0 0 DENY all ----l- 0xFF 0x00 eth0 0.0.0.0/8 0.0.0.0/0 n/a 0 0 DENY all ----l- 0xFF 0x00 eth0 128.0.0.0/16 0.0.0.0/0 n/a 0 0 DENY all ----l- 0xFF 0x00 eth0 191.255.0.0/16 0.0.0.0/0 n/a 0 0 DENY all ----l- 0xFF 0x00 eth0 192.0.0.0/24 0.0.0.0/0 n/a 0 0 DENY all ----l- 0xFF 0x00 eth0 223.255.255.0/24 0.0.0.0/0 n/a 0 0 DENY all ----l- 0xFF 0x00 eth0 240.0.0.0/4 0.0.0.0/0 n/a 0 0 DENY all ----l- 0xFF 0x00 eth0 192.168.1.0/24 0.0.0.0/0 n/a 0 0 DENY all ----l- 0xFF 0x00 eth0 192.0.0.0 0.0.0.0/0 n/a 0 0 DENY all ----l- 0xFF 0x00 eth0 192.168.254.254 0.0.0.0/0 n/a 0 0 REJECT all ----l- 0xFF 0x00 eth0 0.0.0.0/0 127.0.0.0/8 n/a 0 0 REJECT all ----l- 0xFF 0x00 eth0 0.0.0.0/0 192.168.1.0/24 n/a 0 0 REJECT all ----l- 0xFF 0x00 eth0 0.0.0.0/0 192.0.0.0 n/a 0 0 REJECT tcp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 137 0 0 REJECT tcp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 135 7 546 REJECT udp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 137 0 0 REJECT udp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 135 0 0 REJECT tcp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 138:139 4 917 REJECT udp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 138 0 0 REJECT udp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 137:138 -> * 0 0 REJECT udp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 135 -> * 0 0 REJECT tcp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 137:139 -> * 0 0 REJECT tcp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 135 -> * 0 0 REJECT tcp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 113 25039 23M ACCEPT tcp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 1024:65535 0 0 REJECT udp ----l- 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 161:162 0 0 ACCEPT udp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 53 0 0 ACCEPT udp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 68 0 0 DENY udp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 67 2 650 ACCEPT udp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 1024:65535 0 0 ACCEPT icmp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> * 0 0 ACCEPT ospf ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 n/a 0 0 DENY all ----l- 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 n/a 2 168 REJECT udp ----l- 0xFF 0x00 * 0.0.0.0/0 0.0.0.0/0 * -> 161:162 0 0 REJECT udp ----l- 0xFF 0x00 * 0.0.0.0/0 0.0.0.0/0 161:162 -> * 15472 622K ACCEPT all ------ 0xFF 0x00 * 0.0.0.0/0 0.0.0.0/0 n/a Chain forward (policy DENY: 0 packets, 0 bytes): pkts bytes target prot opt tosa tosx ifname mark outsize source destination ports 0 0 DENY icmp ----l- 0xFF 0x00 * 0.0.0.0/0 0.0.0.0/0 5 -> * 15471 622K MASQ all ------ 0xFF 0x00 eth0 192.168.1.0/24 0.0.0.0/0 n/a 0 0 MASQ all ------ 0xFF 0x00 eth0 192.0.0.0 0.0.0.0/0 n/a 0 0 DENY all ------ 0xFF 0x00 * 0.0.0.0/0 0.0.0.0/0 n/a Chain output (policy DENY: 0 packets, 0 bytes): pkts bytes target prot opt tosa tosx ifname mark outsize source destination ports 40484 23M fairq all ------ 0xFF 0x00 * 0.0.0.0/0 0.0.0.0/0 n/a 0 0 DENY all ----l- 0xFF 0x00 eth0 0.0.0.0 0.0.0.0/0 n/a 0 0 DENY all ----l- 0xFF 0x00 eth0 255.255.255.255 0.0.0.0/0 n/a 0 0 DENY all ----l- 0xFF 0x00 eth0 127.0.0.0/8 0.0.0.0/0 n/a 0 0 DENY all ----l- 0xFF 0x00 eth0 224.0.0.0/4 0.0.0.0/0 n/a 0 0 DENY all ----l- 0xFF 0x00 eth0 10.0.0.0/8 0.0.0.0/0 n/a 0 0 DENY all ----l- 0xFF 0x00 eth0 172.16.0.0/12 0.0.0.0/0 n/a 0 0 DENY all ----l- 0xFF 0x00 eth0 192.168.0.0/16 0.0.0.0/0 n/a 0 0 DENY all ----l- 0xFF 0x00 eth0 0.0.0.0/8 0.0.0.0/0 n/a 0 0 DENY all ----l- 0xFF 0x00 eth0 128.0.0.0/16 0.0.0.0/0 n/a 0 0 DENY all ----l- 0xFF 0x00 eth0 191.255.0.0/16 0.0.0.0/0 n/a 0 0 DENY all ----l- 0xFF 0x00 eth0 192.0.0.0/24 0.0.0.0/0 n/a 0 0 DENY all ----l- 0xFF 0x00 eth0 223.255.255.0/24 0.0.0.0/0 n/a 0 0 DENY all ----l- 0xFF 0x00 eth0 240.0.0.0/4 0.0.0.0/0 n/a 0 0 DENY all ------ 0xFF 0x00 eth0 192.168.1.0/24 0.0.0.0/0 n/a 0 0 DENY all ------ 0xFF 0x00 eth0 192.0.0.0 0.0.0.0/0 n/a 0 0 REJECT tcp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 137 0 0 REJECT tcp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 135 0 0 REJECT udp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 137 0 0 REJECT udp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 135 0 0 REJECT tcp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 138:139 0 0 REJECT udp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 * -> 138 0 0 REJECT udp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 137:138 -> * 0 0 REJECT udp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 135 -> * 0 0 REJECT tcp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 137:139 -> * 0 0 REJECT tcp ------ 0xFF 0x00 eth0 0.0.0.0/0 0.0.0.0/0 135 -> * 40484 23M ACCEPT all ------ 0xFF 0x00 * 0.0.0.0/0 0.0.0.0/0 n/a Chain fairq (1 references): pkts bytes target prot opt tosa tosx ifname mark outsize source destination ports 0 0 RETURN ospf ------ 0xFF 0x00 * 0x1 0.0.0.0/0 0.0.0.0/0 n/a 0 0 RETURN ospf ------ 0xFF 0x00 * 0x1 0.0.0.0/0 0.0.0.0/0 n/a 0 0 RETURN udp ------ 0xFF 0x00 * 0x1 0.0.0.0/0 0.0.0.0/0 * -> 520 0 0 RETURN udp ------ 0xFF 0x00 * 0x1 0.0.0.0/0 0.0.0.0/0 520 -> * 0 0 RETURN tcp ------ 0xFF 0x00 * 0x1 0.0.0.0/0 0.0.0.0/0 * -> 179 0 0 RETURN tcp ------ 0xFF 0x00 * 0x1 0.0.0.0/0 0.0.0.0/0 179 -> * 0 0 RETURN tcp ------ 0xFF 0x00 * 0x1 0.0.0.0/0 0.0.0.0/0 * -> 53 0 0 RETURN tcp ------ 0xFF 0x00 * 0x1 0.0.0.0/0 0.0.0.0/0 53 -> * 2 131 RETURN udp ------ 0xFF 0x00 * 0x1 0.0.0.0/0 0.0.0.0/0 * -> 53 2 650 RETURN udp ------ 0xFF 0x00 * 0x1 0.0.0.0/0 0.0.0.0/0 53 -> * 0 0 RETURN tcp ------ 0xFF 0x00 * 0x2 0.0.0.0/0 0.0.0.0/0 * -> 23 0 0 RETURN tcp ------ 0xFF 0x00 * 0x2 0.0.0.0/0 0.0.0.0/0 23 -> * 0 0 RETURN tcp ------ 0xFF 0x00 * 0x2 0.0.0.0/0 0.0.0.0/0 * -> 22 0 0 RETURN tcp ------ 0xFF 0x00 * 0x2 0.0.0.0/0 0.0.0.0/0 22 -> * ---------------------------------------------------------------------------- Messages: Apr 15 16:31:51 j_and_s_firewall syslogd 1.3-3#31.slink1: restart. Apr 15 16:31:51 j_and_s_firewall kernel: klogd 1.3-3#31.slink1, log source = /proc/kmsg started. Apr 15 16:31:51 j_and_s_firewall kernel: Cannot find map file. Apr 15 16:31:51 j_and_s_firewall kernel: Loaded 15 symbols from 14 modules. Apr 15 16:31:51 j_and_s_firewall kernel: Linux version 2.2.19 (root@PortegeVM) (gcc version 2.7.2.3) #1 Thu Aug 16 15:46:00 EST 2001 Apr 15 16:31:51 j_and_s_firewall kernel: BIOS-provided physical RAM map: Apr 15 16:31:51 j_and_s_firewall kernel: BIOS-e820: 0009f000 @ 00000000 (usable) Apr 15 16:31:51 j_and_s_firewall kernel: BIOS-e820: 01f00000 @ 00100000 (usable) Apr 15 16:31:51 j_and_s_firewall kernel: Console: colour VGA+ 80x25 Apr 15 16:31:51 j_and_s_firewall kernel: Calibrating delay loop... 299.00 BogoMIPS Apr 15 16:31:51 j_and_s_firewall kernel: Memory: 30140k/32768k available (852k kernel code, 416k reserved, 608k data, 52k init) Apr 15 16:31:51 j_and_s_firewall kernel: Dentry hash table entries: 4096 (order 3, 32k) Apr 15 16:31:51 j_and_s_firewall kernel: Buffer cache hash table entries: 32768 (order 5, 128k) Apr 15 16:31:51 j_and_s_firewall kernel: Page cache hash table entries: 8192 (order 3, 32k) Apr 15 16:31:51 j_and_s_firewall kernel: CPU: Intel Pentium MMX stepping 04 Apr 15 16:31:51 j_and_s_firewall kernel: Checking 386/387 coupling... OK, FPU using exception 16 error reporting. Apr 15 16:31:51 j_and_s_firewall kernel: Checking 'hlt' instruction... OK. Apr 15 16:31:51 j_and_s_firewall kernel: Intel Pentium with F0 0F bug - workaround enabled. Apr 15 16:31:51 j_and_s_firewall kernel: POSIX conformance testing by UNIFIX Apr 15 16:31:51 j_and_s_firewall kernel: PCI: PCI BIOS revision 2.00 entry at 0xfd180 Apr 15 16:31:51 j_and_s_firewall kernel: PCI: Using configuration type 1 Apr 15 16:31:51 j_and_s_firewall kernel: PCI: Probing PCI hardware Apr 15 16:31:51 j_and_s_firewall kernel: Linux NET4.0 for Linux 2.2 Apr 15 16:31:51 j_and_s_firewall kernel: Based upon Swansea University Computer Society NET3.039 Apr 15 16:31:51 j_and_s_firewall kernel: NET4: Unix domain sockets 1.0 for Linux NET4.0. Apr 15 16:31:51 j_and_s_firewall kernel: NET4: Linux TCP/IP 1.0 for NET4.0 Apr 15 16:31:51 j_and_s_firewall kernel: IP Protocols: ICMP, UDP, TCP, IGMP Apr 15 16:31:51 j_and_s_firewall kernel: TCP: Hash tables configured (ehash 32768 bhash 32768) Apr 15 16:31:51 j_and_s_firewall kernel: Linux IP multicast router 0.06 plus PIM-SM Apr 15 16:31:51 j_and_s_firewall kernel: Initializing RT netlink socket Apr 15 16:31:51 j_and_s_firewall kernel: Starting kswapd v 1.5 Apr 15 16:31:51 j_and_s_firewall kernel: Detected PS/2 Mouse Port. Apr 15 16:31:51 j_and_s_firewall kernel: Software Watchdog Timer: 0.05, timer margin: 60 sec Apr 15 16:31:51 j_and_s_firewall kernel: Real Time Clock Driver v1.09 Apr 15 16:31:51 j_and_s_firewall kernel: RAM disk driver initialized: 16 RAM disks of 13312K size Apr 15 16:31:51 j_and_s_firewall kernel: CMD640: ignored by ide_scan_pci_device() (uses own driver) Apr 15 16:31:51 j_and_s_firewall kernel: hda: WDC AC33100H, ATA DISK drive Apr 15 16:31:51 j_and_s_firewall kernel: ide0 at 0x1f0-0x1f7,0x3f6 on irq 14 Apr 15 16:31:51 j_and_s_firewall kernel: hda: WDC AC33100H, 3020MB w/128kB Cache, CHS=767/128/63 Apr 15 16:31:51 j_and_s_firewall kernel: Floppy drive(s): fd0 is 1.44M Apr 15 16:31:51 j_and_s_firewall kernel: FDC 0 is a National Semiconductor PC87306 Apr 15 16:31:51 j_and_s_firewall kernel: NET4: Ethernet Bridge 007 for NET4.0 Apr 15 16:31:51 j_and_s_firewall kernel: early initialization of device brg0 is deferred Apr 15 16:31:51 j_and_s_firewall kernel: brg0: network interface for Ethernet Bridge 007/NET4.0 Apr 15 16:31:51 j_and_s_firewall kernel: brg0: generated MAC address FE:FD:0B:00:00:69 Apr 15 16:31:51 j_and_s_firewall kernel: brg0: attached to bridge instance 0 Apr 15 16:31:51 j_and_s_firewall kernel: Partition check: Apr 15 16:31:51 j_and_s_firewall kernel: hda: hda1 Apr 15 16:31:51 j_and_s_firewall kernel: RAMDISK: Compressed image found at block 0 Apr 15 16:31:51 j_and_s_firewall kernel: RAMDISK: Uncompressing root archive: done. Apr 15 16:31:51 j_and_s_firewall kernel: RAMDISK: Auto Filesystem - minix: 4437i 13312bk 144fdz(144) 1024zs 2147483647ms Apr 15 16:31:51 j_and_s_firewall kernel: VFS: Mounted root (minix filesystem). Apr 15 16:31:51 j_and_s_firewall kernel: RAMDISK: Extracting root archive: done. Apr 15 16:31:51 j_and_s_firewall kernel: Freeing unused kernel memory: 52k freed Apr 15 16:31:51 j_and_s_firewall kernel: airo: Trying to configure ISA adapter at irq=7 io=0x300 Apr 15 16:31:51 j_and_s_firewall kernel: airo: MAC enabled eth0 0:40:96:34:f6:f1 Apr 15 16:31:51 j_and_s_firewall kernel: airo: Probing for PCI adapters Apr 15 16:31:51 j_and_s_firewall kernel: airo: Finished probing for PCI adapters Apr 15 16:31:51 j_and_s_firewall kernel: ne2k-pci.c:v1.01a 10/4/2000 D. Becker/P. Gortmaker Apr 15 16:31:51 j_and_s_firewall kernel: http://www.scyld.com/network/ne2k-pci.html Apr 15 16:31:51 j_and_s_firewall kernel: eth1: Winbond 89C940 found at 0xffe0, IRQ 9, 00:20:78:11:85:FE. Apr 15 16:31:51 j_and_s_firewall kernel: martian source 048011d8 for 14993642, dev eth0 Apr 15 16:31:51 j_and_s_firewall kernel: ll header: 00 40 96 34 f6 f1 08 00 09 ac 51 ee 08 00 Apr 15 16:31:51 j_and_s_firewall kernel: martian source 048011d8 for 14993642, dev eth0 Apr 15 16:31:51 j_and_s_firewall kernel: ll header: 00 40 96 34 f6 f1 08 00 09 ac 51 ee 08 00 Apr 15 16:31:51 j_and_s_firewall kernel: martian source 048011d8 for 14993642, dev eth0 Apr 15 16:31:51 j_and_s_firewall kernel: ll header: 00 40 96 34 f6 f1 08 00 09 ac 51 ee 08 00 Apr 15 16:31:51 j_and_s_firewall kernel: martian source 048011d8 for 14993642, dev eth0 Apr 15 16:31:51 j_and_s_firewall kernel: ll header: 00 40 96 34 f6 f1 08 00 09 ac 51 ee 08 00 Apr 15 16:31:51 j_and_s_firewall kernel: martian source 048011d8 for 14993642, dev eth0 Apr 15 16:31:51 j_and_s_firewall kernel: ll header: 00 40 96 34 f6 f1 08 00 09 ac 51 ee 08 00 Apr 15 16:31:51 j_and_s_firewall kernel: martian source 048011d8 for 14993642, dev eth0 Apr 15 16:31:51 j_and_s_firewall kernel: ll header: 00 40 96 34 f6 f1 08 00 09 ac 51 ee 08 00 Apr 15 16:31:51 j_and_s_firewall kernel: martian source 048011d8 for 14993642, dev eth0 Apr 15 16:31:51 j_and_s_firewall kernel: ll header: 00 40 96 34 f6 f1 08 00 09 ac 51 ee 08 00 Apr 15 16:31:51 j_and_s_firewall kernel: martian source 048011d8 for 14993642, dev eth0 Apr 15 16:31:51 j_and_s_firewall kernel: ll header: 00 40 96 34 f6 f1 08 00 09 ac 51 ee 08 00 Apr 15 16:31:51 j_and_s_firewall kernel: martian source 048011d8 for 14993642, dev eth0 Apr 15 16:31:51 j_and_s_firewall kernel: ll header: 00 40 96 34 f6 f1 08 00 09 ac 51 ee 08 00 Apr 15 16:31:51 j_and_s_firewall kernel: martian source 048011d8 for 14993642, dev eth0 Apr 15 16:31:51 j_and_s_firewall kernel: ll header: 00 40 96 34 f6 f1 08 00 09 ac 51 ee 08 00 Apr 15 16:32:27 j_and_s_firewall kernel: VFS: Can't find a Minix or Minix V2 filesystem on device 02:00. Apr 15 16:33:57 j_and_s_firewall kernel: Packet log: input REJECT eth1 PROTO=17 192.168.1.1:3362 255.255.255.255:161 L=84 S=0x00 I=23199 F=0x0000 T=128 (#43) Apr 15 16:33:57 j_and_s_firewall kernel: NET: 18 messages suppressed. Apr 15 16:33:57 j_and_s_firewall kernel: martian source c80000c0 for c20000c0, dev eth1 Apr 15 16:33:57 j_and_s_firewall kernel: ll header: ff ff ff ff ff ff 00 60 b0 22 d0 98 08 06 Apr 15 16:33:58 j_and_s_firewall kernel: martian source c80000c0 for c20000c0, dev eth1 Apr 15 16:33:58 j_and_s_firewall kernel: ll header: ff ff ff ff ff ff 00 60 b0 22 d0 98 08 06 Apr 15 16:33:58 j_and_s_firewall kernel: martian source c80000c0 for c20000c0, dev eth1 Apr 15 16:33:58 j_and_s_firewall kernel: ll header: ff ff ff ff ff ff 00 60 b0 22 d0 98 08 06 Apr 15 16:35:30 j_and_s_firewall kernel: Packet log: input REJECT eth1 PROTO=17 192.168.1.1:3363 255.255.255.255:161 L=84 S=0x00 I=26193 F=0x0000 T=128 (#43) Apr 15 16:35:30 j_and_s_firewall kernel: martian source c80000c0 for c20000c0, dev eth1 Apr 15 16:35:30 j_and_s_firewall kernel: ll header: ff ff ff ff ff ff 00 60 b0 22 d0 98 08 06 Apr 15 16:35:30 j_and_s_firewall kernel: martian source c80000c0 for c20000c0, dev eth1 Apr 15 16:35:30 j_and_s_firewall kernel: ll header: ff ff ff ff ff ff 00 60 b0 22 d0 98 08 06 Apr 15 16:35:30 j_and_s_firewall kernel: martian source c80000c0 for c20000c0, dev eth1 Apr 15 16:35:30 j_and_s_firewall kernel: ll header: ff ff ff ff ff ff 00 60 b0 22 d0 98 08 06 ---------------------------------------------------------------------------- mfw: fwmark rediraddr rport pcnt pref ---------------------------------------------------------------------------- portfw: prot localaddr rediraddr lport rport pcnt pref ---------------------------------------------------------------------------- route: 66.54.153.0/27 dev eth0 proto kernel scope link src 66.54.153.20 192.168.1.0/24 dev eth1 proto kernel scope link src 192.168.1.254 default via 66.54.153.28 dev eth0 _______________________________________________ Leaf-user mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/leaf-user