Hi,

I have setup the lrp firewall and a couple of my machines using mostly
defaults in the network.conf file.  I have tried several trial and error
methods to get our printer recognized in this setup.  I have and HP laserjet
4mp with an external print server... JetDirect EX plus.  This print server
(black box) needs to be configured using hp print server adm software from
one of the machines on the network.  I cannot get either of our pcs to
locate the thing with ip address, hardware address or unspecified search.
The test button on the print server shows that it wants to be 192.0.0.200
with default gateway 192.0.0.194.  Anyone have any suggestions?

Here is the output of the various files and commands.  Thanks for any help
you may provide!

John
[EMAIL PROTECTED]




Address:

1: lo: <LOOPBACK,UP> mtu 3924 qdisc noqueue
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 brd 127.255.255.255 scope global lo
2: brg0: <BROADCAST,MULTICAST> mtu 1500 qdisc noop
    link/ether fe:fd:0b:00:00:69 brd ff:ff:ff:ff:ff:ff
3: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
    link/ether 00:40:96:34:f6:f1 brd ff:ff:ff:ff:ff:ff
    inet 66.54.153.20/27 brd 66.54.153.255 scope global eth0
4: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
    link/ether 00:20:78:11:85:fe brd ff:ff:ff:ff:ff:ff
    inet 192.168.1.254/24 brd 192.168.1.255 scope global eth1

----------------------------------------------------------------------------

Autofw:

Type Prot Low  High Vis  Hid  Where    Last     CPto CPrt Timer Flags

----------------------------------------------------------------------------

Filter:

Chain input (policy DENY: 0 packets, 0 bytes):
 pkts bytes target     prot opt    tosa tosx  ifname     mark       outsize
source                destination           ports
    0     0 DENY       icmp ----l- 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             5 ->   *
    0     0 DENY       icmp ----l- 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             13 ->   *
    0     0 DENY       icmp ----l- 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             14 ->   *
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
0.0.0.0              0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
255.255.255.255      0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
127.0.0.0/8          0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
224.0.0.0/4          0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
10.0.0.0/8           0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
172.16.0.0/12        0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
192.168.0.0/16       0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
0.0.0.0/8            0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
128.0.0.0/16         0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
191.255.0.0/16       0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
192.0.0.0/24         0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
223.255.255.0/24     0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
240.0.0.0/4          0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
192.168.1.0/24       0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
192.0.0.0            0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
192.168.254.254      0.0.0.0/0             n/a
    0     0 REJECT     all  ----l- 0xFF 0x00  eth0
0.0.0.0/0            127.0.0.0/8           n/a
    0     0 REJECT     all  ----l- 0xFF 0x00  eth0
0.0.0.0/0            192.168.1.0/24        n/a
    0     0 REJECT     all  ----l- 0xFF 0x00  eth0
0.0.0.0/0            192.0.0.0             n/a
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   137
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   135
    7   546 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   137
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   135
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   138:139
    4   917 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   138
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             137:138 ->   *
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             135 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             137:139 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             135 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   113
25039   23M ACCEPT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   1024:65535
    0     0 REJECT     udp  ----l- 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   161:162
    0     0 ACCEPT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   53
    0     0 ACCEPT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   68
    0     0 DENY       udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   67
    2   650 ACCEPT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   1024:65535
    0     0 ACCEPT     icmp ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   *
    0     0 ACCEPT     ospf ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             n/a
    2   168 REJECT     udp  ----l- 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             * ->   161:162
    0     0 REJECT     udp  ----l- 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             161:162 ->   *
15472  622K ACCEPT     all  ------ 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             n/a
Chain forward (policy DENY: 0 packets, 0 bytes):
 pkts bytes target     prot opt    tosa tosx  ifname     mark       outsize
source                destination           ports
    0     0 DENY       icmp ----l- 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             5 ->   *
15471  622K MASQ       all  ------ 0xFF 0x00  eth0
192.168.1.0/24       0.0.0.0/0             n/a
    0     0 MASQ       all  ------ 0xFF 0x00  eth0
192.0.0.0            0.0.0.0/0             n/a
    0     0 DENY       all  ------ 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             n/a
Chain output (policy DENY: 0 packets, 0 bytes):
 pkts bytes target     prot opt    tosa tosx  ifname     mark       outsize
source                destination           ports
40484   23M fairq      all  ------ 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
0.0.0.0              0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
255.255.255.255      0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
127.0.0.0/8          0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
224.0.0.0/4          0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
10.0.0.0/8           0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
172.16.0.0/12        0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
192.168.0.0/16       0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
0.0.0.0/8            0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
128.0.0.0/16         0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
191.255.0.0/16       0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
192.0.0.0/24         0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
223.255.255.0/24     0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
240.0.0.0/4          0.0.0.0/0             n/a
    0     0 DENY       all  ------ 0xFF 0x00  eth0
192.168.1.0/24       0.0.0.0/0             n/a
    0     0 DENY       all  ------ 0xFF 0x00  eth0
192.0.0.0            0.0.0.0/0             n/a
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   137
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   135
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   137
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   135
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   138:139
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   138
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             137:138 ->   *
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             135 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             137:139 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             135 ->   *
40484   23M ACCEPT     all  ------ 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             n/a
Chain fairq (1 references):
 pkts bytes target     prot opt    tosa tosx  ifname     mark       outsize
source                destination           ports
    0     0 RETURN     ospf ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             n/a
    0     0 RETURN     ospf ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             n/a
    0     0 RETURN     udp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             * ->   520
    0     0 RETURN     udp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             520 ->   *
    0     0 RETURN     tcp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             * ->   179
    0     0 RETURN     tcp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             179 ->   *
    0     0 RETURN     tcp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             * ->   53
    0     0 RETURN     tcp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             53 ->   *
    2   131 RETURN     udp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             * ->   53
    2   650 RETURN     udp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             53 ->   *
    0     0 RETURN     tcp  ------ 0xFF 0x00  *          0x2
0.0.0.0/0            0.0.0.0/0             * ->   23
    0     0 RETURN     tcp  ------ 0xFF 0x00  *          0x2
0.0.0.0/0            0.0.0.0/0             23 ->   *
    0     0 RETURN     tcp  ------ 0xFF 0x00  *          0x2
0.0.0.0/0            0.0.0.0/0             * ->   22
    0     0 RETURN     tcp  ------ 0xFF 0x00  *          0x2
0.0.0.0/0            0.0.0.0/0             22 ->   *

----------------------------------------------------------------------------

Messages:

Apr 15 16:31:51 j_and_s_firewall syslogd 1.3-3#31.slink1: restart.
Apr 15 16:31:51 j_and_s_firewall kernel: klogd 1.3-3#31.slink1, log source =
/proc/kmsg started.
Apr 15 16:31:51 j_and_s_firewall kernel: Cannot find map file.
Apr 15 16:31:51 j_and_s_firewall kernel: Loaded 15 symbols from 14 modules.
Apr 15 16:31:51 j_and_s_firewall kernel: Linux version 2.2.19
(root@PortegeVM) (gcc version 2.7.2.3) #1 Thu Aug 16 15:46:00 EST 2001
Apr 15 16:31:51 j_and_s_firewall kernel: BIOS-provided physical RAM map:
Apr 15 16:31:51 j_and_s_firewall kernel:  BIOS-e820: 0009f000 @ 00000000
(usable)
Apr 15 16:31:51 j_and_s_firewall kernel:  BIOS-e820: 01f00000 @ 00100000
(usable)
Apr 15 16:31:51 j_and_s_firewall kernel: Console: colour VGA+ 80x25
Apr 15 16:31:51 j_and_s_firewall kernel: Calibrating delay loop... 299.00
BogoMIPS
Apr 15 16:31:51 j_and_s_firewall kernel: Memory: 30140k/32768k available
(852k kernel code, 416k reserved, 608k data, 52k init)
Apr 15 16:31:51 j_and_s_firewall kernel: Dentry hash table entries: 4096
(order 3, 32k)
Apr 15 16:31:51 j_and_s_firewall kernel: Buffer cache hash table entries:
32768 (order 5, 128k)
Apr 15 16:31:51 j_and_s_firewall kernel: Page cache hash table entries: 8192
(order 3, 32k)
Apr 15 16:31:51 j_and_s_firewall kernel: CPU: Intel Pentium MMX stepping 04
Apr 15 16:31:51 j_and_s_firewall kernel: Checking 386/387 coupling... OK,
FPU using exception 16 error reporting.
Apr 15 16:31:51 j_and_s_firewall kernel: Checking 'hlt' instruction... OK.
Apr 15 16:31:51 j_and_s_firewall kernel: Intel Pentium with F0 0F bug -
workaround enabled.
Apr 15 16:31:51 j_and_s_firewall kernel: POSIX conformance testing by UNIFIX
Apr 15 16:31:51 j_and_s_firewall kernel: PCI: PCI BIOS revision 2.00 entry
at 0xfd180
Apr 15 16:31:51 j_and_s_firewall kernel: PCI: Using configuration type 1
Apr 15 16:31:51 j_and_s_firewall kernel: PCI: Probing PCI hardware
Apr 15 16:31:51 j_and_s_firewall kernel: Linux NET4.0 for Linux 2.2
Apr 15 16:31:51 j_and_s_firewall kernel: Based upon Swansea University
Computer Society NET3.039
Apr 15 16:31:51 j_and_s_firewall kernel: NET4: Unix domain sockets 1.0 for
Linux NET4.0.
Apr 15 16:31:51 j_and_s_firewall kernel: NET4: Linux TCP/IP 1.0 for NET4.0
Apr 15 16:31:51 j_and_s_firewall kernel: IP Protocols: ICMP, UDP, TCP, IGMP
Apr 15 16:31:51 j_and_s_firewall kernel: TCP: Hash tables configured (ehash
32768 bhash 32768)
Apr 15 16:31:51 j_and_s_firewall kernel: Linux IP multicast router 0.06 plus
PIM-SM
Apr 15 16:31:51 j_and_s_firewall kernel: Initializing RT netlink socket
Apr 15 16:31:51 j_and_s_firewall kernel: Starting kswapd v 1.5
Apr 15 16:31:51 j_and_s_firewall kernel: Detected PS/2 Mouse Port.
Apr 15 16:31:51 j_and_s_firewall kernel: Software Watchdog Timer: 0.05,
timer margin: 60 sec
Apr 15 16:31:51 j_and_s_firewall kernel: Real Time Clock Driver v1.09
Apr 15 16:31:51 j_and_s_firewall kernel: RAM disk driver initialized:  16
RAM disks of 13312K size
Apr 15 16:31:51 j_and_s_firewall kernel: CMD640: ignored by
ide_scan_pci_device() (uses own driver)
Apr 15 16:31:51 j_and_s_firewall kernel: hda: WDC AC33100H, ATA DISK drive
Apr 15 16:31:51 j_and_s_firewall kernel: ide0 at 0x1f0-0x1f7,0x3f6 on irq 14
Apr 15 16:31:51 j_and_s_firewall kernel: hda: WDC AC33100H, 3020MB w/128kB
Cache, CHS=767/128/63
Apr 15 16:31:51 j_and_s_firewall kernel: Floppy drive(s): fd0 is 1.44M
Apr 15 16:31:51 j_and_s_firewall kernel: FDC 0 is a National Semiconductor
PC87306
Apr 15 16:31:51 j_and_s_firewall kernel: NET4: Ethernet Bridge 007 for
NET4.0
Apr 15 16:31:51 j_and_s_firewall kernel: early initialization of device brg0
is deferred
Apr 15 16:31:51 j_and_s_firewall kernel: brg0: network interface for
Ethernet Bridge 007/NET4.0
Apr 15 16:31:51 j_and_s_firewall kernel: brg0: generated MAC address
FE:FD:0B:00:00:69
Apr 15 16:31:51 j_and_s_firewall kernel: brg0: attached to bridge instance 0
Apr 15 16:31:51 j_and_s_firewall kernel: Partition check:
Apr 15 16:31:51 j_and_s_firewall kernel:  hda: hda1
Apr 15 16:31:51 j_and_s_firewall kernel: RAMDISK: Compressed image found at
block 0
Apr 15 16:31:51 j_and_s_firewall kernel: RAMDISK: Uncompressing root
archive: done.
Apr 15 16:31:51 j_and_s_firewall kernel: RAMDISK: Auto Filesystem - minix:
4437i 13312bk 144fdz(144) 1024zs 2147483647ms
Apr 15 16:31:51 j_and_s_firewall kernel: VFS: Mounted root (minix
filesystem).
Apr 15 16:31:51 j_and_s_firewall kernel: RAMDISK: Extracting root archive:
done.
Apr 15 16:31:51 j_and_s_firewall kernel: Freeing unused kernel memory: 52k
freed
Apr 15 16:31:51 j_and_s_firewall kernel: airo:  Trying to configure ISA
adapter at irq=7 io=0x300
Apr 15 16:31:51 j_and_s_firewall kernel: airo: MAC enabled eth0
0:40:96:34:f6:f1
Apr 15 16:31:51 j_and_s_firewall kernel: airo:  Probing for PCI adapters
Apr 15 16:31:51 j_and_s_firewall kernel: airo:  Finished probing for PCI
adapters
Apr 15 16:31:51 j_and_s_firewall kernel: ne2k-pci.c:v1.01a 10/4/2000 D.
Becker/P. Gortmaker
Apr 15 16:31:51 j_and_s_firewall kernel:
http://www.scyld.com/network/ne2k-pci.html
Apr 15 16:31:51 j_and_s_firewall kernel: eth1: Winbond 89C940 found at
0xffe0, IRQ 9, 00:20:78:11:85:FE.
Apr 15 16:31:51 j_and_s_firewall kernel: martian source 048011d8 for
14993642, dev eth0
Apr 15 16:31:51 j_and_s_firewall kernel: ll header: 00 40 96 34 f6 f1 08 00
09 ac 51 ee 08 00
Apr 15 16:31:51 j_and_s_firewall kernel: martian source 048011d8 for
14993642, dev eth0
Apr 15 16:31:51 j_and_s_firewall kernel: ll header: 00 40 96 34 f6 f1 08 00
09 ac 51 ee 08 00
Apr 15 16:31:51 j_and_s_firewall kernel: martian source 048011d8 for
14993642, dev eth0
Apr 15 16:31:51 j_and_s_firewall kernel: ll header: 00 40 96 34 f6 f1 08 00
09 ac 51 ee 08 00
Apr 15 16:31:51 j_and_s_firewall kernel: martian source 048011d8 for
14993642, dev eth0
Apr 15 16:31:51 j_and_s_firewall kernel: ll header: 00 40 96 34 f6 f1 08 00
09 ac 51 ee 08 00
Apr 15 16:31:51 j_and_s_firewall kernel: martian source 048011d8 for
14993642, dev eth0
Apr 15 16:31:51 j_and_s_firewall kernel: ll header: 00 40 96 34 f6 f1 08 00
09 ac 51 ee 08 00
Apr 15 16:31:51 j_and_s_firewall kernel: martian source 048011d8 for
14993642, dev eth0
Apr 15 16:31:51 j_and_s_firewall kernel: ll header: 00 40 96 34 f6 f1 08 00
09 ac 51 ee 08 00
Apr 15 16:31:51 j_and_s_firewall kernel: martian source 048011d8 for
14993642, dev eth0
Apr 15 16:31:51 j_and_s_firewall kernel: ll header: 00 40 96 34 f6 f1 08 00
09 ac 51 ee 08 00
Apr 15 16:31:51 j_and_s_firewall kernel: martian source 048011d8 for
14993642, dev eth0
Apr 15 16:31:51 j_and_s_firewall kernel: ll header: 00 40 96 34 f6 f1 08 00
09 ac 51 ee 08 00
Apr 15 16:31:51 j_and_s_firewall kernel: martian source 048011d8 for
14993642, dev eth0
Apr 15 16:31:51 j_and_s_firewall kernel: ll header: 00 40 96 34 f6 f1 08 00
09 ac 51 ee 08 00
Apr 15 16:31:51 j_and_s_firewall kernel: martian source 048011d8 for
14993642, dev eth0
Apr 15 16:31:51 j_and_s_firewall kernel: ll header: 00 40 96 34 f6 f1 08 00
09 ac 51 ee 08 00
Apr 15 16:32:27 j_and_s_firewall kernel: VFS: Can't find a Minix or Minix V2
filesystem on device 02:00.
Apr 15 16:33:57 j_and_s_firewall kernel: Packet log: input REJECT eth1
PROTO=17 192.168.1.1:3362 255.255.255.255:161 L=84 S=0x00 I=23199 F=0x0000
T=128 (#43)
Apr 15 16:33:57 j_and_s_firewall kernel: NET: 18 messages suppressed.
Apr 15 16:33:57 j_and_s_firewall kernel: martian source c80000c0 for
c20000c0, dev eth1
Apr 15 16:33:57 j_and_s_firewall kernel: ll header: ff ff ff ff ff ff 00 60
b0 22 d0 98 08 06
Apr 15 16:33:58 j_and_s_firewall kernel: martian source c80000c0 for
c20000c0, dev eth1
Apr 15 16:33:58 j_and_s_firewall kernel: ll header: ff ff ff ff ff ff 00 60
b0 22 d0 98 08 06
Apr 15 16:33:58 j_and_s_firewall kernel: martian source c80000c0 for
c20000c0, dev eth1
Apr 15 16:33:58 j_and_s_firewall kernel: ll header: ff ff ff ff ff ff 00 60
b0 22 d0 98 08 06
Apr 15 16:35:30 j_and_s_firewall kernel: Packet log: input REJECT eth1
PROTO=17 192.168.1.1:3363 255.255.255.255:161 L=84 S=0x00 I=26193 F=0x0000
T=128 (#43)
Apr 15 16:35:30 j_and_s_firewall kernel: martian source c80000c0 for
c20000c0, dev eth1
Apr 15 16:35:30 j_and_s_firewall kernel: ll header: ff ff ff ff ff ff 00 60
b0 22 d0 98 08 06
Apr 15 16:35:30 j_and_s_firewall kernel: martian source c80000c0 for
c20000c0, dev eth1
Apr 15 16:35:30 j_and_s_firewall kernel: ll header: ff ff ff ff ff ff 00 60
b0 22 d0 98 08 06
Apr 15 16:35:30 j_and_s_firewall kernel: martian source c80000c0 for
c20000c0, dev eth1
Apr 15 16:35:30 j_and_s_firewall kernel: ll header: ff ff ff ff ff ff 00 60
b0 22 d0 98 08 06

----------------------------------------------------------------------------

mfw:

fwmark   rediraddr               rport  pcnt  pref

----------------------------------------------------------------------------

portfw:

prot localaddr            rediraddr               lport    rport  pcnt  pref

----------------------------------------------------------------------------

route:

66.54.153.0/27 dev eth0  proto kernel  scope link  src 66.54.153.20
192.168.1.0/24 dev eth1  proto kernel  scope link  src 192.168.1.254
default via 66.54.153.28 dev eth0


_______________________________________________
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user

Reply via email to