OK, hopefully the following is what was requested...
The machine is a Pentium 200 Mhz machine with 48M of memory. Two 3Com
3C905-TX cards are being used in PCI slots 1 and 2. Booting off an IDE
CD-ROM. Firewall is running fine, no weird messages in the syslog.
Hopefully the following is what was requested and makes sense to someone...
Thanks in advance...
KARL
ip -s link:
1: lo: <LOOPBACK,UP> mtu 3924 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
RX: bytes packets errors dropped overrun mcast
0 0 0 0 0 0
TX: bytes packets errors dropped carrier collsns
0 0 0 0 0 0
2: ipsec0: <NOARP> mtu 0 qdisc noop qlen 10
link/ipip
RX: bytes packets errors dropped overrun mcast
0 0 0 0 0 0
TX: bytes packets errors dropped carrier collsns
0 0 0 0 0 0
3: ipsec1: <NOARP> mtu 0 qdisc noop qlen 10
link/ipip
RX: bytes packets errors dropped overrun mcast
0 0 0 0 0 0
TX: bytes packets errors dropped carrier collsns
0 0 0 0 0 0
4: ipsec2: <NOARP> mtu 0 qdisc noop qlen 10
link/ipip
RX: bytes packets errors dropped overrun mcast
0 0 0 0 0 0
TX: bytes packets errors dropped carrier collsns
0 0 0 0 0 0
5: ipsec3: <NOARP> mtu 0 qdisc noop qlen 10
link/ipip
RX: bytes packets errors dropped overrun mcast
0 0 0 0 0 0
TX: bytes packets errors dropped carrier collsns
0 0 0 0 0 0
6: brg0: <BROADCAST,MULTICAST> mtu 1500 qdisc noop
link/ether fe:fd:04:00:19:09 brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
0 0 0 0 0 0
TX: bytes packets errors dropped carrier collsns
0 0 0 0 0 0
7: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
link/ether 00:60:97:4f:88:f9 brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
27648 309 0 0 0 0
TX: bytes packets errors dropped carrier collsns
684 2 0 0 0 0
8: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
link/ether 00:60:08:48:34:95 brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
0 0 0 0 0 0
TX: bytes packets errors dropped carrier collsns
0 0 0 0 0 0
uname -a:
Linux firewall 2.2.19-3-LEAF-RAID #4 Sat Dec 1 17:27:59 CST 2001 i386
unknown
ip addr show:
Jun 22 06:28:49 firewall syslogd 1.3-3#31.slink1: restart.
Jun 22 06:28:49 firewall kernel: klogd 1.3-3#31.slink1, log source =
/proc/kmsg started.
Jun 22 06:28:49 firewall kernel: Cannot find map file.
Jun 22 06:28:49 firewall kernel: Loaded 23 symbols from 15 modules.
Jun 22 06:28:49 firewall kernel: Linux version 2.2.19-3-LEAF-RAID
(root@debian) (gcc version 2.7.2.3) #4 Sat Dec 1 17:27:59 CST 2001
Jun 22 06:28:49 firewall kernel: BIOS-provided physical RAM map:
Jun 22 06:28:49 firewall kernel: BIOS-e820: 0009f000 @ 00000000 (usable)
Jun 22 06:28:49 firewall kernel: BIOS-e820: 02f00000 @ 00100000 (usable)
Jun 22 06:28:49 firewall kernel: Detected 199310 kHz processor.
Jun 22 06:28:49 firewall kernel: Console: colour VGA+ 80x25
Jun 22 06:28:49 firewall kernel: Calibrating delay loop... 398.13 BogoMIPS
Jun 22 06:28:49 firewall kernel: Memory: 46036k/49152k available (1108k
kernel code, 416k reserved, 800k data, 52k init)
Jun 22 06:28:49 firewall kernel: Dentry hash table entries: 8192 (order 4,
64k)
Jun 22 06:28:49 firewall kernel: Buffer cache hash table entries: 65536
(order 6, 256k)
Jun 22 06:28:49 firewall kernel: Page cache hash table entries: 16384 (order
4, 64k)
Jun 22 06:28:49 firewall kernel: CPU: Intel Pentium MMX stepping 03
Jun 22 06:28:49 firewall kernel: Checking 386/387 coupling... OK, FPU using
exception 16 error reporting.
Jun 22 06:28:49 firewall kernel: Checking 'hlt' instruction... OK.
Jun 22 06:28:49 firewall kernel: Intel Pentium with F0 0F bug - workaround
enabled.
Jun 22 06:28:49 firewall kernel: POSIX conformance testing by UNIFIX
Jun 22 06:28:49 firewall kernel: PCI: PCI BIOS revision 2.10 entry at
0xf7112
Jun 22 06:28:49 firewall kernel: PCI: Using configuration type 1
Jun 22 06:28:49 firewall kernel: PCI: Probing PCI hardware
Jun 22 06:28:49 firewall kernel: Linux NET4.0 for Linux 2.2
Jun 22 06:28:49 firewall kernel: Based upon Swansea University Computer
Society NET3.039
Jun 22 06:28:49 firewall kernel: NET4: Unix domain sockets 1.0 for Linux
NET4.0.
Jun 22 06:28:49 firewall kernel: NET4: Linux TCP/IP 1.0 for NET4.0
Jun 22 06:28:49 firewall kernel: IP Protocols: ICMP, UDP, TCP, IGMP
Jun 22 06:28:49 firewall kernel: TCP: Hash tables configured (ehash 65536
bhash 65536)
Jun 22 06:28:49 firewall kernel: Linux IP multicast router 0.06 plus PIM-SM
Jun 22 06:28:49 firewall kernel: klips_info:ipsec_init: KLIPS startup,
FreeS/WAN IPSec version: 1.91
Jun 22 06:28:49 firewall kernel: early initialization of device ipsec0 is
deferred
Jun 22 06:28:49 firewall kernel: early initialization of device ipsec1 is
deferred
Jun 22 06:28:49 firewall kernel: early initialization of device ipsec2 is
deferred
Jun 22 06:28:49 firewall kernel: early initialization of device ipsec3 is
deferred
Jun 22 06:28:49 firewall kernel: Initializing RT netlink socket
Jun 22 06:28:49 firewall kernel: Starting kswapd v 1.5
Jun 22 06:28:49 firewall kernel: Detected PS/2 Mouse Port.
Jun 22 06:28:49 firewall kernel: Serial driver version 4.27 with MANY_PORTS
MULTIPORT SHARE_IRQ enabled
Jun 22 06:28:49 firewall kernel: ttyS00 at 0x03f8 (irq = 4) is a 16550A
Jun 22 06:28:49 firewall kernel: ttyS01 at 0x02f8 (irq = 3) is a 16550A
Jun 22 06:28:49 firewall kernel: Software Watchdog Timer: 0.05, timer
margin: 60 sec
Jun 22 06:28:49 firewall kernel: Real Time Clock Driver v1.09
Jun 22 06:28:49 firewall kernel: RAM disk driver initialized: 16 RAM disks
of 12288K size
Jun 22 06:28:49 firewall kernel: PIIX3: IDE controller on PCI bus 00 dev 79
Jun 22 06:28:49 firewall kernel: PIIX3: not 100%% native mode: will probe
irqs later
Jun 22 06:28:49 firewall kernel: ide0: BM-DMA at 0xfc50-0xfc57, BIOS
settings: hda:pio, hdb:pio
Jun 22 06:28:49 firewall kernel: ide1: BM-DMA at 0xfc58-0xfc5f, BIOS
settings: hdc:DMA, hdd:pio
Jun 22 06:28:49 firewall kernel: hdc: MATSHITA CR-583, ATAPI CDROM drive
Jun 22 06:28:49 firewall kernel: ide1 at 0x170-0x177,0x376 on irq 15
Jun 22 06:28:49 firewall kernel: Floppy drive(s): fd0 is 1.44M
Jun 22 06:28:49 firewall kernel: FDC 0 is a post-1991 82077
Jun 22 06:28:49 firewall kernel: md driver 0.90.0 MAX_MD_DEVS=256,
MAX_REAL=12
Jun 22 06:28:49 firewall kernel: raid5: measuring checksumming speed
Jun 22 06:28:49 firewall kernel: raid5: MMX detected, trying high-speed MMX
checksum routines
Jun 22 06:28:49 firewall kernel: pII_mmx : 306.705 MB/sec
Jun 22 06:28:49 firewall kernel: p5_mmx : 357.378 MB/sec
Jun 22 06:28:49 firewall kernel: 8regs : 219.837 MB/sec
Jun 22 06:28:49 firewall kernel: 32regs : 173.736 MB/sec
Jun 22 06:28:49 firewall kernel: using fastest function: p5_mmx (357.378
MB/sec)
Jun 22 06:28:49 firewall kernel: NET4: Ethernet Bridge 007 for NET4.0
Jun 22 06:28:49 firewall kernel: early initialization of device brg0 is
deferred
Jun 22 06:28:49 firewall kernel: brg0: network interface for Ethernet Bridge
007/NET4.0
Jun 22 06:28:49 firewall kernel: brg0: generated MAC address
FE:FD:04:00:19:09
Jun 22 06:28:49 firewall kernel: brg0: attached to bridge instance 0
Jun 22 06:28:49 firewall kernel: md.c: sizeof(mdp_super_t) = 4096
Jun 22 06:28:49 firewall kernel: Partition check:
Jun 22 06:28:49 firewall kernel: RAMDISK: Compressed image found at block 0
Jun 22 06:28:49 firewall kernel: RAMDISK: Uncompressing root archive: done.
Jun 22 06:28:49 firewall kernel: RAMDISK: Auto Filesystem - minix: 4096i
12288bk 133fdz(133) 1024zs 2147483647ms
Jun 22 06:28:49 firewall kernel: autodetecting RAID arrays
Jun 22 06:28:49 firewall kernel: autorun ...
Jun 22 06:28:49 firewall kernel: ... autorun DONE.
Jun 22 06:28:49 firewall kernel: VFS: Mounted root (minix filesystem).
Jun 22 06:28:49 firewall kernel: RAMDISK: Extracting root archive: done.
Jun 22 06:28:49 firewall kernel: hdc: ATAPI 8X CD-ROM drive, 128kB Cache
Jun 22 06:28:49 firewall kernel: Uniform CD-ROM driver Revision: 3.11
Jun 22 06:28:49 firewall kernel: autodetecting RAID arrays
Jun 22 06:28:49 firewall kernel: autorun ...
Jun 22 06:28:49 firewall kernel: ... autorun DONE.
Jun 22 06:28:49 firewall kernel: Freeing unused kernel memory: 52k freed
Jun 22 06:28:49 firewall kernel: 3c59x.c:v0.99Rb 8/8/2000 Donald Becker,
[EMAIL PROTECTED]
Jun 22 06:28:49 firewall kernel: http://www.scyld.com/network/vortex.html
Jun 22 06:28:49 firewall kernel: eth0: 3Com 3c905 Boomerang 100baseTx at
0xfcc0, 00:60:97:4f:88:f9, IRQ 9
Jun 22 06:28:49 firewall kernel: 8K word-wide RAM 3:5 Rx:Tx split,
autoselect/MII interface.
Jun 22 06:28:49 firewall kernel: MII transceiver found at address 24,
status 782d.
Jun 22 06:28:49 firewall kernel: Enabling bus-master transmits and
whole-frame receives.
Jun 22 06:28:49 firewall kernel: eth1: 3Com 3c905 Boomerang 100baseTx at
0xfc80, 00:60:08:48:34:95, IRQ 11
Jun 22 06:28:49 firewall kernel: 8K word-wide RAM 3:5 Rx:Tx split,
autoselect/MII interface.
Jun 22 06:28:49 firewall kernel: MII transceiver found at address 24,
status 786f.
Jun 22 06:28:49 firewall kernel: Enabling bus-master transmits and
whole-frame receives.
Jun 22 06:29:31 firewall kernel: Packet log: input DENY eth0 PROTO=2
192.168.100.1:65535 224.0.0.1:65535 L=28 S=0xC0 I=0 F=0x0000 T=1 (#10)
ip route show:
192.168.1.0/24 dev eth1 proto kernel scope link src 192.168.1.254
68.9.68.0/22 dev eth0 proto kernel scope link src 68.9.68.240
default via 68.9.68.1 dev eth0
ipchains -nvL:
Chain input (policy DENY: 2 packets, 680 bytes):
pkts bytes target prot opt tosa tosx ifname mark outsize
source destination ports
0 0 DENY icmp ----l- 0xFF 0x00 *
0.0.0.0/0 0.0.0.0/0 5 -> *
0 0 DENY icmp ----l- 0xFF 0x00 *
0.0.0.0/0 0.0.0.0/0 13 -> *
0 0 DENY icmp ----l- 0xFF 0x00 *
0.0.0.0/0 0.0.0.0/0 14 -> *
0 0 DENY all ----l- 0xFF 0x00 eth0
0.0.0.0 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
255.255.255.255 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
127.0.0.0/8 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
224.0.0.0/4 0.0.0.0/0 n/a
22 7260 DENY all ------ 0xFF 0x00 eth0
10.0.0.0/8 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
172.16.0.0/12 0.0.0.0/0 n/a
1 28 DENY all ----l- 0xFF 0x00 eth0
192.168.0.0/16 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
0.0.0.0/8 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
128.0.0.0/16 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
191.255.0.0/16 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
192.0.0.0/24 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
223.255.255.0/24 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
240.0.0.0/4 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
192.168.1.0/24 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
68.9.68.240 0.0.0.0/0 n/a
0 0 REJECT all ----l- 0xFF 0x00 eth0
0.0.0.0/0 127.0.0.0/8 n/a
0 0 REJECT all ----l- 0xFF 0x00 eth0
0.0.0.0/0 192.168.1.0/24 n/a
0 0 REJECT tcp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 137
0 0 REJECT tcp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 135
0 0 REJECT udp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 137
0 0 REJECT udp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 135
0 0 REJECT tcp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 138:139
0 0 REJECT udp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 138
0 0 REJECT udp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 137:138 -> *
0 0 REJECT udp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 135 -> *
0 0 REJECT tcp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 137:139 -> *
0 0 REJECT tcp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 135 -> *
0 0 REJECT tcp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 113
0 0 ACCEPT tcp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 1024:65535
0 0 REJECT udp ----l- 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 161:162
0 0 ACCEPT udp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 53
0 0 ACCEPT udp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 68
0 0 DENY udp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 67
0 0 ACCEPT udp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 1024:65535
0 0 ACCEPT icmp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> *
0 0 ACCEPT ospf ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 n/a
0 0 REJECT udp ----l- 0xFF 0x00 *
0.0.0.0/0 0.0.0.0/0 * -> 161:162
0 0 REJECT udp ----l- 0xFF 0x00 *
0.0.0.0/0 0.0.0.0/0 161:162 -> *
0 0 ACCEPT all ------ 0xFF 0x00 *
0.0.0.0/0 0.0.0.0/0 n/a
Chain forward (policy DENY: 0 packets, 0 bytes):
pkts bytes target prot opt tosa tosx ifname mark outsize
source destination ports
0 0 DENY icmp ----l- 0xFF 0x00 *
0.0.0.0/0 0.0.0.0/0 5 -> *
0 0 MASQ all ------ 0xFF 0x00 eth0
192.168.1.0/24 0.0.0.0/0 n/a
0 0 DENY all ------ 0xFF 0x00 *
0.0.0.0/0 0.0.0.0/0 n/a
Chain output (policy DENY: 0 packets, 0 bytes):
pkts bytes target prot opt tosa tosx ifname mark outsize
source destination ports
0 0 fairq all ------ 0xFF 0x00 *
0.0.0.0/0 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
0.0.0.0 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
255.255.255.255 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
127.0.0.0/8 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
224.0.0.0/4 0.0.0.0/0 n/a
0 0 DENY all ------ 0xFF 0x00 eth0
10.0.0.0/8 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
172.16.0.0/12 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
192.168.0.0/16 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
0.0.0.0/8 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
128.0.0.0/16 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
191.255.0.0/16 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
192.0.0.0/24 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
223.255.255.0/24 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 eth0
240.0.0.0/4 0.0.0.0/0 n/a
0 0 DENY all ------ 0xFF 0x00 eth0
192.168.1.0/24 0.0.0.0/0 n/a
0 0 REJECT tcp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 137
0 0 REJECT tcp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 135
0 0 REJECT udp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 137
0 0 REJECT udp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 135
0 0 REJECT tcp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 138:139
0 0 REJECT udp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 * -> 138
0 0 REJECT udp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 137:138 -> *
0 0 REJECT udp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 135 -> *
0 0 REJECT tcp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 137:139 -> *
0 0 REJECT tcp ------ 0xFF 0x00 eth0
0.0.0.0/0 0.0.0.0/0 135 -> *
0 0 ACCEPT all ------ 0xFF 0x00 *
0.0.0.0/0 0.0.0.0/0 n/a
Chain fairq (1 references):
pkts bytes target prot opt tosa tosx ifname mark outsize
source destination ports
0 0 RETURN ospf ------ 0xFF 0x00 * 0x1
0.0.0.0/0 0.0.0.0/0 n/a
0 0 RETURN ospf ------ 0xFF 0x00 * 0x1
0.0.0.0/0 0.0.0.0/0 n/a
0 0 RETURN udp ------ 0xFF 0x00 * 0x1
0.0.0.0/0 0.0.0.0/0 * -> 520
0 0 RETURN udp ------ 0xFF 0x00 * 0x1
0.0.0.0/0 0.0.0.0/0 520 -> *
0 0 RETURN tcp ------ 0xFF 0x00 * 0x1
0.0.0.0/0 0.0.0.0/0 * -> 179
0 0 RETURN tcp ------ 0xFF 0x00 * 0x1
0.0.0.0/0 0.0.0.0/0 179 -> *
0 0 RETURN tcp ------ 0xFF 0x00 * 0x1
0.0.0.0/0 0.0.0.0/0 * -> 53
0 0 RETURN tcp ------ 0xFF 0x00 * 0x1
0.0.0.0/0 0.0.0.0/0 53 -> *
0 0 RETURN udp ------ 0xFF 0x00 * 0x1
0.0.0.0/0 0.0.0.0/0 * -> 53
0 0 RETURN udp ------ 0xFF 0x00 * 0x1
0.0.0.0/0 0.0.0.0/0 53 -> *
0 0 RETURN tcp ------ 0xFF 0x00 * 0x2
0.0.0.0/0 0.0.0.0/0 * -> 23
0 0 RETURN tcp ------ 0xFF 0x00 * 0x2
0.0.0.0/0 0.0.0.0/0 23 -> *
0 0 RETURN tcp ------ 0xFF 0x00 * 0x2
0.0.0.0/0 0.0.0.0/0 * -> 22
0 0 RETURN tcp ------ 0xFF 0x00 * 0x2
0.0.0.0/0 0.0.0.0/0 22 -> *
lsmod:
Module Pages Used by
ip_masq_vdolive 1180 0 (unused)
ip_masq_user 3708 0 (unused)
ip_masq_raudio 2980 0 (unused)
ip_masq_quake 1220 0 (unused)
ip_masq_portfw 2416 0 (unused)
ip_masq_mfw 3196 0 (unused)
ip_masq_irc 1924 0 (unused)
ip_masq_ftp 3576 0 (unused)
ip_masq_cuseeme 964 0 (unused)
ip_masq_autofw 2476 0 (unused)
3c59x 19988 2
pci-scan 2300 0 [3c59x]
isofs 17692 0
ide-cd 22672 0
cdrom 26712 0 [ide-cd]
-----Original Message-----
From: Brad Fritz [mailto:[EMAIL PROTECTED]]
Sent: Friday, June 21, 2002 8:37 PM
To: Karl Poglitsch
Cc: [EMAIL PROTECTED]
Subject: Re: [leaf-user] Dachstein Firewall impacting trasnfer speeds?
Without more information, it is really hard to tell what the
problem might be. A good place to start would be a description
of the hardware (processor type/speed, amount of memory, network
card make and model), the output from
ip -s link
and some indication if you're seeing any suspicious messages
in /var/log/syslog . I am probably forgetting lots of other
helpful stuff that's likely in the "How do I request help?"
FAQ at
http://sourceforge.net/docman/display_doc.php?docid=1891&group_id=13751
Tell us a little more about your setup, and I'm sure someone
here will be able to help.
--Brad
On Fri, 21 Jun 2002 19:13:07 EDT Karl Poglitsch wrote:
> Hopefully this isn't a stupid question, but I'm working on setting up a
> firewall on my COX cable connection. I'm using the Dachstein CD image
> booting off the CD with some minor changes to allow it to detect my
ethernet
> cards, etc. Basic setup type of stuff..
>
> Anywho, I'm taking a MASSIVE performance hit on my cable connection. I
just
> did a speedtest today on and off the firewall box and got 3001/269 against
> http://bos.speakeasy.net with no firewall, and 82/270 with the firewall up
> and running.
>
> Any thoughts on why the firewall box would be causing that much of a hit
to
> my downstream speeds? Upstream doesn't seem to be impacted at all. I'm
not
> sure what would be causing this, so I don't know what else would help,
I'll
> be more than happy to provide more info if someone has any thoughts.
>
> Thanks in advance...
> KARL
-------------------------------------------------------
Sponsored by:
ThinkGeek at http://www.ThinkGeek.com/
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html