OK, hopefully the following is what was requested...

The machine is a Pentium 200 Mhz machine with 48M of memory.  Two 3Com
3C905-TX cards are being used in PCI slots 1 and 2.  Booting off an IDE
CD-ROM.  Firewall is running fine, no weird messages in the syslog.

Hopefully the following is what was requested and makes sense to someone...

Thanks in advance...
KARL

ip -s link:
1: lo: <LOOPBACK,UP> mtu 3924 qdisc noqueue
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    RX: bytes  packets  errors  dropped overrun mcast
    0          0        0       0       0       0
    TX: bytes  packets  errors  dropped carrier collsns
    0          0        0       0       0       0
2: ipsec0: <NOARP> mtu 0 qdisc noop qlen 10
    link/ipip
    RX: bytes  packets  errors  dropped overrun mcast
    0          0        0       0       0       0
    TX: bytes  packets  errors  dropped carrier collsns
    0          0        0       0       0       0
3: ipsec1: <NOARP> mtu 0 qdisc noop qlen 10
    link/ipip
    RX: bytes  packets  errors  dropped overrun mcast
    0          0        0       0       0       0
    TX: bytes  packets  errors  dropped carrier collsns
    0          0        0       0       0       0
4: ipsec2: <NOARP> mtu 0 qdisc noop qlen 10
    link/ipip
    RX: bytes  packets  errors  dropped overrun mcast
    0          0        0       0       0       0
    TX: bytes  packets  errors  dropped carrier collsns
    0          0        0       0       0       0
5: ipsec3: <NOARP> mtu 0 qdisc noop qlen 10
    link/ipip
    RX: bytes  packets  errors  dropped overrun mcast
    0          0        0       0       0       0
    TX: bytes  packets  errors  dropped carrier collsns
    0          0        0       0       0       0
6: brg0: <BROADCAST,MULTICAST> mtu 1500 qdisc noop
    link/ether fe:fd:04:00:19:09 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast
    0          0        0       0       0       0
    TX: bytes  packets  errors  dropped carrier collsns
    0          0        0       0       0       0
7: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
    link/ether 00:60:97:4f:88:f9 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast
    27648      309      0       0       0       0
    TX: bytes  packets  errors  dropped carrier collsns
    684        2        0       0       0       0
8: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
    link/ether 00:60:08:48:34:95 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast
    0          0        0       0       0       0
    TX: bytes  packets  errors  dropped carrier collsns
    0          0        0       0       0       0

uname -a:
   Linux firewall 2.2.19-3-LEAF-RAID #4 Sat Dec 1 17:27:59 CST 2001 i386
unknown

ip addr show:
Jun 22 06:28:49 firewall syslogd 1.3-3#31.slink1: restart.
Jun 22 06:28:49 firewall kernel: klogd 1.3-3#31.slink1, log source =
/proc/kmsg started.
Jun 22 06:28:49 firewall kernel: Cannot find map file.
Jun 22 06:28:49 firewall kernel: Loaded 23 symbols from 15 modules.
Jun 22 06:28:49 firewall kernel: Linux version 2.2.19-3-LEAF-RAID
(root@debian) (gcc version 2.7.2.3) #4 Sat Dec 1 17:27:59 CST 2001
Jun 22 06:28:49 firewall kernel: BIOS-provided physical RAM map:
Jun 22 06:28:49 firewall kernel:  BIOS-e820: 0009f000 @ 00000000 (usable)
Jun 22 06:28:49 firewall kernel:  BIOS-e820: 02f00000 @ 00100000 (usable)
Jun 22 06:28:49 firewall kernel: Detected 199310 kHz processor.
Jun 22 06:28:49 firewall kernel: Console: colour VGA+ 80x25
Jun 22 06:28:49 firewall kernel: Calibrating delay loop... 398.13 BogoMIPS
Jun 22 06:28:49 firewall kernel: Memory: 46036k/49152k available (1108k
kernel code, 416k reserved, 800k data, 52k init)
Jun 22 06:28:49 firewall kernel: Dentry hash table entries: 8192 (order 4,
64k)
Jun 22 06:28:49 firewall kernel: Buffer cache hash table entries: 65536
(order 6, 256k)
Jun 22 06:28:49 firewall kernel: Page cache hash table entries: 16384 (order
4, 64k)
Jun 22 06:28:49 firewall kernel: CPU: Intel Pentium MMX stepping 03
Jun 22 06:28:49 firewall kernel: Checking 386/387 coupling... OK, FPU using
exception 16 error reporting.
Jun 22 06:28:49 firewall kernel: Checking 'hlt' instruction... OK.
Jun 22 06:28:49 firewall kernel: Intel Pentium with F0 0F bug - workaround
enabled.
Jun 22 06:28:49 firewall kernel: POSIX conformance testing by UNIFIX
Jun 22 06:28:49 firewall kernel: PCI: PCI BIOS revision 2.10 entry at
0xf7112
Jun 22 06:28:49 firewall kernel: PCI: Using configuration type 1
Jun 22 06:28:49 firewall kernel: PCI: Probing PCI hardware
Jun 22 06:28:49 firewall kernel: Linux NET4.0 for Linux 2.2
Jun 22 06:28:49 firewall kernel: Based upon Swansea University Computer
Society NET3.039
Jun 22 06:28:49 firewall kernel: NET4: Unix domain sockets 1.0 for Linux
NET4.0.
Jun 22 06:28:49 firewall kernel: NET4: Linux TCP/IP 1.0 for NET4.0
Jun 22 06:28:49 firewall kernel: IP Protocols: ICMP, UDP, TCP, IGMP
Jun 22 06:28:49 firewall kernel: TCP: Hash tables configured (ehash 65536
bhash 65536)
Jun 22 06:28:49 firewall kernel: Linux IP multicast router 0.06 plus PIM-SM
Jun 22 06:28:49 firewall kernel: klips_info:ipsec_init: KLIPS startup,
FreeS/WAN IPSec version: 1.91
Jun 22 06:28:49 firewall kernel: early initialization of device ipsec0 is
deferred
Jun 22 06:28:49 firewall kernel: early initialization of device ipsec1 is
deferred
Jun 22 06:28:49 firewall kernel: early initialization of device ipsec2 is
deferred
Jun 22 06:28:49 firewall kernel: early initialization of device ipsec3 is
deferred
Jun 22 06:28:49 firewall kernel: Initializing RT netlink socket
Jun 22 06:28:49 firewall kernel: Starting kswapd v 1.5
Jun 22 06:28:49 firewall kernel: Detected PS/2 Mouse Port.
Jun 22 06:28:49 firewall kernel: Serial driver version 4.27 with MANY_PORTS
MULTIPORT SHARE_IRQ enabled
Jun 22 06:28:49 firewall kernel: ttyS00 at 0x03f8 (irq = 4) is a 16550A
Jun 22 06:28:49 firewall kernel: ttyS01 at 0x02f8 (irq = 3) is a 16550A
Jun 22 06:28:49 firewall kernel: Software Watchdog Timer: 0.05, timer
margin: 60 sec
Jun 22 06:28:49 firewall kernel: Real Time Clock Driver v1.09
Jun 22 06:28:49 firewall kernel: RAM disk driver initialized:  16 RAM disks
of 12288K size
Jun 22 06:28:49 firewall kernel: PIIX3: IDE controller on PCI bus 00 dev 79
Jun 22 06:28:49 firewall kernel: PIIX3: not 100%% native mode: will probe
irqs later
Jun 22 06:28:49 firewall kernel:     ide0: BM-DMA at 0xfc50-0xfc57, BIOS
settings: hda:pio, hdb:pio
Jun 22 06:28:49 firewall kernel:     ide1: BM-DMA at 0xfc58-0xfc5f, BIOS
settings: hdc:DMA, hdd:pio
Jun 22 06:28:49 firewall kernel: hdc: MATSHITA CR-583, ATAPI CDROM drive
Jun 22 06:28:49 firewall kernel: ide1 at 0x170-0x177,0x376 on irq 15
Jun 22 06:28:49 firewall kernel: Floppy drive(s): fd0 is 1.44M
Jun 22 06:28:49 firewall kernel: FDC 0 is a post-1991 82077
Jun 22 06:28:49 firewall kernel: md driver 0.90.0 MAX_MD_DEVS=256,
MAX_REAL=12
Jun 22 06:28:49 firewall kernel: raid5: measuring checksumming speed
Jun 22 06:28:49 firewall kernel: raid5: MMX detected, trying high-speed MMX
checksum routines
Jun 22 06:28:49 firewall kernel:    pII_mmx   :   306.705 MB/sec
Jun 22 06:28:49 firewall kernel:    p5_mmx    :   357.378 MB/sec
Jun 22 06:28:49 firewall kernel:    8regs     :   219.837 MB/sec
Jun 22 06:28:49 firewall kernel:    32regs    :   173.736 MB/sec
Jun 22 06:28:49 firewall kernel: using fastest function: p5_mmx (357.378
MB/sec)
Jun 22 06:28:49 firewall kernel: NET4: Ethernet Bridge 007 for NET4.0
Jun 22 06:28:49 firewall kernel: early initialization of device brg0 is
deferred
Jun 22 06:28:49 firewall kernel: brg0: network interface for Ethernet Bridge
007/NET4.0
Jun 22 06:28:49 firewall kernel: brg0: generated MAC address
FE:FD:04:00:19:09
Jun 22 06:28:49 firewall kernel: brg0: attached to bridge instance 0
Jun 22 06:28:49 firewall kernel: md.c: sizeof(mdp_super_t) = 4096
Jun 22 06:28:49 firewall kernel: Partition check:
Jun 22 06:28:49 firewall kernel: RAMDISK: Compressed image found at block 0
Jun 22 06:28:49 firewall kernel: RAMDISK: Uncompressing root archive: done.
Jun 22 06:28:49 firewall kernel: RAMDISK: Auto Filesystem - minix: 4096i
12288bk 133fdz(133) 1024zs 2147483647ms
Jun 22 06:28:49 firewall kernel: autodetecting RAID arrays
Jun 22 06:28:49 firewall kernel: autorun ...
Jun 22 06:28:49 firewall kernel: ... autorun DONE.
Jun 22 06:28:49 firewall kernel: VFS: Mounted root (minix filesystem).
Jun 22 06:28:49 firewall kernel: RAMDISK: Extracting root archive: done.
Jun 22 06:28:49 firewall kernel: hdc: ATAPI 8X CD-ROM drive, 128kB Cache
Jun 22 06:28:49 firewall kernel: Uniform CD-ROM driver Revision: 3.11
Jun 22 06:28:49 firewall kernel: autodetecting RAID arrays
Jun 22 06:28:49 firewall kernel: autorun ...
Jun 22 06:28:49 firewall kernel: ... autorun DONE.
Jun 22 06:28:49 firewall kernel: Freeing unused kernel memory: 52k freed
Jun 22 06:28:49 firewall kernel: 3c59x.c:v0.99Rb 8/8/2000 Donald Becker,
[EMAIL PROTECTED]
Jun 22 06:28:49 firewall kernel:   http://www.scyld.com/network/vortex.html
Jun 22 06:28:49 firewall kernel: eth0: 3Com 3c905 Boomerang 100baseTx at
0xfcc0,  00:60:97:4f:88:f9, IRQ 9
Jun 22 06:28:49 firewall kernel:   8K word-wide RAM 3:5 Rx:Tx split,
autoselect/MII interface.
Jun 22 06:28:49 firewall kernel:   MII transceiver found at address 24,
status 782d.
Jun 22 06:28:49 firewall kernel:   Enabling bus-master transmits and
whole-frame receives.
Jun 22 06:28:49 firewall kernel: eth1: 3Com 3c905 Boomerang 100baseTx at
0xfc80,  00:60:08:48:34:95, IRQ 11
Jun 22 06:28:49 firewall kernel:   8K word-wide RAM 3:5 Rx:Tx split,
autoselect/MII interface.
Jun 22 06:28:49 firewall kernel:   MII transceiver found at address 24,
status 786f.
Jun 22 06:28:49 firewall kernel:   Enabling bus-master transmits and
whole-frame receives.
Jun 22 06:29:31 firewall kernel: Packet log: input DENY eth0 PROTO=2
192.168.100.1:65535 224.0.0.1:65535 L=28 S=0xC0 I=0 F=0x0000 T=1 (#10)

ip route show:
192.168.1.0/24 dev eth1  proto kernel  scope link  src 192.168.1.254
68.9.68.0/22 dev eth0  proto kernel  scope link  src 68.9.68.240
default via 68.9.68.1 dev eth0

ipchains -nvL:
Chain input (policy DENY: 2 packets, 680 bytes):
 pkts bytes target     prot opt    tosa tosx  ifname     mark       outsize
source                destination           ports
    0     0 DENY       icmp ----l- 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             5 ->   *
    0     0 DENY       icmp ----l- 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             13 ->   *
    0     0 DENY       icmp ----l- 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             14 ->   *
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
0.0.0.0              0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
255.255.255.255      0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
127.0.0.0/8          0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
224.0.0.0/4          0.0.0.0/0             n/a
   22  7260 DENY       all  ------ 0xFF 0x00  eth0
10.0.0.0/8           0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
172.16.0.0/12        0.0.0.0/0             n/a
    1    28 DENY       all  ----l- 0xFF 0x00  eth0
192.168.0.0/16       0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
0.0.0.0/8            0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
128.0.0.0/16         0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
191.255.0.0/16       0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
192.0.0.0/24         0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
223.255.255.0/24     0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
240.0.0.0/4          0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
192.168.1.0/24       0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
68.9.68.240          0.0.0.0/0             n/a
    0     0 REJECT     all  ----l- 0xFF 0x00  eth0
0.0.0.0/0            127.0.0.0/8           n/a
    0     0 REJECT     all  ----l- 0xFF 0x00  eth0
0.0.0.0/0            192.168.1.0/24        n/a
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   137
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   135
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   137
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   135
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   138:139
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   138
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             137:138 ->   *
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             135 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             137:139 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             135 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   113
    0     0 ACCEPT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   1024:65535
    0     0 REJECT     udp  ----l- 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   161:162
    0     0 ACCEPT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   53
    0     0 ACCEPT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   68
    0     0 DENY       udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   67
    0     0 ACCEPT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   1024:65535
    0     0 ACCEPT     icmp ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   *
    0     0 ACCEPT     ospf ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             n/a
    0     0 REJECT     udp  ----l- 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             * ->   161:162
    0     0 REJECT     udp  ----l- 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             161:162 ->   *
    0     0 ACCEPT     all  ------ 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             n/a
Chain forward (policy DENY: 0 packets, 0 bytes):
 pkts bytes target     prot opt    tosa tosx  ifname     mark       outsize
source                destination           ports
    0     0 DENY       icmp ----l- 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             5 ->   *
    0     0 MASQ       all  ------ 0xFF 0x00  eth0
192.168.1.0/24       0.0.0.0/0             n/a
    0     0 DENY       all  ------ 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             n/a
Chain output (policy DENY: 0 packets, 0 bytes):
 pkts bytes target     prot opt    tosa tosx  ifname     mark       outsize
source                destination           ports
    0     0 fairq      all  ------ 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
0.0.0.0              0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
255.255.255.255      0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
127.0.0.0/8          0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
224.0.0.0/4          0.0.0.0/0             n/a
    0     0 DENY       all  ------ 0xFF 0x00  eth0
10.0.0.0/8           0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
172.16.0.0/12        0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
192.168.0.0/16       0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
0.0.0.0/8            0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
128.0.0.0/16         0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
191.255.0.0/16       0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
192.0.0.0/24         0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
223.255.255.0/24     0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0
240.0.0.0/4          0.0.0.0/0             n/a
    0     0 DENY       all  ------ 0xFF 0x00  eth0
192.168.1.0/24       0.0.0.0/0             n/a
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   137
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   135
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   137
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   135
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   138:139
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             * ->   138
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             137:138 ->   *
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             135 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             137:139 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0
0.0.0.0/0            0.0.0.0/0             135 ->   *
    0     0 ACCEPT     all  ------ 0xFF 0x00  *
0.0.0.0/0            0.0.0.0/0             n/a
Chain fairq (1 references):
 pkts bytes target     prot opt    tosa tosx  ifname     mark       outsize
source                destination           ports
    0     0 RETURN     ospf ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             n/a
    0     0 RETURN     ospf ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             n/a
    0     0 RETURN     udp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             * ->   520
    0     0 RETURN     udp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             520 ->   *
    0     0 RETURN     tcp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             * ->   179
    0     0 RETURN     tcp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             179 ->   *
    0     0 RETURN     tcp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             * ->   53
    0     0 RETURN     tcp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             53 ->   *
    0     0 RETURN     udp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             * ->   53
    0     0 RETURN     udp  ------ 0xFF 0x00  *          0x1
0.0.0.0/0            0.0.0.0/0             53 ->   *
    0     0 RETURN     tcp  ------ 0xFF 0x00  *          0x2
0.0.0.0/0            0.0.0.0/0             * ->   23
    0     0 RETURN     tcp  ------ 0xFF 0x00  *          0x2
0.0.0.0/0            0.0.0.0/0             23 ->   *
    0     0 RETURN     tcp  ------ 0xFF 0x00  *          0x2
0.0.0.0/0            0.0.0.0/0             * ->   22
    0     0 RETURN     tcp  ------ 0xFF 0x00  *          0x2
0.0.0.0/0            0.0.0.0/0             22 ->   *

lsmod:
Module         Pages    Used by
ip_masq_vdolive         1180   0 (unused)
ip_masq_user            3708   0 (unused)
ip_masq_raudio          2980   0 (unused)
ip_masq_quake           1220   0 (unused)
ip_masq_portfw          2416   0 (unused)
ip_masq_mfw             3196   0 (unused)
ip_masq_irc             1924   0 (unused)
ip_masq_ftp             3576   0 (unused)
ip_masq_cuseeme          964   0 (unused)
ip_masq_autofw          2476   0 (unused)
3c59x                  19988   2
pci-scan                2300   0 [3c59x]
isofs                  17692   0
ide-cd                 22672   0
cdrom                  26712   0 [ide-cd]


-----Original Message-----
From: Brad Fritz [mailto:[EMAIL PROTECTED]]
Sent: Friday, June 21, 2002 8:37 PM
To: Karl Poglitsch
Cc: [EMAIL PROTECTED]
Subject: Re: [leaf-user] Dachstein Firewall impacting trasnfer speeds?



Without more information, it is really hard to tell what the
problem might be.  A good place to start would be a description
of the hardware (processor type/speed, amount of memory, network
card make and model), the output from

  ip -s link

and some indication if you're seeing any suspicious messages
in /var/log/syslog .  I am probably forgetting lots of other
helpful stuff that's likely in the "How do I request help?"
FAQ at

http://sourceforge.net/docman/display_doc.php?docid=1891&group_id=13751

Tell us a little more about your setup, and I'm sure someone
here will be able to help.

--Brad


On Fri, 21 Jun 2002 19:13:07 EDT Karl Poglitsch wrote:

> Hopefully this isn't a stupid question, but I'm working on setting up a
> firewall on my COX cable connection.  I'm using the Dachstein CD image
> booting off the CD with some minor changes to allow it to detect my
ethernet
> cards, etc.  Basic setup type of stuff..
>
> Anywho, I'm taking a MASSIVE performance hit on my cable connection.  I
just
> did a speedtest today on and off the firewall box and got 3001/269 against
> http://bos.speakeasy.net with no firewall, and 82/270 with the firewall up
> and running.
>
> Any thoughts on why the firewall box would be causing that much of a hit
to
> my downstream speeds?  Upstream doesn't seem to be impacted at all.  I'm
not
> sure what would be causing this, so I don't know what else would help,
I'll
> be more than happy to provide more info if someone has any thoughts.
>
> Thanks in advance...
> KARL



-------------------------------------------------------
Sponsored by:
ThinkGeek at http://www.ThinkGeek.com/
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to