swfla.rr.com == aka == timewarner/roadrunner cable
I'm using the default setup on the Bering_1.0rc3 floppy1680 image
---except I went ahead and removed norfc1918 from 
/etc/shorewall/interfaces'  eth0

I'm still having the outside world suddenly disappear.
I can login to the firewall itself and ping the upstream BootP server 
address, but nothing outside of it.

Yes, if I powercycle the cable modem and issue:
    #shorewall stop
    #svi networking restart
    #shorewall start
      Shorewall Already Started
Everything works again, and I get a new DHCP Lease.
The strange thing is that the old lease wasn't supposed to renew/expire 
for another 5 hours.

> could you dump
> iptables -t nat -vnL > zz
> iptables --vnL >> zz
> . . . it sounds like it's not keeping up with his DHCP lease so I wanted
> to see how the rules are.

hmm, my Bering doesn't like the --vnL
so I did it with only a single dash -vnL
here's the dump . . .
------------------------------------------------------------
Chain PREROUTING (policy ACCEPT 241 packets, 17089 bytes)
  pkts bytes target     prot opt in     out     source               
destination

Chain POSTROUTING (policy ACCEPT 1309 packets, 86217 bytes)
  pkts bytes target     prot opt in     out     source               
destination
   185 11100 MASQUERADE  ah   --  *      eth0    192.168.1.0/24       
0.0.0.0/0

Chain OUTPUT (policy ACCEPT 1311 packets, 87121 bytes)
  pkts bytes target     prot opt in     out     source               
destination
Chain INPUT (policy DROP 2 packets, 138 bytes)
  pkts bytes target     prot opt in     out     source               
destination
   511 50052 ACCEPT     ah   --  lo     *       0.0.0.0/0            
0.0.0.0/0
   207 57264 eth0_in    ah   --  eth0   *       0.0.0.0/0            
0.0.0.0/0
   214 14275 eth1_in    ah   --  eth1   *       0.0.0.0/0            
0.0.0.0/0
     0     0 common     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0
     0     0 LOG        ah   --  *      *       0.0.0.0/0            
0.0.0.0/0          LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:'
     0     0 reject     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0

Chain FORWARD (policy DROP 0 packets, 0 bytes)
  pkts bytes target     prot opt in     out     source               
destination
  2365 1644K eth0_fwd   ah   --  eth0   *       0.0.0.0/0            
0.0.0.0/0
  1861  199K eth1_fwd   ah   --  eth1   *       0.0.0.0/0            
0.0.0.0/0
     0     0 common     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0
     0     0 LOG        ah   --  *      *       0.0.0.0/0            
0.0.0.0/0          LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:'
     0     0 reject     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0

Chain OUTPUT (policy DROP 0 packets, 0 bytes)
  pkts bytes target     prot opt in     out     source               
destination
   511 50052 ACCEPT     ah   --  *      lo      0.0.0.0/0            
0.0.0.0/0
     0     0 DROP       icmp --  *      *       0.0.0.0/0            
0.0.0.0/0          state INVALID
     4   288 ACCEPT     icmp --  *      *       0.0.0.0/0            
0.0.0.0/0
     0     0 ACCEPT     udp  --  *      eth0    0.0.0.0/0            
0.0.0.0/0          udp dpts:67:68
  1432 92881 fw2net     ah   --  *      eth0    0.0.0.0/0            
0.0.0.0/0
   171 15610 all2all    ah   --  *      eth1    0.0.0.0/0            
0.0.0.0/0
     0     0 common     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0
     0     0 LOG        ah   --  *      *       0.0.0.0/0            
0.0.0.0/0          LOG flags 0 level 6 prefix `Shorewall:OUTPUT:REJECT:'
     0     0 reject     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0

Chain all2all (3 references)
  pkts bytes target     prot opt in     out     source               
destination
   171 15610 ACCEPT     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0          state RELATED,ESTABLISHED
     0     0 common     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0
     0     0 LOG        ah   --  *      *       0.0.0.0/0            
0.0.0.0/0          LOG flags 0 level 6 prefix `Shorewall:all2all:REJECT:'
     0     0 reject     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0

Chain common (5 references)
  pkts bytes target     prot opt in     out     source               
destination
     0     0 icmpdef    icmp --  *      *       0.0.0.0/0            
0.0.0.0/0
    35  1820 ACCEPT     tcp  --  *      *       0.0.0.0/0            
0.0.0.0/0          tcp flags:0x10/0x10
     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
0.0.0.0/0          tcp flags:0x04/0x04
     0     0 REJECT     udp  --  *      *       0.0.0.0/0            
0.0.0.0/0          udp dpts:137:139 reject-with icmp-port-unreachable
     0     0 REJECT     udp  --  *      *       0.0.0.0/0            
0.0.0.0/0          udp dpt:445 reject-with icmp-port-unreachable
     0     0 reject     tcp  --  *      *       0.0.0.0/0            
0.0.0.0/0          tcp dpt:135
     0     0 DROP       udp  --  *      *       0.0.0.0/0            
0.0.0.0/0          udp dpt:1900
     0     0 DROP       ah   --  *      *       0.0.0.0/0            
255.255.255.255
     0     0 DROP       ah   --  *      *       0.0.0.0/0            
224.0.0.0/4
     0     0 reject     tcp  --  *      *       0.0.0.0/0            
0.0.0.0/0          tcp dpt:113
     0     0 DROP       udp  --  *      *       0.0.0.0/0            
0.0.0.0/0          udp spt:53 state NEW
     0     0 DROP       ah   --  *      *       0.0.0.0/0            
255.255.255.255
     0     0 DROP       ah   --  *      *       0.0.0.0/0            
192.168.1.255

Chain eth0_fwd (1 references)
  pkts bytes target     prot opt in     out     source               
destination
  2365 1644K net2all    ah   --  *      eth1    0.0.0.0/0            
0.0.0.0/0

Chain eth0_in (1 references)
  pkts bytes target     prot opt in     out     source               
destination
    15  5296 ACCEPT     udp  --  *      *       0.0.0.0/0            
0.0.0.0/0          udp dpts:67:68
     1    36 ACCEPT     icmp --  *      *       0.0.0.0/0            
0.0.0.0/0          icmp type 8
   191 51932 net2all    ah   --  *      *       0.0.0.0/0            
0.0.0.0/0

Chain eth1_fwd (1 references)
  pkts bytes target     prot opt in     out     source               
destination
  1861  199K loc2net    ah   --  *      eth0    0.0.0.0/0            
0.0.0.0/0

Chain eth1_in (1 references)
  pkts bytes target     prot opt in     out     source               
destination
     0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            
0.0.0.0/0          icmp type 8
   214 14275 loc2fw     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0

Chain fw2net (1 references)
  pkts bytes target     prot opt in     out     source               
destination
    35  1400 ACCEPT     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0          state RELATED,ESTABLISHED
     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
0.0.0.0/0          state NEW tcp dpt:53
  1397 91481 ACCEPT     udp  --  *      *       0.0.0.0/0            
0.0.0.0/0          state NEW udp dpt:53
     0     0 all2all    ah   --  *      *       0.0.0.0/0            
0.0.0.0/0

Chain icmpdef (1 references)
  pkts bytes target     prot opt in     out     source               
destination
     0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            
0.0.0.0/0          icmp type 0
     0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            
0.0.0.0/0          icmp type 4
     0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            
0.0.0.0/0          icmp type 3
     0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            
0.0.0.0/0          icmp type 11
     0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            
0.0.0.0/0          icmp type 12

Chain loc2fw (1 references)
  pkts bytes target     prot opt in     out     source               
destination
   202 13483 ACCEPT     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0          state RELATED,ESTABLISHED
     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
0.0.0.0/0          state NEW tcp dpt:22
    12   792 ACCEPT     udp  --  *      *       0.0.0.0/0            
0.0.0.0/0          state NEW udp dpt:53
     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
0.0.0.0/0          state NEW tcp dpt:80
     0     0 all2all    ah   --  *      *       0.0.0.0/0            
0.0.0.0/0

Chain loc2net (1 references)
  pkts bytes target     prot opt in     out     source               
destination
  1631  185K ACCEPT     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0          state RELATED,ESTABLISHED
   230 13800 ACCEPT     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0

Chain net2all (2 references)
  pkts bytes target     prot opt in     out     source               
destination
  2520 1694K ACCEPT     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0          state RELATED,ESTABLISHED
    36  1868 common     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0
     1    48 LOG        ah   --  *      *       0.0.0.0/0            
0.0.0.0/0          LOG flags 0 level 6 prefix `Shorewall:net2all:DROP:'
     1    48 DROP       ah   --  *      *       0.0.0.0/0            
0.0.0.0/0

Chain reject (6 references)
  pkts bytes target     prot opt in     out     source               
destination
     0     0 REJECT     tcp  --  *      *       0.0.0.0/0            
0.0.0.0/0          reject-with tcp-reset
     0     0 REJECT     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0          reject-with icmp-port-unreachable

Chain shorewall (0 references)
  pkts bytes target     prot opt in     out     source               
destination

------------------------------------------------------------
One last bit of worthless trivia,
this location has been running successfully with Dachstein
on a different Box for over 11months.
So there must be something weird in DHCP
that TimeWarner has setup for swfla.rr.com

(we're upgrading from a 386sx and figured
while we upgrade the hardware,
we'd upgrade the software too)



-------------------------------------------------------
This sf.net email is sponsored by: Dice - The leading online job board
for high-tech professionals. Search and apply for tech jobs today!
http://seeker.dice.com/seeker.epl?rel_code=31
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to