> maybe you should be a bit more specific of what you did and what _exactly_ > gets dropped.
Can do. Here's some more detail on the setup: key: beringfw --> Bering 1.0-stable box fw --> hardware nat/firewall (netgear FR314) hostA --> a host on the network behind beringfw (DSL Connection) | | |--------------------| | PPPoE interface | | | | **fw** | | | | 192.168.0.1/24 | |--------------------| | | |--------------------| | 192.168.0.4/24 | | | | **beringfw** | | | | 192.168.1.254/24 | |--------------------| | | |--------------------| | 192.168.1.11/24 | | | | **hostA** | |--------------------| I'm using this setup right now while I'm learning about Bering (i.e., that's why Bering is still behind another firewall). The behavior that I'd like to see right now is for hostA to be able to access the internet by going through both beringfw and fw. Here's some more information about beringfw: firewall: -root- # uname -a Linux firewall 2.4.18 #1 Sun Nov 10 17:40:20 UTC 2002 i586 unknown firewall: -root- # ip addr show 1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 brd 127.255.255.255 scope host lo 2: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 3: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100 link/ether 00:a0:24:e4:66:ea brd ff:ff:ff:ff:ff:ff inet 192.168.0.4/24 brd 192.168.0.255 scope global eth0 4: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100 link/ether 00:a0:cc:57:e7:a1 brd ff:ff:ff:ff:ff:ff inet 192.168.1.254/24 brd 192.168.1.255 scope global eth1 Here's what the problem is: >From the perspective of hostA, I can't connect to the internet. For illustration, I'll show what happens when hostA tries to ssh to 128.8.129.2. * hostA sends a packet to 128.8.129.2. This packet goes through beringfw and is successfully snat'd (i.e., the source address for the packet is now 192.168.0.4). * This packet travels through fw, and I assume that is working properly for the purposes of this discussion. This is a valid assumption because the next thing that I see is a reply from 128.8.129.2 after it goes through fw. This reply is now destined for 192.168.0.4 (aka beingfw). When beringfw receives the packet, it drops it, and logs it with the following message in /var/log/messages: Jan 20 11:40:49 firewall kernel: Shorewall:man1918:DROP:IN=eth0 OUT= MAC=00:a0:24:e4:66:ea:00:30:ab:06:6c:9c:08:00 SRC=128.8.129.2 DST=192.168.0.4 LEN=64 TOS=0x00 PREC=0x00 TTL=56 ID=17230 DF PROTO=TCP SPT=22 DPT=39534 WINDOW=25920 RES=0x00 ACK SYN URGP=0 The same thing happens when I try to establish any type of connection from hostA to the internet in this fashion. Based on the behavior I'm seeing, I would think that there is something wrong with the firewall ruleset. And this is where I'm confused. I haven't touched the ruleset since installing bering. It is the default ruleset included with bering 1.0-stable. You can view my ruleset at the following URL (it was too long to post here): http://www.cs.umd.edu/~bdpayne/iptables.rules Thanks for any help you can provide! If you need more information, let me know and I will post it. -bryan ------------------------------------------------------- This SF.NET email is sponsored by: FREE SSL Guide from Thawte are you planning your Web Server Security? Click here to get a FREE Thawte SSL guide and find the answers to all your SSL security issues. http://ads.sourceforge.net/cgi-bin/redirect.pl?thaw0026en ------------------------------------------------------------------------ leaf-user mailing list: [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/leaf-user SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html