Charles,

I am not sure how to get the net ipfilter list output to my windows
machine for adding to email.

I did capture the output from the logs displayed by weblet.  They are
pasted in below.


1      10:53:34.490  02/15/03  Sev=Warning/2    IKE/0xE300007B
Exceeded 3 IKE SA negotiation retransmits... peer is not responding

2      10:53:34.550  02/15/03  Sev=Warning/3    DIALER/0xE3300015
GI VPN start callback failed "CM_PEER_NOT_RESPONDING" (16h).





Feb 13 12:11:54 firewall syslogd 1.3-3#31.slink1: restart.
Feb 13 12:11:54 firewall kernel: klogd 1.3-3#31.slink1, log source =
/proc/kmsg started.
Feb 13 12:11:54 firewall kernel: Cannot find map file.
Feb 13 12:11:54 firewall kernel: Loaded 15 symbols from 14 modules.
Feb 13 12:11:54 firewall kernel: Linux version 2.2.19-3-LEAF
(root@debian) (gcc version
2.7.2.3) #1 Sat Dec 1 12:15:05 CST 2001 
Feb 13 12:11:54 firewall kernel: BIOS-provided physical RAM map: 
Feb 13 12:11:54 firewall kernel: BIOS-88: 000a0000 @ 00000000 (usable) 
Feb 13 12:11:54 firewall kernel: BIOS-88: 02f00000 @ 00100000 (usable) 
Feb 13 12:11:54 firewall kernel: Detected 90005 kHz processor. 
Feb 13 12:11:54 firewall kernel: Console: mono *MDA 80x25 
Feb 13 12:11:54 firewall kernel: Calibrating delay loop... 179.40
BogoMIPS 
Feb 13 12:11:54 firewall kernel: Memory: 46520k/49152k available (732k
kernel code, 412k
reserved, 744k data, 44k init) 
Feb 13 12:11:54 firewall kernel: Dentry hash table entries: 8192 (order
4, 64k) 
Feb 13 12:11:54 firewall kernel: Buffer cache hash table entries: 65536
(order 6, 256k) 
Feb 13 12:11:54 firewall kernel: Page cache hash table entries: 16384
(order 4, 64k) 
Feb 13 12:11:54 firewall kernel: CPU: Intel Pentium 75 - 200 stepping 04 
Feb 13 12:11:54 firewall kernel: Checking 386/387 coupling... OK, FPU
using exception 16 error
reporting. 
Feb 13 12:11:54 firewall kernel: Checking 'hlt' instruction... OK. 
Feb 13 12:11:54 firewall kernel: Intel Pentium with F0 0F bug -
workaround enabled. 
Feb 13 12:11:54 firewall kernel: POSIX conformance testing by UNIFIX 
Feb 13 12:11:54 firewall kernel: PCI: PCI BIOS revision 2.00 entry at
0xfbc9c 
Feb 13 12:11:54 firewall kernel: PCI: Using configuration type 2 
Feb 13 12:11:54 firewall kernel: PCI: Probing PCI hardware 
Feb 13 12:11:54 firewall kernel: Linux NET4.0 for Linux 2.2 
Feb 13 12:11:54 firewall kernel: Based upon Swansea University Computer
Society NET3.039 
Feb 13 12:11:54 firewall kernel: NET4: Unix domain sockets 1.0 for Linux
NET4.0. 
Feb 13 12:11:54 firewall kernel: NET4: Linux TCP/IP 1.0 for NET4.0 
Feb 13 12:11:54 firewall kernel: IP Protocols: ICMP, UDP, TCP 
Feb 13 12:11:54 firewall kernel: TCP: Hash tables configured (ehash
65536 bhash 65536) 
Feb 13 12:11:54 firewall kernel: Initializing RT netlink socket 
Feb 13 12:11:54 firewall kernel: Starting kswapd v 1.5 
Feb 13 12:11:54 firewall kernel: Software Watchdog Timer: 0.05, timer
margin: 60 sec 
Feb 13 12:11:54 firewall kernel: Real Time Clock Driver v1.09 
Feb 13 12:11:54 firewall kernel: RAM disk driver initialized: 16 RAM
disks of 6144K size 
Feb 13 12:11:54 firewall kernel: Floppy drive(s): fd0 is 1.44M 
Feb 13 12:11:54 firewall kernel: FDC 0 is an 8272A 
Feb 13 12:11:54 firewall kernel: RAMDISK: Compressed image found at
block 0 
Feb 13 12:11:54 firewall kernel: RAMDISK: Uncompressing root archive:
done. 
Feb 13 12:11:54 firewall kernel: RAMDISK: Auto Filesystem - minix: 2048i
6144bk 68fdz(68)
1024zs 2147483647ms 
Feb 13 12:11:54 firewall kernel: VFS: Mounted root (minix filesystem). 
Feb 13 12:11:54 firewall kernel: RAMDISK: Extracting root archive: done. 
Feb 13 12:11:54 firewall kernel: Freeing unused kernel memory: 44k freed 
Feb 13 12:11:54 firewall kernel: ne.c:v1.10 9/23/94 Donald Becker
([EMAIL PROTECTED])

Feb 13 12:11:54 firewall kernel: NE*000 ethercard probe at 0x300: 00 00
21 6c 1c 34 
Feb 13 12:11:54 firewall kernel: eth0: NE2000 found at 0x300, using IRQ
10. 
Feb 13 12:11:54 firewall kernel: eth1: 3c509 at 0x320 tag 1, BNC port,
address 00 20 af 74 38
68, IRQ 7. 
Feb 13 12:11:54 firewall kernel: 3c509.c:1.16 (2.2) 2/3/98
[EMAIL PROTECTED] 
Feb 13 12:11:54 firewall kernel: eth2: 3c509 at 0x340 tag 2, 10baseT
port, address 00 20 af e9
7a 00, IRQ 11. 
Feb 13 12:11:54 firewall kernel: 3c509.c:1.16 (2.2) 2/3/98
[EMAIL PROTECTED] 
Feb 13 12:11:54 firewall kernel: ip_masq_ipsec: loading 
Feb 13 12:11:54 firewall kernel: eth1: Setting Rx mode to 1 addresses. 
Feb 13 14:35:40 firewall kernel: Packet log: input DENY eth0 PROTO=6
196.1.111.164:2725
12.237.136.59:21 L=60 S=0x00 I=24479 F=0x4000 T=40 SYN (#44) 
Feb 13 14:35:43 firewall kernel: Packet log: input DENY eth0 PROTO=6
196.1.111.164:2725
12.237.136.59:21 L=60 S=0x00 I=26071 F=0x4000 T=40 SYN (#44) 
Feb 13 18:06:40 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.196:3719
12.237.136.59:80 L=48 S=0x00 I=50823 F=0x4000 T=124 SYN (#44) 
Feb 13 18:18:35 firewall kernel: Packet log: input DENY eth0 PROTO=6
217.162.32.114:3296
12.237.136.59:80 L=48 S=0x00 I=56384 F=0x4000 T=111 SYN (#44) 
Feb 13 18:18:44 firewall kernel: Packet log: input DENY eth0 PROTO=6
217.162.32.114:3296
12.237.136.59:80 L=48 S=0x00 I=60303 F=0x4000 T=111 SYN (#44) 
Feb 13 18:28:47 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:4934
12.237.136.59:80 L=48 S=0x00 I=41129 F=0x4000 T=124 SYN (#44) 
Feb 13 18:28:50 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:4934
12.237.136.59:80 L=48 S=0x00 I=41534 F=0x4000 T=124 SYN (#44) 
Feb 13 19:34:39 firewall kernel: eth1: Setting Rx mode to 0 addresses. 
Feb 13 19:34:39 firewall kernel: eth1: Setting Rx mode to 1 addresses. 
Feb 13 19:40:30 firewall kernel: eth1: Setting Rx mode to 0 addresses. 
Feb 13 19:40:30 firewall kernel: eth1: Setting Rx mode to 1 addresses. 
Feb 13 20:06:42 firewall kernel: eth1: Setting Rx mode to 0 addresses. 
Feb 13 20:06:42 firewall kernel: eth1: Setting Rx mode to 1 addresses. 
Feb 13 20:21:25 firewall kernel: eth1: Setting Rx mode to 0 addresses. 
Feb 13 20:21:25 firewall kernel: eth1: Setting Rx mode to 1 addresses. 
Feb 13 20:31:19 firewall kernel: eth1: Setting Rx mode to 0 addresses. 
Feb 13 20:31:19 firewall kernel: eth1: Setting Rx mode to 1 addresses. 
Feb 13 21:34:53 firewall kernel: Packet log: input DENY eth0 PROTO=6
203.88.128.18:1681
12.237.136.59:80 L=48 S=0x00 I=26153 F=0x4000 T=106 SYN (#42) 
Feb 13 21:34:59 firewall kernel: Packet log: input DENY eth0 PROTO=6
203.88.128.18:1681
12.237.136.59:80 L=48 S=0x00 I=26343 F=0x4000 T=106 SYN (#42) 
Feb 13 22:29:25 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.196:3464
12.237.136.59:80 L=48 S=0x00 I=23792 F=0x4000 T=124 SYN (#42) 
Feb 14 00:26:30 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:4518
12.237.136.59:80 L=48 S=0x00 I=26520 F=0x4000 T=124 SYN (#42) 
Feb 14 00:26:33 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:4518
12.237.136.59:80 L=48 S=0x00 I=26753 F=0x4000 T=124 SYN (#42) 
Feb 14 01:28:01 firewall kernel: Packet log: input DENY eth0 PROTO=6
62.31.92.224:3303
12.237.136.59:25 L=48 S=0x00 I=46528 F=0x4000 T=111 SYN (#42) 
Feb 14 01:28:04 firewall kernel: Packet log: input DENY eth0 PROTO=6
62.31.92.224:3303
12.237.136.59:25 L=48 S=0x00 I=47048 F=0x4000 T=111 SYN (#42) 
Feb 14 01:45:06 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:4961
12.237.136.59:80 L=48 S=0x00 I=37906 F=0x4000 T=124 SYN (#42) 
Feb 14 01:45:09 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:4961
12.237.136.59:80 L=48 S=0x00 I=38132 F=0x4000 T=124 SYN (#42) 
Feb 14 01:53:46 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:3361
12.237.136.59:80 L=48 S=0x00 I=13879 F=0x4000 T=124 SYN (#42) 
Feb 14 01:53:49 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:3361
12.237.136.59:80 L=48 S=0x00 I=14140 F=0x4000 T=124 SYN (#42) 
Feb 14 04:11:54 firewall -- MARK --
Feb 14 05:58:25 firewall kernel: Packet log: input DENY eth0 PROTO=6
211.93.93.204:4041
12.237.136.59:80 L=48 S=0x00 I=43380 F=0x4000 T=108 SYN (#42) 
Feb 14 05:58:28 firewall kernel: Packet log: input DENY eth0 PROTO=6
211.93.93.204:4041
12.237.136.59:80 L=48 S=0x00 I=43506 F=0x4000 T=108 SYN (#42) 
Feb 14 05:58:34 firewall kernel: Packet log: input DENY eth0 PROTO=6
211.93.93.204:4041
12.237.136.59:80 L=48 S=0x00 I=43741 F=0x4000 T=108 SYN (#42) 
Feb 14 06:14:24 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.196:4853
12.237.136.59:80 L=48 S=0x00 I=40258 F=0x4000 T=124 SYN (#42) 
Feb 14 06:14:27 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.196:4853
12.237.136.59:80 L=48 S=0x00 I=40409 F=0x4000 T=124 SYN (#42) 
Feb 14 06:24:03 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:2378
12.237.136.59:80 L=48 S=0x00 I=42825 F=0x4000 T=124 SYN (#42) 
Feb 14 06:42:04 firewall syslogd 1.3-3#31.slink1: restart.
Feb 14 06:51:02 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:3985
12.237.136.59:80 L=48 S=0x00 I=7059 F=0x4000 T=124 SYN (#42) 
Feb 14 06:51:05 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:3985
12.237.136.59:80 L=48 S=0x00 I=7343 F=0x4000 T=124 SYN (#42) 
Feb 14 07:33:23 firewall kernel: Packet log: input DENY eth0 PROTO=6
211.117.29.100:22
12.237.136.59:22 L=40 S=0x00 I=25883 F=0x0000 T=109 SYN (#42) 
Feb 14 10:42:55 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.196:2265
12.237.136.59:80 L=48 S=0x00 I=7312 F=0x4000 T=124 SYN (#42) 
Feb 14 10:42:58 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.196:2265
12.237.136.59:80 L=48 S=0x00 I=7513 F=0x4000 T=124 SYN (#42) 
Feb 14 12:08:12 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.196:4073
12.237.136.59:80 L=48 S=0x00 I=25166 F=0x4000 T=124 SYN (#42) 
Feb 14 12:08:14 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.196:4073
12.237.136.59:80 L=48 S=0x00 I=25395 F=0x4000 T=124 SYN (#42) 
Feb 14 13:43:15 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:2566
12.237.136.59:80 L=48 S=0x00 I=29395 F=0x4000 T=124 SYN (#42) 
Feb 14 14:37:49 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.196:1720
12.237.136.59:80 L=48 S=0x00 I=50200 F=0x4000 T=124 SYN (#42) 
Feb 14 14:37:52 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.196:1720
12.237.136.59:80 L=48 S=0x00 I=50263 F=0x4000 T=124 SYN (#42) 
Feb 14 15:46:45 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.196:3105
12.237.136.59:80 L=48 S=0x00 I=61036 F=0x4000 T=124 SYN (#42) 
Feb 14 15:46:48 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.196:3105
12.237.136.59:80 L=48 S=0x00 I=61109 F=0x4000 T=124 SYN (#42) 
Feb 14 16:02:08 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.196:1057
12.237.136.59:80 L=48 S=0x00 I=46091 F=0x4000 T=124 SYN (#42) 
Feb 14 16:02:10 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.196:1057
12.237.136.59:80 L=48 S=0x00 I=46280 F=0x4000 T=124 SYN (#42) 
Feb 14 17:10:18 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:3737
12.237.136.59:80 L=48 S=0x00 I=32107 F=0x4000 T=124 SYN (#42) 
Feb 14 17:10:20 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:3737
12.237.136.59:80 L=48 S=0x00 I=32359 F=0x4000 T=124 SYN (#42) 
Feb 14 17:36:09 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:4725
12.237.136.59:80 L=48 S=0x00 I=28628 F=0x4000 T=124 SYN (#42) 
Feb 14 17:36:12 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:4725
12.237.136.59:80 L=48 S=0x00 I=28876 F=0x4000 T=124 SYN (#42) 
Feb 14 17:44:53 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:3357
12.237.136.59:80 L=48 S=0x00 I=6138 F=0x4000 T=124 SYN (#42) 
Feb 14 17:44:56 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:3357
12.237.136.59:80 L=48 S=0x00 I=6391 F=0x4000 T=124 SYN (#42) 
Feb 14 20:11:54 firewall -- MARK --



IP masquerading entries
prot   expire source               destination          ports
tcp 238:08.98 192.168.1.1          12.234.105.31        2458 -> 1994
(62264)
tcp 169:29.47 192.168.1.1          64.158.93.18         2435 -> 3661
(62137)
udp   1:24.01 192.168.1.3          149.2.141.5          500 -> 500 (500)

Active Internet connections (w/o servers)
Proto Recv-Q Send-Q Local Address           Foreign Address        
State      
tcp        0      0 192.168.1.254:80        192.168.1.3:1200       
ESTABLISHED 
tcp        0      0 192.168.1.254:80        192.168.1.3:1199       
TIME_WAIT   
tcp        0      0 192.168.1.254:80        192.168.1.3:1198       
TIME_WAIT   
tcp        0      0 192.168.1.254:80        192.168.1.3:1197       
TIME_WAIT   
Active UNIX domain sockets (w/o servers)
Proto RefCnt Flags       Type       State         I-Node Path
unix  1      [ ]         STREAM     CONNECTED     1573   @00000001
unix  1      [ ]         STREAM     CONNECTED     1588   @00000004
unix  1      [ ]         STREAM     CONNECTED     1589   /dev/log
unix  1      [ ]         STREAM     CONNECTED     1574   /dev/log

Chain input (policy DENY: 38 packets, 3910 bytes):
 pkts bytes target     prot opt    tosa tosx  ifname     mark      
outsize  source                destination           ports
    0     0 DENY       icmp ----l- 0xFF 0x00 
*                              0.0.0.0/0           
0.0.0.0/0             5 ->   *
    0     0 DENY       icmp ----l- 0xFF 0x00 
*                              0.0.0.0/0           
0.0.0.0/0             13 ->   *
    0     0 DENY       icmp ----l- 0xFF 0x00 
*                              0.0.0.0/0           
0.0.0.0/0             14 ->   *
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           0.0.0.0             
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           255.255.255.255     
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           127.0.0.0/8         
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           224.0.0.0/4         
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           10.0.0.0/8          
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           172.16.0.0/12       
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           192.168.0.0/16      
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           0.0.0.0/8           
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           128.0.0.0/16        
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           191.255.0.0/16      
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           192.0.0.0/24        
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           223.255.255.0/24    
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           240.0.0.0/4         
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           192.168.1.0/24      
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           12.237.136.59       
0.0.0.0/0             n/a
    0     0 REJECT     all  ----l- 0xFF 0x00 
eth0                           0.0.0.0/0           
127.0.0.0/8           n/a
    0     0 REJECT     all  ----l- 0xFF 0x00 
eth0                           0.0.0.0/0           
192.168.1.0/24        n/a
    0     0 REJECT     tcp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   137
    0     0 REJECT     tcp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   135
   23  1794 REJECT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   137
   13  3501 REJECT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   135
    0     0 REJECT     tcp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   138:139
    0     0 REJECT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   138
    0     0 REJECT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             137:138 ->   *
    0     0 REJECT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             135 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             137:139 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             135 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   113
 564K  244M ACCEPT     tcp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   1024:65535
    0     0 REJECT     udp  ----l- 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   161:162
    0     0 ACCEPT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   53
    0     0 ACCEPT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   68
    0     0 ACCEPT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   500
    0     0 ACCEPT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   10000
    0     0 DENY       udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   67
20275 5561K ACCEPT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   1024:65535
   94  5692 ACCEPT     icmp ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   *
    0     0 ACCEPT     ospf ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             n/a
   37  1768 DENY       all  ----l- 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             n/a
    0     0 REJECT     udp  ----l- 0xFF 0x00 
*                              0.0.0.0/0           
0.0.0.0/0             * ->   161:162
    0     0 REJECT     udp  ----l- 0xFF 0x00 
*                              0.0.0.0/0           
0.0.0.0/0             161:162 ->   *
 796K  879M ACCEPT     all  ------ 0xFF 0x00 
*                              0.0.0.0/0           
0.0.0.0/0             n/a
Chain forward (policy DENY: 0 packets, 0 bytes):
 pkts bytes target     prot opt    tosa tosx  ifname     mark      
outsize  source                destination           ports
    0     0 DENY       icmp ----l- 0xFF 0x00 
*                              0.0.0.0/0           
0.0.0.0/0             5 ->   *
    8  4680 MASQ       udp  ------ 0xFF 0x00 
*                              192.168.1.3         
0.0.0.0/0             500 ->   *
 794K  879M MASQ       all  ------ 0xFF 0x00 
eth0                           192.168.1.0/24      
0.0.0.0/0             n/a
    0     0 DENY       all  ------ 0xFF 0x00 
*                              0.0.0.0/0           
0.0.0.0/0             n/a
Chain output (policy DENY: 13 packets, 808 bytes):
 pkts bytes target     prot opt    tosa tosx  ifname     mark      
outsize  source                destination           ports
1379K 1128M fairq      all  ------ 0xFF 0x00 
*                              0.0.0.0/0           
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           0.0.0.0             
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           255.255.255.255     
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           127.0.0.0/8         
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           224.0.0.0/4         
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           10.0.0.0/8          
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           172.16.0.0/12       
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           192.168.0.0/16      
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           0.0.0.0/8           
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           128.0.0.0/16        
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           191.255.0.0/16      
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           192.0.0.0/24        
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           223.255.255.0/24    
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           240.0.0.0/4         
0.0.0.0/0             n/a
    0     0 DENY       all  ------ 0xFF 0x00 
eth0                           192.168.1.0/24      
0.0.0.0/0             n/a
    0     0 REJECT     tcp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   137
    0     0 REJECT     tcp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   135
    0     0 REJECT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   137
    0     0 REJECT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   135
    0     0 REJECT     tcp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   138:139
    0     0 REJECT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   138
    0     0 REJECT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             137:138 ->   *
    0     0 REJECT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             135 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             137:139 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             135 ->   *
1379K 1128M ACCEPT     all  ------ 0xFF 0x00 
*                              0.0.0.0/0           
0.0.0.0/0             n/a
Chain fairq (1 references):
 pkts bytes target     prot opt    tosa tosx  ifname     mark      
outsize  source                destination           ports
    0     0 RETURN     ospf ------ 0xFF 0x00  *         
0x1                   0.0.0.0/0            0.0.0.0/0             n/a
    0     0 RETURN     ospf ------ 0xFF 0x00  *         
0x1                   0.0.0.0/0            0.0.0.0/0             n/a
    0     0 RETURN     udp  ------ 0xFF 0x00  *         
0x1                   0.0.0.0/0            0.0.0.0/0             * ->  
520
    0     0 RETURN     udp  ------ 0xFF 0x00  *         
0x1                   0.0.0.0/0            0.0.0.0/0             520
->   *
    0     0 RETURN     tcp  ------ 0xFF 0x00  *         
0x1                   0.0.0.0/0            0.0.0.0/0             * ->  
179
    0     0 RETURN     tcp  ------ 0xFF 0x00  *         
0x1                   0.0.0.0/0            0.0.0.0/0             179
->   *
    0     0 RETURN     tcp  ------ 0xFF 0x00  *         
0x1                   0.0.0.0/0            0.0.0.0/0             * ->  
53
    0     0 RETURN     tcp  ------ 0xFF 0x00  *         
0x1                   0.0.0.0/0            0.0.0.0/0             53 ->  
*
 1943  123K RETURN     udp  ------ 0xFF 0x00  *         
0x1                   0.0.0.0/0            0.0.0.0/0             * ->  
53
  460 68194 RETURN     udp  ------ 0xFF 0x00  *         
0x1                   0.0.0.0/0            0.0.0.0/0             53 ->  
*
    0     0 RETURN     tcp  ------ 0xFF 0x00  *         
0x2                   0.0.0.0/0            0.0.0.0/0             * ->  
23
    0     0 RETURN     tcp  ------ 0xFF 0x00  *         
0x2                   0.0.0.0/0            0.0.0.0/0             23 ->  
*
    0     0 RETURN     tcp  ------ 0xFF 0x00  *         
0x2                   0.0.0.0/0            0.0.0.0/0             * ->  
22
    0     0 RETURN     tcp  ------ 0xFF 0x00  *         
0x2                   0.0.0.0/0            0.0.0.0/0             22 ->  
*

prot localaddr            rediraddr               lport    rport  pcnt 
pref
UDP  12.237.136.59        192.168.1.3               500      500   
10    10

fwmark   rediraddr               rport  pcnt  pref

Type Prot Low  High Vis  Hid  Where    Last     CPto CPrt Timer Flags

Uptime:
 23:13:42 up 1 Days (35h), load average: 0.22 0.14 0.05

Kernel:
Linux version 2.2.19-3-LEAF (root@debian) (gcc version 2.7.2.3) #1 Sat
Dec 1 12:15:05 CST 2001

Installed Modules:
ip_masq_vdolive         1180   0 (unused)
ip_masq_user            3708   0 (unused)
ip_masq_raudio          2980   0 (unused)
ip_masq_quake           1220   0
ip_masq_portfw          2416   1
ip_masq_mfw             3196   0
ip_masq_irc             1924   0 (unused)
ip_masq_ipsec           7328   1
ip_masq_ftp             3576   0
ip_masq_cuseeme          964   0 (unused)
ip_masq_autofw          2476   0 (unused)
3c509                   5628   1
ne                      6292   1
8390                    6236   0 [ne]

Name            Version        Description
===============-==============-==============================================
root           
4.0.6                                                        
etc            
4.0.1                                                        
ramlog          1.1            Creates additinal ramdisks on
boot            
local           4.0.6          Local package. This package does not
contain a
modules         4.0.6          Modules package. Contains kernel modules
and u
dhclient        2.0pl5         dhclient - Dynamically configure an
interface 
dhcpd           2.0pl5         dhcpd - Autoconfigure client
machines         
dnscache        1.05a          dnscache from djbdns (V1.05a) package
creates 
weblet          1.2.0          weblet - LRP status via a small web
server    

processor       : 0
vendor_id       : GenuineIntel
cpu family      : 5
model           : 2
model name      : Pentium 75 - 200
stepping        : 4
cpu MHz         : 90.005
fdiv_bug        : no
hlt_bug         : no
sep_bug         : no
f00f_bug        : yes
coma_bug        : no
fpu             : yes
fpu_exception   : yes
cpuid level     : 1
wp              : yes
flags           : fpu vme de pse tsc msr mce cx8
bogomips        : 179.40

  PID  Uid     Stat Command
    1 root     S    init 
    2 root     S    [kflushd]
    3 root     S    [kupdate]
    4 root     S    [kswapd]
    5 root     S    [keventd]
  861 root     S    /usr/sbin/dhclient eth0
 1033 root     S    /sbin/syslogd -m 240
 1035 root     S    /sbin/klogd
 1039 root     S    /usr/sbin/inetd
 1042 root     S    /usr/sbin/watchdog
 1045 root     S    /usr/sbin/cron
 1051 root     S    /usr/sbin/dhcpd eth1
 1061 dnscache S    /usr/bin/dnscache
 1063 root     S    /sbin/getty 38400 tty2
 7891 root     S    /sbin/getty 38400 tty1
 9197 sh-httpd S    sh /usr/sbin/sh-httpd
 9233 sh-httpd S    sh /var/sh-www/cgi-bin/viewsys
 9234 sh-httpd S    sleep 1
 9235 sh-httpd S    cat
 9236 sh-httpd S    sh /var/sh-www/cgi-bin/viewsys
 9293 sh-httpd R    ps aux


Charles Steinkuehler wrote:
> 
> [EMAIL PROTECTED] wrote:
> > I was hoping it might be something simple.
> >
> > I changed EXTERN_PORTS to EXTERN_PROTOS, with no change in results.
> > Still get the same error message.
> >
> > Yes, I did the svi thing.
> >
> > I did see that I got 4 masqued udp packets sent from 192.168.1.3.
> 
> Can you send the output of "net ipfilter list" to the mailing list,
> along with any logs you can capture from your IPSec client?
> 
> --
> Charles Steinkuehler
> [EMAIL PROTECTED]


-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to