Charles,
I am not sure how to get the net ipfilter list output to my windows
machine for adding to email.
I did capture the output from the logs displayed by weblet. They are
pasted in below.
1 10:53:34.490 02/15/03 Sev=Warning/2 IKE/0xE300007B
Exceeded 3 IKE SA negotiation retransmits... peer is not responding
2 10:53:34.550 02/15/03 Sev=Warning/3 DIALER/0xE3300015
GI VPN start callback failed "CM_PEER_NOT_RESPONDING" (16h).
Feb 13 12:11:54 firewall syslogd 1.3-3#31.slink1: restart.
Feb 13 12:11:54 firewall kernel: klogd 1.3-3#31.slink1, log source =
/proc/kmsg started.
Feb 13 12:11:54 firewall kernel: Cannot find map file.
Feb 13 12:11:54 firewall kernel: Loaded 15 symbols from 14 modules.
Feb 13 12:11:54 firewall kernel: Linux version 2.2.19-3-LEAF
(root@debian) (gcc version
2.7.2.3) #1 Sat Dec 1 12:15:05 CST 2001
Feb 13 12:11:54 firewall kernel: BIOS-provided physical RAM map:
Feb 13 12:11:54 firewall kernel: BIOS-88: 000a0000 @ 00000000 (usable)
Feb 13 12:11:54 firewall kernel: BIOS-88: 02f00000 @ 00100000 (usable)
Feb 13 12:11:54 firewall kernel: Detected 90005 kHz processor.
Feb 13 12:11:54 firewall kernel: Console: mono *MDA 80x25
Feb 13 12:11:54 firewall kernel: Calibrating delay loop... 179.40
BogoMIPS
Feb 13 12:11:54 firewall kernel: Memory: 46520k/49152k available (732k
kernel code, 412k
reserved, 744k data, 44k init)
Feb 13 12:11:54 firewall kernel: Dentry hash table entries: 8192 (order
4, 64k)
Feb 13 12:11:54 firewall kernel: Buffer cache hash table entries: 65536
(order 6, 256k)
Feb 13 12:11:54 firewall kernel: Page cache hash table entries: 16384
(order 4, 64k)
Feb 13 12:11:54 firewall kernel: CPU: Intel Pentium 75 - 200 stepping 04
Feb 13 12:11:54 firewall kernel: Checking 386/387 coupling... OK, FPU
using exception 16 error
reporting.
Feb 13 12:11:54 firewall kernel: Checking 'hlt' instruction... OK.
Feb 13 12:11:54 firewall kernel: Intel Pentium with F0 0F bug -
workaround enabled.
Feb 13 12:11:54 firewall kernel: POSIX conformance testing by UNIFIX
Feb 13 12:11:54 firewall kernel: PCI: PCI BIOS revision 2.00 entry at
0xfbc9c
Feb 13 12:11:54 firewall kernel: PCI: Using configuration type 2
Feb 13 12:11:54 firewall kernel: PCI: Probing PCI hardware
Feb 13 12:11:54 firewall kernel: Linux NET4.0 for Linux 2.2
Feb 13 12:11:54 firewall kernel: Based upon Swansea University Computer
Society NET3.039
Feb 13 12:11:54 firewall kernel: NET4: Unix domain sockets 1.0 for Linux
NET4.0.
Feb 13 12:11:54 firewall kernel: NET4: Linux TCP/IP 1.0 for NET4.0
Feb 13 12:11:54 firewall kernel: IP Protocols: ICMP, UDP, TCP
Feb 13 12:11:54 firewall kernel: TCP: Hash tables configured (ehash
65536 bhash 65536)
Feb 13 12:11:54 firewall kernel: Initializing RT netlink socket
Feb 13 12:11:54 firewall kernel: Starting kswapd v 1.5
Feb 13 12:11:54 firewall kernel: Software Watchdog Timer: 0.05, timer
margin: 60 sec
Feb 13 12:11:54 firewall kernel: Real Time Clock Driver v1.09
Feb 13 12:11:54 firewall kernel: RAM disk driver initialized: 16 RAM
disks of 6144K size
Feb 13 12:11:54 firewall kernel: Floppy drive(s): fd0 is 1.44M
Feb 13 12:11:54 firewall kernel: FDC 0 is an 8272A
Feb 13 12:11:54 firewall kernel: RAMDISK: Compressed image found at
block 0
Feb 13 12:11:54 firewall kernel: RAMDISK: Uncompressing root archive:
done.
Feb 13 12:11:54 firewall kernel: RAMDISK: Auto Filesystem - minix: 2048i
6144bk 68fdz(68)
1024zs 2147483647ms
Feb 13 12:11:54 firewall kernel: VFS: Mounted root (minix filesystem).
Feb 13 12:11:54 firewall kernel: RAMDISK: Extracting root archive: done.
Feb 13 12:11:54 firewall kernel: Freeing unused kernel memory: 44k freed
Feb 13 12:11:54 firewall kernel: ne.c:v1.10 9/23/94 Donald Becker
([EMAIL PROTECTED])
Feb 13 12:11:54 firewall kernel: NE*000 ethercard probe at 0x300: 00 00
21 6c 1c 34
Feb 13 12:11:54 firewall kernel: eth0: NE2000 found at 0x300, using IRQ
10.
Feb 13 12:11:54 firewall kernel: eth1: 3c509 at 0x320 tag 1, BNC port,
address 00 20 af 74 38
68, IRQ 7.
Feb 13 12:11:54 firewall kernel: 3c509.c:1.16 (2.2) 2/3/98
[EMAIL PROTECTED]
Feb 13 12:11:54 firewall kernel: eth2: 3c509 at 0x340 tag 2, 10baseT
port, address 00 20 af e9
7a 00, IRQ 11.
Feb 13 12:11:54 firewall kernel: 3c509.c:1.16 (2.2) 2/3/98
[EMAIL PROTECTED]
Feb 13 12:11:54 firewall kernel: ip_masq_ipsec: loading
Feb 13 12:11:54 firewall kernel: eth1: Setting Rx mode to 1 addresses.
Feb 13 14:35:40 firewall kernel: Packet log: input DENY eth0 PROTO=6
196.1.111.164:2725
12.237.136.59:21 L=60 S=0x00 I=24479 F=0x4000 T=40 SYN (#44)
Feb 13 14:35:43 firewall kernel: Packet log: input DENY eth0 PROTO=6
196.1.111.164:2725
12.237.136.59:21 L=60 S=0x00 I=26071 F=0x4000 T=40 SYN (#44)
Feb 13 18:06:40 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.196:3719
12.237.136.59:80 L=48 S=0x00 I=50823 F=0x4000 T=124 SYN (#44)
Feb 13 18:18:35 firewall kernel: Packet log: input DENY eth0 PROTO=6
217.162.32.114:3296
12.237.136.59:80 L=48 S=0x00 I=56384 F=0x4000 T=111 SYN (#44)
Feb 13 18:18:44 firewall kernel: Packet log: input DENY eth0 PROTO=6
217.162.32.114:3296
12.237.136.59:80 L=48 S=0x00 I=60303 F=0x4000 T=111 SYN (#44)
Feb 13 18:28:47 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:4934
12.237.136.59:80 L=48 S=0x00 I=41129 F=0x4000 T=124 SYN (#44)
Feb 13 18:28:50 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:4934
12.237.136.59:80 L=48 S=0x00 I=41534 F=0x4000 T=124 SYN (#44)
Feb 13 19:34:39 firewall kernel: eth1: Setting Rx mode to 0 addresses.
Feb 13 19:34:39 firewall kernel: eth1: Setting Rx mode to 1 addresses.
Feb 13 19:40:30 firewall kernel: eth1: Setting Rx mode to 0 addresses.
Feb 13 19:40:30 firewall kernel: eth1: Setting Rx mode to 1 addresses.
Feb 13 20:06:42 firewall kernel: eth1: Setting Rx mode to 0 addresses.
Feb 13 20:06:42 firewall kernel: eth1: Setting Rx mode to 1 addresses.
Feb 13 20:21:25 firewall kernel: eth1: Setting Rx mode to 0 addresses.
Feb 13 20:21:25 firewall kernel: eth1: Setting Rx mode to 1 addresses.
Feb 13 20:31:19 firewall kernel: eth1: Setting Rx mode to 0 addresses.
Feb 13 20:31:19 firewall kernel: eth1: Setting Rx mode to 1 addresses.
Feb 13 21:34:53 firewall kernel: Packet log: input DENY eth0 PROTO=6
203.88.128.18:1681
12.237.136.59:80 L=48 S=0x00 I=26153 F=0x4000 T=106 SYN (#42)
Feb 13 21:34:59 firewall kernel: Packet log: input DENY eth0 PROTO=6
203.88.128.18:1681
12.237.136.59:80 L=48 S=0x00 I=26343 F=0x4000 T=106 SYN (#42)
Feb 13 22:29:25 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.196:3464
12.237.136.59:80 L=48 S=0x00 I=23792 F=0x4000 T=124 SYN (#42)
Feb 14 00:26:30 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:4518
12.237.136.59:80 L=48 S=0x00 I=26520 F=0x4000 T=124 SYN (#42)
Feb 14 00:26:33 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:4518
12.237.136.59:80 L=48 S=0x00 I=26753 F=0x4000 T=124 SYN (#42)
Feb 14 01:28:01 firewall kernel: Packet log: input DENY eth0 PROTO=6
62.31.92.224:3303
12.237.136.59:25 L=48 S=0x00 I=46528 F=0x4000 T=111 SYN (#42)
Feb 14 01:28:04 firewall kernel: Packet log: input DENY eth0 PROTO=6
62.31.92.224:3303
12.237.136.59:25 L=48 S=0x00 I=47048 F=0x4000 T=111 SYN (#42)
Feb 14 01:45:06 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:4961
12.237.136.59:80 L=48 S=0x00 I=37906 F=0x4000 T=124 SYN (#42)
Feb 14 01:45:09 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:4961
12.237.136.59:80 L=48 S=0x00 I=38132 F=0x4000 T=124 SYN (#42)
Feb 14 01:53:46 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:3361
12.237.136.59:80 L=48 S=0x00 I=13879 F=0x4000 T=124 SYN (#42)
Feb 14 01:53:49 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:3361
12.237.136.59:80 L=48 S=0x00 I=14140 F=0x4000 T=124 SYN (#42)
Feb 14 04:11:54 firewall -- MARK --
Feb 14 05:58:25 firewall kernel: Packet log: input DENY eth0 PROTO=6
211.93.93.204:4041
12.237.136.59:80 L=48 S=0x00 I=43380 F=0x4000 T=108 SYN (#42)
Feb 14 05:58:28 firewall kernel: Packet log: input DENY eth0 PROTO=6
211.93.93.204:4041
12.237.136.59:80 L=48 S=0x00 I=43506 F=0x4000 T=108 SYN (#42)
Feb 14 05:58:34 firewall kernel: Packet log: input DENY eth0 PROTO=6
211.93.93.204:4041
12.237.136.59:80 L=48 S=0x00 I=43741 F=0x4000 T=108 SYN (#42)
Feb 14 06:14:24 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.196:4853
12.237.136.59:80 L=48 S=0x00 I=40258 F=0x4000 T=124 SYN (#42)
Feb 14 06:14:27 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.196:4853
12.237.136.59:80 L=48 S=0x00 I=40409 F=0x4000 T=124 SYN (#42)
Feb 14 06:24:03 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:2378
12.237.136.59:80 L=48 S=0x00 I=42825 F=0x4000 T=124 SYN (#42)
Feb 14 06:42:04 firewall syslogd 1.3-3#31.slink1: restart.
Feb 14 06:51:02 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:3985
12.237.136.59:80 L=48 S=0x00 I=7059 F=0x4000 T=124 SYN (#42)
Feb 14 06:51:05 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:3985
12.237.136.59:80 L=48 S=0x00 I=7343 F=0x4000 T=124 SYN (#42)
Feb 14 07:33:23 firewall kernel: Packet log: input DENY eth0 PROTO=6
211.117.29.100:22
12.237.136.59:22 L=40 S=0x00 I=25883 F=0x0000 T=109 SYN (#42)
Feb 14 10:42:55 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.196:2265
12.237.136.59:80 L=48 S=0x00 I=7312 F=0x4000 T=124 SYN (#42)
Feb 14 10:42:58 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.196:2265
12.237.136.59:80 L=48 S=0x00 I=7513 F=0x4000 T=124 SYN (#42)
Feb 14 12:08:12 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.196:4073
12.237.136.59:80 L=48 S=0x00 I=25166 F=0x4000 T=124 SYN (#42)
Feb 14 12:08:14 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.196:4073
12.237.136.59:80 L=48 S=0x00 I=25395 F=0x4000 T=124 SYN (#42)
Feb 14 13:43:15 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:2566
12.237.136.59:80 L=48 S=0x00 I=29395 F=0x4000 T=124 SYN (#42)
Feb 14 14:37:49 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.196:1720
12.237.136.59:80 L=48 S=0x00 I=50200 F=0x4000 T=124 SYN (#42)
Feb 14 14:37:52 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.196:1720
12.237.136.59:80 L=48 S=0x00 I=50263 F=0x4000 T=124 SYN (#42)
Feb 14 15:46:45 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.196:3105
12.237.136.59:80 L=48 S=0x00 I=61036 F=0x4000 T=124 SYN (#42)
Feb 14 15:46:48 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.196:3105
12.237.136.59:80 L=48 S=0x00 I=61109 F=0x4000 T=124 SYN (#42)
Feb 14 16:02:08 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.196:1057
12.237.136.59:80 L=48 S=0x00 I=46091 F=0x4000 T=124 SYN (#42)
Feb 14 16:02:10 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.196:1057
12.237.136.59:80 L=48 S=0x00 I=46280 F=0x4000 T=124 SYN (#42)
Feb 14 17:10:18 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:3737
12.237.136.59:80 L=48 S=0x00 I=32107 F=0x4000 T=124 SYN (#42)
Feb 14 17:10:20 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:3737
12.237.136.59:80 L=48 S=0x00 I=32359 F=0x4000 T=124 SYN (#42)
Feb 14 17:36:09 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:4725
12.237.136.59:80 L=48 S=0x00 I=28628 F=0x4000 T=124 SYN (#42)
Feb 14 17:36:12 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:4725
12.237.136.59:80 L=48 S=0x00 I=28876 F=0x4000 T=124 SYN (#42)
Feb 14 17:44:53 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:3357
12.237.136.59:80 L=48 S=0x00 I=6138 F=0x4000 T=124 SYN (#42)
Feb 14 17:44:56 firewall kernel: Packet log: input DENY eth0 PROTO=6
12.237.236.3:3357
12.237.136.59:80 L=48 S=0x00 I=6391 F=0x4000 T=124 SYN (#42)
Feb 14 20:11:54 firewall -- MARK --
IP masquerading entries
prot expire source destination ports
tcp 238:08.98 192.168.1.1 12.234.105.31 2458 -> 1994
(62264)
tcp 169:29.47 192.168.1.1 64.158.93.18 2435 -> 3661
(62137)
udp 1:24.01 192.168.1.3 149.2.141.5 500 -> 500 (500)
Active Internet connections (w/o servers)
Proto Recv-Q Send-Q Local Address Foreign Address
State
tcp 0 0 192.168.1.254:80 192.168.1.3:1200
ESTABLISHED
tcp 0 0 192.168.1.254:80 192.168.1.3:1199
TIME_WAIT
tcp 0 0 192.168.1.254:80 192.168.1.3:1198
TIME_WAIT
tcp 0 0 192.168.1.254:80 192.168.1.3:1197
TIME_WAIT
Active UNIX domain sockets (w/o servers)
Proto RefCnt Flags Type State I-Node Path
unix 1 [ ] STREAM CONNECTED 1573 @00000001
unix 1 [ ] STREAM CONNECTED 1588 @00000004
unix 1 [ ] STREAM CONNECTED 1589 /dev/log
unix 1 [ ] STREAM CONNECTED 1574 /dev/log
Chain input (policy DENY: 38 packets, 3910 bytes):
pkts bytes target prot opt tosa tosx ifname mark
outsize source destination ports
0 0 DENY icmp ----l- 0xFF 0x00
* 0.0.0.0/0
0.0.0.0/0 5 -> *
0 0 DENY icmp ----l- 0xFF 0x00
* 0.0.0.0/0
0.0.0.0/0 13 -> *
0 0 DENY icmp ----l- 0xFF 0x00
* 0.0.0.0/0
0.0.0.0/0 14 -> *
0 0 DENY all ----l- 0xFF 0x00
eth0 0.0.0.0
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
eth0 255.255.255.255
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
eth0 127.0.0.0/8
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
eth0 224.0.0.0/4
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
eth0 10.0.0.0/8
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
eth0 172.16.0.0/12
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
eth0 192.168.0.0/16
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
eth0 0.0.0.0/8
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
eth0 128.0.0.0/16
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
eth0 191.255.0.0/16
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
eth0 192.0.0.0/24
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
eth0 223.255.255.0/24
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
eth0 240.0.0.0/4
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
eth0 192.168.1.0/24
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
eth0 12.237.136.59
0.0.0.0/0 n/a
0 0 REJECT all ----l- 0xFF 0x00
eth0 0.0.0.0/0
127.0.0.0/8 n/a
0 0 REJECT all ----l- 0xFF 0x00
eth0 0.0.0.0/0
192.168.1.0/24 n/a
0 0 REJECT tcp ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 * -> 137
0 0 REJECT tcp ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 * -> 135
23 1794 REJECT udp ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 * -> 137
13 3501 REJECT udp ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 * -> 135
0 0 REJECT tcp ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 * -> 138:139
0 0 REJECT udp ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 * -> 138
0 0 REJECT udp ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 137:138 -> *
0 0 REJECT udp ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 135 -> *
0 0 REJECT tcp ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 137:139 -> *
0 0 REJECT tcp ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 135 -> *
0 0 REJECT tcp ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 * -> 113
564K 244M ACCEPT tcp ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 * -> 1024:65535
0 0 REJECT udp ----l- 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 * -> 161:162
0 0 ACCEPT udp ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 * -> 53
0 0 ACCEPT udp ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 * -> 68
0 0 ACCEPT udp ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 * -> 500
0 0 ACCEPT udp ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 * -> 10000
0 0 DENY udp ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 * -> 67
20275 5561K ACCEPT udp ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 * -> 1024:65535
94 5692 ACCEPT icmp ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 * -> *
0 0 ACCEPT ospf ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 n/a
37 1768 DENY all ----l- 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 n/a
0 0 REJECT udp ----l- 0xFF 0x00
* 0.0.0.0/0
0.0.0.0/0 * -> 161:162
0 0 REJECT udp ----l- 0xFF 0x00
* 0.0.0.0/0
0.0.0.0/0 161:162 -> *
796K 879M ACCEPT all ------ 0xFF 0x00
* 0.0.0.0/0
0.0.0.0/0 n/a
Chain forward (policy DENY: 0 packets, 0 bytes):
pkts bytes target prot opt tosa tosx ifname mark
outsize source destination ports
0 0 DENY icmp ----l- 0xFF 0x00
* 0.0.0.0/0
0.0.0.0/0 5 -> *
8 4680 MASQ udp ------ 0xFF 0x00
* 192.168.1.3
0.0.0.0/0 500 -> *
794K 879M MASQ all ------ 0xFF 0x00
eth0 192.168.1.0/24
0.0.0.0/0 n/a
0 0 DENY all ------ 0xFF 0x00
* 0.0.0.0/0
0.0.0.0/0 n/a
Chain output (policy DENY: 13 packets, 808 bytes):
pkts bytes target prot opt tosa tosx ifname mark
outsize source destination ports
1379K 1128M fairq all ------ 0xFF 0x00
* 0.0.0.0/0
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
eth0 0.0.0.0
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
eth0 255.255.255.255
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
eth0 127.0.0.0/8
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
eth0 224.0.0.0/4
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
eth0 10.0.0.0/8
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
eth0 172.16.0.0/12
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
eth0 192.168.0.0/16
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
eth0 0.0.0.0/8
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
eth0 128.0.0.0/16
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
eth0 191.255.0.0/16
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
eth0 192.0.0.0/24
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
eth0 223.255.255.0/24
0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00
eth0 240.0.0.0/4
0.0.0.0/0 n/a
0 0 DENY all ------ 0xFF 0x00
eth0 192.168.1.0/24
0.0.0.0/0 n/a
0 0 REJECT tcp ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 * -> 137
0 0 REJECT tcp ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 * -> 135
0 0 REJECT udp ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 * -> 137
0 0 REJECT udp ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 * -> 135
0 0 REJECT tcp ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 * -> 138:139
0 0 REJECT udp ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 * -> 138
0 0 REJECT udp ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 137:138 -> *
0 0 REJECT udp ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 135 -> *
0 0 REJECT tcp ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 137:139 -> *
0 0 REJECT tcp ------ 0xFF 0x00
eth0 0.0.0.0/0
0.0.0.0/0 135 -> *
1379K 1128M ACCEPT all ------ 0xFF 0x00
* 0.0.0.0/0
0.0.0.0/0 n/a
Chain fairq (1 references):
pkts bytes target prot opt tosa tosx ifname mark
outsize source destination ports
0 0 RETURN ospf ------ 0xFF 0x00 *
0x1 0.0.0.0/0 0.0.0.0/0 n/a
0 0 RETURN ospf ------ 0xFF 0x00 *
0x1 0.0.0.0/0 0.0.0.0/0 n/a
0 0 RETURN udp ------ 0xFF 0x00 *
0x1 0.0.0.0/0 0.0.0.0/0 * ->
520
0 0 RETURN udp ------ 0xFF 0x00 *
0x1 0.0.0.0/0 0.0.0.0/0 520
-> *
0 0 RETURN tcp ------ 0xFF 0x00 *
0x1 0.0.0.0/0 0.0.0.0/0 * ->
179
0 0 RETURN tcp ------ 0xFF 0x00 *
0x1 0.0.0.0/0 0.0.0.0/0 179
-> *
0 0 RETURN tcp ------ 0xFF 0x00 *
0x1 0.0.0.0/0 0.0.0.0/0 * ->
53
0 0 RETURN tcp ------ 0xFF 0x00 *
0x1 0.0.0.0/0 0.0.0.0/0 53 ->
*
1943 123K RETURN udp ------ 0xFF 0x00 *
0x1 0.0.0.0/0 0.0.0.0/0 * ->
53
460 68194 RETURN udp ------ 0xFF 0x00 *
0x1 0.0.0.0/0 0.0.0.0/0 53 ->
*
0 0 RETURN tcp ------ 0xFF 0x00 *
0x2 0.0.0.0/0 0.0.0.0/0 * ->
23
0 0 RETURN tcp ------ 0xFF 0x00 *
0x2 0.0.0.0/0 0.0.0.0/0 23 ->
*
0 0 RETURN tcp ------ 0xFF 0x00 *
0x2 0.0.0.0/0 0.0.0.0/0 * ->
22
0 0 RETURN tcp ------ 0xFF 0x00 *
0x2 0.0.0.0/0 0.0.0.0/0 22 ->
*
prot localaddr rediraddr lport rport pcnt
pref
UDP 12.237.136.59 192.168.1.3 500 500
10 10
fwmark rediraddr rport pcnt pref
Type Prot Low High Vis Hid Where Last CPto CPrt Timer Flags
Uptime:
23:13:42 up 1 Days (35h), load average: 0.22 0.14 0.05
Kernel:
Linux version 2.2.19-3-LEAF (root@debian) (gcc version 2.7.2.3) #1 Sat
Dec 1 12:15:05 CST 2001
Installed Modules:
ip_masq_vdolive 1180 0 (unused)
ip_masq_user 3708 0 (unused)
ip_masq_raudio 2980 0 (unused)
ip_masq_quake 1220 0
ip_masq_portfw 2416 1
ip_masq_mfw 3196 0
ip_masq_irc 1924 0 (unused)
ip_masq_ipsec 7328 1
ip_masq_ftp 3576 0
ip_masq_cuseeme 964 0 (unused)
ip_masq_autofw 2476 0 (unused)
3c509 5628 1
ne 6292 1
8390 6236 0 [ne]
Name Version Description
===============-==============-==============================================
root
4.0.6
etc
4.0.1
ramlog 1.1 Creates additinal ramdisks on
boot
local 4.0.6 Local package. This package does not
contain a
modules 4.0.6 Modules package. Contains kernel modules
and u
dhclient 2.0pl5 dhclient - Dynamically configure an
interface
dhcpd 2.0pl5 dhcpd - Autoconfigure client
machines
dnscache 1.05a dnscache from djbdns (V1.05a) package
creates
weblet 1.2.0 weblet - LRP status via a small web
server
processor : 0
vendor_id : GenuineIntel
cpu family : 5
model : 2
model name : Pentium 75 - 200
stepping : 4
cpu MHz : 90.005
fdiv_bug : no
hlt_bug : no
sep_bug : no
f00f_bug : yes
coma_bug : no
fpu : yes
fpu_exception : yes
cpuid level : 1
wp : yes
flags : fpu vme de pse tsc msr mce cx8
bogomips : 179.40
PID Uid Stat Command
1 root S init
2 root S [kflushd]
3 root S [kupdate]
4 root S [kswapd]
5 root S [keventd]
861 root S /usr/sbin/dhclient eth0
1033 root S /sbin/syslogd -m 240
1035 root S /sbin/klogd
1039 root S /usr/sbin/inetd
1042 root S /usr/sbin/watchdog
1045 root S /usr/sbin/cron
1051 root S /usr/sbin/dhcpd eth1
1061 dnscache S /usr/bin/dnscache
1063 root S /sbin/getty 38400 tty2
7891 root S /sbin/getty 38400 tty1
9197 sh-httpd S sh /usr/sbin/sh-httpd
9233 sh-httpd S sh /var/sh-www/cgi-bin/viewsys
9234 sh-httpd S sleep 1
9235 sh-httpd S cat
9236 sh-httpd S sh /var/sh-www/cgi-bin/viewsys
9293 sh-httpd R ps aux
Charles Steinkuehler wrote:
>
> [EMAIL PROTECTED] wrote:
> > I was hoping it might be something simple.
> >
> > I changed EXTERN_PORTS to EXTERN_PROTOS, with no change in results.
> > Still get the same error message.
> >
> > Yes, I did the svi thing.
> >
> > I did see that I got 4 masqued udp packets sent from 192.168.1.3.
>
> Can you send the output of "net ipfilter list" to the mailing list,
> along with any logs you can capture from your IPSec client?
>
> --
> Charles Steinkuehler
> [EMAIL PROTECTED]
-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html