Lynn,

I added the rules you suggested.  The net ipfilter list output is added
at the end of this email.  Still no connection.

It all helps and thanks for your input.  At least now I know how to
export the output of 'net ipfilter list'.





Lynn Avants wrote:
> 
> On Saturday 15 February 2003 11:08 am, [EMAIL PROTECTED] wrote:
> > Charles,
> >
> > I am not sure how to get the net ipfilter list output to my windows
> > machine for adding to email.
> 
> Per the 'SR FAQ' linked at the bottom of every post from the list:
> 
> svi net ipfilter list >some_temp_file_name.txt
> 
> transport on a floppy (other than the LEAF one) or whatever other means
> you might have on the LEAF box (SSH, etc...).
> 
> > I did capture the output from the logs displayed by weblet.  They are
> > pasted in below.
> >
> >
> > 1      10:53:34.490  02/15/03  Sev=Warning/2  IKE/0xE300007B
> > Exceeded 3 IKE SA negotiation retransmits... peer is not responding
> >
> > 2      10:53:34.550  02/15/03  Sev=Warning/3  DIALER/0xE3300015
> > GI VPN start callback failed "CM_PEER_NOT_RESPONDING" (16h).
> 
> Where exactly is this error coming from?
> Not the LEAF box, correct!

Correct, these messages came from the Cisco client log.

> 
> > IP masquerading entries
> > prot   expire source               destination          ports
> 
> > udp   1:24.01 192.168.1.3          149.2.141.5          500 -> 500 (500)
> 
> Looks like you have initiated an ipsec connection to the host 149.2.141.5
> that you have initiated.
> 
> > Chain input (policy DENY: 38 packets, 3910 bytes):
> >  pkts bytes target     prot opt    tosa tosx  ifname     mark
> > outsize  source                destination           ports
> 
> >     0     0 ACCEPT     udp  ------ 0xFF 0x00
> > eth0                           0.0.0.0/0
> > 0.0.0.0/0             * ->   500
> 
> The rule is good, however you have received '0' packets
> from your remote ipsec server. The remote server has not
> returned your request for a connection.
> 
> This is what you are missing... the auth protocols that should look
> like this on your IN chain:
> 
>     0     0 ACCEPT     50   ------ 0xFF 0x00  eth0
> 0.0.0.0              0.0.0.0/0             n/a
>     0     0 ACCEPT     51   ------ 0xFF 0x00  eth0
> 0.0.0.0              0.0.0.0/0             n/a
> 
> This is likely your problem, and I have sent you the exact rule
> I used on my Dachstein box to enable this.
> 
> > Chain forward (policy DENY: 0 packets, 0 bytes):
> >  pkts bytes target     prot opt    tosa tosx  ifname     mark
> > outsize  source                destination           ports
> 
> >     8  4680 MASQ       udp  ------ 0xFF 0x00
> > *                              192.168.1.3
> > 0.0.0.0/0             500 ->   *
> 
> Good, 8 packets here. This is the request for a connection that you
> have sent.
> 
> Chain portfw ????
> > prot localaddr            rediraddr               lport    rport  pcnt
> > pref
> > UDP  12.237.136.59        192.168.1.3               500      500
> > 10    10
> 
> The redirect of ipsec information from your external ip address to
> your LAN machine.
> 
> > Installed Modules:
> > ip_masq_portfw          2416   1
> > ip_masq_ipsec           7328   1
> 
> Good, portfw'ding is enabled.
> 
> ###### Summary #####
> It should work when you add the rule:
> 
> # Generic Services open to outside world
> # Space seperated list: protocol_srcip/mask_dstport
> EXTERN_PORTS="50_0.0.0.0 51_0.0.0.0"
> 
> # -or-
> # Indexed list: "Protocol SrcAddr/Mask [ DestAddr[/DestMask] ]"
> #EXTERN_PROTO0="50 0.0.0.0"
> #EXTERN_PROTO1="51 0.0.0.0"
> 
> I hope this helps!
> --
> ~Lynn Avants
> Linux Embedded Appliance Firewall developer
> http://leaf.sourceforge.net



Chain input (policy DENY: 2 packets, 726 bytes):
 pkts bytes target     prot opt    tosa tosx  ifname     mark      
outsize  source                destination           ports
   13   624 DENY       tcp  ------ 0xFF 0x00 
eth0                           12.237.236.196      
0.0.0.0/0             * ->   80
   16   768 DENY       tcp  ------ 0xFF 0x00 
eth0                           12.237.236.3        
0.0.0.0/0             * ->   80
    0     0 DENY       icmp ----l- 0xFF 0x00 
*                              0.0.0.0/0           
0.0.0.0/0             5 ->   *
    0     0 DENY       icmp ----l- 0xFF 0x00 
*                              0.0.0.0/0           
0.0.0.0/0             13 ->   *
    0     0 DENY       icmp ----l- 0xFF 0x00 
*                              0.0.0.0/0           
0.0.0.0/0             14 ->   *
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           0.0.0.0             
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           255.255.255.255     
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           127.0.0.0/8         
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           224.0.0.0/4         
0.0.0.0/0             n/a
   81  4536 DENY       all  ----l- 0xFF 0x00 
eth0                           10.0.0.0/8          
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           172.16.0.0/12       
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           192.168.0.0/16      
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           0.0.0.0/8           
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           128.0.0.0/16        
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           191.255.0.0/16      
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           192.0.0.0/24        
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           223.255.255.0/24    
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           240.0.0.0/4         
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           192.168.1.0/24      
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           12.237.136.59       
0.0.0.0/0             n/a
    0     0 REJECT     all  ----l- 0xFF 0x00 
eth0                           0.0.0.0/0           
127.0.0.0/8           n/a
    0     0 REJECT     all  ----l- 0xFF 0x00 
eth0                           0.0.0.0/0           
192.168.1.0/24        n/a
    0     0 REJECT     tcp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   137
    0     0 REJECT     tcp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   135
   19  1482 REJECT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   137
    0     0 REJECT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   135
    0     0 REJECT     tcp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   138:139
    0     0 REJECT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   138
    0     0 REJECT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             137:138 ->   *
    0     0 REJECT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             135 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             137:139 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             135 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   113
 829K  662M ACCEPT     tcp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   1024:65535
    0     0 REJECT     udp  ----l- 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   161:162
    3   222 ACCEPT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   53
    0     0 ACCEPT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   68
    0     0 ACCEPT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   500
    0     0 ACCEPT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   10000
    0     0 DENY       udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   67
 123K   29M ACCEPT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   1024:65535
  522 31104 ACCEPT     icmp ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   *
    0     0 ACCEPT     ospf ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             n/a
    0     0 ACCEPT     50   ------ 0xFF 0x00 
eth0                           0.0.0.0             
12.237.136.59         n/a
    0     0 ACCEPT     47   ------ 0xFF 0x00 
eth0                           0.0.0.0             
12.237.136.59         n/a
   42  2244 DENY       all  ----l- 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             n/a
    0     0 REJECT     udp  ----l- 0xFF 0x00 
*                              0.0.0.0/0           
0.0.0.0/0             * ->   161:162
    0     0 REJECT     udp  ----l- 0xFF 0x00 
*                              0.0.0.0/0           
0.0.0.0/0             161:162 ->   *
1049K  731M ACCEPT     all  ------ 0xFF 0x00 
*                              0.0.0.0/0           
0.0.0.0/0             n/a
Chain forward (policy DENY: 0 packets, 0 bytes):
 pkts bytes target     prot opt    tosa tosx  ifname     mark      
outsize  source                destination           ports
    0     0 DENY       icmp ----l- 0xFF 0x00 
*                              0.0.0.0/0           
0.0.0.0/0             5 ->   *
    8  4680 MASQ       udp  ------ 0xFF 0x00 
*                              192.168.1.3         
0.0.0.0/0             500 ->   *
1045K  731M MASQ       all  ------ 0xFF 0x00 
eth0                           192.168.1.0/24      
0.0.0.0/0             n/a
    0     0 DENY       all  ------ 0xFF 0x00 
*                              0.0.0.0/0           
0.0.0.0/0             n/a
Chain output (policy DENY: 0 packets, 0 bytes):
 pkts bytes target     prot opt    tosa tosx  ifname     mark      
outsize  source                destination           ports
1999K 1422M fairq      all  ------ 0xFF 0x00 
*                              0.0.0.0/0           
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           0.0.0.0             
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           255.255.255.255     
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           127.0.0.0/8         
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           224.0.0.0/4         
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           10.0.0.0/8          
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           172.16.0.0/12       
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           192.168.0.0/16      
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           0.0.0.0/8           
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           128.0.0.0/16        
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           191.255.0.0/16      
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           192.0.0.0/24        
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           223.255.255.0/24    
0.0.0.0/0             n/a
    0     0 DENY       all  ----l- 0xFF 0x00 
eth0                           240.0.0.0/4         
0.0.0.0/0             n/a
    0     0 DENY       all  ------ 0xFF 0x00 
eth0                           192.168.1.0/24      
0.0.0.0/0             n/a
    0     0 REJECT     tcp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   137
    0     0 REJECT     tcp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   135
    0     0 REJECT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   137
    0     0 REJECT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   135
    0     0 REJECT     tcp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   138:139
    0     0 REJECT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             * ->   138
    0     0 REJECT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             137:138 ->   *
    0     0 REJECT     udp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             135 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             137:139 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00 
eth0                           0.0.0.0/0           
0.0.0.0/0             135 ->   *
1999K 1422M ACCEPT     all  ------ 0xFF 0x00 
*                              0.0.0.0/0           
0.0.0.0/0             n/a
Chain fairq (1 references):
 pkts bytes target     prot opt    tosa tosx  ifname     mark      
outsize  source                destination           ports
    0     0 RETURN     ospf ------ 0xFF 0x00  *         
0x1                   0.0.0.0/0            0.0.0.0/0             n/a
    0     0 RETURN     ospf ------ 0xFF 0x00  *         
0x1                   0.0.0.0/0            0.0.0.0/0             n/a
    0     0 RETURN     udp  ------ 0xFF 0x00  *         
0x1                   0.0.0.0/0            0.0.0.0/0             * ->  
520
    0     0 RETURN     udp  ------ 0xFF 0x00  *         
0x1                   0.0.0.0/0            0.0.0.0/0             520
->   *
    0     0 RETURN     tcp  ------ 0xFF 0x00  *         
0x1                   0.0.0.0/0            0.0.0.0/0             * ->  
179
    0     0 RETURN     tcp  ------ 0xFF 0x00  *         
0x1                   0.0.0.0/0            0.0.0.0/0             179
->   *
    0     0 RETURN     tcp  ------ 0xFF 0x00  *         
0x1                   0.0.0.0/0            0.0.0.0/0             * ->  
53
    0     0 RETURN     tcp  ------ 0xFF 0x00  *         
0x1                   0.0.0.0/0            0.0.0.0/0             53 ->  
*
 2544  161K RETURN     udp  ------ 0xFF 0x00  *         
0x1                   0.0.0.0/0            0.0.0.0/0             * ->  
53
  597 84353 RETURN     udp  ------ 0xFF 0x00  *         
0x1                   0.0.0.0/0            0.0.0.0/0             53 ->  
*
    0     0 RETURN     tcp  ------ 0xFF 0x00  *         
0x2                   0.0.0.0/0            0.0.0.0/0             * ->  
23
    0     0 RETURN     tcp  ------ 0xFF 0x00  *         
0x2                   0.0.0.0/0            0.0.0.0/0             23 ->  
*
    0     0 RETURN     tcp  ------ 0xFF 0x00  *         
0x2                   0.0.0.0/0            0.0.0.0/0             * ->  
22
    0     0 RETURN     tcp  ------ 0xFF 0x00  *         
0x2                   0.0.0.0/0            0.0.0.0/0             22 ->  
*
AutoFW:
Type Prot Low  High Vis  Hid  Where    Last     CPto CPrt Timer Flags
MarkFW:
fwmark   rediraddr               rport  pcnt  pref
PortFW:
prot localaddr            rediraddr               lport    rport  pcnt 
pref
UDP  12.237.136.59        192.168.1.3               500      500   
10    10


-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to