I'm into a blind cove and close to the rocks.
I'm struggling to set up LRP and have partial success. I cannot ping to the
outside world. ONLY to the assigned IP my ISP gives me.
Using ppp0 --> outside; eht0 --> inside
I get no error messages in /var/log/messages or /var/log/ppp.log
Get perfect success when I ping the assigned IP. Likewise, I can ping any
internal machine on my LAN. Nothing when ping ANYWHERE else outside,
including the DNS servers or other IPs or names. The "SO" modem light blinks
merrily, but no one is talking back.
Details:
Hardware: Pentium 75/133, 48 Mb RAM, USRobotics 28800 (old) modem, ne2000 NIC
OS: Charles Steinkuehler's EigerStein_1_img_EigerStein.exe with dialout.lrp
from Trevor
Things tried: removed any (and ALL) references in --> /etc/hosts.deny -->
/etc/hosts.allow
Changed modem configs to several types: ATH0, AT&F1, AT&FH0, etc
It's clear I'm connecting fine, just my ISP is blocking me somehow. BTW, on
my regular Slackware 9.0 box I have absolutely no problem (setup with
'pppsetup'). I can connect and ping and surf everywhere. I have built
/etc/ppp/options and /etc/ppp/chatscript to look exactly like my working box
which works. Hmmm? (that's circular)
So, here's hoping someone with a quick look can pinpoint my mistake. After
much frustration with other LRPs, this version is tantalizing close to
talking to the outside. Thanks.
-- Bob Peterson
ps: I looked through "Re: [leaf-user] Can't ping external gateway" thread from
Sept 2002. This seemed to be slightly different. Yes? No?
So here is all those details the help page requested. I'll strip the filler.
Hoping all of this is helpful
-------------------------------------------------
uname -a
Linux firewall 2.2.16 #1 Sun Jun 11 11:33:38 CDT 2000 i386 unknown
-------------------------------------------------
/var/log/messages
Jul 12 10:29:47 firewall kernel: PPP: version 2.3.7 (demand dialling)
Jul 12 10:29:47 firewall kernel: PPP line discipline registered.
Jul 12 10:29:47 firewall kernel: PPP BSD Compression module registered
Jul 12 10:29:47 firewall kernel: PPP Deflate Compression module registered
Jul 12 10:29:47 firewall kernel: ne.c:v1.10 9/23/94 Donald Becker
([EMAIL PROTECTED])
Jul 12 10:29:47 firewall kernel: NE*000 ethercard probe at 0x280: 52 54 40 21
30 31
Jul 12 10:29:47 firewall kernel: eth0: NE2000 found at 0x280, using IRQ 11.
Jul 12 10:29:47 firewall kernel: registered device ppp0
Jul 12 10:31:04 firewall pppd[735]: Starting link
Jul 12 10:31:05 firewall chat[812]: report (CONNECT)
Jul 12 10:31:05 firewall chat[812]: timeout set to 60 seconds
Jul 12 10:31:05 firewall chat[812]: abort on (BUSY)
Jul 12 10:31:05 firewall chat[812]: abort on (NO CARRIER)
Jul 12 10:31:05 firewall chat[812]: abort on (VOICE)
Jul 12 10:31:05 firewall chat[812]: abort on (NO DIALTONE)
Jul 12 10:31:05 firewall chat[812]: send (AT&F1^M)
Jul 12 10:31:06 firewall chat[812]: expect (OK)
Jul 12 10:31:06 firewall chat[812]: AT&F1^M^M
Jul 12 10:31:06 firewall chat[812]: OK
Jul 12 10:31:06 firewall chat[812]: -- got it
Jul 12 10:31:06 firewall chat[812]: send (ATDT16302325970^M)
Jul 12 10:31:06 firewall chat[812]: timeout set to 60 seconds
Jul 12 10:31:06 firewall chat[812]: expect (CONNECT)
Jul 12 10:31:06 firewall chat[812]: ^M
Jul 12 10:31:23 firewall chat[812]: ATDT16302325970^M^M
Jul 12 10:31:23 firewall chat[812]: CONNECT
Jul 12 10:31:23 firewall chat[812]: -- got it
Jul 12 10:31:23 firewall pppd[735]: Serial connection established.
Jul 12 10:31:24 firewall pppd[735]: Connect: ppp0 <--> /dev/ttyS1
Jul 12 10:31:31 firewall pppd[735]: Remote message:
Jul 12 10:31:35 firewall pppd[735]: Remote IP address changed to
206.166.57.162
Jul 12 10:33:17 firewall kernel: martian source f797fea9 for fffffea9, dev
eth0
Jul 12 10:33:17 firewall kernel: ll header: ff ff ff ff ff ff 00 50 ba 50 ff
59 08 00
Jul 12 10:34:51 firewall pppd[735]: Terminating connection due to lack of
activity.
Jul 12 10:34:51 firewall pppd[735]: Connection terminated.
Jul 12 10:34:51 firewall pppd[735]: Hangup (SIGHUP)
------------------------------------------------
***route***
206.166.57.162 dev ppp0 proto kernel scope link src 12.34.56.78
192.168.100.0/24 dev eth0 proto kernel scope link src 192.168.100.1
default via 206.166.57.162 dev ppp0
------------------------------------------------
***filter***
Chain input (policy DENY: 0 packets, 0 bytes):
pkts bytes target prot opt tosa tosx ifname mark outsize
source destination ports
0 0 DENY icmp ----l- 0xFF 0x00 *
0.0.0.0/0 0.0.0.0/0 13 -> *
0 0 DENY icmp ----l- 0xFF 0x00 *
0.0.0.0/0 0.0.0.0/0 14 -> *
0 0 DENY all ----l- 0xFF 0x00 ppp0
0.0.0.0 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 ppp0
255.255.255.255 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 ppp0
127.0.0.0/8 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 ppp0
224.0.0.0/4 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 ppp0
10.0.0.0/8 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 ppp0
172.16.0.0/12 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 ppp0
192.168.0.0/16 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 ppp0
0.0.0.0/8 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 ppp0
128.0.0.0/16 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 ppp0
191.255.0.0/16 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 ppp0
192.0.0.0/24 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 ppp0
223.255.255.0/24 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 ppp0
240.0.0.0/4 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 ppp0
192.168.100.0/24 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 ppp0
0.0.0.0 0.0.0.0/0 n/a
0 0 REJECT all ----l- 0xFF 0x00 ppp0
0.0.0.0/0 127.0.0.0/8 n/a
0 0 REJECT all ----l- 0xFF 0x00 ppp0
0.0.0.0/0 192.168.100.0/24 n/a
0 0 REJECT tcp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 * -> 137
0 0 REJECT tcp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 * -> 135
0 0 REJECT udp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 * -> 137
0 0 REJECT udp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 * -> 135
0 0 REJECT tcp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 * -> 138:
139
0 0 REJECT udp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 * -> 138
0 0 REJECT udp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 137:138 ->
*
0 0 REJECT udp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 135 -> *
0 0 REJECT tcp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 137:139 ->
*
0 0 REJECT tcp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 135 -> *
0 0 ACCEPT tcp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 * -> 22
0 0 ACCEPT tcp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 * -> 25
0 0 REJECT tcp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 * -> 113
0 0 ACCEPT tcp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 * -> 1024
:65535
0 0 REJECT udp ----l- 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 * -> 161:
162
0 0 ACCEPT udp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 * -> 53
0 0 ACCEPT udp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 * -> 123
0 0 ACCEPT udp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 * -> 68
0 0 DENY udp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 * -> 67
0 0 ACCEPT udp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 * -> 1024
:65535
0 0 ACCEPT icmp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 * -> *
0 0 ACCEPT ospf ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 n/a
0 0 REJECT udp ----l- 0xFF 0x00 *
0.0.0.0/0 0.0.0.0/0 * -> 161:
162
0 0 REJECT udp ----l- 0xFF 0x00 *
0.0.0.0/0 0.0.0.0/0 161:162 ->
*
7 1733 ACCEPT all ------ 0xFF 0x00 *
0.0.0.0/0 0.0.0.0/0 n/a
Chain forward (policy DENY: 0 packets, 0 bytes):
Chain forward (policy DENY: 0 packets, 0 bytes):
pkts bytes target prot opt tosa tosx ifname mark outsize
source destination ports
0 0 DENY icmp ----l- 0xFF 0x00 *
0.0.0.0/0 0.0.0.0/0 5 -> *
0 0 MASQ all ------ 0xFF 0x00 ppp0
192.168.100.0/24 0.0.0.0/0 n/a
0 0 DENY all ------ 0xFF 0x00 *
0.0.0.0/0 0.0.0.0/0 n/a
Chain output (policy DENY: 0 packets, 0 bytes):
pkts bytes target prot opt tosa tosx ifname mark outsize
source destination ports
49 4116 fairq all ------ 0xFF 0x00 *
0.0.0.0/0 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 ppp0
0.0.0.0 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 ppp0
255.255.255.255 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 ppp0
127.0.0.0/8 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 ppp0
224.0.0.0/4 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 ppp0
10.0.0.0/8 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 ppp0
172.16.0.0/12 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 ppp0
192.168.0.0/16 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 ppp0
0.0.0.0/8 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 ppp0
128.0.0.0/16 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 ppp0
191.255.0.0/16 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 ppp0
192.0.0.0/24 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 ppp0
223.255.255.0/24 0.0.0.0/0 n/a
0 0 DENY all ----l- 0xFF 0x00 ppp0
240.0.0.0/4 0.0.0.0/0 n/a
0 0 DENY all ------ 0xFF 0x00 ppp0
192.168.100.0/24 0.0.0.0/0 n/a
0 0 REJECT tcp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 * -> 137
0 0 REJECT tcp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 * -> 135
0 0 REJECT udp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 * -> 137
0 0 REJECT udp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 * -> 135
0 0 REJECT tcp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 * -> 138:
139
0 0 REJECT udp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 * -> 138
0 0 REJECT udp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 137:138 ->
*
0 0 REJECT udp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 135 -> *
0 0 REJECT tcp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 137:139 ->
*
0 0 REJECT tcp ------ 0xFF 0x00 ppp0
0.0.0.0/0 0.0.0.0/0 135 -> *
49 4116 ACCEPT all ------ 0xFF 0x00 *
0.0.0.0/0 0.0.0.0/0 n/a
Chain fairq (1 references):
pkts bytes target prot opt tosa tosx ifname mark outsize
source destination ports
0 0 RETURN ospf ------ 0xFF 0x00 * 0x1
0.0.0.0/0 0.0.0.0/0 n/a
0 0 RETURN ospf ------ 0xFF 0x00 * 0x1
0.0.0.0/0 0.0.0.0/0 n/a
0 0 RETURN udp ------ 0xFF 0x00 * 0x1
0.0.0.0/0 0.0.0.0/0 * -> 52
0
0 0 RETURN udp ------ 0xFF 0x00 * 0x1
0.0.0.0/0 0.0.0.0/0 520 ->
*
0 0 RETURN tcp ------ 0xFF 0x00 * 0x1
0.0.0.0/0 0.0.0.0/0 * -> 17
9
0 0 RETURN tcp ------ 0xFF 0x00 * 0x1
0.0.0.0/0 0.0.0.0/0 179 ->
*
0 0 RETURN tcp ------ 0xFF 0x00 * 0x1
0.0.0.0/0 0.0.0.0/0 * -> 53
0 0 RETURN tcp ------ 0xFF 0x00 * 0x1
0.0.0.0/0 0.0.0.0/0 53 -> *
0 0 RETURN udp ------ 0xFF 0x00 * 0x1
0.0.0.0/0 0.0.0.0/0 * -> 53
0 0 RETURN udp ------ 0xFF 0x00 * 0x1
0.0.0.0/0 0.0.0.0/0 53 -> *
0 0 RETURN tcp ------ 0xFF 0x00 * 0x2
0.0.0.0/0 0.0.0.0/0 * -> 23
0 0 RETURN tcp ------ 0xFF 0x00 * 0x2
0.0.0.0/0 0.0.0.0/0 23 -> *
0 0 RETURN tcp ------ 0xFF 0x00 * 0x2
0.0.0.0/0 0.0.0.0/0 * -> 22
0 0 RETURN tcp ------ 0xFF 0x00 * 0x2
0.0.0.0/0 0.0.0.0/0 22 -> *
----------------------------------------------
***mfw***
fwmark rediraddr rport pcnt pref
Hmmm?, looks empty
---------------------------------------------
***portfw***
prot localaddr rediraddr lport rport pcnt pref
Again, empty?
---------------------------------------------
***autofw***
Type Prot Low High Vis Hid Where Last CPto CPrt Timer Flags
More empty?
----------------------------------------------
***/etc/hosts***
# This file was generated by /etc/rcS.d/S39network. It may be overwritten!
192.168.100.1 firewall.glc firewall mr rtr
127.0.0.1 localhost
-----------------------------------------------
***/etd/networks***
localnet 127.0.0.0
localnet 192.168.100.0
-----------------------------------------------
***/etc/resolv.conf***
# This file was generated by /etc/rcS.d/S39network. It may be overwritten!
search enc.k12.il.us
nameserver 206.166.17.20
nameserver 206.166.83.20
nameserver 127.0.0.1
------------------------------------------------
***/etc/network.conf***
###############################################################################
# General Settings
###############################################################################
VERBOSE=YES
MAX_LOOP=10
IPFWDING_KERNEL=FILTER_ON
IPALWAYSDEFRAG_KERNEL=YES
CONFIG_HOSTNAME=YES
CONFIG_HOSTSFILE=YES
#CONFIG_DNS=NO
CONFIG_DNS=YES
###############################################################################
# Interfaces
###############################################################################
# Start pppd PPP interfaces first as pppd's use of DNS can delay startup.
#
# Interfaces to start on boot go here - ie "ppp0 eth0"
IF_AUTO="ppp0 eth0"
# List of all configured interfaces, manual start and boot start
IF_LIST="$IF_AUTO"
# Accept ICMP Redirects on ALL interfaces, also depends on /proc
# per interface IP forwarding flag. - YES/NO
ALLIF_ACCEPT_REDIRECTS=NO
# Need these both for interfaces run by daemons - ie PPP, CIPE, some
# WAN interfaces
# IP spoofing protection by default for interfaces - YES/NO
DEF_IP_SPOOF=YES
# Kernel logging of spoofed packets by default for interfaces - YES/NO
DEF_IP_KRNL_LOGMARTIANS=YES
# Bridge Setup - Global stuff
#
# Enable bridging - YES/NO
BRG_SWITCH=NO
# Exempt ethernet protocol types - type "brcfg list" to find out allowed
# values
BRG_EXEMPT_PROTOS=""
ppp0_IPADDR=0.0.0.0
ppp0_MASKLEN=0
ppp0_BROADCAST=0.0.0.0
# Use this to set the default route if required - ONLY one to be set.
# routed or gated could be used to set this so only use if not running these.
ppp0_DEFAULT_GW=0.0.0.0
# Secondary IP addresses/networks on same wire - add them here
#ppp0_IP_EXTRA_ADDRS="192.168.1.193 192.168.2.1/24"
# IP spoofing protection on this interface - YES/NO
ppp0_IP_SPOOF=YES
# Kernel logging of spoofed packets on this interface - YES/NO
ppp0_IP_KRNL_LOGMARTIANS=YES
# This setting affects the processing of ICMP redirects. Setting it to NO
# makes this more secure. Don't turn this off if you have two IP
# networks/subnets on the same media - YES/NO
ppp0_IP_SHARED_MEDIA=NO
# Bridge this interface - YES/NO
ppp0_BRIDGE=NO
# Proxy-arp from this interface, no other config required to turn on proxy
ARP!
# - YES/NO
ppp0_PROXY_ARP=NO
# Simple QoS/fair queueing support
# Turn on Stochastic Fair Queueing - useful on busy DDS links - YES/NO
#ppp0_FAIRQ=NO
# Ethernet Transmit Queue Length
# eth0_TXQLEN=100
# Complex QoS - Enable all of these + above to turn it on
#eth0_BNDWIDTH=10Mbit # Device bandwidth
#eth0_HNDL=2 # Queue Handle - must be unique
#eth0_IABURST=100 # Interactive Burst
#eth0_IARATE=1Mbit # Interactive Rate
#eth0_PXMTU=1514 # Physical MTU - includes Link Layer header
eth0_IPADDR=192.168.100.1
eth0_MASKLEN=24
eth0_BROADCAST=192.168.100.255
eth0_IP_SPOOF=YES
eth0_IP_KRNL_LOGMARTIANS=YES
eth0_IP_SHARED_MEDIA=NO
eth0_BRIDGE=NO
eth0_PROXY_ARP=NO
eth0_FAIRQ=NO
# Sangoma FR example
(((snip)))
# PPP interface stuff - these apply to all ASYNC ppp interfaces, options
# same as ethernet above.
ppp0_BNDWIDTH=30Kbit
ppp0_FAIRQ=YES
ppp0_TXQLEN=30
ppp0_IABURST=20
ppp0_IARATE=10Kbit
ppp0_PXMTU=1500
###############################################################################
# IP Filter setup - can pull in settings from above
###############################################################################
# Set up the basic type of filtering. Can be one of (none|router|firewall)
# You must load the ip_masq_* modules to enable full IP masquerading, and
# ip_masq_portfw if you want to forward external ports pop-3, mtp, www
# to internal machines below.
IPFILTER_SWITCH=firewall
# This set of variables is used with both sets of filters
SNMP_BLOCK=YES # Block all SNMP (YES/NO)
# List of IP Nos used for SNMP management
SNMP_MANAGER_IPS=""
# Fair Queuing support
# List of Mark values
MRK_CRIT=1 # Critical traffic, routing, DNS
MRK_IA=2 # Interactive traffic - telnet, ssh, IRC
# List of traffic types and maps to mark
values
# Setting this variable turns on the
# fairq chain
CLS_FAIRQ="${MRK_CRIT}_89_0/0 ${MRK_CRIT}_udp_0/0_route
${MRK_CRIT}_tcp_0/0_bgp ${MRK_CRIT}_tcp_0/0_domain ${MRK_CRIT}_udp_0/0_doma
in ${MRK_IA}_tcp_0/0_telnet ${MRK_IA}_tcp_0/0_ssh"
# This set of variables is used with the basic routing filter setup
# This set of variables is used with a basic IP masquerading firewall setup
#Notation - IP addresses/masklen
#
# NOTE: Do NOT turn on the DMZ network or ANY external port masquerading/
# port forwarding when EXTERN_DYNADDR is on because some security
# leaks will result. You may also want to limit the external open
# ports to domain (UDP) for DNS. Anyhow, these features are not that
# usable unless you have a static external address
#
EXTERN_IF="ppp0" # External Interface
#
# Start of changes by Charles Steinkuehler for DHCP
#
# Added for DHCP support
# Setting this to YES causes the script to read EXTERN_IP directly from
# the interface
#EXTERN_DHCP=YES # - YES/NO
EXTERN_DHCP=NO # - YES/NO
# The interface to configure via dhcp
IF_DHCP=$EXTERN_IF
# If YES, your firewall filters use 0/0 for your IP address, instead of your
# actual IP address. Set this to NO for typical ethernet setups, even if you
# are using DHCP
# External Address dynamically assigned
EXTERN_DYNADDR=NO # - YES/NO
# -- OR --
EXTERN_IP=0.0.0.0 # External Interface IP number
# If external interface is DHCP, read the IP address
# This should probably be moved to the init.d network script, but it seemed
# I put it here for now, as it is more obvious what it is doing, in case it
# messes something else up.
if [ "$EXTERN_DHCP" = "YES" ] || \
[ "$EXTERN_DHCP" = "Yes" ] || \
[ "$EXTERN_DHCP" = "yes" ]; then
# This computes the IP address of $EXTERN_IF
# Grep extracts just the line(s) with IP address information from the output
# of ip addr. The first sed gets rid of all but the first line (in case
# there are several IP addresses for some reason), and next sed extracts
# just the IP address in dot quad notation.
EXTERN_IP=`ip addr list label $EXTERN_IF | \
grep inet | \
sed '1!d' | \
sed 's/^[^.0-9]*\([.0-9]*\).*$/\1/'`
# Debugging - Remove if you like
# echo Extern IP: $EXTERN_IP
# If the external address is not configured, use a bogus address for the
# external interface to prevent a bunch of (harmless) errors that spit out
# when the IPCHAINS script is called.
if [ x$EXTERN_IP = x ]; then
EXTERN_IP=192.168.254.254
fi
fi
# UDP Services open to outside world
# - srcip/mask_dstport
# NOTE: bootpc port is used for dhcp client
EXTERN_UDP_PORTS="0/0_domain 0/0_ntp 0/0_bootpc"
#
# End of changes made by Charles Steinkuehler for dhcp support
#
# TCP services open to outside world
# - srcip/mask_dstport
EXTERN_TCP_PORTS="0/0_ssh 0/0_smtp"
# Internal interface
INTERN_IF="eth0" # Internal Interface
INTERN_NET=192.168.100.0/24 # Internal network (to be masqueraded)
INTERN_IP=192.168.100.1 # IP number of Internal Interface
# (to allow forwarding to external IP)
MASQ_SWITCH=YES # Masquerade internal network to outside
# world - YES/NO
# These services are not masqueraded from inside to outside.
proto_destnet_port
# Allows the firewall to be trusted for ssh access to routers...
# Override for below
#NOMASQ_DEST_BYPASS="tcp_10.0.0.1_ssh"
# services not to be masqueraded
#NOMASQ_DEST="tcp_0/0_ssh"
# Uncomment following for internal services.
# The following is an example of what should be put here.
# Tuples are as follows:
# <protocol>_<extern-ip>_<extern-port>_<intern-ip>_<intern-port>
#INTERN_SERVERS="tcp_${EXTERN_IP}_ftp_192.168.1.1_ftp
tcp_${EXTERN_IP}_smtp_192.168.1.1_smtp"
# These lines use the primary external IP address...if you need to
port-forward
# an aliased IP address, use the INTERN_SERVERS setting above
#INTERN_FTP_SERVER=192.168.1.1 # Internal FTP server to make available
#INTERN_WWW_SERVER=192.168.1.1 # Internal WWW server to make available
#INTERN_SMTP_SERVER=192.168.1.1 # Internal SMTP server to make available
#INTERN_POP3_SERVER=192.168.1.1 # Internal POP3 server to make available
#INTERN_IMAP_SERVER=192.168.1.1 # Internal IMAP server to make available
#INTERN_SSH_SERVER=192.168.1.1 # Internal SSH server to make available
#EXTERN_SSH_PORT=24 # External port to use for internal SSH access
###############################################################################
# Interface activation/deactivation functions
# Here so that special interface commands can be called and daemons started
#
# Arps can be set up here, network/host routes and so forth.
#
# This appears to be a little messy but is needed to achieve maximum
# functionality and flexibility.
#
###############################################################################
(((snip)))
###############################################################################
# Hostname Requires: CONFIG_HOSTNAME=YES
###############################################################################
HOSTNAME=firewall
###############################################################################
# Hosts file (Static domainname entires) Requires: CONFIG_HOSTSFILE=YES
###############################################################################
# IP FQDN hostname alias1
alias2..
HOSTS0="$eth0_IPADDR $HOSTNAME.glc $HOSTNAME mr rtr"
#HOSTS1="192.168.1.22 host2.private.network host2 h2"
###############################################################################
# Domain Search Order and Name Servers Requires: CONFIG_DNS=YES
###############################################################################
DOMAINS=enc.k12.il.us
DNS0=206.166.17.20
DNS1=206.166.83.20
#DNS1=0.0.0.0
--
Robert S. Peterson
31 N Alfred, Elgin IL 60123 USA
847/697-6491
Compass Adjusting for Lake Michigan navigators since 1985
Physics @ Bartlett HS
e-mail: rpeterson(at)enc.k12.il.us
-------------------------------------------------------
This SF.Net email sponsored by: Parasoft
Error proof Web apps, automate testing & more.
Download & eval WebKing and get a free book.
www.parasoft.com/bulletproofapps1
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html