>From: Richard Doyle <[EMAIL PROTECTED]>
>Date: Wed, 12 Nov 2003 08:55:40 -0800
>
On Tue, 2003-11-11 at 22:55, Paul G Rogers wrote:
> I'm trying to customize Bering 1.2 to replace a 1.0 dialup firewall
I've
> been using.  I've put both on side-by-side computers and been through
the
> lrconfig files one by one.  As far as I can tell I've got everything
set
> straight.  Now I can't ping it.  One thing I found is in...
...8<...
>
>Please follow "How do I request help" at 
>http://sourceforge.net/docman/display_doc.php?docid=1891&group_id=13751
>
Got that now, I think.  Sorry, I thought having v1.0 running would make
customizing v1.2 a snap, if I started by making them the same.

Here's the first part of the problem:
(Once I can reach the firewall I'll probably find more.)
============Pinging 192.168.1.254 with 32 bytes of data:Request timed
out.Request timed out.Request timed out.Request timed out.Ping statistics
for 192.168.1.254:    Packets: Sent = 4, Received = 0, Lost = 4 (100%
loss),Approximate round trip times in milli-seconds:    Minimum = 0ms,
Maximum =  0ms, Average =  0ms==========
When I use a v1.0 diskette in the firewall box then I can ping it with no
problem at all.  So it isn't a problem with the LAN or NIC.

OK, now for the status you asked for...
Version:
==========
Linux foxfire 2.4.20 #1 Sun May 11 18:53:34 CEST 2003 i586 unknown
==========
IP addresses:
==========
1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue 
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 brd 127.255.255.255 scope host lo
2: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop 
    link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
3: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
    link/ether 00:20:af:d9:95:62 brd ff:ff:ff:ff:ff:ff
    inet 192.168.1.254/24 brd 192.168.1.255 scope global eth0
4: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP> mtu 576 qdisc pfifo_fast qlen 3
    link/ppp 
    inet 10.64.64.64 peer 10.112.112.112/32 scope global ppp0
===========
Hmmm, ppp should be getting an IP address from my ISP which would be
209.102.124.something.  I've never seen 10.anything with the v1.0 Bering
running.  (I changed the MTU/MRU to 576 because I once read that improved
performance.)
Maybe, modules next:
===========
Module         Pages    Used by
ip_nat_irc              2176   0 (unused)
ip_nat_ftp              2784   0 (unused)
ip_conntrack_irc        2880   1
ip_conntrack_ftp        3648   1
ppp_async               6284   0 (unused)
ppp_generic            16152   1 [ppp_async]
slhc                    4352   0 [ppp_generic]
3c509                   8484   1
============
Am I missing a ppp module?  Seems like I remember having to add an extra
module in v1.0.
Route next:
============
10.112.112.112 dev ppp0  proto kernel  scope link  src 10.64.64.64 
192.168.1.0/24 dev eth0  proto kernel  scope link  src 192.168.1.254 
default via 10.112.112.112 dev ppp0 
============
What's with this 10.112.112.112 again?  At this point I haven't made a
connection yet to the ISP.
Here's daemon.log:
============
Nov 12 15:36:03 foxfire pppd[25334]: pppd 2.4.1 started by root, uid 0
Nov 12 15:36:03 foxfire pppd[25334]: Using interface ppp0
Nov 12 15:36:03 foxfire pppd[25334]: Cannot determine ethernet address
for proxy ARP
Nov 12 15:36:03 foxfire pppd[25334]: local  IP address 10.64.64.64
Nov 12 15:36:03 foxfire pppd[25334]: remote IP address 10.112.112.112
Nov 12 15:36:04 foxfire init: Entering runlevel: 2
============
10 again.
I did leave some of the Shorewall options for unclean, RFC1918, &
tcpflags, on the ppp zone which I had removed in v1.0.
Shorewall status:
============
Shorewall-1.4.2 Status at foxfire - Wed Nov 12 15:37:45 UTC 2003

Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          state ESTABLISHED 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          udp dpt:53 
    0     0 DROP      !icmp --  *      *       0.0.0.0/0           
0.0.0.0/0          state INVALID 
    0     0 ACCEPT     all  --  lo     *       0.0.0.0/0           
0.0.0.0/0          

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          state ESTABLISHED 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          udp dpt:53 
    0     0 DROP      !icmp --  *      *       0.0.0.0/0           
0.0.0.0/0          state INVALID 
    0     0 TCPMSS     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp flags:0x06/0x02 TCPMSS clamp to PMTU 

Chain OUTPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          state ESTABLISHED 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          udp dpt:53 
    0     0 DROP      !icmp --  *      *       0.0.0.0/0           
0.0.0.0/0          state INVALID 
    0     0 ACCEPT     all  --  *      lo      0.0.0.0/0           
0.0.0.0/0          

Chain all2all (3 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
    0     0 common     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          
    0     0 ULOG       all  --  *      *       0.0.0.0/0           
0.0.0.0/0          ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:all2all:REJECT:' queue_threshold 1 
    0     0 reject     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain badpkt (2 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 LOG        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          LOG flags 6 level 6 prefix `Shorewall:badpkt:DROP:' 
    0     0 LOG       !tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          LOG flags 4 level 6 prefix `Shorewall:badpkt:DROP:' 
    0     0 DROP       all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain common (2 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 icmpdef    icmp --  *      *       0.0.0.0/0           
0.0.0.0/0          
    0     0 reject     udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          udp dpts:137:139 
    0     0 reject     udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          udp dpt:445 
    0     0 reject     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp dpt:139 
    0     0 reject     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp dpt:445 
    0     0 reject     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp dpt:135 
    0     0 DROP       udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          udp dpt:1900 
    0     0 DROP       all  --  *      *       0.0.0.0/0           
255.255.255.255    
    0     0 DROP       all  --  *      *       0.0.0.0/0           
224.0.0.0/4        
    0     0 reject     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp dpt:113 
    0     0 DROP       udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          udp spt:53 state NEW 
    0     0 DROP       all  --  *      *       0.0.0.0/0           
192.168.1.255      

Chain dynamic (4 references)
 pkts bytes target     prot opt in     out     source              
destination         

Chain eth0_fwd (0 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 dynamic    all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain eth0_in (0 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 dynamic    all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain fw2loc (0 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0           
0.0.0.0/0          icmp type 8 
    0     0 all2all    all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain fw2net (0 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp dpt:53 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW udp dpt:53 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0           
0.0.0.0/0          icmp type 8 
    0     0 all2all    all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain icmpdef (1 references)
 pkts bytes target     prot opt in     out     source              
destination         

Chain loc2fw (0 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp dpt:22 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0           
0.0.0.0/0          icmp type 8 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW udp dpt:53 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp dpt:80 
    0     0 all2all    all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain loc2net (0 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain logdrop (30 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ULOG       all  --  *      *       0.0.0.0/0           
0.0.0.0/0          ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:rfc1918:DROP:' queue_threshold 1 
    0     0 DROP       all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain logflags (5 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ULOG       all  --  *      *       0.0.0.0/0           
0.0.0.0/0          ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:logflags:DROP:' queue_threshold 1 
    0     0 DROP       all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain net2all (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
    0     0 common     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          
    0     0 ULOG       all  --  *      *       0.0.0.0/0           
0.0.0.0/0          ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:net2all:DROP:' queue_threshold 1 
    0     0 DROP       all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain net2fw (0 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0           
0.0.0.0/0          icmp type 8 
    0     0 net2all    all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain newnotsyn (7 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 DROP       all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain ppp0_fwd (0 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 dynamic    all  --  *      *       0.0.0.0/0           
0.0.0.0/0          
    0     0 badpkt     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          unclean 
    0     0 rfc1918    all  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW 
    0     0 tcpflags   tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain ppp0_in (0 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 dynamic    all  --  *      *       0.0.0.0/0           
0.0.0.0/0          
    0     0 badpkt     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          unclean 
    0     0 rfc1918    all  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW 
    0     0 tcpflags   tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain reject (7 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 REJECT     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          reject-with tcp-reset 
    0     0 REJECT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          reject-with icmp-port-unreachable 

Chain rfc1918 (2 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 RETURN     all  --  *      *       255.255.255.255     
0.0.0.0/0          
    0     0 DROP       all  --  *      *       169.254.0.0/16      
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       172.16.0.0/12       
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       192.0.2.0/24        
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       192.168.0.0/16      
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       0.0.0.0/7           
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       2.0.0.0/8           
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       5.0.0.0/8           
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       7.0.0.0/8           
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       10.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       23.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       27.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       31.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       36.0.0.0/7          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       39.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       41.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       42.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       49.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       50.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       58.0.0.0/7          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       60.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       70.0.0.0/7          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       72.0.0.0/5          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       83.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       84.0.0.0/6          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       88.0.0.0/5          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       96.0.0.0/3          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       127.0.0.0/8         
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       197.0.0.0/8         
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       198.18.0.0/15       
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       201.0.0.0/8         
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       240.0.0.0/4         
0.0.0.0/0          

Chain tcpflags (2 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 logflags   tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp flags:0x3F/0x29 
    0     0 logflags   tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp flags:0x3F/0x00 
    0     0 logflags   tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp flags:0x06/0x06 
    0     0 logflags   tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp flags:0x03/0x03 
    0     0 logflags   tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp spt:0 flags:0x16/0x02 


NAT Table

Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source              
destination         

Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source              
destination         

Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source              
destination         

Mangle Table

Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 man1918    all  --  ppp0   *       0.0.0.0/0           
0.0.0.0/0          state NEW 

Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source              
destination         

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source              
destination         

Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source              
destination         

Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source              
destination         

Chain logdrop (30 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ULOG       all  --  *      *       0.0.0.0/0           
0.0.0.0/0          ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:man1918:DROP:' queue_threshold 1 
    0     0 DROP       all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain man1918 (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 RETURN     all  --  *      *       0.0.0.0/0           
255.255.255.255    
    0     0 DROP       all  --  *      *       0.0.0.0/0           
169.254.0.0/16     
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
172.16.0.0/12      
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
192.0.2.0/24       
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
192.168.0.0/16     
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
0.0.0.0/7          
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
2.0.0.0/8          
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
5.0.0.0/8          
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
7.0.0.0/8          
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
10.0.0.0/8         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
23.0.0.0/8         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
27.0.0.0/8         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
31.0.0.0/8         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
36.0.0.0/7         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
39.0.0.0/8         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
41.0.0.0/8         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
42.0.0.0/8         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
49.0.0.0/8         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
50.0.0.0/8         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
58.0.0.0/7         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
60.0.0.0/8         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
70.0.0.0/7         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
72.0.0.0/5         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
83.0.0.0/8         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
84.0.0.0/6         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
88.0.0.0/5         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
96.0.0.0/3         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
127.0.0.0/8        
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
197.0.0.0/8        
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
198.18.0.0/15      
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
201.0.0.0/8        
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
240.0.0.0/4        
===========
And finally messages:
===========
Nov 12 15:36:02 foxfire syslogd 1.3-3#31.slink1: restart.
Nov 12 15:36:02 foxfire kernel: klogd 1.3-3#31.slink1, log source =
/proc/kmsg started.
Nov 12 15:36:02 foxfire kernel: No module symbols loaded.
Nov 12 15:36:02 foxfire kernel: BIOS-provided physical RAM map: 
Nov 12 15:36:02 foxfire kernel: 63MB LOWMEM available. 
Nov 12 15:36:02 foxfire kernel: Initializing CPU#0 
Nov 12 15:36:02 foxfire kernel: Memory: 62480k/65472k available (948k
kernel code, 2604k reserved, -1176k data, 64k init, 0k highmem) 
Nov 12 15:36:02 foxfire kernel: Dentry cache hash table entries: 8192
(order: 4, 65536 bytes) 
Nov 12 15:36:02 foxfire kernel: Inode cache hash table entries: 4096
(order: 3, 32768 bytes) 
Nov 12 15:36:02 foxfire kernel: Intel Pentium with F0 0F bug - workaround
enabled. 
Nov 12 15:36:02 foxfire kernel: Checking 'hlt' instruction... OK. 
Nov 12 15:36:02 foxfire kernel: PCI: PCI BIOS revision 2.10 entry at
0xfdba1, last bus=0 
Nov 12 15:36:02 foxfire kernel: PCI: Using configuration type 1 
Nov 12 15:36:02 foxfire kernel: PCI: Probing PCI hardware 
Nov 12 15:36:02 foxfire kernel: Limiting direct PCI/PCI transfers. 
Nov 12 15:36:02 foxfire kernel: Linux NET4.0 for Linux 2.4 
Nov 12 15:36:02 foxfire kernel: Based upon Swansea University Computer
Society NET3.039 
Nov 12 15:36:02 foxfire kernel: Serial driver version 5.05c (2001-07-08)
with MANY_PORTS SHARE_IRQ DETECT_IRQ SERIAL_PCI enabled 
Nov 12 15:36:02 foxfire kernel: ttyS00 at 0x03f8 (irq = 4) is a 16550A 
Nov 12 15:36:02 foxfire kernel: Real Time Clock Driver v1.10e 
Nov 12 15:36:02 foxfire kernel: Software Watchdog Timer: 0.05, timer
margin: 60 sec 
Nov 12 15:36:02 foxfire kernel: Floppy drive(s): fd0 is 1.44M 
Nov 12 15:36:02 foxfire kernel: FDC 0 is a post-1991 82077 
Nov 12 15:36:02 foxfire kernel: NET4: Linux TCP/IP 1.0 for NET4.0 
Nov 12 15:36:02 foxfire kernel: IP Protocols: ICMP, UDP, TCP, IGMP 
Nov 12 15:36:02 foxfire kernel: IP: routing cache hash table of 512
buckets, 4Kbytes 
Nov 12 15:36:02 foxfire kernel: TCP: Hash tables configured (established
4096 bind 4096) 
Nov 12 15:36:02 foxfire kernel: NET4: Unix domain sockets 1.0/SMP for
Linux NET4.0. 
Nov 12 15:36:02 foxfire kernel: RAMDISK: Compressed image found at block
0 
Nov 12 15:36:02 foxfire kernel: Freeing initrd memory: 401k freed 
Nov 12 15:36:02 foxfire kernel: Freeing unused kernel memory: 64k freed 
Nov 12 15:36:02 foxfire kernel: 3c509.c:1.19 16Oct2002 [EMAIL PROTECTED] 
Nov 12 15:36:02 foxfire kernel: http://www.scyld.com/network/3c509.html 
Nov 12 15:36:02 foxfire kernel: CSLIP: code copyright 1989 Regents of the
University of California 
Nov 12 15:36:02 foxfire kernel: PPP generic driver version 2.4.2 
==========
I saw that the NIC had been recognized, and the MAC had been displayed.

Maybe I can't see something, I think I setup the interfaces OK, maybe
Shorewall is stopping the ping from inside?  I don't understand why, what
the danger is.

Suggestions I can understand appreciated.


Paul Rogers  ([EMAIL PROTECTED])
http://www.xprt.net/~pgrogers/
http://www.angelfire.com/or/paulrogers/
Rogers' Second Law: "Everything you do communicates."
(I do not personally endorse any additions after this line. TANSTAAFL 
:-)


________________________________________________________________
The best thing to hit the internet in years - Juno SpeedBand!
Surf the web up to FIVE TIMES FASTER!
Only $14.95/ month - visit www.juno.com to sign up today!


-------------------------------------------------------
This SF.Net email sponsored by: ApacheCon 2003,
16-19 November in Las Vegas. Learn firsthand the latest
developments in Apache, PHP, Perl, XML, Java, MySQL,
WebDAV, and more! http://www.apachecon.com/
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to