>From: Richard Doyle <[EMAIL PROTECTED]>
>Date: Wed, 12 Nov 2003 08:55:40 -0800
>
On Tue, 2003-11-11 at 22:55, Paul G Rogers wrote:
> I'm trying to customize Bering 1.2 to replace a 1.0 dialup firewall
I've
> been using. I've put both on side-by-side computers and been through
the
> lrconfig files one by one. As far as I can tell I've got everything
set
> straight. Now I can't ping it. One thing I found is in...
...8<...
>
>Please follow "How do I request help" at
>http://sourceforge.net/docman/display_doc.php?docid=1891&group_id=13751
>
Got that now, I think. Sorry, I thought having v1.0 running would make
customizing v1.2 a snap, if I started by making them the same.
Here's the first part of the problem:
(Once I can reach the firewall I'll probably find more.)
============Pinging 192.168.1.254 with 32 bytes of data:Request timed
out.Request timed out.Request timed out.Request timed out.Ping statistics
for 192.168.1.254: Packets: Sent = 4, Received = 0, Lost = 4 (100%
loss),Approximate round trip times in milli-seconds: Minimum = 0ms,
Maximum = 0ms, Average = 0ms==========
When I use a v1.0 diskette in the firewall box then I can ping it with no
problem at all. So it isn't a problem with the LAN or NIC.
OK, now for the status you asked for...
Version:
==========
Linux foxfire 2.4.20 #1 Sun May 11 18:53:34 CEST 2003 i586 unknown
==========
IP addresses:
==========
1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 brd 127.255.255.255 scope host lo
2: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop
link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
3: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
link/ether 00:20:af:d9:95:62 brd ff:ff:ff:ff:ff:ff
inet 192.168.1.254/24 brd 192.168.1.255 scope global eth0
4: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP> mtu 576 qdisc pfifo_fast qlen 3
link/ppp
inet 10.64.64.64 peer 10.112.112.112/32 scope global ppp0
===========
Hmmm, ppp should be getting an IP address from my ISP which would be
209.102.124.something. I've never seen 10.anything with the v1.0 Bering
running. (I changed the MTU/MRU to 576 because I once read that improved
performance.)
Maybe, modules next:
===========
Module Pages Used by
ip_nat_irc 2176 0 (unused)
ip_nat_ftp 2784 0 (unused)
ip_conntrack_irc 2880 1
ip_conntrack_ftp 3648 1
ppp_async 6284 0 (unused)
ppp_generic 16152 1 [ppp_async]
slhc 4352 0 [ppp_generic]
3c509 8484 1
============
Am I missing a ppp module? Seems like I remember having to add an extra
module in v1.0.
Route next:
============
10.112.112.112 dev ppp0 proto kernel scope link src 10.64.64.64
192.168.1.0/24 dev eth0 proto kernel scope link src 192.168.1.254
default via 10.112.112.112 dev ppp0
============
What's with this 10.112.112.112 again? At this point I haven't made a
connection yet to the ISP.
Here's daemon.log:
============
Nov 12 15:36:03 foxfire pppd[25334]: pppd 2.4.1 started by root, uid 0
Nov 12 15:36:03 foxfire pppd[25334]: Using interface ppp0
Nov 12 15:36:03 foxfire pppd[25334]: Cannot determine ethernet address
for proxy ARP
Nov 12 15:36:03 foxfire pppd[25334]: local IP address 10.64.64.64
Nov 12 15:36:03 foxfire pppd[25334]: remote IP address 10.112.112.112
Nov 12 15:36:04 foxfire init: Entering runlevel: 2
============
10 again.
I did leave some of the Shorewall options for unclean, RFC1918, &
tcpflags, on the ppp zone which I had removed in v1.0.
Shorewall status:
============
Shorewall-1.4.2 Status at foxfire - Wed Nov 12 15:37:45 UTC 2003
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state ESTABLISHED
0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:53
0 0 DROP !icmp -- * * 0.0.0.0/0
0.0.0.0/0 state INVALID
0 0 ACCEPT all -- lo * 0.0.0.0/0
0.0.0.0/0
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state ESTABLISHED
0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:53
0 0 DROP !icmp -- * * 0.0.0.0/0
0.0.0.0/0 state INVALID
0 0 TCPMSS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU
Chain OUTPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state ESTABLISHED
0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:53
0 0 DROP !icmp -- * * 0.0.0.0/0
0.0.0.0/0 state INVALID
0 0 ACCEPT all -- * lo 0.0.0.0/0
0.0.0.0/0
Chain all2all (3 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW tcp flags:!0x16/0x02
0 0 common all -- * * 0.0.0.0/0
0.0.0.0/0
0 0 ULOG all -- * * 0.0.0.0/0
0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:all2all:REJECT:' queue_threshold 1
0 0 reject all -- * * 0.0.0.0/0
0.0.0.0/0
Chain badpkt (2 references)
pkts bytes target prot opt in out source
destination
0 0 LOG tcp -- * * 0.0.0.0/0
0.0.0.0/0 LOG flags 6 level 6 prefix `Shorewall:badpkt:DROP:'
0 0 LOG !tcp -- * * 0.0.0.0/0
0.0.0.0/0 LOG flags 4 level 6 prefix `Shorewall:badpkt:DROP:'
0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0
Chain common (2 references)
pkts bytes target prot opt in out source
destination
0 0 icmpdef icmp -- * * 0.0.0.0/0
0.0.0.0/0
0 0 reject udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpts:137:139
0 0 reject udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:445
0 0 reject tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:139
0 0 reject tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:445
0 0 reject tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:135
0 0 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:1900
0 0 DROP all -- * * 0.0.0.0/0
255.255.255.255
0 0 DROP all -- * * 0.0.0.0/0
224.0.0.0/4
0 0 reject tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:113
0 0 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0 udp spt:53 state NEW
0 0 DROP all -- * * 0.0.0.0/0
192.168.1.255
Chain dynamic (4 references)
pkts bytes target prot opt in out source
destination
Chain eth0_fwd (0 references)
pkts bytes target prot opt in out source
destination
0 0 dynamic all -- * * 0.0.0.0/0
0.0.0.0/0
Chain eth0_in (0 references)
pkts bytes target prot opt in out source
destination
0 0 dynamic all -- * * 0.0.0.0/0
0.0.0.0/0
Chain fw2loc (0 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW tcp flags:!0x16/0x02
0 0 ACCEPT icmp -- * * 0.0.0.0/0
0.0.0.0/0 icmp type 8
0 0 all2all all -- * * 0.0.0.0/0
0.0.0.0/0
Chain fw2net (0 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW tcp flags:!0x16/0x02
0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW tcp dpt:53
0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW udp dpt:53
0 0 ACCEPT icmp -- * * 0.0.0.0/0
0.0.0.0/0 icmp type 8
0 0 all2all all -- * * 0.0.0.0/0
0.0.0.0/0
Chain icmpdef (1 references)
pkts bytes target prot opt in out source
destination
Chain loc2fw (0 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW tcp flags:!0x16/0x02
0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW tcp dpt:22
0 0 ACCEPT icmp -- * * 0.0.0.0/0
0.0.0.0/0 icmp type 8
0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW udp dpt:53
0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW tcp dpt:80
0 0 all2all all -- * * 0.0.0.0/0
0.0.0.0/0
Chain loc2net (0 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW tcp flags:!0x16/0x02
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0
Chain logdrop (30 references)
pkts bytes target prot opt in out source
destination
0 0 ULOG all -- * * 0.0.0.0/0
0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:rfc1918:DROP:' queue_threshold 1
0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0
Chain logflags (5 references)
pkts bytes target prot opt in out source
destination
0 0 ULOG all -- * * 0.0.0.0/0
0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:logflags:DROP:' queue_threshold 1
0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0
Chain net2all (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW tcp flags:!0x16/0x02
0 0 common all -- * * 0.0.0.0/0
0.0.0.0/0
0 0 ULOG all -- * * 0.0.0.0/0
0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:net2all:DROP:' queue_threshold 1
0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0
Chain net2fw (0 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW tcp flags:!0x16/0x02
0 0 ACCEPT icmp -- * * 0.0.0.0/0
0.0.0.0/0 icmp type 8
0 0 net2all all -- * * 0.0.0.0/0
0.0.0.0/0
Chain newnotsyn (7 references)
pkts bytes target prot opt in out source
destination
0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0
Chain ppp0_fwd (0 references)
pkts bytes target prot opt in out source
destination
0 0 dynamic all -- * * 0.0.0.0/0
0.0.0.0/0
0 0 badpkt all -- * * 0.0.0.0/0
0.0.0.0/0 unclean
0 0 rfc1918 all -- * * 0.0.0.0/0
0.0.0.0/0 state NEW
0 0 tcpflags tcp -- * * 0.0.0.0/0
0.0.0.0/0
Chain ppp0_in (0 references)
pkts bytes target prot opt in out source
destination
0 0 dynamic all -- * * 0.0.0.0/0
0.0.0.0/0
0 0 badpkt all -- * * 0.0.0.0/0
0.0.0.0/0 unclean
0 0 rfc1918 all -- * * 0.0.0.0/0
0.0.0.0/0 state NEW
0 0 tcpflags tcp -- * * 0.0.0.0/0
0.0.0.0/0
Chain reject (7 references)
pkts bytes target prot opt in out source
destination
0 0 REJECT tcp -- * * 0.0.0.0/0
0.0.0.0/0 reject-with tcp-reset
0 0 REJECT all -- * * 0.0.0.0/0
0.0.0.0/0 reject-with icmp-port-unreachable
Chain rfc1918 (2 references)
pkts bytes target prot opt in out source
destination
0 0 RETURN all -- * * 255.255.255.255
0.0.0.0/0
0 0 DROP all -- * * 169.254.0.0/16
0.0.0.0/0
0 0 logdrop all -- * * 172.16.0.0/12
0.0.0.0/0
0 0 logdrop all -- * * 192.0.2.0/24
0.0.0.0/0
0 0 logdrop all -- * * 192.168.0.0/16
0.0.0.0/0
0 0 logdrop all -- * * 0.0.0.0/7
0.0.0.0/0
0 0 logdrop all -- * * 2.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 5.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 7.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 10.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 23.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 27.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 31.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 36.0.0.0/7
0.0.0.0/0
0 0 logdrop all -- * * 39.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 41.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 42.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 49.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 50.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 58.0.0.0/7
0.0.0.0/0
0 0 logdrop all -- * * 60.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 70.0.0.0/7
0.0.0.0/0
0 0 logdrop all -- * * 72.0.0.0/5
0.0.0.0/0
0 0 logdrop all -- * * 83.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 84.0.0.0/6
0.0.0.0/0
0 0 logdrop all -- * * 88.0.0.0/5
0.0.0.0/0
0 0 logdrop all -- * * 96.0.0.0/3
0.0.0.0/0
0 0 logdrop all -- * * 127.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 197.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 198.18.0.0/15
0.0.0.0/0
0 0 logdrop all -- * * 201.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 240.0.0.0/4
0.0.0.0/0
Chain tcpflags (2 references)
pkts bytes target prot opt in out source
destination
0 0 logflags tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp flags:0x3F/0x29
0 0 logflags tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp flags:0x3F/0x00
0 0 logflags tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp flags:0x06/0x06
0 0 logflags tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp flags:0x03/0x03
0 0 logflags tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:0 flags:0x16/0x02
NAT Table
Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
Mangle Table
Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
0 0 man1918 all -- ppp0 * 0.0.0.0/0
0.0.0.0/0 state NEW
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
Chain logdrop (30 references)
pkts bytes target prot opt in out source
destination
0 0 ULOG all -- * * 0.0.0.0/0
0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:man1918:DROP:' queue_threshold 1
0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0
Chain man1918 (1 references)
pkts bytes target prot opt in out source
destination
0 0 RETURN all -- * * 0.0.0.0/0
255.255.255.255
0 0 DROP all -- * * 0.0.0.0/0
169.254.0.0/16
0 0 logdrop all -- * * 0.0.0.0/0
172.16.0.0/12
0 0 logdrop all -- * * 0.0.0.0/0
192.0.2.0/24
0 0 logdrop all -- * * 0.0.0.0/0
192.168.0.0/16
0 0 logdrop all -- * * 0.0.0.0/0
0.0.0.0/7
0 0 logdrop all -- * * 0.0.0.0/0
2.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0
5.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0
7.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0
10.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0
23.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0
27.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0
31.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0
36.0.0.0/7
0 0 logdrop all -- * * 0.0.0.0/0
39.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0
41.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0
42.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0
49.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0
50.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0
58.0.0.0/7
0 0 logdrop all -- * * 0.0.0.0/0
60.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0
70.0.0.0/7
0 0 logdrop all -- * * 0.0.0.0/0
72.0.0.0/5
0 0 logdrop all -- * * 0.0.0.0/0
83.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0
84.0.0.0/6
0 0 logdrop all -- * * 0.0.0.0/0
88.0.0.0/5
0 0 logdrop all -- * * 0.0.0.0/0
96.0.0.0/3
0 0 logdrop all -- * * 0.0.0.0/0
127.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0
197.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0
198.18.0.0/15
0 0 logdrop all -- * * 0.0.0.0/0
201.0.0.0/8
0 0 logdrop all -- * * 0.0.0.0/0
240.0.0.0/4
===========
And finally messages:
===========
Nov 12 15:36:02 foxfire syslogd 1.3-3#31.slink1: restart.
Nov 12 15:36:02 foxfire kernel: klogd 1.3-3#31.slink1, log source =
/proc/kmsg started.
Nov 12 15:36:02 foxfire kernel: No module symbols loaded.
Nov 12 15:36:02 foxfire kernel: BIOS-provided physical RAM map:
Nov 12 15:36:02 foxfire kernel: 63MB LOWMEM available.
Nov 12 15:36:02 foxfire kernel: Initializing CPU#0
Nov 12 15:36:02 foxfire kernel: Memory: 62480k/65472k available (948k
kernel code, 2604k reserved, -1176k data, 64k init, 0k highmem)
Nov 12 15:36:02 foxfire kernel: Dentry cache hash table entries: 8192
(order: 4, 65536 bytes)
Nov 12 15:36:02 foxfire kernel: Inode cache hash table entries: 4096
(order: 3, 32768 bytes)
Nov 12 15:36:02 foxfire kernel: Intel Pentium with F0 0F bug - workaround
enabled.
Nov 12 15:36:02 foxfire kernel: Checking 'hlt' instruction... OK.
Nov 12 15:36:02 foxfire kernel: PCI: PCI BIOS revision 2.10 entry at
0xfdba1, last bus=0
Nov 12 15:36:02 foxfire kernel: PCI: Using configuration type 1
Nov 12 15:36:02 foxfire kernel: PCI: Probing PCI hardware
Nov 12 15:36:02 foxfire kernel: Limiting direct PCI/PCI transfers.
Nov 12 15:36:02 foxfire kernel: Linux NET4.0 for Linux 2.4
Nov 12 15:36:02 foxfire kernel: Based upon Swansea University Computer
Society NET3.039
Nov 12 15:36:02 foxfire kernel: Serial driver version 5.05c (2001-07-08)
with MANY_PORTS SHARE_IRQ DETECT_IRQ SERIAL_PCI enabled
Nov 12 15:36:02 foxfire kernel: ttyS00 at 0x03f8 (irq = 4) is a 16550A
Nov 12 15:36:02 foxfire kernel: Real Time Clock Driver v1.10e
Nov 12 15:36:02 foxfire kernel: Software Watchdog Timer: 0.05, timer
margin: 60 sec
Nov 12 15:36:02 foxfire kernel: Floppy drive(s): fd0 is 1.44M
Nov 12 15:36:02 foxfire kernel: FDC 0 is a post-1991 82077
Nov 12 15:36:02 foxfire kernel: NET4: Linux TCP/IP 1.0 for NET4.0
Nov 12 15:36:02 foxfire kernel: IP Protocols: ICMP, UDP, TCP, IGMP
Nov 12 15:36:02 foxfire kernel: IP: routing cache hash table of 512
buckets, 4Kbytes
Nov 12 15:36:02 foxfire kernel: TCP: Hash tables configured (established
4096 bind 4096)
Nov 12 15:36:02 foxfire kernel: NET4: Unix domain sockets 1.0/SMP for
Linux NET4.0.
Nov 12 15:36:02 foxfire kernel: RAMDISK: Compressed image found at block
0
Nov 12 15:36:02 foxfire kernel: Freeing initrd memory: 401k freed
Nov 12 15:36:02 foxfire kernel: Freeing unused kernel memory: 64k freed
Nov 12 15:36:02 foxfire kernel: 3c509.c:1.19 16Oct2002 [EMAIL PROTECTED]
Nov 12 15:36:02 foxfire kernel: http://www.scyld.com/network/3c509.html
Nov 12 15:36:02 foxfire kernel: CSLIP: code copyright 1989 Regents of the
University of California
Nov 12 15:36:02 foxfire kernel: PPP generic driver version 2.4.2
==========
I saw that the NIC had been recognized, and the MAC had been displayed.
Maybe I can't see something, I think I setup the interfaces OK, maybe
Shorewall is stopping the ping from inside? I don't understand why, what
the danger is.
Suggestions I can understand appreciated.
Paul Rogers ([EMAIL PROTECTED])
http://www.xprt.net/~pgrogers/
http://www.angelfire.com/or/paulrogers/
Rogers' Second Law: "Everything you do communicates."
(I do not personally endorse any additions after this line. TANSTAAFL
:-)
________________________________________________________________
The best thing to hit the internet in years - Juno SpeedBand!
Surf the web up to FIVE TIMES FASTER!
Only $14.95/ month - visit www.juno.com to sign up today!
-------------------------------------------------------
This SF.Net email sponsored by: ApacheCon 2003,
16-19 November in Las Vegas. Learn firsthand the latest
developments in Apache, PHP, Perl, XML, Java, MySQL,
WebDAV, and more! http://www.apachecon.com/
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html