Hi again
Lynn Avants wrote:
>Protocols and equipment do not necessarily mean
>the same thing. I'm a firm believer that the only
reason
>any ISP uses PPPoE is to try and leverage the extra
>money out of a static ip connection....
>
>Is pump, your interfaces file, and shorewall all
configured to
>get a dhcp lease? IIRC, the default Bering image is
setup for
>a dhcp cable connection by default (granted that the
correct
>driver is loaded for your hardware/NIC).
You are prob. right with the PPPoE and money :)
All standrart Bering1.2 image with my NIC� i place
But still i don�t get a IP
I� included a lot of debug info at the bottom of my
mail
all pastet from weblet, so my NIC are ok
---
Ray Olszewski wrote:
>Lynn's advice is correct here, except that "ask your
provider" betokens
>more optimism than I have on a day-to-day basis about
the helpfulness
>of
>ISPs. If your provider is as unhelpful as I'm used to
seeing, see how
>they
>say to connect a Windows computer to their system
(they always tell you
>*that*, normally in the written materials you get
with your
>hardware). Possibilities are:
>
>1. In Networking, check "obtain an IP address
automatically".
>This means the ISP uses DHCP, so follow Lynn's advice
on pump.
>
>2. Install and run a custom app that the ISP
provides. This
>probably means they use PPPoE.
>Once you know with a bit more certainty which type of
connection you
>are
>trying for, you can review your configuration for
errors (and get help
>here, after providing the customary details about
what you try and how
>it
>fails, as you started to do with the PPPoE attempt).
Yes :)) my ISP only support Windows and MacOSX+9, but
lets see what time
will bring to linux, thats a other discussion.
My connection is a ADSL-512/128 thats what i get of
info
but now i know that it�s a cable with a fixed IP, so
pump
must be it ?
---
J�rn wrote:
>Looks to me like you are in Denmark - what provider
are U using? Maybe
>there is
>soneone else on the list that have set something up
with you
>provider...
It�s tele2/get2net ADSL
Best danish and internationale
Regards Lasse
weblet rip:
::Interfaces::
1: lo: mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd
00:00:00:00:00:00
inet 127.0.0.1/8 brd 127.255.255.255 scope host lo
2: dummy0: mtu 1500 qdisc noop
link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
3: eth0: mtu 1500 qdisc pfifo_fast qlen 100
link/ether 00:0b:2b:02:0d:6d brd ff:ff:ff:ff:ff:ff
4: eth1: mtu 1500 qdisc pfifo_fast qlen 100
link/ether 00:0b:2b:02:2a:43 brd ff:ff:ff:ff:ff:ff
inet 192.168.1.254/24 brd 192.168.1.255 scope
global eth1
5: eth2: mtu 1500 qdisc noop qlen 100
link/ether 00:0b:2b:02:2a:4d brd ff:ff:ff:ff:ff:ff
::Routes::
192.168.1.0/24 dev eth1 proto kernel scope link src
192.168.1.254
::Statistics::
1: lo: mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd
00:00:00:00:00:00
RX: bytes packets errors dropped overrun mcast
100 2 0 0 0 0
TX: bytes packets errors dropped carrier
collsns
100 2 0 0 0 0
2: dummy0: mtu 1500 qdisc noop
link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
0 0 0 0 0 0
TX: bytes packets errors dropped carrier
collsns
0 0 0 0 0 0
3: eth0: mtu 1500 qdisc pfifo_fast qlen 100
link/ether 00:0b:2b:02:0d:6d brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
0 0 0 0 0 0
TX: bytes packets errors dropped carrier
collsns
1368 4 0 0 0 0
4: eth1: mtu 1500 qdisc pfifo_fast qlen 100
link/ether 00:0b:2b:02:2a:43 brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
7840 68 0 0 0 0
TX: bytes packets errors dropped carrier
collsns
38099 66 0 0 0 0
5: eth2: mtu 1500 qdisc noop qlen 100
link/ether 00:0b:2b:02:2a:4d brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
0 0 0 0 0 0
TX: bytes packets errors dropped carrier
collsns
0 0 0 0 0 0
::Packet Filter::
Shorewall-1.4.2 Chain at - Wed Dec 10 16:32:49 UTC
2003
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
0 0 DROP !icmp -- * *
0.0.0.0/0 0.0.0.0/0
state INVALID
0 0 ACCEPT all -- lo *
0.0.0.0/0 0.0.0.0/0
0 0 eth0_in all -- eth0 *
0.0.0.0/0 0.0.0.0/0
0 0 eth1_in all -- eth1 *
0.0.0.0/0 0.0.0.0/0
0 0 common all -- * *
0.0.0.0/0 0.0.0.0/0
0 0 ULOG all -- * *
0.0.0.0/0 0.0.0.0/0
ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:INPUT:REJECT:' queue_threshold 1
0 0 reject all -- * *
0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
0 0 DROP !icmp -- * *
0.0.0.0/0 0.0.0.0/0
state INVALID
0 0 eth0_fwd all -- eth0 *
0.0.0.0/0 0.0.0.0/0
0 0 eth1_fwd all -- eth1 *
0.0.0.0/0 0.0.0.0/0
0 0 common all -- * *
0.0.0.0/0 0.0.0.0/0
0 0 ULOG all -- * *
0.0.0.0/0 0.0.0.0/0
ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:FORWARD:REJECT:' queue_threshold 1
0 0 reject all -- * *
0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
0 0 DROP !icmp -- * *
0.0.0.0/0 0.0.0.0/0
state INVALID
0 0 ACCEPT udp -- * eth0
0.0.0.0/0 0.0.0.0/0
udp dpts:67:68
0 0 ACCEPT all -- * lo
0.0.0.0/0 0.0.0.0/0
0 0 fw2net all -- * eth0
0.0.0.0/0 0.0.0.0/0
0 0 fw2loc all -- * eth1
0.0.0.0/0 0.0.0.0/0
0 0 common all -- * *
0.0.0.0/0 0.0.0.0/0
0 0 ULOG all -- * *
0.0.0.0/0 0.0.0.0/0
ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:OUTPUT:REJECT:' queue_threshold 1
0 0 reject all -- * *
0.0.0.0/0 0.0.0.0/0
Chain all2all (3 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * *
0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * *
0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 common all -- * *
0.0.0.0/0 0.0.0.0/0
0 0 ULOG all -- * *
0.0.0.0/0 0.0.0.0/0
ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:all2all:REJECT:' queue_threshold 1
0 0 reject all -- * *
0.0.0.0/0 0.0.0.0/0
Chain common (5 references)
pkts bytes target prot opt in out source
destination
0 0 icmpdef icmp -- * *
0.0.0.0/0 0.0.0.0/0
0 0 reject udp -- * *
0.0.0.0/0 0.0.0.0/0
udp dpts:137:139
0 0 reject udp -- * *
0.0.0.0/0 0.0.0.0/0
udp dpt:445
0 0 reject tcp -- * *
0.0.0.0/0 0.0.0.0/0
tcp dpt:139
0 0 reject tcp -- * *
0.0.0.0/0 0.0.0.0/0
tcp dpt:445
0 0 reject tcp -- * *
0.0.0.0/0 0.0.0.0/0
tcp dpt:135
0 0 DROP udp -- * *
0.0.0.0/0 0.0.0.0/0
udp dpt:1900
0 0 DROP all -- * *
0.0.0.0/0 255.255.255.
255
0 0 DROP all -- * *
0.0.0.0/0 224.0.0.0/4
0 0 reject tcp -- * *
0.0.0.0/0 0.0.0.0/0
tcp dpt:113
0 0 DROP udp -- * *
0.0.0.0/0 0.0.0.0/0
udp spt:53 state NEW
0 0 DROP all -- * *
0.0.0.0/0 192.168.1.25
5
Chain dynamic (4 references)
pkts bytes target prot opt in out source
destination
Chain eth0_fwd (1 references)
pkts bytes target prot opt in out source
destination
0 0 dynamic all -- * *
0.0.0.0/0 0.0.0.0/0
0 0 rfc1918 all -- * *
0.0.0.0/0 0.0.0.0/0
state NEW
0 0 net2all all -- * eth1
0.0.0.0/0 0.0.0.0/0
Chain eth0_in (1 references)
pkts bytes target prot opt in out source
destination
0 0 dynamic all -- * *
0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT udp -- * *
0.0.0.0/0 0.0.0.0/0
udp dpts:67:68
0 0 rfc1918 all -- * *
0.0.0.0/0 0.0.0.0/0
state NEW
0 0 net2fw all -- * *
0.0.0.0/0 0.0.0.0/0
Chain eth1_fwd (1 references)
pkts bytes target prot opt in out source
destination
0 0 dynamic all -- * *
0.0.0.0/0 0.0.0.0/0
0 0 loc2net all -- * eth0
0.0.0.0/0 0.0.0.0/0
Chain eth1_in (1 references)
pkts bytes target prot opt in out source
destination
0 0 dynamic all -- * *
0.0.0.0/0 0.0.0.0/0
0 0 loc2fw all -- * *
0.0.0.0/0 0.0.0.0/0
Chain fw2loc (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * *
0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * *
0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 ACCEPT icmp -- * *
0.0.0.0/0 0.0.0.0/0
icmp type 8
0 0 all2all all -- * *
0.0.0.0/0 0.0.0.0/0
Chain fw2net (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * *
0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * *
0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 ACCEPT tcp -- * *
0.0.0.0/0 0.0.0.0/0
state NEW tcp dpt:53
0 0 ACCEPT udp -- * *
0.0.0.0/0 0.0.0.0/0
state NEW udp dpt:53
0 0 ACCEPT icmp -- * *
0.0.0.0/0 0.0.0.0/0
icmp type 8
0 0 all2all all -- * *
0.0.0.0/0 0.0.0.0/0
Chain icmpdef (1 references)
pkts bytes target prot opt in out source
destination
Chain loc2fw (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * *
0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * *
0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 ACCEPT tcp -- * *
0.0.0.0/0 0.0.0.0/0
state NEW tcp dpt:22
0 0 ACCEPT icmp -- * *
0.0.0.0/0 0.0.0.0/0
icmp type 8
0 0 ACCEPT udp -- * *
0.0.0.0/0 0.0.0.0/0
state NEW udp dpt:53
0 0 ACCEPT tcp -- * *
0.0.0.0/0 0.0.0.0/0
state NEW tcp dpt:80
0 0 all2all all -- * *
0.0.0.0/0 0.0.0.0/0
Chain loc2net (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * *
0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * *
0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 ACCEPT all -- * *
0.0.0.0/0 0.0.0.0/0
Chain logdrop (30 references)
pkts bytes target prot opt in out source
destination
0 0 ULOG all -- * *
0.0.0.0/0 0.0.0.0/0
ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:rfc1918:DROP:' queue_threshold 1
0 0 DROP all -- * *
0.0.0.0/0 0.0.0.0/0
Chain net2all (2 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * *
0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * *
0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 common all -- * *
0.0.0.0/0 0.0.0.0/0
0 0 ULOG all -- * *
0.0.0.0/0 0.0.0.0/0
ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:net2all:DROP:' queue_threshold 1
0 0 DROP all -- * *
0.0.0.0/0 0.0.0.0/0
Chain net2fw (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * *
0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * *
0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 ACCEPT icmp -- * *
0.0.0.0/0 0.0.0.0/0
icmp type 8
0 0 net2all all -- * *
0.0.0.0/0 0.0.0.0/0
Chain newnotsyn (7 references)
pkts bytes target prot opt in out source
destination
0 0 DROP all -- * *
0.0.0.0/0 0.0.0.0/0
Chain reject (10 references)
pkts bytes target prot opt in out source
destination
0 0 REJECT tcp -- * *
0.0.0.0/0 0.0.0.0/0
reject-with tcp-reset
0 0 REJECT all -- * *
0.0.0.0/0 0.0.0.0/0
reject-with icmp-port-unreachable
Chain rfc1918 (2 references)
pkts bytes target prot opt in out source
destination
0 0 RETURN all -- * *
255.255.255.255 0.0.0.0/0
0 0 DROP all -- * *
169.254.0.0/16 0.0.0.0/0
0 0 logdrop all -- * *
172.16.0.0/12 0.0.0.0/0
0 0 logdrop all -- * *
192.0.2.0/24 0.0.0.0/0
0 0 logdrop all -- * *
192.168.0.0/16 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/7 0.0.0.0/0
0 0 logdrop all -- * *
2.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
5.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
7.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
10.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
23.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
27.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
31.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
36.0.0.0/7 0.0.0.0/0
0 0 logdrop all -- * *
39.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
41.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
42.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
49.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
50.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
58.0.0.0/7 0.0.0.0/0
0 0 logdrop all -- * *
60.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
70.0.0.0/7 0.0.0.0/0
0 0 logdrop all -- * *
72.0.0.0/5 0.0.0.0/0
0 0 logdrop all -- * *
83.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
84.0.0.0/6 0.0.0.0/0
0 0 logdrop all -- * *
88.0.0.0/5 0.0.0.0/0
0 0 logdrop all -- * *
96.0.0.0/3 0.0.0.0/0
0 0 logdrop all -- * *
127.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
197.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
198.18.0.0/15 0.0.0.0/0
0 0 logdrop all -- * *
201.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
240.0.0.0/4 0.0.0.0/0
::Masquerading::
Shorewall-1.4.2 NAT at - Wed Dec 10 16:32:50 UTC 2003
Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
Chain POSTROUTING (policy ACCEPT 1 packets, 60 bytes)
pkts bytes target prot opt in out source
destination
0 0 eth0_masq all -- * eth0
0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 1 packets, 60 bytes)
pkts bytes target prot opt in out source
destination
Chain eth0_masq (1 references)
pkts bytes target prot opt in out source
destination
0 0 MASQUERADE all -- * *
192.168.1.0/24 0.0.0.0/0
::General System Info::
Uptime: 4:53pm up 23 min, load average: 0.01, 0.00,
0.00
Kernel:Linux firewall 2.4.20 #1 Sun May 11 18:53:34
CEST 2003 i586 unknown
Modules:
ip_nat_irc 2176 0 (unused)
ip_nat_ftp 2784 0 (unused)
ip_conntrack_irc 2880 1
ip_conntrack_ftp 3648 1
8139too 14100 1
mii 2092 0 [8139too]
::Installed Packages::
Name Version Description
===============-==============-==============================================
initrd V1.2 LEAF Bering initial
filesystem
root V1.2 Core LEAF Bering
package
etc V1.2 LEAF Bering /etc files
local V1.2 LEAF Bering local
package
modules V1.2 Define & contain your
LEAF Bering modules
iptables 1.2.8 IP packet filter
administration tools for 2.4.
pump 0.8.14-2 DHCP/BOOTP client from
Redhat
keyboard 0.3 Define your keyboard
settings
shorwall 1.4.2 Shoreline Firewall
(Shorewall)
ulogd 1.0 The Netfilter Userspace
Logging Daemon
dnscache 1.05a A fast & secure proxy
DNS server
weblet 1.2.0 LEAF status via a small
web server
::CPU Info::
processor : 0
vendor_id : GenuineIntel
cpu family : 5
model : 2
model name : Pentium 75 - 200
stepping : 12
cpu MHz : 119.752
fdiv_bug : no
hlt_bug : no
f00f_bug : yes
coma_bug : no
fpu : yes
fpu_exception : yes
cpuid level : 1
wp : yes
flags : fpu vme de pse tsc msr mce cx8
bogomips : 238.38
::Running Processes::
PID Uid VmSize Stat Command
1 root 764 S init [2]
2 root S [keventd]
3 root S [ksoftirqd_CPU0]
4 root S [kswapd]
5 root S [bdflush]
6 root S [kupdated]
13716 root 816 S /sbin/syslogd -m 240
8149 root 828 S /sbin/klogd
16349 root 916 S pump -i eth0
19142 root S [eth1]
27565 root 720 S /usr/sbin/watchdog
2421 root 776 S /usr/sbin/inetd
19626 root 860 S /usr/sbin/ulogd -d
19173 dnscache 2048 S [dnscache]
26468 root 812 S /usr/sbin/cron
5887 root 840 S -sh
22777 root 952 S /sbin/getty 38400 tty2
8939 root 840 S /bin/sh /usr/sbin/lrcfg
9150 sh-httpd 856 S /bin/sh /usr/sbin/sh-httpd
26182 sh-httpd 836 S /bin/sh
/var/sh-www/cgi-bin/viewsys
32746 sh-httpd 892 S sleep 1
29140 sh-httpd 900 S cat
27692 sh-httpd 836 S /bin/sh
/var/sh-www/cgi-bin/viewsys
26569 sh-httpd 936 R ps aux
::shorewall.log::
empty
::messages::
Dec 10 16:32:10 firewall syslogd 1.3-3#31.slink1:
restart.
Dec 10 16:32:10 firewall kernel: klogd
1.3-3#31.slink1, log source = /proc/kmsg started.
Dec 10 16:32:10 firewall kernel: No module symbols
loaded.
Dec 10 16:32:10 firewall kernel: BIOS-provided
physical RAM map:
Dec 10 16:32:10 firewall kernel: 32MB LOWMEM
available.
Dec 10 16:32:10 firewall kernel: Initializing CPU#0
Dec 10 16:32:10 firewall kernel: Memory: 30128k/32768k
available (948k kernel code, 2252k reserved, -1176k
data, 64k init, 0k highmem)
Dec 10 16:32:10 firewall kernel: Dentry cache hash
table entries: 4096 (order: 3, 32768 bytes)
Dec 10 16:32:10 firewall kernel: Inode cache hash
table entries: 2048 (order: 2, 16384 bytes)
Dec 10 16:32:10 firewall kernel: Intel Pentium with F0
0F bug - workaround enabled.
Dec 10 16:32:10 firewall kernel: Checking 'hlt'
instruction... OK.
Dec 10 16:32:10 firewall kernel: PCI: PCI BIOS
revision 2.10 entry at 0xfd9f1, last bus=0
Dec 10 16:32:10 firewall kernel: PCI: Using
configuration type 1
Dec 10 16:32:10 firewall kernel: PCI: Probing PCI
hardware
Dec 10 16:32:10 firewall kernel: Limiting direct
PCI/PCI transfers.
Dec 10 16:32:10 firewall kernel: Activating ISA DMA
hang workarounds.
Dec 10 16:32:10 firewall kernel: Linux NET4.0 for
Linux 2.4
Dec 10 16:32:10 firewall kernel: Based upon Swansea
University Computer Society NET3.039
Dec 10 16:32:10 firewall kernel: Serial driver version
5.05c (2001-07-08) with MANY_PORTS SHARE_IRQ
DETECT_IRQ SERIAL_PCI enabled
Dec 10 16:32:10 firewall kernel: ttyS00 at 0x03f8 (irq
= 4) is a 16550A
Dec 10 16:32:10 firewall kernel: ttyS01 at 0x02f8 (irq
= 3) is a 16550A
Dec 10 16:32:10 firewall kernel: Real Time Clock
Driver v1.10e
Dec 10 16:32:10 firewall kernel: Software Watchdog
Timer: 0.05, timer margin: 60 sec
Dec 10 16:32:10 firewall kernel: Floppy drive(s): fd0
is 1.44M
Dec 10 16:32:10 firewall kernel: FDC 0 is a National
Semiconductor PC87306
Dec 10 16:32:10 firewall kernel: NET4: Linux TCP/IP
1.0 for NET4.0
Dec 10 16:32:10 firewall kernel: IP Protocols: ICMP,
UDP, TCP, IGMP
Dec 10 16:32:10 firewall kernel: IP: routing cache
hash table of 512 buckets, 4Kbytes
Dec 10 16:32:10 firewall kernel: TCP: Hash tables
configured (established 2048 bind 2048)
Dec 10 16:32:10 firewall kernel: NET4: Unix domain
sockets 1.0/SMP for Linux NET4.0.
Dec 10 16:32:10 firewall kernel: RAMDISK: Compressed
image found at block 0
Dec 10 16:32:10 firewall kernel: Freeing initrd
memory: 401k freed
Dec 10 16:32:10 firewall kernel: Freeing unused kernel
memory: 64k freed
Dec 10 16:32:11 firewall kernel: 8139too Fast Ethernet
driver 0.9.26
Dec 10 16:32:11 firewall kernel: eth0: RealTek RTL8139
Fast Ethernet at 0xc2813c00, 00:0b:2b:02:0d:6d, IRQ 11
Dec 10 16:32:11 firewall kernel: eth1: RealTek RTL8139
Fast Ethernet at 0xc2815800, 00:0b:2b:02:2a:43, IRQ 10
Dec 10 16:32:11 firewall kernel: eth2: RealTek RTL8139
Fast Ethernet at 0xc2817400, 00:0b:2b:02:2a:4d, IRQ 9
Dec 10 16:32:12 firewall kernel: eth0: Setting 100mbps
full-duplex based on auto-negotiated partner ability
41e1.
Dec 10 16:32:42 firewall kernel: eth1: Setting 100mbps
full-duplex based on auto-negotiated partner ability
45e1.
Dec 10 16:32:50 firewall root: Shorewall Started
::syslog::
Dec 10 16:32:10 firewall kernel: Cannot find map file.
Dec 10 16:32:10 firewall kernel: Linux version 2.4.20
([EMAIL PROTECTED]) (gcc version 2.95.4 20011002 (Debian
prerelease)) #1 Sun May 11 18:53:34 CEST 2003
Dec 10 16:32:10 firewall kernel: BIOS-e820:
0000000000000000 - 000000000009fc00 (usable)
Dec 10 16:32:10 firewall kernel: BIOS-e820:
0000000000100000 - 0000000002000000 (usable)
Dec 10 16:32:10 firewall kernel: BIOS-e820:
00000000fffc0000 - 0000000100000000 (reserved)
Dec 10 16:32:10 firewall kernel: On node 0 totalpages:
8192
Dec 10 16:32:10 firewall kernel: zone(0): 4096 pages.
Dec 10 16:32:10 firewall kernel: zone(1): 4096 pages.
Dec 10 16:32:10 firewall kernel: zone(2): 0 pages.
Dec 10 16:32:10 firewall kernel: Kernel command line:
BOOT_IMAGE=linux initrd=initrd.lrp init=/linuxrc rw
root=/dev/ram0 boot=/dev/fd0u1680:msdos
PKGPATH=/dev/fd0u1680
LRP=root,etc,local,modules,iptables,pump,keyboard,shorwall,ulogd,dnscache,weblet
Dec 10 16:32:10 firewall kernel: Detected 119.752 MHz
processor.
Dec 10 16:32:10 firewall kernel: Console: colour VGA+
80x25
Dec 10 16:32:10 firewall kernel: Calibrating delay
loop... 238.38 BogoMIPS
Dec 10 16:32:10 firewall kernel: Mount-cache hash
table entries: 512 (order: 0, 4096 bytes)
Dec 10 16:32:10 firewall kernel: Buffer-cache hash
table entries: 1024 (order: 0, 4096 bytes)
Dec 10 16:32:10 firewall kernel: Page-cache hash table
entries: 8192 (order: 3, 32768 bytes)
Dec 10 16:32:10 firewall kernel: CPU: Intel Pentium 75
- 200 stepping 0c
Dec 10 16:32:10 firewall kernel: POSIX conformance
testing by UNIFIX
Dec 10 16:32:10 firewall kernel: Initializing RT
netlink socket
Dec 10 16:32:10 firewall kernel: Starting kswapd
Dec 10 16:32:10 firewall kernel: pty: 256 Unix98 ptys
configured
Dec 10 16:32:10 firewall kernel: RAMDISK driver
initialized: 16 RAM disks of 4096K size 1024 blocksize
Dec 10 16:32:10 firewall kernel: ip_conntrack version
2.1 (256 buckets, 2048 max) - 320 bytes per conntrack
Dec 10 16:32:10 firewall kernel: ip_tables: (C)
2000-2002 Netfilter core team
Dec 10 16:32:10 firewall kernel: arp_tables: (C) 2002
David S. Miller
Dec 10 16:32:10 firewall kernel: VFS: Mounted root
(minix filesystem).
::debug::
Dec 10 16:32:10 firewall kernel: CPU: After generic,
caps: 000001bf 00000000 00000000 00000000
Dec 10 16:32:10 firewall kernel: CPU: Common caps:
000001bf 00000000 00000000 00000000
Dec 10 16:32:11 firewall kernel: eth0: Identified 8139
chip type 'RTL-8139C'
Dec 10 16:32:11 firewall kernel: eth1: Identified 8139
chip type 'RTL-8139C'
Dec 10 16:32:11 firewall kernel: eth2: Identified 8139
chip type 'RTL-8139C'
Dec 10 16:32:12 firewall pumpd[16349]: PUMP: sending
discover
Dec 10 16:32:12 firewall pumpd[16349]: breq: opcode: 1
Dec 10 16:32:12 firewall pumpd[16349]: breq: hw: 1
Dec 10 16:32:12 firewall pumpd[16349]: breq: hwlength:
6
Dec 10 16:32:12 firewall pumpd[16349]: breq: hopcount:
0
Dec 10 16:32:12 firewall pumpd[16349]: breq: xid:
0x022b6652
Dec 10 16:32:12 firewall pumpd[16349]: breq: secs: 0
Dec 10 16:32:12 firewall pumpd[16349]: breq: flags:
0x0000
Dec 10 16:32:12 firewall pumpd[16349]: breq: ciaddr:
0.0.0.0
Dec 10 16:32:12 firewall pumpd[16349]: breq: yiaddr:
0.0.0.0
Dec 10 16:32:12 firewall pumpd[16349]: breq:
server_ip: 0.0.0.0
Dec 10 16:32:12 firewall pumpd[16349]: breq:
bootp_gw_ip: 0.0.0.0
Dec 10 16:32:12 firewall pumpd[16349]: breq: hwaddr:
Dec 10 16:32:12 firewall pumpd[16349]: breq:
servername:
Dec 10 16:32:12 firewall pumpd[16349]: breq: bootfile:
Dec 10 16:32:12 firewall pumpd[16349]: breq: vendor:
0x63 0x82 0x53 0x63
Dec 10 16:32:12 firewall pumpd[16349]: breq: vendor:
53 1 0x01
Dec 10 16:32:12 firewall pumpd[16349]: breq: vendor:
0xff
::daemon.log::
Dec 10 16:32:12 firewall pumpd[16349]: starting at
(uptime 0 days, 0:01:35) Wed Dec 10 16:32:12 2003
Dec 10 16:32:12 firewall pumpd[16349]: PUMP: sending
discover
Dec 10 16:32:12 firewall pumpd[16349]: breq: opcode: 1
Dec 10 16:32:12 firewall pumpd[16349]: breq: hw: 1
Dec 10 16:32:12 firewall pumpd[16349]: breq: hwlength:
6
Dec 10 16:32:12 firewall pumpd[16349]: breq: hopcount:
0
Dec 10 16:32:12 firewall pumpd[16349]: breq: xid:
0x022b6652
Dec 10 16:32:12 firewall pumpd[16349]: breq: secs: 0
Dec 10 16:32:12 firewall pumpd[16349]: breq: flags:
0x0000
Dec 10 16:32:12 firewall pumpd[16349]: breq: ciaddr:
0.0.0.0
Dec 10 16:32:12 firewall pumpd[16349]: breq: yiaddr:
0.0.0.0
Dec 10 16:32:12 firewall pumpd[16349]: breq:
server_ip: 0.0.0.0
Dec 10 16:32:12 firewall pumpd[16349]: breq:
bootp_gw_ip: 0.0.0.0
Dec 10 16:32:12 firewall pumpd[16349]: breq: hwaddr:
Dec 10 16:32:12 firewall pumpd[16349]: breq:
servername:
Dec 10 16:32:12 firewall pumpd[16349]: breq: bootfile:
Dec 10 16:32:12 firewall pumpd[16349]: breq: vendor:
0x63 0x82 0x53 0x63
Dec 10 16:32:12 firewall pumpd[16349]: breq: vendor:
53 1 0x01
Dec 10 16:32:12 firewall pumpd[16349]: breq: vendor:
0xff
Dec 10 16:32:43 firewall init: Entering runlevel: 2
Dec 10 16:33:05 firewall sh-httpd[12221]: connect from
192.168.1.8
Dec 10 16:33:05 firewall sh-httpd[31464]: connect from
192.168.1.8
Dec 10 16:33:05 firewall sh-httpd[7827]: connect from
192.168.1.8
Dec 10 16:33:05 firewall sh-httpd[8349]: connect from
192.168.1.8
Dec 10 16:50:10 firewall sh-httpd[18836]: connect from
192.168.1.8
Dec 10 16:50:20 firewall sh-httpd[8999]: connect from
192.168.1.8
Dec 10 16:50:27 firewall sh-httpd[22964]: connect from
192.168.1.8
Dec 10 16:50:27 firewall sh-httpd[20626]: connect from
192.168.1.8
Dec 10 16:50:32 firewall sh-httpd[12333]: connect from
192.168.1.8
Dec 10 16:50:38 firewall sh-httpd[20849]: connect from
192.168.1.8
Dec 10 16:52:06 firewall sh-httpd[29249]: connect from
192.168.1.8
Dec 10 16:53:44 firewall sh-httpd[9150]: connect from
192.168.1.8
Dec 10 16:54:49 firewall sh-httpd[5423]: connect from
192.168.1.8
Dec 10 16:54:59 firewall sh-httpd[13646]: connect from
192.168.1.8
Dec 10 16:55:18 firewall sh-httpd[6800]: connect from
192.168.1.8
Dec 10 16:55:46 firewall sh-httpd[5983]: connect from
192.168.1.8
Dec 10 16:56:07 firewall sh-httpd[23340]: connect from
192.168.1.8
Dec 10 16:56:11 firewall sh-httpd[17831]: connect from
192.168.1.8
Dec 10 16:56:30 firewall sh-httpd[23734]: connect from
192.168.1.8
::cron.log::
Dec 10 16:32:50 firewall /usr/sbin/cron[27148]: (CRON)
INFO (pidfile fd = 3)
Dec 10 16:32:50 firewall /usr/sbin/cron[26468]: (CRON)
STARTUP (fork ok)
Dec 10 16:45:01 firewall
Yahoo! Mail (http://dk.mail.yahoo.com) - Gratis: 6 MB lagerplads, spamfilter og
virusscan
-------------------------------------------------------
This SF.net email is sponsored by: IBM Linux Tutorials.
Become an expert in LINUX or just sharpen your skills. Sign up for IBM's
Free Linux Tutorials. Learn everything from the bash shell to sys admin.
Click now! http://ads.osdn.com/?ad_id=1278&alloc_id=3371&op=click
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html