--- Ray Olszewski <[EMAIL PROTECTED]> wrote:
> At 12:34 PM 12/29/2003 -0800, Michael Rogers wrote:
> >I know this is probably simple and trivial, but I
> >can't get it to work for the life of me...
> >
> >I use Dachstein-1.0.2 as a firewall for my windows
> >machines behind my t-1.  The only thing they do is
> >browse the internet and I ssh to my external
> servers,
> >play some games at times.. normal stuff.  There are
> no
> >servers behind the firewall that need to be opened
> to
> >the outside world.
> >
> >My problem is I got a ps/2, with Socom-II and a
> >Mic/Headset, got the ps2 online behind the firewall
> >with no problems (I use static IP's for all my
> >machines).  But I can't get the mic/headset to work
> >online... it works in single player mode and online
> at
> >my cousins house behind a linksys router, so I know
> >the mic/headset is good.
> >
> >I've tried numerous times/diffirent options to
> opening
> >up these ports for/to my ps/2 & mic to work but
> with
> >no luck.  Reading up, I believe the ports I need to
> >open are:  tcp-10070 through 10080 and udp
> 6000-6999
> >and udp 10070.
> >
> >Can anyone help me out with a simple way to open
> these
> >up for my ps/2...  my config IP's:
> >Dachstein system: 192.168.1.254
> >PS/2:  192.168.1.199
> 
> It would be easier to help if you provided the
> standard disgnostics for 
> your system (see the SR FAQ). Without them, I'll
> offer a guess -- firewalls 
> of the vintage of Dach often blocked access to
> remote ports around 6000, 
> due to a well-known security hole involving remote X
> Window connections. My 
> *guess* is that the version of Dach you are using --
> or the drop-in 
> firewall, if you are using EchoWall or Seawall --
> includes that limitation, 
> and that's what is biting you. If so, there is some
> entry in 
> /etc/network.conf, or a related file -- or the
> config file for the drop-in 
> firewall -- that puts a DENY rule for these ports
> into one of the chains 
> (proably OUTPUT).
> 
> Also, the phrase "open up" is meaningless in this
> context. Do you merely 
> mean that the firewall has to ACCEPT traffic to and
> from these ports, or 
> that it has to port-forward it to a specific IP
> address, or that it needs 
> some sort of special helper module (like ftp does),
> or what? Did your 
> cousin need to do anything special with the Linksys,
> for example ... that 
> would give a good hint of what the Dach firewall
> needs to be told.
> 
> 
> 
Ok, sorry about that, I should have read that SR Faq
first, anyway I built this years ago, so don't exactly
remember what was all in it.  I uploaded the disk
image I used at:
http://www.tristateweb.com/dachstein-v1.0.2-1680.exe

If anyone wanted to get it to check.  Also (this may
do the trick) here is some of the standard diagnostic
as in the FAQ:

uname -a:  Linux firewall 2.2.19-3-LEAF #1 Sat Dec 1
12:15:05 CST 2001 i386 unknown

lsmod:  ones Im using are:  ip_masq_portfw,
ip_masq_mfw, ip_masq_ftp, ip_masq_autofw, ne2k-pci,
8390, pci-scan

ipchains -nvL: produced way to much to retype here,
but from the web interface/firewall rules I get:
Chain input (policy DENY: 0 packets, 0 bytes):
 pkts bytes target     prot opt    tosa tosx  ifname  
  mark       outsize  source               
destination           ports
    0     0 DENY       icmp ----l- 0xFF 0x00  *       
                      0.0.0.0/0            0.0.0.0/0  
          5 ->   *
    0     0 DENY       icmp ----l- 0xFF 0x00  *       
                      0.0.0.0/0            0.0.0.0/0  
          13 ->   *
    0     0 DENY       icmp ----l- 0xFF 0x00  *       
                      0.0.0.0/0            0.0.0.0/0  
          14 ->   *
    0     0 DENY       all  ----l- 0xFF 0x00  eth0    
                      0.0.0.0              0.0.0.0/0  
          n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0    
                      255.255.255.255      0.0.0.0/0  
          n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0    
                      127.0.0.0/8          0.0.0.0/0  
          n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0    
                      224.0.0.0/4          0.0.0.0/0  
          n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0    
                      10.0.0.0/8           0.0.0.0/0  
          n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0    
                      172.16.0.0/12        0.0.0.0/0  
          n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0    
                      192.168.0.0/16       0.0.0.0/0  
          n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0    
                      0.0.0.0/8            0.0.0.0/0  
          n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0    
                      128.0.0.0/16         0.0.0.0/0  
          n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0    
                      191.255.0.0/16       0.0.0.0/0  
          n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0    
                      192.0.0.0/24         0.0.0.0/0  
          n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0    
                      223.255.255.0/24     0.0.0.0/0  
          n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0    
                      240.0.0.0/4          0.0.0.0/0  
          n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0    
                      192.168.1.0/24       0.0.0.0/0  
          n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0    
                      24.123.69.206        0.0.0.0/0  
          n/a
    0     0 REJECT     all  ----l- 0xFF 0x00  eth0    
                      0.0.0.0/0            127.0.0.0/8
          n/a
    0     0 REJECT     all  ----l- 0xFF 0x00  eth0    
                      0.0.0.0/0           
192.168.1.0/24        n/a
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   137
 2944  143K REJECT     tcp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   135
  486 37908 REJECT     udp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   137
    3  1704 REJECT     udp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   135
   22  1184 REJECT     tcp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   138:139
  193 44971 REJECT     udp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   138
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          137:138 ->   *
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          135 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          137:139 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          135 ->   *
    0     0 ACCEPT     tcp  ------ 0xFF 0x00  eth0    
                      24.123.69.128/25     0.0.0.0/0  
          * ->   22
   48  3603 ACCEPT     tcp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   80
    0     0 ACCEPT     tcp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   1023
    0     0 ACCEPT     tcp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   10070
    0     0 ACCEPT     tcp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   10071
    0     0 ACCEPT     tcp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   10072
    0     0 ACCEPT     tcp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   10073
    0     0 ACCEPT     tcp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   10074
    0     0 ACCEPT     tcp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   10075
    0     0 ACCEPT     tcp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   10076
    0     0 ACCEPT     tcp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   10077
    0     0 ACCEPT     tcp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   10078
    0     0 ACCEPT     tcp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   10079
    0     0 ACCEPT     tcp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   10080
  171 10260 REJECT     tcp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   113
 218K   81M ACCEPT     tcp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   1024:65535
    0     0 REJECT     udp  ----l- 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   161:162
    0     0 ACCEPT     udp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   53
    0     0 ACCEPT     udp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   68
    2   470 ACCEPT     udp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   6000:6999
    0     0 ACCEPT     udp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   10070:10080
    0     0 DENY       udp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   67
48487 6520K ACCEPT     udp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   1024:65535
 2142  193K ACCEPT     icmp ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   *
    0     0 ACCEPT     ospf ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          n/a
   86  4200 DENY       all  ----l- 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          n/a
    0     0 REJECT     udp  ----l- 0xFF 0x00  *       
                      0.0.0.0/0            0.0.0.0/0  
          * ->   161:162
    0     0 REJECT     udp  ----l- 0xFF 0x00  *       
                      0.0.0.0/0            0.0.0.0/0  
          161:162 ->   *
 245K   19M ACCEPT     all  ------ 0xFF 0x00  *       
                      0.0.0.0/0            0.0.0.0/0  
          n/a
Chain forward (policy DENY: 0 packets, 0 bytes):
 pkts bytes target     prot opt    tosa tosx  ifname  
  mark       outsize  source               
destination           ports
    0     0 DENY       icmp ----l- 0xFF 0x00  *       
                      0.0.0.0/0            0.0.0.0/0  
          5 ->   *
    0     0 MASQ       tcp  ------ 0xFF 0x00  *       
                      192.168.1.199        0.0.0.0/0  
          10070 ->   *
    0     0 MASQ       tcp  ------ 0xFF 0x00  *       
                      192.168.1.199        0.0.0.0/0  
          10071 ->   *
    0     0 MASQ       tcp  ------ 0xFF 0x00  *       
                      192.168.1.199        0.0.0.0/0  
          10072 ->   *
    0     0 MASQ       tcp  ------ 0xFF 0x00  *       
                      192.168.1.199        0.0.0.0/0  
          10073 ->   *
    0     0 MASQ       tcp  ------ 0xFF 0x00  *       
                      192.168.1.199        0.0.0.0/0  
          10074 ->   *
    0     0 MASQ       tcp  ------ 0xFF 0x00  *       
                      192.168.1.199        0.0.0.0/0  
          10075 ->   *
    0     0 MASQ       tcp  ------ 0xFF 0x00  *       
                      192.168.1.199        0.0.0.0/0  
          10075 ->   *
    0     0 MASQ       tcp  ------ 0xFF 0x00  *       
                      192.168.1.199        0.0.0.0/0  
          10077 ->   *
    0     0 MASQ       tcp  ------ 0xFF 0x00  *       
                      192.168.1.199        0.0.0.0/0  
          10078 ->   *
    0     0 MASQ       tcp  ------ 0xFF 0x00  *       
                      192.168.1.199        0.0.0.0/0  
          10079 ->   *
    0     0 MASQ       tcp  ------ 0xFF 0x00  *       
                      192.168.1.199        0.0.0.0/0  
          10080 ->   *
    0     0 MASQ       udp  ------ 0xFF 0x00  *       
                      192.168.1.199        0.0.0.0/0  
          10070 ->   *
 237K   18M MASQ       all  ------ 0xFF 0x00  eth0    
                      192.168.1.0/24       0.0.0.0/0  
          n/a
    0     0 DENY       all  ------ 0xFF 0x00  *       
                      0.0.0.0/0            0.0.0.0/0  
          n/a
Chain output (policy DENY: 0 packets, 0 bytes):
 pkts bytes target     prot opt    tosa tosx  ifname  
  mark       outsize  source               
destination           ports
 510K  107M fairq      all  ------ 0xFF 0x00  *       
                      0.0.0.0/0            0.0.0.0/0  
          n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0    
                      0.0.0.0              0.0.0.0/0  
          n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0    
                      255.255.255.255      0.0.0.0/0  
          n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0    
                      127.0.0.0/8          0.0.0.0/0  
          n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0    
                      224.0.0.0/4          0.0.0.0/0  
          n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0    
                      10.0.0.0/8           0.0.0.0/0  
          n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0    
                      172.16.0.0/12        0.0.0.0/0  
          n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0    
                      192.168.0.0/16       0.0.0.0/0  
          n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0    
                      0.0.0.0/8            0.0.0.0/0  
          n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0    
                      128.0.0.0/16         0.0.0.0/0  
          n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0    
                      191.255.0.0/16       0.0.0.0/0  
          n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0    
                      192.0.0.0/24         0.0.0.0/0  
          n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0    
                      223.255.255.0/24     0.0.0.0/0  
          n/a
    0     0 DENY       all  ----l- 0xFF 0x00  eth0    
                      240.0.0.0/4          0.0.0.0/0  
          n/a
    0     0 DENY       all  ------ 0xFF 0x00  eth0    
                      192.168.1.0/24       0.0.0.0/0  
          n/a
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   137
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   135
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   137
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   135
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   138:139
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          * ->   138
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          137:138 ->   *
    0     0 REJECT     udp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          135 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          137:139 ->   *
    0     0 REJECT     tcp  ------ 0xFF 0x00  eth0    
                      0.0.0.0/0            0.0.0.0/0  
          135 ->   *
 510K  107M ACCEPT     all  ------ 0xFF 0x00  *       
                      0.0.0.0/0            0.0.0.0/0  
          n/a
Chain fairq (1 references):
 pkts bytes target     prot opt    tosa tosx  ifname  
  mark       outsize  source               
destination           ports
    0     0 RETURN     ospf ------ 0xFF 0x00  *       
  0x1                   0.0.0.0/0            0.0.0.0/0
            n/a
    0     0 RETURN     ospf ------ 0xFF 0x00  *       
  0x1                   0.0.0.0/0            0.0.0.0/0
            n/a
    0     0 RETURN     udp  ------ 0xFF 0x00  *       
  0x1                   0.0.0.0/0            0.0.0.0/0
            * ->   520
    0     0 RETURN     udp  ------ 0xFF 0x00  *       
  0x1                   0.0.0.0/0            0.0.0.0/0
            520 ->   *
    0     0 RETURN     tcp  ------ 0xFF 0x00  *       
  0x1                   0.0.0.0/0            0.0.0.0/0
            * ->   179
    0     0 RETURN     tcp  ------ 0xFF 0x00  *       
  0x1                   0.0.0.0/0            0.0.0.0/0
            179 ->   *
    0     0 RETURN     tcp  ------ 0xFF 0x00  *       
  0x1                   0.0.0.0/0            0.0.0.0/0
            * ->   53
    0     0 RETURN     tcp  ------ 0xFF 0x00  *       
  0x1                   0.0.0.0/0            0.0.0.0/0
            53 ->   *
44942 3356K RETURN     udp  ------ 0xFF 0x00  *       
  0x1                   0.0.0.0/0            0.0.0.0/0
            * ->   53
42327 6054K RETURN     udp  ------ 0xFF 0x00  *       
  0x1                   0.0.0.0/0            0.0.0.0/0
            53 ->   *
 4646  404K RETURN     tcp  ------ 0xFF 0x00  *       
  0x2                   0.0.0.0/0            0.0.0.0/0
            * ->   23
 4622  451K RETURN     tcp  ------ 0xFF 0x00  *       
  0x2                   0.0.0.0/0            0.0.0.0/0
            23 ->   *
  521 25117 RETURN     tcp  ------ 0xFF 0x00  *       
  0x2                   0.0.0.0/0            0.0.0.0/0
            * ->   22
  459 54421 RETURN     tcp  ------ 0xFF 0x00  *       
  0x2                   0.0.0.0/0            0.0.0.0/0
            22 ->   *

 
 

:: Port FW :: 
prot localaddr            rediraddr              
lport    rport  pcnt  pref
UDP  24.123.69.206        192.168.1.199          
10070    10070    10    10
UDP  24.123.69.206        192.168.1.199           
6000     6000    10    10
TCP  24.123.69.206        192.168.1.199          
10080    10080    10    10
TCP  24.123.69.206        192.168.1.199          
10079    10079    10    10
TCP  24.123.69.206        192.168.1.199          
10078    10078    10    10
TCP  24.123.69.206        192.168.1.199          
10077    10077    10    10
TCP  24.123.69.206        192.168.1.199          
10076    10075    10    10
TCP  24.123.69.206        192.168.1.199          
10075    10075    10    10
TCP  24.123.69.206        192.168.1.199          
10074    10074    10    10
TCP  24.123.69.206        192.168.1.199          
10073    10073    10    10
TCP  24.123.69.206        192.168.1.199          
10072    10072    10    10
TCP  24.123.69.206        192.168.1.199          
10071    10071    10    10
TCP  24.123.69.206        192.168.1.199          
10070    10070    10    10

 
 

:: MarkFW :: 
fwmark   rediraddr               rport  pcnt  pref

 
 

:: AutoFW :: 
Type Prot Low  High Vis  Hid  Where    Last     CPto
CPrt Timer Flags
   1    6 2756-2760/0000 0000 C0A801C7 00000000 0000
0000      0    2
   1   11 2756-2760/0000 0000 C0A801C7 00000000 0000
0000      0    2
   1   11 1770-1B57/0000 0000 C0A801C7 00000000 0000
0000      0    2


As far as wether or not these have to be forwarded or
not I'm not 100% sure.  My cousin didn't do anything
to the linksys, it worked out of the box, and it
worked when we had both ps/2's hooked into it.  This
sounds like it only needs to accept the traffic
in/out???  Either way maybe you could give me examples
of both.  Obviously this isn't a huge priority and I
certainly appreciate any help!!!

Michael Rogers


__________________________________
Do you Yahoo!?
New Yahoo! Photos - easier uploading and sharing.
http://photos.yahoo.com/


-------------------------------------------------------
This SF.net email is sponsored by: IBM Linux Tutorials.
Become an expert in LINUX or just sharpen your skills.  Sign up for IBM's
Free Linux Tutorials.  Learn everything from the bash shell to sys admin.
Click now! http://ads.osdn.com/?ad_id=1278&alloc_id=3371&op=click
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to