Hello Ray,

I don't think eth1 "is supposed to be plugged" in the uplink port. Most
hubs have an "uplink" port that is used to connect multiple hubs with
eachother. You could try with a crosslink UTP cable, but I would suggest
to just use one of the "other" ports for eth1 and connect the clients to
the remaining ports.

The output of the various logs look ok to me, the interfaces are brought
up and have an ip-address.

Eric


> Hello,
> right now im just trying to get a a simple setup going, then build on that.
> I have my 2 network cards in there, the drivers are loaded
> successfully, and i was able to verify they both worked.  I did this by
> trying them both out as eth0, and I was able to successly ping the
> firewall from another computer as well as ping from the firewall to an
> outside location with each network card.  now the problem that I am having
> is that for some reason my internal network card, eth1, is not sending out
> any traffic like it is supposed to be.  to be more specific no traffic is
> being sent at all. I have a hub setup and this is what im experiencing
> with that.
>
> 1.  When i plug eth1 into the uplink port like it is supposed to be, the
> port light is off and there is no traffic on that port.  all network card
> lights are off.
>
> 2.  When i plug eth1 into any of the other ports that the receving
> computers are suppoed to plug into, the port lights up and the lights on
> the network card itself start flashing like there is traffic going on.
>
> it almost seems as if eth1 is acting like a reciever, instead of
> distributing IP's like it is supposed to.  can anyone please help me out
> with this problem.  ive spent the past few days on this and i really need
> to get this figured out.  I will post the output to some commands below.
>
> Thanks
> -Ray
>
>
>
> UNAME
> Linux firewall 2.4.20 #1 Sun May 11 18:53:34 CEST 2003 i686 unknown
>
>
> ADDR SHOW
> 1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
> link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 brd
> 127.255.255.255 scope host lo
> 2: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop
> link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 3: eth0:
> <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
> link/ether 00:10:5a:18:ff:c3 brd ff:ff:ff:ff:ff:ff inet 138.23.75.45/24 brd
> 138.23.75.255 scope global eth0
> 4: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
> link/ether 00:a0:cc:67:d6:2d brd ff:ff:ff:ff:ff:ff inet 192.168.1.1/24 brd
> 192.168.1.255 scope global eth1
>
>
> SHOW ROUTE
> 192.168.1.0/24 dev eth1  proto kernel  scope link  src 192.168.1.1
> 138.23.75.0/24 dev eth0  proto kernel  scope link  src 138.23.75.45
> default via 138.23.75.1 dev eth0
>
> MESSAGE LOG
> Feb  7 11:51:09 firewall syslogd 1.3-3#31.slink1: restart.
> Feb  7 11:51:09 firewall kernel: klogd 1.3-3#31.slink1, log source =
> /proc/kmsg started.
> Feb  7 11:51:09 firewall kernel: No module symbols loaded.
> Feb  7 11:51:09 firewall kernel: BIOS-provided physical RAM map:
> Feb  7 11:51:09 firewall kernel: 128MB LOWMEM available.
> Feb  7 11:51:09 firewall kernel: Initializing CPU#0
> Feb  7 11:51:09 firewall kernel: Memory: 127360k/131072k available (948k
> kernel code, 3312k reserved, -1176k data, 64k init, 0k highmem) Feb  7
> 11:51:09 firewall kernel: Dentry cache hash table entries: 16384
> (order: 5, 131072 bytes)
> Feb  7 11:51:09 firewall kernel: Inode cache hash table entries: 8192
> (order: 4, 65536 bytes)
> Feb  7 11:51:09 firewall kernel: CPU: L1 I cache: 16K, L1 D cache: 16K
> Feb  7 11:51:09 firewall kernel: CPU: L2 cache: 512K
> Feb  7 11:51:09 firewall kernel: Enabling fast FPU save and restore...
> done. Feb  7 11:51:09 firewall kernel: Checking 'hlt' instruction... OK.
> Feb  7 11:51:09 firewall kernel: PCI: PCI BIOS revision 2.10 entry at
> 0xfd9a3, last bus=1
> Feb  7 11:51:09 firewall kernel: PCI: Using configuration type 1
> Feb  7 11:51:09 firewall kernel: PCI: Probing PCI hardware
> Feb  7 11:51:09 firewall kernel: PCI: Using IRQ router PIIX [8086/7110]
> at 00:07.0 Feb  7 11:51:09 firewall kernel: Limiting direct PCI/PCI
> transfers. Feb  7 11:51:09 firewall kernel: Linux NET4.0 for Linux 2.4
> Feb  7 11:51:09 firewall kernel: Based upon Swansea University Computer
> Society NET3.039
> Feb  7 11:51:09 firewall kernel: Serial driver version 5.05c
> (2001-07-08) with MANY_PORTS SHARE_IRQ DETECT_IRQ SERIAL_PCI enabled
> Feb  7 11:51:09 firewall kernel: ttyS00 at 0x03f8 (irq = 4) is a 16550A
> Feb  7 11:51:09 firewall kernel: ttyS01 at 0x02f8 (irq = 3) is a 16550A
> Feb  7 11:51:09 firewall kernel: Real Time Clock Driver v1.10e
> Feb  7 11:51:09 firewall kernel: Software Watchdog Timer: 0.05, timer
> margin: 60 sec
> Feb  7 11:51:09 firewall kernel: Floppy drive(s): fd0 is 1.44M
> Feb  7 11:51:09 firewall kernel: FDC 0 is a post-1991 82077
> Feb  7 11:51:09 firewall kernel: NET4: Linux TCP/IP 1.0 for NET4.0
> Feb  7 11:51:09 firewall kernel: IP Protocols: ICMP, UDP, TCP, IGMP
> Feb  7 11:51:09 firewall kernel: IP: routing cache hash table of 1024
> buckets, 8Kbytes Feb  7 11:51:09 firewall kernel: TCP: Hash tables
> configured (established 8192 bind 8192)
> Feb  7 11:51:09 firewall kernel: NET4: Unix domain sockets 1.0/SMP for
> Linux NET4.0.
> Feb  7 11:51:09 firewall kernel: RAMDISK: Compressed image found at block
> 0
> Feb  7 11:51:09 firewall kernel: Freeing initrd memory: 401k freed
> Feb  7 11:51:09 firewall kernel: Freeing unused kernel memory: 64k freed
> Feb  7 11:51:09 firewall kernel: pci-scan.c:v1.11 8/31/2002  Donald
> Becker <[EMAIL PROTECTED]> http://www.scyld.com/linux/drivers.html
> Feb  7 11:51:09 firewall kernel: 3c59x.c:v0.99Xf 11/17/2002 Donald
> Becker, [EMAIL PROTECTED]
> Feb  7 11:51:09 firewall kernel:
> http://www.scyld.com/network/vortex.html
> Feb  7 11:51:09 firewall kernel: eth0: 3Com 3c905B Cyclone 100baseTx at
> 0x1400,  00:10:5a:18:ff:c3, IRQ 9
> Feb  7 11:51:09 firewall kernel:   8K buffer 5:3 Rx:Tx split,
> autoselect/Autonegotiate interface. Feb  7 11:51:09 firewall kernel:   MII
> transceiver found at address 24, status 786d. Feb  7 11:51:09 firewall
> kernel:   MII transceiver found at address 0,
> status 786d. Feb  7 11:51:09 firewall kernel:   Using bus-master transmits
> and whole-frame receives. Feb  7 11:51:09 firewall kernel: tulip.c:v0.95f
> 11/17/2002  Written by
> Donald Becker <[EMAIL PROTECTED]>
> Feb  7 11:51:09 firewall kernel:   http://www.scyld.com/network/tulip.html
>  Feb  7 11:51:09 firewall kernel: eth1: Lite-On LC82C115 PNIC-II rev 37
> at 0xc8823400, 00:A0:CC:67:D6:2D, IRQ 9. Feb  7 11:51:13 firewall root:
> Shorewall Started
> Feb  7 11:53:38 firewall root: Shorewall Restarted
> Feb  7 11:56:32 firewall root: Shorewall Restarted
> Feb  7 11:56:49 firewall root: Shorewall Restarted
> Feb  7 12:01:32 firewall root: Shorewall Restarted
>
>
> IP tables (Masquerade)
> Chain PREROUTING (policy ACCEPT 2474 packets, 279K bytes)
> pkts bytes target     prot opt in     out     source destination
>
> Chain POSTROUTING (policy ACCEPT 35 packets, 2500 bytes)
> pkts bytes target     prot opt in     out     source destination 10   752
> eth0_masq  all  --  *      eth0    0.0.0.0/0 0.0.0.0/0
>
>
> Chain OUTPUT (policy ACCEPT 192 packets, 11920 bytes)
> pkts bytes target     prot opt in     out     source destination
>
> Chain eth0_masq (1 references)
> pkts bytes target     prot opt in     out     source destination 0     0
> MASQUERADE  all  --  *      *       192.168.1.0/24
> 0.0.0.0/0
>
>
>
> SHOREWALL STATUS
> Shorewall-1.4.2 Status at firewall - Tue Feb  7 12:15:09 UTC 2006
>
>
> Counters reset Tue Feb  7 12:01:32 UTC 2006
>
>
> Chain INPUT (policy DROP 0 packets, 0 bytes)
> pkts bytes target     prot opt in     out     source destination 0     0
> DROP      !icmp --  *      *       0.0.0.0/0
> 0.0.0.0/0          state INVALID
> 4   336 ACCEPT     all  --  lo     *       0.0.0.0/0
> 0.0.0.0/0
> 37  5033 eth0_in    all  --  eth0   *       0.0.0.0/0
> 0.0.0.0/0
> 0     0 eth1_in    all  --  eth1   *       0.0.0.0/0 0.0.0.0/0
> 0     0 common     all  --  *      *       0.0.0.0/0 0.0.0.0/0
> 0     0 ULOG       all  --  *      *       0.0.0.0/0 0.0.0.0/0
> ULOG copy_range 0 nlgroup 1 prefix
> `Shorewall:INPUT:REJECT:' queue_threshold 1
> 0     0 reject     all  --  *      *       0.0.0.0/0 0.0.0.0/0
>
>
> Chain FORWARD (policy DROP 0 packets, 0 bytes)
> pkts bytes target     prot opt in     out     source destination 0     0
> DROP      !icmp --  *      *       0.0.0.0/0
> 0.0.0.0/0          state INVALID
> 0     0 eth0_fwd   all  --  eth0   *       0.0.0.0/0 0.0.0.0/0
> 0     0 eth1_fwd   all  --  eth1   *       0.0.0.0/0 0.0.0.0/0
> 0     0 common     all  --  *      *       0.0.0.0/0 0.0.0.0/0
> 0     0 ULOG       all  --  *      *       0.0.0.0/0 0.0.0.0/0
> ULOG copy_range 0 nlgroup 1 prefix
> `Shorewall:FORWARD:REJECT:' queue_threshold 1
> 0     0 reject     all  --  *      *       0.0.0.0/0 0.0.0.0/0
>
>
> Chain OUTPUT (policy DROP 0 packets, 0 bytes)
> pkts bytes target     prot opt in     out     source destination 0     0
> DROP      !icmp --  *      *       0.0.0.0/0
> 0.0.0.0/0          state INVALID
> 4   336 ACCEPT     all  --  *      lo      0.0.0.0/0
> 0.0.0.0/0
> 10   752 fw2net     all  --  *      eth0    0.0.0.0/0
> 0.0.0.0/0
> 0     0 fw2loc     all  --  *      eth1    0.0.0.0/0 0.0.0.0/0
> 0     0 common     all  --  *      *       0.0.0.0/0 0.0.0.0/0
> 0     0 ULOG       all  --  *      *       0.0.0.0/0 0.0.0.0/0
> ULOG copy_range 0 nlgroup 1 prefix
> `Shorewall:OUTPUT:REJECT:' queue_threshold 1
> 0     0 reject     all  --  *      *       0.0.0.0/0 0.0.0.0/0
>
>
> Chain all2all (3 references)
> pkts bytes target     prot opt in     out     source destination 0     0
> ACCEPT     all  --  *      *       0.0.0.0/0
> 0.0.0.0/0          state RELATED,ESTABLISHED
> 0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0 0.0.0.0/0
> state NEW tcp flags:!0x16/0x02 0     0 common     all  --  *      *
> 0.0.0.0/0
> 0.0.0.0/0
> 0     0 ULOG       all  --  *      *       0.0.0.0/0 0.0.0.0/0
> ULOG copy_range 0 nlgroup 1 prefix
> `Shorewall:all2all:REJECT:' queue_threshold 1
> 0     0 reject     all  --  *      *       0.0.0.0/0 0.0.0.0/0
>
>
> Chain common (5 references)
> pkts bytes target     prot opt in     out     source destination 0     0
> icmpdef    icmp --  *      *       0.0.0.0/0 0.0.0.0/0
> 18  1883 reject     udp  --  *      *       0.0.0.0/0
> 0.0.0.0/0          udp dpts:137:139
> 0     0 reject     udp  --  *      *       0.0.0.0/0 0.0.0.0/0          udp
> dpt:445
> 0     0 reject     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0          tcp
> dpt:139
> 0     0 reject     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0          tcp
> dpt:445
> 0     0 reject     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0          tcp
> dpt:135
> 0     0 DROP       udp  --  *      *       0.0.0.0/0 0.0.0.0/0          udp
> dpt:1900
> 9  1562 DROP       all  --  *      *       0.0.0.0/0
> 255.255.255.255
> 0     0 DROP       all  --  *      *       0.0.0.0/0 224.0.0.0/4
> 0     0 reject     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0          tcp
> dpt:113
> 0     0 DROP       udp  --  *      *       0.0.0.0/0 0.0.0.0/0          udp
> spt:53 state NEW
> 0     0 DROP       all  --  *      *       0.0.0.0/0 138.23.75.255
> 0     0 DROP       all  --  *      *       0.0.0.0/0 192.168.1.255
>
>
> Chain dynamic (4 references)
> pkts bytes target     prot opt in     out     source destination
>
> Chain eth0_fwd (1 references)
> pkts bytes target     prot opt in     out     source destination 0     0
> dynamic    all  --  *      *       0.0.0.0/0 0.0.0.0/0
> 0     0 rfc1918    all  --  *      *       0.0.0.0/0 0.0.0.0/0
> state NEW 0     0 net2all    all  --  *      eth1    0.0.0.0/0 0.0.0.0/0
>
>
> Chain eth0_in (1 references)
> pkts bytes target     prot opt in     out     source destination 37  5033
> dynamic    all  --  *      *       0.0.0.0/0 0.0.0.0/0
> 27  3445 rfc1918    all  --  *      *       0.0.0.0/0
> 0.0.0.0/0          state NEW
> 37  5033 net2fw     all  --  *      *       0.0.0.0/0
> 0.0.0.0/0
>
>
> Chain eth1_fwd (1 references)
> pkts bytes target     prot opt in     out     source destination 0     0
> dynamic    all  --  *      *       0.0.0.0/0 0.0.0.0/0
> 0     0 loc2net    all  --  *      eth0    0.0.0.0/0 0.0.0.0/0
>
>
> Chain eth1_in (1 references)
> pkts bytes target     prot opt in     out     source destination 0     0
> dynamic    all  --  *      *       0.0.0.0/0 0.0.0.0/0
> 0     0 loc2fw     all  --  *      *       0.0.0.0/0 0.0.0.0/0
>
>
> Chain fw2loc (1 references)
> pkts bytes target     prot opt in     out     source destination 0     0
> ACCEPT     all  --  *      *       0.0.0.0/0
> 0.0.0.0/0          state RELATED,ESTABLISHED
> 0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0 0.0.0.0/0
> state NEW tcp flags:!0x16/0x02 0     0 ACCEPT     icmp --  *      *
> 0.0.0.0/0
> 0.0.0.0/0          icmp type 8
> 0     0 all2all    all  --  *      *       0.0.0.0/0 0.0.0.0/0
>
>
> Chain fw2net (1 references)
> pkts bytes target     prot opt in     out     source destination 0     0
> ACCEPT     all  --  *      *       0.0.0.0/0
> 0.0.0.0/0          state RELATED,ESTABLISHED
> 0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0 0.0.0.0/0
> state NEW tcp flags:!0x16/0x02 0     0 ACCEPT     tcp  --  *      *
> 0.0.0.0/0
> 0.0.0.0/0          state NEW tcp dpt:53
> 4   248 ACCEPT     udp  --  *      *       0.0.0.0/0
> 0.0.0.0/0          state NEW udp dpt:53
> 6   504 ACCEPT     icmp --  *      *       0.0.0.0/0
> 0.0.0.0/0          icmp type 8
> 0     0 all2all    all  --  *      *       0.0.0.0/0 0.0.0.0/0
>
>
> Chain icmpdef (1 references)
> pkts bytes target     prot opt in     out     source destination
>
> Chain loc2fw (1 references)
> pkts bytes target     prot opt in     out     source destination 0     0
> ACCEPT     all  --  *      *       0.0.0.0/0
> 0.0.0.0/0          state RELATED,ESTABLISHED
> 0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0 0.0.0.0/0
> state NEW tcp flags:!0x16/0x02 0     0 ACCEPT     tcp  --  *      *
> 0.0.0.0/0
> 0.0.0.0/0          state NEW tcp dpt:22
> 0     0 ACCEPT     icmp --  *      *       0.0.0.0/0 0.0.0.0/0
> icmp type 8 0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 0.0.0.0/0
> state NEW udp dpt:53 0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0
> 0.0.0.0/0          state NEW tcp dpt:80
> 0     0 all2all    all  --  *      *       0.0.0.0/0 0.0.0.0/0
>
>
> Chain loc2net (1 references)
> pkts bytes target     prot opt in     out     source destination 0     0
> ACCEPT     all  --  *      *       0.0.0.0/0
> 0.0.0.0/0          state RELATED,ESTABLISHED
> 0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0 0.0.0.0/0
> state NEW tcp flags:!0x16/0x02 0     0 ACCEPT     all  --  *      *
> 0.0.0.0/0
> 0.0.0.0/0
>
>
> Chain logdrop (30 references)
> pkts bytes target     prot opt in     out     source destination 0     0
> ULOG       all  --  *      *       0.0.0.0/0
> 0.0.0.0/0          ULOG copy_range 0 nlgroup 1 prefix
> `Shorewall:rfc1918:DROP:' queue_threshold 1
> 0     0 DROP       all  --  *      *       0.0.0.0/0 0.0.0.0/0
>
>
> Chain net2all (2 references)
> pkts bytes target     prot opt in     out     source destination 0     0
> ACCEPT     all  --  *      *       0.0.0.0/0
> 0.0.0.0/0          state RELATED,ESTABLISHED
> 0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0 0.0.0.0/0
> state NEW tcp flags:!0x16/0x02 27  3445 common     all  --  *      *
> 0.0.0.0/0
> 0.0.0.0/0
> 0     0 ULOG       all  --  *      *       0.0.0.0/0 0.0.0.0/0
> ULOG copy_range 0 nlgroup 1 prefix
> `Shorewall:net2all:DROP:' queue_threshold 1
> 0     0 DROP       all  --  *      *       0.0.0.0/0 0.0.0.0/0
>
>
> Chain net2fw (1 references)
> pkts bytes target     prot opt in     out     source destination 10  1588
> ACCEPT     all  --  *      *       0.0.0.0/0
> 0.0.0.0/0          state RELATED,ESTABLISHED
> 0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0 0.0.0.0/0
> state NEW tcp flags:!0x16/0x02 0     0 ACCEPT     icmp --  *      *
> 0.0.0.0/0
> 0.0.0.0/0          icmp type 8
> 27  3445 net2all    all  --  *      *       0.0.0.0/0
> 0.0.0.0/0
>
>
> Chain newnotsyn (7 references)
> pkts bytes target     prot opt in     out     source destination 0     0
> DROP       all  --  *      *       0.0.0.0/0
> 0.0.0.0/0
>
>
> Chain reject (10 references)
> pkts bytes target     prot opt in     out     source destination 0     0
> REJECT     tcp  --  *      *       0.0.0.0/0
> 0.0.0.0/0          reject-with tcp-reset
> 18  1883 REJECT     all  --  *      *       0.0.0.0/0
> 0.0.0.0/0          reject-with icmp-port-unreachable
>
>
> Chain rfc1918 (2 references)
> pkts bytes target     prot opt in     out     source destination 0     0
> RETURN     all  --  *      *       255.255.255.255
> 0.0.0.0/0
> 0     0 RETURN     all  --  *      *       169.254.0.0/16 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       172.16.0.0/12 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       192.0.2.0/24 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       192.168.0.0/16 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       0.0.0.0/7 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       2.0.0.0/8 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       5.0.0.0/8 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       7.0.0.0/8 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       10.0.0.0/8 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       23.0.0.0/8 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       27.0.0.0/8 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       31.0.0.0/8 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       36.0.0.0/7 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       39.0.0.0/8 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       41.0.0.0/8 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       42.0.0.0/8 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       49.0.0.0/8 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       50.0.0.0/8 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       58.0.0.0/7 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       60.0.0.0/8 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       70.0.0.0/7 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       72.0.0.0/5 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       83.0.0.0/8 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       84.0.0.0/6 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       88.0.0.0/5 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       96.0.0.0/3 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       127.0.0.0/8 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       197.0.0.0/8 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       198.18.0.0/15 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       201.0.0.0/8 0.0.0.0/0
> 0     0 logdrop    all  --  *      *       240.0.0.0/4 0.0.0.0/0
>
>
> Chain shorewall (0 references)
> pkts bytes target     prot opt in     out     source destination
>
> Feb  7 11:52:34 all2all:REJECT: IN= OUT=eth0 SRC=138.23.75.45
> DST=198.41.0.10 LEN=60 TOS=00 PREC=0x00 TTL=64 ID=59066 DF PROTO=UDP
> SPT=3420 DPT=53 LEN=40
> Feb  7 11:52:34 all2all:REJECT: IN= OUT=eth0 SRC=138.23.75.45
> DST=198.32.64.12 LEN=60 TOS=00 PREC=0x00 TTL=64 ID=38406 DF PROTO=UDP
> SPT=7976 DPT=53 LEN=40
> Feb  7 11:52:34 all2all:REJECT: IN= OUT=eth0 SRC=138.23.75.45
> DST=192.5.5.241 LEN=60 TOS=00 PREC=0x00 TTL=64 ID=34255 DF PROTO=UDP
> SPT=25596 DPT=53 LEN=40
> Feb  7 11:52:34 all2all:REJECT: IN= OUT=eth0 SRC=138.23.75.45
> DST=202.12.27.33 LEN=60 TOS=00 PREC=0x00 TTL=64 ID=45206 DF PROTO=UDP
> SPT=30963 DPT=53 LEN=40
> Feb  7 11:52:34 all2all:REJECT: IN= OUT=eth0 SRC=138.23.75.45
> DST=192.36.148.17 LEN=60 TOS=00 PREC=0x00 TTL=64 ID=59483 DF PROTO=UDP
> SPT=18464 DPT=53 LEN=40
> Feb  7 11:52:34 all2all:REJECT: IN= OUT=eth0 SRC=138.23.75.45
> DST=128.8.10.90 LEN=60 TOS=00 PREC=0x00 TTL=64 ID=52124 DF PROTO=UDP
> SPT=43443 DPT=53 LEN=40
> Feb  7 11:52:34 all2all:REJECT: IN= OUT=eth0 SRC=138.23.75.45
> DST=128.63.2.53 LEN=60 TOS=00 PREC=0x00 TTL=64 ID=45648 DF PROTO=UDP
> SPT=18455 DPT=53 LEN=40
> Feb  7 11:52:34 all2all:REJECT: IN= OUT=eth0 SRC=138.23.75.45
> DST=192.112.36.4 LEN=60 TOS=00 PREC=0x00 TTL=64 ID=40862 DF PROTO=UDP
> SPT=14202 DPT=53 LEN=40
> Feb  7 11:52:34 all2all:REJECT: IN= OUT=eth0 SRC=138.23.75.45
> DST=193.0.14.129 LEN=60 TOS=00 PREC=0x00 TTL=64 ID=40873 DF PROTO=UDP
> SPT=43008 DPT=53 LEN=40
> Feb  7 11:52:34 all2all:REJECT: IN= OUT=eth0 SRC=138.23.75.45
> DST=192.203.230.10 LEN=60 TOS=00 PREC=0x00 TTL=64 ID=59630 DF PROTO=UDP
> SPT=23530 DPT=53 LEN=40
> Feb  7 11:52:34 all2all:REJECT: IN= OUT=eth0 SRC=138.23.75.45
> DST=198.41.0.4 LEN=60 TOS=00 PREC=0x00 TTL=64 ID=60153 DF PROTO=UDP
> SPT=4116 DPT=53 LEN=40
> Feb  7 11:52:34 all2all:REJECT: IN= OUT=eth0 SRC=138.23.75.45
> DST=192.33.4.12 LEN=60 TOS=00 PREC=0x00 TTL=64 ID=35480 DF PROTO=UDP
> SPT=15657 DPT=53 LEN=40
> Feb  7 11:52:34 all2all:REJECT: IN= OUT=eth0 SRC=138.23.75.45
> DST=128.9.0.107 LEN=60 TOS=00 PREC=0x00 TTL=64 ID=34144 DF PROTO=UDP
> SPT=3918 DPT=53 LEN=40
> Feb  7 11:52:34 all2all:REJECT: IN= OUT=eth0 SRC=138.23.75.45
> DST=198.41.0.10 LEN=60 TOS=00 PREC=0x00 TTL=64 ID=41108 DF PROTO=UDP
> SPT=47595 DPT=53 LEN=40
> Feb  7 11:52:34 all2all:REJECT: IN= OUT=eth0 SRC=138.23.75.45
> DST=198.32.64.12 LEN=60 TOS=00 PREC=0x00 TTL=64 ID=57489 DF PROTO=UDP
> SPT=21574 DPT=53 LEN=40
> Feb  7 11:52:34 all2all:REJECT: IN= OUT=eth0 SRC=138.23.75.45
> DST=192.5.5.241 LEN=60 TOS=00 PREC=0x00 TTL=64 ID=60928 DF PROTO=UDP
> SPT=64252 DPT=53 LEN=40
> Feb  7 11:52:34 all2all:REJECT: IN= OUT=eth0 SRC=138.23.75.45
> DST=202.12.27.33 LEN=60 TOS=00 PREC=0x00 TTL=64 ID=33183 DF PROTO=UDP
> SPT=61832 DPT=53 LEN=40
> Feb  7 11:52:34 all2all:REJECT: IN= OUT=eth0 SRC=138.23.75.45
> DST=192.36.148.17 LEN=60 TOS=00 PREC=0x00 TTL=64 ID=48678 DF PROTO=UDP
> SPT=56654 DPT=53 LEN=40
> Feb  7 11:52:34 all2all:REJECT: IN= OUT=eth0 SRC=138.23.75.45
> DST=128.8.10.90 LEN=60 TOS=00 PREC=0x00 TTL=64 ID=43963 DF PROTO=UDP
> SPT=15315 DPT=53 LEN=40
> Feb  7 11:52:44 all2all:REJECT: IN= OUT=eth0 SRC=138.23.75.45
> DST=128.63.2.53 LEN=60 TOS=00 PREC=0x00 TTL=64 ID=53460 DF PROTO=UDP
> SPT=24344 DPT=53 LEN=40
>
>
> NAT Table
>
>
> Chain PREROUTING (policy ACCEPT 2474 packets, 279K bytes)
> pkts bytes target     prot opt in     out     source destination
>
> Chain POSTROUTING (policy ACCEPT 35 packets, 2500 bytes)
> pkts bytes target     prot opt in     out     source destination 10   752
> eth0_masq  all  --  *      eth0    0.0.0.0/0 0.0.0.0/0
>
>
> Chain OUTPUT (policy ACCEPT 192 packets, 11920 bytes)
> pkts bytes target     prot opt in     out     source destination
>
> Chain eth0_masq (1 references)
> pkts bytes target     prot opt in     out     source destination 0     0
> MASQUERADE  all  --  *      *       192.168.1.0/24
> 0.0.0.0/0
>
>
> Mangle Table
>
>
> Chain PREROUTING (policy ACCEPT 2682 packets, 300K bytes)
> pkts bytes target     prot opt in     out     source destination 402 43682
> man1918    all  --  eth0   *       0.0.0.0/0 0.0.0.0/0          state NEW
> 414 45293 pretos     all  --  *      *       0.0.0.0/0
> 0.0.0.0/0
>
>
> Chain INPUT (policy ACCEPT 351 packets, 38485 bytes)
> pkts bytes target     prot opt in     out     source destination
>
> Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
> pkts bytes target     prot opt in     out     source destination
>
> Chain OUTPUT (policy ACCEPT 365 packets, 27096 bytes)
> pkts bytes target     prot opt in     out     source destination 14  1088
> outtos     all  --  *      *       0.0.0.0/0 0.0.0.0/0
>
>
> Chain POSTROUTING (policy ACCEPT 208 packets, 17676 bytes)
> pkts bytes target     prot opt in     out     source destination
>
> Chain logdrop (30 references)
> pkts bytes target     prot opt in     out     source destination 0     0
> ULOG       all  --  *      *       0.0.0.0/0
> 0.0.0.0/0          ULOG copy_range 0 nlgroup 1 prefix
> `Shorewall:man1918:DROP:' queue_threshold 1
> 0     0 DROP       all  --  *      *       0.0.0.0/0 0.0.0.0/0
>
>
> Chain man1918 (1 references)
> pkts bytes target     prot opt in     out     source destination 9  1562
> RETURN     all  --  *      *       0.0.0.0/0
> 255.255.255.255
> 0     0 RETURN     all  --  *      *       0.0.0.0/0 169.254.0.0/16
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 172.16.0.0/12
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 192.0.2.0/24
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 192.168.0.0/16
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 0.0.0.0/7
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 2.0.0.0/8
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 5.0.0.0/8
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 7.0.0.0/8
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 10.0.0.0/8
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 23.0.0.0/8
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 27.0.0.0/8
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 31.0.0.0/8
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 36.0.0.0/7
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 39.0.0.0/8
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 41.0.0.0/8
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 42.0.0.0/8
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 49.0.0.0/8
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 50.0.0.0/8
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 58.0.0.0/7
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 60.0.0.0/8
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 70.0.0.0/7
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 72.0.0.0/5
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 83.0.0.0/8
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 84.0.0.0/6
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 88.0.0.0/5
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 96.0.0.0/3
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 127.0.0.0/8
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 197.0.0.0/8
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 198.18.0.0/15
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 201.0.0.0/8
> 0     0 logdrop    all  --  *      *       0.0.0.0/0 240.0.0.0/4
>
>
> Chain outtos (1 references)
> pkts bytes target     prot opt in     out     source destination 0     0
TOS
> tcp  --  *      *       0.0.0.0/0 0.0.0.0/0          tcp dpt:22 TOS set
> 0x10
> 0     0 TOS        tcp  --  *      *       0.0.0.0/0 0.0.0.0/0          tcp
> spt:22 TOS set 0x10
> 0     0 TOS        tcp  --  *      *       0.0.0.0/0 0.0.0.0/0          tcp
> dpt:21 TOS set 0x10
> 0     0 TOS        tcp  --  *      *       0.0.0.0/0 0.0.0.0/0          tcp
> spt:21 TOS set 0x10
> 0     0 TOS        tcp  --  *      *       0.0.0.0/0 0.0.0.0/0          tcp
> spt:20 TOS set 0x08
> 0     0 TOS        tcp  --  *      *       0.0.0.0/0 0.0.0.0/0          tcp
> dpt:20 TOS set 0x08
>
>
> Chain pretos (1 references)
> pkts bytes target     prot opt in     out     source destination 0     0
TOS
> tcp  --  *      *       0.0.0.0/0 0.0.0.0/0          tcp dpt:22 TOS set
> 0x10
> 0     0 TOS        tcp  --  *      *       0.0.0.0/0 0.0.0.0/0          tcp
> spt:22 TOS set 0x10
> 0     0 TOS        tcp  --  *      *       0.0.0.0/0 0.0.0.0/0          tcp
> dpt:21 TOS set 0x10
> 0     0 TOS        tcp  --  *      *       0.0.0.0/0 0.0.0.0/0          tcp
> spt:21 TOS set 0x10
> 0     0 TOS        tcp  --  *      *       0.0.0.0/0 0.0.0.0/0          tcp
> spt:20 TOS set 0x08
> 0     0 TOS        tcp  --  *      *       0.0.0.0/0 0.0.0.0/0          tcp
> dpt:20 TOS set 0x08
>
>
>
>
>
>
>
> -------------------------------------------------------
> This SF.net email is sponsored by: Splunk Inc. Do you grep through log
> files for problems?  Stop!  Download the new AJAX search engine that makes
>  searching your log files as easy as surfing the  web.  DOWNLOAD SPLUNK!
> http://sel.as-us.falkag.net/sel?cmd=lnk&kid=103432&bid=230486&dat=121642
> ------------------------------------------------------------------------
> leaf-user mailing list: [email protected]
> https://lists.sourceforge.net/lists/listinfo/leaf-user
> Support Request -- http://leaf-project.org/
>
>




-------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc. Do you grep through log files
for problems?  Stop!  Download the new AJAX search engine that makes
searching your log files as easy as surfing the  web.  DOWNLOAD SPLUNK!
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=103432&bid=230486&dat=121642
------------------------------------------------------------------------
leaf-user mailing list: [email protected]
https://lists.sourceforge.net/lists/listinfo/leaf-user
Support Request -- http://leaf-project.org/

Reply via email to