On 27/05/07, Tom Eastep <[EMAIL PROTECTED]> wrote:
> The problem is caused by 'out-of-window' packets. So to totally analyze
> the problem, you may have to capture:
>
> a) The SCP stream on the outer interface of the other firewall.
> b) The SCP stream on the outer interface of the Shorewall box.
> c) Invalid connection state packets (I sent instructions earlier).
>
> Once you find out which packets are being dropped (c), then you can
> compare those packets in (a) and (b) to see if the other firewall is
> mangling them. If not, then you need to send (b) and (c) to the
> netfilter developers for analysis.

OK, thanks for the info. Alas, (a) isn't accesible to me, but I'll
spend some time seeing if I can see anything suspect in (b).

>
> tcp_be_liberal (which you are setting) turns off Netfilter
> window-tracking except for RST packets so you will need to turn of
> tcp_be_liberal while tracking this down.
>

OK.

Thanks once again for your help and patience.

Jonathan.

-------------------------------------------------------------------------
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of DB2 express and take
control of your XML. No limits. Just data. Click to get it now.
http://sourceforge.net/powerbar/db2/
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to