Op donderdag 3 juli 2003 18:19, schreef Daniel Chemko: > Just a blank stab at it, but does syslog have to be started to use the > LOG functionality? Yes , syslog need to be started ,for iptables to log to /var/log/.... > -----Original Message----- > From: Michal Kepien [mailto:lordpopcorn@xxxxxxxxxxxxxx] > Sent: Thursday, July 03, 2003 9:12 AM > To: netfilter@xxxxxxxxxxxxxxxxxxx > Subject: Firewall setup at boot - trouble with setting up the LOG target > > Hi there, I've got a problem with my boot-time firewall setup script. > It works almost 100% correctly, however there is a little problem. > > I'm using iptables v1.2.8 and kernel 2.4.19. Amongst other actions, > the script creates a custom chain called 'drop-and-log' and inserts 2 > rules into it: > > 1. 'iptables -A drop-and-log -j LOG --log-level info' > (log a packet) > 2. 'iptables -A drop-and-log -j REJECT' > (after logging, reject the packet) > > The problem is that when I run the 'iptables -L' command after the > boot is completed, I only see rule no. 2 (REJECTing, without LOGging) > in the 'drop-and-log' chain. When I run the script once again, > manually (by executing '/etc/rc.d/rc.firewall'), after the boot is > completed, everything works fine. The scripts looks like this: I use the command "iptables -L -nv" for detailed rules. or use the debug option "set -x" , put that on top of your rules like this: -----START rc.firewall----- #!/bin/bash set -x echo 1 > /proc/sys/net/ipv4/ip_forward iptables -F iptables -X iptables -Z iptables -P INPUT DROP iptables -P OUTPUT DROP iptables -P FORWARD DROP iptables -N drop-and-log iptables -A drop-and-log -j LOG --log-level info iptables -A drop-and-log -j REJECT b.t.w , i tested your rules-set , no errors from iptables. > [...INPUT, OUTPUT and FORWARD rules...] > > modprobe ip_nat_ftp > modprobe ip_conntrack_ftp > -----END rc.firewall----- > > Probably there's something about the module ipt_LOG here, but I've > tried inserting 'modprobe ipt_LOG' in the beggining, at the end and in > the middle of the script - it did no good. You don't need to insert 'modprobe ipt_LOG' LOG function should be automaticly load when using the LOG target. try a "lsmod" to see if the LOG target is loaded. example: lsmod Module Size Used by ipt_MASQUERADE 1600 1 (autoclean) ipt_state 944 3 (autoclean) ipt_REJECT 3312 1 (autoclean) ipt_LOG 3776 1 (autoclean) Perhaps , a guess , when iptables compiled from source ,the LOG target was not created or with errors.That could explain this behaviour. Pascal