My firewall works well, except that I can't get any kind of access to www.adobe.com. This is typical: # ping www.adobe.com PING www.wip3.adobe.com (192.150.18.101): 56 data bytes 64 bytes from 192.150.18.101: icmp_seq=0 ttl=243 time=194.939 ms 64 bytes from 192.150.18.101: icmp_seq=1 ttl=243 time=193.576 ms 64 bytes from 192.150.18.101: icmp_seq=2 ttl=243 time=194.612 ms 64 bytes from 192.150.18.101: icmp_seq=3 ttl=243 time=194.844 ms --- www.wip3.adobe.com ping statistics --- 4 packets transmitted, 4 packets received, 0% packet loss round-trip min/avg/max/stddev = 193.576/194.493/194.939/0.542 ms so far so good... # wget http://www.adobe.com/index.html --07:45:04-- http://www.adobe.com/index.html => `index.html' Resolving www.adobe.com... 192.150.18.101 Connecting to www.adobe.com|192.150.18.101|:80... it just times out - browsers are the same. Looking at the log shows the following warnings: IPTABLES:INPUT IN=net OUT= MAC=00:a0:c9:43:8f:77:00:90:96:f7:74:42:08:00 SRC=192.150.18.101 DST=192.168.1.2 LEN=44 TOS=0x00 PREC=0x00 TTL=53 ID=9637 PROTO=TCP SPT=80 DPT=3723 WINDOW=20498 RES=0x00 URGP=0 IPTABLES:INPUT IN=net OUT= MAC=00:a0:c9:43:8f:77:00:90:96:f7:74:42:08:00 SRC=192.150.18.101 DST=192.168.1.2 LEN=44 TOS=0x00 PREC=0x00 TTL=53 ID=45688 PROTO=TCP SPT=80 DPT=3723 WINDOW=20498 RES=0x00 URGP=0 IPTABLES:INPUT IN=net OUT= MAC=00:a0:c9:43:8f:77:00:90:96:f7:74:42:08:00 SRC=192.150.18.101 DST=192.168.1.2 LEN=44 TOS=0x00 PREC=0x00 TTL=53 ID=37819 PROTO=TCP SPT=80 DPT=3723 WINDOW=20498 RES=0x00 URGP=0 and my iptables: iptables -L Chain INPUT (policy DROP) target prot opt source destination ACCEPT all -- anywhere anywhere ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED ACCEPT udp -- anywhere anywhere udp dpt:domain ACCEPT tcp -- anywhere anywhere tcp dpt:domain ACCEPT tcp -- anywhere anywhere tcp dpt:http ACCEPT udp -- anywhere anywhere udp dpt:http ACCEPT tcp -- anywhere anywhere tcp dpt:irdmi ACCEPT udp -- anywhere anywhere udp dpt:irdmi ACCEPT tcp -- anywhere anywhere tcp dpt:ftp ACCEPT udp -- anywhere anywhere udp dpt:ftp ACCEPT tcp -- anywhere anywhere tcp dpt:ssh ACCEPT udp -- anywhere anywhere udp dpt:ssh ACCEPT all -- 172.16.1.0/24 anywhere ACCEPT tcp -- anywhere anywhere tcp dpt:smtp ACCEPT udp -- anywhere anywhere udp dpt:smtp LOG all -- anywhere anywhere LOG level warning prefix `IPTABLES:INPUT ' Chain FORWARD (policy DROP) target prot opt source destination ACCEPT all -- anywhere anywhere state NEW ACCEPT all -- 172.16.1.0/24 anywhere ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED Chain OUTPUT (policy DROP) target prot opt source destination ACCEPT all -- anywhere anywhere I'm completely stumped on this. Can anyone suggest a way forward? Thanks. R. -- To unsubscribe from this list: send the line "unsubscribe netfilter" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html