Using Linux kernel 2.6.26 and iptables with this rule.... iptables -A bad_tcp_packets -p tcp ! --syn -m state --state NEW -j DROP ...a certain group of known reputable sites have a copious number of packets dropped by that rule. A capture of a conversation with one of those sites via Wireshark indicated that the following was the offending packet... TCP [TCP Window Update] http > 58666 [ACK] Seq=1 Ack=1 Win=1049248 Len=0 TSV=1194040538 TSER=2055704 While this group of known sites accounts for 99% of all packets stopped by the 'new not syn' rule above, they suggest that it's a problem in our firewalling or TCP.implementation. Their sites are a client/server operation where remote clients connect to their servers irregularly to send and receive data via HTTP. I suspect the problem lies somewhere in their server software, but knowing just enough about networking to be mildly dangerous I can't say that with any authority. If the above infomation is pertinent, or if further data from the sniffer or kernel log would be useful, please let me know and I'll provide what I can. Thanks in advance. Chuck Logan -- To unsubscribe from this list: send the line "unsubscribe netfilter" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html