On Thu, 2003-11-20 at 00:05, Harry Putnam wrote: > Jeff <jeff@xxxxxxxxxx> writes: > > > Any suggestions welcome - I'm totally stumped! or have I missed > > something blatantly obvious?! > > We'll need: > ifconfig -a > netstat -nr > > and maybe iptables -nL > For your viewing pleasure..... [root@potchin root]# ifconfig -a eth0 Link encap:Ethernet HWaddr 00:08:C7:52:4F:15 inet addr:192.168.0.1 Bcast:192.168.0.255 Mask:255.255.255.0 UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:17952 errors:0 dropped:0 overruns:0 frame:0 TX packets:12085 errors:1 dropped:0 overruns:0 carrier:1 collisions:0 txqueuelen:100 RX bytes:1829443 (1.7 Mb) TX bytes:1717985 (1.6 Mb) Interrupt:9 Base address:0x1420 Memory:f4012000-f4012038 lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 UP LOOPBACK RUNNING MTU:16436 Metric:1 RX packets:393 errors:0 dropped:0 overruns:0 frame:0 TX packets:393 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:58339 (56.9 Kb) TX bytes:58339 (56.9 Kb) ppp0 Link encap:Point-to-Point Protocol inet addr:xxx.xxx.xxx.xxx P-t-P:62.253.189.143 Mask:255.255.255.255 UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1500 Metric:1 RX packets:11145 errors:0 dropped:0 overruns:0 frame:0 TX packets:16451 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:3 RX bytes:1460736 (1.3 Mb) TX bytes:1694176 (1.6 Mb) [root@potchin root]# netstat -nr Kernel IP routing table Destination Gateway Genmask Flags MSS Window irtt Iface 62.253.189.143 0.0.0.0 255.255.255.255 UH 0 0 0 ppp0 192.168.0.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0 169.254.0.0 0.0.0.0 255.255.0.0 U 0 0 0 eth0 127.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 lo 0.0.0.0 62.253.189.143 0.0.0.0 UG 0 0 0 ppp0 [root@potchin root]# iptables -nL Chain INPUT (policy DROP) target prot opt source destination ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 DROP !icmp -- 0.0.0.0/0 0.0.0.0/0 state INVALID ppp0_in all -- 0.0.0.0/0 0.0.0.0/0 eth0_in all -- 0.0.0.0/0 0.0.0.0/0 common all -- 0.0.0.0/0 0.0.0.0/0 LOG all -- 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:' reject all -- 0.0.0.0/0 0.0.0.0/0 Chain FORWARD (policy DROP) target prot opt source destination DROP !icmp -- 0.0.0.0/0 0.0.0.0/0 state INVALID TCPMSS tcp -- 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU ppp0_fwd all -- 0.0.0.0/0 0.0.0.0/0 eth0_fwd all -- 0.0.0.0/0 0.0.0.0/0 common all -- 0.0.0.0/0 0.0.0.0/0 LOG all -- 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:' reject all -- 0.0.0.0/0 0.0.0.0/0 Chain OUTPUT (policy DROP) target prot opt source destination ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 DROP !icmp -- 0.0.0.0/0 0.0.0.0/0 state INVALID fw2net all -- 0.0.0.0/0 0.0.0.0/0 fw2loc all -- 0.0.0.0/0 0.0.0.0/0 common all -- 0.0.0.0/0 0.0.0.0/0 LOG all -- 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:OUTPUT:REJECT:' reject all -- 0.0.0.0/0 0.0.0.0/0 Chain all2all (1 references) target prot opt source destination ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED newnotsyn tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 common all -- 0.0.0.0/0 0.0.0.0/0 LOG all -- 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:all2all:REJECT:' reject all -- 0.0.0.0/0 0.0.0.0/0 Chain common (5 references) target prot opt source destination icmpdef icmp -- 0.0.0.0/0 0.0.0.0/0 reject udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:135 reject udp -- 0.0.0.0/0 0.0.0.0/0 udp dpts:137:139 reject udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:445 reject tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:139 reject tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:445 reject tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:135 DROP udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:1900 DROP all -- 0.0.0.0/0 255.255.255.255 DROP all -- 0.0.0.0/0 224.0.0.0/4 reject tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:113 DROP udp -- 0.0.0.0/0 0.0.0.0/0 udp spt:53 state NEW DROP all -- 0.0.0.0/0 192.168.0.255 Chain dynamic (4 references) target prot opt source destination Chain eth0_fwd (1 references) target prot opt source destination dynamic all -- 0.0.0.0/0 0.0.0.0/0 loc2net all -- 0.0.0.0/0 0.0.0.0/0 Chain eth0_in (1 references) target prot opt source destination dynamic all -- 0.0.0.0/0 0.0.0.0/0 loc2fw all -- 0.0.0.0/0 0.0.0.0/0 Chain fw2loc (1 references) target prot opt source destination ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED newnotsyn tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 8 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 Chain fw2net (1 references) target prot opt source destination ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED newnotsyn tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:53 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:53 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 8 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 Chain icmpdef (1 references) target prot opt source destination Chain loc2fw (1 references) target prot opt source destination ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED newnotsyn tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 8 ACCEPT tcp -- 192.168.0.4 0.0.0.0/0 state NEW tcp ACCEPT udp -- 192.168.0.4 0.0.0.0/0 state NEW ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 Chain loc2loc (0 references) target prot opt source destination ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED newnotsyn tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 ACCEPT tcp -- 192.168.0.4 0.0.0.0/0 state NEW tcp ACCEPT udp -- 192.168.0.4 0.0.0.0/0 state NEW all2all all -- 0.0.0.0/0 0.0.0.0/0 Chain loc2net (1 references) target prot opt source destination ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED newnotsyn tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 ACCEPT tcp -- 192.168.0.4 0.0.0.0/0 state NEW tcp ACCEPT udp -- 192.168.0.4 0.0.0.0/0 state NEW ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 Chain net2all (2 references) target prot opt source destination ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED newnotsyn tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 common all -- 0.0.0.0/0 0.0.0.0/0 LOG all -- 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:net2all:DROP:' DROP all -- 0.0.0.0/0 0.0.0.0/0 Chain net2fw (1 references) target prot opt source destination ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED newnotsyn tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 8 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:21 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:80 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:25 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:110 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:10000 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:2000 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22 net2all all -- 0.0.0.0/0 0.0.0.0/0 Chain net2loc (1 references) target prot opt source destination ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED newnotsyn tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 ACCEPT tcp -- 0.0.0.0/0 192.168.0.5 state NEW tcp dpt:9500 ACCEPT tcp -- 0.0.0.0/0 192.168.0.5 state NEW tcp dpt:2234 ACCEPT tcp -- 0.0.0.0/0 192.168.0.5 state NEW tcp dpt:7031 ACCEPT tcp -- 0.0.0.0/0 192.168.0.5 state NEW tcp dpt:6882 ACCEPT tcp -- 0.0.0.0/0 192.168.0.5 state NEW tcp dpt:6346 ACCEPT tcp -- 0.0.0.0/0 192.168.0.5 state NEW tcp dpt:9999 ACCEPT tcp -- 0.0.0.0/0 192.168.0.5 state NEW tcp dpt:4444 ACCEPT tcp -- 0.0.0.0/0 192.168.0.5 state NEW tcp dpt:4660 ACCEPT tcp -- 0.0.0.0/0 192.168.0.5 state NEW tcp dpt:4661 ACCEPT tcp -- 0.0.0.0/0 192.168.0.5 state NEW tcp dpt:4662 ACCEPT tcp -- 0.0.0.0/0 192.168.0.5 state NEW tcp dpt:4663 ACCEPT tcp -- 0.0.0.0/0 192.168.0.5 state NEW tcp dpt:4664 ACCEPT tcp -- 0.0.0.0/0 192.168.0.5 state NEW tcp dpt:4665 ACCEPT tcp -- 0.0.0.0/0 192.168.0.5 state NEW tcp dpt:4666 ACCEPT tcp -- 0.0.0.0/0 192.168.0.5 state NEW tcp dpt:4667 ACCEPT tcp -- 0.0.0.0/0 192.168.0.5 state NEW tcp dpt:4668 ACCEPT tcp -- 0.0.0.0/0 192.168.0.5 state NEW tcp dpt:4669 ACCEPT tcp -- 0.0.0.0/0 192.168.0.5 state NEW tcp dpt:4670 ACCEPT udp -- 0.0.0.0/0 192.168.0.5 state NEW udp dpt:4660 ACCEPT udp -- 0.0.0.0/0 192.168.0.5 state NEW udp dpt:4661 ACCEPT udp -- 0.0.0.0/0 192.168.0.5 state NEW udp dpt:4662 ACCEPT udp -- 0.0.0.0/0 192.168.0.5 state NEW udp dpt:4663 ACCEPT udp -- 0.0.0.0/0 192.168.0.5 state NEW udp dpt:4664 ACCEPT udp -- 0.0.0.0/0 192.168.0.5 state NEW udp dpt:4665 ACCEPT udp -- 0.0.0.0/0 192.168.0.5 state NEW udp dpt:4666 ACCEPT udp -- 0.0.0.0/0 192.168.0.5 state NEW udp dpt:4667 ACCEPT udp -- 0.0.0.0/0 192.168.0.5 state NEW udp dpt:4668 ACCEPT udp -- 0.0.0.0/0 192.168.0.5 state NEW udp dpt:4669 ACCEPT udp -- 0.0.0.0/0 192.168.0.5 state NEW udp dpt:4670 ACCEPT tcp -- 0.0.0.0/0 192.168.0.4 state NEW tcp dpts:10070:10080 ACCEPT udp -- 0.0.0.0/0 192.168.0.4 state NEW udp dpt:10070 net2all all -- 0.0.0.0/0 0.0.0.0/0 Chain newnotsyn (9 references) target prot opt source destination DROP all -- 0.0.0.0/0 0.0.0.0/0 Chain ppp0_fwd (1 references) target prot opt source destination dynamic all -- 0.0.0.0/0 0.0.0.0/0 net2loc all -- 0.0.0.0/0 0.0.0.0/0 Chain ppp0_in (1 references) target prot opt source destination dynamic all -- 0.0.0.0/0 0.0.0.0/0 net2fw all -- 0.0.0.0/0 0.0.0.0/0 Chain reject (11 references) target prot opt source destination REJECT tcp -- 0.0.0.0/0 0.0.0.0/0 reject-with tcp-reset REJECT udp -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable REJECT icmp -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-unreachable REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited Chain shorewall (0 references) target prot opt source destination -- redhat-list mailing list unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe https://www.redhat.com/mailman/listinfo/redhat-list