Eric -- I'm not used to reading Weblet output, but if I read this right, it may look odd but actually is all 3 chains doing what they are supposed to. Step 1 -- input chain. The rule you mark there is: > 0 0 REJECT udp ------ ppp0 0/0 0/0 * -> 137 Well, this will REJECT off-LAN replies that come on interface ppp0, but it won't affect packets that originate on the internal interface (eth0, I suppose). AS you say later ... >I added a rule on the internal interface blocking port 137 with >logging and got several hunderd hits a day. .. and prior to your doing this, they would encounter (eventually) an ACCEPT rule or policy. So that gets the packets past the input chain. Step 2 -- forward chain. The relevant rule there is >25576 1765K MASQ all ------ ppp0 192.168.1.0/24 0/0 n/a and that causes the packets from your Win98 host's port 137 to be MASQ'd, as you report. Step 3 -- output chain. This catches the MASQ'd packets based on their destination. > 12 936 REJECT udp ------ ppp0 0/0 0/0 * -> 137 So everything works as it should. (It also illustrates why I normally write firewall rulesets in which all the "protective" portions are in the input chain, but that's just me and my preferences.) At 10:43 PM 3/2/01 +0100, Eric Wolzak wrote: >Hello all > >I posted this question on the lrp list but no one did reply :( > >I do think that it is important though. > >I have a eigerstein router / variant kenneth hadley -dsl dynamic >address. > >On the router i found this masqueraded connection caused by a >windows 95 machine 192.168.1.2 obvious doing "windows Stuff ;) ". > >udp 1:26.02 192.168.1.2 50.171.209.212 137 -> 137 (62523) > >The problem i have is the following: [remaining details deleted] -- ------------------------------------"Never tell me the odds!"--- Ray Olszewski -- Han Solo Palo Alto, CA [EMAIL PROTECTED] ---------------------------------------------------------------- _______________________________________________ Leaf-devel mailing list [EMAIL PROTECTED] http://lists.sourceforge.net/lists/listinfo/leaf-devel