I am using the E2B distribution with the scripts for DMZ (version 1.0 I 
think, I know it was not the latest ver (1.1?).

I was running tcpdump on a red-hat box on the internal network (eth1 
192.168.1) and I noticed some broadcast packets from my service providers 
network (eth0 12.29.11).

Looking at the firewall rules, it shows to deny input from 0/0 to 
255.255.255.255, but what do you do for the following from tcpdump?

[root@samba1 roach]# tcpdump ip multicast
tcpdump: listening on eth0
15:06:27.521558 jbr-eth1-hiperarc.alltechcomputers.net > 
ALL-SYSTEMS.MCAST.NET: icmp: router advertise
ment lifetime 30:00 1: {jbr-eth1-hiperarc.alltechcomputers.net 0}
15:07:41.201558 12.29.11.11.svrloc > SVRLOC.MCAST.NET.svrloc:  udp 53
15:07:42.251558 12.29.11.11.svrloc > SVRLOC.MCAST.NET.svrloc:  udp 53
15:07:45.741558 12.29.11.11.svrloc > SVRLOC.MCAST.NET.svrloc:  udp 77
15:07:46.831558 12.29.11.11.svrloc > SVRLOC.MCAST.NET.svrloc:  udp 77


The alltechcomputers.net is the 12.29.11 network.  We are connected from 
their network thur a wireless interface and then to our E2B firewall.

Thanks


LaRoy McCann
Electrical Engineering Manager
Roach Conveyors
(870) 483-7631 x638
www.roachconveyors.com


_______________________________________________
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user

Reply via email to