Yeah, I hear what you're saying, but it just isn't working for me.
I've tried with and without the "send host-name" in the dhclient.conf. I've also tried it with "send client-identifier." No apparent difference. - Gary -----Original Message----- From: Cliff Rosenberg [mailto:[EMAIL PROTECTED]] Sent: Wednesday, December 19, 2001 8:55 PM To: gc Cc: Leaf Mail List Subject: Re: [Leaf-user] Update: AT&T Transition Woes Hello- I have a cable modem on AT&T (a motorola SB4100) and have been using Charles latest Dachstein relase on floppy without any problems. The disk image it totally stock, all I did was edit my DHCP client options (the "send-host-name" option needs to be your user id given by AT&T, the Cxxxxxxx-A format that it is in). I am using a P100 w/24 megs ram, 2 3COM nic's a 3C905B and a 3C905B-M Totally stock otherwise in config files, just added the modules for the NIC's, changed "send-host-name", backed up, re-booted, had an IP within seconds, running for almost 2 weeks without a hitch. Check your DHCP client config, I think thats your problem. DONT use any of the options EXCEPT "send-host-name" and I think you'll be fine... Regards, Cliff Rosenberg [EMAIL PROTECTED] ----- Original Message ----- From: "gc" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Wednesday, December 19, 2001 9:16 PM Subject: [Leaf-user] Update: AT&T Transition Woes > > First of all, thanks to all who responded to my initial post. > This includes Mark, Scott, Matt, Charles, David, Sean, Michael, > and Richard. I've tried pretty much everything that's been > suggested: setting various dhclient parameters, setting HOSTNAME > and HOSTS0, etc. Unfortunately, I'm still having the same problem. > I figured it was time to post a more thorough support request. > > Problem description: After being transitioned off of home.com to > attbi.com, I wasn't able to ping any addresses from my old LRP box. > I upgraded to Dachstein 1.0.2, but that didn't seem to make much > difference. > > If I hook my win2k box directly into the cable modem, things work > fine. It gets assigned address 12.237.7.206, subnet 255.255.240.0, > and default gateway 12.237.0.1. > > The fact that the router gets such a different configuration makes > me suspect its some sort of DHCP problem. But by all appearences, > DHCP works fine. It acquires its addresses from 12.237.0.1, which > happens to be the default gateway for the win2k box AND appears to > be the ONLY address that I can successfully ping from the router. > > I've included the following information: > . network diagram > . dmesg output > . ip addr show > . ip route show > . ip neighbor show > . ip -s link show > . /etc/network.conf > . /etc/lrp.conf > . /etc/dhclient.conf > > > | > ______|______ > | | > | Cable Modem | > |_____________| > | > _________|________ eth0 DHCP 12.255.173.135 > | | > | LRP Router | > |__________________| > | eth1 192.168.1.1 > __|__ > | |____ win2k PC 192.168.1.x > | H |____ win2k PC 192.168.1.y > | u |____ printer 192.168.1.z > | b | > |_____| > > c696585-b: -root- > # dmesg > Linux version 2.2.19-3-LEAF (root@debian) (gcc version 2.7.2.3) #1 Sat Dec 1 > 12:15:05 CST 2001 > BIOS-provided physical RAM map: > BIOS-88: 000a0000 @ 00000000 (usable) > BIOS-88: 00f00000 @ 00100000 (usable) > Console: colour VGA+ 80x25 > Calibrating delay loop... 33.07 BogoMIPS > Memory: 14064k/16384k available (732k kernel code, 412k reserved, 432k data, > 44k init) > Checking if this processor honours the WP bit even in supervisor mode... Ok. > Dentry hash table entries: 2048 (order 2, 16k) > Buffer cache hash table entries: 16384 (order 4, 64k) > Page cache hash table entries: 4096 (order 2, 16k) > CPU: Intel 486 DX/2 stepping 05 > Checking 386/387 coupling... OK, FPU using exception 16 error reporting. > Checking 'hlt' instruction... OK. > POSIX conformance testing by UNIFIX > PCI: No PCI bus detected > Linux NET4.0 for Linux 2.2 > Based upon Swansea University Computer Society NET3.039 > NET4: Unix domain sockets 1.0 for Linux NET4.0. > NET4: Linux TCP/IP 1.0 for NET4.0 > IP Protocols: ICMP, UDP, TCP > TCP: Hash tables configured (ehash 16384 bhash 16384) > Initializing RT netlink socket > Starting kswapd v 1.5 > Software Watchdog Timer: 0.05, timer margin: 60 sec > Real Time Clock Driver v1.09 > RAM disk driver initialized: 16 RAM disks of 6144K size > Floppy drive(s): fd0 is 1.44M > FDC 0 is an 8272A > RAMDISK: Compressed image found at block 0 > RAMDISK: Uncompressing root archive: done. > RAMDISK: Auto Filesystem - minix: 2048i 6144bk 68fdz(68) 1024zs 2147483647ms > VFS: Mounted root (minix filesystem). > RAMDISK: Extracting root archive: done. > VFS: Disk change detected on device fd(2,44) > Freeing unused kernel memory: 44k freed > ne.c:v1.10 9/23/94 Donald Becker ([EMAIL PROTECTED]) > NE*000 ethercard probe at 0x300: 00 40 05 fa 1b 80 > eth0: NE2000 found at 0x300, using IRQ 10. > NE*000 ethercard probe at 0x340: 00 40 05 fa 00 52 > eth1: NE2000 found at 0x340, using IRQ 11. > ip_masq_icq: using TCP port range 60200-61000 > ip_masq_icq: loaded support on port 4000/UDP > Serial driver version 4.27 with MANY_PORTS MULTIPORT SHARE_IRQ enabled > ttyS00 at 0x03f8 (irq = 4) is a 16550A > ttyS01 at 0x02f8 (irq = 3) is a 16550A > Packet log: input DENY eth0 PROTO=1 12.255.173.135:8 12.255.173.128:0 L=84 > S=0x00 I=0 F=0x0000 T=64 (#18) > Packet log: input DENY eth0 PROTO=1 12.255.173.135:8 12.255.173.128:0 L=84 > S=0x00 I=1 F=0x0000 T=64 (#18) > Packet log: input DENY eth0 PROTO=1 12.255.173.135:8 12.255.173.128:0 L=84 > S=0x00 I=2 F=0x0000 T=64 (#18) > Packet log: input DENY eth0 PROTO=1 12.255.173.135:8 12.255.173.128:0 L=84 > S=0x00 I=3 F=0x0000 T=64 (#18) > Packet log: input DENY eth0 PROTO=1 12.255.173.135:8 12.255.173.128:0 L=84 > S=0x00 I=4 F=0x0000 T=64 (#18) > Packet log: input DENY eth0 PROTO=1 12.255.173.135:8 12.255.173.128:0 L=84 > S=0x00 I=5 F=0x0000 T=64 (#18) > Packet log: input DENY eth0 PROTO=1 12.255.173.135:8 12.255.173.128:0 L=84 > S=0x00 I=6 F=0x0000 T=64 (#18) > Packet log: input DENY eth0 PROTO=1 12.255.173.135:8 12.255.173.128:0 L=84 > S=0x00 I=7 F=0x0000 T=64 (#18) > Packet log: input DENY eth0 PROTO=1 12.255.173.135:8 12.255.173.128:0 L=84 > S=0x00 I=8 F=0x0000 T=64 (#18) > Packet log: input DENY eth0 PROTO=1 12.255.173.135:8 12.255.173.128:0 L=84 > S=0x00 I=9 F=0x0000 T=64 (#18) > VFS: Disk change detected on device fd(2,0) > VFS: Disk change detected on device fd(2,0) > > c696585-b: -root- > # ip addr show > 1: lo: <LOOPBACK,UP> mtu 3924 qdisc noqueue > link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 > inet 127.0.0.1/8 brd 127.255.255.255 scope global lo > 2: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100 > link/ether 00:40:05:fa:1b:80 brd ff:ff:ff:ff:ff:ff > inet 12.255.173.135/28 brd 255.255.255.255 scope global eth0 > 3: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100 > link/ether 00:40:05:fa:00:52 brd ff:ff:ff:ff:ff:ff > inet 192.168.1.254/24 brd 192.168.1.255 scope global eth1 > > c696585-b: -root- > # ip route show > 12.255.173.128/28 dev eth0 proto kernel scope link src 12.255.173.135 > 192.168.1.0/24 dev eth1 proto kernel scope link src 192.168.1.254 > default via 12.255.173.129 dev eth0 > > c696585-b: -root- > # ip neighbor show > > c696585-b: -root- > # ip -s link show > 1: lo: <LOOPBACK,UP> mtu 3924 qdisc noqueue > link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 > RX: bytes packets errors dropped overrun mcast > 0 0 0 0 0 0 > TX: bytes packets errors dropped carrier collsns > 0 0 0 0 0 0 > 2: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100 > link/ether 00:40:05:fa:1b:80 brd ff:ff:ff:ff:ff:ff > RX: bytes packets errors dropped overrun mcast > 25458 409 0 0 0 395 > TX: bytes packets errors dropped carrier collsns > 5568 53 0 0 0 0 > 3: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100 > link/ether 00:40:05:fa:00:52 brd ff:ff:ff:ff:ff:ff > RX: bytes packets errors dropped overrun mcast > 0 0 0 0 0 0 > TX: bytes packets errors dropped carrier collsns > 0 0 0 0 0 0 > > #ZZZZZZZZZZZ > c696585-b: -root- > # cat /etc/networks .conf > ############################################################################ > ### > # Extended firewall configruation scripts > # By Charles Steinkuehler > # Version 1.3.2 > # September 29, 2001 > ############################################################################ > ### > # Brief instructions for this file > ############################################################################ > ### > # > # VERBOSE=(YES/NO) Default: Yes > # Be verbose about settings. > # > # MAX_LOOP=(int) Default: 10 > # Maximum number of incrementable entries to search for. > # IE: If you create a DNS7=, and MAX_LOOP=7, it will not be reached. > # (DNS0 - DNS7 == 8 entires) > # Setting this value too high will decrease the speed of the configuation > # system. > # > # IPFWDING_KERNEL=(YES/NO/FILTER_ON) Default: NO > # Enable IP forwarding in the kernel. FILTER_ON means forwarding will > # only happen when IP filtering rules are loaded > # > # IPALWAYSDEFRAG_KERNEL=(YES/NO) Default: NO > # Enable IP Global defragmentation in the kernel. > # > # **WARNING** - If this was turned on everywhere in a network of routers, > # it can result in TCP connections failing and TCP connection resets. > # > # ONLY turn this on if the box is a firewall or the single point of > # entry for a network, or an endpoint for port forwarding or a load > # balancer for a WWW server farm. DO NOT turn this on if the box is a > # conventional router as it breaks the TCP/IP RFCes. This option is > # needed when using IP NAT, IP masquerading, IP autofw, IP portfw, > # transperent proxying or other kernel operations that intercept a > # packet flow and redirect it. > # > # It is a usful tool when using a packet filtering router to protect > # directly attached ethernet networks of servers as it stops fragment > # attacks on the servers in behind the router. Another use is packet > # filtering router to protect dial-in Internet users on NASes > # (Portmasters, TC racks etc) from various SMB and fragment attacks > # and to redirect all WWW connections into a WWW proxy-caching server. > # > # CONFIG_HOSTNAME=(YES/NO) Default: NO > # Create /etc/hostname file using HOSTNAME entry. > # Any current hostname file will be **OVERWRITTEN** > # > # CONFIG_HOSTSFILE=(YES/NO) Default: NO > # Create /etc/hosts file using HOSTSx entries. > # Any current hosts file will be **OVERWRITTEN** > # > # CONFIG_DNS=(YES/NO) Default: NO > # Create /etc/resolv.conf file using DOMAINS and DNSx entries. > # Any current resolv.conf file will be **OVERWRITTEN** > # > # IF_LIST Default: "$IF_AUTO" > # A space seperated list of interfaces that can be ACTIVE on this machine > # This controls which interfaces can be brought up and down manually. > # > # IF_AUTO Default: "eth0" > # A space seperated list of interfaces that get started on boot. Tunneling > # interfaces like CIPE should be after the raw interfaces they depend on. > # The interfaces are started in the order they occur on the list, and are > # shutdown in the reverse order of IF_LIST. > # > # IPFILTER_SWITCH=(none|router|firewall) Default: "none" > # Selects the basic IP filtering/firewalling setup of the router. "None" > # is used for a straight through router, "router" for a filtering router > with > # IP spoof protection and Martian protection and "firewall" for a basic IP > # masquerading/NAT firewall. The basic filter types are provided in > # /etc/ipfilter.conf. If you want more than what is provided read the man > # pages for ipchains or ipfwadm and BE CAREFUL when you edit this! > # > ############################################################################ > ### > # General Settings > ############################################################################ > ### > > VERBOSE=YES > MAX_LOOP=10 > > IPFWDING_KERNEL=FILTER_ON > > IPALWAYSDEFRAG_KERNEL=YES > > CONFIG_HOSTNAME=YES > > CONFIG_HOSTSFILE=YES > > CONFIG_DNS=NO > > ############################################################################ > ### > # Interfaces > ############################################################################ > ### > > # Start pppd PPP interfaces first as pppd's use of DNS can delay startup. > # > # Interfaces to start on boot go here - ie "ppp0 eth0" > # Do NOT include interfaces configured by dhcp! > IF_AUTO="eth1" > > # List of all configured interfaces, manual start and boot start > IF_LIST="$IF_AUTO" > > # Accept ICMP Redirects on ALL interfaces, also depends on /proc > # per interface IP forwarding flag. - YES/NO > ALLIF_ACCEPT_REDIRECTS=NO > > # Need these both for interfaces run by daemons - ie PPP, CIPE, some > # WAN interfaces > # IP spoofing protection by default for interfaces - YES/NO > DEF_IP_SPOOF=YES > # Kernel logging of spoofed packets by default for interfaces - YES/NO > DEF_IP_KRNL_LOGMARTIANS=YES > > # Bridge Setup - Global stuff > # > # Enable bridging - YES/NO > BRG_SWITCH=NO > # Exempt ethernet protocol types - type "brcfg list" to find out allowed > # values > BRG_EXEMPT_PROTOS="" > > ############################################################################ > ### > > eth0_IPADDR=1.1.1.2 > eth0_MASKLEN=30 > eth0_BROADCAST=+ > # Use this to set the default route if required - ONLY one to be set. > # routed or gated could be used to set this so only use if not running > these. > eth0_DEFAULT_GW=1.1.1.1 > # Secondary IP addresses/networks on same wire - add them here > #eth0_IP_EXTRA_ADDRS="192.168.1.193 192.168.2.1/24" > # Additional routes for this interface, if any > # Space seperated list: <PREFIX>[_<more ip route options>] > #eth0_ROUTES="1.1.1.13 2.2.2.0/24_via_1.1.1.18" > # IP spoofing protection on this interface - YES/NO > eth0_IP_SPOOF=YES > # Kernel logging of spoofed packets on this interface - YES/NO > eth0_IP_KRNL_LOGMARTIANS=YES > # This setting affects the processing of ICMP redirects. Setting it to NO > # makes this more secure. Don't turn this off if you have two IP > # networks/subnets on the same media - YES/NO > eth0_IP_SHARED_MEDIA=NO > # Bridge this interface - YES/NO > eth0_BRIDGE=NO > # Proxy-arp from this interface, no other config required to turn on proxy > ARP! > # - YES/NO > eth0_PROXY_ARP=NO > # Simple QoS/fair queueing support > # Turn on Stochastic Fair Queueing - useful on busy DDS links - YES/NO > eth0_FAIRQ=NO > # Ethernet Transmit Queue Length > # eth0_TXQLEN=100 > # Complex QoS - Enable all of these + above to turn it on > #eth0_BNDWIDTH=10Mbit # Device bandwidth > #eth0_HNDL=2 # Queue Handle - must be unique > #eth0_IABURST=100 # Interactive Burst > #eth0_IARATE=1Mbit # Interactive Rate > #eth0_PXMTU=1514 # Physical MTU - includes Link Layer header > > ############################################################################ > ### > > eth1_IPADDR=192.168.1.254 > eth1_MASKLEN=24 > eth1_BROADCAST=+ > eth1_IP_SPOOF=YES > eth1_IP_KRNL_LOGMARTIANS=YES > eth1_IP_SHARED_MEDIA=NO > eth1_BRIDGE=NO > eth1_PROXY_ARP=NO > eth1_FAIRQ=NO > > ############################################################################ > ### > > #eth2_IPADDR= > #eth2_MASKLEN= > #eth2_BROADCAST=+ > #eth2_ROUTES= > #eth2_IP_SPOOF=YES > #eth2_IP_KRNL_LOGMARTIANS=YES > #eth2_IP_SHARED_MEDIA=NO > #eth2_BRIDGE=NO > #eth2_PROXY_ARP= > #eth2_FAIRQ=NO > > ############################################################################ > ### > # NAT 'virtual' interface (optional: required only for static-NAT DMZ > systems) > ############################################################################ > ### > # Configured as an interface to allow flexible handling of bringing the > # routing rules up/down in conjunction with the physical interfaces > # interface spec is an indexed list of IP address pairs and a base priority > # number for ip rule creation > #nat0_BASE_PRI=100 # Unique base value for ip rules > # Indexed list: <public IP> <private DMZ IP> > #nat0_PAIR0="1.1.2.3 192.168.2.13" > #nat0_PAIR1="1.1.2.4 192.168.2.14" > #nat0_PAIR2="1.1.2.5 192.168.2.15" > > # Sangoma FR example > #fr498_IPADDR=10.0.10.1 > #fr498_PTPADDR=10.0.10.2 > #fr498_IP_SPOOF=YES > #fr498_IP_KRNL_LOGMARTIANS=YES > # Simple QoS support > #fr498_FAIRQ=YES > #fr498_TXQLEN=50 > # Complex FR QoS - Enable ALL of these + above to turn it on > #fr498_FRBURST=960Kbit # FR Burst capacity (a rate) > #fr498_BULKRATE=320Kbit # Usually you set this to the CIR > #fr498_BULKBURST=50 # Number of packets that can burst in bulk class > #fr498_BNDWIDTH=1920Kbit # The bandwidth of the interface > #fr498_IABURST=512 # No of Interactive Burst packets > #fr498_IARATE=640Kbit # Burst capicity bandwith between > # BURST and CIR > #fr498_HNDL=2 # The queue handle - must be unique Dialup PPP is 1000+ > #fr498_PXMTU=1508 # The Physical MTU of the interface (data + MAC header) > > # PPP interface stuff - these apply to all ASYNC ppp interfaces, options > # same as ethernet above. > #ppp_BNDWIDTH=30Kbit > #ppp_FAIRQ=YES > #ppp_TXQLEN=30 > #ppp_IABURST=20 > #ppp_IARATE=10Kbit > #ppp_PXMTU=1500 > > ############################################################################ > ### > # IP Filter setup - can pull in settings from above > ############################################################################ > ### > > # Set up the basic type of filtering. Can be one of (none|router|firewall) > # You must load the ip_masq_* modules to enable full IP masquerading, and > # ip_masq_portfw if you want to forward external ports pop-3, mtp, www > # to internal machines below. > IPFILTER_SWITCH=firewall > > # This set of variables is used with both sets of filters > SNMP_BLOCK=YES # Block all SNMP (YES/NO) > # List of IP Nos used for SNMP management > #SNMP_MANAGER_IPS="10.100.1.2" > # Fair Queuing support > # List of Mark values > MRK_CRIT=1 # Critical traffic, routing, DNS > MRK_IA=2 # Interactive traffic - telnet, ssh, IRC > # List of traffic types and maps to mark values > # Setting this variable turns on the > # fairq chain > CLS_FAIRQ="${MRK_CRIT}_89_0/0 ${MRK_CRIT}_udp_0/0_route > ${MRK_CRIT}_tcp_0/0_bgp ${MRK_CRIT}_tcp_0/0_domain > ${MRK_CRIT}_udp_0/0_domain ${MRK_IA}_tcp_0/0_telnet ${MRK_IA}_tcp_0/0_ssh" > > # NOTE: Do NOT turn on the DMZ network or ANY external port masquerading/ > # port forwarding when EXTERN_DYNADDR is on because some security > # leaks will result. You may also want to limit the external open > # ports to domain (UDP) for DNS. Anyhow, these features are not that > # usable unless you have a static external address > # > EXTERN_IF="eth0" # External Interface > > # Added for DHCP support > # Setting this to YES causes the dhcp client to try to configure the > # interfaces listed in IF_DHCP, and causes EXTERN_IP to be read directly > # from the interfaceB > EXTERN_DHCP=YES # YES/NO > > # The interface(s) to configure via dhcp > IF_DHCP=$EXTERN_IF > > # If YES, your firewall filters use 0/0 for your IP address, instead of your > # actual IP address. Set this to NO for typical ethernet setups, even if > you > # are using DHCP > EXTERN_DYNADDR=NO # YES/NO > # - or - > # External Interface IP number...the default should be fine for most folks > eval EXTERN_IP=\"\${"$EXTERN_IF"_IPADDR:-""}\" > > # Set EXTERN_IP to "DYNAMIC" if you need the rules to read the IP from the > # interface, but you arn't using DHCP (ie PPPoE and dialup users) > #EXTERN_IP=DYNAMIC > > # If external interface IP is dynamic, read the configured IP address > # This should probably be moved to the init.d network script, but I put it > # here for now, as it is more obvious what it is doing, in case it > # messes something else up. > if [ "$EXTERN_DHCP" = "YES" -o \ > "$EXTERN_DHCP" = "Yes" -o \ > "$EXTERN_DHCP" = "yes" -o \ > "$EXTERN_IP" = "DYNAMIC" ] ; then > > # This computes the IP address of $EXTERN_IF > EXTERN_IP=`ip addr list label $EXTERN_IF | \ > grep inet | sed '1!d' | \ > sed 's/^[^.0-9]*\([.0-9]*\).*$/\1/'` > > # If the external address is not configured, use a bogus address for the > # external interface to prevent a bunch of (harmless) errors that spit out > # when the IPCHAINS script is called. > if [ x$EXTERN_IP = x ]; then > EXTERN_IP=192.168.254.254 > fi > fi > > # Traffic to completely ignore...define here to prevent filling your logs > # Space seperated list: protocol_srcip[/mask][_dstport] > #SILENT_DENY="udp_207.235.84.1_route udp_207.235.84.0/24_37" > > # Extra rule scripts added by Charles Steinkuehler to more easily support > # non-standard extentions of the pre-configured ipchains rules > IPCH_IN=/etc/ipchains.input > IPCH_FWD=/etc/ipchains.forward > IPCH_OUT=/etc/ipchains.output > > # ICMP types to open > # Indexed list: "SrcAddr/Mask type [ DestAddr[/DestMask] ]" > #EXTERN_ICMP_PORT0="0/0 : 1.1.1.12" > > ## UDP Services open to outside world > # Space seperated list: srcip/mask_dstport > # NOTE: bootpc port is used for dhcp client > EXTERN_UDP_PORTS="0/0_domain 0/0_bootpc" > > # -or- > # Indexed list: "SrcAddr/Mask port [ DestAddr[/DestMask] ]" > #EXTERN_UDP_PORT0="0/0 domain" > #EXTERN_UDP_PORT1="5.6.7.8 500 1.1.1.12" > > # TCP services open to outside world > # Space seperated list: srcip/mask_dstport > #EXTERN_TCP_PORTS="216.171.153.128/25_ssh 0/0_www 0/0_1023" > > # -or- > # Indexed list: "SrcAddr/Mask port [ DestAddr[/DestMask] ]" > #EXTERN_TCP_PORT0="5.6.7.8 domain 1.1.1.12" > #EXTERN_TCP_PORT1="0/0 www" > > # Generic Services open to outside world > # Space seperated list: protocol_srcip/mask_dstport > #EXTERN_PORTS="50_5.6.7.8 51_5.6.7.8" > > # -or- > # Indexed list: "Protocol SrcAddr/Mask [ DestAddr[/DestMask] ]" > #EXTERN_PROTO0="50 5.6.7.8/32" > #EXTERN_PROTO1="51 5.6.7.8/32" > > ############################################################################ > ### > # Internal Interface > ############################################################################ > ### > # Comment 3 settings below for no internal network (DMZ only configuration) > INTERN_IF="eth1" # Internal Interface > INTERN_NET=192.168.1.0/24 # One (or more) Internal network(s) > INTERN_IP=192.168.1.254 # IP number of Internal Interface > # (to allow forwarding to external IP) > MASQ_SWITCH=YES # Masquerade internal network to outside > # world - YES/NO > > # These services are not masqueraded from int to ext/DMZ, preventing access > # Space seperated list: proto_destIP/mask_port > #NOMASQ_DEST="tcp_0/0_ssh" > > # Override for above...only the listed dest IP's can be accessed > # Space seperated list: proto_destIP/mask_port > #NOMASQ_DEST_BYPASS="tcp_10.0.0.1_ssh" > > ############################################################################ > ### > # Port Forwarding > ############################################################################ > ### > # Remember to open appropriate holes in the firewall rules, above > > # Uncomment following for port-forwarded internal services. > # The following is an example of what should be put here. > # Tuples are as follows: > # <protocol>_<local-ip>_<local-port>_<remote-ip>_<remote-port> > #INTERN_SERVERS="tcp_${EXTERN_IP}_ftp_192.168.1.1_ftp > tcp_${EXTERN_IP}_smtp_192.168.1.1_smtp" > > # These lines use the primary external IP address...if you need to > port-forward > # an aliased IP address, use the INTERN_SERVERS setting above > #INTERN_FTP_SERVER=192.168.1.1 # Internal FTP server to make available > #INTERN_WWW_SERVER=192.168.1.1 # Internal WWW server to make available > #INTERN_SMTP_SERVER=192.168.1.1 # Internal SMTP server to make available > #INTERN_POP3_SERVER=192.168.1.1 # Internal POP3 server to make available > #INTERN_IMAP_SERVER=192.168.1.1 # Internal IMAP server to make available > #INTERN_SSH_SERVER=192.168.1.1 # Internal SSH server to make available > #EXTERN_SSH_PORT=24 # External port to use for internal SSH access > > # Advanced settings: parameters passed directly to portfw and autofw > # Indexed list: "<ipmasqadm portfw options>" > #INTERN_SERVER0="-a -P PROTO -L LADDR LPORT -R RADDR RPORT [-p PREF]" > #INTERN_SERVER1="" > # Indexed list: "<ipmasqadm autofw options>" > #INTERN_AUTOFW0="-A -r tcp 20000 20050 -h 192.168.1.1" > #INTERN_AUTOFW1="" > > ############################################################################ > ### > # DMZ setup (optional) > ############################################################################ > ### > # Whether you want a DMZ or not (YES, PROXY, NAT, PRIVATE, NO) > DMZ_SWITCH=NO > DMZ_IF="eth2" > DMZ_NET=192.168.2.0/24 > > # DMZ switches for all flavors except PRIVATE > ############################################################################ > ### > # For NAT DMZ's: > # DMZ_NET, above is likely a private IP range...DMZ_SRC should encompass the > # public IP range being NAT'd to DMZ_NET. Any systems > DMZ_SRC=1.1.1.0/27 > > # For Proxy-Arp or NAT DMZ's only: > # For security, any IP's within the DMZ_NET (PROXY) or DMZ_SRC (NAT) > # specification, above, that are NOT remote systems reached via DMZ_IF must > # be listed here. This potentially includes IP's of this LRP system, your > # gateway, and systems connected to your external interface. > DMZ_EXT_ADDRS="$eth0_DEFAULT_GW $EXTERN_IP" > > ## Both of the following should be used together - ie if you turn on > ## DMZ_HIGH_TCP_CONNECT - DO specify DMZ_CLOSED_DEST! > > # Allows inbound connections to high tcp ports (>1023) > # You can also allow to specific machines using 1024: (or a smaller range) > # as the dest port range in DMZ_OPEN_DEST (RECOMMENDED) > DMZ_HIGH_TCP_CONNECT=NO > > ## 3306 MySQL, 6000 X, 2049 NFS, 7100 xfs > DMZ_CLOSED_DEST="tcp_${DMZ_NET}_6000:6004 tcp_${DMZ_NET}_7100" > > # Inbound services to allow to the DMZ > # <protocol>_<destination IP/network>_<destination port or range> > DMZ_OPEN_DEST=" udp_${DMZ_NET}_domain > tcp_${DMZ_NET}_domain > icmp_${DMZ_NET}_: > tcp_1.1.2.13_www" > > # PRIVATE DMZ switches > ############################################################################ > ### > # Services port-forwarded to the DMZ network > # Indexed list: "Protocol LocalIP LocalPort RemoteIP [ RemotePort ]" > #DMZ_SERVER0="udp $EXTERN_IP domain 192.168.2.1 domain" > #DMZ_SERVER1="tcp $EXTERN_IP domain 192.168.2.1 domain" > #DMZ_SERVER2="tcp 1.2.3.13 www 192.168.2.1 www" > #DMZ_SERVER3="tcp 1.2.3.13 smtp 192.168.2.1 smtp" > #DMZ_SERVER4="tcp 1.2.3.12 www 192.168.2.1 8080" > > # Allow all outbound traffic from DMZ (YES) > # or just traffic from port-forwarded servers (NO) > #DMZ_OUTBOUND_ALL=YES > > ############################################################################ > ### > # Interface activation/deactivation functions > # Here so that special interface commands can be called and daemons started > # > # Arps can be set up here, network/host routes and so forth. > # > # This appears to be a little messy but is needed to achieve maximum > # functionality and flexibility. > # > ############################################################################ > ### > > echo_rtepfx () { > local IFS='_' > set -- $1 > echo $1 > } > > echo_rteargs () { > local IFS='_' > set -- $1 > shift > echo $@ > } > > # Function to add a static NAT translation > # $1 = Name of environment variable which contains IP address > # $2 = Action (add or del) > # $3 = Base priority value > # $y = Current walklist index count > do_nat () { > local PRIORITY=$(($3 + $y )) > local ACTION=$2 > eval local args=\$$1 > set -- $args > ip route $ACTION nat $1 via $2 > ip rule $ACTION prio $PRIORITY from $2 nat $1 > } > > if_up () { > local ADDR > > # sort out a few things to make life easier - here so that you > # can see what is done and so that you can add anything if needed > eval local IPADDR=\${"$1"_IPADDR:-""} # I am also a good genius > eval local MASKLEN=\${"$1"_MASKLEN:-""} > eval local BROADCAST=\${"$1"_BROADCAST:-""} > eval local PTPADDR=\${"$1"_PTPADDR:-""} > eval local DEFAULT_GW=\${"$1"_DEFAULT_GW:-""} > eval local IP_EXTRA_ADDRS=\${"$1"_IP_EXTRA_ADDRS:-""} > eval local ROUTES=\${"$1"_ROUTES:-""} > eval local FAIRQ=\${"$1"_FAIRQ:-""} > eval local TXQLEN=\${"$1"_TXQLEN:-""} > eval local IP_SPOOF=\${"$1"_IP_SPOOF:-""} > eval local IP_KRNL_LOGMARTIANS=\${"$1"_IP_KRNL_LOGMARTIANS:-""} > eval local IP_SHARED_MEDIA=\${"$1"_IP_SHARED_MEDIA:-""} > eval local BRIDGE=\${"$1"_BRIDGE:-""} > eval local PROXY_ARP=\${"$1"_PROXY_ARP:-""} > if [ -n "$BROADCAST" ] ; then > IFCFG_BROADCAST="broadcast $BROADCAST" > fi > > # Do dee global bridge stuff > brg_global > > # Set default interface flags here - used for PPP and WAN interfaces > if_setproc default rp_filter $DEF_IP_SPOOF > if_setproc default log_martians $DEF_IP_KRNL_LOGMARTIANS > if_setproc all accept_redirects $ALLIF_ACCEPT_REDIRECTS > > # Set up each interface > case $1 in > ppp0) > pppd call provider > ;; > fr*) > wanconfig card wanpipe1 dev $1 start > ip addr add $IPADDR peer $PTPADDR dev $1 > ip link set $1 up > # Fair queuing - this can be selected for any interface > ip_frQoS $1 > ;; > nat*) > eval local BASE_PRI=\${"$1"_BASE_PRI:-""} > walk_list $1_PAIR $INIT_INDEX do_nat add $BASE_PRI > ;; > *) # default interface startup > brg_iface $1 up $BRIDGE > [ -n "$IPADDR" ] \ > && ip addr add $IPADDR/$MASKLEN $IFCFG_BROADCAST dev $1 > for ADDR in $IP_EXTRA_ADDRS; do > ip addr add $ADDR dev $1 > done > > ip link set $1 up > > case "$PROXY_ARP" in > YES|Yes|yes) > ip route flush dev $1 > ;; > *) > ;; > esac > > # Fair queuing - this can be selected for any interface > ip_QoS $1 > ;; > esac > > for route in $ROUTES; do > ip route add `echo_rtepfx $route` dev $1 `echo_rteargs $route` > done > > # Do universal interface config items here > # Default route support > [ -n "$DEFAULT_GW" ] \ > && ip route replace default via $DEFAULT_GW dev $1 > # Set the TX Queue Length > [ -n "$TXQLEN" ] \ > && ip link set $1 txqlen $TXQLEN > # Spoof protection > if_setproc $1 rp_filter $IP_SPOOF > # Kernel logging of martians on this interface > if_setproc $1 log_martians $IP_KRNL_LOGMARTIANS > # Shared Media stuff > if_setproc $1 shared_media $IP_SHARED_MEDIA > # Proxy ARP support > if_setproc $1 proxy_arp $PROXY_ARP > > return 0 > } > > if_down () { > > # Do Dee global bridge stuff > brg_global > > case $1 in > ppp*) > [ -f /var/run/$1.pid ] && qt kill `cat /var/run/$1.pid` > sleep 5 # Wait for pppd to die > ;; > fr*) > qt ip link set $1 down > qt ip addr flush dev $1 > qt wanconfig card wanpipe1 dev $1 stop > ;; > nat*) > eval local BASE_PRI=\${"$1"_BASE_PRI:-""} > walk_list $1_PAIR $INIT_INDEX do_nat del $BASE_PRI > ;; > *) # default action > brg_iface $1 down > ip link set $1 down # This also kills any routes > qt ip addr flush dev $1 > ;; > esac > > # Clean up any QoS/fair queuing stuff > ip_QoSclear $1 > > true > > } #END if_down > > ############################################################################ > ### > # Hostname Requires: CONFIG_HOSTNAME=YES > ############################################################################ > ### > HOSTNAME="c696585-b" > > ############################################################################ > ### > # Hosts file (Static domainname entires) Requires: CONFIG_HOSTSFILE=YES > ############################################################################ > ### > # IP FQDN hostname alias1 alias2.. > HOSTS0="$eth1_IPADDR $HOSTNAME.attbi.com $HOSTNAME fw" > #HOSTS0="$eth1_IPADDR $HOSTNAME.private.network $HOSTNAME fw" > #HOSTS1="192.168.1.22 host2.private.network host2 h2" > > ############################################################################ > ### > # Domain Search Order and Name Servers Requires: CONFIG_DNS=YES > ############################################################################ > ### > > DOMAINS="private.network" > > DNS0=127.0.0.1 > #DNS0=Your.Primary.DNS.Server > #DNS1=Your.Secondary.DNS.Server > > ############################################################################ > ### > # QoS/Fariqueing functions > ############################################################################ > ### > > ip_QoSclear () { > [ -x /sbin/tc ] \ > && qt tc qdisc del dev $1 root > return 0 > } > > ip_frQoS () { > > # Set some vaiables > eval local FAIRQ=\${"$1"_FAIRQ:-""} > eval local BULKRATE=\${"$1"_BULKRATE:-""} > eval local BULKBURST=\${"$1"_BULKBURST:-""} > eval local FRBURST=\${"$1"_FRBURST:-""} > eval local HNDL=\${"$1"_HNDL:-""} > eval local BNDWIDTH=\${"$1"_BNDWIDTH:-""} > eval local IARATE=\${"$1"_IARATE:-""} > eval local IABURST=\${"$1"_IABURST:-""} > eval local PXMTU=\${"$1"_PXMTU:-""} > > > if [ ! -x /sbin/tc ]; then > return 1 > fi > > if [ "$FAIRQ" != "YES" -a "$FAIRQ" != "Yes" -a "$FAIRQ" != "yes" ] > then > return 1 > fi > > if [ -z "$BULKRATE" -o -z "$FRBURST" -o -z "$HNDL" -o -z "$PXMTU" \ > -o -z "$BNDWIDTH" -o -z "$IARATE" -o -z "$IABURST" \ > -o -z "$BULKBURST" ]; then > tc qdisc replace dev $1 root sfq > return 0 > fi > > # Attach CBQ to device > tc qdisc add dev $1 root handle $HNDL: cbq \ > bandwidth $BNDWIDTH avpkt 1000 > # Set up classes > # Bulk class > tc class add dev $1 parent $HNDL:0 classid :1 \ > est 1sec 8sec cbq bandwidth $BNDWIDTH \ > rate $BULKRATE allot $PXMTU bounded weight 1 prio 6 \ > avpkt 1000 maxburst $BULKBURST \ > split $HNDL:0 defmap ff7f > tc qdisc add dev $1 parent $HNDL:1 sfq perturb 15 > # Interactive Class > tc class add dev $1 parent $HNDL:0 classid :2 \ > est 2sec 16sec cbq bandwidth $BNDWIDTH \ > rate $IARATE allot $PXMTU bounded weight 1 prio 6 \ > avpkt 1000 maxburst $IABURST \ > split $HNDL:0 defmap 80 > tc qdisc add dev $1 parent $HNDL:2 sfq perturb 15 > # Priority class > tc class add dev $1 parent $HNDL:0 classid :3 \ > est 1sec 8sec cbq bandwidth $BNDWIDTH \ > rate $FRBURST allot $PXMTU bounded weight 1 prio 1 \ > avpkt 1000 maxburst 21 > tc qdisc add dev $1 parent $HNDL:3 pfifo > # Add filters > tc filter add dev $1 parent $HNDL:0 protocol ip \ > priority 50 handle $MRK_CRIT fw classid $HNDL:3 > tc filter add dev $1 parent $HNDL:0 protocol ip \ > priority 60 handle $MRK_IA fw classid $HNDL:2 > > return 0 > } > > ip_QoS () { > > # Set some vaiables > eval local HNDL=\${"$1"_HNDL:-""} > eval local FAIRQ=\${"$1"_FAIRQ:-""} > if [ -z "$FAIRQ" -a -n "$2" ]; then > local FAIRQ=$2 > fi > eval local BNDWIDTH=\${"$1"_BNDWIDTH:-""} > if [ -z "$BNDWIDTH" -a -n "$3" ]; then > local BNDWIDTH=$3 > fi > eval local PXMTU=\${"$1"_PXMTU:-""} > if [ -z "$PXMTU" -a -n "$4" ]; then > local PXMTU=$4 > fi > eval local IARATE=\${"$1"_IARATE:-""} > if [ -z "$IARATE" -a -n "$5" ]; then > local IARATE=$5 > fi > eval local IABURST=\${"$1"_IABURST:-""} > if [ -z "$IABURST" -a -n "$6" ]; then > local IABURST=$6 > fi > > if [ ! -x /sbin/tc ]; then > return 1 > fi > > if [ "$FAIRQ" != "YES" -a "$FAIRQ" != "Yes" -a "$FAIRQ" != "yes" ] > then > return 1 > fi > > if [ -z "$BNDWIDTH" -o -z "$IABURST" -o -z "$IARATE" -o -z "$HNDL" \ > -o -z "$PXMTU" ]; then > tc qdisc replace dev $1 root sfq > return 0 > fi > > # Attach CBQ to device > tc qdisc add dev $1 root handle $HNDL: cbq \ > bandwidth $BNDWIDTH \ > avpkt 1000 > # Set up classes > # Bulk class > tc class add dev $1 parent $HNDL:0 classid :1 est 1sec 8sec \ > cbq bandwidth $BNDWIDTH rate $BNDWIDTH \ > allot $PXMTU avpkt 1000 bounded weight 1 prio 6 \ > split $HNDL:0 defmap ff7f > tc qdisc add dev $1 parent $HNDL:1 sfq perturb 15 > # Interactive class > tc class add dev $1 parent $HNDL:0 classid :2 est 2sec 16sec \ > cbq bandwidth $BNDWIDTH rate $IARATE maxburst $IABURST \ > allot $PXMTU avpkt 1000 bounded isolated weight 1 \ > prio 2 split $HNDL:0 defmap 80 > tc qdisc add dev $1 parent $HNDL:2 sfq perturb 15 > # Priority class > tc class add dev $1 parent $HNDL:0 classid :3 est 1sec 8sec \ > cbq bandwidth $BNDWIDTH rate $BNDWIDTH \ > allot $PXMTU avpkt 1000 bounded weight 1 prio 1 > tc qdisc add dev $1 parent $HNDL:3 pfifo > # Add filters > tc filter add dev $1 parent $HNDL:0 protocol ip \ > priority 50 handle $MRK_CRIT fw classid $HNDL:3 > tc filter add dev $1 parent $HNDL:0 protocol ip \ > priority 60 handle $MRK_IA fw classid $HNDL:2 \ > > return 0 > } > > ############################################################################ > ### > # End > ############################################################################ > ### > > #ZZZZZZZZZZZ > c696585-b: -root- > # cat /etc/lrp.conf > #This is the master config file for systemwide LRP functions. > #It is referenced by multicron-* and POSIXness. > > > # Log files in /var/log/ to rotate. DEPTH == Amount to keep. > lrp_LOGS_DAILY="daemon.log debug kern.log messages syslog user.log \ > ppp.log pslave.log" > lrp_LOGS_WEEKLY="auth.log lastlog" > lrp_LOGS_MONTHLY="wtmp" > lrp_LOGS_DEPTH=4 > > # Host SMTP server for the 'mail' command. If blank the host 'mail' is used. > #lrp_MAIL_SERVER="smtp.mydomain.net" > > # Email address to use for notices and alerts. If blank alerts won't be > sent. > #lrp_MAIL_ADMIN="[EMAIL PROTECTED]" > > # Server that will be contacted via 'rdate' for the time service daily. > # Turning this on also updates the CMOS clock > #lrp_DATE_SERVER="date.mydomain.net" > > # List of hosts to ping check. ADMIN will be sent mail if any fail. > #lrp_PING_HOSTS="router1.upstream.com server2.theirnet.org" > > > # SPACECHECK, will check the space available on the root device. > # If the remaining free space is <= MINKB or <= MINPER, each level > # of file mask(s) will be wiped, until the minimum available space > # is met or level 5 is reached. Files are individually null'ed > # to 0 size. They are not rm'ed. (syslogd will not be interrupted) > # When the level set in MAIL_LEVEL, is reached or exceeded, an > # alert will be sent to ADMIN. (If set) > > lrp_SPACECHECK=NO # YES or NO > lrp_SC_MINKB=-1 # <= -1 to disable. > lrp_SC_MINPER=2 # >= 101 to disable. Default 2%. > lrp_SC_MAIL_LEVEL=2 # >= 6 to disable. > > lrp_SC_DEL_L1="/var/log/*[4-9].gz" > lrp_SC_DEL_L2="/var/log/*[1-3].gz" > lrp_SC_DEL_L3="/var/log/*.gz" > lrp_SC_DEL_L4="/var/log/*.0" > lrp_SC_DEL_L5="/var/log/wtmp" > > > #ZZZZZZZZZZZ > c696585-b: -root- > # cat /etc/dhclient.conf > # Defaults are OK for most users > # > # You may have to send a specific host-name or dhcp-client-identifier to > # your ISP, depending on how they assign leases. Note that some ISP's > # assign leases based on physical ethernet addresses, so you may have to use > # the interface priovided by your ISP (or ask them to update their records > to > # match your 'new' network card) in order to use dhcp, even though you might > # be able to ping or otherwise send data through your network connection. > # Other ISP's use cable and DSL modems that check for the physical address > # of your network card and you won't even be able to ping through the > interface > # (or aquire a dhcp lease) without swapping network cards, resetting your > # modem, or perhaps jumping through other hoops. Check with a local linux > # group to get details on service providers in your area. > # > # If you do need to send a specific host-name or dhcp-client-identifier, > # you can uncomment the appropriate lines below, and change the parameters > # to match your system > > #send host-name "c696585-b"; > > # Both forms below are identical. Use whichever is most appropriate > # for the client-identifier you need to send (ascii or colon seperated > # hexadicemal octets) > # send dhcp-client-identifier 43:4c:49:45:4e:54:2d:46:4f:4f; > # send dhcp-client-identifier "CLIENT-FOO"; > > # See the ISC dhcp documentation for more details on this file > > # Use local DNSCache by default for DNS resolution > prepend domain-name-servers 127.0.0.1 ; > > > > > > > > _________________________________________________________ > Do You Yahoo!? > Get your free @yahoo.com address at http://mail.yahoo.com > > > _______________________________________________ > Leaf-user mailing list > [EMAIL PROTECTED] > https://lists.sourceforge.net/lists/listinfo/leaf-user > _________________________________________________________ Do You Yahoo!? Get your free @yahoo.com address at http://mail.yahoo.com _______________________________________________ Leaf-user mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/leaf-user