Hi Larry,
        Thanks alot for the quick attention and response.  I did that and got
no message about the proxy arp.  Alas, also no response to "pon".  It
still also is assigning IPs in the 10.XXX.XXX.XXX ranges, when it seems
to this ignorant eye that they should be 192.168.1.XXXs.  

I am also including some config files that I probably should have
before.

I probably hosed this one up
# /etc/network/interfaces -- configuration file for LEAF network
# J. Nilo, April 2002
#
# Loopback interface.
auto lo eth0
iface lo inet loopback

# Step 1: configure external interface
#         uncomment/adjust one of the following 4 options
--comments snipped
# Option 1.4: PPP modem
#auto ppp0
iface ppp0 inet ppp
        provider provider
        
# Step 2: configure  internal interface
# Default: eth1 / fixed IP = 192.168.1.254
#auto eth1
iface eth0 inet static
        address 192.168.1.254
        masklen 24
        broadcast 192.168.1.255
--snip--

# /etc/ppp/options
debug
asyncmap 0
auth
crtscts
lock
hide-password
modem
# proxyarp
lcp-echo-interval 30
lcp-echo-failure 4
noipx
demand
idle 600

/etc/chatscripts/provider
# ISP login script
# What follows is OK for Compuserve
# Adjust to your taste
ABORT "BUSY"
ABORT "NO CARRIER"
ABORT "VOICE"
ABORT "NO DIALTONE" 
ABORT "NO ANSWER"
"" ATZ
# ISP telephone number: 2583320
OK ATDT2583320#
CONNECT '' 
Name: Highstream
# With compuserve your_login_account=12345,6789
#ID: your_login_account/go:pppconnect
#Password: your_password
#PPP

/etc/ppp/peers/provider
# ISP pppd options file
# What follows is OK for Compuserve
#
noauth
debug           # log transaction to /var/log/messages     
/dev/ttyS0      # (ttyS0=com1, ttyS1=com2, ...)
115200          # baud  rate
modem
crtscts         # use hardware flow control
asyncmap 0
defaultroute    # ppp becomes default route to the internet
noipdefault
lock            # don't let other processes besides PPP use the device      
name [EMAIL PROTECTED]
connect "/usr/sbin/chat -v -f /etc/chatscripts/provider"

On Thu, 2002-10-31 at 19:14, Larry Platzek wrote:
> Hi Keith,
> As a quick fix try dropping or commentting out the proxyarp statment in
> the ppp configuration file (/etc/ppp/options).
> I will try to configure Bering-1.0-rc4 again (missplaced the disk).
> I do have another variation running  based on Bering-1.0-rc4,
> and do have pppd demand dialing working.
> Let me know if this fixes problem or not.
> I meant to get this version working again.
> 
> Larry Platzek  [EMAIL PROTECTED]
> 
> 
> On 31 Oct 2002, Keith Iosso wrote:
> 
> > Date: 31 Oct 2002 18:15:46 -0800
> > From: Keith Iosso <[EMAIL PROTECTED]>
> > To: [EMAIL PROTECTED]
> > Cc: Keith Iosso <[EMAIL PROTECTED]>
> > Subject: [leaf-user] Bering 1.0-rc4 Serial Modem - proxy arp ethernet
> >     address
> >
> > Hello,
> >     I am inexpressably grateful to those who have taken the time to develop
> > these products and give their valuable time to helping ignorami like
> > myself.
> >
> > I have followed the instructions to the best of my abilities to setup a
> > serial modem following section 2 of the user's guide.  I want it to
> > operate on demand.
> >
> > When PPP starts it announces that it "Cannot determine ethernet address
> > for proxy ARP" and never even starts to dial.
> >
> > Please help me fix this.
> >
> > I modified the base setup by adding a "-v" to /etc/init.d/networking and
> > "debug" to /etc/ppp/options, but I don't see any more messages in
> > /var/log/syslog.  when doing "pon" or "poff".
> >
> > My pings from the internal workstation aren't working either as
> > described below, but I think that it is a routing problem with the
> > workstation and I want to solve this first.
> >
> > Please let me know if more info would be helpful.
> >
> > Thanks to all for your attention,
> > Keith
> >
> > uname -a:
> > Linux firewall 2.4.18 #6 Sun Oct 20 15:06:22 CEST 2002 i486 unknown
> >
> > ip addr show:
> > 1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
> >     link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
> >     inet 127.0.0.1/8 brd 127.255.255.255 scope host lo
> > 2: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop
> >     link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
> > 3: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
> >     link/ether 00:a0:24:a3:49:e5 brd ff:ff:ff:ff:ff:ff
> >     inet 192.168.1.254/24 brd 192.168.1.255 scope global eth0
> >
> > ip route show:
> > 192.168.1.0/24 dev eth0  proto kernel  scope link  src 192.168.1.254
> >
> > /var/log/messages:
> > May 29 06:42:33 firewall syslogd 1.3-3#31.slink1: restart.
> >
> > /var/log/syslog
> > May 29 06:42:33 firewall syslogd 1.3-3#31.slink1: restart.
> > May 29 06:45:01 firewall /USR/SBIN/CRON[27396]: (root) CMD (/etc/multicron-p)
> > May 29 06:45:03 firewall /USR/SBIN/CRON[16046]: (root) MAIL (mailed 12 bytes of 
>output but got status 0x0001 )
> > May 29 07:00:01 firewall /USR/SBIN/CRON[17223]: (root) CMD (/etc/multicron-p)
> > May 29 07:00:02 firewall /USR/SBIN/CRON[31538]: (root) MAIL (mailed 12 bytes of 
>output but got status 0x0001 )
> > May 29 07:01:39 firewall pppd[12602]: pppd 2.4.1 started by root, uid 0
> > May 29 07:01:39 firewall pppd[12602]: Using interface ppp0
> > May 29 07:01:39 firewall pppd[12602]: Cannot determine ethernet address for proxy 
>ARP
> > May 29 07:01:39 firewall pppd[12602]: local  IP address 10.64.64.64
> > May 29 07:01:39 firewall pppd[12602]: remote IP address 10.112.112.112
> > May 29 07:07:01 firewall pppd[12602]: Terminating on signal 15.
> > May 29 07:07:02 firewall pppd[12602]: Exit.
> > May 29 07:12:37 firewall kernel: VFS: Disk change detected on device fd(2,28)
> > May 29 07:15:01 firewall /USR/SBIN/CRON[20465]: (root) CMD (/etc/multicron-p)
> > May 29 07:15:02 firewall /USR/SBIN/CRON[28584]: (root) MAIL (mailed 12 bytes of 
>output but got status 0x0001 )
> > more similar entries deleted
> >
> > Ping:
> > 192.168.1.254->192.168.1.1 nothing appears onscreen until ctrl-c pressed,
> > then all failures reported.  BOTH LEDs on hub flicker periodically.
> > Classic type 1 failure
> > 192.168.1.1->192.168.1.254 repeats "Destination host unreachable" and only
> > the LED for 192.168.1.1 flickers.
> > exact wording not listed, but might be a type 2 failure.
> >
> > ip_masq, ipmasqadm: not found
> >
> > iptables -nvL:
> > Chain INPUT (policy DROP 0 packets, 0 bytes)
> >  pkts bytes target     prot opt in     out     source               destination
> >   148 15064 ACCEPT     ah   --  lo     *       0.0.0.0/0            0.0.0.0/0
> >     0     0 ppp0_in    ah   --  ppp0   *       0.0.0.0/0            0.0.0.0/0
> >     0     0 eth0_in    ah   --  eth0   *       0.0.0.0/0            0.0.0.0/0
> >     0     0 common     ah   --  *      *       0.0.0.0/0            0.0.0.0/0
> >     0     0 LOG        ah   --  *      *       0.0.0.0/0            0.0.0.0/0      
>    LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:'
> >     0     0 reject     ah   --  *      *       0.0.0.0/0            0.0.0.0/0
> >
> > Chain FORWARD (policy DROP 0 packets, 0 bytes)
> >  pkts bytes target     prot opt in     out     source               destination
> >     0     0 ppp0_fwd   ah   --  ppp0   *       0.0.0.0/0            0.0.0.0/0
> >     0     0 eth0_fwd   ah   --  eth0   *       0.0.0.0/0            0.0.0.0/0
> >     0     0 common     ah   --  *      *       0.0.0.0/0            0.0.0.0/0
> >     0     0 LOG        ah   --  *      *       0.0.0.0/0            0.0.0.0/0      
>    LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:'
> >     0     0 reject     ah   --  *      *       0.0.0.0/0            0.0.0.0/0
> >
> > Chain OUTPUT (policy DROP 0 packets, 0 bytes)
> >  pkts bytes target     prot opt in     out     source               destination
> >     0     0 DROP       icmp --  *      *       0.0.0.0/0            0.0.0.0/0      
>    state INVALID
> >   148 15064 ACCEPT     ah   --  *      lo      0.0.0.0/0            0.0.0.0/0
> >    94  7896 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0      
>    state NEW,RELATED,ESTABLISHED
> >     0     0 fw2net     ah   --  *      ppp0    0.0.0.0/0            0.0.0.0/0
> >     0     0 all2all    ah   --  *      eth0    0.0.0.0/0            0.0.0.0/0
> >     0     0 common     ah   --  *      *       0.0.0.0/0            0.0.0.0/0
> >     0     0 LOG        ah   --  *      *       0.0.0.0/0            0.0.0.0/0      
>    LOG flags 0 level 6 prefix `Shorewall:OUTPUT:REJECT:'
> >     0     0 reject     ah   --  *      *       0.0.0.0/0            0.0.0.0/0
> >
> > Chain all2all (3 references)
> >  pkts bytes target     prot opt in     out     source               destination
> >     0     0 ACCEPT     ah   --  *      *       0.0.0.0/0            0.0.0.0/0      
>    state RELATED,ESTABLISHED
> >     0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0      
>    state NEW tcp flags:!0x16/0x02
> >     0     0 common     ah   --  *      *       0.0.0.0/0            0.0.0.0/0
> >     0     0 LOG        ah   --  *      *       0.0.0.0/0            0.0.0.0/0      
>    LOG flags 0 level 6 prefix `Shorewall:all2all:REJECT:'
> >     0     0 reject     ah   --  *      *       0.0.0.0/0            0.0.0.0/0
> >
> > Chain common (5 references)
> >  pkts bytes target     prot opt in     out     source               destination
> >     0     0 icmpdef    icmp --  *      *       0.0.0.0/0            0.0.0.0/0
> >     0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0      
>    state INVALID
> >     0     0 REJECT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0      
>    udp dpts:137:139 reject-with icmp-port-unreachable
> >     0     0 REJECT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0      
>    udp dpt:445 reject-with icmp-port-unreachable
> >     0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0      
>    tcp dpt:135
> >     0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0      
>    udp dpt:1900
> >     0     0 DROP       ah   --  *      *       0.0.0.0/0            255.255.255.255
> >     0     0 DROP       ah   --  *      *       0.0.0.0/0            224.0.0.0/4
> >     0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0      
>    tcp dpt:113
> >     0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0      
>    udp spt:53 state NEW
> >     0     0 DROP       ah   --  *      *       0.0.0.0/0            192.168.1.255
> >
> > Chain dynamic (4 references)
> >  pkts bytes target     prot opt in     out     source               destination
> >
> > Chain eth0_fwd (1 references)
> >  pkts bytes target     prot opt in     out     source               destination
> >     0     0 dynamic    ah   --  *      *       0.0.0.0/0            0.0.0.0/0
> >     0     0 loc2net    ah   --  *      ppp0    0.0.0.0/0            0.0.0.0/0
> >
> > Chain eth0_in (1 references)
> >  pkts bytes target     prot opt in     out     source               destination
> >     0     0 dynamic    ah   --  *      *       0.0.0.0/0            0.0.0.0/0
> >     0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0      
>    icmp type 8
> >     0     0 loc2fw     ah   --  *      *       0.0.0.0/0            0.0.0.0/0
> >
> > Chain fw2net (1 references)
> >  pkts bytes target     prot opt in     out     source               destination
> >     0     0 ACCEPT     ah   --  *      *       0.0.0.0/0            0.0.0.0/0      
>    state RELATED,ESTABLISHED
> >     0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0      
>    state NEW tcp flags:!0x16/0x02
> >     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0      
>    state NEW tcp dpt:53
> >     0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0      
>    state NEW udp dpt:53
> >     0     0 all2all    ah   --  *      *       0.0.0.0/0            0.0.0.0/0
> >
> > Chain icmpdef (1 references)
> >  pkts bytes target     prot opt in     out     source               destination
> >     0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0      
>    icmp type 8
> >
> > Chain loc2fw (1 references)
> >  pkts bytes target     prot opt in     out     source               destination
> >     0     0 ACCEPT     ah   --  *      *       0.0.0.0/0            0.0.0.0/0      
>    state RELATED,ESTABLISHED
> >     0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0      
>    state NEW tcp flags:!0x16/0x02
> >     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0      
>    state NEW tcp dpt:22
> >     0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0      
>    state NEW udp dpt:53
> >     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0      
>    state NEW tcp dpt:80
> >     0     0 all2all    ah   --  *      *       0.0.0.0/0            0.0.0.0/0
> >
> > Chain loc2net (1 references)
> >  pkts bytes target     prot opt in     out     source               destination
> >     0     0 ACCEPT     ah   --  *      *       0.0.0.0/0            0.0.0.0/0      
>    state RELATED,ESTABLISHED
> >     0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0      
>    state NEW tcp flags:!0x16/0x02
> >     0     0 ACCEPT     ah   --  *      *       0.0.0.0/0            0.0.0.0/0
> >
> > Chain net2all (2 references)
> >  pkts bytes target     prot opt in     out     source               destination
> >     0     0 ACCEPT     ah   --  *      *       0.0.0.0/0            0.0.0.0/0      
>    state RELATED,ESTABLISHED
> >     0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0      
>    state NEW tcp flags:!0x16/0x02
> >     0     0 common     ah   --  *      *       0.0.0.0/0            0.0.0.0/0
> >     0     0 LOG        ah   --  *      *       0.0.0.0/0            0.0.0.0/0      
>    LOG flags 0 level 6 prefix `Shorewall:net2all:DROP:'
> >     0     0 DROP       ah   --  *      *       0.0.0.0/0            0.0.0.0/0
> >
> > Chain newnotsyn (5 references)
> >  pkts bytes target     prot opt in     out     source               destination
> >     0     0 DROP       ah   --  *      *       0.0.0.0/0            0.0.0.0/0
> >
> > Chain ppp0_fwd (1 references)
> >  pkts bytes target     prot opt in     out     source               destination
> >     0     0 dynamic    ah   --  *      *       0.0.0.0/0            0.0.0.0/0
> >     0     0 net2all    ah   --  *      eth0    0.0.0.0/0            0.0.0.0/0
> >
> > Chain ppp0_in (1 references)
> >  pkts bytes target     prot opt in     out     source               destination
> >     0     0 dynamic    ah   --  *      *       0.0.0.0/0            0.0.0.0/0
> >     0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0      
>    icmp type 8
> >     0     0 net2all    ah   --  *      *       0.0.0.0/0            0.0.0.0/0
> >
> > Chain reject (6 references)
> >  pkts bytes target     prot opt in     out     source               destination
> >     0     0 REJECT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0      
>    reject-with tcp-reset
> >     0     0 REJECT     ah   --  *      *       0.0.0.0/0            0.0.0.0/0      
>    reject-with icmp-port-unreachable
> >
> > Chain shorewall (0 references)
> >  pkts bytes target     prot opt in     out     source               destination
> >
> >
> >
> >
> > -------------------------------------------------------
> > This sf.net email is sponsored by: Influence the future
> > of Java(TM) technology. Join the Java Community
> > Process(SM) (JCP(SM)) program now.
> > http://ads.sourceforge.net/cgi-bin/redirect.pl?sunm0004en
> > ------------------------------------------------------------------------
> > leaf-user mailing list: [EMAIL PROTECTED]
> > https://lists.sourceforge.net/lists/listinfo/leaf-user
> > SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html
> >
> 
> 




-------------------------------------------------------
This sf.net email is sponsored by: Influence the future 
of Java(TM) technology. Join the Java Community 
Process(SM) (JCP(SM)) program now. 
http://ads.sourceforge.net/cgi-bin/redirect.pl?sunm0004en
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to