I am a fairly new user to bering, but have used LRP in the past.   I am
currently running bering 1.0 - rc4 on a pentium 200 w/ internal Intel
ethernet adapter, PCI 3com Etherlink XL,  & more than enough ram..

My question / problem is i have noticed that different machines are
getting drastically different throughput going through my Firewall /
Router to my att cablem-modem, and can't seem to find what is causing it.

For example (using http://bandwidthplace.com/speedtest/)

192.168.1.1: 184 kbps
192.168.1.2: 804 kbps
192.168.1.5: 338 kbps

I get simiar results from any other external website.

I am running a nice little utility (du-meter) on my win2k boxes and it
shows, for example, that 192.168.1.5 is bandwidth cap'd at ~ 400kbps when
i access an external website.  Basically showing, a nice smooth plateau. 
Internally, i am able to get 70+Mbps.

All machines are connected through a switch to the firewall/router, and i
have checked all cables, connections, ports, duplex, etc..  And all tests
were done individually when the lan was quiet.

Basically, I have exhausted all other posibilities, and have come to
believe that the router (hardware or software) or beyond could be
responsible for this.

Does the leaf default diskette include bandwith limiting?   Does attbi use
some fancy bandwidth cap when you have mulitple clients connecting through
a router?  Does my P-200 machine need to be thrown out the window and
replaced w/ a faster box?

Below i have included some output from the weblet stats and config.

Any help/insight would be greatly appreciated.

Thanks in advance.

-N








::Statistics::
1: lo:  mtu 16436 qdisc noqueue
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    RX: bytes  packets  errors  dropped overrun mcast
    0          0        0       0       0       0
    TX: bytes  packets  errors  dropped carrier collsns
    0          0        0       0       0       0
2: dummy0:  mtu 1500 qdisc noop
    link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast
    0          0        0       0       0       0
    TX: bytes  packets  errors  dropped carrier collsns
    0          0        0       0       0       0
3: eth0:  mtu 1500 qdisc pfifo_fast qlen 100
    link/ether 00:a0:c9:49:4b:d8 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast
    6272575    6165     0       0       0       0
    TX: bytes  packets  errors  dropped carrier collsns
    280533     3396     0       0       0       0
4: eth1:  mtu 1500 qdisc pfifo_fast qlen 100
    link/ether 00:10:5a:15:15:f1 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast
    309834     3434     0       0       0       0
    TX: bytes  packets  errors  dropped carrier collsns
    6192803    5276     0       0       0       12

:: Firewall Rules::

Shorewall-1.3.9b Chain  at  - Mon Nov 11 21:11:34 UTC 2002

Chain INPUT (policy DROP 5 packets, 834 bytes)
 pkts bytes target     prot opt in     out     source              
destination

    0     0 ACCEPT     ah   --  lo     *       0.0.0.0/0            0.0.0.0/0

    0     0 eth0_in    ah   --  eth0   *       0.0.0.0/0            0.0.0.0/0

    0     0 eth1_in    ah   --  eth1   *       0.0.0.0/0            0.0.0.0/0

    0     0 common     ah   --  *      *       0.0.0.0/0            0.0.0.0/0

    0     0 LOG        ah   --  *      *       0.0.0.0/0            0.0.0.0/0
       LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:'
    0     0 reject     ah   --  *      *       0.0.0.0/0            0.0.0.0/0


Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source              
destination

    0     0 eth0_fwd   ah   --  eth0   *       0.0.0.0/0            0.0.0.0/0

    0     0 eth1_fwd   ah   --  eth1   *       0.0.0.0/0            0.0.0.0/0

    0     0 common     ah   --  *      *       0.0.0.0/0            0.0.0.0/0

    0     0 LOG        ah   --  *      *       0.0.0.0/0            0.0.0.0/0
       LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:'
    0     0 reject     ah   --  *      *       0.0.0.0/0            0.0.0.0/0


Chain OUTPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source              
destination

    0     0 DROP       icmp --  *      *       0.0.0.0/0            0.0.0.0/0
       state INVALID
    0     0 ACCEPT     udp  --  *      eth0    0.0.0.0/0            0.0.0.0/0
       udp dpts:67:68
    0     0 ACCEPT     ah   --  *      lo      0.0.0.0/0            0.0.0.0/0

    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0
       state NEW,RELATED,ESTABLISHED
    0     0 fw2net     ah   --  *      eth0    0.0.0.0/0            0.0.0.0/0

    0     0 all2all    ah   --  *      eth1    0.0.0.0/0            0.0.0.0/0

    0     0 common     ah   --  *      *       0.0.0.0/0            0.0.0.0/0

    0     0 LOG        ah   --  *      *       0.0.0.0/0            0.0.0.0/0
       LOG flags 0 level 6 prefix `Shorewall:OUTPUT:REJECT:'
    0     0 reject     ah   --  *      *       0.0.0.0/0            0.0.0.0/0


Chain all2all (3 references)
 pkts bytes target     prot opt in     out     source              
destination

    0     0 ACCEPT     ah   --  *      *       0.0.0.0/0            0.0.0.0/0
       state RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0
       state NEW tcp flags:!0x16/0x02
    0     0 common     ah   --  *      *       0.0.0.0/0            0.0.0.0/0

    0     0 LOG        ah   --  *      *       0.0.0.0/0            0.0.0.0/0
       LOG flags 0 level 6 prefix `Shorewall:all2all:REJECT:'
    0     0 reject     ah   --  *      *       0.0.0.0/0            0.0.0.0/0


Chain common (5 references)
 pkts bytes target     prot opt in     out     source              
destination

    0     0 icmpdef    icmp --  *      *       0.0.0.0/0            0.0.0.0/0

    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0
       state INVALID
    0     0 REJECT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0
       udp dpts:137:139 reject-with icmp-port-unreachable
    0     0 REJECT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0
       udp dpt:445 reject-with icmp-port-unreachable
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0
       tcp dpt:135
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0
       udp dpt:1900
    0     0 DROP       ah   --  *      *       0.0.0.0/0           
255.255.255.
255
    0     0 DROP       ah   --  *      *       0.0.0.0/0           
224.0.0.0/4

    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0
       tcp dpt:113
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0
       udp spt:53 state NEW
    0     0 DROP       ah   --  *      *       0.0.0.0/0           
255.255.255.
255
    0     0 DROP       ah   --  *      *       0.0.0.0/0           
192.168.1.25
5

Chain dynamic (4 references)
 pkts bytes target     prot opt in     out     source              
destination


Chain eth0_fwd (1 references)
 pkts bytes target     prot opt in     out     source              
destination

    0     0 dynamic    ah   --  *      *       0.0.0.0/0            0.0.0.0/0

    0     0 net2all    ah   --  *      eth1    0.0.0.0/0            0.0.0.0/0


Chain eth0_in (1 references)
 pkts bytes target     prot opt in     out     source              
destination

    0     0 dynamic    ah   --  *      *       0.0.0.0/0            0.0.0.0/0

    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0
       udp dpts:67:68
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0
       icmp type 8
    0     0 net2all    ah   --  *      *       0.0.0.0/0            0.0.0.0/0


Chain eth1_fwd (1 references)
 pkts bytes target     prot opt in     out     source              
destination

    0     0 dynamic    ah   --  *      *       0.0.0.0/0            0.0.0.0/0

    0     0 loc2net    ah   --  *      eth0    0.0.0.0/0            0.0.0.0/0


Chain eth1_in (1 references)
 pkts bytes target     prot opt in     out     source              
destination

    0     0 dynamic    ah   --  *      *       0.0.0.0/0            0.0.0.0/0

    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0
       icmp type 8
    0     0 loc2fw     ah   --  *      *       0.0.0.0/0            0.0.0.0/0


Chain fw2net (1 references)
 pkts bytes target     prot opt in     out     source              
destination

    0     0 ACCEPT     ah   --  *      *       0.0.0.0/0            0.0.0.0/0
       state RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0
       state NEW tcp flags:!0x16/0x02
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0
       state NEW tcp dpt:53
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0
       state NEW udp dpt:53
    0     0 all2all    ah   --  *      *       0.0.0.0/0            0.0.0.0/0


Chain icmpdef (1 references)
 pkts bytes target     prot opt in     out     source              
destination

    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0
       icmp type 8

Chain loc2fw (1 references)
 pkts bytes target     prot opt in     out     source              
destination

    0     0 ACCEPT     ah   --  *      *       0.0.0.0/0            0.0.0.0/0
       state RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0
       state NEW tcp flags:!0x16/0x02
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0
       state NEW tcp dpt:22
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0
       state NEW udp dpt:53
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0
       state NEW tcp dpt:80
    0     0 all2all    ah   --  *      *       0.0.0.0/0            0.0.0.0/0


Chain loc2net (1 references)
 pkts bytes target     prot opt in     out     source              
destination

    0     0 ACCEPT     ah   --  *      *       0.0.0.0/0            0.0.0.0/0
       state RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0
       state NEW tcp flags:!0x16/0x02
    0     0 ACCEPT     ah   --  *      *       0.0.0.0/0            0.0.0.0/0


Chain net2all (2 references)
 pkts bytes target     prot opt in     out     source              
destination

    0     0 ACCEPT     ah   --  *      *       0.0.0.0/0            0.0.0.0/0
       state RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0
       state NEW tcp flags:!0x16/0x02
    0     0 common     ah   --  *      *       0.0.0.0/0            0.0.0.0/0

    0     0 LOG        ah   --  *      *       0.0.0.0/0            0.0.0.0/0
       LOG flags 0 level 6 prefix `Shorewall:net2all:DROP:'
    0     0 DROP       ah   --  *      *       0.0.0.0/0            0.0.0.0/0


Chain newnotsyn (5 references)
 pkts bytes target     prot opt in     out     source              
destination

    0     0 DROP       ah   --  *      *       0.0.0.0/0            0.0.0.0/0


Chain reject (6 references)
 pkts bytes target     prot opt in     out     source              
destination

    0     0 REJECT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0
       reject-with tcp-reset
    0     0 REJECT     ah   --  *      *       0.0.0.0/0            0.0.0.0/0
       reject-with icmp-port-unreachable


::Masquerading::

Shorewall-1.3.9b NAT at  - Mon Nov 11 21:11:34 UTC 2002



Chain PREROUTING (policy ACCEPT 9 packets, 1355 bytes)

 pkts bytes target     prot opt in     out     source              
destination



Chain POSTROUTING (policy ACCEPT 1 packets, 328 bytes)

 pkts bytes target     prot opt in     out     source              
destination

    0     0 eth0_masq  ah   --  *      eth0    0.0.0.0/0            0.0.0.0/0



Chain OUTPUT (policy ACCEPT 1 packets, 328 bytes)

 pkts bytes target     prot opt in     out     source              
destination



Chain eth0_masq (1 references)

 pkts bytes target     prot opt in     out     source              
destination

    0     0 MASQUERADE  ah   --  *      *       192.168.1.0/24      
0.0.0.0/0




::General System Info::

Uptime:   9:34pm  up 24 min, load average: 0.00, 0.00, 0.00


Kernel:Linux firewall 2.4.18 #6 Sun Oct 20 15:06:22 CEST 2002 i586 unknown


Modules:
ip_nat_irc              2400   0 (unused)
ip_nat_ftp              3008   0 (unused)
ip_conntrack_irc        3104   1
ip_conntrack_ftp        3840   1
3c59x                  24752   1
eepro100               16988   1




::Installed Packages::

Name            Version        Description
===============-==============-==============================================
initrd          V1.0-rc4
root            V1.0-rc4
etc             V1.0-rc4
local           V1.0-rc4       Local package. This package does not contain a
modules         V1.0-rc4       Modules package. Contains kernel modules and u
iptables        1.2.6a         iptables
pump            0.8.11-3       DHCP/BOOTP client from Redhat
keyboard        0.3            Use this package to adjust the keyboard settin
shorwall        1.3.9b         Shoreline Firewall (Shorewall)
dnscache        1.05a          dnscache from djbdns (V1.05a) package creates
weblet          1.2.0          weblet - LRP status via a small web server
dhcpd           2.0pl5         dhcpd - Autoconfigure client machines




::CPU Info::

processor: 0
vendor_id: GenuineIntel
cpu family: 5
model: 4
model name: Pentium MMX
stepping: 4
cpu MHz: 199.434
fdiv_bug: no
hlt_bug: no
f00f_bug: yes
coma_bug: no
fpu: yes
fpu_exception: yes
cpuid level: 1
wp: yes
flags: fpu vme de pse tsc msr mce cx8 mmx
bogomips: 398.13




-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to