I am a fairly new user to bering, but have used LRP in the past. I am currently running bering 1.0 - rc4 on a pentium 200 w/ internal Intel ethernet adapter, PCI 3com Etherlink XL, & more than enough ram..
My question / problem is i have noticed that different machines are getting drastically different throughput going through my Firewall / Router to my att cablem-modem, and can't seem to find what is causing it. For example (using http://bandwidthplace.com/speedtest/) 192.168.1.1: 184 kbps 192.168.1.2: 804 kbps 192.168.1.5: 338 kbps I get simiar results from any other external website. I am running a nice little utility (du-meter) on my win2k boxes and it shows, for example, that 192.168.1.5 is bandwidth cap'd at ~ 400kbps when i access an external website. Basically showing, a nice smooth plateau. Internally, i am able to get 70+Mbps. All machines are connected through a switch to the firewall/router, and i have checked all cables, connections, ports, duplex, etc.. And all tests were done individually when the lan was quiet. Basically, I have exhausted all other posibilities, and have come to believe that the router (hardware or software) or beyond could be responsible for this. Does the leaf default diskette include bandwith limiting? Does attbi use some fancy bandwidth cap when you have mulitple clients connecting through a router? Does my P-200 machine need to be thrown out the window and replaced w/ a faster box? Below i have included some output from the weblet stats and config. Any help/insight would be greatly appreciated. Thanks in advance. -N ::Statistics:: 1: lo: mtu 16436 qdisc noqueue link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 RX: bytes packets errors dropped overrun mcast 0 0 0 0 0 0 TX: bytes packets errors dropped carrier collsns 0 0 0 0 0 0 2: dummy0: mtu 1500 qdisc noop link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff RX: bytes packets errors dropped overrun mcast 0 0 0 0 0 0 TX: bytes packets errors dropped carrier collsns 0 0 0 0 0 0 3: eth0: mtu 1500 qdisc pfifo_fast qlen 100 link/ether 00:a0:c9:49:4b:d8 brd ff:ff:ff:ff:ff:ff RX: bytes packets errors dropped overrun mcast 6272575 6165 0 0 0 0 TX: bytes packets errors dropped carrier collsns 280533 3396 0 0 0 0 4: eth1: mtu 1500 qdisc pfifo_fast qlen 100 link/ether 00:10:5a:15:15:f1 brd ff:ff:ff:ff:ff:ff RX: bytes packets errors dropped overrun mcast 309834 3434 0 0 0 0 TX: bytes packets errors dropped carrier collsns 6192803 5276 0 0 0 12 :: Firewall Rules:: Shorewall-1.3.9b Chain at - Mon Nov 11 21:11:34 UTC 2002 Chain INPUT (policy DROP 5 packets, 834 bytes) pkts bytes target prot opt in out source destination 0 0 ACCEPT ah -- lo * 0.0.0.0/0 0.0.0.0/0 0 0 eth0_in ah -- eth0 * 0.0.0.0/0 0.0.0.0/0 0 0 eth1_in ah -- eth1 * 0.0.0.0/0 0.0.0.0/0 0 0 common ah -- * * 0.0.0.0/0 0.0.0.0/0 0 0 LOG ah -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:' 0 0 reject ah -- * * 0.0.0.0/0 0.0.0.0/0 Chain FORWARD (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 0 0 eth0_fwd ah -- eth0 * 0.0.0.0/0 0.0.0.0/0 0 0 eth1_fwd ah -- eth1 * 0.0.0.0/0 0.0.0.0/0 0 0 common ah -- * * 0.0.0.0/0 0.0.0.0/0 0 0 LOG ah -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:' 0 0 reject ah -- * * 0.0.0.0/0 0.0.0.0/0 Chain OUTPUT (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 0 0 DROP icmp -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID 0 0 ACCEPT udp -- * eth0 0.0.0.0/0 0.0.0.0/0 udp dpts:67:68 0 0 ACCEPT ah -- * lo 0.0.0.0/0 0.0.0.0/0 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED 0 0 fw2net ah -- * eth0 0.0.0.0/0 0.0.0.0/0 0 0 all2all ah -- * eth1 0.0.0.0/0 0.0.0.0/0 0 0 common ah -- * * 0.0.0.0/0 0.0.0.0/0 0 0 LOG ah -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:OUTPUT:REJECT:' 0 0 reject ah -- * * 0.0.0.0/0 0.0.0.0/0 Chain all2all (3 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT ah -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 0 0 common ah -- * * 0.0.0.0/0 0.0.0.0/0 0 0 LOG ah -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:all2all:REJECT:' 0 0 reject ah -- * * 0.0.0.0/0 0.0.0.0/0 Chain common (5 references) pkts bytes target prot opt in out source destination 0 0 icmpdef icmp -- * * 0.0.0.0/0 0.0.0.0/0 0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID 0 0 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:137:139 reject-with icmp-port-unreachable 0 0 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:445 reject-with icmp-port-unreachable 0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:135 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:1900 0 0 DROP ah -- * * 0.0.0.0/0 255.255.255. 255 0 0 DROP ah -- * * 0.0.0.0/0 224.0.0.0/4 0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:113 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:53 state NEW 0 0 DROP ah -- * * 0.0.0.0/0 255.255.255. 255 0 0 DROP ah -- * * 0.0.0.0/0 192.168.1.25 5 Chain dynamic (4 references) pkts bytes target prot opt in out source destination Chain eth0_fwd (1 references) pkts bytes target prot opt in out source destination 0 0 dynamic ah -- * * 0.0.0.0/0 0.0.0.0/0 0 0 net2all ah -- * eth1 0.0.0.0/0 0.0.0.0/0 Chain eth0_in (1 references) pkts bytes target prot opt in out source destination 0 0 dynamic ah -- * * 0.0.0.0/0 0.0.0.0/0 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:67:68 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8 0 0 net2all ah -- * * 0.0.0.0/0 0.0.0.0/0 Chain eth1_fwd (1 references) pkts bytes target prot opt in out source destination 0 0 dynamic ah -- * * 0.0.0.0/0 0.0.0.0/0 0 0 loc2net ah -- * eth0 0.0.0.0/0 0.0.0.0/0 Chain eth1_in (1 references) pkts bytes target prot opt in out source destination 0 0 dynamic ah -- * * 0.0.0.0/0 0.0.0.0/0 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8 0 0 loc2fw ah -- * * 0.0.0.0/0 0.0.0.0/0 Chain fw2net (1 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT ah -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:53 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:53 0 0 all2all ah -- * * 0.0.0.0/0 0.0.0.0/0 Chain icmpdef (1 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8 Chain loc2fw (1 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT ah -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:53 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:80 0 0 all2all ah -- * * 0.0.0.0/0 0.0.0.0/0 Chain loc2net (1 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT ah -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 0 0 ACCEPT ah -- * * 0.0.0.0/0 0.0.0.0/0 Chain net2all (2 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT ah -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 0 0 common ah -- * * 0.0.0.0/0 0.0.0.0/0 0 0 LOG ah -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:net2all:DROP:' 0 0 DROP ah -- * * 0.0.0.0/0 0.0.0.0/0 Chain newnotsyn (5 references) pkts bytes target prot opt in out source destination 0 0 DROP ah -- * * 0.0.0.0/0 0.0.0.0/0 Chain reject (6 references) pkts bytes target prot opt in out source destination 0 0 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with tcp-reset 0 0 REJECT ah -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable ::Masquerading:: Shorewall-1.3.9b NAT at - Mon Nov 11 21:11:34 UTC 2002 Chain PREROUTING (policy ACCEPT 9 packets, 1355 bytes) pkts bytes target prot opt in out source destination Chain POSTROUTING (policy ACCEPT 1 packets, 328 bytes) pkts bytes target prot opt in out source destination 0 0 eth0_masq ah -- * eth0 0.0.0.0/0 0.0.0.0/0 Chain OUTPUT (policy ACCEPT 1 packets, 328 bytes) pkts bytes target prot opt in out source destination Chain eth0_masq (1 references) pkts bytes target prot opt in out source destination 0 0 MASQUERADE ah -- * * 192.168.1.0/24 0.0.0.0/0 ::General System Info:: Uptime: 9:34pm up 24 min, load average: 0.00, 0.00, 0.00 Kernel:Linux firewall 2.4.18 #6 Sun Oct 20 15:06:22 CEST 2002 i586 unknown Modules: ip_nat_irc 2400 0 (unused) ip_nat_ftp 3008 0 (unused) ip_conntrack_irc 3104 1 ip_conntrack_ftp 3840 1 3c59x 24752 1 eepro100 16988 1 ::Installed Packages:: Name Version Description ===============-==============-============================================== initrd V1.0-rc4 root V1.0-rc4 etc V1.0-rc4 local V1.0-rc4 Local package. This package does not contain a modules V1.0-rc4 Modules package. Contains kernel modules and u iptables 1.2.6a iptables pump 0.8.11-3 DHCP/BOOTP client from Redhat keyboard 0.3 Use this package to adjust the keyboard settin shorwall 1.3.9b Shoreline Firewall (Shorewall) dnscache 1.05a dnscache from djbdns (V1.05a) package creates weblet 1.2.0 weblet - LRP status via a small web server dhcpd 2.0pl5 dhcpd - Autoconfigure client machines ::CPU Info:: processor: 0 vendor_id: GenuineIntel cpu family: 5 model: 4 model name: Pentium MMX stepping: 4 cpu MHz: 199.434 fdiv_bug: no hlt_bug: no f00f_bug: yes coma_bug: no fpu: yes fpu_exception: yes cpuid level: 1 wp: yes flags: fpu vme de pse tsc msr mce cx8 mmx bogomips: 398.13 ------------------------------------------------------- This sf.net email is sponsored by:ThinkGeek Welcome to geek heaven. http://thinkgeek.com/sf ------------------------------------------------------------------------ leaf-user mailing list: [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/leaf-user SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html
