Comments inline below.

At 04:43 PM 2/10/03 -0500, Camille King wrote:
What you described is all correct including the fact that I my wired machine can
ping my wireless machine and vice versa (which I didn't state in the previous
mail).
>>>>>1. What LAN IP address is assigned to the Linksys, and is it different from

>>>>>the LAN IP address of the Bering? If not, fix it; that conflict is causing
>>>>>your problem. If this is OK, then go on.

How do you do this? I changed the IP address to 192.168.1.253 (the default is
192.168.1.1 just to see if it made any difference, which was none). I don't get
what you mean? What do you mean by "different from the LAN IP address of the
Bering?"
The Linksys router has an IP address on its internal (LAN) interface (I infer 192.168.1.1 from your comment above). The Bering router has an interface connected to the LAN, and that interface has an IP address too (apparently 192.168.1.254, from the diagnostics reported below). I was asking you to check these two addresses to verify that they were different. Apparently they are, so that is not the source of the problem. But I didn't know what default the Linksys used, and did not recall offhand what Bering's default was ... though I had recalled correctly that both use the 192.168.1.0/24 network.

>>>>2. Before you ping from a wireless host, check its arp table to see if
>>>>there is an entry for the Bering's IP address. (Probably there is not.)
>>>>>After you ping, check again. See if there is an entry present, and see if
>>>>>it has the right MAC address. Also check the Bering's arp table before and
>>>>>after.

Right after my wireless machine starts up, the arp table contains two entries,
192.168.1.253 (which is the Linksys) and 192.168.1.254 (which is Bering).
Pinging doesn't work and there is no difference in the arp table except that
192.168.1.253 gets dropped from the table.
The drop is just due to the entry expiring from inactivity. But this tell us that the link layer (Ethernet layer) is working.

Just a thought here ... does the wireless host run any sort of firewalling package? If so, what are its details? (And what OS does this client run, BTW?)

>>>>>3. Try to ping a wireless host from the Bering. Check the arp tables the
>>>>>same way you did in item 2.

No luck here, can't ping to wireless machine (but can ping my wired one) and
there's no entries in the arp table (arp -a prints out nothing).
OK. What message are you getting here (on the Bering) when the ping fails? Does it just fail silently (that is, do nothing until you enter CTRL-C, then report 100% failure)? Or is there a different result? And just to be clear ... another wireline host CAN ping this same wireless host successfully, right? And that same wireline host CAN ping the Bering router?

Best indication at this point is that, for some reason, either your wireless client does not respond to arp queries properly, or the Bering router does not generate them properly, or the wireline/wireless bridge in the Linksys does not pass them properly. First verify that all the arp stuff works properly when the Bering is not involved, but the wireline/wireless bridge is.

Any help would be greatly appreciated.
The diagnostics you sent do not include the firewall ruleset. Please include next time the output of "iptables -nvL" (the SR FAQ is a bit out of date here, referring only to the analogous ipchains command used with 2.2.x kernels).

(Note to other LEAF troubleshooters: Yes I know Tom advises people to use the specialized listing commands in Shorewall. But I prefer to read the raw listing myself. So don't "correct" my advice here unless *you* are prepared to help Camille interpret the output ... as Tom usually is when he offers this advice.)

CK

ip addr show
1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 brd 127.255.255.255 scope host lo
2: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop
link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
3: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
link/ether 00:04:5a:6c:d5:3d brd ff:ff:ff:ff:ff:ff
4: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
link/ether 00:08:c7:90:ba:c4 brd ff:ff:ff:ff:ff:ff
inet 192.168.1.254/24 brd 192.168.1.255 scope global eth1
5: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP> mtu 1492 qdisc pfifo_fast qlen 3
link/ppp
inet 64.231.42.125 peer 64.231.42.1/32 scope global ppp0

ip route show
64.231.42.1 dev ppp0 proto kernel scope link src 64.231.42.125
192.168.1.0/24 dev eth1 proto kernel scope link src 192.168.1.254
default via 64.231.42.1 dev ppp0

lsmod
Module Pages Used by
ip_nat_irc 2400 0 (unused)
ip_nat_ftp 3008 0 (unused)
ip_conntrack_irc 3104 1
ip_conntrack_ftp 3840 1
pppoe 6656 1
pppox 916 1 [pppoe]
ppp_synctty 4408 0 (unused)
ppp_generic 14932 3 [pppoe pppox ppp_synctty]
n_hdlc 5792 0 (unused)
slhc 4288 0 [ppp_generic]
tlan 23744 1
tulip 37024 1

/var/log/messages
Feb 10 04:15:06 firewall syslogd 1.3-3#31.slink1: restart.
Feb 10 04:15:06 firewall kernel: klogd 1.3-3#31.slink1, log source = /proc/kmsg
started.
Feb 10 04:15:06 firewall kernel: Cannot find map file.
Feb 10 04:15:06 firewall kernel: Loaded 72 symbols from 12 modules.
Feb 10 04:15:06 firewall kernel: Linux version 2.4.18 (root@uml_woody) (gcc
version 2.95.4 20011002 (Debian prerelease)) #1 Sun Nov 10 17:40:20 UTC 2002
Feb 10 04:15:06 firewall kernel: BIOS-provided physical RAM map:
Feb 10 04:15:06 firewall kernel: BIOS-e820: 0000000000000000 - 000000000009fc00
(usable)
Feb 10 04:15:06 firewall kernel: BIOS-e820: 000000000009fc00 - 00000000000a0000
(reserved)
Feb 10 04:15:06 firewall kernel: BIOS-e820: 00000000000f0000 - 0000000000100000
(reserved)
Feb 10 04:15:06 firewall kernel: BIOS-e820: 0000000000100000 - 0000000008000000
(usable)
Feb 10 04:15:06 firewall kernel: BIOS-e820: 00000000fffe0000 - 0000000100000000
(reserved)
Feb 10 04:15:06 firewall kernel: On node 0 totalpages: 32768
Feb 10 04:15:06 firewall kernel: zone(0): 4096 pages.
Feb 10 04:15:06 firewall kernel: zone(1): 28672 pages.
Feb 10 04:15:06 firewall kernel: zone(2): 0 pages.
Feb 10 04:15:06 firewall kernel: Kernel command line: BOOT_IMAGE=linux
initrd=initrd.lrp init=/linuxrc root=/dev/ram0 boot=/dev/fd0u1680:msdos
PKGPATH=/dev/fd0u1680
LRP=root,etc,local,modules,iptables,dhcpd,ppp,pppoe,keyboard,shorwall,dnscache,w
eblet
Feb 10 04:15:06 firewall kernel: Initializing CPU#0
Feb 10 04:15:06 firewall kernel: Detected 199.909 MHz processor.
Feb 10 04:15:06 firewall kernel: Console: colour VGA+ 80x25
Feb 10 04:15:06 firewall kernel: Calibrating delay loop... 398.95 BogoMIPS
Feb 10 04:15:06 firewall kernel: Memory: 126816k/131072k available (907k kernel
code, 3868k reserved, 232k data, 60k init, 0k highmem)
Feb 10 04:15:06 firewall kernel: Dentry-cache hash table entries: 16384 (order:
5, 131072 bytes)
Feb 10 04:15:06 firewall kernel: Inode-cache hash table entries: 8192 (order: 4,
65536 bytes)
Feb 10 04:15:06 firewall kernel: Mount-cache hash table entries: 2048 (order: 2,
16384 bytes)
Feb 10 04:15:06 firewall kernel: Buffer-cache hash table entries: 8192 (order:
3, 32768 bytes)
Feb 10 04:15:06 firewall kernel: Page-cache hash table entries: 32768 (order: 5,
131072 bytes)
Feb 10 04:15:06 firewall kernel: Intel Pentium with F0 0F bug - workaround
enabled.
Feb 10 04:15:06 firewall kernel: CPU: Intel Pentium MMX stepping 03
Feb 10 04:15:06 firewall kernel: Checking 'hlt' instruction... OK.
Feb 10 04:15:06 firewall kernel: POSIX conformance testing by UNIFIX
Feb 10 04:15:06 firewall kernel: PCI: PCI BIOS revision 2.10 entry at 0xee1f7,
last bus=0
Feb 10 04:15:06 firewall kernel: PCI: Using configuration type 1
Feb 10 04:15:06 firewall kernel: PCI: Probing PCI hardware
Feb 10 04:15:06 firewall kernel: PCI: Using IRQ router VIA [1106/0586] at
00:14.0
Feb 10 04:15:06 firewall kernel: Activating ISA DMA hang workarounds.
Feb 10 04:15:06 firewall kernel: Linux NET4.0 for Linux 2.4
Feb 10 04:15:06 firewall kernel: Based upon Swansea University Computer Society
NET3.039
Feb 10 04:15:06 firewall kernel: Initializing RT netlink socket
Feb 10 04:15:06 firewall kernel: Starting kswapd
Feb 10 04:15:06 firewall kernel: pty: 256 Unix98 ptys configured
Feb 10 04:15:06 firewall kernel: Serial driver version 5.05c (2001-07-08) with
MANY_PORTS SHARE_IRQ DETECT_IRQ SERIAL_PCI enabled
Feb 10 04:15:06 firewall kernel: ttyS00 at 0x03f8 (irq = 4) is a 16550A
Feb 10 04:15:06 firewall kernel: ttyS01 at 0x02f8 (irq = 3) is a 16550A
Feb 10 04:15:06 firewall kernel: Software Watchdog Timer: 0.05, timer margin: 60
sec
Feb 10 04:15:06 firewall kernel: block: 128 slots per queue, batch=32
Feb 10 04:15:06 firewall kernel: RAMDISK driver initialized: 16 RAM disks of
4096K size 1024 blocksize
Feb 10 04:15:06 firewall kernel: Floppy drive(s): fd0 is 1.44M
Feb 10 04:15:06 firewall kernel: FDC 0 is a National Semiconductor PC87306
Feb 10 04:15:06 firewall kernel: NET4: Linux TCP/IP 1.0 for NET4.0
Feb 10 04:15:06 firewall kernel: IP Protocols: ICMP, UDP, TCP, IGMP
Feb 10 04:15:06 firewall kernel: IP: routing cache hash table of 1024 buckets,
8Kbytes
Feb 10 04:15:06 firewall kernel: TCP: Hash tables configured (established 8192
bind 8192)
Feb 10 04:15:06 firewall kernel: Linux IP multicast router 0.06 plus PIM-SM
Feb 10 04:15:06 firewall kernel: ip_conntrack version 2.0 (1024 buckets, 8192
max) - 312 bytes per conntrack
Feb 10 04:15:06 firewall kernel: ip_tables: (C) 2000-2002 Netfilter core team
Feb 10 04:15:06 firewall kernel: NET4: Unix domain sockets 1.0/SMP for Linux
NET4.0.
Feb 10 04:15:06 firewall kernel: RAMDISK: Compressed image found at block 0
Feb 10 04:15:06 firewall kernel: Freeing initrd memory: 401k freed
Feb 10 04:15:06 firewall kernel: VFS: Mounted root (minix filesystem).
Feb 10 04:15:06 firewall kernel: Freeing unused kernel memory: 60k freed
Feb 10 04:15:06 firewall kernel: Linux Tulip driver version 0.9.15-pre9 (Nov 6,
2001)
Feb 10 04:15:06 firewall kernel: PCI: Found IRQ 11 for device 00:0d.0
Feb 10 04:15:06 firewall kernel: PCI: Sharing IRQ 11 with 00:14.2
Feb 10 04:15:06 firewall kernel: eth0: ADMtek Comet rev 17 at 0xc881b000,
00:04:5A:6C:D5:3D, IRQ 11.
Feb 10 04:15:06 firewall kernel: ThunderLAN driver v1.14a
Feb 10 04:15:06 firewall kernel: PCI: Found IRQ 5 for device 00:10.0
Feb 10 04:15:06 firewall kernel: TLAN: eth1 irq= 5, io=1200, Compaq Netelligent
10/100 TX Embedded UTP, Rev. 16
Feb 10 04:15:06 firewall kernel: TLAN: 1 device installed, PCI: 1 EISA: 0
Feb 10 04:15:06 firewall kernel: CSLIP: code copyright 1989 Regents of the
University of California
Feb 10 04:15:06 firewall kernel: HDLC line discipline: version $Revision: 3.3 $,
maxframe=4096
Feb 10 04:15:06 firewall kernel: N_HDLC line discipline registered.
Feb 10 04:15:06 firewall kernel: PPP generic driver version 2.4.1
Feb 10 04:15:06 firewall kernel: TLAN: eth1: Starting autonegotiation.
Feb 10 04:15:06 firewall kernel: TLAN: eth1: Autonegotiation complete.
Feb 10 04:15:07 firewall kernel: TLAN: eth1: Link active
Feb 10 04:15:11 firewall root: Shorewall Started
Feb 10 04:16:05 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=65.94.244.130 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=18606
DF PROTO=TCP SPT=3575 DPT=1830 WINDOW=16384 RES=0x00 SYN URGP=0
Feb 10 04:16:08 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=65.94.244.130 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=18806
DF PROTO=TCP SPT=3575 DPT=1830 WINDOW=16384 RES=0x00 SYN URGP=0
Feb 10 04:16:13 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=200.72.175.55 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=3648 DF
PROTO=TCP SPT=14056 DPT=1830 WINDOW=8192 RES=0x00 SYN URGP=0
Feb 10 04:16:14 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=65.94.244.130 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=19176
DF PROTO=TCP SPT=3575 DPT=1830 WINDOW=16384 RES=0x00 SYN URGP=0
Feb 10 04:16:16 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=200.72.175.55 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=11840
DF PROTO=TCP SPT=14056 DPT=1830 WINDOW=8192 RES=0x00 SYN URGP=0
Feb 10 04:16:22 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=200.72.175.55 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=26432
DF PROTO=TCP SPT=14056 DPT=1830 WINDOW=8192 RES=0x00 SYN URGP=0
Feb 10 04:16:34 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=200.72.175.55 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=56384
DF PROTO=TCP SPT=14056 DPT=1830 WINDOW=8192 RES=0x00 SYN URGP=0
Feb 10 04:17:14 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=68.164.71.120 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=59156
DF PROTO=TCP SPT=2402 DPT=1830 WINDOW=8192 RES=0x00 SYN URGP=0
Feb 10 04:17:17 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=68.164.71.120 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=63764
DF PROTO=TCP SPT=2402 DPT=1830 WINDOW=8192 RES=0x00 SYN URGP=0
Feb 10 04:17:23 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=68.164.71.120 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=4885 DF
PROTO=TCP SPT=2402 DPT=1830 WINDOW=8192 RES=0x00 SYN URGP=0
Feb 10 04:17:35 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=68.164.71.120 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=22805
DF PROTO=TCP SPT=2402 DPT=1830 WINDOW=8192 RES=0x00 SYN URGP=0
Feb 10 04:17:53 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=65.94.244.130 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=25111
DF PROTO=TCP SPT=3598 DPT=1830 WINDOW=16384 RES=0x00 SYN URGP=0
Feb 10 04:17:56 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=65.94.244.130 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=25298
DF PROTO=TCP SPT=3598 DPT=1830 WINDOW=16384 RES=0x00 SYN URGP=0
Feb 10 04:18:02 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=65.94.244.130 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=25693
DF PROTO=TCP SPT=3604 DPT=1830 WINDOW=16384 RES=0x00 SYN URGP=0
Feb 10 04:18:02 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=65.94.244.130 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=25697
DF PROTO=TCP SPT=3598 DPT=1830 WINDOW=16384 RES=0x00 SYN URGP=0
Feb 10 04:18:03 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=68.164.71.120 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=15126
DF PROTO=TCP SPT=2418 DPT=1830 WINDOW=8192 RES=0x00 SYN URGP=0
Feb 10 04:18:05 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=65.94.244.130 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=25887
DF PROTO=TCP SPT=3604 DPT=1830 WINDOW=16384 RES=0x00 SYN URGP=0
Feb 10 04:18:06 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=68.164.71.120 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=22294
DF PROTO=TCP SPT=2418 DPT=1830 WINDOW=8192 RES=0x00 SYN URGP=0
Feb 10 04:18:11 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=65.94.244.130 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=26324
DF PROTO=TCP SPT=3604 DPT=1830 WINDOW=16384 RES=0x00 SYN URGP=0
Feb 10 04:18:12 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=68.164.71.120 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=37654
DF PROTO=TCP SPT=2418 DPT=1830 WINDOW=8192 RES=0x00 SYN URGP=0
Feb 10 04:18:19 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=65.94.244.130 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=26871
DF PROTO=TCP SPT=3609 DPT=1830 WINDOW=16384 RES=0x00 SYN URGP=0
Feb 10 04:18:22 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=65.94.244.130 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=27067
DF PROTO=TCP SPT=3609 DPT=1830 WINDOW=16384 RES=0x00 SYN URGP=0
Feb 10 04:18:24 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=68.164.71.120 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=60182
DF PROTO=TCP SPT=2418 DPT=1830 WINDOW=8192 RES=0x00 SYN URGP=0
Feb 10 04:18:28 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=65.94.244.130 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=121 ID=27503
DF PROTO=TCP SPT=3609 DPT=1830 WINDOW=16384 RES=0x00 SYN URGP=0
Feb 10 04:18:52 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=68.164.71.120 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=31257
DF PROTO=TCP SPT=2439 DPT=1830 WINDOW=8192 RES=0x00 SYN URGP=0
Feb 10 04:18:55 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=68.164.71.120 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=49689
DF PROTO=TCP SPT=2439 DPT=1830 WINDOW=8192 RES=0x00 SYN URGP=0
Feb 10 04:19:01 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=68.164.71.120 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=39706
DF PROTO=TCP SPT=2439 DPT=1830 WINDOW=8192 RES=0x00 SYN URGP=0
Feb 10 04:19:13 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=68.164.71.120 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=19228
DF PROTO=TCP SPT=2439 DPT=1830 WINDOW=8192 RES=0x00 SYN URGP=0
Feb 10 04:28:43 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=68.164.71.120 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=14642
DF PROTO=TCP SPT=2675 DPT=1830 WINDOW=8192 RES=0x00 SYN URGP=0
Feb 10 04:28:46 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=68.164.71.120 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=23602
DF PROTO=TCP SPT=2675 DPT=1830 WINDOW=8192 RES=0x00 SYN URGP=0
Feb 10 04:28:52 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=68.164.71.120 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=29234
DF PROTO=TCP SPT=2675 DPT=1830 WINDOW=8192 RES=0x00 SYN URGP=0
Feb 10 04:29:04 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=68.164.71.120 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=45618
DF PROTO=TCP SPT=2675 DPT=1830 WINDOW=8192 RES=0x00 SYN URGP=0
Feb 10 04:29:22 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=65.216.72.15 DST=64.231.42.125 LEN=68 TOS=0x00 PREC=0x00 TTL=239 ID=54003
PROTO=UDP SPT=55555 DPT=53 LEN=48
Feb 10 04:29:25 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=128.242.107.15 DST=64.231.42.125 LEN=68 TOS=0x00 PREC=0x00 TTL=239 ID=53556
PROTO=UDP SPT=55555 DPT=53 LEN=48
Feb 10 04:30:36 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=128.242.107.15 DST=64.231.42.125 LEN=68 TOS=0x00 PREC=0x00 TTL=239 ID=65050
PROTO=UDP SPT=55555 DPT=53 LEN=48
Feb 10 04:30:43 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=68.164.71.120 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=14900
DF PROTO=TCP SPT=2721 DPT=1830 WINDOW=8192 RES=0x00 SYN URGP=0
Feb 10 04:30:45 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=68.164.71.120 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=18228
DF PROTO=TCP SPT=2721 DPT=1830 WINDOW=8192 RES=0x00 SYN URGP=0
Feb 10 04:30:51 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=68.164.71.120 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=27188
DF PROTO=TCP SPT=2721 DPT=1830 WINDOW=8192 RES=0x00 SYN URGP=0
Feb 10 04:31:03 firewall kernel: Shorewall:net2all:DROP:IN=ppp0 OUT= MAC=
SRC=68.164.71.120 DST=64.231.42.125 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=46388
DF PROTO=TCP SPT=2721 DPT=1830 WINDOW=8192 RES=0x00 SYN URGP=0
--
-------------------------------------------"Never tell me the odds!"--------
Ray Olszewski					-- Han Solo
Palo Alto, California, USA			  [EMAIL PROTECTED]
-------------------------------------------------------------------------------



-------------------------------------------------------
This SF.NET email is sponsored by:
SourceForge Enterprise Edition + IBM + LinuxWorld = Something 2 See!
http://www.vasoftware.com
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to