I've been fighting this for a bit, and don't seem to be making headway.

I have an old laptop I am making into a LEAF Bering firewall.  It's 
currently connected to an external serial modem, and a PCMCIA NIC (3com). 
 There's no DMZ, and just the two interfaces (ppp0, eth0).

I've proven that the PPP part works, but I've been having trouble getting 
the DHCP server to work on the internal network address on eth0.

I've worked through the installation instructions (many, many times).  I've 
Googled and checked the FAQs.

I've gotten some assistance with the problem here before, and implemented 
those instructions (ref traffic from Erich Titl, suggesting a delay script 
in /etc/init.d  --thank you, Erich).

Now, DHCPD does not seem to recognize eth0 and I cannot ping the firewall 
from itself, using ping 192.168.1.254 (the address assigned to the firewall 
on eth0).

********************
The messages at boot read:

Starting dhcpd on eth0:

No subnet declaration for eth0(0.0.0.0)
Please write a subnet declaration for eth0 in your dhcpd.conf



Here's some of the diagnostics that the FAQ recommend  (each command / log 
/ file delimited by series of asterisks):

********************
# dhcp.conf file
dynamic-bootp-lease-length 604800;
max-lease-time 1209600;

subnet 192.168.1.0 netmask 255.255.255.0 {
    option routers 192.168.1.254;
    option domain-name "thrn";
    option domain-name-servers 192.168.1.254;
    range 192.168.1.1 192.168.1.199;
}

********************

ping 192.168.1.254 output:
PING 192.168.1.254 (192.168.1.254): 56 data bytes
ping: sendto: operation not permitted

********************

uname output:
Linux firewall 2.4.20 #1 Sun May 11 18:53:34 CEST 2003 i486 unknown

********************
ip addr output:

1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 brd 127.255.255.255 scope host lo
2: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop
    link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
3: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP> mtu 1500 qdisc pfifo_fast qlen 3
    link/ppp
    inet 10.64.64.64 peer 10.112.112.112/32 scope global ppp0
4: eth0: <BROADCAST,MULTICAST> mtu 1500 qdisc noop qlen 100
    link/ether 00:60:08:8a:0d:4d brd ff:ff:ff:ff:ff:ff
********************
lsmod output:
Module         Pages    Used by
3c589_cs                8580   0 (unused)
ds                      6796   2 [3c589_cs]
i82365                 27044   2
pcmcia_core            41088   0 [3c589_cs ds i82365]
ip_nat_irc              2176   0 (unused)
ip_nat_ftp              2784   0 (unused)
ip_conntrack_irc        2880   1
ip_conntrack_ftp        3648   1
ppp_async               6284   0 (unused)
ppp_generic            16152   1 [ppp_async]
slhc                    4352   0 [ppp_generic]

********************
shorewall status output:

Shorewall-1.4.2 Status at firewall - Sat Jul 26 19:22:48 UTC 2003

Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source 
              destination
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0 
           0.0.0.0/0          state ESTABLISHED
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 
           0.0.0.0/0          udp dpt:53
    0     0 DROP      !icmp --  *      *       0.0.0.0/0 
           0.0.0.0/0          state INVALID
    0     0 ACCEPT     all  --  lo     *       0.0.0.0/0 
           0.0.0.0/0

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source 
              destination
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0 
           0.0.0.0/0          state ESTABLISHED
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 
           0.0.0.0/0          udp dpt:53
    0     0 DROP      !icmp --  *      *       0.0.0.0/0 
           0.0.0.0/0          state INVALID

Chain OUTPUT (policy DROP 3 packets, 252 bytes)
 pkts bytes target     prot opt in     out     source 
              destination
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0 
           0.0.0.0/0          state ESTABLISHED
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 
           0.0.0.0/0          udp dpt:53
    0     0 DROP      !icmp --  *      *       0.0.0.0/0 
           0.0.0.0/0          state INVALID
    0     0 ACCEPT     all  --  *      lo      0.0.0.0/0 
           0.0.0.0/0

Chain all2all (3 references)
 pkts bytes target     prot opt in     out     source 
              destination
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0 
           0.0.0.0/0          state RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0 
           0.0.0.0/0          state NEW tcp flags:!0x16/0x02
    0     0 common     all  --  *      *       0.0.0.0/0 
           0.0.0.0/0
    0     0 ULOG       all  --  *      *       0.0.0.0/0 
           0.0.0.0/0          ULOG copy_range 0 nlgroup 1 prefix 
`Shorewall:all2all:REJECT:' queue_threshold 1
    0     0 reject     all  --  *      *       0.0.0.0/0 
           0.0.0.0/0

Chain common (2 references)
 pkts bytes target     prot opt in     out     source 
              destination
    0     0 icmpdef    icmp --  *      *       0.0.0.0/0 
           0.0.0.0/0
    0     0 reject     udp  --  *      *       0.0.0.0/0 
           0.0.0.0/0          udp dpts:137:139
    0     0 reject     udp  --  *      *       0.0.0.0/0 
           0.0.0.0/0          udp dpt:445
    0     0 reject     tcp  --  *      *       0.0.0.0/0 
           0.0.0.0/0          tcp dpt:139
    0     0 reject     tcp  --  *      *       0.0.0.0/0 
           0.0.0.0/0          tcp dpt:445
    0     0 reject     tcp  --  *      *       0.0.0.0/0 
           0.0.0.0/0          tcp dpt:135
    0     0 DROP       udp  --  *      *       0.0.0.0/0 
           0.0.0.0/0          udp dpt:1900
    0     0 DROP       all  --  *      *       0.0.0.0/0 
           255.255.255.255
    0     0 DROP       all  --  *      *       0.0.0.0/0 
           224.0.0.0/4
    0     0 reject     tcp  --  *      *       0.0.0.0/0 
           0.0.0.0/0          tcp dpt:113
    0     0 DROP       udp  --  *      *       0.0.0.0/0 
           0.0.0.0/0          udp spt:53 state NEW

Chain dynamic (4 references)
 pkts bytes target     prot opt in     out     source 
              destination

Chain eth0_fwd (0 references)
 pkts bytes target     prot opt in     out     source 
              destination
    0     0 dynamic    all  --  *      *       0.0.0.0/0 
           0.0.0.0/0

Chain eth0_in (0 references)
 pkts bytes target     prot opt in     out     source 
              destination
    0     0 dynamic    all  --  *      *       0.0.0.0/0 
           0.0.0.0/0

Chain fw2loc (0 references)
 pkts bytes target     prot opt in     out     source 
              destination
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0 
           0.0.0.0/0          state RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0 
           0.0.0.0/0          state NEW tcp flags:!0x16/0x02
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0 
           0.0.0.0/0          icmp type 8
    0     0 all2all    all  --  *      *       0.0.0.0/0 
           0.0.0.0/0

Chain fw2net (0 references)
 pkts bytes target     prot opt in     out     source 
              destination
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0 
           0.0.0.0/0          state RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0 
           0.0.0.0/0          state NEW tcp flags:!0x16/0x02
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 
           0.0.0.0/0          state NEW tcp dpt:53
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 
           0.0.0.0/0          state NEW udp dpt:53
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0 
           0.0.0.0/0          icmp type 8
    0     0 all2all    all  --  *      *       0.0.0.0/0 
           0.0.0.0/0

Chain icmpdef (1 references)
 pkts bytes target     prot opt in     out     source 
              destination

Chain loc2fw (0 references)
 pkts bytes target     prot opt in     out     source 
              destination
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0 
           0.0.0.0/0          state RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0 
           0.0.0.0/0          state NEW tcp flags:!0x16/0x02
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 
           0.0.0.0/0          state NEW tcp dpt:22
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0 
           0.0.0.0/0          icmp type 8
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 
           0.0.0.0/0          state NEW udp dpt:53
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 
           0.0.0.0/0          state NEW tcp dpt:80
    0     0 all2all    all  --  *      *       0.0.0.0/0 
           0.0.0.0/0

Chain loc2net (0 references)
 pkts bytes target     prot opt in     out     source 
              destination
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0 
           0.0.0.0/0          state RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0 
           0.0.0.0/0          state NEW tcp flags:!0x16/0x02
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0 
           0.0.0.0/0

Chain net2all (1 references)
 pkts bytes target     prot opt in     out     source 
              destination
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0 
           0.0.0.0/0          state RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0 
           0.0.0.0/0          state NEW tcp flags:!0x16/0x02
    0     0 common     all  --  *      *       0.0.0.0/0 
           0.0.0.0/0
    0     0 ULOG       all  --  *      *       0.0.0.0/0 
           0.0.0.0/0          ULOG copy_range 0 nlgroup 1 prefix 
`Shorewall:net2all:DROP:' queue_threshold 1
    0     0 DROP       all  --  *      *       0.0.0.0/0 
           0.0.0.0/0

Chain net2fw (0 references)
 pkts bytes target     prot opt in     out     source 
              destination
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0 
           0.0.0.0/0          state RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0 
           0.0.0.0/0          state NEW tcp flags:!0x16/0x02
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0 
           0.0.0.0/0          icmp type 8
    0     0 net2all    all  --  *      *       0.0.0.0/0 
           0.0.0.0/0

Chain newnotsyn (7 references)
 pkts bytes target     prot opt in     out     source 
              destination
    0     0 DROP       all  --  *      *       0.0.0.0/0 
           0.0.0.0/0

Chain ppp0_fwd (0 references)
 pkts bytes target     prot opt in     out     source 
              destination
    0     0 dynamic    all  --  *      *       0.0.0.0/0 
           0.0.0.0/0

Chain ppp0_in (0 references)
 pkts bytes target     prot opt in     out     source 
              destination
    0     0 dynamic    all  --  *      *       0.0.0.0/0 
           0.0.0.0/0

Chain reject (7 references)
 pkts bytes target     prot opt in     out     source 
              destination
    0     0 REJECT     tcp  --  *      *       0.0.0.0/0 
           0.0.0.0/0          reject-with tcp-reset
    0     0 REJECT     all  --  *      *       0.0.0.0/0 
           0.0.0.0/0          reject-with icmp-port-unreachable


NAT Table

Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source 
              destination

Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source 
              destination

Chain OUTPUT (policy ACCEPT 3 packets, 252 bytes)
 pkts bytes target     prot opt in     out     source               dest  
ination

Mangle Table

Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source 
              destination

Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source 
              destination

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source 
              destination

Chain OUTPUT (policy ACCEPT 3 packets, 252 bytes)
 pkts bytes target     prot opt in     out     source 
              destination

Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source 
              destination

********************
daemon.log from /var/log:
Jul 26 18:51:10 firewall pppd[14492]: pppd 2.4.1 started by root, uid 0
Jul 26 18:51:10 firewall pppd[14492]: Using interface ppp0
Jul 26 18:51:10 firewall pppd[14492]: Cannot determine ethernet address for 
proxy ARP
Jul 26 18:51:10 firewall pppd[14492]: local  IP address 10.64.64.64
Jul 26 18:51:10 firewall pppd[14492]: remote IP address 10.112.112.112
Jul 26 18:51:11 firewall init: Entering runlevel: 2
Jul 26 18:51:13 firewall cardmgr[13569]: watching 2 sockets
Jul 26 18:51:13 firewall cardmgr[24938]: starting, version is 3.2.4
Jul 26 18:51:13 firewall cardmgr[24938]: socket 1: 3Com 589 Ethernet
Jul 26 18:51:13 firewall cardmgr[24938]: executing: 'insmod 
/lib/modules/2.4.20/pcmcia/3c589_cs.o'
Jul 26 18:51:13 firewall cardmgr[24938]: + Using 
/lib/modules/2.4.20/pcmcia/3c589_cs.o
Jul 26 18:51:14 firewall cardmgr[24938]: executing: './network start eth0'
Jul 26 18:51:14 firewall dhcpd: Internet Software Consortium DHCP Server 
2.0pl5
Jul 26 18:51:14 firewall dhcpd: Copyright 1995, 1996, 1997, 1998, 1999 The 
Internet Software Consortium.
Jul 26 18:51:14 firewall dhcpd: All rights reserved.
Jul 26 18:51:14 firewall dhcpd:
Jul 26 18:51:14 firewall dhcpd: Please contribute if you find this software 
useful.
Jul 26 18:51:14 firewall dhcpd: For info, please visit 
http://www.isc.org/dhcp-contrib.html
Jul 26 18:51:14 firewall dhcpd:
Jul 26 18:51:14 firewall dhcpd: No subnet declaration for eth0 (0.0.0.0).
Jul 26 18:51:14 firewall cardmgr[24938]: + /sbin/ifup: interface eth0 
already configured
Jul 26 18:51:14 firewall dhcpd: Please write a subnet declaration in your 
dhcpd.conf file for the
Jul 26 18:51:14 firewall dhcpd: network segment to which interface eth0 is 
attached.
Jul 26 18:51:14 firewall dhcpd: exiting.
Jul 26 18:54:14 firewall dhcpd: Internet Software Consortium DHCP Server 
2.0pl5
Jul 26 18:54:14 firewall dhcpd: Copyright 1995, 1996, 1997, 1998, 1999 The 
Internet Software Consortium.
Jul 26 18:54:14 firewall dhcpd: All rights reserved.
Jul 26 18:54:14 firewall dhcpd:
Jul 26 18:54:14 firewall dhcpd: Please contribute if you find this software 
useful.
Jul 26 18:54:14 firewall dhcpd: For info, please visit 
http://www.isc.org/dhcp-contrib.html
Jul 26 18:54:14 firewall dhcpd:
Jul 26 18:54:14 firewall dhcpd: Sending on   Socket/fallback/fallback-net

********************
Messages log from /var/log
Jul 26 18:51:03 firewall syslogd 1.3-3#31.slink1: restart.
Jul 26 18:51:04 firewall kernel: klogd 1.3-3#31.slink1, log source = 
/proc/kmsg started.
Jul 26 18:51:04 firewall kernel: No module symbols loaded.
Jul 26 18:51:04 firewall kernel: BIOS-provided physical RAM map:
Jul 26 18:51:04 firewall kernel: 24MB LOWMEM available.
Jul 26 18:51:04 firewall kernel: Initializing CPU#0
Jul 26 18:51:04 firewall kernel: Memory: 22188k/24768k available (948k 
kernel code, 2192k reserved, -1176k data, 64k init, 0k highmem)
Jul 26 18:51:04 firewall kernel: Dentry cache hash table entries: 4096 
(order: 3, 32768 bytes)
Jul 26 18:51:04 firewall kernel: Inode cache hash table entries: 2048 
(order: 2, 16384 bytes)
Jul 26 18:51:04 firewall kernel: Checking 'hlt' instruction... OK.
Jul 26 18:51:04 firewall kernel: Linux NET4.0 for Linux 2.4
Jul 26 18:51:04 firewall kernel: Based upon Swansea University Computer 
Society NET3.039
Jul 26 18:51:04 firewall kernel: Serial driver version 5.05c (2001-07-08) 
with MANY_PORTS SHARE_IRQ DETECT_IRQ SERIAL_PCI enabled
Jul 26 18:51:04 firewall kernel: ttyS00 at 0x03f8 (irq = 4) is a 16550A
Jul 26 18:51:04 firewall kernel: Real Time Clock Driver v1.10e
Jul 26 18:51:04 firewall kernel: Software Watchdog Timer: 0.05, timer 
margin: 60 sec
Jul 26 18:51:04 firewall kernel: Floppy drive(s): fd0 is 1.44M
Jul 26 18:51:04 firewall kernel: FDC 0 is an 8272A
Jul 26 18:51:04 firewall kernel: NET4: Linux TCP/IP 1.0 for NET4.0
Jul 26 18:51:04 firewall kernel: IP Protocols: ICMP, UDP, TCP, IGMP
Jul 26 18:51:04 firewall kernel: IP: routing cache hash table of 512 
buckets, 4Kbytes
Jul 26 18:51:04 firewall kernel: TCP: Hash tables configured (established 
2048 bind 2048)
Jul 26 18:51:04 firewall kernel: NET4: Unix domain sockets 1.0/SMP for 
Linux NET4.0.
Jul 26 18:51:04 firewall kernel: RAMDISK: Compressed image found at block 0 
Jul 26 18:51:04 firewall kernel: Freeing initrd memory: 401k freed
Jul 26 18:51:04 firewall kernel: Freeing unused kernel memory: 64k freed
Jul 26 18:51:04 firewall kernel: CSLIP: code copyright 1989 Regents of the 
University of California
Jul 26 18:51:05 firewall kernel: PPP generic driver version 2.4.2
Jul 26 18:51:12 firewall kernel: Linux PCMCIA Card Services 3.2.4
Jul 26 18:51:12 firewall kernel:   kernel build: 2.4.20 #1 Sun May 11 
18:53:34 CEST 2003
Jul 26 18:51:12 firewall kernel:   options:  [pci] [cardbus] [apm]
Jul 26 18:51:12 firewall kernel: Intel ISA/PCI/CardBus PCIC probe:
Jul 26 18:51:12 firewall kernel:   Intel i82365sl B step rev 00 
ISA-to-PCMCIA at port 0x3e0 ofs 0x00
Jul 26 18:51:12 firewall kernel:     host opts [0]: none
Jul 26 18:51:12 firewall kernel:     host opts [1]: none
Jul 26 18:51:12 firewall kernel:     ISA irqs (scanned) = 
3,4,5,7,9,10,11,12,15 status change on irq 15
Jul 26 18:51:13 firewall kernel: cs: memory probe 0x0d0000-0x0dffff: clean. 
Jul 26 18:51:14 firewall kernel: cs: IO port probe 0x0100-0x04ff: excluding 
0x1f0-0x1ff 0x378-0x37f 0x3c0-0x3e7 0x3f0-0x4c7 0x4d0-0x4ef
Jul 26 18:51:14 firewall kernel: cs: IO port probe 0x0200-0x0377: clean.
Jul 26 18:51:14 firewall kernel: cs: IO port probe 0x0380-0x03bf: clean.
Jul 26 18:51:14 firewall kernel: cs: IO port probe 0x03e8-0x03ef: clean.
Jul 26 18:51:14 firewall kernel: cs: IO port probe 0x04c8-0x04cf: clean.
Jul 26 18:51:14 firewall kernel: cs: IO port probe 0x04f0-0x04ff: clean.
Jul 26 18:51:14 firewall kernel: cs: IO port probe 0x0800-0x08ff: excluding 
0x800-0x87f 0x8a0-0x8c7 0x8d0-0x8ef
Jul 26 18:51:14 firewall kernel: cs: IO port probe 0x08c8-0x08cf: clean.
Jul 26 18:51:14 firewall kernel: cs: IO port probe 0x08f0-0x08ff: clean.
Jul 26 18:51:14 firewall kernel: cs: IO port probe 0x0a00-0x0aff: clean.
Jul 26 18:51:14 firewall kernel: cs: IO port probe 0x0c00-0x0cff: excluding 
0xc00-0xc7f 0xca0-0xcc7 0xcd0-0xcef
Jul 26 18:51:14 firewall kernel: cs: IO port probe 0x0cc8-0x0ccf: clean.
Jul 26 18:51:14 firewall kernel: cs: IO port probe 0x0cf0-0x0cff: clean.
Jul 26 18:51:14 firewall kernel: eth0: 3Com 3c589, io 0x300, irq 3, hw_addr 
00:60:08:8A:0D:4D
Jul 26 18:51:14 firewall kernel:   8K FIFO split 5:3 Rx:Tx, auto xcvr

********************
ppp.log from /var/log was empty
********************
shorewall.log from /var/log was empty
********************
syslog from /var/log:

Jul 26 18:51:04 firewall kernel: Cannot find map file.
Jul 26 18:51:04 firewall kernel: Linux version 2.4.20 ([EMAIL PROTECTED]) (gcc 
version 2.95.4 20011002 (Debian prerelease)) #1 Sun May 11 18:53:34 CEST 
2003
Jul 26 18:51:04 firewall kernel:  BIOS-88: 0000000000000000 - 
000000000009f000 (usable)
Jul 26 18:51:04 firewall kernel:  BIOS-88: 0000000000100000 - 
0000000001830000 (usable)
Jul 26 18:51:04 firewall kernel: On node 0 totalpages: 6192
Jul 26 18:51:04 firewall kernel: zone(0): 4096 pages.
Jul 26 18:51:04 firewall kernel: zone(1): 2096 pages.
Jul 26 18:51:04 firewall kernel: zone(2): 0 pages.
Jul 26 18:51:04 firewall kernel: Kernel command line: BOOT_IMAGE=linux 
initrd=initrd.lrp init=/linuxrc rw root=/dev/ram0 boot=/dev/fd0u1680:msdos 
diskwait=yes PKGPATH=/dev/fd0u1680 
LRP=root,etc,local,modules,pcmcia,iptables,ppp,pump,libz,sshd,sshkey,sho  
rwall,ulogd,dnscache,weblet,dhcpd
Jul 26 18:51:04 firewall kernel: Console: colour VGA+ 80x25
Jul 26 18:51:04 firewall kernel: Calibrating delay loop... 37.37 BogoMIPS
Jul 26 18:51:04 firewall kernel: Checking if this processor honours the WP 
bit even in supervisor mode... Ok.
Jul 26 18:51:04 firewall kernel: Mount-cache hash table entries: 512 
(order: 0, 4096 bytes)
Jul 26 18:51:04 firewall kernel: Buffer-cache hash table entries: 1024 
(order: 0, 4096 bytes)
Jul 26 18:51:04 firewall kernel: Page-cache hash table entries: 8192 
(order: 3, 32768 bytes)
Jul 26 18:51:04 firewall kernel: CPU: Intel 486 DX/4 stepping 00
Jul 26 18:51:04 firewall kernel: POSIX conformance testing by UNIFIX
Jul 26 18:51:04 firewall kernel: PCI: System does not support PCI
Jul 26 18:51:04 firewall kernel: Initializing RT netlink socket
Jul 26 18:51:04 firewall kernel: Starting kswapd
Jul 26 18:51:04 firewall kernel: pty: 256 Unix98 ptys configured
Jul 26 18:51:04 firewall kernel: RAMDISK driver initialized: 16 RAM disks 
of 4096K size 1024 blocksize
Jul 26 18:51:04 firewall kernel: ip_conntrack version 2.1 (193 buckets, 
1544 max) - 320 bytes per conntrack
Jul 26 18:51:04 firewall kernel: ip_tables: (C) 2000-2002 Netfilter core 
team
Jul 26 18:51:04 firewall kernel: arp_tables: (C) 2002 David S. Miller
Jul 26 18:51:04 firewall kernel: VFS: Mounted root (minix filesystem).
Jul 26 19:18:52 firewall kernel: end_request: I/O error, dev 02:2c 
(floppy), sector 19
Jul 26 19:18:54 firewall kernel: end_request: I/O error, dev 02:2c 
(floppy), sector 20
Jul 26 19:19:04 firewall kernel: VFS: busy inodes on changed media.

********************

#
#       Shorewall 1.4 -- Sample Zone File For Two Interfaces
#ZONE   DISPLAY         COMMENTS
net     Net             Internet
loc     Local           Local Networks
#LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE

********************
Shorewall policy file
########################################################################  
#######
#SOURCE         DEST            POLICY          LOG LEVEL       LIMIT:BURST
loc             net             ACCEPT
# If you want open access to the Internet from your Firewall
# remove the comment from the following line.
#fw             net             ACCEPT
net             all             DROP            ULOG
all             all             REJECT          ULOG


********************
#       etc/shorewall/masq
#INTERFACE              SUBNET          ADDRESS
ppp0                    eth0
#LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE

********************
#       /etc/shorewall/interfaces
#ZONE   INTERFACE       BROADCAST       OPTIONS
net     ppp0            -               
loc     eth0            detect          
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE

********************
/etc/network/options file

ip_forward=no
spoofprotect=yes
syncookies=no


********************
# /etc/network/interfaces
auto lo ppp0 eth0
iface lo inet loopback
iface ppp0 inet ppp
       provider provider

iface eth0 inet static
       address 192.168.1.254
       masklen 24
       broadcast 192.168.1.255

up pon
up /etc/init.d/dnscache restart
up dhcpd restart
up shorewall restart
down shorewall stop
down /etc/init.d/dnscache stop
down poff


********************
# pump configuration
retries 3
script "/etc/pump.shorewall"
device eth0 {
        nodns
}





-------------------------------------------------------
This SF.Net email sponsored by: Free pre-built ASP.NET sites including
Data Reports, E-commerce, Portals, and Forums are available now.
Download today and enter to win an XBOX or Visual Studio .NET.
http://aspnet.click-url.com/go/psa00100003ave/direct;at.aspnet_072303_01/01
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to