Thanks to Richard Doyle I think I finally identified the final
customizations that allowed me to connect to my Bering firewall, and then
it connected to the ISP.  Today I was on for an hour, then echo losses
shut it down.  I tried many times to reconnect using the browser client,
all failed.  I don't have access to the ISP's logs so I can match-up what
it thought was wrong.  But between 11:05-11:20 you'll see time gaps in
daemon.log where I continued to try, and Firebird just timed-out, so I
kept going back to the weblet to check on the logs, but none of those
connection attempts show up in the logs.  (Using "demand" ppp
connection.)  After a few minutes break I grabbed these files then
rebooted the firewall, and then everything worked again.

One would think if it were line problems one of the many reconnect
attempts would have gotten through.  And I notice in the daemon.log
sometimes ppp sent the AuthReq UID string once, twice, or 9 times!

Questions: 1) I'm wondering if something in the sign-on could have been
corrupted.  Any way to get more information about the causes of the
failues? 2) Why weren't the subsequent attempts to connect logged?

==Files:
==version:
Linux foxfire 2.4.20 #1 Sun May 11 18:53:34 CEST 2003 i586 unknown

==route:
192.168.1.0/24 dev eth0  proto kernel  scope link  src 192.168.1.254 

==address:
1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue 
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 brd 127.255.255.255 scope host lo
2: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop 
    link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
3: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
    link/ether 00:60:97:22:82:7d brd ff:ff:ff:ff:ff:ff
    inet 192.168.1.254/24 brd 192.168.1.255 scope global eth0

==daemon.log
Nov 15 09:49:03 foxfire pppd[12823]: pppd 2.4.1 started by root, uid 0
Nov 15 09:49:03 foxfire pppd[12823]: Using interface ppp0
Nov 15 09:49:03 foxfire pppd[12823]: Cannot determine ethernet address
for proxy ARP
Nov 15 09:49:03 foxfire pppd[12823]: local  IP address 10.64.64.64
Nov 15 09:49:03 foxfire pppd[12823]: remote IP address 10.112.112.112
Nov 15 09:49:05 foxfire init: Entering runlevel: 2
Nov 15 09:54:10 foxfire sh-httpd[1620]: connect from 192.168.1.102
Nov 15 09:54:10 foxfire sh-httpd[9614]: connect from 192.168.1.102
Nov 15 09:54:11 foxfire sh-httpd[19375]: connect from 192.168.1.102
Nov 15 09:54:13 foxfire sh-httpd[13767]: connect from 192.168.1.102
Nov 15 09:54:36 foxfire sh-httpd[23729]: connect from 192.168.1.102
Nov 15 09:54:38 foxfire sh-httpd[3937]: connect from 192.168.1.102
Nov 15 09:54:48 foxfire sh-httpd[25265]: connect from 192.168.1.102
Nov 15 09:54:51 foxfire sh-httpd[22749]: connect from 192.168.1.102
Nov 15 09:54:52 foxfire sh-httpd[17582]: connect from 192.168.1.102
Nov 15 09:55:23 foxfire sh-httpd[23642]: connect from 192.168.1.102
Nov 15 09:55:29 foxfire pppd[12823]: Starting link
Nov 15 09:55:58 foxfire pppd[12823]: Serial connection established.
Nov 15 09:55:58 foxfire pppd[12823]: using channel 1
Nov 15 09:55:58 foxfire pppd[12823]: Connect: ppp0 <--> /dev/ttyS1
Nov 15 09:55:59 foxfire pppd[12823]: sent [LCP ConfReq id=0x1 <mru 576>
<asyncmap 0x0> <magic 0x8a6091e6> <pcomp> <accomp>]
Nov 15 09:55:59 foxfire pppd[12823]: rcvd [LCP ConfReq id=0x1 < 00 04 00
00> <mru 1524> <asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <mrru 1524>
<endpoint [local:6d.61.78.2d.70.64.78]> < 17 04 6f 01>]
Nov 15 09:55:59 foxfire pppd[12823]: sent [LCP ConfRej id=0x1 < 00 04 00
00> <mrru 1524> < 17 04 6f 01>]
Nov 15 09:55:59 foxfire pppd[12823]: rcvd [LCP ConfAck id=0x1 <mru 576>
<asyncmap 0x0> <magic 0x8a6091e6> <pcomp> <accomp>]
Nov 15 09:55:59 foxfire pppd[12823]: rcvd [LCP ConfReq id=0x2 <mru 1524>
<asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <endpoint
[local:6d.61.78.2d.70.64.78]>]
Nov 15 09:55:59 foxfire pppd[12823]: sent [LCP ConfAck id=0x2 <mru 1524>
<asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <endpoint
[local:6d.61.78.2d.70.64.78]>]
Nov 15 09:55:59 foxfire pppd[12823]: sent [LCP EchoReq id=0x0
magic=0x8a6091e6]
Nov 15 09:55:59 foxfire pppd[12823]: sent [PAP AuthReq id=0x1
user="[EMAIL PROTECTED]" password=<hidden>]
Nov 15 09:55:59 foxfire pppd[12823]: rcvd [LCP EchoRep id=0x0 magic=0x0]
Nov 15 09:55:59 foxfire pppd[12823]: rcvd [PAP AuthAck id=0x1 ""]
Nov 15 09:55:59 foxfire pppd[12823]: sent [IPCP ConfReq id=0x1 <addr
0.0.0.0> <compress VJ 0f 01>]
Nov 15 09:55:59 foxfire pppd[12823]: rcvd [IPCP ConfReq id=0x1 <compress
VJ 0f 01> <addr 209.102.126.5>]
Nov 15 09:55:59 foxfire pppd[12823]: sent [IPCP ConfAck id=0x1 <compress
VJ 0f 01> <addr 209.102.126.5>]
Nov 15 09:55:59 foxfire pppd[12823]: rcvd [CCP ConfReq id=0x1 < 11 05 00
01 04>]
Nov 15 09:55:59 foxfire pppd[12823]: sent [CCP ConfReq id=0x1]
Nov 15 09:55:59 foxfire pppd[12823]: sent [CCP ConfRej id=0x1 < 11 05 00
01 04>]
Nov 15 09:55:59 foxfire pppd[12823]: rcvd [IPCP ConfNak id=0x1 <addr
209.102.126.143>]
Nov 15 09:55:59 foxfire pppd[12823]: sent [IPCP ConfReq id=0x2 <addr
209.102.126.143> <compress VJ 0f 01>]
Nov 15 09:56:00 foxfire pppd[12823]: rcvd [CCP ConfRej id=0x1]
Nov 15 09:56:00 foxfire pppd[12823]: rcvd [CCP ConfReq id=0x2 < 11 06 00
01 01 03>]
Nov 15 09:56:00 foxfire pppd[12823]: sent [CCP ConfReq id=0x2]
Nov 15 09:56:00 foxfire pppd[12823]: sent [CCP ConfRej id=0x2 < 11 06 00
01 01 03>]
Nov 15 09:56:00 foxfire pppd[12823]: rcvd [IPCP ConfAck id=0x2 <addr
209.102.126.143> <compress VJ 0f 01>]
Nov 15 09:56:00 foxfire pppd[12823]: Local IP address changed to
209.102.126.143
Nov 15 09:56:00 foxfire pppd[12823]: Remote IP address changed to
209.102.126.5
Nov 15 09:56:00 foxfire pppd[12823]: Cannot determine ethernet address
for proxy ARP
Nov 15 09:56:00 foxfire pppd[12823]: sent [IP data] 45 1b 00 40 b2 00 40
00 ...
Nov 15 09:56:00 foxfire pppd[12823]: Script /etc/ppp/ip-up started (pid
11853)
Nov 15 09:56:00 foxfire pppd[12823]: rcvd [CCP ConfRej id=0x2]
Nov 15 09:56:00 foxfire pppd[12823]: Script /etc/ppp/ip-up finished (pid
11853), status = 0x100
Nov 15 09:56:08 foxfire sh-httpd[7591]: connect from 192.168.1.102
Nov 15 09:56:10 foxfire sh-httpd[2126]: connect from 192.168.1.102
Nov 15 09:56:16 foxfire sh-httpd[12451]: connect from 192.168.1.102
Nov 15 09:56:18 foxfire sh-httpd[23228]: connect from 192.168.1.102
Nov 15 09:56:20 foxfire sh-httpd[3009]: connect from 192.168.1.102
Nov 15 09:56:29 foxfire pppd[12823]: sent [LCP EchoReq id=0x1
magic=0x8a6091e6]
Nov 15 09:56:29 foxfire pppd[12823]: rcvd [LCP EchoRep id=0x1 magic=0x0]
Nov 15 09:56:42 foxfire sh-httpd[25150]: connect from 192.168.1.102
Nov 15 09:56:59 foxfire pppd[12823]: sent [LCP EchoReq id=0x2
magic=0x8a6091e6]
[many echos edited out]
Nov 15 10:56:00 foxfire pppd[12823]: sent [LCP EchoReq id=0x78
magic=0x8a6091e6]
Nov 15 10:56:01 foxfire pppd[12823]: rcvd [LCP EchoRep id=0x78 magic=0x0]
Nov 15 10:56:30 foxfire pppd[12823]: sent [LCP EchoReq id=0x79
magic=0x8a6091e6]
Nov 15 10:57:00 foxfire pppd[12823]: sent [LCP EchoReq id=0x7a
magic=0x8a6091e6]
Nov 15 10:57:30 foxfire pppd[12823]: sent [LCP EchoReq id=0x7b
magic=0x8a6091e6]
Nov 15 10:58:00 foxfire pppd[12823]: sent [LCP EchoReq id=0x7c
magic=0x8a6091e6]
Nov 15 10:58:30 foxfire pppd[12823]: No response to 4 echo-requests
Nov 15 10:58:30 foxfire pppd[12823]: Serial link appears to be
disconnected.
Nov 15 10:58:30 foxfire pppd[12823]: Script /etc/ppp/ip-down started (pid
2641)
Nov 15 10:58:30 foxfire pppd[12823]: sent [LCP TermReq id=0x2 "Peer not
responding"]
Nov 15 10:58:30 foxfire pppd[12823]: Script /etc/ppp/ip-down finished
(pid 2641), status = 0x100
Nov 15 10:58:32 foxfire pppd[12823]: Hangup (SIGHUP)
Nov 15 10:58:32 foxfire pppd[12823]: Modem hangup
Nov 15 10:58:32 foxfire pppd[12823]: Connection terminated.
Nov 15 10:58:32 foxfire pppd[12823]: Connect time 62.6 minutes.
Nov 15 10:58:32 foxfire pppd[12823]: Sent 341264 bytes, received 1365635
bytes.
Nov 15 10:59:04 foxfire pppd[12823]: Starting link
Nov 15 10:59:33 foxfire pppd[12823]: Serial connection established.
Nov 15 10:59:33 foxfire pppd[12823]: using channel 2
Nov 15 10:59:33 foxfire pppd[12823]: Connect: ppp0 <--> /dev/ttyS1
Nov 15 10:59:34 foxfire pppd[12823]: sent [LCP ConfReq id=0x3 <mru 576>
<asyncmap 0x0> <magic 0xc6abef19> <pcomp> <accomp>]
Nov 15 10:59:34 foxfire pppd[12823]: rcvd [LCP ConfReq id=0x1 < 00 04 00
00> <mru 1524> <asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <mrru 1524>
<endpoint [local:6d.61.78.2d.70.64.78]> < 17 04 9a 01>]
Nov 15 10:59:34 foxfire pppd[12823]: sent [LCP ConfRej id=0x1 < 00 04 00
00> <mrru 1524> < 17 04 9a 01>]
Nov 15 10:59:34 foxfire pppd[12823]: rcvd [LCP ConfAck id=0x3 <mru 576>
<asyncmap 0x0> <magic 0xc6abef19> <pcomp> <accomp>]
Nov 15 10:59:34 foxfire pppd[12823]: rcvd [LCP ConfReq id=0x2 <mru 1524>
<asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <endpoint
[local:6d.61.78.2d.70.64.78]>]
Nov 15 10:59:34 foxfire pppd[12823]: sent [LCP ConfAck id=0x2 <mru 1524>
<asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <endpoint
[local:6d.61.78.2d.70.64.78]>]
Nov 15 10:59:34 foxfire pppd[12823]: sent [LCP EchoReq id=0x0
magic=0xc6abef19]
Nov 15 10:59:34 foxfire pppd[12823]: sent [PAP AuthReq id=0x2
user="[EMAIL PROTECTED]" password=<hidden>]
Nov 15 10:59:34 foxfire pppd[12823]: rcvd [LCP EchoRep id=0x0 magic=0x0]
Nov 15 10:59:36 foxfire pppd[12823]: rcvd [PAP AuthNak id=0x2 ""]
Nov 15 10:59:36 foxfire pppd[12823]: PAP authentication failed
Nov 15 10:59:36 foxfire pppd[12823]: sent [LCP TermReq id=0x4 "Failed to
authenticate ourselves to peer"]
Nov 15 10:59:36 foxfire pppd[12823]: rcvd [LCP TermAck id=0x4]
Nov 15 10:59:36 foxfire pppd[12823]: Connection terminated.
Nov 15 10:59:36 foxfire pppd[12823]: Hangup (SIGHUP)
Nov 15 10:59:36 foxfire pppd[12823]: Starting link
Nov 15 11:00:05 foxfire pppd[12823]: Serial connection established.
Nov 15 11:00:05 foxfire pppd[12823]: using channel 3
Nov 15 11:00:05 foxfire pppd[12823]: Connect: ppp0 <--> /dev/ttyS1
Nov 15 11:00:06 foxfire pppd[12823]: sent [LCP ConfReq id=0x5 <mru 576>
<asyncmap 0x0> <magic 0xe11b277d> <pcomp> <accomp>]
Nov 15 11:00:06 foxfire pppd[12823]: rcvd [LCP ConfReq id=0x1 < 00 04 00
00> <mru 1524> <asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <mrru 1524>
<endpoint [local:6d.61.78.2d.70.64.78]> < 17 04 c8 00>]
Nov 15 11:00:06 foxfire pppd[12823]: sent [LCP ConfRej id=0x1 < 00 04 00
00> <mrru 1524> < 17 04 c8 00>]
Nov 15 11:00:06 foxfire pppd[12823]: rcvd [LCP ConfAck id=0x5 <mru 576>
<asyncmap 0x0> <magic 0xe11b277d> <pcomp> <accomp>]
Nov 15 11:00:07 foxfire pppd[12823]: rcvd [LCP ConfReq id=0x2 <mru 1524>
<asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <endpoint
[local:6d.61.78.2d.70.64.78]>]
Nov 15 11:00:07 foxfire pppd[12823]: sent [LCP ConfAck id=0x2 <mru 1524>
<asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <endpoint
[local:6d.61.78.2d.70.64.78]>]
Nov 15 11:00:07 foxfire pppd[12823]: sent [LCP EchoReq id=0x0
magic=0xe11b277d]
Nov 15 11:00:07 foxfire pppd[12823]: sent [PAP AuthReq id=0x3
user="[EMAIL PROTECTED]" password=<hidden>]
Nov 15 11:00:07 foxfire pppd[12823]: rcvd [LCP EchoRep id=0x0 magic=0x0]
Nov 15 11:00:09 foxfire pppd[12823]: rcvd [PAP AuthNak id=0x3 ""]
Nov 15 11:00:09 foxfire pppd[12823]: PAP authentication failed
Nov 15 11:00:09 foxfire pppd[12823]: sent [LCP TermReq id=0x6 "Failed to
authenticate ourselves to peer"]
Nov 15 11:00:09 foxfire pppd[12823]: rcvd [LCP TermAck id=0x6]
Nov 15 11:00:09 foxfire pppd[12823]: Connection terminated.
Nov 15 11:00:09 foxfire pppd[12823]: Hangup (SIGHUP)
Nov 15 11:00:10 foxfire pppd[12823]: Starting link
Nov 15 11:00:38 foxfire pppd[12823]: Serial connection established.
Nov 15 11:00:38 foxfire pppd[12823]: using channel 4
Nov 15 11:00:38 foxfire pppd[12823]: Connect: ppp0 <--> /dev/ttyS1
Nov 15 11:00:39 foxfire pppd[12823]: sent [LCP ConfReq id=0x7 <mru 576>
<asyncmap 0x0> <magic 0x6c1a39f8> <pcomp> <accomp>]
Nov 15 11:00:40 foxfire pppd[12823]: rcvd [LCP ConfReq id=0x1 < 00 04 00
00> <mru 1524> <asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <mrru 1524>
<endpoint [local:6d.61.78.2d.70.64.78]> < 17 04 33 01>]
Nov 15 11:00:40 foxfire pppd[12823]: sent [LCP ConfRej id=0x1 < 00 04 00
00> <mrru 1524> < 17 04 33 01>]
Nov 15 11:00:40 foxfire pppd[12823]: rcvd [LCP ConfAck id=0x7 <mru 576>
<asyncmap 0x0> <magic 0x6c1a39f8> <pcomp> <accomp>]
Nov 15 11:00:40 foxfire pppd[12823]: rcvd [LCP ConfReq id=0x2 <mru 1524>
<asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <endpoint
[local:6d.61.78.2d.70.64.78]>]
Nov 15 11:00:40 foxfire pppd[12823]: sent [LCP ConfAck id=0x2 <mru 1524>
<asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <endpoint
[local:6d.61.78.2d.70.64.78]>]
Nov 15 11:00:40 foxfire pppd[12823]: sent [LCP EchoReq id=0x0
magic=0x6c1a39f8]
Nov 15 11:00:40 foxfire pppd[12823]: sent [PAP AuthReq id=0x4
user="[EMAIL PROTECTED]" password=<hidden>]
Nov 15 11:00:40 foxfire pppd[12823]: rcvd [LCP EchoRep id=0x0 magic=0x0]
Nov 15 11:00:43 foxfire pppd[12823]: sent [PAP AuthReq id=0x5
user="[EMAIL PROTECTED]" password=<hidden>]
Nov 15 11:00:46 foxfire pppd[12823]: sent [PAP AuthReq id=0x6
user="[EMAIL PROTECTED]" password=<hidden>]
Nov 15 11:00:49 foxfire pppd[12823]: sent [PAP AuthReq id=0x7
user="[EMAIL PROTECTED]" password=<hidden>]
Nov 15 11:00:52 foxfire pppd[12823]: sent [PAP AuthReq id=0x8
user="[EMAIL PROTECTED]" password=<hidden>]
Nov 15 11:00:55 foxfire pppd[12823]: sent [PAP AuthReq id=0x9
user="[EMAIL PROTECTED]" password=<hidden>]
Nov 15 11:00:56 foxfire pppd[12823]: rcvd [PAP AuthNak id=0x9 ""]
Nov 15 11:00:56 foxfire pppd[12823]: PAP authentication failed
Nov 15 11:00:56 foxfire pppd[12823]: sent [LCP TermReq id=0x8 "Failed to
authenticate ourselves to peer"]
Nov 15 11:00:56 foxfire pppd[12823]: rcvd [LCP TermAck id=0x8]
Nov 15 11:00:56 foxfire pppd[12823]: Connection terminated.
Nov 15 11:00:56 foxfire pppd[12823]: Hangup (SIGHUP)
Nov 15 11:00:56 foxfire pppd[12823]: Starting link
Nov 15 11:00:58 foxfire pppd[12823]: Connect script failed
Nov 15 11:01:26 foxfire pppd[12823]: Starting link
Nov 15 11:01:43 foxfire sh-httpd[18760]: connect from 192.168.1.102
Nov 15 11:01:51 foxfire sh-httpd[27488]: connect from 192.168.1.102
Nov 15 11:01:53 foxfire sh-httpd[8952]: connect from 192.168.1.102
Nov 15 11:01:55 foxfire pppd[12823]: Serial connection established.
Nov 15 11:01:55 foxfire pppd[12823]: using channel 5
Nov 15 11:01:55 foxfire pppd[12823]: Connect: ppp0 <--> /dev/ttyS1
Nov 15 11:01:56 foxfire pppd[12823]: sent [LCP ConfReq id=0x9 <mru 576>
<asyncmap 0x0> <magic 0x5cc2eabf> <pcomp> <accomp>]
Nov 15 11:01:56 foxfire pppd[12823]: rcvd [LCP ConfReq id=0x1 < 00 04 00
00> <mru 1524> <asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <mrru 1524>
<endpoint [local:6d.61.78.2d.70.64.78]> < 17 04 cc 00>]
Nov 15 11:01:56 foxfire pppd[12823]: sent [LCP ConfRej id=0x1 < 00 04 00
00> <mrru 1524> < 17 04 cc 00>]
Nov 15 11:01:56 foxfire pppd[12823]: rcvd [LCP ConfAck id=0x9 <mru 576>
<asyncmap 0x0> <magic 0x5cc2eabf> <pcomp> <accomp>]
Nov 15 11:01:57 foxfire pppd[12823]: rcvd [LCP ConfReq id=0x2 <mru 1524>
<asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <endpoint
[local:6d.61.78.2d.70.64.78]>]
Nov 15 11:01:57 foxfire pppd[12823]: sent [LCP ConfAck id=0x2 <mru 1524>
<asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <endpoint
[local:6d.61.78.2d.70.64.78]>]
Nov 15 11:01:57 foxfire pppd[12823]: sent [LCP EchoReq id=0x0
magic=0x5cc2eabf]
Nov 15 11:01:57 foxfire pppd[12823]: sent [PAP AuthReq id=0xa
user="[EMAIL PROTECTED]" password=<hidden>]
Nov 15 11:01:57 foxfire pppd[12823]: rcvd [LCP EchoRep id=0x0 magic=0x0]
Nov 15 11:02:00 foxfire pppd[12823]: sent [PAP AuthReq id=0xb
user="[EMAIL PROTECTED]" password=<hidden>]
Nov 15 11:02:00 foxfire pppd[12823]: rcvd [PAP AuthNak id=0xb ""]
Nov 15 11:02:00 foxfire pppd[12823]: PAP authentication failed
Nov 15 11:02:00 foxfire pppd[12823]: sent [LCP TermReq id=0xa "Failed to
authenticate ourselves to peer"]
Nov 15 11:02:00 foxfire pppd[12823]: rcvd [LCP TermAck id=0xa]
Nov 15 11:02:00 foxfire pppd[12823]: Connection terminated.
Nov 15 11:02:00 foxfire pppd[12823]: Hangup (SIGHUP)
Nov 15 11:02:01 foxfire pppd[12823]: Starting link
Nov 15 11:02:29 foxfire pppd[12823]: Serial connection established.
Nov 15 11:02:29 foxfire pppd[12823]: using channel 6
Nov 15 11:02:29 foxfire pppd[12823]: Connect: ppp0 <--> /dev/ttyS1
Nov 15 11:02:30 foxfire pppd[12823]: sent [LCP ConfReq id=0xb <mru 576>
<asyncmap 0x0> <magic 0x9bc2ae55> <pcomp> <accomp>]
Nov 15 11:02:30 foxfire pppd[12823]: rcvd [LCP ConfReq id=0x1 < 00 04 00
00> <mru 1524> <asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <mrru 1524>
<endpoint [local:6d.61.78.2d.70.64.78]> < 17 04 a8 01>]
Nov 15 11:02:30 foxfire pppd[12823]: sent [LCP ConfRej id=0x1 < 00 04 00
00> <mrru 1524> < 17 04 a8 01>]
Nov 15 11:02:30 foxfire pppd[12823]: rcvd [LCP ConfAck id=0xb <mru 576>
<asyncmap 0x0> <magic 0x9bc2ae55> <pcomp> <accomp>]
Nov 15 11:02:30 foxfire pppd[12823]: rcvd [LCP ConfReq id=0x2 <mru 1524>
<asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <endpoint
[local:6d.61.78.2d.70.64.78]>]
Nov 15 11:02:30 foxfire pppd[12823]: sent [LCP ConfAck id=0x2 <mru 1524>
<asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <endpoint
[local:6d.61.78.2d.70.64.78]>]
Nov 15 11:02:30 foxfire pppd[12823]: sent [LCP EchoReq id=0x0
magic=0x9bc2ae55]
Nov 15 11:02:30 foxfire pppd[12823]: sent [PAP AuthReq id=0xc
user="[EMAIL PROTECTED]" password=<hidden>]
Nov 15 11:02:31 foxfire pppd[12823]: rcvd [LCP EchoRep id=0x0 magic=0x0]
Nov 15 11:02:33 foxfire pppd[12823]: rcvd [PAP AuthNak id=0xc ""]
Nov 15 11:02:33 foxfire pppd[12823]: PAP authentication failed
Nov 15 11:02:33 foxfire pppd[12823]: sent [LCP TermReq id=0xc "Failed to
authenticate ourselves to peer"]
Nov 15 11:02:33 foxfire pppd[12823]: rcvd [LCP TermAck id=0xc]
Nov 15 11:02:33 foxfire pppd[12823]: Connection terminated.
Nov 15 11:02:33 foxfire pppd[12823]: Hangup (SIGHUP)
Nov 15 11:02:35 foxfire pppd[12823]: Starting link
Nov 15 11:02:41 foxfire sh-httpd[30587]: connect from 192.168.1.102
Nov 15 11:02:43 foxfire sh-httpd[12887]: connect from 192.168.1.102
Nov 15 11:03:03 foxfire pppd[12823]: Serial connection established.
Nov 15 11:03:03 foxfire pppd[12823]: using channel 7
Nov 15 11:03:03 foxfire pppd[12823]: Connect: ppp0 <--> /dev/ttyS1
Nov 15 11:03:04 foxfire pppd[12823]: sent [LCP ConfReq id=0xd <mru 576>
<asyncmap 0x0> <magic 0x5a060421> <pcomp> <accomp>]
Nov 15 11:03:05 foxfire pppd[12823]: rcvd [LCP ConfReq id=0x1 < 00 04 00
00> <mru 1524> <asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <mrru 1524>
<endpoint [local:6d.61.78.2d.70.64.78]> < 17 04 41 01>]
Nov 15 11:03:05 foxfire pppd[12823]: sent [LCP ConfRej id=0x1 < 00 04 00
00> <mrru 1524> < 17 04 41 01>]
Nov 15 11:03:05 foxfire pppd[12823]: rcvd [LCP ConfAck id=0xd <mru 576>
<asyncmap 0x0> <magic 0x5a060421> <pcomp> <accomp>]
Nov 15 11:03:05 foxfire pppd[12823]: rcvd [LCP ConfReq id=0x2 <mru 1524>
<asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <endpoint
[local:6d.61.78.2d.70.64.78]>]
Nov 15 11:03:05 foxfire pppd[12823]: sent [LCP ConfAck id=0x2 <mru 1524>
<asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <endpoint
[local:6d.61.78.2d.70.64.78]>]
Nov 15 11:03:05 foxfire pppd[12823]: sent [LCP EchoReq id=0x0
magic=0x5a060421]
Nov 15 11:03:05 foxfire pppd[12823]: sent [PAP AuthReq id=0xd
user="[EMAIL PROTECTED]" password=<hidden>]
Nov 15 11:03:05 foxfire pppd[12823]: rcvd [LCP EchoRep id=0x0 magic=0x0]
Nov 15 11:03:07 foxfire pppd[12823]: rcvd [PAP AuthNak id=0xd ""]
Nov 15 11:03:07 foxfire pppd[12823]: PAP authentication failed
Nov 15 11:03:07 foxfire pppd[12823]: sent [LCP TermReq id=0xe "Failed to
authenticate ourselves to peer"]
Nov 15 11:03:07 foxfire pppd[12823]: rcvd [LCP TermAck id=0xe]
Nov 15 11:03:07 foxfire pppd[12823]: Connection terminated.
Nov 15 11:03:07 foxfire pppd[12823]: Hangup (SIGHUP)
Nov 15 11:03:08 foxfire pppd[12823]: Starting link
Nov 15 11:03:13 foxfire sh-httpd[12353]: connect from 192.168.1.102
Nov 15 11:03:15 foxfire sh-httpd[350]: connect from 192.168.1.102
Nov 15 11:03:34 foxfire sh-httpd[1412]: connect from 192.168.1.102
Nov 15 11:03:36 foxfire sh-httpd[11552]: connect from 192.168.1.102
Nov 15 11:03:36 foxfire pppd[12823]: Serial connection established.
Nov 15 11:03:36 foxfire pppd[12823]: using channel 8
Nov 15 11:03:36 foxfire pppd[12823]: Connect: ppp0 <--> /dev/ttyS1
Nov 15 11:03:37 foxfire sh-httpd[14886]: connect from 192.168.1.102
Nov 15 11:03:37 foxfire pppd[12823]: sent [LCP ConfReq id=0xf <mru 576>
<asyncmap 0x0> <magic 0xe4b1066d> <pcomp> <accomp>]
Nov 15 11:03:38 foxfire pppd[12823]: rcvd [LCP ConfReq id=0x1 < 00 04 00
00> <mru 1524> <asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <mrru 1524>
<endpoint [local:6d.61.78.2d.70.64.78]> < 17 04 16 00>]
Nov 15 11:03:38 foxfire pppd[12823]: sent [LCP ConfRej id=0x1 < 00 04 00
00> <mrru 1524> < 17 04 16 00>]
Nov 15 11:03:38 foxfire pppd[12823]: rcvd [LCP ConfAck id=0xf <mru 576>
<asyncmap 0x0> <magic 0xe4b1066d> <pcomp> <accomp>]
Nov 15 11:03:38 foxfire pppd[12823]: rcvd [LCP ConfReq id=0x2 <mru 1524>
<asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <endpoint
[local:6d.61.78.2d.70.64.78]>]
Nov 15 11:03:38 foxfire pppd[12823]: sent [LCP ConfAck id=0x2 <mru 1524>
<asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <endpoint
[local:6d.61.78.2d.70.64.78]>]
Nov 15 11:03:38 foxfire pppd[12823]: sent [LCP EchoReq id=0x0
magic=0xe4b1066d]
Nov 15 11:03:38 foxfire pppd[12823]: sent [PAP AuthReq id=0xe
user="[EMAIL PROTECTED]" password=<hidden>]
Nov 15 11:03:38 foxfire pppd[12823]: rcvd [LCP EchoRep id=0x0 magic=0x0]
Nov 15 11:03:40 foxfire pppd[12823]: rcvd [PAP AuthNak id=0xe ""]
Nov 15 11:03:40 foxfire pppd[12823]: PAP authentication failed
Nov 15 11:03:40 foxfire pppd[12823]: sent [LCP TermReq id=0x10 "Failed to
authenticate ourselves to peer"]
Nov 15 11:03:40 foxfire pppd[12823]: rcvd [LCP TermAck id=0x10]
Nov 15 11:03:40 foxfire pppd[12823]: Connection terminated.
Nov 15 11:03:40 foxfire pppd[12823]: Hangup (SIGHUP)
Nov 15 11:03:41 foxfire pppd[12823]: Starting link
Nov 15 11:04:08 foxfire sh-httpd[20837]: connect from 192.168.1.102
Nov 15 11:04:10 foxfire pppd[12823]: Serial connection established.
Nov 15 11:04:10 foxfire pppd[12823]: using channel 9
Nov 15 11:04:10 foxfire pppd[12823]: Connect: ppp0 <--> /dev/ttyS1
Nov 15 11:04:10 foxfire sh-httpd[14451]: connect from 192.168.1.102
Nov 15 11:04:11 foxfire pppd[12823]: sent [LCP ConfReq id=0x11 <mru 576>
<asyncmap 0x0> <magic 0xd4f0dd8d> <pcomp> <accomp>]
Nov 15 11:04:11 foxfire pppd[12823]: rcvd [LCP ConfReq id=0x1 < 00 04 00
00> <mru 1524> <asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <mrru 1524>
<endpoint [local:6d.61.78.2d.70.64.78]> < 17 04 18 00>]
Nov 15 11:04:11 foxfire pppd[12823]: sent [LCP ConfRej id=0x1 < 00 04 00
00> <mrru 1524> < 17 04 18 00>]
Nov 15 11:04:11 foxfire pppd[12823]: rcvd [LCP ConfAck id=0x11 <mru 576>
<asyncmap 0x0> <magic 0xd4f0dd8d> <pcomp> <accomp>]
Nov 15 11:04:11 foxfire pppd[12823]: rcvd [LCP ConfReq id=0x2 <mru 1524>
<asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <endpoint
[local:6d.61.78.2d.70.64.78]>]
Nov 15 11:04:11 foxfire pppd[12823]: sent [LCP ConfAck id=0x2 <mru 1524>
<asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <endpoint
[local:6d.61.78.2d.70.64.78]>]
Nov 15 11:04:11 foxfire pppd[12823]: sent [LCP EchoReq id=0x0
magic=0xd4f0dd8d]
Nov 15 11:04:11 foxfire pppd[12823]: sent [PAP AuthReq id=0xf
user="[EMAIL PROTECTED]" password=<hidden>]
Nov 15 11:04:11 foxfire pppd[12823]: rcvd [LCP EchoRep id=0x0 magic=0x0]
Nov 15 11:04:11 foxfire sh-httpd[12644]: connect from 192.168.1.102
Nov 15 11:04:12 foxfire pppd[12823]: rcvd [PAP AuthNak id=0xf ""]
Nov 15 11:04:12 foxfire pppd[12823]: PAP authentication failed
Nov 15 11:04:12 foxfire pppd[12823]: sent [LCP TermReq id=0x12 "Failed to
authenticate ourselves to peer"]
Nov 15 11:04:12 foxfire pppd[12823]: rcvd [LCP TermAck id=0x12]
Nov 15 11:04:12 foxfire pppd[12823]: Connection terminated.
Nov 15 11:04:13 foxfire pppd[12823]: Hangup (SIGHUP)
Nov 15 11:04:13 foxfire pppd[12823]: Starting link
Nov 15 11:04:31 foxfire sh-httpd[30736]: connect from 192.168.1.102
Nov 15 11:04:36 foxfire sh-httpd[3876]: connect from 192.168.1.102
Nov 15 11:04:42 foxfire pppd[12823]: Serial connection established.
Nov 15 11:04:42 foxfire pppd[12823]: using channel 10
Nov 15 11:04:42 foxfire pppd[12823]: Connect: ppp0 <--> /dev/ttyS1
Nov 15 11:04:43 foxfire pppd[12823]: sent [LCP ConfReq id=0x13 <mru 576>
<asyncmap 0x0> <magic 0xeef6ee72> <pcomp> <accomp>]
Nov 15 11:04:43 foxfire pppd[12823]: rcvd [LCP ConfReq id=0x1 < 00 04 00
00> <mru 1524> <asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <mrru 1524>
<endpoint [local:6d.61.78.2d.70.64.78]> < 17 04 d6 00>]
Nov 15 11:04:43 foxfire pppd[12823]: sent [LCP ConfRej id=0x1 < 00 04 00
00> <mrru 1524> < 17 04 d6 00>]
Nov 15 11:04:43 foxfire pppd[12823]: rcvd [LCP ConfAck id=0x13 <mru 576>
<asyncmap 0x0> <magic 0xeef6ee72> <pcomp> <accomp>]
Nov 15 11:04:43 foxfire pppd[12823]: rcvd [LCP ConfReq id=0x2 <mru 1524>
<asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <endpoint
[local:6d.61.78.2d.70.64.78]>]
Nov 15 11:04:43 foxfire pppd[12823]: sent [LCP ConfAck id=0x2 <mru 1524>
<asyncmap 0xa0000> <auth pap> <pcomp> <accomp> <endpoint
[local:6d.61.78.2d.70.64.78]>]
Nov 15 11:04:43 foxfire pppd[12823]: sent [LCP EchoReq id=0x0
magic=0xeef6ee72]
Nov 15 11:04:43 foxfire pppd[12823]: sent [PAP AuthReq id=0x10
user="[EMAIL PROTECTED]" password=<hidden>]
Nov 15 11:04:43 foxfire pppd[12823]: rcvd [LCP EchoRep id=0x0 magic=0x0]
Nov 15 11:04:44 foxfire sh-httpd[28597]: connect from 192.168.1.102
Nov 15 11:04:45 foxfire pppd[12823]: rcvd [PAP AuthNak id=0x10 ""]
Nov 15 11:04:45 foxfire pppd[12823]: PAP authentication failed
Nov 15 11:04:45 foxfire pppd[12823]: sent [LCP TermReq id=0x14 "Failed to
authenticate ourselves to peer"]
Nov 15 11:04:45 foxfire pppd[12823]: rcvd [LCP TermAck id=0x14]
Nov 15 11:04:45 foxfire pppd[12823]: Connection terminated.
Nov 15 11:04:46 foxfire pppd[12823]: Hangup (SIGHUP)
Nov 15 11:04:46 foxfire pppd[12823]: Exit.
Nov 15 11:05:11 foxfire sh-httpd[199]: connect from 192.168.1.102
Nov 15 11:06:44 foxfire sh-httpd[1144]: connect from 192.168.1.102
Nov 15 11:06:46 foxfire sh-httpd[23667]: connect from 192.168.1.102
Nov 15 11:06:48 foxfire sh-httpd[31223]: connect from 192.168.1.102
Nov 15 11:09:00 foxfire sh-httpd[28492]: connect from 192.168.1.102
Nov 15 11:09:02 foxfire sh-httpd[25193]: connect from 192.168.1.102
Nov 15 11:09:03 foxfire sh-httpd[12201]: connect from 192.168.1.102
Nov 15 11:10:21 foxfire sh-httpd[5784]: connect from 192.168.1.102
Nov 15 11:10:23 foxfire sh-httpd[32021]: connect from 192.168.1.102
Nov 15 11:10:24 foxfire sh-httpd[17028]: connect from 192.168.1.102
Nov 15 11:11:09 foxfire sh-httpd[22542]: connect from 192.168.1.102
Nov 15 11:11:11 foxfire sh-httpd[10872]: connect from 192.168.1.102
Nov 15 11:13:15 foxfire sh-httpd[2312]: connect from 192.168.1.102
Nov 15 11:13:17 foxfire sh-httpd[20923]: connect from 192.168.1.102
Nov 15 11:13:18 foxfire sh-httpd[100]: connect from 192.168.1.102
Nov 15 11:14:35 foxfire sh-httpd[16708]: connect from 192.168.1.102
Nov 15 11:14:41 foxfire sh-httpd[741]: connect from 192.168.1.102
Nov 15 11:14:44 foxfire sh-httpd[3295]: connect from 192.168.1.102
Nov 15 11:15:25 foxfire sh-httpd[6298]: connect from 192.168.1.102
Nov 15 11:15:46 foxfire sh-httpd[15836]: connect from 192.168.1.102
Nov 15 11:15:47 foxfire sh-httpd[28313]: connect from 192.168.1.102
Nov 15 11:16:19 foxfire sh-httpd[11480]: connect from 192.168.1.102
Nov 15 11:17:30 foxfire sh-httpd[17477]: connect from 192.168.1.102
Nov 15 11:17:32 foxfire sh-httpd[1783]: connect from 192.168.1.102
Nov 15 11:17:34 foxfire sh-httpd[19390]: connect from 192.168.1.102
Nov 15 11:17:52 foxfire sh-httpd[8458]: connect from 192.168.1.102
Nov 15 11:17:56 foxfire sh-httpd[2945]: connect from 192.168.1.102
Nov 15 11:17:58 foxfire sh-httpd[18337]: connect from 192.168.1.102
Nov 15 11:18:05 foxfire sh-httpd[24764]: connect from 192.168.1.102
Nov 15 11:18:13 foxfire sh-httpd[4841]: connect from 192.168.1.102
Nov 15 11:18:15 foxfire sh-httpd[24482]: connect from 192.168.1.102
Nov 15 11:18:16 foxfire sh-httpd[24594]: connect from 192.168.1.102

==shorewall status
Shorewall-1.4.2 Status at foxfire - Sat Nov 15 11:31:36 UTC 2003

Counters reset Sat Nov 15 09:49:19 UTC 2003

Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 DROP      !icmp --  *      *       0.0.0.0/0           
0.0.0.0/0          state INVALID 
    0     0 ACCEPT     all  --  lo     *       0.0.0.0/0           
0.0.0.0/0          
  252 34775 ppp0_in    all  --  ppp0   *       0.0.0.0/0           
0.0.0.0/0          
 1027 73986 eth0_in    all  --  eth0   *       0.0.0.0/0           
0.0.0.0/0          
    0     0 common     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          
    0     0 ULOG       all  --  *      *       0.0.0.0/0           
0.0.0.0/0          ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:INPUT:REJECT:' queue_threshold 1 
    0     0 reject     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 DROP      !icmp --  *      *       0.0.0.0/0           
0.0.0.0/0          state INVALID 
  311 19052 TCPMSS     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp flags:0x06/0x02 TCPMSS clamp to PMTU 
 3045 1331K ppp0_fwd   all  --  ppp0   *       0.0.0.0/0           
0.0.0.0/0          
 2481  323K eth0_fwd   all  --  eth0   *       0.0.0.0/0           
0.0.0.0/0          
    0     0 common     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          
    0     0 ULOG       all  --  *      *       0.0.0.0/0           
0.0.0.0/0          ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:FORWARD:REJECT:' queue_threshold 1 
    0     0 reject     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain OUTPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 DROP      !icmp --  *      *       0.0.0.0/0           
0.0.0.0/0          state INVALID 
    0     0 ACCEPT     all  --  *      lo      0.0.0.0/0           
0.0.0.0/0          
  862 65975 fw2net     all  --  *      ppp0    0.0.0.0/0           
0.0.0.0/0          
 1592  694K fw2loc     all  --  *      eth0    0.0.0.0/0           
0.0.0.0/0          
    0     0 common     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          
    0     0 ULOG       all  --  *      *       0.0.0.0/0           
0.0.0.0/0          ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:OUTPUT:REJECT:' queue_threshold 1 
    0     0 reject     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain all2all (3 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
   40  3440 common     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          
   16  1472 ULOG       all  --  *      *       0.0.0.0/0           
0.0.0.0/0          ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:all2all:REJECT:' queue_threshold 1 
   16  1472 reject     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain badpkt (2 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 LOG        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          LOG flags 6 level 6 prefix `Shorewall:badpkt:DROP:' 
    0     0 LOG       !tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          LOG flags 4 level 6 prefix `Shorewall:badpkt:DROP:' 
    0     0 DROP       all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain common (5 references)
 pkts bytes target     prot opt in     out     source              
destination         
   16  1472 icmpdef    icmp --  *      *       0.0.0.0/0           
0.0.0.0/0          
    4   312 reject     udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          udp dpts:137:139 
    0     0 reject     udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          udp dpt:445 
    0     0 reject     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp dpt:139 
    0     0 reject     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp dpt:445 
  103  4944 reject     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp dpt:135 
    0     0 DROP       udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          udp dpt:1900 
    0     0 DROP       all  --  *      *       0.0.0.0/0           
255.255.255.255    
    0     0 DROP       all  --  *      *       0.0.0.0/0           
224.0.0.0/4        
    0     0 reject     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp dpt:113 
   24  1968 DROP       udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          udp spt:53 state NEW 
    0     0 DROP       all  --  *      *       0.0.0.0/0           
192.168.1.255      

Chain dynamic (4 references)
 pkts bytes target     prot opt in     out     source              
destination         

Chain eth0_fwd (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
 2481  323K dynamic    all  --  *      *       0.0.0.0/0           
0.0.0.0/0          
 2481  323K loc2net    all  --  *      ppp0    0.0.0.0/0           
0.0.0.0/0          

Chain eth0_in (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
 1027 73986 dynamic    all  --  *      *       0.0.0.0/0           
0.0.0.0/0          
 1027 73986 loc2fw     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain fw2loc (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
 1552  691K ACCEPT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0           
0.0.0.0/0          icmp type 8 
   40  3440 all2all    all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain fw2net (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
  187 11904 ACCEPT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp dpt:53 
  675 54071 ACCEPT     udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW udp dpt:53 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0           
0.0.0.0/0          icmp type 8 
    0     0 all2all    all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain icmpdef (1 references)
 pkts bytes target     prot opt in     out     source              
destination         

Chain loc2fw (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
  912 65925 ACCEPT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp dpt:22 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0           
0.0.0.0/0          icmp type 8 
   51  3965 ACCEPT     udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW udp dpt:53 
   64  4096 ACCEPT     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp dpt:80 
    0     0 all2all    all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain loc2net (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
 2323  313K ACCEPT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
  158 10112 ACCEPT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain logdrop (30 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ULOG       all  --  *      *       0.0.0.0/0           
0.0.0.0/0          ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:rfc1918:DROP:' queue_threshold 1 
    0     0 DROP       all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain logflags (5 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ULOG       all  --  *      *       0.0.0.0/0           
0.0.0.0/0          ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:logflags:DROP:' queue_threshold 1 
    0     0 DROP       all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain net2all (2 references)
 pkts bytes target     prot opt in     out     source              
destination         
 3045 1331K ACCEPT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
  108  5296 common     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          
    1    40 ULOG       all  --  *      *       0.0.0.0/0           
0.0.0.0/0          ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:net2all:DROP:' queue_threshold 1 
    1    40 DROP       all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain net2fw (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
   64 22119 ACCEPT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
   80  7360 ACCEPT     icmp --  *      *       0.0.0.0/0           
0.0.0.0/0          icmp type 8 
  108  5296 net2all    all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain newnotsyn (7 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 DROP       all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain ppp0_fwd (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
 3045 1331K dynamic    all  --  *      *       0.0.0.0/0           
0.0.0.0/0          
    0     0 badpkt     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          unclean 
    0     0 rfc1918    all  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW 
 3045 1331K tcpflags   tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          
 3045 1331K net2all    all  --  *      eth0    0.0.0.0/0           
0.0.0.0/0          

Chain ppp0_in (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
  252 34775 dynamic    all  --  *      *       0.0.0.0/0           
0.0.0.0/0          
    0     0 badpkt     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          unclean 
  188 12656 rfc1918    all  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW 
  104  4984 tcpflags   tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          
  252 34775 net2fw     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain reject (10 references)
 pkts bytes target     prot opt in     out     source              
destination         
  103  4944 REJECT     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          reject-with tcp-reset 
   20  1784 REJECT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          reject-with icmp-port-unreachable 

Chain rfc1918 (2 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 RETURN     all  --  *      *       255.255.255.255     
0.0.0.0/0          
    0     0 DROP       all  --  *      *       169.254.0.0/16      
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       172.16.0.0/12       
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       192.0.2.0/24        
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       192.168.0.0/16      
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       0.0.0.0/7           
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       2.0.0.0/8           
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       5.0.0.0/8           
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       7.0.0.0/8           
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       10.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       23.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       27.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       31.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       36.0.0.0/7          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       39.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       41.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       42.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       49.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       50.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       58.0.0.0/7          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       60.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       70.0.0.0/7          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       72.0.0.0/5          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       83.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       84.0.0.0/6          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       88.0.0.0/5          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       96.0.0.0/3          
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       127.0.0.0/8         
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       197.0.0.0/8         
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       198.18.0.0/15       
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       201.0.0.0/8         
0.0.0.0/0          
    0     0 logdrop    all  --  *      *       240.0.0.0/4         
0.0.0.0/0          

Chain shorewall (0 references)
 pkts bytes target     prot opt in     out     source              
destination         

Chain tcpflags (2 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 logflags   tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp flags:0x3F/0x29 
    0     0 logflags   tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp flags:0x3F/0x00 
    0     0 logflags   tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp flags:0x06/0x06 
    0     0 logflags   tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp flags:0x03/0x03 
    0     0 logflags   tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp spt:0 flags:0x16/0x02 

Nov 15 10:18:04 net2all:DROP: IN=ppp0 OUT= SRC=80.168.23.30
DST=209.102.126.143 LEN=40 TOS=00 PREC=0x00 TTL=237 ID=46991 PROTO=TCP
SPT=2206 DPT=554 SEQ=757147 ACK=0 WINDOW=4096 SYN URGP=0 
Nov 15 11:09:17 all2all:REJECT: IN= OUT=eth0 SRC=192.168.1.254
DST=192.168.1.102 LEN=92 TOS=00 PREC=0x00 TTL=64 ID=30485 PROTO=ICMP
TYPE=3 CODE=0 
Nov 15 11:09:24 all2all:REJECT: IN= OUT=eth0 SRC=192.168.1.254
DST=192.168.1.102 LEN=92 TOS=00 PREC=0x00 TTL=64 ID=37711 PROTO=ICMP
TYPE=3 CODE=0 
Nov 15 11:09:34 all2all:REJECT: IN= OUT=eth0 SRC=192.168.1.254
DST=192.168.1.102 LEN=92 TOS=00 PREC=0x00 TTL=64 ID=14701 PROTO=ICMP
TYPE=3 CODE=0 
Nov 15 11:09:47 all2all:REJECT: IN= OUT=eth0 SRC=192.168.1.254
DST=192.168.1.102 LEN=92 TOS=00 PREC=0x00 TTL=64 ID=23834 PROTO=ICMP
TYPE=3 CODE=0 
Nov 15 11:10:36 all2all:REJECT: IN= OUT=eth0 SRC=192.168.1.254
DST=192.168.1.102 LEN=92 TOS=00 PREC=0x00 TTL=64 ID=36116 PROTO=ICMP
TYPE=3 CODE=0 
Nov 15 11:10:43 all2all:REJECT: IN= OUT=eth0 SRC=192.168.1.254
DST=192.168.1.102 LEN=92 TOS=00 PREC=0x00 TTL=64 ID=18026 PROTO=ICMP
TYPE=3 CODE=0 
Nov 15 11:10:53 all2all:REJECT: IN= OUT=eth0 SRC=192.168.1.254
DST=192.168.1.102 LEN=92 TOS=00 PREC=0x00 TTL=64 ID=27937 PROTO=ICMP
TYPE=3 CODE=0 
Nov 15 11:11:06 all2all:REJECT: IN= OUT=eth0 SRC=192.168.1.254
DST=192.168.1.102 LEN=92 TOS=00 PREC=0x00 TTL=64 ID=42018 PROTO=ICMP
TYPE=3 CODE=0 
Nov 15 11:12:25 all2all:REJECT: IN= OUT=eth0 SRC=192.168.1.254
DST=192.168.1.102 LEN=92 TOS=00 PREC=0x00 TTL=64 ID=57797 PROTO=ICMP
TYPE=3 CODE=0 
Nov 15 11:12:32 all2all:REJECT: IN= OUT=eth0 SRC=192.168.1.254
DST=192.168.1.102 LEN=92 TOS=00 PREC=0x00 TTL=64 ID=25778 PROTO=ICMP
TYPE=3 CODE=0 
Nov 15 11:12:42 all2all:REJECT: IN= OUT=eth0 SRC=192.168.1.254
DST=192.168.1.102 LEN=92 TOS=00 PREC=0x00 TTL=64 ID=26350 PROTO=ICMP
TYPE=3 CODE=0 
Nov 15 11:12:55 all2all:REJECT: IN= OUT=eth0 SRC=192.168.1.254
DST=192.168.1.102 LEN=92 TOS=00 PREC=0x00 TTL=64 ID=58775 PROTO=ICMP
TYPE=3 CODE=0 
Nov 15 11:16:38 all2all:REJECT: IN= OUT=eth0 SRC=192.168.1.254
DST=192.168.1.102 LEN=92 TOS=00 PREC=0x00 TTL=64 ID=13352 PROTO=ICMP
TYPE=3 CODE=0 
Nov 15 11:16:45 all2all:REJECT: IN= OUT=eth0 SRC=192.168.1.254
DST=192.168.1.102 LEN=92 TOS=00 PREC=0x00 TTL=64 ID=43817 PROTO=ICMP
TYPE=3 CODE=0 
Nov 15 11:16:55 all2all:REJECT: IN= OUT=eth0 SRC=192.168.1.254
DST=192.168.1.102 LEN=92 TOS=00 PREC=0x00 TTL=64 ID=5501 PROTO=ICMP
TYPE=3 CODE=0 
Nov 15 11:17:08 all2all:REJECT: IN= OUT=eth0 SRC=192.168.1.254
DST=192.168.1.102 LEN=92 TOS=00 PREC=0x00 TTL=64 ID=6703 PROTO=ICMP
TYPE=3 CODE=0 

NAT Table

Chain PREROUTING (policy ACCEPT 443 packets, 29117 bytes)
 pkts bytes target     prot opt in     out     source              
destination         

Chain POSTROUTING (policy ACCEPT 778 packets, 58191 bytes)
 pkts bytes target     prot opt in     out     source              
destination         
  932 68047 ppp0_masq  all  --  *      ppp0    0.0.0.0/0           
0.0.0.0/0          

Chain OUTPUT (policy ACCEPT 699 packets, 56039 bytes)
 pkts bytes target     prot opt in     out     source              
destination         

Chain ppp0_masq (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
  154  9856 MASQUERADE  all  --  *      *       192.168.1.0/24      
0.0.0.0/0          

Mangle Table

Chain PREROUTING (policy ACCEPT 6822 packets, 1763K bytes)
 pkts bytes target     prot opt in     out     source              
destination         
  189 12696 man1918    all  --  ppp0   *       0.0.0.0/0           
0.0.0.0/0          state NEW 
 6822 1763K pretos     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain INPUT (policy ACCEPT 1279 packets, 109K bytes)
 pkts bytes target     prot opt in     out     source              
destination         

Chain FORWARD (policy ACCEPT 5526 packets, 1653K bytes)
 pkts bytes target     prot opt in     out     source              
destination         

Chain OUTPUT (policy ACCEPT 2454 packets, 760K bytes)
 pkts bytes target     prot opt in     out     source              
destination         
 2454  760K outtos     all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain POSTROUTING (policy ACCEPT 7940 packets, 2410K bytes)
 pkts bytes target     prot opt in     out     source              
destination         

Chain logdrop (30 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ULOG       all  --  *      *       0.0.0.0/0           
0.0.0.0/0          ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:man1918:DROP:' queue_threshold 1 
    0     0 DROP       all  --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain man1918 (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 RETURN     all  --  *      *       0.0.0.0/0           
255.255.255.255    
    0     0 DROP       all  --  *      *       0.0.0.0/0           
169.254.0.0/16     
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
172.16.0.0/12      
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
192.0.2.0/24       
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
192.168.0.0/16     
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
0.0.0.0/7          
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
2.0.0.0/8          
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
5.0.0.0/8          
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
7.0.0.0/8          
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
10.0.0.0/8         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
23.0.0.0/8         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
27.0.0.0/8         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
31.0.0.0/8         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
36.0.0.0/7         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
39.0.0.0/8         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
41.0.0.0/8         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
42.0.0.0/8         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
49.0.0.0/8         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
50.0.0.0/8         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
58.0.0.0/7         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
60.0.0.0/8         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
70.0.0.0/7         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
72.0.0.0/5         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
83.0.0.0/8         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
84.0.0.0/6         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
88.0.0.0/5         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
96.0.0.0/3         
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
127.0.0.0/8        
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
197.0.0.0/8        
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
198.18.0.0/15      
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
201.0.0.0/8        
    0     0 logdrop    all  --  *      *       0.0.0.0/0           
240.0.0.0/4        

Chain outtos (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp dpt:22 TOS set 0x10 
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp spt:22 TOS set 0x10 
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp dpt:21 TOS set 0x10 
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp spt:21 TOS set 0x10 
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp spt:20 TOS set 0x08 
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp dpt:20 TOS set 0x08 

Chain pretos (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp dpt:22 TOS set 0x10 
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp spt:22 TOS set 0x10 
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp dpt:21 TOS set 0x10 
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp spt:21 TOS set 0x10 
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp spt:20 TOS set 0x08 
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp dpt:20 TOS set 0x08 

(see part 2)

Paul Rogers  ([EMAIL PROTECTED])
http://www.xprt.net/~pgrogers/
http://www.angelfire.com/or/paulrogers/
Rogers' Second Law: "Everything you do communicates."
(I do not personally endorse any additions after this line. TANSTAAFL 
:-)


________________________________________________________________
The best thing to hit the internet in years - Juno SpeedBand!
Surf the web up to FIVE TIMES FASTER!
Only $14.95/ month - visit www.juno.com to sign up today!


-------------------------------------------------------
This SF. Net email is sponsored by: GoToMyPC
GoToMyPC is the fast, easy and secure way to access your computer from
any Web browser or wireless device. Click here to Try it Free!
https://www.gotomypc.com/tr/OSDN/AW/Q4_2003/t/g22lp?Target=mm/g22lp.tmpl
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to