Ray Olszewski (and all else) :
<i>First be more specific about what you mean by \"see the internet\".</i>: 
The 
inside LAN can do NOTHING on the net as no ping no www, etc, BUT still has 
telnet \"to the server (nowhere else)\" and can still read off the shared 
folders on the server. 
Ping errors : (emerge.net.au is my isp)
[root@mr_bumpy rc.d]# ping emerge.net.au
PING emerge.net.au (203.57.130.34): 56 data bytes

--- emerge.net.au ping statistics ---
149 packets transmitted, 0 packets received, 100% packet loss
and from the inside : (DOS)
C:\\WINDOWS>ping -t emerge.net.au
Pinging emerge.net.au [203.57.130.34] with 32 bytes of data:

Request timed out.
Request timed out.
Request timed out.
Request timed out.
Request timed out.

Ping statistics for 203.57.130.34:
    Packets: Sent = 5, Received = 0, Lost = 5 (100% loss),
Approximate round trip times in milli-seconds:
    Minimum = 0ms, Maximum =  0ms, Average =  0ms
Control-C

For pings.. the modem lights flash. For www and telnet past the server they 
don\'t.

Your commands :
ifconfig -a
eth0      Link encap:Ethernet  HWaddr 00:A0:CC:56:1E:6A
          inet addr:192.168.100.1  Bcast:192.168.100.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:417526 errors:0 dropped:0 overruns:0 frame:0
          TX packets:502650 errors:0 dropped:0 overruns:0 carrier:0
          collisions:1917 txqueuelen:100
          Interrupt:9 Base address:0x6000

lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          UP LOOPBACK RUNNING  MTU:3924  Metric:1
          RX packets:344 errors:0 dropped:0 overruns:0 frame:0
          TX packets:344 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0

ppp0      Link encap:Point-to-Point Protocol
          inet addr:203.57.131.145  P-t-P:203.57.130.22  Mask:255.255.255.255
          UP POINTOPOINT RUNNING NOARP MULTICAST  MTU:1500  Metric:1
          RX packets:16432 errors:2 dropped:0 overruns:0 frame:2
          TX packets:16182 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:10

route -n 
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
203.57.130.22   0.0.0.0         255.255.255.255 UH    0      0        0 ppp0
192.168.100.1   0.0.0.0         255.255.255.255 UH    0      0        0 eth0
255.255.255.255 0.0.0.0         255.255.255.255 UH    0      0        0 eth0
192.168.100.0   0.0.0.0         255.255.255.0   U     0      0        0 eth0
192.168.100.0   192.168.100.1   255.255.255.0   UG    0      0        0 eth0
192.168.100.0   0.0.0.0         255.255.255.0   U     0      0        0 eth0
127.0.0.0       0.0.0.0         255.0.0.0       U     0      0        0 lo
0.0.0.0         203.57.130.22   0.0.0.0         UG    0      0        0 ppp0
0.0.0.0         192.168.100.1   0.0.0.0         UG    1      0        0 eth0

ipchains -L input -n
Chain input (policy DENY):
target     prot opt     source                destination           ports
DENY       all  ---f--  0.0.0.0/0             0.0.0.0/0             n/a
ACCEPT     all  ------  0.0.0.0/0             0.0.0.0/0             n/a
DENY       all  ----l-  203.57.0.0/16         0.0.0.0/0             n/a
DENY       all  ------  10.0.0.0/8            0.0.0.0/0             n/a
DENY       all  ------  0.0.0.0/0             10.0.0.0/8            n/a
DENY       all  ------  172.16.0.0/12         0.0.0.0/0             n/a
DENY       all  ------  0.0.0.0/0             172.16.0.0/12         n/a
DENY       all  ------  192.168.0.0/16        0.0.0.0/0             n/a
DENY       all  ------  0.0.0.0/0             192.168.0.0/16        n/a
DENY       all  ------  127.0.0.0/8           0.0.0.0/0             n/a
DENY       all  ----l-  0.0.0.0/0             127.0.0.0/8           n/a
DENY       all  ----l-  255.255.255.255       0.0.0.0/0             n/a
DENY       all  ----l-  0.0.0.0/0             0.0.0.0               n/a
DENY       all  ----l-  224.0.0.0/4           0.0.0.0/0             n/a
DENY       all  ----l-  240.0.0.0/5           0.0.0.0/0             n/a
ACCEPT     icmp ------  0.0.0.0/0             203.57.0.0/16         4 ->   *
ACCEPT     icmp ------  0.0.0.0/0             203.57.0.0/16         12 ->   *
ACCEPT     icmp ------  0.0.0.0/0             203.57.0.0/16         3 ->   *
ACCEPT     icmp ------  0.0.0.0/0             203.57.0.0/16         11 ->   *
ACCEPT     icmp ------  0.0.0.0/0             203.57.0.0/16         0 ->   *
ACCEPT     icmp ------  203.57.131.0/24       203.57.0.0/16         8 ->   *
DENY       tcp  -y----  0.0.0.0/0             203.57.0.0/16         * ->   
2000
DENY       tcp  -y----  0.0.0.0/0             203.57.0.0/16         * ->   *
DENY       tcp  -y--l-  0.0.0.0/0             203.57.0.0/16         * ->   
2049
DENY       udp  ----l-  0.0.0.0/0             203.57.0.0/16         * ->   
2049
ACCEPT     udp  ------  139.130.4.5           203.57.0.0/16         53 ->   
1024
:65535
ACCEPT     tcp  !y----  139.130.4.5           203.57.0.0/16         53 ->   
1024
:65535
ACCEPT     udp  ------  139.130.4.5           203.57.0.0/16         53 ->   53
ACCEPT     udp  ------  192.168.100.0/24      203.57.0.0/16         
1024:65535 -
>   53
ACCEPT     tcp  ------  192.168.100.1         203.57.0.0/16         
1024:65535 -
>   53
ACCEPT     tcp  !y----  0.0.0.0/0             203.57.0.0/16         113 ->   
102
4:65535
ACCEPT     tcp  ------  0.0.0.0/0             203.57.0.0/16         
1024:65535 -
>   113
ACCEPT     tcp  !y----  206.135.142.36        203.57.0.0/16         25 ->   
1024
:65535
ACCEPT     udp  ------  203.57.131.0/24       203.57.0.0/16         
32769:65535
->   33434:33523
ACCEPT     all  ------  192.168.100.0/24      0.0.0.0/0             n/a

ipchains -L output -n
Chain output (policy REJECT):
target     prot opt     source                destination           ports
ACCEPT     all  ------  0.0.0.0/0             0.0.0.0/0             n/a
DENY       all  ----l-  10.0.0.0/8            0.0.0.0/0             n/a
DENY       all  ----l-  0.0.0.0/0             10.0.0.0/8            n/a
DENY       all  ----l-  172.16.0.0/12         0.0.0.0/0             n/a
DENY       all  ----l-  0.0.0.0/0             172.16.0.0/12         n/a
DENY       all  ----l-  192.168.0.0/16        0.0.0.0/0             n/a
DENY       all  ----l-  0.0.0.0/0             192.168.0.0/16        n/a
DENY       all  ----l-  255.255.255.255       0.0.0.0/0             n/a
DENY       all  ----l-  0.0.0.0/0             0.0.0.0               n/a
REJECT     all  ----l-  224.0.0.0/4           0.0.0.0/0             n/a
REJECT     all  ----l-  240.0.0.0/5           0.0.0.0/0             n/a
ACCEPT     icmp ------  0.0.0.0/0             203.57.0.0/16         4 ->   *
ACCEPT     icmp ------  0.0.0.0/0             203.57.0.0/16         12 ->   *
ACCEPT     icmp ------  0.0.0.0/0             203.57.131.0/24       3 ->   *
ACCEPT     icmp ------  203.57.0.0/16         0.0.0.0/0             3 ->   4
ACCEPT     icmp ------  0.0.0.0/0             203.57.131.0/24       11 ->   *
ACCEPT     icmp ------  203.57.0.0/16         0.0.0.0/0             8 ->   *
ACCEPT     icmp ------  203.57.0.0/16         203.57.131.0/24       0 ->   *
REJECT     tcp  -y----  203.57.0.0/16         0.0.0.0/0             * ->   
2000
REJECT     tcp  -y--l-  203.57.0.0/16         0.0.0.0/0             * ->   *
REJECT     tcp  -y--l-  0.0.0.0/0             0.0.0.0/0             * ->   
2049
REJECT     udp  ----l-  0.0.0.0/0             0.0.0.0/0             * ->   
2049
ACCEPT     udp  ------  203.57.0.0/16         139.130.4.5           
1024:65535 ->   53
ACCEPT     tcp  ------  203.57.0.0/16         139.130.4.5           
1024:65535 ->   53
ACCEPT     udp  ------  203.57.0.0/16         139.130.4.5           53 ->   53
ACCEPT     udp  ------  203.57.0.0/16         192.168.100.0/24      53 ->   
1024:65535
ACCEPT     tcp  !y----  203.57.0.0/16         192.168.100.1         53 ->   
1024:65535
ACCEPT     tcp  ------  203.57.0.0/16         0.0.0.0/0             
1024:65535 ->   113
ACCEPT     tcp  !y----  203.57.0.0/16         0.0.0.0/0             113 ->   
1024:65535
ACCEPT     tcp  ------  203.57.0.0/16         206.135.142.36        
1024:65535 ->   25
ACCEPT     all  ------  0.0.0.0/0             192.168.100.0/24      n/a
ipchains -L forward -n
Chain forward (policy REJECT):
target     prot opt     source                destination           ports
MASQ       all  ------  192.168.100.0/24      0.0.0.0/0             n/a
ipchains -M -L (needed cap L)
 IP masquerading entries

cat /proc/sys/net/ipv4/ip_forward
1

FROM the SERVER I can ping internal LAN and its ppp0 addy.
FROM the internal clients I can also ping the eth0 and the ppp0.
using the gateway of 192.168.100.1 (the servers ip same as eth0)


My level of expertise is a very mixed bag.. I have some low level some med 
level and some high (though not much)

The server works as a router excellently when the firewall isn\'t running. 
and the question about IPADDR=\"203.57.130.145/16\"              # the ip 
addy 
given by my isp .....
IPADDR is a \"definition\" so that when the firewall needs to know what 
IPADDR 
is it refers to it at the top of the firewall script (saves having to put it 
in lots of times) What I need is to find a way so that when the server dials 
up again it automaticaly changes the value of IPDDR. does that make any sense?

Sorry If this e-mail is a little long.. If anyone objects to the length of it 
I will take note for future refrance and not do it again.
Thank you for any time taken out of your days/nights to contemplate my 
problems..
Marcus Giles

PS. I have just noticed that I am getting errors when rebooting the machine, 
all I could make out was some sort of error sending release packets to 
mr_bumpy (the servers name :-). Any idea where I might find these errors 
recoreded, so I might look closer? 







-
To unsubscribe from this list: send the line "unsubscribe linux-newbie" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.linux-learn.org/faqs

Reply via email to