Linux - NetworkingThis forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
This may be important; when I'm booting up I get some [ Failed ] message scroll by that look like they are related to ipchains in character based portion of the boot process. I can never read what the message are because the scroll by too quickly.
Here are the results of running iptables -nvL:
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
10430 625K LINWIZ-INPUT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 10467 packets, 550K bytes)
pkts bytes target prot opt in out source destination
Chain ADDRESS-FILTER (1 references)
pkts bytes target prot opt in out source destination
0 0 RETURN all -- * * 192.168.0.2 0.0.0.0/0
0 0 RETURN all -- * * 192.168.0.3 0.0.0.0/0
0 0 RETURN all -- * * 192.168.0.4 0.0.0.0/0
9 648 REJECT-PKT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain LINWIZ-INPUT (1 references)
pkts bytes target prot opt in out source destination
10136 513K ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
0 0 DROP all -- * * 127.0.0.0/8 0.0.0.0/0
0 0 DROP all -- * * 0.0.0.0/0 127.0.0.0/8
2 470 DROP all -- * * 192.168.0.2 0.0.0.0/0
0 0 SYN-FLOOD tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x16/0x02
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:!0x16/0x02 state NEW
283 111K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8
9 648 ADDRESS-FILTER all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:111
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:2049
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpts:4000:4003
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:111
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:2049
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:4000:4003
0 0 REJECT-PKT all -- * * 0.0.0.0/0 0.0.0.0/0
As far as I know, I haven't done anything to enable ipchains. One poster suggested that I check my firewall settings using iptable. I thought maybe ipchains was in some way related to iptable.
I can't read everything about the warning that appears on the screen when the setting fails. I was able to get some of the information. The warning says something about the fact that ipchains is incompatible with the kernel I am using, and contains some kind of apology from someone named Paul "Rusty" Russel.
All of this may have nothing to do with this problem.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.