myserver kernel: SuSE-FW-TRACEROUTE-ATTEMPT IN= OUT=eth0 SRC=192.168.1.1 DST=192.168.1.12 PROTO=ICMP
Outbound ICMP traffic triggering traceroute rule (from internal "myserver" address to internal "simply a machine on my network" address).
myserver kernel: SuSE-FW-ILLEGAL-TARGET IN=eth1 OUT= DST=18.104.22.168 PROTO=2
Inbound request for IGMP from "myserver" public address to external network multicast address.
Like everything that isn't abused, traceroutes and multicasts are harmless activity unless your network policy dictates otherwise. If unnecessary it's just harmless and annoying. If your policy needs these rules in place you could drop the LOG target rules.
Last edited by unSpawn; 05-04-2004 at 12:42 PM.