LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Networking
User Name
Password
Linux - Networking This forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.

Notices


Reply
  Search this Thread
Old 01-29-2004, 02:44 PM   #1
Mnehwrar
LQ Newbie
 
Registered: Jan 2004
Distribution: Fedora Core 1
Posts: 12

Rep: Reputation: 0
PPPoE DSL Sharing on Fedora1


Right now I have a Duron 800 with dual functional NICs with a Fedora Core 1 installation.

I have bellsouth ADSL with PPPoE, which works just fine on Linux. I want to share the DSL with all of the Windows computers.

I've extensively searched for an FAQ that would work, and nothing does. While I've been using computers since 1992, it's always been Windows/Dos. I need step by step instructions. I want Windows Internet Connection Sharing for linux. I don't need DHCP since this is a small network.

Currently I have ETH0 as the net facing card. It is unconfigured. ppp0 is the ADSL connection.

ETH1 is also unconfigured. I just blew out my Fedora install and redid it, so any previous stupidity has been eaten by the format gods.

So:
eth0 is connected to ppp0. Which works.
eth1 is connected to the local network, which can work, but isn't configured because I don't know what to do.

If anyone would like to help directly, AIM me at Chris C workin, or email instructions to fewdman at yahoo.com
I've been trying to get this functional for weeks, so this is an act of desperation and not a first call for help. I'm very frustrated.
 
Old 01-30-2004, 11:34 AM   #2
Mnehwrar
LQ Newbie
 
Registered: Jan 2004
Distribution: Fedora Core 1
Posts: 12

Original Poster
Rep: Reputation: 0
No one has done PPPoE NAT with Fedora Core 1?
 
Old 01-30-2004, 02:55 PM   #3
JordanH
Member
 
Registered: Oct 2003
Location: Toronto, Canada
Distribution: Ubuntu, FC3, RHEL 3-4 AS Retired: SuSE 9.1 Pro, RedHat 6-9, FC1-2
Posts: 360

Rep: Reputation: 30
Easy there tiger. It takes a while for us to respond because most of us are off working or taking over the world or something.

http://www.linuxquestions.org/questi...hreadid=121379

This should work out for ya. It was tested on my Fedora box way back when so it should give you a good start. Not only does it help you share your internet, but it does it safely.

Good luck to ya.
J.

Oh... P.s. Looks like I missed part of your question about setting up ADSL. Before you run the firewall script above, configure adsl with these two commands
adsl-setup
adsl-start

Cheers,
J.

Last edited by JordanH; 01-30-2004 at 02:56 PM.
 
Old 02-03-2004, 01:16 PM   #4
Mnehwrar
LQ Newbie
 
Registered: Jan 2004
Distribution: Fedora Core 1
Posts: 12

Original Poster
Rep: Reputation: 0
I marked what was giving me problems in red. Further, it doesn't seem like I'm able to share my DSL, which is most of the point.

################################################################################
echo 1 > /proc/sys/net/ipv4/ip_forward
# location of iptables command
ipt=/sbin/iptables

#
# Interfaces
# Be sure to be accurate when defining these interfaces.
# ext is your external card, likely ppp0 for DSL or eth1 for cable
lo=lo
ext=ppp0
int=eth0
#
# Spoofing protection. List all networks and IP addresses that should NOT exist
# in the real world.
#
spoofed="0.0.0.0/8 10.0.0.0/8 127.0.0.0/8 169.254.0.0/16 172.16.0.0/12
192.168.0.0/16 255.255.255.255"
#
# List all ports to open ON your firewall
#
tcp_ports="22"
udp_ports=""
#
# These logging options will be used for all logged packets
#
logops="--log-leve=3 -m limit --limit 1/second --limit-burst=3"
################################################################################

################################################################################
################################################################################
################################################################################
################################################################################
################################################################################

################################################################################
# Set policies and delete, flush and zero chains
################################################################################
$ipt -P INPUT DROP
$ipt -P FORWARD DROP
$ipt -P OUTPUT ACCEPT
for table in filter nat mangle
do
$ipt -t $table -F # flush
$ipt -t $table -X # delete
$ipt -t $table -Z # zero
done
################################################################################

################################################################################
# BAD_IP
# Check and log all spoofed IP's from external hosts.
# !! Only call from external interface !!
################################################################################
$ipt -N BAD_IP
$ipt -A BAD_IP -j LOG --log-prefix "IPT: BAD IP: " $logops
$ipt -A BAD_IP -j DROP
$ipt -N SPOOF
for spf in $spoofed
do
$ipt -A SPOOF -s $spf -j BAD_IP
done
################################################################################

################################################################################
################################################################################
################################################################################
################################################################################
################################################################################

################################################################################
# IN_NETWORK
# These packets are entering our network
# 1. Allow related and established connections
# 2. Allow ICMP packets
# 3. Deny everything else.
################################################################################
$ipt -N IN_NETWORK
$ipt -A IN_NETWORK -m state --state INVALID -j DROP
$ipt -A IN_NETWORK -j SPOOF
$ipt -A IN_NETWORK -p tcp -m state --state ESTABLISHED,RELATED -j ACCEPT
$ipt -A IN_NETWORK -p udp -m state --state ESTABLISHED,RELATED -j ACCEPT
$ipt -A IN_NETWORK -p icmp -j ACCEPT
$ipt -A IN_NETWORK -j LOG --log-prefix "IPT: IN_NETWORK: " $logops
$ipt -A IN_NETWORK -j DROP
################################################################################

################################################################################
# OUT_NETWORK
# These packets are leaving our network!
# 1. Allow all packets to leave our current network because we trust our users
################################################################################
$ipt -N OUT_NETWORK
$ipt -A OUT_NETWORK -i $int -j ACCEPT
$ipt -A OUT_NETWORK -j LOG --log-prefix "IPT: OUT_NETWORK: " $logops
$ipt -A OUT_NETWORK -j DROP
################################################################################

################################################################################
# EXT_FIREWALL
# Packets entering firewall machine
# 1. Allow established and related connections
# 2. Allow new connections on specified ports
# 3. Log and Drop everything else
################################################################################
$ipt -N EXT_FIREWALL
$ipt -A EXT_FIREWALL -m state --state INVALID -j DROP
$ipt -A EXT_FIREWALL -j SPOOF
$ipt -A EXT_FIREWALL -m state --state ESTABLISHED,RELATED -j ACCEPT
$ipt -A EXT_FIREWALL -p icmp -j ACCEPT
#
# Open ports
#
for tcp_p in $tcp_ports
do
$ipt -A EXT_FIREWALL -p tcp --dport $tcp_p -m state --state NEW -j ACCEPT
done
for udp_p in $udp_ports
do
$ipt -A EXT_FIREWALL -p udp --dport $udp_p -m state --state NEW -j ACCEPT
done
$ipt -A EXT_FIREWALL -j LOG --log-prefix "IPT: EXT_FIREWALL: " $logops
$ipt -A EXT_FIREWALL -j DROP
################################################################################

################################################################################
# INT_FIREWALL
# Connections from internal LAN
# 1. Allow all connections from the internal machines because they are trusted
################################################################################
$ipt -N INT_FIREWALL
$ipt -A INT_FIREWALL -m state --state INVALID -j DROP
$ipt -A INT_FIREWALL -j ACCEPT
################################################################################

################################################################################
################################################################################
################################################################################
################################################################################
################################################################################

################################################################################
# Main Rules
# 1. Allow all loopback traffic. This is safe.
# 2. Send internal connections to INT_FIREWALL chain
# 3. Send external connections to EXT_FIREWALL chain
# 4. Send connections entering LAN to IN_NETWORK
# 5. Send connections leaving LAN to OUT_NETWORK
# 6. Do not modify packets leaving computer to improve performance. It's safe.
################################################################################
$ipt -A INPUT -i lo -j ACCEPT
$ipt -A INPUT -i $int -j INT_FIREWALL
$ipt -A INPUT -i $ext -j EXT_FIREWALL
$ipt -A FORWARD -i $ext -j IN_NETWORK
$ipt -A FORWARD -i $int -j OUT_NETWORK
# $ipt -A OUTPUT -i lo -j ACCEPT
# $ipt -A OUTPUT -i $int -j ACCEPT
# $ipt -A OUTPUT -i $ext -j ACCEPT
################################################################################

################################################################################
# Masquerading
# Turn on Masquerading and port forwarding
################################################################################
$ipt -t nat -A POSTROUTING -o $ext -j MASQUERADE
################################################################################
 
Old 02-03-2004, 01:48 PM   #5
JordanH
Member
 
Registered: Oct 2003
Location: Toronto, Canada
Distribution: Ubuntu, FC3, RHEL 3-4 AS Retired: SuSE 9.1 Pro, RedHat 6-9, FC1-2
Posts: 360

Rep: Reputation: 30
Quote:
Originally posted by Mnehwrar
[B]I marked what was giving me problems in red. Further, it doesn't seem like I'm able to share my DSL, which is most of the point.

################################################################################
echo 1 > /proc/sys/net/ipv4/ip_forward
# location of iptables command
ipt=/sbin/iptables
If those lines give you trouble then no wonder you're having problems with using ip_forwarding and iptable firewalls.

If you could be more specific about HOW they are giving you problems we could help you. Are there error messages? What happens when you run the script?
 
Old 02-03-2004, 03:10 PM   #6
Mnehwrar
LQ Newbie
 
Registered: Jan 2004
Distribution: Fedora Core 1
Posts: 12

Original Poster
Rep: Reputation: 0
I'm supposed to cut/paste this into my iptables file, right? I'm probably doing something wrong. Also, there is already fedora configuration file for a firewall.

I tried remarking that out, but whatever I do doesn't work.

Last edited by Mnehwrar; 02-03-2004 at 03:23 PM.
 
Old 02-03-2004, 11:32 PM   #7
JordanH
Member
 
Registered: Oct 2003
Location: Toronto, Canada
Distribution: Ubuntu, FC3, RHEL 3-4 AS Retired: SuSE 9.1 Pro, RedHat 6-9, FC1-2
Posts: 360

Rep: Reputation: 30
The script in the link above is a standalone script. It replaces any other firewall script you may have had. It works as-is for a standard configuration.

Ok... try this and let me know what happens.
AS root
1. create the script above called /etc/init.d/firewall.sh
2. chmod 700 /etc/init.d/firewall.sh
3. type /etc/init.d/fireall.sh

There should be NO output to the console. If there is an error displayed, write it down and post it here. That should give me some clue as to what is going on. I have a busy day at work tomorrow but will try to find time to help out - if you can be more descriptive about the problems you are having, it will take less time for me to help you... I'm sure you want this up and running quickly.

Regards, J.
 
Old 02-05-2004, 11:14 AM   #8
Mnehwrar
LQ Newbie
 
Registered: Jan 2004
Distribution: Fedora Core 1
Posts: 12

Original Poster
Rep: Reputation: 0
This is what I have. There is no error output, but when I go to the Fedora proccess control applet, it crashes. When I try to do an iptables-restore, nothing happens. I can't see the internet with any of the other computers. I've tried DNS and just ip adresses, and none of them can load a web page.

I can ping the eth1 from my workstations, but, beyond that, nothing.

Here is the output of my ifconfig

eth0 Link encap:Ethernet HWaddr 00:90:47:04:28:6E
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:469 errors:0 dropped:0 overruns:0 frame:0
TX packets:571 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:141426 (138.1 Kb) TX bytes:94644 (92.4 Kb)
Interrupt:10 Base address:0xc000

eth1 Link encap:Ethernet HWaddr 00:03:6D:00:85:0E
inet addr:192.168.1.1 Bcast:192.168.1.255 Mask:255.255.255.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:179 errors:0 dropped:0 overruns:0 frame:0
TX packets:4 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:16903 (16.5 Kb) TX bytes:168 (168.0 b)
Interrupt:11 Base address:0xa000

lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:2631 errors:0 dropped:0 overruns:0 frame:0
TX packets:2631 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:2099280 (2.0 Mb) TX bytes:2099280 (2.0 Mb)

ppp0 Link encap:Point-to-Point Protocol
inet addr:68.215.41.179 P-t-P:68.215.41.1 Mask:255.255.255.255
UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1492 Metric:1
RX packets:414 errors:0 dropped:0 overruns:0 frame:0
TX packets:517 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:3
RX bytes:128931 (125.9 Kb) TX bytes:79941 (78.0 Kb)

Code:
################################################################################
# Default options
# These options configure the below script. It would be a good idea to move
# them to a conf file in /etc and then source it from this script.
################################################################################
echo 1 > /proc/sys/net/ipv4/ip_forward
# location of iptables command
ipt=/sbin/iptables
#
# Interfaces
# Be sure to be accurate when defining these interfaces.
# ext is your external card, likely ppp0 for DSL or eth1 for cable
lo=lo
ext=ppp0
int=eth1
#
#
spoofed="0.0.0.0/8 10.0.0.0/8 127.0.0.0/8 169.254.0.0/16 172.16.0.0/12
192.168.0.0/16 255.255.255.255"
#
# List all ports to open ON your firewall
#
tcp_ports="22 21 80 110 125 23"
udp_ports="22 21 80 110 125 23"
#
# These logging options will be used for all logged packets
#
logops="--log-leve=3 -m limit --limit 1/second --limit-burst=3"
################################################################################

################################################################################
################################################################################
################################################################################
################################################################################
################################################################################

################################################################################
# Set policies and delete, flush and zero chains
################################################################################
$ipt -P INPUT DROP
$ipt -P FORWARD DROP
$ipt -P OUTPUT ACCEPT
for table in filter nat mangle
do
$ipt -t $table -F # flush
$ipt -t $table -X # delete
$ipt -t $table -Z # zero
done
################################################################################

################################################################################
# BAD_IP
# Check and log all spoofed IP's from external hosts.
# !! Only call from external interface !!
################################################################################
$ipt -N BAD_IP
$ipt -A BAD_IP -j LOG --log-prefix "IPT: BAD IP: " $logops
$ipt -A BAD_IP -j DROP
$ipt -N SPOOF
for spf in $spoofed
do
$ipt -A SPOOF -s $spf -j BAD_IP
done
################################################################################

################################################################################
################################################################################
################################################################################
################################################################################
################################################################################

################################################################################
# IN_NETWORK
# These packets are entering our network
# 1. Allow related and established connections
# 2. Allow ICMP packets
# 3. Deny everything else.
################################################################################
$ipt -N IN_NETWORK
$ipt -A IN_NETWORK -m state --state INVALID -j DROP
$ipt -A IN_NETWORK -j SPOOF
$ipt -A IN_NETWORK -p tcp -m state --state ESTABLISHED,RELATED -j ACCEPT
$ipt -A IN_NETWORK -p udp -m state --state ESTABLISHED,RELATED -j ACCEPT
$ipt -A IN_NETWORK -p icmp -j ACCEPT
$ipt -A IN_NETWORK -j LOG --log-prefix "IPT: IN_NETWORK: " $logops
$ipt -A IN_NETWORK -j DROP
################################################################################

################################################################################
# OUT_NETWORK
# These packets are leaving our network!
# 1. Allow all packets to leave our current network because we trust our users
################################################################################
$ipt -N OUT_NETWORK
$ipt -A OUT_NETWORK -i $int -j ACCEPT
$ipt -A OUT_NETWORK -j LOG --log-prefix "IPT: OUT_NETWORK: " $logops
$ipt -A OUT_NETWORK -j DROP
################################################################################

################################################################################
# EXT_FIREWALL
# Packets entering firewall machine
# 1. Allow established and related connections
# 2. Allow new connections on specified ports
# 3. Log and Drop everything else
################################################################################
$ipt -N EXT_FIREWALL
$ipt -A EXT_FIREWALL -m state --state INVALID -j DROP
$ipt -A EXT_FIREWALL -j SPOOF
$ipt -A EXT_FIREWALL -m state --state ESTABLISHED,RELATED -j ACCEPT
$ipt -A EXT_FIREWALL -p icmp -j ACCEPT
#
# Open ports
#
for tcp_p in $tcp_ports
do
$ipt -A EXT_FIREWALL -p tcp --dport $tcp_p -m state --state NEW -j ACCEPT
done
for udp_p in $udp_ports
do
$ipt -A EXT_FIREWALL -p udp --dport $udp_p -m state --state NEW -j ACCEPT
done
$ipt -A EXT_FIREWALL -j LOG --log-prefix "IPT: EXT_FIREWALL: " $logops
$ipt -A EXT_FIREWALL -j DROP
################################################################################

################################################################################
# INT_FIREWALL
# Connections from internal LAN
# 1. Allow all connections from the internal machines because they are trusted
################################################################################
$ipt -N INT_FIREWALL
$ipt -A INT_FIREWALL -m state --state INVALID -j DROP
$ipt -A INT_FIREWALL -j ACCEPT
################################################################################

################################################################################
################################################################################
################################################################################
################################################################################
################################################################################

################################################################################
# Main Rules
# 1. Allow all loopback traffic. This is safe.
# 2. Send internal connections to INT_FIREWALL chain
# 3. Send external connections to EXT_FIREWALL chain
# 4. Send connections entering LAN to IN_NETWORK
# 5. Send connections leaving LAN to OUT_NETWORK
# 6. Do not modify packets leaving computer to improve performance. It's safe.
################################################################################
$ipt -A INPUT -i lo -j ACCEPT
$ipt -A INPUT -i $int -j INT_FIREWALL
$ipt -A INPUT -i $ext -j EXT_FIREWALL
$ipt -A FORWARD -i $ext -j IN_NETWORK
$ipt -A FORWARD -i $int -j OUT_NETWORK
# $ipt -A OUTPUT -i lo -j ACCEPT
# $ipt -A OUTPUT -i $int -j ACCEPT
# $ipt -A OUTPUT -i $ext -j ACCEPT
################################################################################

################################################################################
# Masquerading
# Turn on Masquerading and port forwarding
################################################################################
$ipt -t nat -A POSTROUTING -o $ext -j MASQUERADE
################################################################################

Last edited by Mnehwrar; 02-05-2004 at 11:17 AM.
 
Old 02-05-2004, 12:44 PM   #9
JordanH
Member
 
Registered: Oct 2003
Location: Toronto, Canada
Distribution: Ubuntu, FC3, RHEL 3-4 AS Retired: SuSE 9.1 Pro, RedHat 6-9, FC1-2
Posts: 360

Rep: Reputation: 30
I'm going to summarize, correct me if this is wrong:
1. You have created the script as specified above and then you have run that script from a terminal or the console. NO errors are reported when running this script.
2. Your internal adapter is on the 192.168.1.0/24 network
3. You can ping 192.168.1.1 from other machines on the LAN
4. You can browse the internet from your Linux machine ONLY.

... ok ...
Try these
a. Check your LAN machine configuration such that
ipaddress 192.168.1.x
network 255.255.255.0
gateway (THIS IS IMPORTANT) 192.168.1.1
DNS ------- as required.
b. From your LAN machines, run an nslookup on bob.com. Did it succeed or fail?
c. From a windows command prompt try a tracert bob.com Where does it freeze?

More ideas to come after I receive your responses.
 
Old 02-05-2004, 01:27 PM   #10
Mnehwrar
LQ Newbie
 
Registered: Jan 2004
Distribution: Fedora Core 1
Posts: 12

Original Poster
Rep: Reputation: 0
Your summary is correct.

A) Done, several times.
B) Failed to resolve
C) Tracert anywhere dies at the gateway IP (192.168.1.1), if I'm tracing an IP adress and not a DNS name. If I'm tracing a DNS name it doesn't make it that far.
 
Old 02-05-2004, 02:09 PM   #11
JordanH
Member
 
Registered: Oct 2003
Location: Toronto, Canada
Distribution: Ubuntu, FC3, RHEL 3-4 AS Retired: SuSE 9.1 Pro, RedHat 6-9, FC1-2
Posts: 360

Rep: Reputation: 30
Looks like the LAN machines are configured ok.

Try this:
Quote:
here is a completely open firewall... if this doesn't get you going, then iptables isn't the problem. I strongly suggest you only use this for testing as it doesn't provide any protection.



quote:
--------------------------------------------------------------------------------

#!/bin/bash
echo "1" > /proc/sys/net/ipv4/ip_forward
ipt=/sbin/iptables

# Change this value to your EXTERNAL interface
ext=eth0

# Set policies
$ipt -P INPUT ACCEPT
$ipt -P FORWARD ACCEPT
$ipt -P OUTPUT ACCEPT

# Delete table rules, chains and counters
for table in filter nat mangle
do
$ipt -t $table -F # flush
$ipt -t $table -X # delete
$ipt -t $table -Z # zero
done

$ipt -t nat -A POSTROUTING -o $ext -j MASQUERADE
--------------------------------------------------------------------------------
If that don't work, you've got other issues.
 
Old 02-05-2004, 02:15 PM   #12
JordanH
Member
 
Registered: Oct 2003
Location: Toronto, Canada
Distribution: Ubuntu, FC3, RHEL 3-4 AS Retired: SuSE 9.1 Pro, RedHat 6-9, FC1-2
Posts: 360

Rep: Reputation: 30
One more thing to check... Check your /var/log/messages to see if there are any IPT commands being logged
Like this
cat /var/log/messages | grep IPT

Please post the results here if there are any.

Also, a listing of the results from your route command may be helpful.
 
Old 02-05-2004, 02:39 PM   #13
Mnehwrar
LQ Newbie
 
Registered: Jan 2004
Distribution: Fedora Core 1
Posts: 12

Original Poster
Rep: Reputation: 0
And the damn thing still doesn't work. I really apreciate your help, though.

Edit: at one point, I was just randomly guessing at interfaces and hoped something would work. So this may have been intetionally dumb.

Feb 5 10:58:34 localhost kernel: IPT: EXT_FIREWALL: IN=ppp0 OUT= MAC= SRC=205.1 88.8.191 DST=68.158.206.129 LEN=566 TOS=0x00 PREC=0x00 TTL=104 ID=50448 DF PROTO =TCP SPT=5190 DPT=50263 WINDOW=16384 RES=0x00 ACK PSH URGP=0

Feb 5 10:59:06 localhost kernel: IPT: EXT_FIREWALL: IN=ppp0 OUT= MAC= SRC=205.1 88.8.191 DST=68.158.206.129 LEN=862 TOS=0x00 PREC=0x00 TTL=104 ID=35097 DF
PROTO =TCP SPT=5190 DPT=50263 WINDOW=16384 RES=0x00 ACK PSH URGP=0

Feb 5 10:59:38 localhost kernel: IPT: EXT_FIREWALL: IN=ppp0 OUT= MAC= SRC=205.1 88.8.191 DST=68.158.206.129 LEN=862 TOS=0x00 PREC=0x00 TTL=104 ID=24673 DF
PROTO =TCP SPT=5190 DPT=50263 WINDOW=16384 RES=0x00 ACK PSH URGP=0

Feb 5 11:22:37 localhost kernel: IPT: EXT_FIREWALL: IN=ppp0 OUT= MAC= SRC=205.1 52.144.235 DST=68.153.74.227 LEN=70 TOS=0x00 PREC=0x00 TTL=250 ID=33515 DF PROTO =UDP SPT=16073 DPT=32770 LEN=50

Feb 5 11:22:37 localhost kernel: IPT: EXT_FIREWALL: IN=ppp0 OUT= MAC= SRC=205.1 52.144.235 DST=68.153.74.227 LEN=70 TOS=0x00 PREC=0x00 TTL=250 ID=33516 DF PROTO =UDP SPT=16073 DPT=32770 LEN=50

Feb 5 11:28:17 localhost kernel: IPT: EXT_FIREWALL: IN=ppp0 OUT= MAC= SRC=211.2 44.27.149 DST=65.2.6.175 LEN=48 TOS=0x00 PREC=0x00 TTL=108 ID=48467 DF PROTO=TCP SPT=3189 DPT=4899 WINDOW=16384 RES=0x00 SYN URGP=0

Last edited by Mnehwrar; 02-05-2004 at 02:54 PM.
 
Old 02-05-2004, 02:56 PM   #14
JordanH
Member
 
Registered: Oct 2003
Location: Toronto, Canada
Distribution: Ubuntu, FC3, RHEL 3-4 AS Retired: SuSE 9.1 Pro, RedHat 6-9, FC1-2
Posts: 360

Rep: Reputation: 30
Try changing this section so it reads
Quote:
################################################################################
# OUT_NETWORK
# These packets are leaving our network!
# 1. Allow all packets to leave our current network because we trust our users
################################################################################
$ipt -N OUT_NETWORK
$ipt -A OUT_NETWORK -j LOG --log-prefix "IPT: OUT_NETWORK: " $logops
$ipt -A OUT_NETWORK -i $int -j ACCEPT
$ipt -A OUT_NETWORK -j LOG --log-prefix "IPT: OUT_NETWORK: FAILED :" $logops
$ipt -A OUT_NETWORK -j DROP
################################################################################
Try browsing the net from a LAN machine then go from the firewall
cat /var/log/messages | grep OUT_NETWORK

This should show you every request that tried to get out. Note the lines that say "FAILED" as these are the ones that were rejected by the script.

Last edited by JordanH; 02-05-2004 at 03:03 PM.
 
Old 02-05-2004, 03:00 PM   #15
JordanH
Member
 
Registered: Oct 2003
Location: Toronto, Canada
Distribution: Ubuntu, FC3, RHEL 3-4 AS Retired: SuSE 9.1 Pro, RedHat 6-9, FC1-2
Posts: 360

Rep: Reputation: 30
Also... what do you get from this command?
As root:
lsmod | grep conn

You should see the ip_conntrack module listed.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
CONNECTION TO PPPOE DSL ON ubuntu skinnyman100 Linux - Networking 1 05-28-2005 10:07 AM
dsl-pppoe help square317 Linux - Networking 1 05-11-2005 05:12 PM
pppoe but no dsl modem basanta Linux - Networking 3 07-07-2004 08:31 AM
rp-pppoe for DSL miguetoo Linux - Networking 0 06-06-2003 01:29 AM
PPPoE for DSL pkdk657 Slackware 1 03-03-2003 12:31 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Networking

All times are GMT -5. The time now is 04:25 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration