Hey Everyone, Well, someone on this list mentioned that if Cox takes over the ailing @home service that they are going to go DHCP all the way. I have never been successful getting DHCP to work on my boxen and have always just hardcoded the IP they gave me. My setup is the following: *486 running Debian stable acting as a firewall *two ethernet cards *the Trinity OS firewall script *pump dhcp client on eth0 *eth1 acting as a 192.168.0.* internal network Whenever I try to start pump like this: $ pump -h cx1211543-a it fails. Here is the output in syslog: Nov 30 16:58:17 cx1211543-a pumpd[15189]: PUMP: sending discover Nov 30 16:58:17 cx1211543-a pumpd[15189]: breq: opcode: 1 Nov 30 16:58:17 cx1211543-a pumpd[15189]: breq: hw: 1 Nov 30 16:58:17 cx1211543-a pumpd[15189]: breq: hwlength: 6 Nov 30 16:58:17 cx1211543-a pumpd[15189]: breq: hopcount: 0 Nov 30 16:58:17 cx1211543-a pumpd[15189]: breq: id: 0xd47be056 Nov 30 16:58:17 cx1211543-a pumpd[15189]: breq: secs: 0 Nov 30 16:58:17 cx1211543-a pumpd[15189]: breq: flags: 0x 0 Nov 30 16:58:17 cx1211543-a pumpd[15189]: breq: ciaddr: 0.0.0.0 Nov 30 16:58:17 cx1211543-a pumpd[15189]: breq: yiaddr: 0.0.0.0 Nov 30 16:58:17 cx1211543-a pumpd[15189]: breq: server_ip: 0.0.0.0 Nov 30 16:58:17 cx1211543-a pumpd[15189]: breq: bootp_gw_ip: 0.0.0.0 Nov 30 16:58:17 cx1211543-a pumpd[15189]: breq: hwaddr: Nov 30 16:58:17 cx1211543-a pumpd[15189]: breq: servername: Nov 30 16:58:17 cx1211543-a pumpd[15189]: breq: bootfile: Nov 30 16:58:17 cx1211543-a pumpd[15189]: breq: vendor: 0x63 0x53 0x82 0x63 Nov 30 16:58:17 cx1211543-a pumpd[15189]: breq: vendor: 53 1 0x 1 Nov 30 16:58:17 cx1211543-a pumpd[15189]: breq: vendor: 0xff Nov 30 16:58:17 cx1211543-a kernel: eth0: Setting Rx mode to 0 addresses. Nov 30 16:58:17 cx1211543-a kernel: eth0: Setting Rx mode to 1 addresses. Nov 30 16:58:17 cx1211543-a kernel: Packet log: input REJECT eth0 PROTO=17 192.168.0.1:68 255.255.255.255:67 L=328 S=0x00 I=14163 F=0x0000 T=64 (#12) Nov 30 16:58:17 cx1211543-a kernel: Packet log: input REJECT eth0 PROTO=2 192.168.100.1:65535 224.0.0.1:65535 L=28 S=0xC0 I=0 F=0x0000 T=1 (#15) Nov 30 16:58:20 cx1211543-a kernel: Packet log: input REJECT eth0 PROTO=17 192.168.0.1:68 255.255.255.255:67 L=328 S=0x00 I=14166 F=0x0000 T=64 (#12) Nov 30 16:58:26 cx1211543-a kernel: Packet log: input REJECT eth0 PROTO=17 192.168.0.1:68 255.255.255.255:67 L=328 S=0x00 I=14168 F=0x0000 T=64 (#12) Nov 30 16:58:37 cx1211543-a kernel: Packet log: input REJECT eth0 PROTO=17 192.168.0.1:68 255.255.255.255:67 L=328 S=0x00 I=14170 F=0x0000 T=64 (#12) Obviously, the REJECTed packets make me suspicious of the firewall, but I am far from being a firewall expert. Any help is appreciated. julian -- mail : julian @ catchen.org | ( topeka ) www : http://catchen.org/topeka/ | phx, az sent : Fri Nov 30, 2001 04:53PM MST | The state continues to kill its victims, not so much to defend society against then -- for it could do that equally well by imprisonment -- but to appease the mob's emotions of hatred and revenge. --Clarence S. Darrow, "The Futility of the Death Penalty", Forum, September 1928