On Fri, 2005-02-04 at 02:49 -0700, Lee Einer wrote: > > Craig White wrote: > > >On Thu, 2005-02-03 at 21:09 -0700, Lee Einer wrote: > > > > > >>Craig White wrote: > >> > >> > >> > >>>On Thu, 2005-02-03 at 20:16 -0700, Lee Einer wrote: > >>> > >>> > >>> > >>> > >>>>Done. Pinged Mepisbox. No packets returned. Mepisbox pings Mandrakebox > >>>>just fine. Stopping iptables at mepisbox returns message > >>>> > >>>> Aborting iptables load: unknown ruleset, "inactive." > >>>> > >>>>I don't know if that is a good thing or a bad thing. It does not get the > >>>>ping going, though. > >>>> > >>>>I have connectivity through both computers to the router, and through > >>>>the router to the internet. The connection for the Mepis laptop is > >>>>wireless- is this at the root of the issue? > >>>> > >>>> > >>>> > >>>> > >>>---- > >>>it might very well be... > >>> > >>>The wireless access point - does it have some security setting on it to > >>>prevent wireless users from accessing other parts of the LAN? - does it > >>>put wireless users in a DMZ ? > >>> > >>>Question if you do (on both machines): > >>>#route -n > >>>Kernel IP routing table > >>>Destination Gateway Genmask Flags Metric Ref Use > >>>Iface > >>>192.168.0.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0 > >>>169.254.0.0 0.0.0.0 255.255.0.0 U 0 0 0 eth0 > >>>0.0.0.0 192.168.0.254 0.0.0.0 UG 0 0 0 eth0 > >>> > >>>does they look like above? > >>> > >>> > >>> > >>close. They both have the same gateway address, and both can ping it. > >>Line 2 on Mandrake box has different Iface and Genmask -127.0.0.0 and > >>255.0.0.0 respectively. Mepis box has two lines > >> > >>Destination Gateway Genmask > >>192.168.0.0 0.0.0.0 255.255.255.0 ath0 > >>0.0.0.0 192.168.0.1 0.0.0.0 ath0 > >> > >> > >> > >----- > >OK - well let's evaluate my assumptions then... > > > >You have something like a Netgear Wireless Router (I think they use the > >192.168.0.0 network) or perhaps one of the newer Qwest supplied > >Actiontec dsl modem/routers with wireless and your Mandrake box connects > >with a cable to one of the LAN ports and the Mepisbox (your laptop) > >connects to this same router via wireless. > > > >With this assumption (brand accuracy not important), then they are both > >'pinging' the same gateway - 192.168.0.1 > > > >With this assumption, from the Mepisbox, you should be able to ping > >192.168.0.100 as well as 192.168.0.1 unless there is a firewall on the > >Mandrakebox. If not, then on the Mandrakebox, type 'iptables -L' and > >post the results > > > >With this assumption, from the Mandrakebox, you should be able to ping > >192.168.0.101 as well as 192.168.0.1 unless there is a firewall on the > >Mepisbox. If not, then on the Mepisbox, type 'iptables -L' and post the > >results > > > This is the case. Here is the output of iptables -L from the Mepisbox- > > Chain INPUT (policy DROP) > target prot opt source destination > ACCEPT all -- anywhere anywhere > ACCEPT all -- mepisbox 192.168.0.255 > logaborted tcp -- anywhere anywhere state RELATED,ESTABLISHED tcp flags:RST/RST > ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED > ACCEPT icmp -- anywhere anywhere icmp destination-unreachable > ACCEPT icmp -- anywhere anywhere icmp time-exceeded > ACCEPT icmp -- anywhere anywhere icmp parameter-problem > nicfilt all -- anywhere anywhere > srcfilt all -- anywhere anywhere > > Chain FORWARD (policy DROP) > target prot opt source destination > ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED > ACCEPT icmp -- anywhere anywhere icmp destination-unreachable > ACCEPT icmp -- anywhere anywhere icmp time-exceeded > ACCEPT icmp -- anywhere anywhere icmp parameter-problem > srcfilt all -- anywhere anywhere > > Chain OUTPUT (policy DROP) > target prot opt source destination > ACCEPT all -- anywhere anywhere > ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED > ACCEPT icmp -- anywhere anywhere icmp destination-unreachable > ACCEPT icmp -- anywhere anywhere icmp time-exceeded > ACCEPT icmp -- anywhere anywhere icmp parameter-problem > s1 all -- anywhere anywhere > > Chain f0to1 (3 references) > target prot opt source destination > ACCEPT tcp -- anywhere anywhere tcp spts:1024:65535 dpts:6881:6889 state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:1024:65535 dpt:ipp state NEW > ACCEPT udp -- anywhere anywhere udp dpt:ipp > ACCEPT tcp -- anywhere anywhere tcp dpt:microsoft-ds state NEW > ACCEPT tcp -- anywhere anywhere tcp dpt:netbios-ns state NEW > ACCEPT udp -- anywhere anywhere udp spts:1024:65535 dpt:netbios-ns > ACCEPT udp -- anywhere anywhere udp spt:netbios-ns dpt:netbios-ns > ACCEPT udp -- anywhere anywhere udp spts:1024:65535 dpt:netbios-dgm > ACCEPT udp -- anywhere anywhere udp spt:netbios-dgm dpt:netbios-dgm > ACCEPT tcp -- anywhere anywhere tcp dpt:netbios-ssn state NEW > ACCEPT udp -- anywhere anywhere udp spts:1024:65535 dpt:netbios-ssn > ACCEPT icmp -- anywhere anywhere icmp source-quench > ACCEPT tcp -- anywhere anywhere tcp spts:1024:65535 dpt:www state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:1024:65535 dpt:webcache state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:1024:65535 dpt:8008 state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:1024:65535 dpt:8000 state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:1024:65535 dpt:8888 state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:1024:65535 dpt:6969 state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:1024:65535 dpts:6881:6889 state NEW > ACCEPT udp -- anywhere anywhere udp dpts:6970:7170 > ACCEPT udp -- anywhere anywhere udp spt:netbios-ns dpts:1024:5999 > ACCEPT udp -- anywhere anywhere udp spt:netbios-ns dpt:netbios-ns > ACCEPT udp -- anywhere anywhere udp spt:netbios-dgm dpt:netbios-dgm > ACCEPT tcp -- anywhere anywhere tcp spts:1024:65535 dpts:1024:65535 state NEW > ACCEPT icmp -- anywhere anywhere icmp echo-reply > logdrop all -- anywhere anywhere > > Chain f0to2 (1 references) > target prot opt source destination > logdrop all -- anywhere anywhere > > Chain f1to0 (1 references) > target prot opt source destination > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpts:6881:6889 state NEW > ACCEPT udp -- anywhere anywhere udp spt:netbios-ns dpts:1024:65535 > ACCEPT udp -- anywhere anywhere udp spt:netbios-ns dpt:netbios-ns > ACCEPT udp -- anywhere anywhere udp spt:netbios-dgm dpt:netbios-dgm > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpt:ftp state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpt:xmpp-client state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpts:6881:6889 state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpt:1863 state NEW > ACCEPT tcp -- anywhere anywhere tcp dpt:554 state NEW > ACCEPT tcp -- anywhere anywhere tcp dpt:7070 state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpt:ipp state NEW > ACCEPT udp -- anywhere anywhere udp dpt:ipp > ACCEPT udp -- anywhere anywhere udp dpt:3478 > ACCEPT tcp -- anywhere anywhere tcp dpt:kerberos state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpt:https state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpt:imaps state NEW > ACCEPT tcp -- anywhere anywhere tcp dpt:3030 state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpt:rsync state NEW > ACCEPT tcp -- anywhere anywhere tcp dpt:microsoft-ds state NEW > ACCEPT tcp -- anywhere anywhere tcp dpt:gnutella-svc state NEW > ACCEPT tcp -- anywhere anywhere tcp dpt:8765 state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpt:8880 state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpt:ssh state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:0:1023 dpt:ssh state NEW > ACCEPT tcp -- anywhere anywhere tcp dpt:netbios-ns state NEW > ACCEPT udp -- anywhere anywhere udp spts:1024:5999 dpt:netbios-ns > ACCEPT udp -- anywhere anywhere udp spt:netbios-ns dpt:netbios-ns > ACCEPT udp -- anywhere anywhere udp spts:1024:5999 dpt:netbios-dgm > ACCEPT udp -- anywhere anywhere udp spt:netbios-dgm dpt:netbios-dgm > ACCEPT tcp -- anywhere anywhere tcp dpt:netbios-ssn state NEW > ACCEPT udp -- anywhere anywhere udp spts:1024:5999 dpt:netbios-ssn > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpts:5190:5193 state NEW > ACCEPT udp -- anywhere anywhere udp spts:1024:5999 dpts:5190:5193 > ACCEPT udp -- anywhere anywhere udp dpts:33434:33600 > ACCEPT udp -- anywhere anywhere udp dpt:ntp > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpt:pop3s state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpt:5050 state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpt:telnet state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpts:5000:5001 state NEW > ACCEPT udp -- anywhere anywhere udp spts:1024:5999 dpt:5000 > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpt:dict state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpt:1723 state NEW > ACCEPT gre -- anywhere anywhere > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpt:whois state NEW > ACCEPT udp -- anywhere anywhere udp dpt:43 > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpt:nntp state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpt:imap2 state NEW > ACCEPT udp -- anywhere anywhere udp dpt:imap2 > ACCEPT udp -- anywhere anywhere udp dpt:4000 > ACCEPT tcp -- anywhere anywhere tcp spts:1024:65535 dpts:1024:65535 state NEW > ACCEPT tcp -- anywhere anywhere tcp dpt:ldap state NEW > ACCEPT tcp -- anywhere anywhere tcp dpt:522 state NEW > ACCEPT tcp -- anywhere anywhere tcp dpt:1503 state NEW > ACCEPT tcp -- anywhere anywhere tcp dpt:1720 state NEW > ACCEPT tcp -- anywhere anywhere tcp dpt:1731 state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpts:1024:65535 state NEW > ACCEPT udp -- anywhere anywhere udp spts:1024:5999 dpts:1024:65535 > ACCEPT icmp -- anywhere anywhere icmp echo-request > ACCEPT icmp -- anywhere anywhere icmp source-quench > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpt:smtp state NEW > ACCEPT tcp -- anywhere anywhere tcp dpt:domain state NEW > ACCEPT udp -- anywhere anywhere udp dpt:domain > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpt:www state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpt:webcache state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpt:8008 state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpt:8000 state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpt:8888 state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpts:6660:6669 state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpt:6969 state NEW > ACCEPT tcp -- anywhere anywhere tcp spts:1024:5999 dpt:pop3 state NEW > logdrop all -- anywhere anywhere > > Chain f1to2 (1 references) > target prot opt source destination > logdrop all -- anywhere anywhere > > Chain f2to0 (1 references) > target prot opt source destination > logdrop all -- anywhere anywhere > > Chain f2to1 (3 references) > target prot opt source destination > logdrop all -- anywhere anywhere > > Chain logaborted (1 references) > target prot opt source destination > logaborted2 all -- anywhere anywhere limit: avg 1/sec burst 10 > LOG all -- anywhere anywhere limit: avg 2/min burst 1 LOG level warning prefix `LIMITED ' > > Chain logaborted2 (1 references) > target prot opt source destination > LOG all -- anywhere anywhere LOG level warning tcp-sequence tcp-options ip-options prefix `ABORTED ' > ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED > > Chain logdrop (8 references) > target prot opt source destination > logdrop2 all -- anywhere anywhere > > Chain logdrop2 (1 references) > target prot opt source destination > DROP all -- anywhere anywhere > > Chain logreject (0 references) > target prot opt source destination > logreject2 all -- anywhere anywhere > > Chain logreject2 (1 references) > target prot opt source destination > REJECT tcp -- anywhere anywhere reject-with tcp-reset > REJECT udp -- anywhere anywhere reject-with icmp-port-unreachable > DROP all -- anywhere anywhere > > Chain nicfilt (1 references) > target prot opt source destination > RETURN all -- anywhere anywhere > RETURN all -- anywhere anywhere > RETURN all -- anywhere anywhere > logdrop all -- anywhere anywhere > > Chain s0 (1 references) > target prot opt source destination > f0to1 all -- anywhere mepisbox > f0to1 all -- anywhere 192.168.0.255 > f0to1 all -- anywhere mepisbox > f0to2 all -- anywhere 12.168.0.100 > logdrop all -- anywhere anywhere > > Chain s1 (1 references) > target prot opt source destination > f1to2 all -- anywhere 12.168.0.100 > f1to0 all -- anywhere anywhere > > Chain s2 (1 references) > target prot opt source destination > f2to1 all -- anywhere mepisbox > f2to1 all -- anywhere 192.168.0.255 > f2to1 all -- anywhere mepisbox > f2to0 all -- anywhere anywhere > > Chain srcfilt (2 references) > target prot opt source destination > s2 all -- 12.168.0.100 anywhere > s0 all -- anywhere anywhere ---- wow - don't know where to fix this. You must be using some utility to create this - does mepis create complex tables such as this by default? My first thought is that there is a switch to turn this off for testing and back on again - and then a 'configuration' utility to allow for adding new ports. a very quick check in forums at mepis shows two common utilities, guard dog and firestarter. My guess is that you are using guard dog. >From Mepis Documentation Wiki What is Guarddog? From the website: Guarddog is a firewall configuration utility for Linux systems. Guarddog is aimed at two groups of users. Novice to intermediate users who are not experts in TCP/IP networking and security, and those users who don't want the hastle of dealing with cryptic shell scripts and ipchains/iptables parameters. Main Menu --> System --> Security --> Guarddog Can you get there and turn it off momentarily? Then you should be able to ping the Mepisbox from the Mandrakebox Then I suppose you could allow NFS (port 2049) from 192.168.0.100 Perhaps something similar going on in Mandrakebox (firewall) ---- > > > The router is a D-Link DI 624. I will be reviewing the manual later in > the morning also. Hope this isn't one of those cases where RTFM would > have been the correct response. ---- I think you can spare yourself some reading effort here...problem seems to be firewall ;-) Craig --------------------------------------------------- PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us To subscribe, unsubscribe, or to change you mail settings: http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss