Re: Lost all network connectivity after clean FC3 install

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Paul! The output is at the end of the message.

 --- Paul Howarth <paul@xxxxxxxxxxxx> ha scritto: 
> >>that your packet forwarding rules are broken.
> What's
> >>the output of:
> >>
> >># iptables -n -L
> >>
> >>on the machine connected to the cable modem?
> > 
> > iptables -n -L
> > Chain INPUT (policy ACCEPT)
> > target     prot opt source              
> destination
> > ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0
>          tcp dpts:6881:6889
> > RH-Firewall-1-INPUT  all  --  0.0.0.0/0          
> 0.0.0.0/0
> > 
> > Chain FORWARD (policy ACCEPT)
> > target     prot opt source              
> destination
> > RH-Firewall-1-INPUT  all  --  0.0.0.0/0          
> 0.0.0.0/0
> > ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
> > 
> > Chain OUTPUT (policy ACCEPT)
> > target     prot opt source              
> destination
> > 
> > Chain RH-Firewall-1-INPUT (2 references)
> > target     prot opt source              
> destination
> > ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
> > ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0
>       icmp type 255
> > ACCEPT     esp  --  0.0.0.0/0            0.0.0.0/0
> > ACCEPT     ah   --  0.0.0.0/0            0.0.0.0/0
> > ACCEPT     udp  --  0.0.0.0/0           
> 224.0.0.251     udp dpt:5353
> > ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0
>       udp dpt:631
> > ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
>       state RELATED,ESTABLISHED
> > ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0
>       state NEW tcp dpt:22
> > REJECT     all  --  0.0.0.0/0            0.0.0.0/0
>       reject-with icmp-host-prohibited
> 
> Interesting; the first rule in the
> RH-Firewall-1-INPUT chain would appear to 
> be accepting any packet, thus rendering the
> remaining rules irrelevant. 
> However, I'm not an iptables expert and I don't use
> Red Hat's firewall 
> utility, so maybe I'm misinterpreting that.
> 
> What do you get from:
> 
> # iptables -L -n -t nat

Chain PREROUTING (policy ACCEPT)
target     prot opt source               destination

Chain POSTROUTING (policy ACCEPT)
target     prot opt source               destination
MASQUERADE  all  --  0.0.0.0/0            0.0.0.0/0

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination

Thanks!
Enrico



		
___________________________________ 
Nuovo Yahoo! Messenger: E' molto più divertente: Audibles, Avatar, Webcam, Giochi, Rubrica? Scaricalo ora! 
http://it.messenger.yahoo.it


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux