[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference noted::seal

Title:SEAL
Moderator:GALVIA::SMITH
Created:Mon Mar 21 1994
Last Modified:Fri Jun 06 1997
Last Successful Update:Fri Jun 06 1997
Number of topics:1989
Total number of notes:8209

828.0. "host 0.0.0.0 in httpd log?" by DELBOY::2H0533::Tim_Banks ([email protected]) Fri Jan 12 1996 04:52

T.RTitleUserPersonal
Name
DateLines
828.1Nothing eating up log space!CHEFS::AYLESBURY_LTue Jan 16 1996 08:358
828.2Same in kern.log, gated.log, wwwproxy.logSNOFS1::snod17dgp10.gen.sno.dec.com::therkelsenpummm, I forgetThu Jun 13 1996 23:0626
828.3Log everything...GALVIA::SMITHFri Jun 14 1996 05:2315
828.4cause is most likely DHCPSNOFS1::do1.sno.dec.com::therkelsenpummm, I forgetMon Jun 17 1996 03:2917
828.5boot DHCP!GALVIA::SMITHMon Jun 17 1996 07:206
828.6define 0.0.0.0 as internal network ?PRMS00::COLEMon May 12 1997 10:468
    so should I define 0.0.0.0 as an internal (BLUE)  network to eliminate
    these messages  or is there a better method to avoid filling up
    the log files ?
    
     ...larry
    
    
    
828.7EEMELI::EINAMOTue May 13 1997 04:5812
Hi

My customer is also complaining that 0.0.0.0 fils his kern log and www.log
....
for first aid I did advice him to go nad snif your intranet (blue cable) and try
to find the statinon that is sending those 0.0.0.0 fames

Are we sure that it is not us (altavista firewall) that generated those bootp
packages ?


Marko
828.8CHEFS::16.37.11.61::PITTGone with the winsock ...Fri May 16 1997 11:198
It certainly wasn't the firewall if you installed it exactly
as instructed in the manual...

I have noticed WWWproxy stuff as well, but have not had any
chance to investigate - I can't even remember which configuration
it was ...

T
828.9Check /etc/ifaccess.confKYOSS1::MONTAREAlex MontareTue May 27 1997 12:195
I don't know if this is "supported" but I've had luck eliminating these 
messages by editing the file /etc/ifaccess.conf.  In that file there is 
a line for network 0.0.0.0 that ends with the keyword "denylog".  
Changing this to "deny" stopped the logging and still blocked the 
packets (yes, I did test it!).