Linux Floppy Router
LFR v2.0 README
Copyright (c) 1997-2002 Len Padilla
Based on the work of many others, see THANKS
LFR is distributed under the GNU Public License (GPL). See the COPYING
file for license information. Download it.
LFR is a Linux/Netfilter based firewall/router on a single floppy disk.
Think of it as a micro Linux distribution with a purpose. With LFR you
can take that old 486 with 4 MB of RAM that you have in the closet and
put it to good use. With a pair of cheap etherenet adapters (NE2000,
3Com 3C9** or Intel E100) you can safely connect a local area network
to the internet.
See INSTALL for instructions.
LFR has been tested extensively under Linux [2.1.?-2.4.20] using Slackware
and Debian distributions [2.? - 8.0, 2.2 - 3.1 ] to build.
root.image : a minix file system image containing the LFR.
bzImage : a compressed Linux kernel (x86) compiled for ethernet
interfaces (NE2000, 3C9**, EE100), IP firewall, IP NAT.
Future releases may contain other drivers as kernel modules.
lfr.pl : a perl script to create a LinuxFloppyRouter.
Linux (>2.0) with loopback device (filesystem in-a-file),
minix filesystem support (kernel or module)
Network configuration under LFR:
The LFR has its internal ethernet interface, eth0, set to
192.168.0.1 with a netmask of 255.255.255.0. This means that in
its default configuration you can connect to it up to 253 machines
(using addresses 192.168.0.2 - 192.168.0.254).
The external interface, eth1, uses DHCP to obtain an IP address
and default gateway from a cable modem, DSL modem or similar.
If there is no DHCP server on your network, manual configuration
of the init files will be required.
LFR contains DHCP and DNS servers. Internal network workstations
will be assigned a dynamic IP address, from 192.168.0.20 -
192.168.0.254. The 192.168.0.2 - 192.168.0.19 address range
is left free for static IP devices (printers, fileservers,
etc). The LFR server being the default gateway and dns server.
The LFR firewall permits no incoming connections. It uses the
stateful packet inspection of the Linux 2.4 netfilter to allow
the return connections for established sessions. All outgoing
connections are source NAT'd to the external interface's IP
address. Protection against IP spoofing is provided at the