also from my understanding you are rebooting and then pluging the cable ? have you tried a simple reboot without reconfiguring after pluging the cable ?
could you do
systemctl status -l dnscache
systemctl status -l dnscache.forwarder
systemctl status -l masq
systemctl status -l network
iptables -L
just after pluging back the network cable after initial configuration to new ip and reboot
then try
systemctl restart network masq dnscache dnscache.forwarder
I had to do a post-upgrade to get the machine into the problem condition as I do not have time right now to do a full install/restore.
BTW: Will not be on location the next 3 days
systemctl restart network masq dnscache dnscache.forwarder did not help - at least still unable to ping google.com
● networking.service - Network management for Koozali SME Server, using old sysvinit script
Loaded: loaded (/usr/lib/systemd/system/networking.service; enabled; vendor preset: enabled)
Active: active (exited) since søn 2021-07-25 14:24:16 CEST; 5min ago
Process: 1385 ExecStart=/etc/rc.d/init.d/network start (code=exited, status=0/SUCCESS)
Main PID: 1385 (code=exited, status=0/SUCCESS)
Memory: 4.0K
CGroup: /system.slice/networking.service
jul 25 14:24:10 beastserver2.beast2.dk systemd[1]: Starting Network management for Koozali SME Server, using old sysvinit script...
jul 25 14:24:11 beastserver2.beast2.dk network[1385]: Sætter loopback-grænsefladen i drift: [ O.k. ]
jul 25 14:24:16 beastserver2.beast2.dk network[1385]: Sætter grænseflade enp4s0 i drift: [ O.k. ]
jul 25 14:24:16 beastserver2.beast2.dk systemd[1]: Started Network management for Koozali SME Server, using old sysvinit script.
● masq.service - masq, the Koozali SME Server firewall script
Loaded: loaded (/usr/lib/systemd/system/masq.service; disabled; vendor preset: disabled)
Active: active (exited) since søn 2021-07-25 14:24:10 CEST; 4min 46s ago
Process: 1219 ExecStart=/etc/rc.d/init.d/masq start (code=exited, status=0/SUCCESS)
Process: 1209 ExecStartPre=/sbin/e-smith/service-status masq (code=exited, status=0/SUCCESS)
Main PID: 1219 (code=exited, status=0/SUCCESS)
Memory: 0B
CGroup: /system.slice/masq.service
jul 25 14:24:09 beastserver2.beast2.dk systemd[1]: Starting masq, the Koozali SME Server firewall script...
jul 25 14:24:09 beastserver2.beast2.dk service-status[1209]: masq status not enabled in configuration db.
jul 25 14:24:10 beastserver2.beast2.dk masq[1219]: Enabling IP masquerading: done
jul 25 14:24:10 beastserver2.beast2.dk systemd[1]: Started masq, the Koozali SME Server firewall script.
● dnscache.forwarder.service - dnscache.forwarder,
Loaded: loaded (/usr/lib/systemd/system/dnscache.forwarder.service; enabled; vendor preset: enabled)
Active: active (exited) since søn 2021-07-25 14:24:10 CEST; 4min 25s ago
Process: 1461 ExecStart=/usr/bin/sv u /service/dnscache.forwarder (code=exited, status=0/SUCCESS)
Process: 1351 ExecStartPre=/sbin/e-smith/service-status dnscache.forwarder (code=exited, status=0/SUCCESS)
Main PID: 1461 (code=exited, status=0/SUCCESS)
Memory: 0B
CGroup: /system.slice/dnscache.forwarder.service
jul 25 14:24:10 beastserver2.beast2.dk systemd[1]: Starting dnscache.forwarder,...
jul 25 14:24:10 beastserver2.beast2.dk systemd[1]: Started dnscache.forwarder,.
● dnscache.service - dnscache,
Loaded: loaded (/usr/lib/systemd/system/dnscache.service; enabled; vendor preset: enabled)
Active: active (exited) since søn 2021-07-25 14:24:10 CEST; 3min 53s ago
Process: 1486 ExecStart=/usr/bin/sv u /service/dnscache (code=exited, status=0/SUCCESS)
Process: 1372 ExecStartPre=/sbin/e-smith/service-status dnscache (code=exited, status=0/SUCCESS)
Main PID: 1486 (code=exited, status=0/SUCCESS)
Memory: 0B
CGroup: /system.slice/dnscache.service
jul 25 14:24:10 beastserver2.beast2.dk systemd[1]: Starting dnscache,...
jul 25 14:24:10 beastserver2.beast2.dk systemd[1]: Started dnscache,.
Chain INPUT (policy DROP)
target prot opt source destination
state_chk all -- anywhere anywhere
local_chk all -- anywhere anywhere
denylog all -- 224.0.0.0/4 anywhere
denylog all -- anywhere 224.0.0.0/4
InboundICMP icmp -- anywhere anywhere
denylog icmp -- anywhere anywhere
InboundTCP tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,ACK/SYN
denylog tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,ACK/SYN
InboundUDP udp -- anywhere anywhere
denylog udp -- anywhere anywhere
denylog all -- anywhere anywhere
Chain FORWARD (policy DROP)
target prot opt source destination
state_chk all -- anywhere anywhere
SMTPProxy tcp -- anywhere anywhere tcp dpt:smtp
local_chk all -- anywhere anywhere
ForwardedTCP tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,ACK/SYN
ForwardedUDP udp -- anywhere anywhere
denylog all -- anywhere anywhere
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
denylog all -- 224.0.0.0/4 anywhere
denylog all -- anywhere 224.0.0.0/4
ACCEPT all -- anywhere anywhere
Chain ForwardedTCP (1 references)
target prot opt source destination
ForwardedTCP_1 tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,ACK/SYN
denylog tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,ACK/SYN
Chain ForwardedTCP_1 (1 references)
target prot opt source destination
Chain ForwardedUDP (1 references)
target prot opt source destination
ForwardedUDP_1 udp -- anywhere anywhere
denylog udp -- anywhere anywhere
Chain ForwardedUDP_1 (1 references)
target prot opt source destination
Chain InboundICMP (1 references)
target prot opt source destination
InboundICMP_1 icmp -- anywhere anywhere
denylog icmp -- anywhere anywhere
Chain InboundICMP_1 (1 references)
target prot opt source destination
Chain InboundTCP (1 references)
target prot opt source destination
InboundTCP_1 tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,ACK/SYN
denylog tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,ACK/SYN
Chain InboundTCP_1 (1 references)
target prot opt source destination
Chain InboundUDP (1 references)
target prot opt source destination
InboundUDP_1 udp -- anywhere anywhere
denylog udp -- anywhere anywhere
Chain InboundUDP_1 (1 references)
target prot opt source destination
Chain SMTPProxy (1 references)
target prot opt source destination
Chain SSH_Autoblock (0 references)
target prot opt source destination
SSH_Whitelist tcp -- anywhere anywhere tcp dpt:ssh state NEW
all -- anywhere anywhere recent: SET name: SSH side: source mask: 255.255.255.255
denylog all -- anywhere anywhere recent: CHECK seconds: 900 hit_count: 4 TTL-Match name: SSH side: source mask: 255.255.255.255
Chain SSH_Whitelist (1 references)
target prot opt source destination
SSH_Whitelist_1 all -- anywhere anywhere
Chain SSH_Whitelist_1 (1 references)
target prot opt source destination
Chain denylog (15 references)
target prot opt source destination
DROP all -- anywhere anywhere
DROP all -- anywhere anywhere
DROP all -- anywhere anywhere
DROP all -- anywhere anywhere
DROP all -- anywhere anywhere
Chain local_chk (2 references)
target prot opt source destination
local_chk_1 all -- anywhere anywhere
Chain local_chk_1 (1 references)
target prot opt source destination
Chain state_chk (2 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED