to Tom:
        you mix up the reply, see my first posting :)
        it's the default example (192.168.1.x)




and RH FAQ info to Ray Olszewski

Linux firewall 2.4.20 #1 Sun May 11 18:53:34 CEST 2003
i586 unknown





1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
    link/loopback 00:00:00:00:00:00 brd
00:00:00:00:00:00
    inet 127.0.0.1/8 brd 127.255.255.255 scope host lo
2: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop
    link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
3: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc
pfifo_fast qlen 100
    link/ether 00:0b:2b:02:0d:6d brd ff:ff:ff:ff:ff:ff
    inet 128.142.121.254/20 brd 129.142.127.255 scope
global eth0
4: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc
pfifo_fast qlen 100
    link/ether 00:0b:2b:02:2a:43 brd ff:ff:ff:ff:ff:ff
    inet 192.168.1.254/24 brd 192.168.1.255 scope
global eth1
5: eth2: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc
pfifo_fast qlen 100
    link/ether 00:0b:2b:02:2a:4d brd ff:ff:ff:ff:ff:ff
    inet 192.168.10.100/24 brd 192.168.10.255 scope
global eth2




192.168.1.0/24 dev eth1  proto kernel  scope link  src
192.168.1.254
192.168.10.0/24 dev eth2  proto kernel  scope link 
src 192.168.10.100
129.142.112.0/20 dev eth0  proto kernel  scope link 
src 128.142.121.254
default via 129.142.112.1 dev eth0





Shorewall-1.4.8 Status at firewall - Wed Dec 17
19:17:28 UTC 2003

Counters reset Wed Dec 17 17:33:30 UTC 2003

Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source 
             destination
    0     0 ACCEPT     all  --  lo     *      
0.0.0.0/0            0.0.0.0/0
    0     0 DROP      !icmp --  *      *      
0.0.0.0/0            0.0.0.0/0          state INVALID
  159 22494 eth0_in    all  --  eth0   *      
0.0.0.0/0            0.0.0.0/0          
  139 11414 eth1_in    all  --  eth1   *      
0.0.0.0/0            0.0.0.0/0
    0     0 eth2_in    all  --  eth2   *      
0.0.0.0/0            0.0.0.0/0
    0     0 common     all  --  *      *      
0.0.0.0/0            0.0.0.0/0          
    0     0 LOG        all  --  *      *      
0.0.0.0/0            0.0.0.0/0          LOG flags 0
level 6 prefix `Shorewall:INPUT:REJECT:'
    0     0 reject     all  --  *      *      
0.0.0.0/0            0.0.0.0/0

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source 
             destination
    0     0 DROP      !icmp --  *      *      
0.0.0.0/0            0.0.0.0/0          state INVALID
 1671  862K eth0_fwd   all  --  eth0   *      
0.0.0.0/0            0.0.0.0/0
 1942  322K eth1_fwd   all  --  eth1   *      
0.0.0.0/0            0.0.0.0/0
    0     0 eth2_fwd   all  --  eth2   *      
0.0.0.0/0            0.0.0.0/0          
    0     0 common     all  --  *      *      
0.0.0.0/0            0.0.0.0/0
    0     0 LOG        all  --  *      *      
0.0.0.0/0            0.0.0.0/0          LOG flags 0
level 6 prefix `Shorewall:FORWARD:REJECT:'
    0     0 reject     all  --  *      *      
0.0.0.0/0            0.0.0.0/0          

Chain OUTPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source 
             destination         
    0     0 ACCEPT     all  --  *      lo     
0.0.0.0/0            0.0.0.0/0
    0     0 DROP      !icmp --  *      *      
0.0.0.0/0            0.0.0.0/0          state INVALID 
    0     0 ACCEPT     udp  --  *      eth0   
0.0.0.0/0            0.0.0.0/0          udp dpts:67:68
  146  9944 fw2net     all  --  *      eth0   
0.0.0.0/0            0.0.0.0/0          
  129 18328 fw2loc     all  --  *      eth1   
0.0.0.0/0            0.0.0.0/0
    0     0 fw2dmz     all  --  *      eth2   
0.0.0.0/0            0.0.0.0/0          
    0     0 common     all  --  *      *      
0.0.0.0/0            0.0.0.0/0
    0     0 LOG        all  --  *      *      
0.0.0.0/0            0.0.0.0/0          LOG flags 0
level 6 prefix `Shorewall:OUTPUT:REJECT:' 
    0     0 reject     all  --  *      *      
0.0.0.0/0            0.0.0.0/0

Chain all2all (7 references)
 pkts bytes target     prot opt in     out     source 
             destination
    0     0 ACCEPT     all  --  *      *      
0.0.0.0/0            0.0.0.0/0          state
RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW tcp
flags:!0x16/0x02 
    0     0 common     all  --  *      *      
0.0.0.0/0            0.0.0.0/0
    0     0 LOG        all  --  *      *      
0.0.0.0/0            0.0.0.0/0          LOG flags 0
level 6 prefix `Shorewall:all2all:REJECT:' 
    0     0 reject     all  --  *      *      
0.0.0.0/0            0.0.0.0/0          

Chain common (5 references)
 pkts bytes target     prot opt in     out     source 
             destination         
    0     0 icmpdef    icmp --  *      *      
0.0.0.0/0            0.0.0.0/0          
    0     0 reject     udp  --  *      *      
0.0.0.0/0            0.0.0.0/0          udp dpt:135 
   18  1404 reject     udp  --  *      *      
0.0.0.0/0            0.0.0.0/0          udp
dpts:137:139
    0     0 reject     udp  --  *      *      
0.0.0.0/0            0.0.0.0/0          udp dpt:445 
    0     0 reject     tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          tcp dpt:139
    6   288 reject     tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          tcp dpt:445 
   93  4464 reject     tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          tcp dpt:135
    0     0 DROP       udp  --  *      *      
0.0.0.0/0            0.0.0.0/0          udp dpt:1900 
    0     0 DROP       all  --  *      *      
0.0.0.0/0            255.255.255.255
    0     0 DROP       all  --  *      *      
0.0.0.0/0            224.0.0.0/4        
    0     0 reject     tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          tcp dpt:113
    0     0 DROP       udp  --  *      *      
0.0.0.0/0            0.0.0.0/0          udp spt:53
state NEW 
    0     0 DROP       all  --  *      *      
0.0.0.0/0            129.142.127.255
    0     0 DROP       all  --  *      *      
0.0.0.0/0            192.168.1.255      
    0     0 DROP       all  --  *      *      
0.0.0.0/0            192.168.10.255

Chain dmz2fw (1 references)
 pkts bytes target     prot opt in     out     source 
             destination         
    0     0 ACCEPT     all  --  *      *      
0.0.0.0/0            0.0.0.0/0          state
RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW tcp
flags:!0x16/0x02 
    0     0 ACCEPT     icmp --  *      *      
0.0.0.0/0            0.0.0.0/0          icmp type 8
    0     0 all2all    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          

Chain dmz2loc (1 references)
 pkts bytes target     prot opt in     out     source 
             destination
    0     0 ACCEPT     all  --  *      *      
0.0.0.0/0            0.0.0.0/0          state
RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW tcp
flags:!0x16/0x02
    0     0 ACCEPT     icmp --  *      *      
0.0.0.0/0            0.0.0.0/0          icmp type 8
    0     0 all2all    all  --  *      *      
0.0.0.0/0            0.0.0.0/0

Chain dmz2net (1 references)
 pkts bytes target     prot opt in     out     source 
             destination         
    0     0 ACCEPT     all  --  *      *      
0.0.0.0/0            0.0.0.0/0          state
RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW tcp
flags:!0x16/0x02 
    0     0 ACCEPT     tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW tcp
dpt:53
    0     0 ACCEPT     udp  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW udp
dpt:53 
    0     0 ACCEPT     icmp --  *      *      
0.0.0.0/0            0.0.0.0/0          icmp type 8
    0     0 ACCEPT     all  --  *      *      
0.0.0.0/0            0.0.0.0/0          

Chain dynamic (6 references)
 pkts bytes target     prot opt in     out     source 
             destination

Chain eth0_fwd (1 references)
 pkts bytes target     prot opt in     out     source 
             destination         
    0     0 dynamic    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW
    0     0 rfc1918    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW 
 1671  862K net2loc    all  --  *      eth1   
0.0.0.0/0            0.0.0.0/0
    0     0 net2dmz    all  --  *      eth2   
0.0.0.0/0            0.0.0.0/0          

Chain eth0_in (1 references)
 pkts bytes target     prot opt in     out     source 
             destination
  159 22494 dynamic    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW
    0     0 ACCEPT     udp  --  *      *      
0.0.0.0/0            0.0.0.0/0          udp dpts:67:68
  159 22494 rfc1918    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW
  158 22416 net2fw     all  --  *      *      
0.0.0.0/0            0.0.0.0/0          

Chain eth1_fwd (1 references)
 pkts bytes target     prot opt in     out     source 
             destination
  371 23842 dynamic    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW 
 1942  322K loc2net    all  --  *      eth0   
0.0.0.0/0            0.0.0.0/0
    0     0 loc2dmz    all  --  *      eth2   
0.0.0.0/0            0.0.0.0/0          

Chain eth1_in (1 references)
 pkts bytes target     prot opt in     out     source 
             destination
   12   720 dynamic    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW 
  139 11414 loc2fw     all  --  *      *      
0.0.0.0/0            0.0.0.0/0

Chain eth2_fwd (1 references)
 pkts bytes target     prot opt in     out     source 
             destination         
    0     0 dynamic    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW
    0     0 dmz2net    all  --  *      eth0   
0.0.0.0/0            0.0.0.0/0          
    0     0 dmz2loc    all  --  *      eth1   
0.0.0.0/0            0.0.0.0/0

Chain eth2_in (1 references)
 pkts bytes target     prot opt in     out     source 
             destination         
    0     0 dynamic    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW
    0     0 dmz2fw     all  --  *      *      
0.0.0.0/0            0.0.0.0/0          

Chain fw2dmz (1 references)
 pkts bytes target     prot opt in     out     source 
             destination
    0     0 ACCEPT     all  --  *      *      
0.0.0.0/0            0.0.0.0/0          state
RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW tcp
flags:!0x16/0x02
    0     0 ACCEPT     icmp --  *      *      
0.0.0.0/0            0.0.0.0/0          icmp type 8 
    0     0 all2all    all  --  *      *      
0.0.0.0/0            0.0.0.0/0

Chain fw2loc (1 references)
 pkts bytes target     prot opt in     out     source 
             destination         
  129 18328 ACCEPT     all  --  *      *      
0.0.0.0/0            0.0.0.0/0          state
RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW tcp
flags:!0x16/0x02 
    0     0 ACCEPT     icmp --  *      *      
0.0.0.0/0            0.0.0.0/0          icmp type 8
    0     0 all2all    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          

Chain fw2net (1 references)
 pkts bytes target     prot opt in     out     source 
             destination
  146  9944 ACCEPT     all  --  *      *      
0.0.0.0/0            0.0.0.0/0          state
RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW tcp
flags:!0x16/0x02
    0     0 ACCEPT     tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW tcp
dpt:53 
    0     0 ACCEPT     udp  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW udp
dpt:53
    0     0 all2all    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          

Chain icmpdef (1 references)
 pkts bytes target     prot opt in     out     source 
             destination

Chain loc2dmz (1 references)
 pkts bytes target     prot opt in     out     source 
             destination         
    0     0 ACCEPT     all  --  *      *      
0.0.0.0/0            0.0.0.0/0          state
RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW tcp
flags:!0x16/0x02 
    0     0 ACCEPT     tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW tcp
dpt:22
    0     0 ACCEPT     icmp --  *      *      
0.0.0.0/0            0.0.0.0/0          icmp type 8 
    0     0 all2all    all  --  *      *      
0.0.0.0/0            0.0.0.0/0

Chain loc2fw (1 references)
 pkts bytes target     prot opt in     out     source 
             destination         
  127 10694 ACCEPT     all  --  *      *      
0.0.0.0/0            0.0.0.0/0          state
RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW tcp
flags:!0x16/0x02 
    0     0 ACCEPT     tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW tcp
dpt:22
    0     0 ACCEPT     udp  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW udp
dpt:53 
   12   720 ACCEPT     tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW tcp
dpt:80
    0     0 ACCEPT     icmp --  *      *      
0.0.0.0/0            0.0.0.0/0          icmp type 8 
    0     0 all2all    all  --  *      *      
0.0.0.0/0            0.0.0.0/0

Chain loc2net (1 references)
 pkts bytes target     prot opt in     out     source 
             destination         
 1571  298K ACCEPT     all  --  *      *      
0.0.0.0/0            0.0.0.0/0          state
RELATED,ESTABLISHED
    0     0 newnotsyn  tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW tcp
flags:!0x16/0x02 
  371 23842 ACCEPT     all  --  *      *      
0.0.0.0/0            0.0.0.0/0

Chain logdrop (60 references)
 pkts bytes target     prot opt in     out     source 
             destination         
    1    78 LOG        all  --  *      *      
0.0.0.0/0            0.0.0.0/0          LOG flags 0
level 6 prefix `Shorewall:logdrop:DROP:'
    1    78 DROP       all  --  *      *      
0.0.0.0/0            0.0.0.0/0          

Chain net2all (3 references)
 pkts bytes target     prot opt in     out     source 
             destination
    0     0 ACCEPT     all  --  *      *      
0.0.0.0/0            0.0.0.0/0          state
RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW tcp
flags:!0x16/0x02
  120  6300 common     all  --  *      *      
0.0.0.0/0            0.0.0.0/0          
    3   144 LOG        all  --  *      *      
0.0.0.0/0            0.0.0.0/0          LOG flags 0
level 6 prefix `Shorewall:net2all:DROP:'
    3   144 DROP       all  --  *      *      
0.0.0.0/0            0.0.0.0/0          

Chain net2dmz (1 references)
 pkts bytes target     prot opt in     out     source 
             destination
    0     0 ACCEPT     all  --  *      *      
0.0.0.0/0            0.0.0.0/0          state
RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW tcp
flags:!0x16/0x02
    0     0 ACCEPT     icmp --  *      *      
0.0.0.0/0            0.0.0.0/0          icmp type 8 
    0     0 net2all    all  --  *      *      
0.0.0.0/0            0.0.0.0/0

Chain net2fw (1 references)
 pkts bytes target     prot opt in     out     source 
             destination         
    0     0 ACCEPT     all  --  *      *      
0.0.0.0/0            0.0.0.0/0          state
RELATED,ESTABLISHED
    9 12040 newnotsyn  tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW tcp
flags:!0x16/0x02 
   29  4076 ACCEPT     icmp --  *      *      
0.0.0.0/0            0.0.0.0/0          icmp type 8
  120  6300 net2all    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          

Chain net2loc (1 references)
 pkts bytes target     prot opt in     out     source 
             destination
 1671  862K ACCEPT     all  --  *      *      
0.0.0.0/0            0.0.0.0/0          state
RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          state NEW tcp
flags:!0x16/0x02
    0     0 ACCEPT     icmp --  *      *      
0.0.0.0/0            0.0.0.0/0          icmp type 8 
    0     0 net2all    all  --  *      *      
0.0.0.0/0            0.0.0.0/0

Chain newnotsyn (14 references)
 pkts bytes target     prot opt in     out     source 
             destination         
    9 12040 LOG        all  --  *      *      
0.0.0.0/0            0.0.0.0/0          LOG flags 0
level 6 prefix `Shorewall:newnotsyn:DROP:'
    9 12040 DROP       all  --  *      *      
0.0.0.0/0            0.0.0.0/0          

Chain reject (11 references)
 pkts bytes target     prot opt in     out     source 
             destination
   99  4752 REJECT     tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          reject-with
tcp-reset 
   18  1404 REJECT     udp  --  *      *      
0.0.0.0/0            0.0.0.0/0          reject-with
icmp-port-unreachable
    0     0 REJECT     icmp --  *      *      
0.0.0.0/0            0.0.0.0/0          reject-with
icmp-host-unreachable 
    0     0 REJECT     all  --  *      *      
0.0.0.0/0            0.0.0.0/0          reject-with
icmp-host-prohibited

Chain rfc1918 (2 references)
 pkts bytes target     prot opt in     out     source 
             destination         
    0     0 RETURN     all  --  *      *      
255.255.255.255      0.0.0.0/0
    0     0 RETURN     all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
255.255.255.255 
    0     0 DROP       all  --  *      *      
169.254.0.0/16       0.0.0.0/0
    0     0 DROP       all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
169.254.0.0/16 
    0     0 logdrop    all  --  *      *      
172.16.0.0/12        0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
172.16.0.0/12 
    0     0 logdrop    all  --  *      *      
192.0.2.0/24         0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
192.0.2.0/24 
    0     0 logdrop    all  --  *      *      
192.168.0.0/16       0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
192.168.0.0/16 
    0     0 logdrop    all  --  *      *      
0.0.0.0/7            0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
0.0.0.0/7 
    0     0 logdrop    all  --  *      *      
2.0.0.0/8            0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
2.0.0.0/8 
    0     0 logdrop    all  --  *      *      
5.0.0.0/8            0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
5.0.0.0/8 
    0     0 logdrop    all  --  *      *      
7.0.0.0/8            0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
7.0.0.0/8 
    0     0 logdrop    all  --  *      *      
10.0.0.0/8           0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
10.0.0.0/8 
    0     0 logdrop    all  --  *      *      
23.0.0.0/8           0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
23.0.0.0/8 
    0     0 logdrop    all  --  *      *      
27.0.0.0/8           0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
27.0.0.0/8 
    0     0 logdrop    all  --  *      *      
31.0.0.0/8           0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
31.0.0.0/8 
    0     0 logdrop    all  --  *      *      
36.0.0.0/7           0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
36.0.0.0/7 
    0     0 logdrop    all  --  *      *      
39.0.0.0/8           0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
39.0.0.0/8 
    0     0 logdrop    all  --  *      *      
41.0.0.0/8           0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
41.0.0.0/8 
    0     0 logdrop    all  --  *      *      
42.0.0.0/8           0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
42.0.0.0/8 
    0     0 logdrop    all  --  *      *      
49.0.0.0/8           0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
49.0.0.0/8 
    0     0 logdrop    all  --  *      *      
50.0.0.0/8           0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
50.0.0.0/8 
    0     0 logdrop    all  --  *      *      
58.0.0.0/7           0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
58.0.0.0/7 
    0     0 logdrop    all  --  *      *      
70.0.0.0/7           0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
70.0.0.0/7 
    0     0 logdrop    all  --  *      *      
72.0.0.0/5           0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
72.0.0.0/5 
    0     0 logdrop    all  --  *      *      
83.0.0.0/8           0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
83.0.0.0/8 
    0     0 logdrop    all  --  *      *      
84.0.0.0/6           0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
84.0.0.0/6 
    0     0 logdrop    all  --  *      *      
88.0.0.0/5           0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
88.0.0.0/5 
    0     0 logdrop    all  --  *      *      
96.0.0.0/3           0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
96.0.0.0/3 
    0     0 logdrop    all  --  *      *      
127.0.0.0/8          0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
127.0.0.0/8 
    0     0 logdrop    all  --  *      *      
197.0.0.0/8          0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
197.0.0.0/8 
    0     0 logdrop    all  --  *      *      
198.18.0.0/15        0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
198.18.0.0/15 
    1    78 logdrop    all  --  *      *      
201.0.0.0/8          0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
201.0.0.0/8 
    0     0 logdrop    all  --  *      *      
223.0.0.0/8          0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
223.0.0.0/8 
    0     0 logdrop    all  --  *      *      
240.0.0.0/4          0.0.0.0/0
    0     0 logdrop    all  --  *      *      
0.0.0.0/0            0.0.0.0/0          ctorigdst
240.0.0.0/4 

Chain shorewall (0 references)
 pkts bytes target     prot opt in     out     source 
             destination

Dec 17 17:52:05 logdrop:DROP:IN=eth0 OUT=
SRC=201.128.9.200 DST=128.142.121.254 LEN=78 TOS=0x00
PREC=0x00 TTL=105 ID=42782 PROTO=UDP SPT=1029 DPT=137
LEN=58
Dec 17 18:06:16 net2all:DROP:IN=eth0 OUT=
SRC=82.45.233.187 DST=128.142.121.254 LEN=48 TOS=0x10
PREC=0x00 TTL=55 ID=55745 DF PROTO=TCP SPT=3914 DPT=21
WINDOW=65535 RES=0x00 SYN URGP=0
Dec 17 18:06:19 net2all:DROP:IN=eth0 OUT=
SRC=82.45.233.187 DST=128.142.121.254 LEN=48 TOS=0x10
PREC=0x00 TTL=55 ID=56060 DF PROTO=TCP SPT=3914 DPT=21
WINDOW=65535 RES=0x00 SYN URGP=0
Dec 17 18:06:25 net2all:DROP:IN=eth0 OUT=
SRC=82.45.233.187 DST=128.142.121.254 LEN=48 TOS=0x10
PREC=0x00 TTL=55 ID=56287 DF PROTO=TCP SPT=3914 DPT=21
WINDOW=65535 RES=0x00 SYN URGP=0
Dec 17 18:58:55 newnotsyn:DROP:IN=eth0 OUT=
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=36372 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 18:59:27 newnotsyn:DROP:IN=eth0 OUT=
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=17973 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 19:00:31 newnotsyn:DROP:IN=eth0 OUT=
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=54704 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 19:01:35 newnotsyn:DROP:IN=eth0 OUT=
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=16799 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 19:02:39 newnotsyn:DROP:IN=eth0 OUT=
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=47958 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 19:03:43 newnotsyn:DROP:IN=eth0 OUT=
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=17367 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 19:04:47 newnotsyn:DROP:IN=eth0 OUT=
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=43276 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 19:05:51 newnotsyn:DROP:IN=eth0 OUT=
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=1164 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 19:06:55 newnotsyn:DROP:IN=eth0 OUT=
SRC=66.163.175.154 DST=128.142.121.254 LEN=40 TOS=0x00
PREC=0x00 TTL=49 ID=34370 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK RST URGP=0

NAT Table

Chain PREROUTING (policy ACCEPT 500 packets, 44785
bytes)
 pkts bytes target     prot opt in     out     source 
             destination

Chain POSTROUTING (policy ACCEPT 100 packets, 4020
bytes)
 pkts bytes target     prot opt in     out     source 
             destination         
  425 24543 eth0_masq  all  --  *      eth0   
0.0.0.0/0            0.0.0.0/0

Chain OUTPUT (policy ACCEPT 1 packets, 60 bytes)
 pkts bytes target     prot opt in     out     source 
             destination         

Chain eth0_masq (1 references)
 pkts bytes target     prot opt in     out     source 
             destination
  326 20583 MASQUERADE  all  --  *      *      
192.168.1.0/24       0.0.0.0/0          
    0     0 MASQUERADE  all  --  *      *      
192.168.10.0/24      0.0.0.0/0

Mangle Table

Chain PREROUTING (policy ACCEPT 3916 packets, 1219K
bytes)
 pkts bytes target     prot opt in     out     source 
             destination         
 3911 1218K pretos     all  --  *      *      
0.0.0.0/0            0.0.0.0/0

Chain INPUT (policy ACCEPT 300 packets, 34008 bytes)
 pkts bytes target     prot opt in     out     source 
             destination         

Chain FORWARD (policy ACCEPT 3613 packets, 1184K
bytes)
 pkts bytes target     prot opt in     out     source 
             destination         

Chain OUTPUT (policy ACCEPT 277 packets, 28372 bytes)
 pkts bytes target     prot opt in     out     source 
             destination
  275 28272 outtos     all  --  *      *      
0.0.0.0/0            0.0.0.0/0          

Chain POSTROUTING (policy ACCEPT 3890 packets, 1212K
bytes)
 pkts bytes target     prot opt in     out     source 
             destination

Chain outtos (1 references)
 pkts bytes target     prot opt in     out     source 
             destination         
    0     0 TOS        tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          tcp dpt:22 TOS
set 0x10
    0     0 TOS        tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          tcp spt:22 TOS
set 0x10 
    0     0 TOS        tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          tcp dpt:21 TOS
set 0x10
    0     0 TOS        tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          tcp spt:21 TOS
set 0x10 
    0     0 TOS        tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          tcp spt:20 TOS
set 0x08
    0     0 TOS        tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          tcp dpt:20 TOS
set 0x08 

Chain pretos (1 references)
 pkts bytes target     prot opt in     out     source 
             destination
    0     0 TOS        tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          tcp dpt:22 TOS
set 0x10 
    0     0 TOS        tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          tcp spt:22 TOS
set 0x10
    3   144 TOS        tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          tcp dpt:21 TOS
set 0x10 
    0     0 TOS        tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          tcp spt:21 TOS
set 0x10
    0     0 TOS        tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          tcp spt:20 TOS
set 0x08 
    0     0 TOS        tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0          tcp dpt:20 TOS
set 0x08







Chain PREROUTING (policy ACCEPT 501 packets, 44863
bytes)
 pkts bytes target     prot opt in     out     source 
             destination

Chain POSTROUTING (policy ACCEPT 100 packets, 4020
bytes)
 pkts bytes target     prot opt in     out     source 
             destination
  425 24543 eth0_masq  all  --  *      eth0   
0.0.0.0/0            0.0.0.0/0

Chain OUTPUT (policy ACCEPT 1 packets, 60 bytes)
 pkts bytes target     prot opt in     out     source 
             destination

Chain eth0_masq (1 references)
 pkts bytes target     prot opt in     out     source 
             destination
  326 20583 MASQUERADE  all  --  *      *      
192.168.1.0/24       0.0.0.0/0
    0     0 MASQUERADE  all  --  *      *      
192.168.10.0/24      0.0.0.0/0












Dec 17 17:33:18 firewall syslogd 1.3-3#31.slink1:
restart.
Dec 17 17:33:18 firewall kernel: klogd
1.3-3#31.slink1, log source = /proc/kmsg started.
Dec 17 17:33:18 firewall kernel: No module symbols
loaded.
Dec 17 17:33:18 firewall kernel: BIOS-provided
physical RAM map:
Dec 17 17:33:18 firewall kernel: 32MB LOWMEM
available.
Dec 17 17:33:18 firewall kernel: Initializing CPU#0
Dec 17 17:33:18 firewall kernel: Memory: 30128k/32768k
available (948k kernel code, 2252k reserved, -1176k
data, 64k init, 0k highmem)
Dec 17 17:33:18 firewall kernel: Dentry cache hash
table entries: 4096 (order: 3, 32768 bytes)
Dec 17 17:33:18 firewall kernel: Inode cache hash
table entries: 2048 (order: 2, 16384 bytes)
Dec 17 17:33:18 firewall kernel: Intel Pentium with F0
0F bug - workaround enabled. 
Dec 17 17:33:18 firewall kernel: Checking 'hlt'
instruction... OK. 
Dec 17 17:33:18 firewall kernel: PCI: PCI BIOS
revision 2.10 entry at 0xfd83e, last bus=0
Dec 17 17:33:18 firewall kernel: PCI: Using
configuration type 1 
Dec 17 17:33:18 firewall kernel: PCI: Probing PCI
hardware
Dec 17 17:33:18 firewall kernel: Limiting direct
PCI/PCI transfers. 
Dec 17 17:33:18 firewall kernel: Activating ISA DMA
hang workarounds. 
Dec 17 17:33:18 firewall kernel: Linux NET4.0 for
Linux 2.4
Dec 17 17:33:18 firewall kernel: Based upon Swansea
University Computer Society NET3.039 
Dec 17 17:33:18 firewall kernel: Serial driver version
5.05c (2001-07-08) with MANY_PORTS SHARE_IRQ
DETECT_IRQ SERIAL_PCI enabled 
Dec 17 17:33:18 firewall kernel: ttyS00 at 0x03f8 (irq
= 4) is a 16550A
Dec 17 17:33:18 firewall kernel: ttyS01 at 0x02f8 (irq
= 3) is a 16550A
Dec 17 17:33:18 firewall kernel: Real Time Clock
Driver v1.10e 
Dec 17 17:33:18 firewall kernel: Software Watchdog
Timer: 0.05, timer margin: 60 sec 
Dec 17 17:33:18 firewall kernel: Floppy drive(s): fd0
is 1.44M 
Dec 17 17:33:18 firewall kernel: FDC 0 is a National
Semiconductor PC87306
Dec 17 17:33:18 firewall kernel: NET4: Linux TCP/IP
1.0 for NET4.0 
Dec 17 17:33:18 firewall kernel: IP Protocols: ICMP,
UDP, TCP, IGMP
Dec 17 17:33:18 firewall kernel: IP: routing cache
hash table of 512 buckets, 4Kbytes 
Dec 17 17:33:18 firewall kernel: TCP: Hash tables
configured (established 2048 bind 2048) 
Dec 17 17:33:18 firewall kernel: NET4: Unix domain
sockets 1.0/SMP for Linux NET4.0. 
Dec 17 17:33:18 firewall kernel: RAMDISK: Compressed
image found at block 0
Dec 17 17:33:18 firewall kernel: Freeing initrd
memory: 401k freed
Dec 17 17:33:18 firewall kernel: Freeing unused kernel
memory: 64k freed 
Dec 17 17:33:19 firewall kernel: 8139too Fast Ethernet
driver 0.9.26 
Dec 17 17:33:19 firewall kernel: eth0: RealTek RTL8139
Fast Ethernet at 0xc2813000, 00:0b:2b:02:0d:6d, IRQ 12

Dec 17 17:33:19 firewall kernel: eth1: RealTek RTL8139
Fast Ethernet at 0xc2815100, 00:0b:2b:02:2a:43, IRQ 11
Dec 17 17:33:19 firewall kernel: eth2: RealTek RTL8139
Fast Ethernet at 0xc2817200, 00:0b:2b:02:2a:4d, IRQ 14

Dec 17 17:33:20 firewall kernel: eth0: Setting 100mbps
full-duplex based on auto-negotiated partner ability
41e1. 
Dec 17 17:33:21 firewall kernel: eth0: Setting 100mbps
full-duplex based on auto-negotiated partner ability
41e1.
Dec 17 17:33:21 firewall kernel: eth1: Setting 100mbps
full-duplex based on auto-negotiated partner ability
45e1. 
Dec 17 17:33:21 firewall root: The /etc/shorewall/pump
script is called with arg up eth0 128.142.121.254
Dec 17 17:33:21 firewall kernel: eth2: Setting
half-duplex based on auto-negotiated partner ability
0000. 
Dec 17 17:33:30 firewall root: Shorewall Started
Dec 17 17:52:05 firewall kernel:
Shorewall:logdrop:DROP:IN=eth0 OUT=
MAC=00:0b:2b:02:0d:6d:00:02:3b:02:69:f4:08:00
SRC=201.128.9.200 DST=128.142.121.254 LEN=78 TOS=0x00
PREC=0x00 TTL=105 ID=42782 PROTO=UDP SPT=1029 DPT=137
LEN=58  
Dec 17 18:06:16 firewall kernel:
Shorewall:net2all:DROP:IN=eth0 OUT=
MAC=00:0b:2b:02:0d:6d:00:02:3b:02:69:f4:08:00
SRC=82.45.233.187 DST=128.142.121.254 LEN=48 TOS=0x10
PREC=0x00 TTL=55 ID=55745 DF PROTO=TCP SPT=3914 DPT=21
WINDOW=65535 RES=0x00 SYN URGP=0
Dec 17 18:06:19 firewall kernel:
Shorewall:net2all:DROP:IN=eth0 OUT=
MAC=00:0b:2b:02:0d:6d:00:02:3b:02:69:f4:08:00
SRC=82.45.233.187 DST=128.142.121.254 LEN=48 TOS=0x10
PREC=0x00 TTL=55 ID=56060 DF PROTO=TCP SPT=3914 DPT=21
WINDOW=65535 RES=0x00 SYN URGP=0
Dec 17 18:06:25 firewall kernel:
Shorewall:net2all:DROP:IN=eth0 OUT=
MAC=00:0b:2b:02:0d:6d:00:02:3b:02:69:f4:08:00
SRC=82.45.233.187 DST=128.142.121.254 LEN=48 TOS=0x10
PREC=0x00 TTL=55 ID=56287 DF PROTO=TCP SPT=3914 DPT=21
WINDOW=65535 RES=0x00 SYN URGP=0  
Dec 17 18:58:55 firewall kernel:
Shorewall:newnotsyn:DROP:IN=eth0 OUT=
MAC=00:0b:2b:02:0d:6d:00:02:3b:02:69:f4:08:00
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=36372 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 18:59:27 firewall kernel:
Shorewall:newnotsyn:DROP:IN=eth0 OUT=
MAC=00:0b:2b:02:0d:6d:00:02:3b:02:69:f4:08:00
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=17973 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 19:00:31 firewall kernel:
Shorewall:newnotsyn:DROP:IN=eth0 OUT=
MAC=00:0b:2b:02:0d:6d:00:02:3b:02:69:f4:08:00
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=54704 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 19:01:35 firewall kernel:
Shorewall:newnotsyn:DROP:IN=eth0 OUT=
MAC=00:0b:2b:02:0d:6d:00:02:3b:02:69:f4:08:00
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=16799 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 19:02:39 firewall kernel:
Shorewall:newnotsyn:DROP:IN=eth0 OUT=
MAC=00:0b:2b:02:0d:6d:00:02:3b:02:69:f4:08:00
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=47958 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 19:03:43 firewall kernel:
Shorewall:newnotsyn:DROP:IN=eth0 OUT=
MAC=00:0b:2b:02:0d:6d:00:02:3b:02:69:f4:08:00
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=17367 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 19:04:47 firewall kernel:
Shorewall:newnotsyn:DROP:IN=eth0 OUT=
MAC=00:0b:2b:02:0d:6d:00:02:3b:02:69:f4:08:00
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=43276 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 19:05:51 firewall kernel:
Shorewall:newnotsyn:DROP:IN=eth0 OUT=
MAC=00:0b:2b:02:0d:6d:00:02:3b:02:69:f4:08:00
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=1164 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 19:06:55 firewall kernel:
Shorewall:newnotsyn:DROP:IN=eth0 OUT=
MAC=00:0b:2b:02:0d:6d:00:02:3b:02:69:f4:08:00
SRC=66.163.175.154 DST=128.142.121.254 LEN=40 TOS=0x00
PREC=0x00 TTL=49 ID=34370 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK RST URGP=0








# /etc/network/interfaces -- configuration file for
LEAF network
# J. Nilo, April 2002
#
# Loopback interface.
auto lo
iface lo inet loopback

# Step 1: configure external interface
#         uncomment/adjust one of the following 4
options
# Option 1.1 (default): eth0 / dynamic IP from
pump/dhclient
auto eth0
iface eth0 inet dhcp

# Step 2: configure  internal interface
# Default: eth1 / fixed IP = 192.168.1.254
auto eth1
iface eth1 inet static
        address 192.168.1.254
        masklen 24
        broadcast 192.168.1.255

# Step 3 (optionnal): configure DMZ
# Default: eth2 / fixed IP = 192.168.1.100
auto eth2
iface eth2 inet static
        address 192.168.10.100
        masklen 24
        broadcast 192.168.10.255



Yahoo! Mail (http://dk.mail.yahoo.com) - Gratis: 6 MB lagerplads, spamfilter og 
virusscan


-------------------------------------------------------
This SF.net email is sponsored by: IBM Linux Tutorials.
Become an expert in LINUX or just sharpen your skills.  Sign up for IBM's
Free Linux Tutorials.  Learn everything from the bash shell to sys admin.
Click now! http://ads.osdn.com/?ad_id=1278&alloc_id=3371&op=click
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to