Hey Derek,

sorry for the long delay. I was at school and had no access to our
packetfence Server.

Please delete the other case i opened by accident since i forgot to delete
the WG from the other Subject.



Here is the output of iptables -nvL


Chain INPUT (policy DROP 120 packets, 8040 bytes)
 pkts bytes target     prot opt in     out     source destination
 5393 1806K ACCEPT     all  --  lo     *       0.0.0.0/0 0.0.0.0/0
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0 0.0.0.0/0  state
RELATED,ESTABLISHED
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0 0.0.0.0/0
icmptype 8
    0     0 input-internal-vlan-if  all  --  eth0.555 *       0.0.0.0/0  
  10.55.55.2
    0     0 input-internal-vlan-if  all  --  eth0.555 *       0.0.0.0/0  
  255.255.255.255
    0     0 input-internal-vlan-if  all  --  eth0.777 *       0.0.0.0/0  
  10.77.77.2
    0     0 input-internal-vlan-if  all  --  eth0.777 *       0.0.0.0/0  
  255.255.255.255
   30  2010 input-management-if  all  --  eth0.666 *       0.0.0.0/0
0.0.0.0/0

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source destination

Chain OUTPUT (policy ACCEPT 5513 packets, 1815K bytes)
 pkts bytes target     prot opt in     out     source destination

Chain forward-internal-inline-if (0 references)
 pkts bytes target     prot opt in     out     source destination

Chain forward-internal-vlan-if (0 references)
 pkts bytes target     prot opt in     out     source destination

Chain input-highavailability-if (0 references)
 pkts bytes target     prot opt in     out     source destination
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0  state
NEW tcp dpt:22
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 0.0.0.0/0    udp
dpt:5405
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 0.0.0.0/0    udp
dpt:5407
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:7788

Chain input-internal-inline-if (0 references)
 pkts bytes target     prot opt in     out     source destination
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 0.0.0.0/0    udp
dpt:67
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:67
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:53 mark match 0x3
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 0.0.0.0/0    udp
dpt:53 mark match 0x3
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:53 mark match 0x2
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 0.0.0.0/0    udp
dpt:53 mark match 0x2
    0     0 DROP       tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:53 mark match 0x1
    0     0 DROP       udp  --  *      *       0.0.0.0/0 0.0.0.0/0    udp
dpt:53 mark match 0x1
    0     0 DROP       tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:80 mark match 0x1
    0     0 DROP       tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:443 mark match 0x1
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:80
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:443

Chain input-internal-vlan-if (4 references)
 pkts bytes target     prot opt in     out     source destination
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 0.0.0.0/0    udp
dpt:53
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 0.0.0.0/0    udp
dpt:67
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:67
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:80
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:443

Chain input-management-if (1 references)
 pkts bytes target     prot opt in     out     source destination
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0  state
NEW tcp dpt:22
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:1443
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:9090
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:1812
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 0.0.0.0/0    udp
dpt:1812
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:1813
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 0.0.0.0/0    udp
dpt:1813
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 0.0.0.0/0    udp
dpt:162
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0 0.0.0.0/0    udp
dpt:67
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:67
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:9392
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:8834
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0    tcp
dpt:443


Kind regards,

Patrick Schadewitz

Aprentice Qualified IT-Specialist for Systemintegration
Vocational Training.

---------------------------------------------------------
Sennheiser electronic GmbH & Co. KG
Am Labor 1
30900 Wedemark

(Phone
*email

:
:
:
+49 5130 600 0
[email protected]
www.sennheiser.com
________________________________________________________________________________________

Sennheiser electronic GmbH & Co. KG · Sitz 30900 Wedemark, Amtsgericht Hannover 
HRA 120100
phG: Sennheiser Beteiligungs-GmbH · Sitz 30900 Wedemark, Amtsgericht Hannover 
HRB 120179
Geschäftsführende Gesellschafter Dr. sc. techn. Andreas Sennheiser, Daniel 
Sennheiser · Vorsitzender des Aufsichtsrates Prof. Dr. sc. techn. Jörg 
Sennheiser

Diese E-Mail enthält vertrauliche oder rechtlich geschützte Informationen. Wenn 
Sie nicht der beabsichtigte Empfänger sind, informieren Sie bitte sofort den 
Absender
und löschen Sie diese E-Mail. Das unbefugte Kopieren dieser E-Mail oder die 
unbefugte Weitergabe der enthaltenen Informationen ist nicht gestattet.

The information contained in this message is confidential or protected by law. 
If you are not the intended recipient, please contact the sender
and delete this message. Any unauthorized copying of this message or 
unauthorized distribution of the information contained herein is prohibited.

________________________________________________________________________________________
------------------------------------------------------------------------------
October Webinars: Code for Performance
Free Intel webinars can help you accelerate application performance.
Explore tips for MPI, OpenMP, advanced profiling, and more. Get the most from 
the latest Intel processors and coprocessors. See abstracts and register >
http://pubads.g.doubleclick.net/gampad/clk?id=60134071&iu=/4140/ostg.clktrk
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to