Okay -- then I'm going to have to learn something about your
configuration to make any progress with your issues. The output of
'shorewall dump' as an attachment is best.
See attached.

Shorewall 4.4.13-Beta5 Dump at zieg.sam.home-net - Wed Sep 15 01:03:03 BST 2010

Counters reset Wed Sep 15 01:02:48 BST 2010

Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 net2fw     all  --  eth0   *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ctstate RELATED,ESTABLISHED 
    0     0 Drop       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:INPUT:DROP:' 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 lo_fwd     all  --  lo     *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ctstate RELATED,ESTABLISHED 
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:' 
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain OUTPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 fw2net     all  --  *      eth0    0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     all  --  *      lo      0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ctstate RELATED,ESTABLISHED 
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:OUTPUT:REJECT:' 
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain Drop (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0            all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:113 /* Auth */ 
    0     0 dropBcast  all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 3 code 4 /* Needed ICMP types */ 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 11 /* Needed ICMP types */ 
    0     0 dropInvalid  all  --  *      *       0.0.0.0/0            0.0.0.0/0 
          
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,445 /* SMB */ 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:137:139 /* SMB */ 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:137 dpts:1024:65535 /* SMB */ 
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,139,445 /* SMB */ 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:1900 /* UPnP */ 
    0     0 dropNotSyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0  
         
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:53 /* Late DNS Replies */ 

Chain Reject (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0            all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:113 /* Auth */ 
    0     0 dropBcast  all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 3 code 4 /* Needed ICMP types */ 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 11 /* Needed ICMP types */ 
    0     0 dropInvalid  all  --  *      *       0.0.0.0/0            0.0.0.0/0 
          
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,445 /* SMB */ 
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:137:139 /* SMB */ 
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:137 dpts:1024:65535 /* SMB */ 
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,139,445 /* SMB */ 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:1900 /* UPnP */ 
    0     0 dropNotSyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0  
         
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:53 /* Late DNS Replies */ 

Chain blackout (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        match-set blacklist_chinese_banned dst 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        match-set blacklist_eu_banned dst 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        match-set blacklist_za_banned dst 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        match-set blacklist_misc_banned dst 

Chain dropBcast (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ADDRTYPE match dst-type BROADCAST 
    0     0 DROP       all  --  *      *       0.0.0.0/0            224.0.0.0/4 
        

Chain dropInvalid (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ctstate INVALID 

Chain dropNotSyn (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp flags:!0x17/0x02 

Chain eth0_fwd (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 blackout   all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ctstate INVALID,NEW 
    0     0 smurfs     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ctstate INVALID,NEW 
    0     0 tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain fw2net (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ctstate RELATED,ESTABLISHED 
    0     0 reject     all  --  *      *       0.0.0.0/0            
212.219.56.128/26   
    0     0 reject     all  --  *      *       0.0.0.0/0            
130.59.0.0/16       
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        match-set blacklist_chinese_banned dst 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        match-set blacklist_eu_banned dst 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        match-set blacklist_za_banned dst 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        match-set blacklist_misc_banned dst 
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain lo_fwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain logflags (5 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 4 level 6 prefix `Shorewall:logflags:DROP:' 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain net2fw (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 smurfs     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ctstate INVALID,NEW 
    0     0 tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ctstate RELATED,ESTABLISHED 
    0     0 Drop       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:net2fw:DROP:' 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain reject (10 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ADDRTYPE match src-type BROADCAST 
    0     0 DROP       all  --  *      *       224.0.0.0/4          0.0.0.0/0   
        
    0     0 DROP       2    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 REJECT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with tcp-reset 
    0     0 REJECT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with icmp-port-unreachable 
    0     0 REJECT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with icmp-host-unreachable 
    0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with icmp-host-prohibited 

Chain shorewall (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain smurflog (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:' 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain smurfs (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 RETURN     all  --  *      *       0.0.0.0              0.0.0.0/0   
        
    0     0 smurflog   all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] ADDRTYPE match src-type BROADCAST 
    0     0 smurflog   all  --  *      *       224.0.0.0/4          0.0.0.0/0   
        [goto] 

Chain tcpflags (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] tcp flags:0x3F/0x29 
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] tcp flags:0x3F/0x00 
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] tcp flags:0x06/0x06 
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] tcp flags:0x03/0x03 
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] tcp spt:0 flags:0x17/0x02 

Log (/var/log/messages)


NAT Table

Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Mangle Table

Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 tcpre      all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 tcin       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 MARK       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        MARK and 0xffffff00 
    0     0 tcfor      all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 tcout      all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 tcpost     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain tcfor (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain tcin (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 SECMARK    tcp  --  *      *       212.12.176.12        0.0.0.0/0   
        ctstate NEW tcp spt:22 SECMARK selctx 
system_u:object_r:sshd_packet_t:s0 
    0     0 CONNSECMARK  all  --  *      *       0.0.0.0/0            0.0.0.0/0 
          ctstate NEW CONNSECMARK save 
    0     0 CONNSECMARK  all  --  *      *       0.0.0.0/0            0.0.0.0/0 
          ctstate RELATED,ESTABLISHED CONNSECMARK restore 

Chain tcout (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 SECMARK    tcp  --  *      *       0.0.0.0/0            
212.12.176.12       ctstate NEW tcp dpt:22 owner UID match 0 /* test on ec2:ssh 
*/ SECMARK selctx system_u:object_r:sshd_packet_t:s0 
    0     0 CONNSECMARK  all  --  *      *       0.0.0.0/0            0.0.0.0/0 
          ctstate NEW CONNSECMARK save 
    0     0 CONNSECMARK  all  --  *      *       0.0.0.0/0            0.0.0.0/0 
          ctstate RELATED,ESTABLISHED CONNSECMARK restore 

Chain tcpost (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain tcpre (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Raw Table

Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Conntrack Table (4 out of 65536)

ipv4     2 tcp      6 22 TIME_WAIT src=127.0.0.1 dst=127.0.0.1 sport=38783 
dport=7634 packets=4 bytes=216 src=127.0.0.1 dst=127.0.0.1 sport=7634 
dport=38783 packets=4 bytes=247 [ASSURED] mark=0 secmark=0 zone=0 use=2
ipv4     2 tcp      6 84 TIME_WAIT src=127.0.0.1 dst=127.0.0.1 sport=38784 
dport=7634 packets=4 bytes=216 src=127.0.0.1 dst=127.0.0.1 sport=7634 
dport=38784 packets=4 bytes=247 [ASSURED] mark=0 secmark=0 zone=0 use=2

IP Configuration

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN 
    inet 127.0.0.1/8 scope host lo
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state 
UNKNOWN qlen 1000
    inet 10.1.2.7/24 brd 10.1.2.255 scope global eth0

IP Stats

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN 
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    RX: bytes  packets  errors  dropped overrun mcast   
    38926      672      0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    38926      672      0       0       0       0      
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state 
UNKNOWN qlen 1000
    link/ether 00:19:66:fb:79:2a brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    170859     609      0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    80115      637      0       0       0       0      
3: ifb0: <BROADCAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UNKNOWN 
qlen 32
    link/ether 52:2e:54:da:ec:16 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    70         1        0       1       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    0          0        0       0       0       0      

/proc

   /proc/version = Linux version 2.6.34.6-54.zieg.sam.home-net.fc13.x86_64 
([email protected]) (gcc version 4.4.4 20100630 (Red Hat 4.4.4-10) (GCC) ) 
#1 SMP Wed Sep 1 22:13:10 BST 2010
   /proc/sys/net/ipv4/ip_forward = 1
   /proc/sys/net/ipv4/icmp_echo_ignore_all = 0
   /proc/sys/net/ipv4/conf/all/proxy_arp = 0
   /proc/sys/net/ipv4/conf/all/arp_filter = 0
   /proc/sys/net/ipv4/conf/all/arp_ignore = 0
   /proc/sys/net/ipv4/conf/all/rp_filter = 1
   /proc/sys/net/ipv4/conf/all/log_martians = 0
   /proc/sys/net/ipv4/conf/default/proxy_arp = 0
   /proc/sys/net/ipv4/conf/default/arp_filter = 0
   /proc/sys/net/ipv4/conf/default/arp_ignore = 0
   /proc/sys/net/ipv4/conf/default/rp_filter = 1
   /proc/sys/net/ipv4/conf/default/log_martians = 1
   /proc/sys/net/ipv4/conf/eth0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/eth0/arp_filter = 0
   /proc/sys/net/ipv4/conf/eth0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/eth0/rp_filter = 1
   /proc/sys/net/ipv4/conf/eth0/log_martians = 1
   /proc/sys/net/ipv4/conf/ifb0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/ifb0/arp_filter = 0
   /proc/sys/net/ipv4/conf/ifb0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/ifb0/rp_filter = 1
   /proc/sys/net/ipv4/conf/ifb0/log_martians = 1
   /proc/sys/net/ipv4/conf/lo/proxy_arp = 0
   /proc/sys/net/ipv4/conf/lo/arp_filter = 0
   /proc/sys/net/ipv4/conf/lo/arp_ignore = 0
   /proc/sys/net/ipv4/conf/lo/rp_filter = 1
   /proc/sys/net/ipv4/conf/lo/log_martians = 1

Routing Rules

0:      from all lookup local 
32766:  from all lookup main 
32767:  from all lookup default 

Table default:


Table local:

broadcast 127.255.255.255 dev lo  proto kernel  scope link  src 127.0.0.1 
broadcast 10.1.2.255 dev eth0  proto kernel  scope link  src 10.1.2.7 
broadcast 10.1.2.0 dev eth0  proto kernel  scope link  src 10.1.2.7 
local 10.1.2.7 dev eth0  proto kernel  scope host  src 10.1.2.7 
broadcast 127.0.0.0 dev lo  proto kernel  scope link  src 127.0.0.1 
local 127.0.0.1 dev lo  proto kernel  scope host  src 127.0.0.1 
local 127.0.0.0/8 dev lo  proto kernel  scope host  src 127.0.0.1 

Table main:

10.1.2.0/24 dev eth0  proto kernel  scope link  src 10.1.2.7 
169.254.0.0/16 dev eth0  scope link  metric 1002 
default via 10.1.2.1 dev eth0 

ARP

? (10.1.2.1) at 00:02:b3:ef:5b:51 [ether] on eth0
? (10.1.2.4) at 00:08:9b:ad:08:47 [ether] on eth0

Modules

ip_set                 13414  18 
ipt_set,ipt_SET,ip_set_nethash,ip_set_iptreemap,ip_set_iptree,ip_set_ipporthash,ip_set_portmap,ip_set_macipmap,ip_set_ipmap,ip_set_iphash
ip_set_iphash           5196  0 
ip_set_ipmap            3357  0 
ip_set_ipporthash       5968  0 
ip_set_iptree           4878  0 
ip_set_iptreemap        7336  4 
ip_set_macipmap         3452  0 
ip_set_nethash          5931  0 
ip_set_portmap          3402  0 
iptable_mangle          1679  1 
iptable_nat             4890  0 
iptable_raw             1470  0 
ipt_addrtype            1951  3 
ipt_ah                  1221  0 
ipt_CLUSTERIP           6361  0 
ipt_ecn                 1417  0 
ipt_ECN                 1817  0 
ipt_LOG                 5387  6 
ipt_MASQUERADE          2296  0 
ipt_NETMAP              1742  0 
ipt_REDIRECT            1718  0 
ipt_set                 1471  12 
ipt_SET                 1615  0 
ipt_ULOG               10284  0 
nf_conntrack_amanda     2836  1 nf_nat_amanda
nf_conntrack_ftp       11389  1 nf_nat_ftp
nf_conntrack_h323      61246  1 nf_nat_h323
nf_conntrack_ipv6      17856  0 
nf_conntrack_irc        5166  1 nf_nat_irc
nf_conntrack_netbios_ns     1558  0 
nf_conntrack_netlink    15768  0 
nf_conntrack_pptp      10473  1 nf_nat_pptp
nf_conntrack_proto_gre     6212  1 nf_conntrack_pptp
nf_conntrack_proto_sctp    10499  0 
nf_conntrack_sane       5442  0 
nf_conntrack_sip       20531  1 nf_nat_sip
nf_conntrack_tftp       4633  1 nf_nat_tftp
nf_nat                 19999  12 
ipt_REDIRECT,ipt_NETMAP,ipt_MASQUERADE,nf_nat_tftp,nf_nat_sip,nf_nat_pptp,nf_nat_proto_gre,nf_nat_irc,nf_nat_h323,nf_nat_ftp,nf_nat_amanda,iptable_nat
nf_nat_amanda           1171  0 
nf_nat_ftp              2160  0 
nf_nat_h323             8068  0 
nf_nat_irc              1777  0 
nf_nat_pptp             4275  0 
nf_nat_proto_gre        2632  1 nf_nat_pptp
nf_nat_sip              5631  0 
nf_nat_snmp_basic       7807  0 
nf_nat_tftp              993  0 
nf_tproxy_core          2251  1 xt_TPROXY,[permanent]
xt_CLASSIFY             1059  0 
xt_comment              1040  19 
xt_connlimit            3108  0 
xt_connmark             1305  0 
xt_CONNMARK             1449  0 
xt_CONNSECMARK          1749  4 
xt_dccp                 2061  0 
xt_dscp                 1789  0 
xt_DSCP                 2189  0 
xt_hashlimit            9141  0 
xt_helper               1391  0 
xt_IPMARK               1401  0 
xt_ipp2p                6863  0 
xt_iprange              2167  0 
xt_length               1312  0 
xt_limit                2076  0 
xt_mac                  1108  0 
xt_mark                 1047  0 
xt_MARK                 1047  1 
xt_multiport            2514  4 
xt_NFLOG                1169  0 
xt_NFQUEUE              2307  0 
xt_owner                1194  1 
xt_physdev              1699  0 
xt_pkttype              1120  0 
xt_policy               2334  0 
xt_realm                1050  0 
xt_recent               8114  0 
xt_SECMARK              1926  2 
xt_tcpmss               1533  0 
xt_time                 1981  0 
xt_TPROXY               2158  0 

Shorewall has detected the following iptables/netfilter capabilities:
   NAT: Available
   Packet Mangling: Available
   Multi-port Match: Available
   Extended Multi-port Match: Available
   Connection Tracking Match: Available
   Extended Connection Tracking Match Support: Available
   Packet Type Match: Available
   Policy Match: Available
   Physdev Match: Available
   Physdev-is-bridged Support: Available
   Packet length Match: Available
   IP range Match: Available
   Recent Match: Available
   Owner Match: Available
   Ipset Match: Available
   CONNMARK Target: Available
   Extended CONNMARK Target: Available
   Connmark Match: Available
   Extended Connmark Match: Available
   Raw Table: Available
   IPP2P Match: Not available
   CLASSIFY Target: Available
   Extended REJECT: Available
   Repeat match: Available
   MARK Target: Available
   Extended MARK Target: Available
   Extended MARK Target 2: Available
   Mangle FORWARD Chain: Available
   Comments: Available
   Address Type Match: Available
   TCPMSS Match: Available
   Hashlimit Match: Available
   NFQUEUE Target: Available
   Realm Match: Available
   Helper Match: Available
   Connlimit Match: Available
   Time Match: Available
   Goto Support: Available
   LOGMARK Target: Not available
   IPMARK Target: Not available
   LOG Target: Available
   Persistent SNAT: Available
   TPROXY Target: Available
   FLOW Classifier: Available
   fwmark route mask: Available
   Mark in any table: Available

Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address               Foreign Address             
State       PID/Program name   
tcp        0      0 127.0.0.1:7634              0.0.0.0:*                   
LISTEN      1955/hddtemp        
tcp        0      0 10.1.2.7:45621          10.1.2.4:445            ESTABLISHED 
2442/gvfsd-smb      
tcp        0      0 127.0.0.1:7634              127.0.0.1:38784             
TIME_WAIT   -                   

Traffic Control

Device eth0:
qdisc pfifo_fast 0: root refcnt 2 bands 3 priomap  1 2 2 2 1 2 0 0 1 1 1 1 1 1 
1 1
 Sent 80115 bytes 637 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 


Device ifb0:
qdisc pfifo_fast 0: root refcnt 2 bands 3 priomap  1 2 2 2 1 2 0 0 1 1 1 1 1 1 
1 1
 Sent 70 bytes 1 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 



TC Filters

Device eth0:

Device ifb0:

------------------------------------------------------------------------------
Start uncovering the many advantages of virtual appliances
and start using them to simplify application deployment and
accelerate your shift to cloud computing.
http://p.sf.net/sfu/novell-sfdev2dev
_______________________________________________
Shorewall-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-devel

Reply via email to