odd... i did it again, and it showed some traffic now.

##############################################
[EMAIL PROTECTED] doctor]$ /sbin/ifconfig
eth0      Link encap:Ethernet  HWaddr 00:02:55:58:5E:C6
         inet addr:192.168.200.1  Bcast:192.168.200.255  Mask:255.255.255.0
         UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
         RX packets:38643181 errors:0 dropped:0 overruns:0 frame:0
         TX packets:38547925 errors:0 dropped:0 overruns:0 carrier:0
         collisions:0 txqueuelen:1000
         RX bytes:991136881 (945.2 Mb)  TX bytes:197020047 (187.8 Mb)
         Interrupt:27 Base address:0x2000

[EMAIL PROTECTED] doctor]$ wget www.doctornet.com.br/matrix.zip
--15:04:21--  http://www.doctornet.com.br/matrix.zip
          => `matrix.zip.2'
Resolving www.doctornet.com.br... done.
Connecting to www.doctornet.com.br[201.3.160.245]:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 199,947,030 [application/zip]

26% [========> ] 52,717,056 58.43K/s ETA 41:00
#########################################


----- Original Message ----- From: "Tom Eastep" <[EMAIL PROTECTED]>
To: "Shorewall Users" <[email protected]>
Sent: Friday, December 29, 2006 3:05 PM
Subject: Re: [Shorewall-users] TC - not marking correctly


Ismael Milach da Silveira wrote:
ok, there it is...

shorewall version  - 3.0.1-1

the hosts involved in the connection:
from: 192.168.200.1
to: 201.3.160.245

I've made some changes but with the same result I've previously reported.

dump is attached.


From the dump:

Mangle Table

...

Chain tcfor (1 references)
pkts bytes target prot opt in out source destination 0 0 MARK all -- * * 192.168.200.1 0.0.0.0/0 MARK set 0x1 <=================== 3 247 MARK all -- * * 192.168.200.10 0.0.0.0/0 MARK set 0x2

Chain tcout (1 references)
pkts bytes target prot opt in out source destination

Chain tcpost (1 references)
pkts bytes target prot opt in out source destination 0 0 CLASSIFY all -- * eth0 0.0.0.0/0 0.0.0.0/0 MARK match 0x1 CLASSIFY set 1:11 3 247 CLASSIFY all -- * eth0 0.0.0.0/0 0.0.0.0/0 MARK match 0x2 CLASSIFY set 1:12

No traffic with source IP address 192.168.200.1 was forwarded by the
firewall during the time covered by this dump as evidenced by the
zeros in the 'pkts' column for the rule for that source address.
So no traffic was sent to the 1:11 TC class (Regrettably, you are
running an old version of Shorewall that does not display traffic
shaping information in the dump).

-Tom
--
Tom Eastep    \ Nothing is foolproof to a sufficiently talented fool
Shoreline,     \ http://shorewall.net
Washington USA  \ [EMAIL PROTECTED]
PGP Public Key   \ https://lists.shorewall.net/teastep.pgp.key

-------------------------------------------------------------------------
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get the chance to share your
opinions on IT & business topics through brief surveys - and earn cash
http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Attachment: status.txt.bz2
Description: Binary data

-------------------------------------------------------------------------
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get the chance to share your
opinions on IT & business topics through brief surveys - and earn cash
http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to