Hi guys,

I have a very simple setup

ADSL Mode (bridge mode) -- eth0-shorewall masq-eth1 -- internal lan
Using PPPOE on a leaf bering-uclibc machine

All seems to work I can surf the web from my machines on the lan no issues
at all, but I can't get my simple DNAT rule to work.
I just want to pass port 80 into my local machine on 10.0.10.40 (this was
working perfectly on my old setup, but I lost the config (dead floppy disk),
and of course stupid me no backup, it was a shorewall 2.x machine, bout time
I upgraded either way). 

So I setup a new machine, new shorewall 3.4.5 version and can't get a simple
DNAT to work. 
I don't get denies in shorewall.log and shorewall show nat shows the
counters on that rule incrementing, I did the read the FAQ about gateway on
machine etc, but it all worked perfectly on the old setup. The only thing
that has changed is the new shorewall box.

Notes:
My ISP does NOT block incoming ports.
My internal machine on 10.0.10.40 can ping 10.0.10.1 (eth1) I cleared the
arp table, rebooted the machine, and can surf the web fine from 10.0.10.40
External IP is 202.10.93.183 via pppoe.

I'm sure I've missed something very simple...

shorewall dump attached

Cheers
Ad
Shorewall 3.4.5 Dump at firewall - Fri Jul 20 10:56:18 UTC 2007

Counters reset Fri Jul 20 10:51:58 UTC 2007

Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0
  108 50917 ppp0_in    all  --  ppp0   *       0.0.0.0/0            0.0.0.0/0
  559 40928 eth1_in    all  --  eth1   *       0.0.0.0/0            0.0.0.0/0
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 ULOG       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ULOG copy_range 0 nlgroup 1 prefix `Shorewall:INPUT:REJECT:' 
queue_threshold 1
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination
   56  2864 TCPMSS     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp flags:0x06/0x02 TCPMSS clamp to PMTU
  675  493K ppp0_fwd   all  --  ppp0   *       0.0.0.0/0            0.0.0.0/0
  573 71540 eth1_fwd   all  --  eth1   *       0.0.0.0/0            0.0.0.0/0
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 ULOG       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ULOG copy_range 0 nlgroup 1 prefix `Shorewall:FORWARD:REJECT:' 
queue_threshold 1
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain OUTPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     all  --  *      lo      0.0.0.0/0            0.0.0.0/0
    8   506 ppp0_out   all  --  *      ppp0    0.0.0.0/0            0.0.0.0/0
  385 87856 eth1_out   all  --  *      eth1    0.0.0.0/0            0.0.0.0/0
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain Drop (3 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:113
  100 50411 dropBcast  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 3 code 4
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 11
  100 50411 dropInvalid  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,445
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:137:139
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:137 dpts:1024:65535
    1    48 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,139,445
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:1900
    8   404 dropNotSyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:53

Chain Reject (3 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:113
    0     0 dropBcast  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 3 code 4
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 11
    0     0 dropInvalid  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,445
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:137:139
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:137 dpts:1024:65535
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,139,445
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:1900
    0     0 dropNotSyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:53

Chain all2all (0 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 ULOG       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ULOG copy_range 0 nlgroup 1 prefix `Shorewall:all2all:REJECT:' 
queue_threshold 1
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain dropBcast (2 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        PKTTYPE = broadcast
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        PKTTYPE = multicast

Chain dropInvalid (2 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID

Chain dropNotSyn (2 references)
 pkts bytes target     prot opt in     out     source               destination
    8   404 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp flags:!0x17/0x02

Chain dynamic (4 references)
 pkts bytes target     prot opt in     out     source               destination

Chain eth1_fwd (1 references)
 pkts bytes target     prot opt in     out     source               destination
   51  3266 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW
  573 71540 loc2net    all  --  *      ppp0    0.0.0.0/0            0.0.0.0/0

Chain eth1_in (1 references)
 pkts bytes target     prot opt in     out     source               destination
  197 15656 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW
  559 40928 loc2fw     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain eth1_out (1 references)
 pkts bytes target     prot opt in     out     source               destination
  385 87856 fw2loc     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain fw2all (0 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain fw2loc (1 references)
 pkts bytes target     prot opt in     out     source               destination
  383 87688 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED
    2   168 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain fw2net (1 references)
 pkts bytes target     prot opt in     out     source               destination
    8   506 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:53
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:53
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 ACCEPT     esp  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 ACCEPT     ah   --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:500 state NEW
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain loc2all (0 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain loc2fw (1 references)
 pkts bytes target     prot opt in     out     source               destination
  362 25272 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:53
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:53
    1    52 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:22
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 8
  196 15604 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain loc2net (1 references)
 pkts bytes target     prot opt in     out     source               destination
  522 68274 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED
   51  3266 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain logdrop (0 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:logdrop:DROP:'
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain logreject (0 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:logreject:REJECT:'
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain net2all (0 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED
    0     0 Drop       all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 ULOG       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ULOG copy_range 0 nlgroup 1 prefix `Shorewall:net2all:DROP:' 
queue_threshold 1
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain net2fw (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED
    8   506 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 8
    0     0 ACCEPT     esp  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 ACCEPT     ah   --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:500 state NEW
  100 50411 Drop       all  --  *      *       0.0.0.0/0            0.0.0.0/0
   91 49959 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:net2fw:DROP:'
   91 49959 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain net2loc (1 references)
 pkts bytes target     prot opt in     out     source               destination
  669  493K ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED
    6   288 ACCEPT     tcp  --  *      *       0.0.0.0/0            10.0.10.40  
        tcp dpt:80
    0     0 Drop       all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:net2loc:DROP:'
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain ppp0_fwd (1 references)
 pkts bytes target     prot opt in     out     source               destination
    6   288 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW
  675  493K net2loc    all  --  *      eth1    0.0.0.0/0            0.0.0.0/0

Chain ppp0_in (1 references)
 pkts bytes target     prot opt in     out     source               destination
  108 50917 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW
  108 50917 net2fw     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain ppp0_out (1 references)
 pkts bytes target     prot opt in     out     source               destination
    8   506 fw2net     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain reject (10 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        PKTTYPE = broadcast
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        PKTTYPE = multicast
    0     0 DROP       all  --  *      *       255.255.255.255      0.0.0.0/0
    0     0 DROP       all  --  *      *       224.0.0.0/4          0.0.0.0/0
    0     0 REJECT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with tcp-reset
    0     0 REJECT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with icmp-port-unreachable
    0     0 REJECT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with icmp-host-unreachable
    0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with icmp-host-prohibited

Chain shorewall (0 references)
 pkts bytes target     prot opt in     out     source               destination

Chain smurfs (0 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ULOG       all  --  *      *       10.0.10.255          0.0.0.0/0   
        ULOG copy_range 0 nlgroup 1 prefix `Shorewall:smurfs:DROP:' 
queue_threshold 1
    0     0 DROP       all  --  *      *       10.0.10.255          0.0.0.0/0
    0     0 ULOG       all  --  *      *       255.255.255.255      0.0.0.0/0   
        ULOG copy_range 0 nlgroup 1 prefix `Shorewall:smurfs:DROP:' 
queue_threshold 1
    0     0 DROP       all  --  *      *       255.255.255.255      0.0.0.0/0
    0     0 ULOG       all  --  *      *       224.0.0.0/4          0.0.0.0/0   
        ULOG copy_range 0 nlgroup 1 prefix `Shorewall:smurfs:DROP:' 
queue_threshold 1
    0     0 DROP       all  --  *      *       224.0.0.0/4          0.0.0.0/0

Log (/var/log/shorewall.log)


NAT Table

Chain PREROUTING (policy ACCEPT 145 packets, 53720 bytes)
 pkts bytes target     prot opt in     out     source               destination
  114 51205 net_dnat   all  --  ppp0   *       0.0.0.0/0            0.0.0.0/0

Chain POSTROUTING (policy ACCEPT 12 packets, 664 bytes)
 pkts bytes target     prot opt in     out     source               destination
   34  2362 ppp0_masq  all  --  *      ppp0    0.0.0.0/0            0.0.0.0/0

Chain OUTPUT (policy ACCEPT 2 packets, 168 bytes)
 pkts bytes target     prot opt in     out     source               destination

Chain net_dnat (1 references)
 pkts bytes target     prot opt in     out     source               destination
    6   288 DNAT       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:80 to:10.0.10.40

Chain ppp0_masq (1 references)
 pkts bytes target     prot opt in     out     source               destination
   30  2154 MASQUERADE  all  --  *      *       10.0.10.0/24         0.0.0.0/0

Mangle Table

Chain PREROUTING (policy ACCEPT 1915 packets, 656K bytes)
 pkts bytes target     prot opt in     out     source               destination
 1915  656K tcpre      all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain INPUT (policy ACCEPT 667 packets, 91845 bytes)
 pkts bytes target     prot opt in     out     source               destination

Chain FORWARD (policy ACCEPT 1248 packets, 565K bytes)
 pkts bytes target     prot opt in     out     source               destination
 1248  565K tcfor      all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain OUTPUT (policy ACCEPT 393 packets, 88362 bytes)
 pkts bytes target     prot opt in     out     source               destination
  393 88362 tcout      all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain POSTROUTING (policy ACCEPT 1641 packets, 653K bytes)
 pkts bytes target     prot opt in     out     source               destination
 1641  653K tcpost     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain tcfor (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain tcout (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain tcpost (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain tcpre (1 references)
 pkts bytes target     prot opt in     out     source               destination

Conntrack Table

tcp      6 21 TIME_WAIT src=10.0.10.30 dst=65.54.228.26 sport=1334 dport=1863 
src=65.54.228.26 dst=202.10.93.183 sport=1863 dport=1334 [ASSURED] use=1 mark=0
udp      17 29 src=10.0.10.10 dst=10.0.10.255 sport=137 dport=137 [UNREPLIED] 
src=10.0.10.255 dst=10.0.10.10 sport=137 dport=137 use=1 mark=0
tcp      6 110 SYN_SENT src=192.168.246.1 dst=202.92.250.100 sport=1348 
dport=139 [UNREPLIED] src=202.92.250.100 dst=192.168.246.1 sport=139 dport=1348 
use=1 mark=0
tcp      6 110 SYN_SENT src=10.0.10.30 dst=202.92.250.100 sport=1346 dport=139 
[UNREPLIED] src=202.92.250.100 dst=202.10.93.183 sport=139 dport=1346 use=1 
mark=0
tcp      6 110 SYN_SENT src=192.168.198.1 dst=10.0.100.68 sport=1343 dport=139 
[UNREPLIED] src=10.0.100.68 dst=192.168.198.1 sport=139 dport=1343 use=1 mark=0
tcp      6 110 SYN_SENT src=192.168.198.1 dst=202.92.250.100 sport=1347 
dport=139 [UNREPLIED] src=202.92.250.100 dst=192.168.198.1 sport=139 dport=1347 
use=1 mark=0
tcp      6 431999 ESTABLISHED src=10.0.10.30 dst=10.0.10.1 sport=1336 dport=22 
src=10.0.10.1 dst=10.0.10.30 sport=22 dport=1336 [ASSURED] use=1 mark=0
tcp      6 110 SYN_SENT src=10.0.10.30 dst=10.0.100.68 sport=1342 dport=139 
[UNREPLIED] src=10.0.100.68 dst=202.10.93.183 sport=139 dport=1342 use=1 mark=0
tcp      6 431944 ESTABLISHED src=10.0.10.30 dst=72.14.253.93 sport=1339 
dport=80 src=72.14.253.93 dst=202.10.93.183 sport=80 dport=1339 [ASSURED] use=1 
mark=0
udp      17 29 src=10.0.10.50 dst=203.94.159.98 sport=5060 dport=5060 
[UNREPLIED] src=203.94.159.98 dst=202.10.93.183 sport=5060 dport=5060 use=1 
mark=0
tcp      6 431994 ESTABLISHED src=10.0.10.30 dst=207.46.107.17 sport=1324 
dport=1863 src=207.46.107.17 dst=202.10.93.183 sport=1863 dport=1324 [ASSURED] 
use=1 mark=0
tcp      6 110 SYN_SENT src=10.0.10.30 dst=202.92.250.100 sport=1345 dport=445 
[UNREPLIED] src=202.92.250.100 dst=202.10.93.183 sport=445 dport=1345 use=1 
mark=0
tcp      6 110 SYN_SENT src=192.168.246.1 dst=10.0.100.68 sport=1344 dport=139 
[UNREPLIED] src=10.0.100.68 dst=192.168.246.1 sport=139 dport=1344 use=1 mark=0
tcp      6 431998 ESTABLISHED src=10.0.10.30 dst=202.92.250.100 sport=1349 
dport=3389 src=202.92.250.100 dst=202.10.93.183 sport=3389 dport=1349 [ASSURED] 
use=1 mark=0
tcp      6 110 SYN_SENT src=10.0.10.30 dst=10.0.100.68 sport=1341 dport=445 
[UNREPLIED] src=10.0.100.68 dst=202.10.93.183 sport=445 dport=1341 use=1 mark=0

IP Configuration

1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
2: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop
    link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
3: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:02:b3:5f:cd:13 brd ff:ff:ff:ff:ff:ff
4: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:02:b3:61:64:6e brd ff:ff:ff:ff:ff:ff
    inet 10.0.10.1/24 brd 10.0.10.255 scope global eth1
5: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP> mtu 1492 qdisc pfifo_fast qlen 3
    link/ppp
    inet 202.10.93.183 peer 202.10.81.1/32 scope global ppp0

IP Stats

1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    RX: bytes  packets  errors  dropped overrun mcast
    0          0        0       0       0       0
    TX: bytes  packets  errors  dropped carrier collsns
    0          0        0       0       0       0
2: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop
    link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast
    0          0        0       0       0       0
    TX: bytes  packets  errors  dropped carrier collsns
    0          0        0       0       0       0
3: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:02:b3:5f:cd:13 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast
    563172     805      0       0       0       0
    TX: bytes  packets  errors  dropped carrier collsns
    85704      604      0       0       0       0
4: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:02:b3:61:64:6e brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast
    132562     1134     0       0       0       0
    TX: bytes  packets  errors  dropped carrier collsns
    596133     1062     0       0       0       0
5: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP> mtu 1492 qdisc pfifo_fast qlen 3
    link/ppp
    RX: bytes  packets  errors  dropped overrun mcast
    544490     786      0       0       0       0
    TX: bytes  packets  errors  dropped carrier collsns
    72100      584      0       0       0       0

/proc

   /proc/version = Linux version 2.4.33 ([EMAIL PROTECTED]) (gcc version 3.3.3) 
#1 Sun Jan 14 12:15:07 CET 2007
   /proc/sys/net/ipv4/ip_forward = 1
   /proc/sys/net/ipv4/icmp_echo_ignore_all = 0
   /proc/sys/net/ipv4/conf/all/proxy_arp = 0
   /proc/sys/net/ipv4/conf/all/arp_filter = 0
   /proc/sys/net/ipv4/conf/all/arp_ignore = 0
   /proc/sys/net/ipv4/conf/all/rp_filter = 1
   /proc/sys/net/ipv4/conf/all/log_martians = 0
   /proc/sys/net/ipv4/conf/default/proxy_arp = 0
   /proc/sys/net/ipv4/conf/default/arp_filter = 0
   /proc/sys/net/ipv4/conf/default/arp_ignore = 0
   /proc/sys/net/ipv4/conf/default/rp_filter = 0
   /proc/sys/net/ipv4/conf/default/log_martians = 0
   /proc/sys/net/ipv4/conf/eth1/proxy_arp = 0
   /proc/sys/net/ipv4/conf/eth1/arp_filter = 0
   /proc/sys/net/ipv4/conf/eth1/arp_ignore = 0
   /proc/sys/net/ipv4/conf/eth1/rp_filter = 0
   /proc/sys/net/ipv4/conf/eth1/log_martians = 0
   /proc/sys/net/ipv4/conf/lo/proxy_arp = 0
   /proc/sys/net/ipv4/conf/lo/arp_filter = 0
   /proc/sys/net/ipv4/conf/lo/arp_ignore = 0
   /proc/sys/net/ipv4/conf/lo/rp_filter = 0
   /proc/sys/net/ipv4/conf/lo/log_martians = 0
   /proc/sys/net/ipv4/conf/ppp0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/ppp0/arp_filter = 0
   /proc/sys/net/ipv4/conf/ppp0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/ppp0/rp_filter = 1
   /proc/sys/net/ipv4/conf/ppp0/log_martians = 0

Routing Rules

0:      from all lookup local
32766:  from all lookup main
32767:  from all lookup default

Table default:


Table local:

broadcast 127.255.255.255 dev lo  proto kernel  scope link  src 127.0.0.1
local 10.0.10.1 dev eth1  proto kernel  scope host  src 10.0.10.1
broadcast 10.0.10.0 dev eth1  proto kernel  scope link  src 10.0.10.1
broadcast 127.0.0.0 dev lo  proto kernel  scope link  src 127.0.0.1
local 127.0.0.1 dev lo  proto kernel  scope host  src 127.0.0.1
local 202.10.93.183 dev ppp0  proto kernel  scope host  src 202.10.93.183
broadcast 10.0.10.255 dev eth1  proto kernel  scope link  src 10.0.10.1
local 127.0.0.0/8 dev lo  proto kernel  scope host  src 127.0.0.1

Table main:

202.10.81.1 dev ppp0  proto kernel  scope link  src 202.10.93.183
10.0.10.0/24 dev eth1  proto kernel  scope link  src 10.0.10.1
default dev ppp0  scope link

ARP

? (10.0.10.40) at 00:E0:18:05:28:A4 [ether] on eth1
? (10.0.10.30) at 00:16:17:9B:69:B9 [ether] on eth1
? (10.0.10.10) at 00:E0:18:05:28:A4 [ether] on eth1

Modules

ip_conntrack           16548   2 [ipt_state ipt_helper ipt_conntrack 
ipt_REDIRECT ipt_MASQUERADE ip_nat_irc ip_nat_ftp iptable_nat ip_conntrack_irc 
ip_conntrack_ftp]
ip_conntrack_ftp        3132   1
ip_conntrack_irc        2484   1
ip_nat_ftp              2152   0 (unused)
ip_nat_irc              1704   0 (unused)
ipt_MASQUERADE          1024   1
ipt_REDIRECT             480   0 (unused)
ipt_conntrack            692   0
ipt_helper               400   0 (unused)
ipt_ipp2p               5908   0
ipt_state                272  17
iptable_nat            14452   3 [ipt_REDIRECT ipt_MASQUERADE ip_nat_irc 
ip_nat_ftp]

Shorewall has detected the following iptables/netfilter capabilities:
   NAT: Available
   Packet Mangling: Available
   Multi-port Match: Available
   Extended Multi-port Match: Not available
   Connection Tracking Match: Not available
   Packet Type Match: Available
   Policy Match: Not available
   Physdev Match: Not available
   Packet length Match: Available
   IP range Match: Not available
   Recent Match: Not available
   Owner Match: Not available
   Ipset Match: Not available
   CONNMARK Target: Not available
   Connmark Match: Not available
   Raw Table: Not available
   IPP2P Match: Available
   CLASSIFY Target: Not available
   Extended REJECT: Available
   Repeat match: Not available
   MARK Target: Available
   Extended MARK Target: Not available
   Mangle FORWARD Chain: Available
   Comments: Not available
   Address Type Match: Not available
   TCPMSS Match: Available

Traffic Control


TC Filters

-------------------------------------------------------------------------
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2005.
http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to