Here's the latest post from Florian. I can't spend any more time on this
today but hopefully someone else on the list can help.

-Tom
-- 
Tom Eastep    \ Nothing is foolproof to a sufficiently talented fool
Shoreline,     \ http://shorewall.net
Washington USA  \ [EMAIL PROTECTED]
PGP Public Key   \ https://lists.shorewall.net/teastep.pgp.key
--- Begin Message ---
No.
Is that the missing file?
TERM environment variable not set.
Shorewall-1.4.8 Status at servroute.ifuma.intern - Thu Oct 18 17:28:27 UTC 2007

Counters reset Thu Oct 18 17:28:21 UTC 2007

Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0   
       
    0     0 DROP      !icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
       state INVALID 
   45  4372 ppp_in     all  --  ppp+   *       0.0.0.0/0            0.0.0.0/0   
       
    1    72 eth1_in    all  --  eth1   *       0.0.0.0/0            0.0.0.0/0   
       
    1    72 eth0_in    all  --  eth0   *       0.0.0.0/0            0.0.0.0/0   
       
    0     0 common     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       LOG flags 0 level 7 prefix `Shorewall:INPUT:REJECT:' 
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP      !icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
       state INVALID 
    0     0 ppp_fwd    all  --  ppp+   *       0.0.0.0/0            0.0.0.0/0   
       
    0     0 eth1_fwd   all  --  eth1   *       0.0.0.0/0            0.0.0.0/0   
       
    0     0 eth0_fwd   all  --  eth0   *       0.0.0.0/0            0.0.0.0/0   
       
    0     0 common     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       LOG flags 0 level 7 prefix `Shorewall:FORWARD:REJECT:' 
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       

Chain OUTPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      lo      0.0.0.0/0            0.0.0.0/0   
       
    0     0 DROP      !icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
       state INVALID 
   41 22260 fw2all     all  --  *      ppp+    0.0.0.0/0            0.0.0.0/0   
       
    1    72 fw2masq    all  --  *      eth1    0.0.0.0/0            0.0.0.0/0   
       
    1    72 fw2loc     all  --  *      eth0    0.0.0.0/0            0.0.0.0/0   
       
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       

Chain all2all (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state NEW tcp flags:!0x16/0x02 
    0     0 common     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       LOG flags 0 level 7 prefix `Shorewall:all2all:REJECT:' 
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       

Chain common (4 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 icmpdef    icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
       
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       udp dpt:135 
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       udp dpts:137:139 
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       udp dpt:445 
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       tcp dpt:139 
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       tcp dpt:445 
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       tcp dpt:135 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       udp dpt:1900 
    0     0 DROP       all  --  *      *       0.0.0.0/0            
255.255.255.255    
    0     0 DROP       all  --  *      *       0.0.0.0/0            224.0.0.0/4 
       
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       tcp dpt:113 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       udp spt:53 state NEW 
    0     0 DROP       all  --  *      *       0.0.0.0/0            
192.168.0.255      
    0     0 DROP       all  --  *      *       0.0.0.0/0            
192.168.10.255     

Chain dynamic (6 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain eth0_fwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state NEW 
    0     0 loc2all    all  --  *      ppp+    0.0.0.0/0            0.0.0.0/0   
       
    0     0 loc2all    all  --  *      eth1    0.0.0.0/0            0.0.0.0/0   
       

Chain eth0_in (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    1    72 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state NEW 
    1    72 loc2fw     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       

Chain eth1_fwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state NEW 
    0     0 masq2all   all  --  *      ppp+    0.0.0.0/0            0.0.0.0/0   
       
    0     0 masq2all   all  --  *      eth0    0.0.0.0/0            0.0.0.0/0   
       

Chain eth1_in (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    1    72 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state NEW 
    1    72 masq2fw    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       

Chain fw2all (3 references)
 pkts bytes target     prot opt in     out     source               destination 
        
   40 22188 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state NEW tcp flags:!0x16/0x02 
    3   216 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       

Chain fw2loc (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state NEW tcp flags:!0x16/0x02 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       multiport dports 137,139,445 state NEW 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state NEW udp dpts:137:139 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state NEW tcp dpt:68 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state NEW udp dpt:68 
    1    72 fw2all     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       

Chain fw2masq (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state NEW tcp flags:!0x16/0x02 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       multiport dports 631,515,137,138,139 state NEW 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       multiport dports 631,515,137,138,139 state NEW 
    1    72 fw2all     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       

Chain icmpdef (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain loc2all (3 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state NEW tcp flags:!0x16/0x02 
    1    72 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       LOG flags 0 level 6 prefix `Shorewall:loc2all:ACCEPT:' 
    1    72 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       

Chain loc2fw (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state NEW tcp flags:!0x16/0x02 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state NEW tcp dpt:5901 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       multiport dports 3128,67 state NEW 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state NEW udp dpt:67 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       multiport dports 137,139,445 state NEW 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state NEW udp dpts:137:139 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       multiport dports 10000,443 state NEW 
    1    72 loc2all    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       

Chain masq2all (3 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state NEW tcp flags:!0x16/0x02 
    1    72 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       LOG flags 0 level 6 prefix `Shorewall:masq2all:ACCEPT:' 
    1    72 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       

Chain masq2fw (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state NEW tcp flags:!0x16/0x02 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       multiport dports 53,67,80,443,631,143,119,123,110,25 state NEW 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       multiport dports 53,67,80,443,631,143,119,123,110,25 state NEW 
    1    72 masq2all   all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       

Chain net2all (3 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state NEW tcp flags:!0x16/0x02 
    3   144 common     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       
    3   144 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       LOG flags 0 level 7 prefix `Shorewall:net2all:DROP:' 
    3   144 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       

Chain net2fw (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
   40  4100 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state NEW tcp flags:!0x16/0x02 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state NEW tcp dpt:5901 
    2   128 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       multiport dports 10000,443 state NEW 
    3   144 net2all    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       

Chain newnotsyn (10 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       LOG flags 0 level 6 prefix `Shorewall:newnotsyn:DROP:' 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       

Chain ppp_fwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state NEW 
    0     0 net2all    all  --  *      eth1    0.0.0.0/0            0.0.0.0/0   
       
    0     0 net2all    all  --  *      eth0    0.0.0.0/0            0.0.0.0/0   
       

Chain ppp_in (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    5   272 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       state NEW 
   45  4372 net2fw     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       

Chain reject (10 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 REJECT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       reject-with tcp-reset 
    0     0 REJECT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
       reject-with icmp-port-unreachable 
    0     0 REJECT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
       reject-with icmp-host-unreachable 
    0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       reject-with icmp-host-prohibited 

Chain shorewall (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Oct 18 17:26:17 loc2all:ACCEPT:IN=eth0 OUT=ppp0 SRC=192.168.10.71 
DST=88.73.22.144 LEN=78 TOS=0x00 PREC=0x00 TTL=127 ID=46408 PROTO=UDP SPT=137 
DPT=137 LEN=58 
Oct 18 17:26:23 loc2all:ACCEPT:IN=eth0 OUT=ppp0 SRC=192.168.10.71 
DST=217.237.150.97 LEN=74 TOS=0x00 PREC=0x00 TTL=127 ID=46423 PROTO=UDP 
SPT=2417 DPT=53 LEN=54 
Oct 18 17:26:23 loc2all:ACCEPT:IN=eth0 OUT=ppp0 SRC=192.168.10.71 
DST=217.237.150.97 LEN=71 TOS=0x00 PREC=0x00 TTL=127 ID=46425 PROTO=UDP 
SPT=2418 DPT=53 LEN=51 
Oct 18 17:26:23 loc2all:ACCEPT:IN=eth0 OUT= SRC=192.168.10.1 DST=192.168.10.255 
LEN=72 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP SPT=520 DPT=520 LEN=52 
Oct 18 17:26:23 masq2all:ACCEPT:IN=eth1 OUT= SRC=192.168.0.1 DST=192.168.0.255 
LEN=72 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP SPT=520 DPT=520 LEN=52 
Oct 18 17:26:29 loc2all:ACCEPT:IN=eth0 OUT=ppp0 SRC=192.168.10.71 
DST=217.237.150.97 LEN=66 TOS=0x00 PREC=0x00 TTL=127 ID=46552 PROTO=UDP 
SPT=2421 DPT=53 LEN=46 
Oct 18 17:26:30 loc2all:ACCEPT:IN=eth0 OUT=ppp0 SRC=192.168.10.71 
DST=217.237.150.97 LEN=69 TOS=0x00 PREC=0x00 TTL=127 ID=46553 PROTO=UDP 
SPT=2422 DPT=53 LEN=49 
Oct 18 17:26:39 loc2all:ACCEPT:IN=eth0 OUT= SRC=192.168.10.1 DST=192.168.10.255 
LEN=152 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP SPT=631 DPT=631 LEN=132 
Oct 18 17:26:46 newnotsyn:DROP:IN=ppp0 OUT= SRC=88.73.22.144 DST=80.135.181.177 
LEN=40 TOS=0x00 PREC=0x00 TTL=56 ID=15064 DF PROTO=TCP SPT=50147 DPT=5901 
WINDOW=65535 RES=0x00 ACK RST URGP=0 
Oct 18 17:26:53 loc2all:ACCEPT:IN=eth0 OUT= SRC=192.168.10.1 DST=192.168.10.255 
LEN=72 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP SPT=520 DPT=520 LEN=52 
Oct 18 17:26:53 masq2all:ACCEPT:IN=eth1 OUT= SRC=192.168.0.1 DST=192.168.0.255 
LEN=72 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP SPT=520 DPT=520 LEN=52 
Oct 18 17:27:10 loc2all:ACCEPT:IN=eth0 OUT= SRC=192.168.10.1 DST=192.168.10.255 
LEN=152 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP SPT=631 DPT=631 LEN=132 
Oct 18 17:27:23 loc2all:ACCEPT:IN=eth0 OUT= SRC=192.168.10.1 DST=192.168.10.255 
LEN=72 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP SPT=520 DPT=520 LEN=52 
Oct 18 17:27:23 masq2all:ACCEPT:IN=eth1 OUT= SRC=192.168.0.1 DST=192.168.0.255 
LEN=72 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP SPT=520 DPT=520 LEN=52 
Oct 18 17:27:41 loc2all:ACCEPT:IN=eth0 OUT= SRC=192.168.10.1 DST=192.168.10.255 
LEN=152 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP SPT=631 DPT=631 LEN=132 
Oct 18 17:27:53 loc2all:ACCEPT:IN=eth0 OUT= SRC=192.168.10.1 DST=192.168.10.255 
LEN=72 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP SPT=520 DPT=520 LEN=52 
Oct 18 17:27:53 masq2all:ACCEPT:IN=eth1 OUT= SRC=192.168.0.1 DST=192.168.0.255 
LEN=72 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP SPT=520 DPT=520 LEN=52 
Oct 18 17:28:12 loc2all:ACCEPT:IN=eth0 OUT= SRC=192.168.10.1 DST=192.168.10.255 
LEN=152 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP SPT=631 DPT=631 LEN=132 
Oct 18 17:28:23 loc2all:ACCEPT:IN=eth0 OUT= SRC=192.168.10.1 DST=192.168.10.255 
LEN=72 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP SPT=520 DPT=520 LEN=52 
Oct 18 17:28:23 masq2all:ACCEPT:IN=eth1 OUT= SRC=192.168.0.1 DST=192.168.0.255 
LEN=72 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP SPT=520 DPT=520 LEN=52 

NAT Table

Chain PREROUTING (policy ACCEPT 8667 packets, 493K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain POSTROUTING (policy ACCEPT 6843 packets, 541K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    1    72 ppp_masq   all  --  *      ppp+    0.0.0.0/0            0.0.0.0/0   
       

Chain OUTPUT (policy ACCEPT 6766 packets, 538K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain ppp_masq (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 MASQUERADE  all  --  *      *       192.168.10.0/24      0.0.0.0/0  
        

Mangle Table

Chain PREROUTING (policy ACCEPT 287K packets, 65M bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
   78  6180 pretos     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       

Chain INPUT (policy ACCEPT 287K packets, 65M bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain FORWARD (policy ACCEPT 630 packets, 55008 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain OUTPUT (policy ACCEPT 330K packets, 96M bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
   77 57443 outtos     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
       

Chain POSTROUTING (policy ACCEPT 333K packets, 97M bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain outtos (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain pretos (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

tcp      6 431875 ESTABLISHED src=80.135.181.177 dst=77.242.193.129 sport=36240 
dport=443 src=77.242.193.129 dst=80.135.181.177 sport=443 dport=36240 [ASSURED] 
use=1 
udp      17 7 src=192.168.10.1 dst=192.168.10.255 sport=631 dport=631 
[UNREPLIED] src=192.168.10.255 dst=192.168.10.1 sport=631 dport=631 use=1 
udp      17 19 src=192.168.10.1 dst=192.168.10.255 sport=520 dport=520 
[UNREPLIED] src=192.168.10.255 dst=192.168.10.1 sport=520 dport=520 use=1 
udp      17 173 src=80.135.181.177 dst=217.237.150.115 sport=32865 dport=53 
src=217.237.150.115 dst=80.135.181.177 sport=53 dport=32865 [ASSURED] use=1 
tcp      6 431981 ESTABLISHED src=192.168.10.71 dst=192.168.10.1 sport=1185 
dport=3128 src=192.168.10.1 dst=192.168.10.71 sport=3128 dport=1185 [ASSURED] 
use=1 
udp      17 19 src=192.168.0.1 dst=192.168.0.255 sport=520 dport=520 
[UNREPLIED] src=192.168.0.255 dst=192.168.0.1 sport=520 dport=520 use=1 
tcp      6 431676 ESTABLISHED src=192.168.10.71 dst=192.168.10.1 sport=1191 
dport=139 src=192.168.10.1 dst=192.168.10.71 sport=139 dport=1191 [ASSURED] 
use=1 
tcp      6 431875 ESTABLISHED src=80.135.181.177 dst=77.242.193.129 sport=36238 
dport=443 src=77.242.193.129 dst=80.135.181.177 sport=443 dport=36238 [ASSURED] 
use=1 
tcp      6 431817 ESTABLISHED src=80.135.181.177 dst=77.242.193.129 sport=36237 
dport=443 src=77.242.193.129 dst=80.135.181.177 sport=443 dport=36237 [ASSURED] 
use=1 
tcp      6 431874 ESTABLISHED src=192.168.10.71 dst=192.168.10.1 sport=2419 
dport=3128 src=192.168.10.1 dst=192.168.10.71 sport=3128 dport=2419 [ASSURED] 
use=1 
tcp      6 431875 ESTABLISHED src=192.168.10.71 dst=192.168.10.1 sport=2414 
dport=3128 src=192.168.10.1 dst=192.168.10.71 sport=3128 dport=2414 [ASSURED] 
use=1 
tcp      6 431903 ESTABLISHED src=80.135.181.177 dst=77.242.193.129 sport=36241 
dport=443 src=77.242.193.129 dst=80.135.181.177 sport=443 dport=36241 [ASSURED] 
use=1 
tcp      6 431817 ESTABLISHED src=192.168.10.71 dst=192.168.10.1 sport=2413 
dport=3128 src=192.168.10.1 dst=192.168.10.71 sport=3128 dport=2413 [ASSURED] 
use=1 
tcp      6 431981 ESTABLISHED src=80.135.181.177 dst=77.242.193.129 sport=32769 
dport=443 src=77.242.193.129 dst=80.135.181.177 sport=443 dport=32769 [ASSURED] 
use=1 
tcp      6 431904 ESTABLISHED src=192.168.10.75 dst=192.168.10.1 sport=1201 
dport=139 src=192.168.10.1 dst=192.168.10.75 sport=139 dport=1201 [ASSURED] 
use=1 
udp      17 19 src=80.135.181.177 dst=217.0.116.150 sport=520 dport=520 
[UNREPLIED] src=217.0.116.150 dst=80.135.181.177 sport=520 dport=520 use=1 
tcp      6 431903 ESTABLISHED src=192.168.10.71 dst=192.168.10.1 sport=2420 
dport=3128 src=192.168.10.1 dst=192.168.10.71 sport=3128 dport=2420 [ASSURED] 
use=1 
tcp      6 431999 ESTABLISHED src=88.73.22.144 dst=80.135.181.177 sport=50163 
dport=10000 src=80.135.181.177 dst=88.73.22.144 sport=10000 dport=50163 
[ASSURED] use=1 
udp      17 7 src=192.168.0.1 dst=192.168.0.255 sport=631 dport=631 [UNREPLIED] 
src=192.168.0.255 dst=192.168.0.1 sport=631 dport=631 use=1 



Florian Zschocke

EDV Consulting F. Zschocke
Joachim-Friedrich-Str. 29
10711 Berlin
Fon: +49 (0)30 31504645

http://www.edv-consulting-berlin.de

Am 18.10.2007 um 17:58 schrieb Tom Eastep:

Florian Zschocke wrote:
Thank you for your fast response
Sorry for sending you empty files.
In /etc/shorewall/shorewall.conf i have only two lines:

MACLIST_DISPOSITION=REJECT
TCP_FLAGS_DISPOSITION=DROP

are these correct? 
And I add a line 
IP_FORWARDING=ON


Did that solve the problem (after "shorewall restart")?

-Tom

PS -- [EMAIL PROTECTED] is not for private 1-on-1 help. It is for
sending large files that can't be sent to the mailing list. Please keep this
discussion on the mailing list.

-Tom
-- 
Tom Eastep    \ Nothing is foolproof to a sufficiently talented fool
Shoreline,     \ http://shorewall.net
Washington USA  \ [EMAIL PROTECTED]



--- End Message ---

Attachment: signature.asc
Description: OpenPGP digital signature

-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to