I have installed shorewall 3.4.4.4 and squid 2.6 on Mandriva 2008
distribution and using webmin. I am having a i need to resave port
redirection in squid module in webmin and reapplying rules in shorewall
module when the firewall has restarted for the internal clients to be able
to go on the net or see our on web pages on the dmz zone. (using three
interface model). Can some help me so that I need not to do that after
restart or reboot of the firewall. Enclosed a copy of the shorewall start
dump. thanks in advance
Mahindra Patel (BEng Hons CEng MIET)
Network Support Engineer
Caseys Film & Video Ltd
316 - 318 Latimer Road
London. W10 6QN
Tel:  020 8960 0123
Fax: 020 8969 3714
Email: [EMAIL PROTECTED]
Registered in England: 1713597
http://www.caseys.co.uk Standard Definition / High Definition Editing and
Broadcast Duplication  -  Open / Closed Broadcast Subtitling  -  CDRom / DVD
Authoring and Duplication  -  Voiceover Recording and Editing



[EMAIL PROTECTED] default]# shorewall -vv restart
Compiling...
Processing /etc/shorewall/params ...
Loading /usr/share/shorewall/lib.base...
Loading /usr/share/shorewall/lib.config...
Processing /etc/shorewall/params ...
Processing /etc/shorewall/shorewall.conf...
Loading Modules...










Loading library /usr/share/shorewall/lib.actions...


Loading library /usr/share/shorewall/lib.nat...
Loading library /usr/share/shorewall/lib.proxyarp...
Initializing...
Shorewall has detected the following iptables/netfilter capabilities:
   NAT: Available
   Packet Mangling: Available
   Multi-port Match: Available
   Extended Multi-port Match: Available
   Connection Tracking Match: Available
   Packet Type Match: Available
   Policy Match: Available
   Physdev Match: Available
   Packet length Match: Available
   IP range Match: Available
   Recent Match: Available
   Owner Match: Available
   Ipset Match: Available
   CONNMARK Target: Available
   Extended CONNMARK Target: Available
   Connmark Match: Available
   Extended Connmark Match: Available
   Raw Table: Available
   IPP2P Match: Not available
   CLASSIFY Target: Available
   Extended REJECT: Available
   Repeat match: Available
   MARK Target: Available
   Extended MARK Target: Available
   Mangle FORWARD Chain: Available
   Comments: Available
   Address Type Match: Available
   TCPMSS Match: Available
Determining Zones...
   IPv4 Zones: net loc dmz
   Firewall Zone: fw
Validating interfaces file...
Validating hosts file...
Pre-processing Actions...
   Pre-processing /usr/share/shorewall/action.Drop...
   ..Expanding Macro /usr/share/shorewall/macro.Auth...
   ..End Macro
   ..Expanding Macro /usr/share/shorewall/macro.AllowICMPs...
   ..End Macro
   ..Expanding Macro /usr/share/shorewall/macro.SMB...
   ..End Macro
   ..Expanding Macro /usr/share/shorewall/macro.DropUPnP...
   ..End Macro
   ..Expanding Macro /usr/share/shorewall/macro.DropDNSrep...
   ..End Macro
   Pre-processing /usr/share/shorewall/action.Reject...
Validating Policy file...
   Policy for loc to net is REJECT using chain loc2net
   Policy for loc to dmz is REJECT using chain loc2dmz
   Policy for loc to fw is ACCEPT using chain loc2fw
   Policy for fw to net is ACCEPT using chain fw2net
   Policy for fw to dmz is ACCEPT using chain fw2dmz
   Policy for fw to loc is REJECT using chain fw2loc
   Policy for dmz to net is ACCEPT using chain dmz2net
   Policy for dmz to fw is ACCEPT using chain dmz2fw
   Policy for dmz to loc is REJECT using chain dmz2loc
   Policy for net to dmz is DROP using chain net2dmz
   Policy for net to fw is DROP using chain net2fw
   Policy for net to loc is DROP using chain net2loc
Determining Hosts in Zones...
   net Zone: eth2:0.0.0.0/0
   loc Zone: eth0:0.0.0.0/0
   dmz Zone: eth1:0.0.0.0/0
Deleting user chains...
Compiling /etc/shorewall/routestopped ...
Creating Interface Chains...
Compiling Proxy ARP
   Host 192.168.10.1 connected to eth1 added to ARP on eth2
   Host 192.168.10.1 connected to eth1 added to ARP on eth0
Compiling Common Rules
Adding Anti-smurf Rules
Compiling TCP Flags checking...
Compiling Kernel Route Filtering...
Compiling IP Forwarding...
Compiling IPSEC...
Compiling /etc/shorewall/rules...
..Expanding Macro /usr/share/shorewall/macro.DNS...
   Rule "ACCEPT fw net udp 53 - - - -" compiled.
   Rule "ACCEPT fw net tcp 53 - - - -" compiled.
..End Macro
..Expanding Macro /usr/share/shorewall/macro.DNS...
   Rule "ACCEPT dmz net udp 53 - - - -" compiled.
   Rule "ACCEPT dmz net tcp 53 - - - -" compiled.
..End Macro
..Expanding Macro /usr/share/shorewall/macro.SSH...
   Rule "ACCEPT loc fw tcp 22 - - - -" compiled.
..End Macro
..Expanding Macro /usr/share/shorewall/macro.SSH...
   Rule "ACCEPT loc dmz tcp 22 - - - -" compiled.
..End Macro
..Expanding Macro /usr/share/shorewall/macro.Ping...
   Rule "REJECT net fw icmp 8 - - - -" compiled.
..End Macro
..Expanding Macro /usr/share/shorewall/macro.Ping...
   Rule "ACCEPT loc fw icmp 8 - - - -" compiled.
..End Macro
..Expanding Macro /usr/share/shorewall/macro.Ping...
   Rule "ACCEPT dmz fw icmp 8 - - - -" compiled.
..End Macro
..Expanding Macro /usr/share/shorewall/macro.Ping...
   Rule "ACCEPT loc dmz icmp 8 - - - -" compiled.
..End Macro
..Expanding Macro /usr/share/shorewall/macro.Ping...
   Rule "ACCEPT dmz loc icmp 8 - - - -" compiled.
..End Macro
..Expanding Macro /usr/share/shorewall/macro.Ping...
   Rule "ACCEPT dmz net icmp 8 - - - -" compiled.
..End Macro
   Rule "ACCEPT fw net icmp      " compiled.
   Rule "ACCEPT fw loc icmp      " compiled.
   Rule "ACCEPT fw dmz icmp      " compiled.
   Rule "DNAT net dmz:192.168.10.1 tcp 80,25,110,9000,81,21,20 - 62.49.66.106   
" compiled.
   Rule "DNAT loc dmz:192.168.10.1 tcp 80,25,110,9000,81,21,20 - 62.49.66.106   
" compiled.
   Rule "DNAT loc dmz:192.168.10.1 tcp 80 - 192.168.10.1   " compiled.
   Rule "REDIRECT loc 3128 tcp www - !62.49.66.106,192.168.10.1   " compiled.
   Rule "ACCEPT fw net tcp www     " compiled.
Compiling Actions...
   Generating Transitive Closure of Used-action List...
Compiling /usr/share/shorewall/action.Drop for Chain Drop...
..Expanding Macro /usr/share/shorewall/macro.Auth...
   Rule "REJECT - - tcp 113 -  - " compiled.
..End Macro
   Rule "dropBcast        " compiled.
..Expanding Macro /usr/share/shorewall/macro.AllowICMPs...
   Rule "ACCEPT - - icmp fragmentation-needed -  - " compiled.
   Rule "ACCEPT - - icmp time-exceeded -  - " compiled.
..End Macro
   Rule "dropInvalid        " compiled.
..Expanding Macro /usr/share/shorewall/macro.SMB...
   Rule "DROP - - udp 135,445 -  - " compiled.
   Rule "DROP - - udp 137:139 -  - " compiled.
   Rule "DROP - - udp 1024: 137  - " compiled.
   Rule "DROP - - tcp 135,139,445 -  - " compiled.
..End Macro
..Expanding Macro /usr/share/shorewall/macro.DropUPnP...
   Rule "DROP - - udp 1900 -  - " compiled.
..End Macro
   Rule "dropNotSyn - - tcp     " compiled.
..Expanding Macro /usr/share/shorewall/macro.DropDNSrep...
   Rule "DROP - - udp - 53  - " compiled.
..End Macro
Compiling /usr/share/shorewall/action.Reject for Chain Reject...
..Expanding Macro /usr/share/shorewall/macro.Auth...
   Rule "REJECT - - tcp 113 -  - " compiled.
..End Macro
   Rule "dropBcast        " compiled.
..Expanding Macro /usr/share/shorewall/macro.AllowICMPs...
   Rule "ACCEPT - - icmp fragmentation-needed -  - " compiled.
   Rule "ACCEPT - - icmp time-exceeded -  - " compiled.
..End Macro
   Rule "dropInvalid        " compiled.
..Expanding Macro /usr/share/shorewall/macro.SMB...
   Rule "REJECT - - udp 135,445 -  - " compiled.
   Rule "REJECT - - udp 137:139 -  - " compiled.
   Rule "REJECT - - udp 1024: 137  - " compiled.
   Rule "REJECT - - tcp 135,139,445 -  - " compiled.
..End Macro
..Expanding Macro /usr/share/shorewall/macro.DropUPnP...
   Rule "DROP - - udp 1900 -  - " compiled.
..End Macro
   Rule "dropNotSyn - - tcp     " compiled.
..Expanding Macro /usr/share/shorewall/macro.DropDNSrep...
   Rule "DROP - - udp - 53  - " compiled.
..End Macro
Compiling /etc/shorewall/policy...
   Policy ACCEPT for fw to net using chain fw2net
   Policy REJECT for fw to loc using chain fw2loc
   Policy ACCEPT for fw to dmz using chain fw2dmz
   Policy DROP for net to fw using chain net2fw
   Policy DROP for net to loc using chain net2loc
   Policy DROP for net to dmz using chain net2dmz
   Policy ACCEPT for loc to fw using chain loc2fw
   Policy REJECT for loc to net using chain loc2net
   Policy REJECT for loc to dmz using chain loc2dmz
   Policy ACCEPT for dmz to fw using chain dmz2fw
   Policy ACCEPT for dmz to net using chain dmz2net
   Policy REJECT for dmz to loc using chain dmz2loc
Compiling Masquerading/SNAT
Compiling Traffic Control Rules...
Compiling Rule Activation...
Shorewall configuration compiled to /var/lib/shorewall/.restart
Restarting Shorewall....
Initializing...
Loading Modules...
Processing /etc/shorewall/init ...
Clearing Traffic Control/QOS
Deleting user chains...
Processing /etc/shorewall/continue ...
Enabling Loopback and DNS Lookups
Creating Interface Chains...
Setting up Proxy ARP...
   Host 192.168.10.1 connected to eth1 added to ARP on eth2
   Host 192.168.10.1 connected to eth1 added to ARP on eth0
Setting up SMURF control...
Processing /etc/shorewall/initdone ...
Setting up Black List...
Adding Anti-smurf Jumps...
Setting up TCP Flags checking...
Setting up ARP filtering...
Setting up Route Filtering...
Setting up Accept Source Routing...
IP Forwarding Enabled
Setting up SYN Flood Protection...
Setting up Rules...
   Rule "ACCEPT fw net udp 53 - - - -" added.
   Rule "ACCEPT fw net tcp 53 - - - -" added.
   Rule "ACCEPT dmz net udp 53 - - - -" added.
   Rule "ACCEPT dmz net tcp 53 - - - -" added.
   Rule "ACCEPT loc fw tcp 22 - - - -" added.
   Rule "ACCEPT loc dmz tcp 22 - - - -" added.
   Rule "REJECT net fw icmp 8 - - - -" added.
   Rule "ACCEPT loc fw icmp 8 - - - -" added.
   Rule "ACCEPT dmz fw icmp 8 - - - -" added.
   Rule "ACCEPT loc dmz icmp 8 - - - -" added.
   Rule "ACCEPT dmz loc icmp 8 - - - -" added.
   Rule "ACCEPT dmz net icmp 8 - - - -" added.
   Rule "ACCEPT fw net icmp      " added.
   Rule "ACCEPT fw loc icmp      " added.
   Rule "ACCEPT fw dmz icmp      " added.
   Rule "DNAT net dmz:192.168.10.1 tcp 80,25,110,9000,81,21,20 - 62.49.66.106   
" added.
   Rule "DNAT loc dmz:192.168.10.1 tcp 80,25,110,9000,81,21,20 - 62.49.66.106   
" added.
   Rule "DNAT loc dmz:192.168.10.1 tcp 80 - 192.168.10.1   " added.
   Rule "REDIRECT loc 3128 tcp www - !62.49.66.106,192.168.10.1   " added.
   Rule "ACCEPT fw net tcp www     " added.
Setting up Actions...
Creating action chain Drop
   Rule "REJECT - - tcp 113 -  - " added.
   Rule "dropBcast        " added.
   Rule "ACCEPT - - icmp fragmentation-needed -  - " added.
   Rule "ACCEPT - - icmp time-exceeded -  - " added.
   Rule "dropInvalid        " added.
   Rule "DROP - - udp 135,445 -  - " added.
   Rule "DROP - - udp 137:139 -  - " added.
   Rule "DROP - - udp 1024: 137  - " added.
   Rule "DROP - - tcp 135,139,445 -  - " added.
   Rule "DROP - - udp 1900 -  - " added.
   Rule "dropNotSyn - - tcp     " added.
   Rule "DROP - - udp - 53  - " added.
Creating action chain Reject
   Rule "REJECT - - tcp 113 -  - " added.
   Rule "dropBcast        " added.
   Rule "ACCEPT - - icmp fragmentation-needed -  - " added.
   Rule "ACCEPT - - icmp time-exceeded -  - " added.
   Rule "dropInvalid        " added.
   Rule "REJECT - - udp 135,445 -  - " added.
   Rule "REJECT - - udp 137:139 -  - " added.
   Rule "REJECT - - udp 1024: 137  - " added.
   Rule "REJECT - - tcp 135,139,445 -  - " added.
   Rule "DROP - - udp 1900 -  - " added.
   Rule "dropNotSyn - - tcp     " added.
   Rule "DROP - - udp - 53  - " added.
Creating action chain dropBcast
Creating action chain dropInvalid
Creating action chain dropNotSyn
Applying Policies...
Setting up Masquerading/SNAT...
   To 0.0.0.0/0 (all) from 192.168.0.0/22 through eth2 using 62.49.66.106
   To 0.0.0.0/0 (all) from 169.254.0.0/16 through eth2 using 62.49.66.106
   To 0.0.0.0/0 (all) from 192.168.10.1/32 through eth2 using 62.49.66.106
   To 0.0.0.0/0 (all) from 192.168.8.0/21 through eth2 using 62.49.66.106
   To 0.0.0.0/0 (all) from 169.254.0.0/16 through eth2 using 62.49.66.106
Activating Rules...
Adding IP Addresses...
Processing /etc/shorewall/start ...
ipset v2.2.9a: Set already exists
ipset v2.2.9a: Set already exists
Processing /etc/shorewall/started ...
done.
-------------------------------------------------------------------------
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2005.
http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to