Tom Eastep wrote:

>
>
> Please post your diagram again -- this time, use a text editor to draw
> it and attach it as a text attachment. We couldn't make any sense out
> of your last diagram because it was turned into nonsense by your mailer.
>
> mess-mate wrote:
>
>>>   
>> Hi,
>> attached the statux.txt.
>> a) it is
>> b)the machine is located in the dmz zone and is running very well
>> without any  entry  in /etc/shorewall/masq, for now
>
> You have chosen the name 'dmz' for the _only_ zone that this system
> interfaces to. But from the point of view of Netfilter (and
> Shorewall), this is just a standalone system with two IP addresses on
> its network interface. The fact that one of those addresses belongs to
> a Vserver guest is immaterial in so far as Shorewall is concerned.
>
>> c) no nat rules. The DNAT rule is given in the router machine and
>> redirect to my website actually on the host .
>
> So in other words, you have TWO systems running Shorewall?
>
>>       DNAT    $FW     dmz:192.168.20.1     tcp     80      -   $ETH0_IP
>> And i want my website in the vservers guest, so dmz:192.168.20.1 shall
>> become dmz:192.168.30.1 in the future when my problem is solved.
>
> So, if you "shorewall clear" on the Vserver host, does everything
> start working perfectly?
>
>>
>> Hope i clarify a little bit more :(
>
> Not really.
>
> If you have two Shorewall configurations, please collect a dump from
> both and describe exactly what doesn't work.
>
> -Tom
> ------------------------------------------------------------------------
>
>   
Here is:
- a shorewall dump from the router: status-router.txt
- a diagram : diagram-lan.txt
The answer for your last question (So, if you "shorewall clear" on the
Vserver host, does everything start working perfectly? ) is no. This is
why i add a shorewall dump of the router machine.
I can't access the internet from my vserver-guest
I can ping from the router to the vserver-guest and vice-versa.

mess-mate

Shorewall-3.2.6 Dump at router - mercredi 16 avril 2008, 19:02:32 (UTC+0200)

Counters reset mercredi 16 avril 2008, 18:36:13 (UTC+0200)

Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     0    --  lo     *       0.0.0.0/0            0.0.0.0/0   
        
   66 47817 ppp0_in    0    --  ppp0   *       0.0.0.0/0            0.0.0.0/0   
        
  308 23470 eth1_in    0    --  eth1   *       0.0.0.0/0            0.0.0.0/0   
        
    5   420 eth2_in    0    --  eth2   *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 eth0_in    0    --  eth0   *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 Drop       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 4 prefix `Shorewall:INPUT:DROP:' 
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
  292 17568 TCPMSS     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp flags:0x06/0x02 TCPMSS clamp to PMTU 
  847  142K ppp0_fwd   0    --  ppp0   *       0.0.0.0/0            0.0.0.0/0   
        
 1745  124K eth1_fwd   0    --  eth1   *       0.0.0.0/0            0.0.0.0/0   
        
 1004  196K eth2_fwd   0    --  eth2   *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 eth0_fwd   0    --  eth0   *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 Drop       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 4 prefix `Shorewall:FORWARD:DROP:' 
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain OUTPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     0    --  *      lo      0.0.0.0/0            0.0.0.0/0   
        
   71  7132 fw2net     0    --  *      ppp0    0.0.0.0/0            0.0.0.0/0   
        policy match dir out pol none 
  232 86301 fw2loc     0    --  *      eth1    0.0.0.0/0            0.0.0.0/0   
        policy match dir out pol none 
    5   420 fw2dmz     0    --  *      eth2    0.0.0.0/0            0.0.0.0/0   
        policy match dir out pol none 
    0     0 fw2rtr     0    --  *      eth0    0.0.0.0/0            0.0.0.0/0   
        policy match dir out pol none 
    0     0 Drop       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:OUTPUT:DROP:' 
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain Drop (10 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:113 
    0     0 dropBcast  0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 3 code 4 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 11 
    0     0 dropInvalid  0    --  *      *       0.0.0.0/0            0.0.0.0/0 
          
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,445 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:137:139 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:137 dpts:1024:65535 
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,139,445 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:1900 
    0     0 dropNotSyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0  
         
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:53 

Chain Reject (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:113 
    0     0 dropBcast  0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 3 code 4 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 11 
    0     0 dropInvalid  0    --  *      *       0.0.0.0/0            0.0.0.0/0 
          
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,445 
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:137:139 
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:137 dpts:1024:65535 
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,139,445 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:1900 
    0     0 dropNotSyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0  
         
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:53 

Chain all2all (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 Drop       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 4 prefix `Shorewall:all2all:DROP:' 
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain dmz2all (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 Drop       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:dmz2all:DROP:' 
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain dmz2fw (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    3   252 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    2   168 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 8 
    0     0 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain dmz2loc (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
  781  184K ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 8 
    0     0 Drop       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:dmz2loc:DROP:' 
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain dmz2net (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
  194 11009 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
   13   916 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:53 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:53 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 8 
   16   992 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain dropBcast (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        PKTTYPE = broadcast 
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        PKTTYPE = multicast 

Chain dropInvalid (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID 

Chain dropNotSyn (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp flags:!0x17/0x02 

Chain dynamic (8 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain eth0_fwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 dynamic    0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW 
    0     0 all2all    0    --  *      ppp0    0.0.0.0/0            0.0.0.0/0   
        policy match dir out pol none 
    0     0 rtr2loc    0    --  *      eth1    0.0.0.0/0            0.0.0.0/0   
        policy match dir out pol none 
    0     0 rtr2dmz    0    --  *      eth2    0.0.0.0/0            0.0.0.0/0   
        policy match dir out pol none 

Chain eth0_in (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 dynamic    0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW 
    0     0 all2all    0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        policy match dir in pol none 

Chain eth1_fwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
  259 16598 dynamic    0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW 
  783 49211 loc2net    0    --  *      ppp0    0.0.0.0/0            0.0.0.0/0   
        policy match dir out pol none 
  959 74303 loc2dmz    0    --  *      eth2    0.0.0.0/0            0.0.0.0/0   
        policy match dir out pol none 
    3   186 loc2rtr    0    --  *      eth0    0.0.0.0/0            0.0.0.0/0   
        policy match dir out pol none 

Chain eth1_in (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    9   546 dynamic    0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW 
  308 23470 loc2fw     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        policy match dir in pol none 

Chain eth2_fwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
   29  1908 dynamic    0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW 
  223 12917 dmz2net    0    --  *      ppp0    0.0.0.0/0            0.0.0.0/0   
        policy match dir out pol none 
  781  184K dmz2loc    0    --  *      eth1    0.0.0.0/0            0.0.0.0/0   
        policy match dir out pol none 
    0     0 dmz2all    0    --  *      eth0    0.0.0.0/0            0.0.0.0/0   
        policy match dir out pol none 

Chain eth2_in (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    2   168 dynamic    0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW 
    5   420 dmz2fw     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        policy match dir in pol none 

Chain fw2all (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 Drop       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:fw2all:DROP:' 
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain fw2dmz (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    2   168 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    3   252 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
192.168.20.1        tcp dpt:80 ctorigdst 86.192.36.220 
    0     0 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain fw2loc (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
  232 86301 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain fw2net (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
   59  6401 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    6   371 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:53 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:53 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    6   360 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:80 
    0     0 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain fw2rtr (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:80 
    0     0 fw2all     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain loc2all (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 Drop       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:loc2all:DROP:' 
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain loc2dmz (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
  942 73283 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:22 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 8 
   17  1020 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain loc2fw (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
  299 22924 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:22 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 8 
    6   360 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:3128 
    3   186 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain loc2net (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
  544 33819 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
  239 15392 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain loc2rtr (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:80 
    3   186 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain logdrop (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:logdrop:DROP:' 
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain logreject (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:logreject:REJECT:' 
    0     0 reject     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain net2all (3 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 Drop       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 4 prefix `Shorewall:net2all:DROP:' 
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain net2dmz (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
  266 71805 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
192.168.20.1        tcp dpt:80 ctorigdst 86.192.36.220 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
192.168.20.1        tcp dpt:443 ctorigdst 86.192.36.220 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
192.168.20.1        tcp dpt:80 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
192.168.20.1        tcp dpt:110 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
192.168.20.1        tcp dpt:25 
    0     0 net2all    0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain net2fw (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
   66 47817 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:443 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:443 
    0     0 DROP       icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 8 
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:22 
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:113 
    0     0 net2all    0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain net2loc (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
  581 70546 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 Drop       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:net2loc:DROP:' 
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain ppp0_fwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 dynamic    0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW 
  581 70546 net2loc    0    --  *      eth1    0.0.0.0/0            0.0.0.0/0   
        policy match dir out pol none 
  266 71805 net2dmz    0    --  *      eth2    0.0.0.0/0            0.0.0.0/0   
        policy match dir out pol none 
    0     0 net2all    0    --  *      eth0    0.0.0.0/0            0.0.0.0/0   
        policy match dir out pol none 

Chain ppp0_in (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 dynamic    0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW 
   66 47817 net2fw     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        policy match dir in pol none 

Chain reject (7 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       0    --  *      *       192.168.20.255       0.0.0.0/0   
        
    0     0 DROP       0    --  *      *       192.168.30.255       0.0.0.0/0   
        
    0     0 DROP       0    --  *      *       255.255.255.255      0.0.0.0/0   
        
    0     0 DROP       0    --  *      *       224.0.0.0/4          0.0.0.0/0   
        
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        PKTTYPE = broadcast 
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        PKTTYPE = multicast 
    0     0 DROP       0    --  *      *       192.168.20.255       0.0.0.0/0   
        
    0     0 DROP       0    --  *      *       192.168.30.255       0.0.0.0/0   
        
    0     0 DROP       0    --  *      *       255.255.255.255      0.0.0.0/0   
        
    0     0 DROP       0    --  *      *       224.0.0.0/4          0.0.0.0/0   
        
    0     0 REJECT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with tcp-reset 
    0     0 REJECT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with icmp-port-unreachable 
    0     0 REJECT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with icmp-host-unreachable 
    0     0 REJECT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with icmp-host-prohibited 

Chain rtr2dmz (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain rtr2loc (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain shorewall (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain smurfs (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        0    --  *      *       192.168.20.255       0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:' 
    0     0 DROP       0    --  *      *       192.168.20.255       0.0.0.0/0   
        
    0     0 LOG        0    --  *      *       192.168.30.255       0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:' 
    0     0 DROP       0    --  *      *       192.168.30.255       0.0.0.0/0   
        
    0     0 LOG        0    --  *      *       255.255.255.255      0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:' 
    0     0 DROP       0    --  *      *       255.255.255.255      0.0.0.0/0   
        
    0     0 LOG        0    --  *      *       224.0.0.0/4          0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:' 
    0     0 DROP       0    --  *      *       224.0.0.0/4          0.0.0.0/0   
        

Log (/var/log/messages)

Apr 16 13:48:39 net2all:DROP:IN=ppp0 OUT= SRC=220.165.8.32 DST=86.192.36.220 
LEN=404 TOS=0x00 PREC=0x00 TTL=47 ID=4140 PROTO=UDP SPT=1500 DPT=1434 LEN=384 
Apr 16 13:53:52 net2all:DROP:IN=ppp0 OUT= SRC=90.22.224.212 DST=86.192.36.220 
LEN=95 TOS=0x00 PREC=0x00 TTL=121 ID=16486 PROTO=UDP SPT=19373 DPT=36404 LEN=75 
Apr 16 14:00:36 net2all:DROP:IN=ppp0 OUT= SRC=202.97.238.204 DST=86.192.36.220 
LEN=485 TOS=0x00 PREC=0x00 TTL=48 ID=0 DF PROTO=UDP SPT=43508 DPT=1026 LEN=465 
Apr 16 14:30:15 net2all:DROP:IN=ppp0 OUT= SRC=218.64.237.219 DST=86.192.36.220 
LEN=404 TOS=0x00 PREC=0x00 TTL=113 ID=51743 PROTO=UDP SPT=1069 DPT=1434 LEN=384 
Apr 16 16:02:44 net2all:DROP:IN=ppp0 OUT= SRC=59.35.173.166 DST=86.192.36.220 
LEN=126 TOS=0x00 PREC=0x00 TTL=112 ID=48797 PROTO=UDP SPT=23859 DPT=64399 
LEN=106 
Apr 16 16:02:50 net2all:DROP:IN=ppp0 OUT= SRC=59.35.173.166 DST=86.192.36.220 
LEN=126 TOS=0x00 PREC=0x00 TTL=112 ID=49499 PROTO=UDP SPT=23859 DPT=64399 
LEN=106 
Apr 16 16:09:06 net2all:DROP:IN=ppp0 OUT= SRC=88.175.189.23 DST=86.192.36.220 
LEN=64 TOS=0x00 PREC=0x00 TTL=36 ID=27696 DF PROTO=TCP SPT=3283 DPT=5901 
WINDOW=53760 RES=0x00 SYN URGP=0 
Apr 16 16:09:09 net2all:DROP:IN=ppp0 OUT= SRC=88.175.189.23 DST=86.192.36.220 
LEN=64 TOS=0x00 PREC=0x00 TTL=36 ID=28765 DF PROTO=TCP SPT=3283 DPT=5901 
WINDOW=53760 RES=0x00 SYN URGP=0 
Apr 16 16:22:26 net2all:DROP:IN=ppp0 OUT= SRC=118.126.3.96 DST=86.192.36.220 
LEN=40 TOS=0x00 PREC=0x00 TTL=104 ID=25743 PROTO=TCP SPT=6000 DPT=1433 
WINDOW=16384 RES=0x00 SYN URGP=0 
Apr 16 17:13:14 net2all:DROP:IN=ppp0 OUT= SRC=62.118.48.18 DST=86.192.36.220 
LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=23578 DF PROTO=TCP SPT=1975 DPT=4899 
WINDOW=16384 RES=0x00 SYN URGP=0 
Apr 16 17:29:32 net2all:DROP:IN=ppp0 OUT= SRC=60.190.216.32 DST=86.192.36.220 
LEN=40 TOS=0x00 PREC=0x00 TTL=102 ID=256 PROTO=TCP SPT=6000 DPT=1433 
WINDOW=16384 RES=0x00 SYN URGP=0 
Apr 16 17:30:34 net2all:DROP:IN=ppp0 OUT= SRC=86.104.20.2 DST=86.192.36.220 
LEN=64 TOS=0x00 PREC=0x00 TTL=35 ID=39596 DF PROTO=TCP SPT=2479 DPT=1433 
WINDOW=53760 RES=0x00 SYN URGP=0 
Apr 16 17:30:37 net2all:DROP:IN=ppp0 OUT= SRC=86.104.20.2 DST=86.192.36.220 
LEN=64 TOS=0x00 PREC=0x00 TTL=35 ID=40705 DF PROTO=TCP SPT=2479 DPT=1433 
WINDOW=53760 RES=0x00 SYN URGP=0 
Apr 16 17:43:52 net2all:DROP:IN=ppp0 OUT= SRC=86.106.40.14 DST=86.192.36.220 
LEN=64 TOS=0x00 PREC=0x00 TTL=34 ID=40289 DF PROTO=TCP SPT=4145 DPT=5900 
WINDOW=53760 RES=0x00 SYN URGP=0 
Apr 16 17:50:39 net2all:DROP:IN=ppp0 OUT= SRC=221.208.208.86 DST=86.192.36.220 
LEN=486 TOS=0x00 PREC=0x00 TTL=47 ID=0 DF PROTO=UDP SPT=48603 DPT=1026 LEN=466 
Apr 16 18:21:02 net2all:DROP:IN=ppp0 OUT= SRC=80.12.242.49 DST=86.192.36.220 
LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=18471 PROTO=TCP SPT=33391 DPT=25 
WINDOW=5840 RES=0x00 SYN URGP=0 
Apr 16 18:21:05 net2all:DROP:IN=ppp0 OUT= SRC=80.12.242.49 DST=86.192.36.220 
LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=18472 PROTO=TCP SPT=33391 DPT=25 
WINDOW=5840 RES=0x00 SYN URGP=0 
Apr 16 18:21:11 net2all:DROP:IN=ppp0 OUT= SRC=80.12.242.49 DST=86.192.36.220 
LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=18473 PROTO=TCP SPT=33391 DPT=25 
WINDOW=5840 RES=0x00 SYN URGP=0 
Apr 16 18:21:23 net2all:DROP:IN=ppp0 OUT= SRC=80.12.242.49 DST=86.192.36.220 
LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=18474 PROTO=TCP SPT=33391 DPT=25 
WINDOW=5840 RES=0x00 SYN URGP=0 
Apr 16 18:21:40 net2all:DROP:IN=ppp0 OUT= SRC=211.101.27.118 DST=86.192.36.220 
LEN=40 TOS=0x00 PREC=0x00 TTL=101 ID=256 PROTO=TCP SPT=6000 DPT=2967 
WINDOW=16384 RES=0x00 SYN URGP=0 

NAT Table

Chain PREROUTING (policy ACCEPT 239 packets, 15524 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 net_dnat   0    --  ppp0   *       0.0.0.0/0            0.0.0.0/0   
        policy match dir in pol none 
  223 14444 loc_dnat   0    --  eth1   *       0.0.0.0/0            0.0.0.0/0   
        policy match dir in pol none 

Chain POSTROUTING (policy ACCEPT 35 packets, 2189 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
  226 14695 ppp0_masq  0    --  *      ppp0    0.0.0.0/0            0.0.0.0/0   
        

Chain OUTPUT (policy ACCEPT 15 packets, 983 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DNAT       tcp  --  *      *       0.0.0.0/0            
86.192.36.220       tcp dpt:80 to:192.168.20.1 

Chain loc_dnat (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    6   360 REDIRECT   tcp  --  *      *       0.0.0.0/0           
!192.168.20.1        tcp dpt:80 redir ports 3128 

Chain net_dnat (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DNAT       tcp  --  *      *       0.0.0.0/0            
86.192.36.220       tcp dpt:80 to:192.168.20.1 
    0     0 DNAT       tcp  --  *      *       0.0.0.0/0            
86.192.36.220       tcp dpt:443 to:192.168.20.1 

Chain ppp0_masq (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
  194 12692 MASQUERADE  0    --  *      *       192.168.10.0/24      0.0.0.0/0  
         policy match dir out pol none 
   20  1272 MASQUERADE  0    --  *      *       192.168.20.0/24      0.0.0.0/0  
         policy match dir out pol none 
    0     0 MASQUERADE  0    --  *      *       192.168.30.0/24      0.0.0.0/0  
         policy match dir out pol none 
    0     0 MASQUERADE  0    --  *      *       192.168.1.0/24       0.0.0.0/0  
         policy match dir out pol none 

Mangle Table

Chain PREROUTING (policy ACCEPT 3975 packets, 534K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
 3975  534K tcpre      0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain INPUT (policy ACCEPT 379 packets, 71707 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain FORWARD (policy ACCEPT 3596 packets, 463K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
 3596  463K tcfor      0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain OUTPUT (policy ACCEPT 2850K packets, 2286M bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
  308 93853 tcout      0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain POSTROUTING (policy ACCEPT 3904 packets, 556K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
 3904  556K tcpost     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain tcfor (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain tcout (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain tcpost (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain tcpre (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Conntrack Table

tcp      6 431700 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=55678 
dport=143 packets=21 bytes=1728 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=55678 packets=18 bytes=2638 [ASSURED] mark=0 use=1
tcp      6 431700 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=55680 
dport=143 packets=16 bytes=1366 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=55680 packets=13 bytes=1804 [ASSURED] mark=0 use=1
udp      17 10 src=192.168.10.6 dst=80.10.246.2 sport=34363 dport=53 packets=31 
bytes=2025 src=80.10.246.2 dst=86.192.36.220 sport=53 dport=34363 packets=31 
bytes=3228 [ASSURED] mark=0 use=1
tcp      6 431700 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=55676 
dport=143 packets=24 bytes=2114 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=55676 packets=21 bytes=3352 [ASSURED] mark=0 use=1
tcp      6 431670 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=42144 
dport=143 packets=36 bytes=2223 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=42144 packets=25 bytes=6640 [ASSURED] mark=0 use=1
tcp      6 431700 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=42147 
dport=143 packets=21 bytes=1577 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=42147 packets=12 bytes=1666 [ASSURED] mark=0 use=1
tcp      6 431700 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=55677 
dport=143 packets=22 bytes=1453 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=55677 packets=19 bytes=2619 [ASSURED] mark=0 use=1
tcp      6 430475 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=42143 
dport=143 packets=18 bytes=1288 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=42143 packets=13 bytes=1718 [ASSURED] mark=0 use=1
tcp      6 43 SYN_SENT src=192.168.10.6 dst=207.241.224.5 sport=39742 dport=53 
packets=6 bytes=360 [UNREPLIED] src=207.241.224.5 dst=86.192.36.220 sport=53 
dport=39742 packets=0 bytes=0 mark=0 use=1
tcp      6 430475 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=42148 
dport=143 packets=11 bytes=753 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=42148 packets=7 bytes=972 [ASSURED] mark=0 use=1
tcp      6 431670 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=42149 
dport=143 packets=127 bytes=10071 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=42149 packets=100 bytes=41503 [ASSURED] mark=0 use=1
tcp      6 431700 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=55675 
dport=143 packets=22 bytes=1448 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=55675 packets=19 bytes=2835 [ASSURED] mark=0 use=1
tcp      6 431700 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=55679 
dport=143 packets=19 bytes=1638 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=55679 packets=15 bytes=2125 [ASSURED] mark=0 use=1
tcp      6 430475 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=42142 
dport=143 packets=20 bytes=1296 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=42142 packets=15 bytes=2100 [ASSURED] mark=0 use=1
tcp      6 431998 ESTABLISHED src=192.168.10.6 dst=192.168.1.1 sport=42948 
dport=22 packets=3516 bytes=267079 src=192.168.1.1 dst=192.168.10.6 sport=22 
dport=42948 packets=3089 bytes=2277955 [ASSURED] mark=0 use=1
tcp      6 431671 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=42145 
dport=143 packets=189 bytes=17469 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=42145 packets=135 bytes=23127 [ASSURED] mark=0 use=1
tcp      6 431700 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=42141 
dport=143 packets=25 bytes=1875 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=42141 packets=16 bytes=2238 [ASSURED] mark=0 use=1
tcp      6 431700 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=42140 
dport=143 packets=31 bytes=1965 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=42140 packets=23 bytes=2850 [ASSURED] mark=0 use=1
tcp      6 431671 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=42139 
dport=143 packets=285 bytes=21243 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=42139 packets=274 bytes=49640 [ASSURED] mark=0 use=1
tcp      6 431671 ESTABLISHED src=192.168.10.6 dst=192.168.20.1 sport=42157 
dport=143 packets=72 bytes=4796 src=192.168.20.1 dst=192.168.10.6 sport=143 
dport=42157 packets=56 bytes=35729 [ASSURED] mark=0 use=1

IP Configuration

1: lo: <LOOPBACK,UP,10000> mtu 16436 qdisc noqueue 
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
    inet6 ::1/128 scope host 
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,10000> mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:06:29:34:4c:40 brd ff:ff:ff:ff:ff:ff
    inet 192.168.1.1/24 brd 192.168.1.255 scope global eth0
    inet6 fe80::206:29ff:fe34:4c40/64 scope link 
       valid_lft forever preferred_lft forever
3: eth1: <BROADCAST,MULTICAST,UP,10000> mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:50:ba:f1:65:2f brd ff:ff:ff:ff:ff:ff
    inet 192.168.10.254/24 brd 192.168.10.255 scope global eth1
    inet6 fe80::250:baff:fef1:652f/64 scope link 
       valid_lft forever preferred_lft forever
4: eth2: <BROADCAST,MULTICAST,UP,10000> mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:a0:cc:3f:48:3e brd ff:ff:ff:ff:ff:ff
    inet 192.168.20.254/24 brd 192.168.20.255 scope global eth2
    inet6 fe80::2a0:ccff:fe3f:483e/64 scope link 
       valid_lft forever preferred_lft forever
5: sit0: <NOARP> mtu 1480 qdisc noop 
    link/sit 0.0.0.0 brd 0.0.0.0
9: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP,10000> mtu 1492 qdisc pfifo_fast qlen 3
    link/ppp 
    inet 86.192.36.220 peer 193.253.160.3/32 scope global ppp0

IP Stats

1: lo: <LOOPBACK,UP,10000> mtu 16436 qdisc noqueue 
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    RX: bytes  packets  errors  dropped overrun mcast   
    2492       29       0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    2492       29       0       0       0       0      
2: eth0: <BROADCAST,MULTICAST,UP,10000> mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:06:29:34:4c:40 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    2335828664 3401673  0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    339114829  2918889  0       0       0       0      
3: eth1: <BROADCAST,MULTICAST,UP,10000> mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:50:ba:f1:65:2f brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    600063175  3401743  0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    2784228669 3952909  0       0       0       0      
4: eth2: <BROADCAST,MULTICAST,UP,10000> mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:a0:cc:3f:48:3e brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    789208158  1510368  1       30      0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    964823780  1562964  0       0       0       0      
5: sit0: <NOARP> mtu 1480 qdisc noop 
    link/sit 0.0.0.0 brd 0.0.0.0
    RX: bytes  packets  errors  dropped overrun mcast   
    0          0        0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    0          0        0       0       0       0      
9: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP,10000> mtu 1492 qdisc pfifo_fast qlen 3
    link/ppp 
    RX: bytes  packets  errors  dropped overrun mcast   
    508446833  456869   0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    21042622   301473   0       0       0       0      

/proc

   /proc/version = Linux version 2.6.18-4-486 (Debian 2.6.18.dfsg.1-12etch2) 
([EMAIL PROTECTED]) (gcc version 4.1.2 20061115 (prerelease) (Debian 4.1.1-21)) 
#1 Wed May 9 22:23:40 UTC 2007
   /proc/sys/net/ipv4/ip_forward = 1
   /proc/sys/net/ipv4/icmp_echo_ignore_all = 0
   /proc/sys/net/ipv4/conf/all/proxy_arp = 0
   /proc/sys/net/ipv4/conf/all/arp_filter = 0
   /proc/sys/net/ipv4/conf/all/arp_ignore = 0
   /proc/sys/net/ipv4/conf/all/rp_filter = 1
   /proc/sys/net/ipv4/conf/all/log_martians = 0
   /proc/sys/net/ipv4/conf/default/proxy_arp = 0
   /proc/sys/net/ipv4/conf/default/arp_filter = 0
   /proc/sys/net/ipv4/conf/default/arp_ignore = 0
   /proc/sys/net/ipv4/conf/default/rp_filter = 1
   /proc/sys/net/ipv4/conf/default/log_martians = 0
   /proc/sys/net/ipv4/conf/eth0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/eth0/arp_filter = 0
   /proc/sys/net/ipv4/conf/eth0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/eth0/rp_filter = 0
   /proc/sys/net/ipv4/conf/eth0/log_martians = 0
   /proc/sys/net/ipv4/conf/eth1/proxy_arp = 0
   /proc/sys/net/ipv4/conf/eth1/arp_filter = 0
   /proc/sys/net/ipv4/conf/eth1/arp_ignore = 0
   /proc/sys/net/ipv4/conf/eth1/rp_filter = 0
   /proc/sys/net/ipv4/conf/eth1/log_martians = 0
   /proc/sys/net/ipv4/conf/eth2/proxy_arp = 0
   /proc/sys/net/ipv4/conf/eth2/arp_filter = 0
   /proc/sys/net/ipv4/conf/eth2/arp_ignore = 0
   /proc/sys/net/ipv4/conf/eth2/rp_filter = 0
   /proc/sys/net/ipv4/conf/eth2/log_martians = 0
   /proc/sys/net/ipv4/conf/lo/proxy_arp = 0
   /proc/sys/net/ipv4/conf/lo/arp_filter = 0
   /proc/sys/net/ipv4/conf/lo/arp_ignore = 0
   /proc/sys/net/ipv4/conf/lo/rp_filter = 0
   /proc/sys/net/ipv4/conf/lo/log_martians = 0
   /proc/sys/net/ipv4/conf/ppp0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/ppp0/arp_filter = 0
   /proc/sys/net/ipv4/conf/ppp0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/ppp0/rp_filter = 0
   /proc/sys/net/ipv4/conf/ppp0/log_martians = 0

Routing Rules

0:      from all lookup 255 
32766:  from all lookup main 
32767:  from all lookup default 

Table 255:

local 192.168.1.1 dev eth0  proto kernel  scope host  src 192.168.1.1 
broadcast 192.168.1.0 dev eth0  proto kernel  scope link  src 192.168.1.1 
broadcast 127.255.255.255 dev lo  proto kernel  scope link  src 127.0.0.1 
local 192.168.10.254 dev eth1  proto kernel  scope host  src 192.168.10.254 
broadcast 192.168.10.255 dev eth1  proto kernel  scope link  src 192.168.10.254 
broadcast 192.168.20.255 dev eth2  proto kernel  scope link  src 192.168.20.254 
local 86.192.36.220 dev ppp0  proto kernel  scope host  src 86.192.36.220 
local 192.168.20.254 dev eth2  proto kernel  scope host  src 192.168.20.254 
broadcast 192.168.1.255 dev eth0  proto kernel  scope link  src 192.168.1.1 
broadcast 192.168.10.0 dev eth1  proto kernel  scope link  src 192.168.10.254 
broadcast 192.168.20.0 dev eth2  proto kernel  scope link  src 192.168.20.254 
broadcast 127.0.0.0 dev lo  proto kernel  scope link  src 127.0.0.1 
local 127.0.0.1 dev lo  proto kernel  scope host  src 127.0.0.1 
local 127.0.0.0/8 dev lo  proto kernel  scope host  src 127.0.0.1 

Table default:


Table main:

193.253.160.3 dev ppp0  proto kernel  scope link  src 86.192.36.220 
192.168.20.0/24 dev eth2  proto kernel  scope link  src 192.168.20.254 
192.168.1.0/24 dev eth0  proto kernel  scope link  src 192.168.1.1 
192.168.30.0/24 via 192.168.20.254 dev eth2 
192.168.10.0/24 dev eth1  proto kernel  scope link  src 192.168.10.254 
default dev ppp0  scope link 

ARP

? (192.168.1.254) at 00:0E:50:AA:B5:8A [ether] on eth0
? (192.168.10.6) at 00:80:C8:EC:94:29 [ether] on eth1
? (192.168.30.1) at 00:E0:29:3C:34:BD [ether] on eth2
? (192.168.20.1) at 00:E0:29:3C:34:BD [ether] on eth2
? (192.168.10.4) at 00:80:C8:EC:92:B5 [ether] on eth1

Modules

iptable_raw             2176  0 
ipt_ULOG                7812  0 
ipt_TTL                 2432  0 
ipt_ttl                 2048  0 
ipt_TOS                 2432  0 
ipt_tos                 1792  0 
ipt_SAME                2560  0 
ipt_REJECT              5248  4 
ipt_REDIRECT            2304  1 
ipt_recent              8464  0 
ipt_owner               2176  0 
ipt_NETMAP              2304  0 
ipt_MASQUERADE          3584  4 
ipt_LOG                 6016  16 
ipt_iprange             1920  0 
ipt_hashlimit           8712  0 
ipt_ECN                 3200  0 
ipt_ecn                 2432  0 
ipt_DSCP                2432  0 
ipt_dscp                1920  0 
ipt_CLUSTERIP           7940  0 
ipt_ah                  2048  0 
ipt_addrtype            2048  0 
ip_nat_tftp             2048  0 
ip_nat_snmp_basic       9348  0 
ip_nat_pptp             6020  0 
ip_nat_irc              2816  0 
ip_nat_ftp              3456  0 
ip_nat_amanda           2432  0 
ip_conntrack_tftp       4472  1 ip_nat_tftp
ip_conntrack_pptp      10640  1 ip_nat_pptp
ip_conntrack_netbios_ns     3072  0 
ip_conntrack_irc        6896  1 ip_nat_irc
ip_conntrack_ftp        7536  1 ip_nat_ftp
ip_conntrack_amanda     4996  1 ip_nat_amanda
iptable_nat             7044  1 
ip_nat                 16428  10 
ipt_SAME,ipt_REDIRECT,ipt_NETMAP,ipt_MASQUERADE,ip_nat_tftp,ip_nat_pptp,ip_nat_irc,ip_nat_ftp,ip_nat_amanda,iptable_nat
ip_conntrack           47156  20 
ipt_MASQUERADE,ip_nat_tftp,ip_nat_snmp_basic,ip_nat_pptp,ip_nat_irc,ip_nat_ftp,ip_nat_amanda,ip_conntrack_tftp,ip_conntrack_pptp,ip_conntrack_netbios_ns,ip_conntrack_irc,ip_conntrack_ftp,ip_conntrack_amanda,xt_helper,xt_conntrack,xt_CONNMARK,xt_connmark,xt_state,iptable_nat,ip_nat
iptable_filter          3200  1 
ipt_TCPMSS              4224  1 
iptable_mangle          2944  1 
ip_tables              12104  4 
iptable_raw,iptable_nat,iptable_filter,iptable_mangle

Shorewall has detected the following iptables/netfilter capabilities:
   NAT: Available
   Packet Mangling: Available
   Multi-port Match: Available
   Extended Multi-port Match: Available
   Connection Tracking Match: Available
   Packet Type Match: Available
   Policy Match: Available
   Physdev Match: Available
   Packet length Match: Available
   IP range Match: Available
   Recent Match: Available
   Owner Match: Available
   Ipset Match: Not available
   CONNMARK Target: Available
   Extended CONNMARK Target: Available
   Connmark Match: Available
   Extended Connmark Match: Available
   Raw Table: Available
   IPP2P Match: Not available
   CLASSIFY Target: Available
   Extended REJECT: Available
   Repeat match: Available
   MARK Target: Available
   Extended MARK Target: Available
   Mangle FORWARD Chain: Available

Traffic Control

Device eth0:
qdisc pfifo_fast 0: bands 3 priomap  1 2 2 2 1 2 0 0 1 1 1 1 1 1 1 1
 Sent 339114829 bytes 2918889 pkt (dropped 0, overlimits 0 requeues 0) 
 rate 0bit 0pps backlog 0b 0p requeues 0 

Device eth1:
qdisc pfifo_fast 0: bands 3 priomap  1 2 2 2 1 2 0 0 1 1 1 1 1 1 1 1
 Sent 2784228669 bytes 3952909 pkt (dropped 0, overlimits 0 requeues 0) 
 rate 0bit 0pps backlog 0b 0p requeues 0 

Device eth2:
qdisc pfifo_fast 0: bands 3 priomap  1 2 2 2 1 2 0 0 1 1 1 1 1 1 1 1
 Sent 964823780 bytes 1562964 pkt (dropped 0, overlimits 0 requeues 0) 
 rate 0bit 0pps backlog 0b 0p requeues 0 

Device ppp0:
qdisc pfifo_fast 0: bands 3 priomap  1 2 2 2 1 2 0 0 1 1 1 1 1 1 1 1
 Sent 21042592 bytes 301470 pkt (dropped 0, overlimits 0 requeues 0) 
 rate 0bit 0pps backlog 0b 0p requeues 0 


TC Filters

Device eth0:

Device eth1:

Device eth2:

Device ppp0:


Diagram
                                                                       
                           ------------------------------               
----------------------------------
                           | shorewall  loc/dmz/net/rtr |               |  DMZ  
        ----------------  |
internet(ppp0) --> machine1|         eth1/eth2/ppp0/eth0| ---> machine2 | 
server eth1   | guest vserver | |
        modem              | squid                      |               | 
vserver (host)|     eth1      | |
                           | routing    192.168.1.1     |               | 
192.168.20.1  | 192.168.30.1  | |
                           ------------------------------               | 
shorewall     ----------------- |
                                        |                               
-----------------------------------
                                        |
                              LAN machines 192.168.xx.xx
                                  + shorewall each

There is no other ethx in machine 2 !! 
-------------------------------------------------------------------------
This SF.net email is sponsored by the 2008 JavaOne(SM) Conference 
Don't miss this year's exciting event. There's still time to save $100. 
Use priority code J8TL2D2. 
http://ad.doubleclick.net/clk;198757673;13503038;p?http://java.sun.com/javaone
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to