Hello,
I can?t connect my Webserver from the Internet.
Here is my net-structure:
Webserver 192.168.3.203 (DMZ)
|
Internet --- Firewall/Router (mit 3 Netzwerkkarten)
|
Local Netzwerk 192.168.1.X (loc)
The Firewall should forward all requests from the Internet to the
webserver. But it does?t run. All requests are answered from the Firewall.
* From the local Network I can connect the Webserver (192.168.4.203). I
get the Apache2-Message on my browser.
* If I try to connect from the Internet I get the Apache2-answer from
the apache2-service on the firewall. I want stop the apache2-service on
the firewall (security).
But I don?t understand why I get the answer from the firewall and not
from the webserver. Forwarding is activated.
Could someone give me tipp?
Thank you!
Tony
/etc/shorewall/interfaces
#ZONE INTERFACE BROADCAST OPTIONS
net ppp0 detect
tcpflags,dhcp,routefilter,norfc1918,nosmurfs,logmartians
loc eth0 detect tcpflags,detectnets,nosmurfs
dmz eth2 detect
/etc/shorewall/zones
#ZONE TYPE OPTIONS IN OUT
fw firewall
net ipv4
loc ipv4
dmz ipv4
/etc/shorewall/masq
#INTERFACE SUBNET ADDRESS PROTO PORT(S)
IPSEC
ppp0 eth0
ppp0 eth2
/etc/shorewall/policy
#SOURCE DEST POLICY LOG LEVEL LIMIT:BURST
loc net ACCEPT
loc dmz REJECT info
loc $FW REJECT info
loc all REJECT info
$FW net REJECT info
$FW dmz REJECT info
$FW loc REJECT info
$FW all REJECT info
dmz net ACCEPT info
dmz $FW REJECT info
dmz loc REJECT info
dmz all REJECT info
net dmz DROP info
net $FW DROP info
net loc DROP info
net all DROP info
all all REJECT info
/etc/shorewall/rules
#ACTION SOURCE DEST PROTO DEST SOURCE
ORIGINAL RATE USER/
# Accept DNS connections from the firewall to the Internet
DNS/ACCEPT $FW net
# Accept SSH connections from the local network to the firewall and DMZ
SSH/ACCEPT loc $FW
SSH/ACCEPT loc dmz
# DMZ DNS access to the Internet
DNS/ACCEPT dmz net
# DNS Zugriff aus loc und DMZ
DNS/ACCEPT loc net
DNS/ACCEPT loc $FW
DNS/ACCEPT dmz $FW
# Reject Ping from the "bad" net zone.
Ping/REJECT net $FW
# Make ping work bi-directionally between the dmz, net, Firewall and
local zone
Ping/ACCEPT loc $FW
Ping/ACCEPT dmz $FW
Ping/ACCEPT loc dmz
Ping/ACCEPT dmz loc
Ping/ACCEPT dmz net
Ping/ACCEPT loc net
ACCEPT $FW net icmp
ACCEPT $FW loc icmp
ACCEPT $FW dmz icmp
# loc -> dmz
Web/ACCEPT loc dmz:192.168.3.203
Web/ACCEPT loc $FW
# Weiterleiten der Web-Anfragen an den Webserver
DNAT net dmz:192.168.3.203:80 tcp 80
# Zugang zu FTP
FTP/ACCEPT loc dmz:192.168.3.203
FTP/ACCEPT loc $FW
FTP/ACCEPT $FW dmz:192.168.3.203
FTP/ACCEPT net $FW
# für aptitude
Web/ACCEPT dmz net
Web/ACCEPT $FW net
ACCEPT $FW net udp 45558
# Zeitsyncronisation per NTP
NTP/ACCEPT dmz net
NTP/ACCEPT $FW net
NTP/ACCEPT loc net
# Absenden von Mails vom Webserver an den Mailserver im Local-Net
ACCEPT dmz loc tcp smtp
ACCEPT dmz net tcp smtp
ACCEPT $FW net tcp smtp
ACCEPT net $FW tcp smtp
ACCEPT net $FW udp 45558
Shorewall-3.2.6 Dump at micky - So 11. Jan 22:34:56 CET 2009
Counters reset So 11. Jan 22:30:43 CET 2009
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT 0 -- lo * 0.0.0.0/0 0.0.0.0/0
49 6940 ppp0_in 0 -- ppp0 * 0.0.0.0/0 0.0.0.0/0
1397 105K eth0_in 0 -- eth0 * 0.0.0.0/0 0.0.0.0/0
0 0 eth2_in 0 -- eth2 * 0.0.0.0/0 0.0.0.0/0
0 0 Reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:'
0 0 reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
102 6120 TCPMSS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp flags:0x06/0x02 TCPMSS clamp to PMTU
520 72106 ppp0_fwd 0 -- ppp0 * 0.0.0.0/0 0.0.0.0/0
547 52253 eth0_fwd 0 -- eth0 * 0.0.0.0/0 0.0.0.0/0
25 5154 eth2_fwd 0 -- eth2 * 0.0.0.0/0 0.0.0.0/0
0 0 Reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:'
0 0 reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT 0 -- * lo 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT udp -- * ppp0 0.0.0.0/0 0.0.0.0/0
udp dpts:67:68
43 2591 fw2net 0 -- * ppp0 0.0.0.0/0 0.0.0.0/0
1378 158K fw2loc 0 -- * eth0 0.0.0.0/0
192.168.1.0/24
0 0 fw2loc 0 -- * eth0 0.0.0.0/0
255.255.255.255
0 0 fw2loc 0 -- * eth0 0.0.0.0/0 224.0.0.0/4
0 0 fw2dmz 0 -- * eth2 0.0.0.0/0 0.0.0.0/0
0 0 Reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:OUTPUT:REJECT:'
0 0 reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain Drop (4 references)
pkts bytes target prot opt in out source destination
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:113
6 1450 dropBcast 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 3 code 4
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 11
6 1450 dropInvalid 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,445
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpts:137:139
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:137 dpts:1024:65535
4 208 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,139,445
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:1900
0 0 dropNotSyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:53
Chain Reject (14 references)
pkts bytes target prot opt in out source destination
4 240 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:113
1 78 dropBcast 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 3 code 4
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 11
0 0 dropInvalid 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,445
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpts:137:139
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:137 dpts:1024:65535
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,139,445
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:1900
0 0 dropNotSyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:53
Chain all2all (0 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 Reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:all2all:REJECT:'
0 0 reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain dmz2all (0 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 Reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:dmz2all:REJECT:'
0 0 reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain dmz2fw (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:53
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:53
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 8
0 0 Reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:dmz2fw:REJECT:'
0 0 reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain dmz2loc (1 references)
pkts bytes target prot opt in out source destination
4 352 ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 8
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:25
0 0 Reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:dmz2loc:REJECT:'
0 0 reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain dmz2net (1 references)
pkts bytes target prot opt in out source destination
19 4650 ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:53
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:53
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 8
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:443
2 152 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:123
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:25
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:dmz2net:ACCEPT:'
0 0 ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain dropBcast (2 references)
pkts bytes target prot opt in out source destination
1 78 DROP 0 -- * * 0.0.0.0/0
192.168.1.255
0 0 DROP 0 -- * * 0.0.0.0/0
192.168.3.255
0 0 DROP 0 -- * * 0.0.0.0/0
255.255.255.255
0 0 DROP 0 -- * * 0.0.0.0/0 224.0.0.0/4
Chain dropInvalid (2 references)
pkts bytes target prot opt in out source destination
0 0 DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0
state INVALID
Chain dropNotSyn (2 references)
pkts bytes target prot opt in out source destination
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp flags:!0x17/0x02
Chain dynamic (6 references)
pkts bytes target prot opt in out source destination
Chain eth0_fwd (1 references)
pkts bytes target prot opt in out source destination
62 5610 dynamic 0 -- * * 0.0.0.0/0 0.0.0.0/0
state INVALID,NEW
62 5610 smurfs 0 -- * * 0.0.0.0/0 0.0.0.0/0
state INVALID,NEW
531 49127 tcpflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
544 52045 loc2net 0 -- * ppp0 192.168.1.0/24 0.0.0.0/0
3 208 loc2dmz 0 -- * eth2 192.168.1.0/24 0.0.0.0/0
Chain eth0_in (1 references)
pkts bytes target prot opt in out source destination
27 1692 dynamic 0 -- * * 0.0.0.0/0 0.0.0.0/0
state INVALID,NEW
27 1692 smurfs 0 -- * * 0.0.0.0/0 0.0.0.0/0
state INVALID,NEW
1239 95036 tcpflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
1397 105K loc2fw 0 -- * * 192.168.1.0/24 0.0.0.0/0
Chain eth2_fwd (1 references)
pkts bytes target prot opt in out source destination
2 152 dynamic 0 -- * * 0.0.0.0/0 0.0.0.0/0
state INVALID,NEW
21 4802 dmz2net 0 -- * ppp0 0.0.0.0/0 0.0.0.0/0
4 352 dmz2loc 0 -- * eth0 0.0.0.0/0
192.168.1.0/24
Chain eth2_in (1 references)
pkts bytes target prot opt in out source destination
0 0 dynamic 0 -- * * 0.0.0.0/0 0.0.0.0/0
state INVALID,NEW
0 0 dmz2fw 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain fw2all (0 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 Reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:fw2all:REJECT:'
0 0 reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain fw2dmz (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT tcp -- * * 0.0.0.0/0
192.168.3.203 tcp dpt:21
0 0 Reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:fw2dmz:REJECT:'
0 0 reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain fw2loc (3 references)
pkts bytes target prot opt in out source destination
1374 158K ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
4 240 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:25
0 0 Reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:fw2loc:REJECT:'
0 0 reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain fw2net (1 references)
pkts bytes target prot opt in out source destination
20 1148 ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
23 1443 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:53
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:53
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:443
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:45558
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:123
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:25
0 0 Reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:fw2net:REJECT:'
0 0 reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain loc2all (0 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 Reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:loc2all:REJECT:'
0 0 reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain loc2dmz (1 references)
pkts bytes target prot opt in out source destination
3 208 ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:22
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 8
0 0 ACCEPT tcp -- * * 0.0.0.0/0
192.168.3.203 tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0
192.168.3.203 tcp dpt:443
0 0 ACCEPT tcp -- * * 0.0.0.0/0
192.168.3.203 tcp dpt:21
0 0 Reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:loc2dmz:REJECT:'
0 0 reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain loc2fw (1 references)
pkts bytes target prot opt in out source destination
1370 103K ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:22
22 1374 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:53
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:53
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 8
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:443
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:21
5 318 Reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:loc2fw:REJECT:'
0 0 reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain loc2net (1 references)
pkts bytes target prot opt in out source destination
482 46435 ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:53
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:53
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 8
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:123
62 5610 ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain logdrop (0 references)
pkts bytes target prot opt in out source destination
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:logdrop:DROP:'
0 0 DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain logflags (5 references)
pkts bytes target prot opt in out source destination
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:logflags:DROP:'
0 0 DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain logreject (0 references)
pkts bytes target prot opt in out source destination
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:logreject:REJECT:'
0 0 reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2all (0 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 Drop 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:net2all:DROP:'
0 0 DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2dmz (1 references)
pkts bytes target prot opt in out source destination
12 1014 ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
2 120 ACCEPT tcp -- * * 0.0.0.0/0
192.168.3.203 tcp dpt:80
0 0 Drop 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:net2dmz:DROP:'
0 0 DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2fw (1 references)
pkts bytes target prot opt in out source destination
43 5490 ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 reject icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 8
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:21
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:25
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:45558
6 1450 Drop 0 -- * * 0.0.0.0/0 0.0.0.0/0
2 1242 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:net2fw:DROP:'
2 1242 DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2loc (1 references)
pkts bytes target prot opt in out source destination
506 70972 ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 Drop 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:net2loc:DROP:'
0 0 DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain norfc1918 (2 references)
pkts bytes target prot opt in out source destination
0 0 rfc1918 0 -- * * 172.16.0.0/12 0.0.0.0/0
0 0 rfc1918 0 -- * * 192.168.0.0/16 0.0.0.0/0
0 0 rfc1918 0 -- * * 10.0.0.0/8 0.0.0.0/0
Chain ppp0_fwd (1 references)
pkts bytes target prot opt in out source destination
2 120 dynamic 0 -- * * 0.0.0.0/0 0.0.0.0/0
state INVALID,NEW
2 120 smurfs 0 -- * * 0.0.0.0/0 0.0.0.0/0
state INVALID,NEW
2 120 norfc1918 0 -- * * 0.0.0.0/0 0.0.0.0/0
state NEW
508 70744 tcpflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
506 70972 net2loc 0 -- * eth0 0.0.0.0/0
192.168.1.0/24
14 1134 net2dmz 0 -- * eth2 0.0.0.0/0 0.0.0.0/0
Chain ppp0_in (1 references)
pkts bytes target prot opt in out source destination
6 1450 dynamic 0 -- * * 0.0.0.0/0 0.0.0.0/0
state INVALID,NEW
6 1450 smurfs 0 -- * * 0.0.0.0/0 0.0.0.0/0
state INVALID,NEW
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpts:67:68
6 1450 norfc1918 0 -- * * 0.0.0.0/0 0.0.0.0/0
state NEW
4 208 tcpflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
49 6940 net2fw 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain reject (22 references)
pkts bytes target prot opt in out source destination
0 0 DROP 0 -- * * 255.255.255.255 0.0.0.0/0
0 0 DROP 0 -- * * 224.0.0.0/4 0.0.0.0/0
0 0 DROP 0 -- * * 0.0.0.0/0
192.168.1.255
0 0 DROP 0 -- * * 0.0.0.0/0
192.168.3.255
0 0 DROP 0 -- * * 0.0.0.0/0
255.255.255.255
0 0 DROP 0 -- * * 0.0.0.0/0 224.0.0.0/4
0 0 DROP 0 -- * * 255.255.255.255 0.0.0.0/0
0 0 DROP 0 -- * * 224.0.0.0/4 0.0.0.0/0
4 240 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with tcp-reset
0 0 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-port-unreachable
0 0 REJECT icmp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-host-unreachable
0 0 REJECT 0 -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-host-prohibited
Chain rfc1918 (3 references)
pkts bytes target prot opt in out source destination
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:rfc1918:DROP:'
0 0 DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain shorewall (0 references)
pkts bytes target prot opt in out source destination
Chain smurfs (4 references)
pkts bytes target prot opt in out source destination
0 0 LOG 0 -- * * 192.168.1.255 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:'
0 0 DROP 0 -- * * 192.168.1.255 0.0.0.0/0
0 0 LOG 0 -- * * 192.168.3.255 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:'
0 0 DROP 0 -- * * 192.168.3.255 0.0.0.0/0
0 0 LOG 0 -- * * 255.255.255.255 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:'
0 0 DROP 0 -- * * 255.255.255.255 0.0.0.0/0
0 0 LOG 0 -- * * 224.0.0.0/4 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:'
0 0 DROP 0 -- * * 224.0.0.0/4 0.0.0.0/0
Chain tcpflags (4 references)
pkts bytes target prot opt in out source destination
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp flags:0x3F/0x29
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp flags:0x3F/0x00
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp flags:0x06/0x06
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp flags:0x03/0x03
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp spt:0 flags:0x17/0x02
Log (/var/log/messages)
Jan 11 22:20:02 loc2fw:REJECT:IN=eth0 OUT= SRC=192.168.1.200 DST=192.168.1.254
LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=14196 DF PROTO=TCP SPT=59599 DPT=4949
WINDOW=5840 RES=0x00 SYN URGP=0
Jan 11 22:20:51 fw2loc:REJECT:IN= OUT=eth0 SRC=192.168.1.254 DST=192.168.1.200
LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=34050 DF PROTO=TCP SPT=33565 DPT=25
WINDOW=5840 RES=0x00 SYN URGP=0
Jan 11 22:20:52 fw2loc:REJECT:IN= OUT=eth0 SRC=192.168.1.254 DST=192.168.1.200
LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=44205 DF PROTO=TCP SPT=33566 DPT=25
WINDOW=5840 RES=0x00 SYN URGP=0
Jan 11 22:20:52 fw2loc:REJECT:IN= OUT=eth0 SRC=192.168.1.254 DST=192.168.1.200
LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=16450 DF PROTO=TCP SPT=33567 DPT=25
WINDOW=5840 RES=0x00 SYN URGP=0
Jan 11 22:20:52 fw2loc:REJECT:IN= OUT=eth0 SRC=192.168.1.254 DST=192.168.1.200
LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=62532 DF PROTO=TCP SPT=33568 DPT=25
WINDOW=5840 RES=0x00 SYN URGP=0
Jan 11 22:20:52 fw2loc:REJECT:IN= OUT=eth0 SRC=192.168.1.254 DST=192.168.1.200
LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=24669 DF PROTO=TCP SPT=33569 DPT=25
WINDOW=5840 RES=0x00 SYN URGP=0
Jan 11 22:20:52 fw2loc:REJECT:IN= OUT=eth0 SRC=192.168.1.254 DST=192.168.1.200
LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=46331 DF PROTO=TCP SPT=33570 DPT=25
WINDOW=5840 RES=0x00 SYN URGP=0
Jan 11 22:20:53 fw2loc:REJECT:IN= OUT=eth0 SRC=192.168.1.254 DST=192.168.1.200
LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=59186 DF PROTO=TCP SPT=33571 DPT=25
WINDOW=5840 RES=0x00 SYN URGP=0
Jan 11 22:20:53 fw2loc:REJECT:IN= OUT=eth0 SRC=192.168.1.254 DST=192.168.1.200
LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=24273 DF PROTO=TCP SPT=33572 DPT=25
WINDOW=5840 RES=0x00 SYN URGP=0
Jan 11 22:20:53 fw2loc:REJECT:IN= OUT=eth0 SRC=192.168.1.254 DST=192.168.1.200
LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=47180 DF PROTO=TCP SPT=33573 DPT=25
WINDOW=5840 RES=0x00 SYN URGP=0
Jan 11 22:20:53 fw2loc:REJECT:IN= OUT=eth0 SRC=192.168.1.254 DST=192.168.1.200
LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=47662 DF PROTO=TCP SPT=33574 DPT=25
WINDOW=5840 RES=0x00 SYN URGP=0
Jan 11 22:20:53 fw2loc:REJECT:IN= OUT=eth0 SRC=192.168.1.254 DST=192.168.1.200
LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=64118 DF PROTO=TCP SPT=33575 DPT=25
WINDOW=5840 RES=0x00 SYN URGP=0
Jan 11 22:20:54 fw2loc:REJECT:IN= OUT=eth0 SRC=192.168.1.254 DST=192.168.1.200
LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=51351 DF PROTO=TCP SPT=33576 DPT=25
WINDOW=5840 RES=0x00 SYN URGP=0
Jan 11 22:20:54 fw2loc:REJECT:IN= OUT=eth0 SRC=192.168.1.254 DST=192.168.1.200
LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=25756 DF PROTO=TCP SPT=33577 DPT=25
WINDOW=5840 RES=0x00 SYN URGP=0
Jan 11 22:25:03 loc2fw:REJECT:IN=eth0 OUT= SRC=192.168.1.200 DST=192.168.1.254
LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=8013 DF PROTO=TCP SPT=42395 DPT=4949
WINDOW=5840 RES=0x00 SYN URGP=0
Jan 11 22:26:46 net2fw:DROP:IN=ppp0 OUT= SRC=84.57.133.73 DST=84.57.1.42 LEN=48
TOS=0x00 PREC=0x00 TTL=62 ID=47666 DF PROTO=TCP SPT=1920 DPT=2967 WINDOW=32767
RES=0x00 SYN URGP=0
Jan 11 22:26:49 net2fw:DROP:IN=ppp0 OUT= SRC=84.57.133.73 DST=84.57.1.42 LEN=48
TOS=0x00 PREC=0x00 TTL=62 ID=48051 DF PROTO=TCP SPT=1920 DPT=2967 WINDOW=32767
RES=0x00 SYN URGP=0
Jan 11 22:30:02 loc2fw:REJECT:IN=eth0 OUT= SRC=192.168.1.200 DST=192.168.1.254
LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=8526 DF PROTO=TCP SPT=39883 DPT=4949
WINDOW=5840 RES=0x00 SYN URGP=0
Jan 11 22:31:40 net2fw:DROP:IN=ppp0 OUT= SRC=60.15.177.166 DST=84.57.1.42
LEN=620 TOS=0x00 PREC=0x00 TTL=48 ID=0 DF PROTO=UDP SPT=50519 DPT=1027 LEN=600
Jan 11 22:32:11 net2fw:DROP:IN=ppp0 OUT= SRC=60.222.224.138 DST=84.57.1.42
LEN=622 TOS=0x00 PREC=0x00 TTL=48 ID=0 DF PROTO=UDP SPT=53416 DPT=1026 LEN=602
NAT Table
Chain PREROUTING (policy ACCEPT 94 packets, 8725 bytes)
pkts bytes target prot opt in out source destination
8 1570 net_dnat 0 -- ppp0 * 0.0.0.0/0 0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 33 packets, 1963 bytes)
pkts bytes target prot opt in out source destination
86 7145 ppp0_masq 0 -- * ppp0 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain net_dnat (1 references)
pkts bytes target prot opt in out source destination
2 120 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:80 to:192.168.3.203:80
Chain ppp0_masq (1 references)
pkts bytes target prot opt in out source destination
61 5550 MASQUERADE 0 -- * * 192.168.1.0/24 0.0.0.0/0
2 152 MASQUERADE 0 -- * * 192.168.3.0/24 0.0.0.0/0
Mangle Table
Chain PREROUTING (policy ACCEPT 2547 packets, 242K bytes)
pkts bytes target prot opt in out source destination
8 1570 man1918 0 -- ppp0 * 0.0.0.0/0 0.0.0.0/0
state NEW
2538 241K tcpre 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain INPUT (policy ACCEPT 1455 packets, 112K bytes)
pkts bytes target prot opt in out source destination
Chain FORWARD (policy ACCEPT 1092 packets, 130K bytes)
pkts bytes target prot opt in out source destination
1092 130K tcfor 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 163K packets, 24M bytes)
pkts bytes target prot opt in out source destination
1421 161K tcout 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 2523 packets, 291K bytes)
pkts bytes target prot opt in out source destination
2513 290K tcpost 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain man1918 (1 references)
pkts bytes target prot opt in out source destination
0 0 rfc1918 0 -- * * 0.0.0.0/0
172.16.0.0/12
0 0 rfc1918 0 -- * * 0.0.0.0/0
192.168.0.0/16
0 0 rfc1918 0 -- * * 0.0.0.0/0 10.0.0.0/8
Chain rfc1918 (3 references)
pkts bytes target prot opt in out source destination
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:rfc1918:DROP:'
0 0 DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain tcfor (1 references)
pkts bytes target prot opt in out source destination
Chain tcout (1 references)
pkts bytes target prot opt in out source destination
Chain tcpost (1 references)
pkts bytes target prot opt in out source destination
Chain tcpre (1 references)
pkts bytes target prot opt in out source destination
Conntrack Table
udp 17 71 src=192.168.1.200 dst=192.168.1.254 sport=55345 dport=53
src=192.168.1.254 dst=192.168.1.200 sport=53 dport=55345 [ASSURED] use=1
udp 17 70 src=192.168.1.200 dst=192.168.1.254 sport=55339 dport=53
src=192.168.1.254 dst=192.168.1.200 sport=53 dport=55339 [ASSURED] use=1
udp 17 100 src=192.168.1.200 dst=192.168.1.254 sport=55348 dport=53
src=192.168.1.254 dst=192.168.1.200 sport=53 dport=55348 [ASSURED] use=1
udp 17 70 src=192.168.1.200 dst=192.168.1.254 sport=55342 dport=53
src=192.168.1.254 dst=192.168.1.200 sport=53 dport=55342 [ASSURED] use=1
udp 17 79 src=192.168.1.200 dst=136.199.199.102 sport=55348 dport=6277
src=136.199.199.102 dst=84.57.1.42 sport=6277 dport=55348 [ASSURED] use=1
tcp 6 59 TIME_WAIT src=210.245.122.38 dst=84.57.1.42 sport=55931 dport=80
src=192.168.3.203 dst=210.245.122.38 sport=80 dport=55931 [ASSURED] use=1
tcp 6 431999 ESTABLISHED src=192.168.1.2 dst=192.168.1.254 sport=1300
dport=22 src=192.168.1.254 dst=192.168.1.2 sport=22 dport=1300 [ASSURED] use=1
udp 17 73 src=192.168.1.200 dst=192.168.1.254 sport=51136 dport=53
src=192.168.1.254 dst=192.168.1.200 sport=53 dport=51136 [ASSURED] use=1
tcp 6 12 TIME_WAIT src=192.168.1.200 dst=217.12.10.64 sport=54429
dport=110 src=217.12.10.64 dst=84.57.1.42 sport=110 dport=54429 [ASSURED] use=1
udp 17 69 src=192.168.1.200 dst=192.168.1.254 sport=55338 dport=53
src=192.168.1.254 dst=192.168.1.200 sport=53 dport=55338 [ASSURED] use=1
tcp 6 431776 ESTABLISHED src=192.168.1.2 dst=192.168.3.203 sport=1533
dport=22 src=192.168.3.203 dst=192.168.1.2 sport=22 dport=1533 [ASSURED] use=1
tcp 6 40 TIME_WAIT src=192.168.1.200 dst=217.72.192.134 sport=47368
dport=110 src=217.72.192.134 dst=84.57.1.42 sport=110 dport=47368 [ASSURED]
use=1
udp 17 65 src=84.57.1.42 dst=195.50.140.252 sport=32856 dport=53
src=195.50.140.252 dst=84.57.1.42 sport=53 dport=32856 [ASSURED] use=1
tcp 6 96 TIME_WAIT src=210.245.122.38 dst=84.57.1.42 sport=50396 dport=80
src=192.168.3.203 dst=210.245.122.38 sport=80 dport=50396 [ASSURED] use=1
tcp 6 40 TIME_WAIT src=192.168.1.200 dst=217.12.10.64 sport=54451
dport=110 src=217.12.10.64 dst=84.57.1.42 sport=110 dport=54451 [ASSURED] use=1
tcp 6 431880 ESTABLISHED src=192.168.1.2 dst=192.168.1.254 sport=1538
dport=22 src=192.168.1.254 dst=192.168.1.2 sport=22 dport=1538 [ASSURED] use=1
udp 17 100 src=192.168.1.200 dst=192.168.1.254 sport=55352 dport=53
src=192.168.1.254 dst=192.168.1.200 sport=53 dport=55352 [ASSURED] use=1
udp 17 64 src=192.168.1.200 dst=192.168.1.254 sport=64704 dport=53
src=192.168.1.254 dst=192.168.1.200 sport=53 dport=64704 [ASSURED] use=1
IP Configuration
1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
2: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:48:54:55:36:19 brd ff:ff:ff:ff:ff:ff
inet 192.168.1.254/24 brd 192.168.1.255 scope global eth0
3: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:e0:7d:01:c6:c9 brd ff:ff:ff:ff:ff:ff
4: eth2: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:02:44:0e:db:8f brd ff:ff:ff:ff:ff:ff
inet 192.168.3.254/24 brd 192.168.3.255 scope global eth2
11: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP> mtu 1492 qdisc pfifo_fast qlen 3
link/ppp
inet 84.57.1.42 peer 84.57.0.1/32 scope global ppp0
IP Stats
1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
RX: bytes packets errors dropped overrun mcast
6482971 3731 0 0 0 0
TX: bytes packets errors dropped carrier collsns
6482971 3731 0 0 0 0
2: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:48:54:55:36:19 brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
57820746 501601 0 0 0 0
TX: bytes packets errors dropped carrier collsns
266181407 550227 0 0 0 0
3: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:e0:7d:01:c6:c9 brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
300897846 499190 0 0 0 0
TX: bytes packets errors dropped carrier collsns
53201879 438264 0 0 0 0
4: eth2: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:02:44:0e:db:8f brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
12612111 64515 0 0 0 0
TX: bytes packets errors dropped carrier collsns
46935163 66121 0 0 0 0
11: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP> mtu 1492 qdisc pfifo_fast qlen 3
link/ppp
RX: bytes packets errors dropped overrun mcast
17925768 28394 0 0 0 0
TX: bytes packets errors dropped carrier collsns
3166962 25863 0 0 0 0
/proc
/proc/version = Linux version 2.6.8 (r...@donald) (gcc-Version 3.3.5 (Debian
1:3.3.5-13)) #1 Tue Mar 14 13:45:54 CET 2006
/proc/sys/net/ipv4/ip_forward = 1
/proc/sys/net/ipv4/icmp_echo_ignore_all = 0
/proc/sys/net/ipv4/conf/all/proxy_arp = 0
/proc/sys/net/ipv4/conf/all/arp_filter = 0
/proc/sys/net/ipv4/conf/all/arp_ignore = 0
/proc/sys/net/ipv4/conf/all/rp_filter = 1
/proc/sys/net/ipv4/conf/all/log_martians = 0
/proc/sys/net/ipv4/conf/default/proxy_arp = 0
/proc/sys/net/ipv4/conf/default/arp_filter = 0
/proc/sys/net/ipv4/conf/default/arp_ignore = 0
/proc/sys/net/ipv4/conf/default/rp_filter = 1
/proc/sys/net/ipv4/conf/default/log_martians = 0
/proc/sys/net/ipv4/conf/eth0/proxy_arp = 0
/proc/sys/net/ipv4/conf/eth0/arp_filter = 0
/proc/sys/net/ipv4/conf/eth0/arp_ignore = 0
/proc/sys/net/ipv4/conf/eth0/rp_filter = 0
/proc/sys/net/ipv4/conf/eth0/log_martians = 0
/proc/sys/net/ipv4/conf/eth2/proxy_arp = 0
/proc/sys/net/ipv4/conf/eth2/arp_filter = 0
/proc/sys/net/ipv4/conf/eth2/arp_ignore = 0
/proc/sys/net/ipv4/conf/eth2/rp_filter = 0
/proc/sys/net/ipv4/conf/eth2/log_martians = 0
/proc/sys/net/ipv4/conf/lo/proxy_arp = 0
/proc/sys/net/ipv4/conf/lo/arp_filter = 0
/proc/sys/net/ipv4/conf/lo/arp_ignore = 0
/proc/sys/net/ipv4/conf/lo/rp_filter = 0
/proc/sys/net/ipv4/conf/lo/log_martians = 0
/proc/sys/net/ipv4/conf/ppp0/proxy_arp = 0
/proc/sys/net/ipv4/conf/ppp0/arp_filter = 0
/proc/sys/net/ipv4/conf/ppp0/arp_ignore = 0
/proc/sys/net/ipv4/conf/ppp0/rp_filter = 1
/proc/sys/net/ipv4/conf/ppp0/log_martians = 1
Routing Table
84.57.0.1 dev ppp0 proto kernel scope link src 84.57.1.42
192.168.3.0/24 dev eth2 proto kernel scope link src 192.168.3.254
192.168.1.0/24 dev eth0 proto kernel scope link src 192.168.1.254
default dev ppp0 scope link
ARP
? (192.168.1.2) auf 00:17:42:41:B6:A5 [ether] auf eth0
? (192.168.3.203) auf 00:50:DA:41:11:E1 [ether] auf eth2
? (192.168.1.200) auf 00:30:05:78:26:6D [ether] auf eth0
Modules
ipt_ttl 1856 0
ipt_TOS 2368 0
ipt_tos 1600 0
ipt_state 1984 31
ipt_REJECT 6304 4
ipt_REDIRECT 2112 0
ipt_owner 2976 0
ipt_multiport 1952 4
ipt_MASQUERADE 3584 2
ipt_MARK 2048 0
ipt_mark 1632 0
ipt_mac 1888 0
ipt_LOG 5952 28
ipt_limit 2304 0
ipt_length 1664 0
ip_nat_snmp_basic 10372 0
ip_nat_irc 4048 0
ip_nat_ftp 4560 0
ip_conntrack_irc 71120 1 ip_nat_irc
ip_conntrack_ftp 71888 1 ip_nat_ftp
iptable_nat 21508 6
ipt_REDIRECT,ipt_MASQUERADE,ip_nat_snmp_basic,ip_nat_irc,ip_nat_ftp
ip_conntrack 32556 8
ipt_state,ipt_REDIRECT,ipt_MASQUERADE,ip_nat_irc,ip_nat_ftp,ip_conntrack_irc,ip_conntrack_ftp,iptable_nat
iptable_mangle 2720 1
ipt_TCPMSS 4256 1
ipt_tcpmss 2208 0
iptable_filter 2752 1
ip_tables 16128 20
ipt_ttl,ipt_TOS,ipt_tos,ipt_state,ipt_REJECT,ipt_REDIRECT,ipt_owner,ipt_multiport,ipt_MASQUERADE,ipt_MARK,ipt_mark,ipt_mac,ipt_LOG,ipt_limit,ipt_length,iptable_nat,iptable_mangle,ipt_TCPMSS,ipt_tcpmss,iptable_filter
Shorewall has detected the following iptables/netfilter capabilities:
NAT: Available
Packet Mangling: Available
Multi-port Match: Available
Extended Multi-port Match: Not available
Connection Tracking Match: Not available
Packet Type Match: Not available
Policy Match: Not available
Physdev Match: Not available
Packet length Match: Available
IP range Match: Not available
Recent Match: Not available
Owner Match: Available
Ipset Match: Not available
CONNMARK Target: Not available
Connmark Match: Not available
Raw Table: Not available
IPP2P Match: Not available
CLASSIFY Target: Not available
Extended REJECT: Available
Repeat match: Not available
MARK Target: Available
Extended MARK Target: Not available
Mangle FORWARD Chain: Available
Traffic Control
TC Filters
------------------------------------------------------------------------------
Check out the new SourceForge.net Marketplace.
It is the best place to buy or sell services for
just about anything Open Source.
http://p.sf.net/sfu/Xq1LFB
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users