Hi,

I'm currently facing a rather strange problem.

I did order a dedicated server at a hosting company.

This server is provided with ipv4 and ipv6 connectivity.

The default ipv6 gateway is given through radvd (from what i've seen in tcpdump logs):

21:17:25.260848 IP6 fe80::215:2cff:fe6e:b000 > ip6-allnodes: ICMP6, router advertisement, length 64

default via fe80::215:2cff:fe6e:b000 dev eth0 proto kernel metric 1024 expires 1797sec mtu 1500 advmss 1440 hoplimit 64

If I start shorewall, this default route immediately disappears thus preventing any ipv6 communication.

I think my setup might block ipv6 router advertisment messages.

$ shorewall6 dump (attached file)


To get connectivity again I have to disable shorewall6 and restart the box.

Thanks for your help.
Shorewall6 4.2.10 Dump at monika - jeudi 23 juillet 2009, 21:15:26 (UTC+0200)

   Shorewall-perl 4.2.10.1

Counters reset jeudi 23 juillet 2009, 21:14:01 (UTC+0200)

Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
   20  2080 dynamic    all      *      *       ::/0                 ::/0        
        state INVALID,NEW 
   20  2080 ext2fw     all      eth0   *       ::/0                 ::/0        
        
    0     0 ACCEPT     all      lo     *       ::/0                 ::/0        
        
    0     0 ACCEPT     all      *      *       ::/0                 ::/0        
        state RELATED,ESTABLISHED 
    0     0 Drop       all      *      *       ::/0                 ::/0        
        
    0     0 LOG        all      *      *       ::/0                 ::/0        
        LOG flags 0 level 6 prefix `Shorewall:INPUT:DROP:' 
    0     0 DROP       all      *      *       ::/0                 ::/0        
        

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 dynamic    all      *      *       ::/0                 ::/0        
        state INVALID,NEW 
    0     0 ACCEPT     all      *      *       ::/0                 ::/0        
        state RELATED,ESTABLISHED 
    0     0 Reject     all      *      *       ::/0                 ::/0        
        
    0     0 LOG        all      *      *       ::/0                 ::/0        
        LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:' 
    0     0 reject     all      *      *       ::/0                 ::/0        
        [goto] 

Chain OUTPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 fw2ext     all      *      eth0    ::/0                 ::/0        
        
    0     0 ACCEPT     all      *      lo      ::/0                 ::/0        
        
    0     0 ACCEPT     all      *      *       ::/0                 ::/0        
        state RELATED,ESTABLISHED 
    0     0 Reject     all      *      *       ::/0                 ::/0        
        
    0     0 LOG        all      *      *       ::/0                 ::/0        
        LOG flags 0 level 6 prefix `Shorewall:OUTPUT:REJECT:' 
    0     0 reject     all      *      *       ::/0                 ::/0        
        [goto] 

Chain AllowICMPs (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     icmpv6    *      *       ::/0                 ::/0       
         ipv6-icmp type 1 /* Needed ICMP types (RFC4890) */ 
    0     0 ACCEPT     icmpv6    *      *       ::/0                 ::/0       
         ipv6-icmp type 2 /* Needed ICMP types (RFC4890) */ 
    0     0 ACCEPT     icmpv6    *      *       ::/0                 ::/0       
         ipv6-icmp type 3 /* Needed ICMP types (RFC4890) */ 
    0     0 ACCEPT     icmpv6    *      *       ::/0                 ::/0       
         ipv6-icmp type 4 /* Needed ICMP types (RFC4890) */ 
    0     0 ACCEPT     icmpv6    *      *       ::/0                 ::/0       
         ipv6-icmp type 133 /* Needed ICMP types (RFC4890) */ 
    0     0 ACCEPT     icmpv6    *      *       ::/0                 ::/0       
         ipv6-icmp type 134 /* Needed ICMP types (RFC4890) */ 
    0     0 ACCEPT     icmpv6    *      *       ::/0                 ::/0       
         ipv6-icmp type 135 /* Needed ICMP types (RFC4890) */ 
    0     0 ACCEPT     icmpv6    *      *       ::/0                 ::/0       
         ipv6-icmp type 136 /* Needed ICMP types (RFC4890) */ 
    0     0 ACCEPT     icmpv6    *      *       ::/0                 ::/0       
         ipv6-icmp type 137 /* Needed ICMP types (RFC4890) */ 
    0     0 ACCEPT     icmpv6    *      *       ::/0                 ::/0       
         ipv6-icmp type 141 /* Needed ICMP types (RFC4890) */ 
    0     0 ACCEPT     icmpv6    *      *       ::/0                 ::/0       
         ipv6-icmp type 142 /* Needed ICMP types (RFC4890) */ 
    0     0 ACCEPT     icmpv6    *      *       fe80::/10            ::/0       
         ipv6-icmp type 130 /* Needed ICMP types (RFC4890) */ 
    0     0 ACCEPT     icmpv6    *      *       fe80::/10            ::/0       
         ipv6-icmp type 131 /* Needed ICMP types (RFC4890) */ 
    0     0 ACCEPT     icmpv6    *      *       fe80::/10            ::/0       
         ipv6-icmp type 132 /* Needed ICMP types (RFC4890) */ 
    0     0 ACCEPT     icmpv6    *      *       fe80::/10            ::/0       
         ipv6-icmp type 143 /* Needed ICMP types (RFC4890) */ 
    0     0 ACCEPT     icmpv6    *      *       ::/0                 ::/0       
         ipv6-icmp type 148 /* Needed ICMP types (RFC4890) */ 
    0     0 ACCEPT     icmpv6    *      *       ::/0                 ::/0       
         ipv6-icmp type 149 /* Needed ICMP types (RFC4890) */ 
    0     0 ACCEPT     icmpv6    *      *       fe80::/10            ::/0       
         ipv6-icmp type 151 /* Needed ICMP types (RFC4890) */ 
    0     0 ACCEPT     icmpv6    *      *       fe80::/10            ::/0       
         ipv6-icmp type 152 /* Needed ICMP types (RFC4890) */ 
    0     0 ACCEPT     icmpv6    *      *       fe80::/10            ::/0       
         ipv6-icmp type 153 /* Needed ICMP types (RFC4890) */ 

Chain Drop (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 reject     tcp      *      *       ::/0                 ::/0        
        tcp dpt:113 /* Auth */ 
    0     0 AllowICMPs  icmpv6    *      *       ::/0                 ::/0      
          
    0     0 dropInvalid  all      *      *       ::/0                 ::/0      
          
    0     0 DROP       udp      *      *       ::/0                 ::/0        
        multiport dports 135,445 /* SMB */ 
    0     0 DROP       udp      *      *       ::/0                 ::/0        
        udp dpts:137:139 /* SMB */ 
    0     0 DROP       udp      *      *       ::/0                 ::/0        
        udp spt:137 dpts:1024:65535 /* SMB */ 
    0     0 DROP       tcp      *      *       ::/0                 ::/0        
        multiport dports 135,139,445 /* SMB */ 
    0     0 dropNotSyn  tcp      *      *       ::/0                 ::/0       
         
    0     0 DROP       udp      *      *       ::/0                 ::/0        
        udp spt:53 /* Late DNS Replies */ 

Chain Reject (3 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 reject     tcp      *      *       ::/0                 ::/0        
        tcp dpt:113 /* Auth */ 
    0     0 AllowICMPs  icmpv6    *      *       ::/0                 ::/0      
          
    0     0 dropInvalid  all      *      *       ::/0                 ::/0      
          
    0     0 reject     udp      *      *       ::/0                 ::/0        
        multiport dports 135,445 /* SMB */ 
    0     0 reject     udp      *      *       ::/0                 ::/0        
        udp dpts:137:139 /* SMB */ 
    0     0 reject     udp      *      *       ::/0                 ::/0        
        udp spt:137 dpts:1024:65535 /* SMB */ 
    0     0 reject     tcp      *      *       ::/0                 ::/0        
        multiport dports 135,139,445 /* SMB */ 
    0     0 dropNotSyn  tcp      *      *       ::/0                 ::/0       
         
    0     0 DROP       udp      *      *       ::/0                 ::/0        
        udp spt:53 /* Late DNS Replies */ 

Chain dropInvalid (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       all      *      *       ::/0                 ::/0        
        state INVALID 

Chain dropNotSyn (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       tcp      *      *       ::/0                 ::/0        
        tcp flags:!0x17/0x02 

Chain dynamic (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain eth0_fwd (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 tcpflags   tcp      *      *       ::/0                 ::/0        
        

Chain ext2fw (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     udp      *      *       ::/0                 ::/0        
        udp dpts:546:547 
    0     0 tcpflags   tcp      *      *       ::/0                 ::/0        
        
    0     0 ACCEPT     all      *      *       ::/0                 ::/0        
        state RELATED,ESTABLISHED 
    0     0 ACCEPT     icmpv6    *      *       ::/0                 ::/0       
         ipv6-icmp type 128 /* Ping */ 
    0     0 ACCEPT     tcp      *      *       ::/0                 ::/0        
        tcp dpt:80 /* HTTP */ 
   20  2080 ACCEPT     all      *      *       fe80::215:2cff:fe6e:b000/128  
::/0                
    0     0 Reject     all      *      *       ::/0                 ::/0        
        
    0     0 LOG        all      *      *       ::/0                 ::/0        
        LOG flags 0 level 6 prefix `Shorewall:ext2fw:REJECT:' 
    0     0 reject     all      *      *       ::/0                 ::/0        
        [goto] 

Chain fw2ext (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     udp      *      *       ::/0                 ::/0        
        udp dpts:546:547 
    0     0 ACCEPT     all      *      *       ::/0                 ::/0        
        state RELATED,ESTABLISHED 
    0     0 ACCEPT     all      *      *       ::/0                 ::/0        
        

Chain logdrop (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       all      *      *       ::/0                 ::/0        
        

Chain logflags (5 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        all      *      *       ::/0                 ::/0        
        LOG flags 4 level 6 prefix `Shorewall:logflags:DROP:' 
    0     0 DROP       all      *      *       ::/0                 ::/0        
        

Chain logreject (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 reject     all      *      *       ::/0                 ::/0        
        

Chain reject (10 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       all      *      *       ::/0                 
2a01:e0b:1:73::/128 
    0     0 DROP       all      *      *       ::/0                 
2a01:e0b:1:73:ffff:ffff:ffff:ff80/121 
    0     0 DROP       all      *      *       ff00::/10            ::/0        
        
    0     0 DROP       2        *      *       ::/0                 ::/0        
        
    0     0 REJECT     tcp      *      *       ::/0                 ::/0        
        reject-with tcp-reset 
    0     0 REJECT     all      *      *       ::/0                 ::/0        
        reject-with icmp6-port-unreachable 

Chain shorewall (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain smurfs (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        all      *      *       2a01:e0b:1:73::/128  ::/0        
        LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:' 
    0     0 DROP       all      *      *       2a01:e0b:1:73::/128  ::/0        
        
    0     0 LOG        all      *      *       
2a01:e0b:1:73:ffff:ffff:ffff:ff80/121  ::/0                LOG flags 0 level 6 
prefix `Shorewall:smurfs:DROP:' 
    0     0 DROP       all      *      *       
2a01:e0b:1:73:ffff:ffff:ffff:ff80/121  ::/0                

Chain tcpflags (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 logflags   tcp      *      *       ::/0                 ::/0        
        tcp flags:0x3F/0x29 
    0     0 logflags   tcp      *      *       ::/0                 ::/0        
        tcp flags:0x3F/0x00 
    0     0 logflags   tcp      *      *       ::/0                 ::/0        
        tcp flags:0x06/0x06 
    0     0 logflags   tcp      *      *       ::/0                 ::/0        
        tcp flags:0x03/0x03 
    0     0 logflags   tcp      *      *       ::/0                 ::/0        
        tcp spt:0 flags:0x17/0x02 

Log (/var/log/messages)


Mangle Table

Chain PREROUTING (policy ACCEPT 55 packets, 4600 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
   55  4600 tcpre      all      *      *       ::/0                 ::/0        
        

Chain INPUT (policy ACCEPT 20 packets, 2080 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 tcfor      all      *      *       ::/0                 ::/0        
        

Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 tcout      all      *      *       ::/0                 ::/0        
        

Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 tcpost     all      *      *       ::/0                 ::/0        
        

Chain tcfor (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain tcout (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain tcpost (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain tcpre (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Raw Table

Chain PREROUTING (policy ACCEPT 55 packets, 4600 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Conntrack Table


IP Configuration

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 
    inet6 ::1/128 scope host 
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qlen 1000
    inet6 2a01:e0b:1:73:2e0:f4ff:fe19:e733/64 scope global dynamic 
       valid_lft 2591488sec preferred_lft 604288sec
    inet6 fe80::2e0:f4ff:fe19:e733/64 scope link 
       valid_lft forever preferred_lft forever

IP Stats

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN 
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    RX: bytes  packets  errors  dropped overrun mcast   
    764767     3683     0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    764767     3683     0       0       0       0      
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state 
UNKNOWN qlen 1000
    link/ether 00:e0:f4:19:e7:33 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    858854     10805    0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    816660     9015     0       0       0       0      

/proc

   /proc/version = Linux version 2.6.26-1-amd64 (Debian 2.6.26-13) 
([email protected]) (gcc version 4.1.3 20080704 (prerelease) (Debian 4.1.2-24)) 
#1 SMP Sat Jan 10 17:57:00 UTC 2009
   /proc/sys/net/ipv6/conf/all/forwarding = 1
   /proc/sys/net/ipv6/conf/all/proxy_ndp = 0
   /proc/sys/net/ipv6/conf/default/forwarding = 1
   /proc/sys/net/ipv6/conf/default/proxy_ndp = 0
   /proc/sys/net/ipv6/conf/eth0/forwarding = 1
   /proc/sys/net/ipv6/conf/eth0/proxy_ndp = 0
   /proc/sys/net/ipv6/conf/lo/forwarding = 1
   /proc/sys/net/ipv6/conf/lo/proxy_ndp = 0

Routing Rules

0:      from all lookup local 
32766:  from all lookup main 

Table local:

local ::1 via :: dev lo  proto none  metric 0  mtu 16436 advmss 16376 hoplimit 
4294967295
local 2a01:e0b:1:73:: via :: dev lo  proto none  metric 0  mtu 16436 advmss 
16376 hoplimit 4294967295
local 2a01:e0b:1:73:2e0:f4ff:fe19:e733 via :: dev lo  proto none  metric 0  mtu 
16436 advmss 16376 hoplimit 4294967295
local fe80:: via :: dev lo  proto none  metric 0  mtu 16436 advmss 16376 
hoplimit 4294967295
local fe80::2e0:f4ff:fe19:e733 via :: dev lo  proto none  metric 0  mtu 16436 
advmss 16376 hoplimit 4294967295
ff02::1 via ff02::1 dev eth0  metric 0 
    cache  mtu 1500 advmss 1440 hoplimit 4294967295
ff02::1:ff3e:5bdc via ff02::1:ff3e:5bdc dev eth0  metric 0 
    cache  mtu 1500 advmss 1440 hoplimit 4294967295
ff02::1:ffbf:cee via ff02::1:ffbf:cee dev eth0  metric 0 
    cache  mtu 1500 advmss 1440 hoplimit 4294967295
ff00::/8 dev eth0  metric 256  mtu 1500 advmss 1440 hoplimit 4294967295

Table main:

2a01:e0b:1:73::/64 dev eth0  proto kernel  metric 256  expires 2591649sec mtu 
1500 advmss 1440 hoplimit 4294967295
fe80::/64 dev eth0  metric 256  mtu 1500 advmss 1440 hoplimit 4294967295

Neighbors


Modules

ip6_queue              12184  0 
ip6table_filter         7296  1 
ip6table_mangle         7168  1 
ip6table_raw            6528  0 
ip6_tables             23056  4 
ip6t_LOG,ip6table_raw,ip6table_mangle,ip6table_filter
ip6t_LOG               10372  7 
ip6t_REJECT             8320  2 
nf_conntrack           71440  33 
nf_conntrack_ipv6,nf_conntrack_proto_udplite,xt_connlimit,ipt_MASQUERADE,ipt_CLUSTERIP,nf_nat_tftp,nf_nat_snmp_basic,nf_nat_sip,nf_nat_pptp,nf_nat_irc,nf_nat_h323,nf_nat_ftp,nf_nat_amanda,nf_conntrack_amanda,nf_conntrack_sane,nf_conntrack_tftp,nf_conntrack_sip,nf_conntrack_proto_sctp,nf_conntrack_pptp,nf_conntrack_proto_gre,nf_conntrack_netlink,nf_conntrack_netbios_ns,nf_conntrack_irc,nf_conntrack_h323,nf_conntrack_ftp,xt_helper,xt_conntrack,xt_CONNMARK,xt_connmark,xt_state,iptable_nat,nf_nat,nf_conntrack_ipv4
nf_conntrack_amanda     8832  1 nf_nat_amanda
nf_conntrack_ftp       12728  1 nf_nat_ftp
nf_conntrack_h323      57040  1 nf_nat_h323
nf_conntrack_ipv4      19352  13 iptable_nat,nf_nat
nf_conntrack_ipv6      19048  8 
nf_conntrack_irc       10680  1 nf_nat_irc
nf_conntrack_netbios_ns     7040  0 
nf_conntrack_netlink    20608  0 
nf_conntrack_pptp      10756  1 nf_nat_pptp
nf_conntrack_proto_gre     9472  1 nf_conntrack_pptp
nf_conntrack_proto_sctp    12428  0 
nf_conntrack_proto_udplite     8716  0 
nf_conntrack_sane       9764  0 
nf_conntrack_sip       23972  1 nf_nat_sip
nf_conntrack_tftp       9748  1 nf_nat_tftp
nf_nat                 23192  13 
ipt_REDIRECT,ipt_NETMAP,ipt_MASQUERADE,nf_nat_tftp,nf_nat_sip,nf_nat_pptp,nf_nat_proto_gre,nf_nat_irc,nf_nat_h323,nf_nat_ftp,nf_nat_amanda,nf_conntrack_netlink,iptable_nat
nf_nat_amanda           6400  0 
nf_nat_ftp              7296  0 
nf_nat_h323            11008  0 
nf_nat_irc              6656  0 
nf_nat_pptp             7552  0 
nf_nat_proto_gre        6916  1 nf_nat_pptp
nf_nat_sip             10752  0 
nf_nat_snmp_basic      14088  0 
nf_nat_tftp             6016  0 
x_tables               25224  50 
ip6t_LOG,ip6t_REJECT,xt_sctp,ip6_tables,xt_TCPMSS,xt_time,xt_connlimit,xt_realm,xt_comment,xt_policy,ipt_ULOG,ipt_TTL,ipt_ttl,ipt_REJECT,ipt_REDIRECT,ipt_recent,ipt_NETMAP,ipt_MASQUERADE,ipt_LOG,ipt_ECN,ipt_ecn,ipt_CLUSTERIP,ipt_ah,ipt_addrtype,xt_tcpmss,xt_pkttype,xt_physdev,xt_owner,xt_NFQUEUE,xt_NFLOG,xt_multiport,xt_MARK,xt_mark,xt_mac,xt_limit,xt_length,xt_iprange,xt_helper,xt_hashlimit,xt_DSCP,xt_dscp,xt_dccp,xt_conntrack,xt_CONNMARK,xt_connmark,xt_CLASSIFY,xt_tcpudp,xt_state,iptable_nat,ip_tables
xt_CLASSIFY             6272  0 
xt_comment              6272  60 
xt_connlimit            8456  0 
xt_connmark             7424  0 
xt_CONNMARK             8064  0 
xt_conntrack            8704  0 
xt_dccp                 7312  0 
xt_dscp                 7168  0 
xt_DSCP                 7808  0 
xt_hashlimit           15648  0 
xt_helper               6784  0 
xt_iprange              6912  0 
xt_length               6400  0 
xt_limit                7172  0 
xt_mac                  6272  0 
xt_mark                 6912  0 
xt_MARK                 7552  0 
xt_multiport            7424  8 
xt_NFLOG                6400  0 
xt_NFQUEUE              6400  0 
xt_owner                7296  0 
xt_physdev              6928  0 
xt_pkttype              6272  0 
xt_policy               7424  0 
xt_realm                6016  0 
xt_sctp                 7168  0 
xt_state                6656  18 
xt_tcpmss               6656  0 
xt_TCPMSS               8448  1 
xt_tcpudp               7680  47 
xt_time                 7168  0 

Shorewall6 has detected the following ip6tables/netfilter capabilities:
   Packet Mangling: Available
   Multi-port Match: Available
   Extended Multi-port Match: Available
   Connection Tracking Match: Available
   Extended Connection Tracking Match Support: Available
   Old Connection Tracking Match Syntax: Not available
   Packet Type Match: Available
   Policy Match: Available
   Physdev Match: Available
   Physdev-is-bridged Support: Available
   Packet length Match: Available
   IP range Match: Available
   Recent Match: Not available
   Owner Match: Available
   Ipset Match: Not available
   CONNMARK Target: Available
   Extended CONNMARK Target: Available
   Connmark Match: Available
   Extended Connmark Match: Available
   Raw Table: Available
   IPP2P Match: Not available
   CLASSIFY Target: Available
   Extended REJECT: Available
   Repeat match: Available
   MARK Target: Available
   Extended MARK Target: Available
   Mangle FORWARD Chain: Available
   Comments: Available
   Address Type Match: Not available
   TCPMSS Match: Available
   Hashlimit Match: Available
   NFQUEUE Target: Available
   Realm Match: Not available
   Helper Match: Available
   Connlimit Match: Available
   Time Match: Available
   Goto Support: Available


------------------------------------------------------------------------------
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to