My apologies,

I should have clarified.  Shorewall starts w/out any issue.  When doing a
shorewall dump, I get the error message:  /var/log/shorewall.log does not
exist.
*
Shorewall Verbose start*
============================
dumbledore:~# shorewall -vv check
Checking...
Processing /etc/shorewall/params ...
Loading Modules...
Shorewall has detected the following capabilities:
   Address Type Match: Available
   CLASSIFY Target: Available
   CONNMARK Target: Available
   Capability Version: 4.0.15
   Comments: Available
   Connection Tracking Match: Available
   Connmark Match: Available
   Extended CONNMARK Target: Available
   Extended Connmark Match: Available
   Extended Mark Target: Available
   Extended Multi-port Match: Available
   Extended Reject: Available
   Hashlimit Match: Available
   IP Range Match: Available
   IPP2P Match: Not Available
   Ipset Match: Not Available
   MARK Target: Available
   Mangle FORWARD Chain: Available
   Multi-port Match: Available
   NAT: Available
   NFQUEUE Target: Available
   New Connection Tracking Match syntax: Available
   Owner Match: Available
   Packet Mangling: Available
   Packet Type Match: Available
   Packet length Match: Available
   Physdev Match: Available
   Physdev-is-bridged support: Available
   Policy Match: Available
   Raw Table: Available
   Recent Match: Available
   Repeat match: Available
   TCPMSS Match: Available
Checking /etc/shorewall/zones...
Checking /etc/shorewall/interfaces...
 Interface "world br0 - bridge,dhcp" Validated
 Interface "wan br0:eth1 - " Validated
 Interface "dmz br0:tap0 - " Validated
 Interface "ptd1 tap1 detect dhcp,routeback,upnp" Validated
 Interface "ptd2 tap2 detect dhcp,routeback,upnp" Validated
 Interface "loc eth0 detect dhcp,routeback" Validated
Determining Hosts in Zones...
 fw (firewall)
 loc (ipv4)
 eth0:0.0.0.0/0
 ptd1 (ipv4)
 tap1:0.0.0.0/0
 ptd2 (ipv4)
 tap2:0.0.0.0/0
 wan (bport4)
 eth1:0.0.0.0/0
 dmz (bport4)
 tap0:0.0.0.0/0
 world (ipv4)
 br0:0.0.0.0/0
Preprocessing Action Files...
   Pre-processing /usr/share/shorewall/action.Drop...
 ..Expanding Macro /usr/share/shorewall/macro.Auth...
 ..End Macro /usr/share/shorewall/macro.Auth
 ..Expanding Macro /usr/share/shorewall/macro.AllowICMPs...
 ..End Macro /usr/share/shorewall/macro.AllowICMPs
 ..Expanding Macro /usr/share/shorewall/macro.SMB...
 ..End Macro /usr/share/shorewall/macro.SMB
 ..Expanding Macro /usr/share/shorewall/macro.DropUPnP...
 ..End Macro /usr/share/shorewall/macro.DropUPnP
 ..Expanding Macro /usr/share/shorewall/macro.DropDNSrep...
 ..End Macro /usr/share/shorewall/macro.DropDNSrep
   Pre-processing /usr/share/shorewall/action.Reject...
 ..Expanding Macro /usr/share/shorewall/macro.Auth...
 ..End Macro /usr/share/shorewall/macro.Auth
 ..Expanding Macro /usr/share/shorewall/macro.SMB...
 ..End Macro /usr/share/shorewall/macro.SMB
Checking /etc/shorewall/policy...
 Policy for wan to dmz is ACCEPT using chain wan2dmz
 Policy for dmz to wan is ACCEPT using chain dmz2wan
 Policy for loc to ptd1 is ACCEPT using chain loc2ptd1
 Policy for loc to ptd2 is ACCEPT using chain loc2ptd2
 Policy for loc to fw is ACCEPT using chain loc2fw
 Policy for loc to fw is REJECT using chain loc2all
 Policy for loc to ptd1 is REJECT using chain loc2all
 Policy for loc to ptd2 is REJECT using chain loc2all
 Policy for loc to wan is REJECT using chain loc2all
 Policy for loc to dmz is REJECT using chain loc2all
 Policy for loc to world is REJECT using chain loc2all
 Policy for fw to ptd1 is ACCEPT using chain fw2ptd1
 Policy for fw to ptd2 is ACCEPT using chain fw2ptd2
 Policy for fw to loc is ACCEPT using chain fw2loc
 Policy for fw to loc is REJECT using chain fw2all
 Policy for fw to ptd1 is REJECT using chain fw2all
 Policy for fw to ptd2 is REJECT using chain fw2all
 Policy for fw to wan is REJECT using chain fw2all
 Policy for fw to dmz is REJECT using chain fw2all
 Policy for fw to world is REJECT using chain fw2all
 Policy for ptd1 to fw is DROP using chain ptd12fw
 Policy for ptd1 to loc is DROP using chain ptd12loc
 Policy for ptd1 to fw is DROP using chain ptd12all
 Policy for ptd1 to loc is DROP using chain ptd12all
 Policy for ptd1 to ptd2 is DROP using chain ptd12all
 Policy for ptd1 to wan is DROP using chain ptd12all
 Policy for ptd1 to dmz is DROP using chain ptd12all
 Policy for ptd1 to world is DROP using chain ptd12all
 Policy for ptd2 to fw is DROP using chain ptd22fw
 Policy for ptd2 to loc is DROP using chain ptd22loc
 Policy for ptd2 to fw is DROP using chain ptd22all
 Policy for ptd2 to loc is DROP using chain ptd22all
 Policy for ptd2 to ptd1 is DROP using chain ptd22all
 Policy for ptd2 to wan is DROP using chain ptd22all
 Policy for ptd2 to dmz is DROP using chain ptd22all
 Policy for ptd2 to world is DROP using chain ptd22all
 Policy for fw to loc is REJECT using chain all2all
 Policy for fw to ptd1 is REJECT using chain all2all
 Policy for fw to ptd2 is REJECT using chain all2all
 Policy for fw to wan is REJECT using chain all2all
 Policy for fw to dmz is REJECT using chain all2all
 Policy for fw to world is REJECT using chain all2all
 Policy for loc to fw is REJECT using chain all2all
 Policy for loc to ptd1 is REJECT using chain all2all
 Policy for loc to ptd2 is REJECT using chain all2all
 Policy for loc to wan is REJECT using chain all2all
 Policy for loc to dmz is REJECT using chain all2all
 Policy for loc to world is REJECT using chain all2all
 Policy for ptd1 to fw is REJECT using chain all2all
 Policy for ptd1 to loc is REJECT using chain all2all
 Policy for ptd1 to ptd2 is REJECT using chain all2all
 Policy for ptd1 to wan is REJECT using chain all2all
 Policy for ptd1 to dmz is REJECT using chain all2all
 Policy for ptd1 to world is REJECT using chain all2all
 Policy for ptd2 to fw is REJECT using chain all2all
 Policy for ptd2 to loc is REJECT using chain all2all
 Policy for ptd2 to ptd1 is REJECT using chain all2all
 Policy for ptd2 to wan is REJECT using chain all2all
 Policy for ptd2 to dmz is REJECT using chain all2all
 Policy for ptd2 to world is REJECT using chain all2all
 Policy for wan to fw is REJECT using chain all2all
 Policy for wan to loc is REJECT using chain all2all
 Policy for wan to ptd1 is REJECT using chain all2all
 Policy for wan to ptd2 is REJECT using chain all2all
 Policy for wan to dmz is REJECT using chain all2all
 Policy for wan to world is REJECT using chain all2all
 Policy for dmz to fw is REJECT using chain all2all
 Policy for dmz to loc is REJECT using chain all2all
 Policy for dmz to ptd1 is REJECT using chain all2all
 Policy for dmz to ptd2 is REJECT using chain all2all
 Policy for dmz to wan is REJECT using chain all2all
 Policy for dmz to world is REJECT using chain all2all
 Policy for world to fw is REJECT using chain all2all
 Policy for world to loc is REJECT using chain all2all
 Policy for world to ptd1 is REJECT using chain all2all
 Policy for world to ptd2 is REJECT using chain all2all
 Policy for world to wan is REJECT using chain all2all
 Policy for world to dmz is REJECT using chain all2all
Checking /etc/shorewall/routestopped for critical hosts...
Checking /etc/shorewall/routestopped...
Adding rules for DHCP
$doing UPnP
Checking Kernel Route Filtering...
Checking /etc/shorewall/providers ...
 Provider "ptd1 1 1 main tap1 detect track,balance,optional eth0" Checked
 Provider "ptd2 2 2 main tap2 detect track,balance,optional eth0" Checked
Checking /etc/shorewall/route_rules...
 Routing rule "192.168.1.2 - ptd2 1000" Checked
 Routing rule "192.168.1.0/24 - ptd1 1000" Checked
Checking /etc/shorewall/masq...
 Masq record "tap1 192.168.1.0/24 24.102.132.193" Checked
 Masq record "tap1 24.102.139.228 24.102.132.193" Checked
 Masq record "tap2 192.168.1.0/24 24.102.139.228" Checked
 Masq record "tap2 24.102.132.193 24.102.139.228" Checked
Checking MAC Filtration -- Phase 1...
 Checking MAC Verification for -- Phase 1...
Checking /etc/shorewall/rules...
..Expanding Macro /usr/share/shorewall/macro.Ping...
 Rule "PARAM - - icmp 8" Checked
..End Macro /usr/share/shorewall/macro.Ping
 Rule "Ping/ACCEPT ptd1 fw" Checked
..Expanding Macro /usr/share/shorewall/macro.SSH...
 Rule "PARAM - - tcp 22" Checked
..End Macro /usr/share/shorewall/macro.SSH
 Rule "SSH/ACCEPT ptd1:216.107.0.0/24,216.164.165.144/28,76.79.33.246 fw"
Checked
..Expanding Macro /usr/share/shorewall/macro.HTTP...
 Rule "PARAM - - tcp 80" Checked
..End Macro /usr/share/shorewall/macro.HTTP
 Rule "HTTP/ACCEPT ptd1:216.107.0.0/24,216.164.165.144/28,76.79.33.246 fw"
Checked
 Rule "ACCEPT ptd1:216.155.55.0/24 fw" Checked
 Rule "DNAT ptd2 loc:192.168.1.2:8080 tcp 80 - 24.102.139.228" Checked
Generating Transitive Closure of Used-action List...
Processing /usr/share/shorewall/action.Reject for chain Reject...
Checking ...
..Expanding Macro /usr/share/shorewall/macro.Auth...
..End Macro
..Expanding Macro /usr/share/shorewall/macro.AllowICMPs...
..End Macro
..Expanding Macro /usr/share/shorewall/macro.SMB...
..End Macro
..Expanding Macro /usr/share/shorewall/macro.DropUPnP...
..End Macro
..Expanding Macro /usr/share/shorewall/macro.DropDNSrep...
..End Macro
Processing /usr/share/shorewall/action.Drop for chain Drop...
..Expanding Macro /usr/share/shorewall/macro.Auth...
..End Macro
..Expanding Macro /usr/share/shorewall/macro.AllowICMPs...
..End Macro
..Expanding Macro /usr/share/shorewall/macro.SMB...
..End Macro
..Expanding Macro /usr/share/shorewall/macro.DropUPnP...
..End Macro
..Expanding Macro /usr/share/shorewall/macro.DropDNSrep...
..End Macro
Checking MAC Filtration -- Phase 2...
 Checking MAC Verification for -- Phase 2...
Applying Policies...
 Policy ACCEPT from fw to loc using chain fw2loc
 Policy ACCEPT from fw to ptd1 using chain fw2ptd1
 Policy ACCEPT from fw to ptd2 using chain fw2ptd2
 Policy REJECT from fw to world using chain fw2world
 Policy ACCEPT from loc to fw using chain loc2fw
 Policy ACCEPT from loc to ptd1 using chain loc2ptd1
 Policy ACCEPT from loc to ptd2 using chain loc2ptd2
 Policy REJECT from loc to world using chain loc2world
 Policy DROP from ptd1 to fw using chain ptd12fw
 Policy DROP from ptd1 to loc using chain ptd12loc
 Policy DROP from ptd1 to ptd2 using chain ptd12ptd2
 Policy DROP from ptd1 to world using chain ptd12world
 Policy DROP from ptd2 to fw using chain ptd22fw
 Policy DROP from ptd2 to loc using chain ptd22loc
 Policy DROP from ptd2 to ptd1 using chain ptd22ptd1
 Policy DROP from ptd2 to world using chain ptd22world
 Policy ACCEPT from wan to dmz using chain wan2dmz
 Policy ACCEPT from dmz to wan using chain dmz2wan
 Policy REJECT from world to fw using chain world2fw
 Policy REJECT from world to loc using chain world2loc
 Policy REJECT from world to ptd1 using chain world2ptd1
 Policy REJECT from world to ptd2 using chain world2ptd2
Checking /etc/shorewall/tcdevices...
 Tcdevice "tap0 1550kbit 5600kbit" Checked.
Checking /etc/shorewall/tcclasses...
 Tcclass "tap0 1 25*full/100 full 1 tos=0x68/0xfc,tos=0xb8/0xfc" Checked.
 Tcclass "tap0 2 15*full/100 full 2 " Checked.
 Tcclass "tap0 3 20*full/100 full 3 tos-minimize-delay " Checked.
 Tcclass "tap0 4 30*full/100 full 4 " Checked.
 Tcclass "tap0 5 10*full/100 75*full/10 5 default " Checked.
Checking /etc/shorewall/tcrules...
 TC Rule "1:T 0.0.0.0/0 0.0.0.0/0 icmp echo-request" Checked
 TC Rule "1:T 0.0.0.0/0 0.0.0.0/0 icmp echo-reply" Checked
 TC Rule "1:T 192.168.1.5 0.0.0.0/0 " Checked
 TC Rule "1:T 0.0.0.0/0 192.168.1.5 " Checked
 TC Rule "2:T 0.0.0.0/0 0.0.0.0/0 udp 53" Checked
 TC Rule "2:T 0.0.0.0/0 0.0.0.0/0 tcp 53" Checked
 TC Rule "3:T 0.0.0.0/0 0.0.0.0/0 tcp 22" Checked
 TC Rule "3:T 0.0.0.0/0 0.0.0.0/0 tcp 5900" Checked
 TC Rule "4:T 0.0.0.0/0 0.0.0.0/0 tcp 80,443,8080,8088" Checked
 TC Rule "5:T 0.0.0.0/0 0.0.0.0/0 tcp 6974" Checked
 TC Rule "5:T 0.0.0.0/0 0.0.0.0/0 udp 6974" Checked
 TC Rule "5:T 0.0.0.0/0 192.168.1.2" Checked
 TC Rule "5:T 192.168.1.2 0.0.0.0/0" Checked


On Thu, Aug 27, 2009 at 12:40 PM, Tom Eastep <[email protected]> wrote:

> Donald wrote:
>
> > This may be one of those, you're doing it wrong, and there is a far
> > easier way to do it than the way you are doing it.  Please let me know.
> >
> > *Problem*
> > **- Seems like rules to the firewall work fine.  However, the DNAT rule
> > will not work over its dead body.  When I had the 3 NIC setup, that DNAT
> > rule worked fine.
>
> Please refer to http://www.shorewall.net/support.htm#Guidelines for the
> information we need to solve this type of problem.
>
> -Tom
> --
> Tom Eastep        \ When I die, I want to go like my Grandfather who
> Shoreline,         \ died peacefully in his sleep. Not screaming like
> Washington, USA     \ all of the passengers in his car
> http://shorewall.net \________________________________________________
>
>
>
> ------------------------------------------------------------------------------
> Let Crystal Reports handle the reporting - Free Crystal Reports 2008 30-Day
> trial. Simplify your report design, integration and deployment - and focus
> on
> what you do best, core application coding. Discover what's new with
> Crystal Reports now.  http://p.sf.net/sfu/bobj-july
> _______________________________________________
> Shorewall-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/shorewall-users
>
>
------------------------------------------------------------------------------
Let Crystal Reports handle the reporting - Free Crystal Reports 2008 30-Day 
trial. Simplify your report design, integration and deployment - and focus on 
what you do best, core application coding. Discover what's new with 
Crystal Reports now.  http://p.sf.net/sfu/bobj-july
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to