I_ have no Idea.  Based on the ifconfig file I think my interface 
should be wan0 (see attached file ' H - Shorewall Not Working -- wan0)


From:   Harry Lachanas <[email protected]>
To:     [email protected], Shorewall Users
<[email protected]>
Subject:        Re: [Shorewall-users] Wan0 Cannot Connect to Internet
Date:   05/01/2011 04:14:57 AM


On 05/01/2011 08:51 AM, Horace Franklin Jr wrote: 
Tom,
> 
> I am trying to install shorewall on my laptop. I am connecting to
> the INTERNET via a usb modem that is plugged in to a wireless router.
> 
> See attached files.
> 
> Horace
> I am puzzled ...

However I think that your net interface is 
wlan0 ???

That Is 

Interfaces file 

#ZONE    INTERFACE    BROADCAST    OPTIONS 
        net     wlan0            detect          dhcp,tcpflags 
#------ End of file no more stuff in here ??? 

Could this be it ??? 
Cheers







From:   Tom Eastep <[email protected]>
To:     [email protected]
Subject:        Re: [Shorewall-users] Cannot connect to the internet]
Date:   04/23/2011 07:32:25 AM


I don't know. The one thing we ask users to send us when they have
connection problems is the output of 'shorewall dump' collected as
described at http://www.shorewall.net/support.htm#Guidelines. That
output must be accompanied by a better problem description that 'I can't
connect to the internet'.

My point was, and still is, that unless you are running servers on the
Shorewall box, the macro-based rules that you are trying to add are
completely unnecessary in the first place.

-Tom
-- 
Tom Eastep        \ When I die, I want to go like my Grandfather who
Shoreline,         \ died peacefully in his sleep. Not screaming like
Washington, USA     \ all of the passengers in his car
http://shorewall.net \________________________________________________



I have no Idea.  That is why I provided a diagram of how my system is
connected.


Shorewall 4.4.6 Dump at horace-laptop - Sun May  1 09:04:23 PDT 2011

Counters reset Sun May  1 08:23:19 PDT 2011

Chain INPUT (policy DROP 147 packets, 12998 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
58202   70M ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    1    60 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     udp  --  eth0   *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:67:68 
    0     0 ACCEPT     udp  --  ppp0   *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:67:68 
    0     0 ACCEPT     udp  --  wan0   *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:67:68 

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 ACCEPT     udp  --  eth0   eth0    0.0.0.0/0            0.0.0.0/0   
        udp dpts:67:68 
    0     0 ACCEPT     udp  --  ppp0   ppp0    0.0.0.0/0            0.0.0.0/0   
        udp dpts:67:68 
    0     0 ACCEPT     udp  --  wan0   wan0    0.0.0.0/0            0.0.0.0/0   
        udp dpts:67:68 

Chain OUTPUT (policy ACCEPT 36450 packets, 1935K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Log (/var/log/messages)


NAT Table

Chain PREROUTING (policy ACCEPT 72 packets, 25752 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain POSTROUTING (policy ACCEPT 860 packets, 55153 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain OUTPUT (policy ACCEPT 860 packets, 55153 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Mangle Table

Chain PREROUTING (policy ACCEPT 58410 packets, 70M bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain INPUT (policy ACCEPT 58350 packets, 70M bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain OUTPUT (policy ACCEPT 36450 packets, 1935K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain POSTROUTING (policy ACCEPT 36554 packets, 1942K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Raw Table

Chain PREROUTING (policy ACCEPT 58410 packets, 70M bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain OUTPUT (policy ACCEPT 36450 packets, 1935K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Conntrack Table (25 out of 65536)

udp      17 31 src=192.168.0.198 dst=192.168.0.1 sport=47488 dport=53 packets=2 
bytes=132 src=192.168.0.1 dst=192.168.0.198 sport=53 dport=47488 packets=2 
bytes=286 [ASSURED] mark=0 secmark=0 use=2
udp      17 18 src=192.168.0.198 dst=192.168.0.1 sport=45622 dport=53 packets=2 
bytes=132 src=192.168.0.1 dst=192.168.0.198 sport=53 dport=45622 packets=2 
bytes=270 [ASSURED] mark=0 secmark=0 use=2
udp      17 31 src=192.168.0.198 dst=192.168.0.1 sport=33700 dport=53 packets=2 
bytes=122 src=192.168.0.1 dst=192.168.0.198 sport=53 dport=33700 packets=2 
bytes=352 [ASSURED] mark=0 secmark=0 use=2
udp      17 27 src=192.168.0.198 dst=192.168.0.1 sport=35124 dport=53 packets=2 
bytes=126 src=192.168.0.1 dst=192.168.0.198 sport=53 dport=35124 packets=2 
bytes=276 [ASSURED] mark=0 secmark=0 use=2
tcp      6 104 TIME_WAIT src=192.168.0.198 dst=204.154.94.81 sport=35324 
dport=443 packets=25 bytes=2970 src=204.154.94.81 dst=192.168.0.198 sport=443 
dport=35324 packets=23 bytes=13277 [ASSURED] mark=0 secmark=0 use=2
tcp      6 14 TIME_WAIT src=192.168.0.198 dst=64.147.162.160 sport=40524 
dport=80 packets=17 bytes=1319 src=64.147.162.160 dst=192.168.0.198 sport=80 
dport=40524 packets=16 bytes=13855 [ASSURED] mark=0 secmark=0 use=2
tcp      6 59 TIME_WAIT src=192.168.0.198 dst=98.129.160.155 sport=48008 
dport=443 packets=12 bytes=2433 src=98.129.160.155 dst=192.168.0.198 sport=443 
dport=48008 packets=12 bytes=5654 [ASSURED] mark=0 secmark=0 use=2
udp      17 18 src=192.168.0.198 dst=192.168.0.1 sport=53480 dport=53 packets=2 
bytes=122 src=192.168.0.1 dst=192.168.0.198 sport=53 dport=53480 packets=2 
bytes=336 [ASSURED] mark=0 secmark=0 use=2
udp      17 27 src=192.168.0.198 dst=192.168.0.1 sport=55743 dport=53 packets=2 
bytes=140 src=192.168.0.1 dst=192.168.0.198 sport=53 dport=55743 packets=2 
bytes=290 [ASSURED] mark=0 secmark=0 use=2
udp      17 31 src=192.168.0.198 dst=192.168.0.1 sport=33605 dport=53 packets=2 
bytes=124 src=192.168.0.1 dst=192.168.0.198 sport=53 dport=33605 packets=2 
bytes=686 [ASSURED] mark=0 secmark=0 use=2
udp      17 27 src=192.168.0.198 dst=192.168.0.1 sport=47015 dport=53 packets=2 
bytes=124 src=192.168.0.1 dst=192.168.0.198 sport=53 dport=47015 packets=2 
bytes=274 [ASSURED] mark=0 secmark=0 use=2
tcp      6 299 ESTABLISHED src=192.168.0.198 dst=91.189.88.46 sport=52280 
dport=80 packets=10226 bytes=411004 src=91.189.88.46 dst=192.168.0.198 sport=80 
dport=52280 packets=17462 bytes=21773884 [ASSURED] mark=0 secmark=0 use=2
tcp      6 14 TIME_WAIT src=192.168.0.198 dst=74.125.155.101 sport=58080 
dport=80 packets=10 bytes=2504 src=74.125.155.101 dst=192.168.0.198 sport=80 
dport=58080 packets=7 bytes=1448 [ASSURED] mark=0 secmark=0 use=2
udp      17 27 src=192.168.0.198 dst=192.168.0.1 sport=49026 dport=53 packets=2 
bytes=130 src=192.168.0.1 dst=192.168.0.198 sport=53 dport=49026 packets=2 
bytes=280 [ASSURED] mark=0 secmark=0 use=2
udp      17 0 src=192.168.0.198 dst=192.168.0.1 sport=48210 dport=53 packets=1 
bytes=59 src=192.168.0.1 dst=192.168.0.198 sport=53 dport=48210 packets=1 
bytes=142 mark=0 secmark=0 use=2
tcp      6 15 TIME_WAIT src=192.168.0.198 dst=199.239.136.200 sport=45511 
dport=80 packets=34 bytes=1953 src=199.239.136.200 dst=192.168.0.198 sport=80 
dport=45511 packets=34 bytes=34174 [ASSURED] mark=0 secmark=0 use=2
udp      17 27 src=192.168.0.198 dst=192.168.0.1 sport=46867 dport=53 packets=2 
bytes=132 src=192.168.0.1 dst=192.168.0.198 sport=53 dport=46867 packets=2 
bytes=282 [ASSURED] mark=0 secmark=0 use=2
udp      17 18 src=192.168.0.198 dst=192.168.0.1 sport=43689 dport=53 packets=2 
bytes=124 src=192.168.0.1 dst=192.168.0.198 sport=53 dport=43689 packets=2 
bytes=574 [ASSURED] mark=0 secmark=0 use=2
tcp      6 15 TIME_WAIT src=192.168.0.198 dst=209.191.122.70 sport=53644 
dport=80 packets=40 bytes=3611 src=209.191.122.70 dst=192.168.0.198 sport=80 
dport=53644 packets=47 bytes=52124 [ASSURED] mark=0 secmark=0 use=2
udp      17 31 src=192.168.0.198 dst=192.168.0.1 sport=38478 dport=53 packets=2 
bytes=116 src=192.168.0.1 dst=192.168.0.198 sport=53 dport=38478 packets=2 
bytes=480 [ASSURED] mark=0 secmark=0 use=2
tcp      6 431976 ESTABLISHED src=192.168.0.198 dst=83.150.67.33 sport=60373 
dport=80 packets=6 bytes=928 src=83.150.67.33 dst=192.168.0.198 sport=80 
dport=60373 packets=3 bytes=807 [ASSURED] mark=0 secmark=0 use=2
udp      17 30 src=192.168.0.198 dst=192.168.0.1 sport=56015 dport=53 packets=2 
bytes=118 src=192.168.0.1 dst=192.168.0.198 sport=53 dport=56015 packets=2 
bytes=350 [ASSURED] mark=0 secmark=0 use=2
udp      17 18 src=192.168.0.198 dst=192.168.0.1 sport=56721 dport=53 packets=2 
bytes=116 src=192.168.0.1 dst=192.168.0.198 sport=53 dport=56721 packets=2 
bytes=400 [ASSURED] mark=0 secmark=0 use=2
udp      17 30 src=192.168.0.198 dst=192.168.0.1 sport=35494 dport=53 packets=2 
bytes=150 src=192.168.0.1 dst=192.168.0.198 sport=53 dport=35494 packets=2 
bytes=668 [ASSURED] mark=0 secmark=0 use=2
udp      17 17 src=192.168.0.198 dst=192.168.0.1 sport=34734 dport=53 packets=2 
bytes=118 src=192.168.0.1 dst=192.168.0.198 sport=53 dport=34734 packets=2 
bytes=382 [ASSURED] mark=0 secmark=0 use=2

IP Configuration

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN 
    inet 127.0.0.1/8 scope host lo
3: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP qlen 1000
    inet 192.168.0.198/24 brd 192.168.0.255 scope global wlan0

IP Stats

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN 
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    RX: bytes  packets  errors  dropped overrun mcast   
    10390      142      0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    10390      142      0       0       0       0      
2: eth0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc mq state DOWN qlen 
1000
    link/ether 00:1d:72:e1:af:c9 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    0          0        0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    0          0        0       0       0       0      
3: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP qlen 1000
    link/ether 00:21:5d:3a:35:ce brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    70617063   58328    0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    3176484    36478    0       0       0       0      
4: vboxnet0: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN qlen 1000
    link/ether 0a:00:27:00:00:00 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    0          0        0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    0          0        0       0       0       0      

/proc

   /proc/version = Linux version 2.6.32-30-generic (buildd@vernadsky) (gcc 
version 4.4.3 (Ubuntu 4.4.3-4ubuntu5) ) #59-Ubuntu SMP Tue Mar 1 21:30:21 UTC 
2011
   /proc/sys/net/ipv4/ip_forward = 0
   /proc/sys/net/ipv4/icmp_echo_ignore_all = 0
   /proc/sys/net/ipv4/conf/all/proxy_arp = 0
   /proc/sys/net/ipv4/conf/all/arp_filter = 0
   /proc/sys/net/ipv4/conf/all/arp_ignore = 0
   /proc/sys/net/ipv4/conf/all/rp_filter = 0
   /proc/sys/net/ipv4/conf/all/log_martians = 0
   /proc/sys/net/ipv4/conf/default/proxy_arp = 0
   /proc/sys/net/ipv4/conf/default/arp_filter = 0
   /proc/sys/net/ipv4/conf/default/arp_ignore = 0
   /proc/sys/net/ipv4/conf/default/rp_filter = 0
   /proc/sys/net/ipv4/conf/default/log_martians = 1
   /proc/sys/net/ipv4/conf/eth0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/eth0/arp_filter = 0
   /proc/sys/net/ipv4/conf/eth0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/eth0/rp_filter = 0
   /proc/sys/net/ipv4/conf/eth0/log_martians = 1
   /proc/sys/net/ipv4/conf/lo/proxy_arp = 0
   /proc/sys/net/ipv4/conf/lo/arp_filter = 0
   /proc/sys/net/ipv4/conf/lo/arp_ignore = 0
   /proc/sys/net/ipv4/conf/lo/rp_filter = 0
   /proc/sys/net/ipv4/conf/lo/log_martians = 1
   /proc/sys/net/ipv4/conf/vboxnet0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/vboxnet0/arp_filter = 0
   /proc/sys/net/ipv4/conf/vboxnet0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/vboxnet0/rp_filter = 0
   /proc/sys/net/ipv4/conf/vboxnet0/log_martians = 1
   /proc/sys/net/ipv4/conf/wlan0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/wlan0/arp_filter = 0
   /proc/sys/net/ipv4/conf/wlan0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/wlan0/rp_filter = 0
   /proc/sys/net/ipv4/conf/wlan0/log_martians = 1

Routing Rules

0:      from all lookup local 
32766:  from all lookup main 
32767:  from all lookup default 

Table default:


Table local:

broadcast 192.168.0.255 dev wlan0  proto kernel  scope link  src 192.168.0.198 
broadcast 127.255.255.255 dev lo  proto kernel  scope link  src 127.0.0.1 
broadcast 192.168.0.0 dev wlan0  proto kernel  scope link  src 192.168.0.198 
local 192.168.0.198 dev wlan0  proto kernel  scope host  src 192.168.0.198 
broadcast 127.0.0.0 dev lo  proto kernel  scope link  src 127.0.0.1 
local 127.0.0.1 dev lo  proto kernel  scope host  src 127.0.0.1 
local 127.0.0.0/8 dev lo  proto kernel  scope host  src 127.0.0.1 

Table main:

192.168.0.0/24 dev wlan0  proto kernel  scope link  src 192.168.0.198  metric 2 
169.254.0.0/16 dev wlan0  scope link  metric 1000 
default via 192.168.0.1 dev wlan0  proto static 

ARP

? (192.168.0.1) at 00:30:44:09:a1:49 [ether] on wlan0

Modules

iptable_filter          2271  1 
iptable_mangle          2771  0 
iptable_nat             4414  0 
iptable_raw             1774  0 
ip_tables               9991  4 
iptable_raw,iptable_nat,iptable_mangle,iptable_filter
ipt_addrtype            1631  0 
ipt_ah                   893  0 
ipt_CLUSTERIP           5061  0 
ipt_ecn                 1121  0 
ipt_ECN                 1537  0 
ipt_LOG                 4542  0 
ipt_MASQUERADE          1407  0 
ipt_NETMAP               909  0 
ipt_REDIRECT             917  0 
ipt_REJECT              1928  0 
ipt_ULOG                5406  0 
nf_conntrack           61615  32 
xt_connlimit,ipt_MASQUERADE,ipt_CLUSTERIP,nf_nat_tftp,nf_nat_snmp_basic,nf_nat_sip,nf_nat_pptp,nf_nat_h323,nf_nat_amanda,nf_conntrack_amanda,nf_conntrack_sane,nf_conntrack_tftp,nf_conntrack_sip,nf_conntrack_proto_sctp,nf_conntrack_pptp,nf_conntrack_proto_gre,nf_conntrack_netlink,nf_conntrack_netbios_ns,nf_conntrack_h323,xt_helper,xt_conntrack,xt_CONNMARK,xt_connmark,iptable_nat,nf_conntrack_ipv6,xt_state,nf_nat_irc,nf_conntrack_irc,nf_nat_ftp,nf_nat,nf_conntrack_ipv4,nf_conntrack_ftp
nf_conntrack_amanda     2217  1 nf_nat_amanda
nf_conntrack_ftp        5381  1 nf_nat_ftp
nf_conntrack_h323      46926  1 nf_nat_h323
nf_conntrack_ipv4      10672  5 iptable_nat,nf_nat
nf_conntrack_ipv6      10447  9 
nf_conntrack_irc        3332  1 nf_nat_irc
nf_conntrack_netbios_ns     1254  0 
nf_conntrack_netlink    14323  0 
nf_conntrack_pptp       4413  1 nf_nat_pptp
nf_conntrack_proto_gre     4021  1 nf_conntrack_pptp
nf_conntrack_proto_sctp     6424  0 
nf_conntrack_sane       3079  0 
nf_conntrack_sip       15389  1 nf_nat_sip
nf_conntrack_tftp       2893  1 nf_nat_tftp
nf_defrag_ipv4          1073  1 nf_conntrack_ipv4
nf_nat                 15735  12 
ipt_REDIRECT,ipt_NETMAP,ipt_MASQUERADE,nf_nat_tftp,nf_nat_sip,nf_nat_pptp,nf_nat_proto_gre,nf_nat_h323,nf_nat_amanda,iptable_nat,nf_nat_irc,nf_nat_ftp
nf_nat_amanda            878  0 
nf_nat_ftp              1836  0 
nf_nat_h323             5077  0 
nf_nat_irc              1124  0 
nf_nat_pptp             1920  0 
nf_nat_proto_gre        1259  1 nf_nat_pptp
nf_nat_sip              5108  0 
nf_nat_snmp_basic       7716  0 
nf_nat_tftp              716  0 
xt_CLASSIFY              723  0 
xt_comment               720  0 
xt_connlimit            2884  0 
xt_CONNMARK             1145  0 
xt_connmark              985  0 
xt_conntrack            2302  0 
xt_dccp                 1797  0 
xt_dscp                 1301  0 
xt_DSCP                 1677  0 
xt_hashlimit            8204  0 
xt_helper               1071  0 
xt_hl                   1113  4 
xt_iprange              1357  0 
xt_length                936  0 
xt_limit                1382  8 
xt_mac                   772  0 
xt_mark                  711  0 
xt_MARK                  743  0 
xt_multiport            2378  0 
xt_NFLOG                 841  0 
xt_NFQUEUE              1832  0 
xt_owner                 906  0 
xt_physdev              1507  0 
xt_pkttype               848  0 
xt_policy               2158  0 
xt_realm                 714  0 
xt_recent               7037  0 
xt_state                1098  11 
xt_tcpmss               1197  0 
xt_tcpudp               2011  50 
xt_time                 1805  0 

Shorewall has detected the following iptables/netfilter capabilities:
   NAT: Available
   Packet Mangling: Available
   Multi-port Match: Available
   Extended Multi-port Match: Available
   Connection Tracking Match: Available
   Extended Connection Tracking Match Support: Available
   Old Connection Tracking Match Syntax: Not available
   Packet Type Match: Available
   Policy Match: Available
   Physdev Match: Available
   Physdev-is-bridged Support: Available
   Packet length Match: Available
   IP range Match: Available
   Recent Match: Available
   Owner Match: Available
   Ipset Match: Not available
   CONNMARK Target: Available
   Extended CONNMARK Target: Available
   Connmark Match: Available
   Extended Connmark Match: Available
   Raw Table: Available
   IPP2P Match: Not available
   CLASSIFY Target: Available
   Extended REJECT: Available
   Repeat match: Available
   MARK Target: Available
   Extended MARK Target: Available
   Extended MARK Target 2: Available
   Mangle FORWARD Chain: Available
   Comments: Available
   Address Type Match: Available
   TCPMSS Match: Available
   Hashlimit Match: Available
   Old Hashlimit Match: Not available
   NFQUEUE Target: Available
   Realm Match: Available
   Helper Match: Available
   Connlimit Match: Available
   Time Match: Available
   Goto Support: Available
   LOGMARK Target: Not available
   IPMARK Target: Not available
   LOG Target: Available
   Persistent SNAT: Available

Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address           Foreign Address         State       
PID/Program name
tcp        0      0 127.0.0.1:631           0.0.0.0:*               LISTEN      
1960/cupsd      
tcp        0      0 0.0.0.0:25              0.0.0.0:*               LISTEN      
1882/master     
tcp        0      0 0.0.0.0:666             0.0.0.0:*               LISTEN      
1738/darkstat   
tcp        0      0 192.168.0.198:52280     91.189.88.46:80         ESTABLISHED 
3560/http       
tcp        0      0 192.168.0.198:35324     204.154.94.81:443       TIME_WAIT   
-               
tcp        0      0 192.168.0.198:60373     83.150.67.33:80         ESTABLISHED 
2684/firefox-bin
tcp6       0      0 ::1:631                 :::*                    LISTEN      
1960/cupsd      
udp        0      0 0.0.0.0:68              0.0.0.0:*                           
2499/dhclient   
udp        0      0 0.0.0.0:5353            0.0.0.0:*                           
1058/avahi-daemon: 
udp        0      0 0.0.0.0:35330           0.0.0.0:*                           
1058/avahi-daemon: 

Traffic Control

Device eth0:
qdisc mq 0: root 
 Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0) 
 rate 0bit 0pps backlog 0b 0p requeues 0 

class mq :1 root 
 Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 
class mq :2 root 
 Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 
class mq :3 root 
 Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 
class mq :4 root 
 Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 
class mq :5 root 
 Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 

Device wlan0:
qdisc mq 0: root 
 Sent 2447140 bytes 36482 pkt (dropped 0, overlimits 0 requeues 0) 
 rate 0bit 0pps backlog 0b 0p requeues 0 

class mq :1 root 
 Sent 5466 bytes 23 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 
class mq :2 root 
 Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 
class mq :3 root 
 Sent 2441674 bytes 36459 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 
class mq :4 root 
 Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 


TC Filters

Device eth0:

Device wlan0:

My OS is Linux Mint 9 'Isadora' 
My installed firewall is Shorewall 4.4.6-1 

My system is connected as follows:

*********************************************
****    MY SYSTEM WIRELESS ROUTER        ****
*********************************************

-------------------------           ---------------------       
                        |           |                   |     
                        |           |                   |      
--------------------------
         LAPTOP         |           | WIRELESS ROUTER   |     |                 
         |
                        |           |                   |------    USB Modem    
         |
                        |           |                   |------    (Broadband)  
         |
-------------------------           ---------------------     |                 
         |
            |                                                   
--------------------------
            |                                                          |
            |-----------------------------------------------------------
                               (WIRELESS CONNECTION)



$ IFCONFIG
eth0      Link encap:Ethernet  HWaddr 00:1d:72:e1:af:c9  
          UP BROADCAST MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:0 (0.0 B)  TX bytes:0 (0.0 B)
          Interrupt:16 

lo        Link encap:Local Loopback  
          inet addr:127.0.0.1  Mask:255.0.0.0
          inet6 addr: ::1/128 Scope:Host
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:734 errors:0 dropped:0 overruns:0 frame:0
          TX packets:734 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0 
          RX bytes:56450 (56.4 KB)  TX bytes:56450 (56.4 KB)

wlan0     Link encap:Ethernet  HWaddr 00:21:5d:3a:35:ce  
          inet addr:192.168.0.198  Bcast:192.168.0.255  Mask:255.255.255.0
          inet6 addr: fe80::221:5dff:fe3a:35ce/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:51683 errors:0 dropped:0 overruns:0 frame:0
          TX packets:31403 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:73720192 (73.7 MB)  TX bytes:2636092 (2.6 MB)




$ IP ROUTE SHOW 
        192.168.0.0/24 dev wlan0  proto kernel  scope link  src 192.168.0.198  
metric 2 
        169.254.0.0/16 dev wlan0  scope link  metric 1000 
        default via 192.168.0.1 dev wlan0  proto static 



horace@horace-laptop ~ $ sudo shorewall start
                Compiling...
                Compiling /etc/shorewall/zones...
                Compiling /etc/shorewall/interfaces...
                Determining Hosts in Zones...
                Preprocessing Action Files...
                Compiling ...
                   Pre-processing /usr/share/shorewall/action.Drop...
                   Pre-processing /usr/share/shorewall/action.Reject...
                Compiling /etc/shorewall/policy...
                Adding Anti-smurf Rules
                Adding rules for DHCP
                Compiling TCP Flags filtering...
                Compiling Kernel Route Filtering...
                Compiling Martian Logging...
                Compiling MAC Filtration -- Phase 1...
                Compiling /etc/shorewall/rules...
                Generating Transitive Closure of Used-action List...
                Processing /usr/share/shorewall/action.Reject for chain 
Reject...
                Compiling ...
                Processing /usr/share/shorewall/action.Drop for chain Drop...
                Compiling MAC Filtration -- Phase 2...
                Applying Policies...
                Generating Rule Matrix...
                Creating iptables-restore input...
                Compiling iptables-restore input for chain mangle:...
                Shorewall configuration compiled to /var/lib/shorewall/.start
                Starting Shorewall....
                Initializing...
                Setting up Route Filtering...
                Setting up Martian Logging...
                Setting up Traffic Control...
                Preparing iptables-restore input...
                Running /sbin/iptables-restore...
                IPv4 Forwarding Disabled!
                done.
horace@horace-laptop ~ $ 


MY SHOREWALL SETTINGS
        /etc/default/shorewall
                startup = 1

        /etc/shorewall/shorewall.conf
        STARTUP_ENABLED=Yes

        /etc/shorewall/zones
                #ZONE   TYPE            OPTIONS         IN                      
OUT
                #                                       OPTIONS                 
OPTIONS
                fw      firewall
                net     ipv4

        /etc/shorewall/interfaces
                #ZONE   INTERFACE       BROADCAST       OPTIONS
                net     eth0            detect          
dhcp,tcpflags,logmartians,nosmurfs                              
                net     ppp0            detect          dhcp,tcpflags 
                net     wan0            detect          dhcp,tcpflags 

        /etc/shorewall/policy
                #SOURCE         DEST            POLICY          -LOG            
BURST :LIMIT            CONNLIMIT:MASK:
                $FW             net             ACCEPT
                net             all             DROP            info
                # The FOLLOWING POLICY MUST BE LAST
                all             all             REJECT          info

        /etc/shorewall/rules
                #ACTION         SOURCE          DEST            PROTO   DEST    
SOURCE          ORIGINAL        RATE            USER/   MARK
                #                                                       PORT    
PORT(S)         DEST            LIMIT           GROUP

                # Drop Ping from the "bad" net zone.. and prevent your log from 
being flooded..

                Ping(DROP)      net             $FW

                # Permit all ICMP traffic FROM the firewall TO the net zone

                ACCEPT          $FW             net             icmp


------------------------------------------------------------------------------
WhatsUp Gold - Download Free Network Management Software
The most intuitive, comprehensive, and cost-effective network 
management toolset available today.  Delivers lowest initial 
acquisition cost and overall TCO of any competing solution.
http://p.sf.net/sfu/whatsupgold-sd
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to