On 3/05/2011 9:58 PM, Tom Eastep wrote:
On May 2, 2011, at 10:47 PM, Frank Richards wrote:

Hi

     Have tried all I can think of but still unable to get to get it to
work,
IP_FORWARDING=ON

ADD_IP_ALIASES=Yes

my version 2 system is ok and have used the same settings as there, and
the start dialogue says the
IPv4 Forwarding Enabled

Am i missing something?

Regards Frank

root@server:~# shorewall restart
Compiling...
Processing /etc/shorewall/shorewall.conf...
Loading Modules...
Compiling /etc/shorewall/zones...
Compiling /etc/shorewall/interfaces...
Determining Hosts in Zones...
Preprocessing Action Files...
Compiling ...
   Pre-processing /usr/share/shorewall/action.Drop...
   Pre-processing /usr/share/shorewall/action.Reject...
Compiling /etc/shorewall/policy...
Adding rules for DHCP
Compiling Kernel Route Filtering...
Compiling Martian Logging...
Compiling /etc/shorewall/masq...
   WARNING: Using an interface as the masq SOURCE requires the
interface to be up and configured when Shorewall starts/restarts :
/etc/shorewall/masq (line 1)
Compiling MAC Filtration -- Phase 1...
Compiling /etc/shorewall/rules...
Generating Transitive Closure of Used-action List...
Processing /usr/share/shorewall/action.Reject for chain Reject...
Compiling ...
Processing /usr/share/shorewall/action.Drop for chain Drop...
Compiling MAC Filtration -- Phase 2...
Applying Policies...
Generating Rule Matrix...
Creating iptables-restore input...
Compiling iptables-restore input for chain mangle:...
Shorewall configuration compiled to /var/lib/shorewall/.restart
Restarting Shorewall....
WARNING: default route ignored on interface eth1
The above message indicates that there is a default route defined out of eth1 
and that you have entered 'eth1' in the SOURCE column of 
/etc/shorewall/interfaces (we can see that from the WARNING: above). If eth1 is 
really your internal (local) interface, then it should not have a default route 
defined. Otherwise, you may have the interfaces reversed.
was an error in masq but problem still exists dump attached
As always, the output of 'shorewall dump' is most useful for trying to help you 
determine the exact cause. Please see 
http://www.shorewall.net/support.htm#Guidelines for information about how to 
collect a useful dump.

Thanks,
-Tom

Tom Eastep        \ When I die, I want to go like my Grandfather who
Shoreline,         \ died peacefully in his sleep. Not screaming like
Washington, USA     \ all of the passengers in his car
http://shorewall.net \________________________________________________




------------------------------------------------------------------------------
WhatsUp Gold - Download Free Network Management Software
The most intuitive, comprehensive, and cost-effective network
management toolset available today.  Delivers lowest initial
acquisition cost and overall TCO of any competing solution.
http://p.sf.net/sfu/whatsupgold-sd


_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Shorewall 4.4.11.6 Dump at server - Wed May  4 10:30:20 EST 2011

Counters reset Wed May  4 10:00:16 EST 2011

Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
  205 29222 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ctstate INVALID,NEW 
  660 57195 loc2fw     all  --  eth0   *       0.0.0.0/0            0.0.0.0/0   
        
  224 31275 net2fw     all  --  eth1   *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ctstate RELATED,ESTABLISHED 
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:' 
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ctstate INVALID,NEW 
    0     0 TCPMSS     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp flags:0x06/0x02 TCPMSS clamp to PMTU 
    0     0 loc2net    all  --  eth0   eth1    0.0.0.0/0            0.0.0.0/0   
        
    0     0 net2loc    all  --  eth1   eth0    0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ctstate RELATED,ESTABLISHED 
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:' 
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain OUTPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
  665  248K fw2loc     all  --  *      eth0    0.0.0.0/0            0.0.0.0/0   
        
   58  7599 fw2net     all  --  *      eth1    0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     all  --  *      lo      0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ctstate RELATED,ESTABLISHED 
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:OUTPUT:REJECT:' 
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain Drop (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
  168 22717            all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:113 /* Auth */ 
  168 22717 dropBcast  all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 3 code 4 /* Needed ICMP types */ 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 11 /* Needed ICMP types */ 
    3   152 dropInvalid  all  --  *      *       0.0.0.0/0            0.0.0.0/0 
          
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,445 /* SMB */ 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:137:139 /* SMB */ 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:137 dpts:1024:65535 /* SMB */ 
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,139,445 /* SMB */ 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:1900 /* UPnP */ 
    3   152 dropNotSyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0  
         
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:53 /* Late DNS Replies */ 

Chain Reject (5 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    9  1194            all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:113 /* Auth */ 
    9  1194 dropBcast  all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 3 code 4 /* Needed ICMP types */ 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 11 /* Needed ICMP types */ 
    0     0 dropInvalid  all  --  *      *       0.0.0.0/0            0.0.0.0/0 
          
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,445 /* SMB */ 
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:137:139 /* SMB */ 
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:137 dpts:1024:65535 /* SMB */ 
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,139,445 /* SMB */ 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:1900 /* UPnP */ 
    0     0 dropNotSyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0  
         
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:53 /* Late DNS Replies */ 

Chain dropBcast (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
  174 23759 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ADDRTYPE match dst-type BROADCAST 
    0     0 DROP       all  --  *      *       0.0.0.0/0            224.0.0.0/4 
        

Chain dropInvalid (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ctstate INVALID 

Chain dropNotSyn (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp flags:!0x17/0x02 

Chain dynamic (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain fw2loc (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
  659  246K ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ctstate RELATED,ESTABLISHED 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 8 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:22 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:68 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:123 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpts:137:139 
    6  1431 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:137:139 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:631 
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:fw2loc:REJECT:' 
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain fw2net (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:67:68 
   20  4304 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ctstate RELATED,ESTABLISHED 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:22 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:23 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:25 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:53 
   29  2101 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:53 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:69 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:80 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:123 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:443 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:700 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:11371 
    9  1194 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:fw2net:REJECT:' 
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain loc2fw (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
  629 52388 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ctstate RELATED,ESTABLISHED 
   31  4807 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain loc2net (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ctstate RELATED,ESTABLISHED 
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain logdrop (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain logreject (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain net2fw (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    5  1646 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:67:68 
   50  6860 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ctstate RELATED,ESTABLISHED 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:21 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:25 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:53 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:53 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:69 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:80 
    1    52 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:700 
  168 22717 Drop       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    3   152 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain net2loc (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ctstate RELATED,ESTABLISHED 
    0     0 Drop       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:net2loc:DROP:' 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain reject (12 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ADDRTYPE match src-type BROADCAST 
    0     0 DROP       all  --  *      *       224.0.0.0/4          0.0.0.0/0   
        
    0     0 DROP       2    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 REJECT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with tcp-reset 
    0     0 REJECT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with icmp-port-unreachable 
    0     0 REJECT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with icmp-host-unreachable 
    0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with icmp-host-prohibited 

Chain shorewall (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Log (/var/log/messages)

May  3 15:11:09 fw2net:REJECT:IN= OUT=eth1 SRC=192.168.1.64 DST=74.125.237.48 
LEN=84 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=14381 
SEQ=1 
May  3 15:11:09 fw2net:REJECT:IN= OUT=eth1 SRC=192.168.1.64 DST=74.125.237.48 
LEN=84 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=14381 
SEQ=1 
May  3 15:11:09 fw2net:REJECT:IN= OUT=eth1 SRC=192.168.1.64 DST=74.125.237.48 
LEN=84 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=14381 
SEQ=1 
May  3 15:11:09 fw2net:REJECT:IN= OUT=eth1 SRC=192.168.1.64 DST=74.125.237.48 
LEN=84 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=14381 
SEQ=1 
May  3 15:11:09 fw2net:REJECT:IN= OUT=eth1 SRC=192.168.1.64 DST=74.125.237.48 
LEN=84 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=14381 
SEQ=1 
May  3 15:11:09 fw2net:REJECT:IN= OUT=eth1 SRC=192.168.1.64 DST=74.125.237.48 
LEN=84 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=14381 
SEQ=1 
May  3 15:11:09 fw2net:REJECT:IN= OUT=eth1 SRC=192.168.1.64 DST=74.125.237.48 
LEN=84 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=14381 
SEQ=1 
May  3 15:11:09 fw2net:REJECT:IN= OUT=eth1 SRC=192.168.1.64 DST=74.125.237.48 
LEN=84 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=14381 
SEQ=1 
May  3 15:11:09 fw2net:REJECT:IN= OUT=eth1 SRC=192.168.1.64 DST=74.125.237.48 
LEN=84 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=14381 
SEQ=1 
May  3 15:11:09 fw2net:REJECT:IN= OUT=eth1 SRC=192.168.1.64 DST=74.125.237.48 
LEN=84 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=14381 
SEQ=1 
May  3 15:11:09 fw2net:REJECT:IN= OUT=eth1 SRC=192.168.1.64 DST=74.125.237.48 
LEN=84 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=14381 
SEQ=1 
May  3 15:11:09 fw2net:REJECT:IN= OUT=eth1 SRC=192.168.1.64 DST=74.125.237.48 
LEN=84 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=14381 
SEQ=1 
May  3 15:11:09 fw2net:REJECT:IN= OUT=eth1 SRC=192.168.1.64 DST=74.125.237.48 
LEN=84 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=14381 
SEQ=1 
May  3 15:11:09 fw2net:REJECT:IN= OUT=eth1 SRC=192.168.1.64 DST=74.125.237.48 
LEN=84 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=14381 
SEQ=1 
May  3 15:11:09 fw2net:REJECT:IN= OUT=eth1 SRC=192.168.1.64 DST=74.125.237.48 
LEN=84 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=14381 
SEQ=1 
May  3 15:11:09 fw2net:REJECT:IN= OUT=eth1 SRC=192.168.1.64 DST=74.125.237.48 
LEN=84 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=14381 
SEQ=1 
May  3 15:11:09 fw2net:REJECT:IN= OUT=eth1 SRC=192.168.1.64 DST=74.125.237.48 
LEN=84 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=14381 
SEQ=1 
May  3 15:11:09 fw2net:REJECT:IN= OUT=eth1 SRC=192.168.1.64 DST=74.125.237.48 
LEN=84 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=14381 
SEQ=1 
May  3 15:11:09 fw2net:REJECT:IN= OUT=eth1 SRC=192.168.1.64 DST=74.125.237.48 
LEN=84 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=14381 
SEQ=1 
May  3 15:11:09 fw2net:REJECT:IN= OUT=eth1 SRC=192.168.1.64 DST=74.125.237.48 
LEN=84 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=14381 
SEQ=1 

NAT Table

Chain PREROUTING (policy ACCEPT 185 packets, 24279 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain POSTROUTING (policy ACCEPT 27 packets, 2295 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
   29  2101 eth1_masq  all  --  *      eth1    0.0.0.0/0            0.0.0.0/0   
        

Chain OUTPUT (policy ACCEPT 34 packets, 3169 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain eth1_masq (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 MASQUERADE  all  --  *      *       192.168.0.0/24       0.0.0.0/0  
         

Mangle Table

Chain PREROUTING (policy ACCEPT 517 packets, 57523 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
  894 89010 tcpre      all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain INPUT (policy ACCEPT 507 packets, 56983 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 MARK       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        MARK and 0xffffff00 
    0     0 tcfor      all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain OUTPUT (policy ACCEPT 353 packets, 113K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
  723  255K tcout      all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain POSTROUTING (policy ACCEPT 350 packets, 114K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
  720  255K tcpost     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain tcfor (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain tcout (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain tcpost (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain tcpre (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Raw Table

Chain PREROUTING (policy ACCEPT 894 packets, 89010 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain OUTPUT (policy ACCEPT 723 packets, 255K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Conntrack Table (8 out of 65536)

udp      17 6 src=192.168.1.64 dst=192.168.1.220 sport=51704 dport=53 packets=1 
bytes=84 src=192.168.1.220 dst=192.168.1.64 sport=53 dport=51704 packets=1 
bytes=135 mark=0 secmark=0 use=2
udp      17 17 src=192.168.1.64 dst=192.168.1.220 sport=38422 dport=53 
packets=1 bytes=71 src=192.168.1.220 dst=192.168.1.64 sport=53 dport=38422 
packets=1 bytes=144 mark=0 secmark=0 use=2
udp      17 6 src=192.168.1.64 dst=192.168.1.220 sport=38805 dport=53 packets=1 
bytes=61 src=192.168.1.220 dst=192.168.1.64 sport=53 dport=38805 packets=1 
bytes=119 mark=0 secmark=0 use=2
tcp      6 430195 ESTABLISHED src=192.168.0.51 dst=192.168.0.220 sport=60740 
dport=22 packets=74 bytes=6735 src=192.168.0.220 dst=192.168.0.51 sport=22 
dport=60740 packets=55 bytes=8428 [ASSURED] mark=0 secmark=0 use=2
udp      17 6 src=192.168.1.64 dst=192.168.1.220 sport=60534 dport=53 packets=1 
bytes=84 src=192.168.1.220 dst=192.168.1.64 sport=53 dport=60534 packets=1 
bytes=135 mark=0 secmark=0 use=2
tcp      6 299 ESTABLISHED src=192.168.1.58 dst=192.168.1.64 sport=51764 
dport=700 packets=22 bytes=3212 src=192.168.1.64 dst=192.168.1.58 sport=700 
dport=51764 packets=20 bytes=4304 [ASSURED] mark=0 secmark=0 use=2
udp      17 6 src=192.168.1.64 dst=192.168.1.220 sport=37990 dport=53 packets=1 
bytes=61 src=192.168.1.220 dst=192.168.1.64 sport=53 dport=37990 packets=1 
bytes=119 mark=0 secmark=0 use=2
udp      17 6 src=192.168.0.51 dst=192.168.0.220 sport=68 dport=67 packets=1 
bytes=328 src=192.168.0.220 dst=192.168.0.51 sport=67 dport=68 packets=1 
bytes=328 mark=0 secmark=0 use=2

IP Configuration

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN 
    inet 127.0.0.1/8 scope host lo
2: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state 
UNKNOWN qlen 1000
    inet 192.168.1.64/24 brd 192.168.1.225 scope global eth1
3: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state 
UNKNOWN qlen 1000
    inet 192.168.0.220/24 brd 192.168.0.255 scope global eth0

IP Stats

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN 
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    RX: bytes  packets  errors  dropped overrun mcast   
    480        8        0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    480        8        0       0       0       0      
2: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state 
UNKNOWN qlen 1000
    link/ether 00:0e:2e:59:ce:c4 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    218590     1047     0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    30142      275      0       0       0       0      
3: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state 
UNKNOWN qlen 1000
    link/ether 6c:f0:49:90:e9:cd brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    202670     1907     0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    750549     1973     0       0       0       0      

/proc

   /proc/version = Linux version 2.6.32-5-amd64 (Debian 2.6.32-31) 
([email protected]) (gcc version 4.3.5 (Debian 4.3.5-4) ) #1 SMP Mon Mar 7 
21:35:22 UTC 2011
   /proc/sys/net/ipv4/ip_forward = 1
   /proc/sys/net/ipv4/icmp_echo_ignore_all = 0
   /proc/sys/net/ipv4/conf/all/proxy_arp = 0
   /proc/sys/net/ipv4/conf/all/arp_filter = 0
   /proc/sys/net/ipv4/conf/all/arp_ignore = 0
   /proc/sys/net/ipv4/conf/all/rp_filter = 1
   /proc/sys/net/ipv4/conf/all/log_martians = 0
   /proc/sys/net/ipv4/conf/default/proxy_arp = 0
   /proc/sys/net/ipv4/conf/default/arp_filter = 0
   /proc/sys/net/ipv4/conf/default/arp_ignore = 0
   /proc/sys/net/ipv4/conf/default/rp_filter = 1
   /proc/sys/net/ipv4/conf/default/log_martians = 1
   /proc/sys/net/ipv4/conf/eth0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/eth0/arp_filter = 0
   /proc/sys/net/ipv4/conf/eth0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/eth0/rp_filter = 1
   /proc/sys/net/ipv4/conf/eth0/log_martians = 1
   /proc/sys/net/ipv4/conf/eth1/proxy_arp = 0
   /proc/sys/net/ipv4/conf/eth1/arp_filter = 0
   /proc/sys/net/ipv4/conf/eth1/arp_ignore = 0
   /proc/sys/net/ipv4/conf/eth1/rp_filter = 1
   /proc/sys/net/ipv4/conf/eth1/log_martians = 1
   /proc/sys/net/ipv4/conf/lo/proxy_arp = 0
   /proc/sys/net/ipv4/conf/lo/arp_filter = 0
   /proc/sys/net/ipv4/conf/lo/arp_ignore = 0
   /proc/sys/net/ipv4/conf/lo/rp_filter = 1
   /proc/sys/net/ipv4/conf/lo/log_martians = 1

Routing Rules

0:      from all lookup local 
32766:  from all lookup main 
32767:  from all lookup default 

Table default:


Table local:

broadcast 192.168.1.0 dev eth1  proto kernel  scope link  src 192.168.1.64 
broadcast 192.168.0.255 dev eth0  proto kernel  scope link  src 192.168.0.220 
broadcast 127.255.255.255 dev lo  proto kernel  scope link  src 127.0.0.1 
local 192.168.1.64 dev eth1  proto kernel  scope host  src 192.168.1.64 
local 192.168.0.220 dev eth0  proto kernel  scope host  src 192.168.0.220 
broadcast 192.168.1.225 dev eth1  proto kernel  scope link  src 192.168.1.64 
broadcast 192.168.1.255 dev eth1  proto kernel  scope link  src 192.168.1.64 
broadcast 192.168.0.0 dev eth0  proto kernel  scope link  src 192.168.0.220 
broadcast 127.0.0.0 dev lo  proto kernel  scope link  src 127.0.0.1 
local 127.0.0.1 dev lo  proto kernel  scope host  src 127.0.0.1 
local 127.0.0.0/8 dev lo  proto kernel  scope host  src 127.0.0.1 

Table main:

192.168.1.0/24 dev eth1  proto kernel  scope link  src 192.168.1.64 
192.168.0.0/24 dev eth0  proto kernel  scope link  src 192.168.0.220 
default via 192.168.1.220 dev eth1 

ARP

? (192.168.1.58) at 00:22:15:d4:c2:e3 [ether] on eth1
? (192.168.0.51) at 00:11:d8:e5:93:d9 [ether] on eth0
? (192.168.1.220) at 00:e0:4d:28:20:47 [ether] on eth1

Modules

iptable_filter          2258  1 
iptable_mangle          2817  1 
iptable_nat             4299  1 
iptable_raw             1867  0 
ip_tables              13899  4 
iptable_raw,iptable_nat,iptable_mangle,iptable_filter
ipt_addrtype            1769  2 
ipt_ah                  1061  0 
ipt_CLUSTERIP           4910  0 
ipt_ecn                 1272  0 
ipt_ECN                 1672  0 
ipt_LOG                 4518  6 
ipt_MASQUERADE          1554  1 
ipt_NETMAP              1137  0 
ipt_REDIRECT            1111  0 
ipt_REJECT              1953  4 
ipt_ULOG                7129  0 
nf_conntrack           46535  31 
xt_connlimit,ipt_MASQUERADE,ipt_CLUSTERIP,nf_nat_tftp,nf_nat_snmp_basic,nf_nat_sip,nf_nat_pptp,nf_nat_irc,nf_nat_h323,nf_nat_ftp,nf_nat_amanda,nf_conntrack_amanda,nf_conntrack_sane,nf_conntrack_tftp,nf_conntrack_sip,nf_conntrack_proto_sctp,nf_conntrack_pptp,nf_conntrack_proto_gre,nf_conntrack_netlink,nf_conntrack_netbios_ns,nf_conntrack_irc,nf_conntrack_h323,nf_conntrack_ftp,xt_helper,xt_conntrack,xt_CONNMARK,xt_connmark,xt_state,iptable_nat,nf_nat,nf_conntrack_ipv4
nf_conntrack_amanda     2197  1 nf_nat_amanda
nf_conntrack_ftp        5537  1 nf_nat_ftp
nf_conntrack_h323      36992  1 nf_nat_h323
nf_conntrack_ipv4       9833  15 iptable_nat,nf_nat
nf_conntrack_irc        3347  1 nf_nat_irc
nf_conntrack_netbios_ns     1282  0 
nf_conntrack_netlink    13128  0 
nf_conntrack_pptp       3801  1 nf_nat_pptp
nf_conntrack_proto_gre     3579  1 nf_conntrack_pptp
nf_conntrack_proto_sctp     6238  0 
nf_conntrack_sane       3620  0 
nf_conntrack_sip       13546  1 nf_nat_sip
nf_conntrack_tftp       3321  1 nf_nat_tftp
nf_defrag_ipv4          1139  2 xt_TPROXY,nf_conntrack_ipv4
nf_nat                 13388  12 
ipt_REDIRECT,ipt_NETMAP,ipt_MASQUERADE,nf_nat_tftp,nf_nat_sip,nf_nat_pptp,nf_nat_proto_gre,nf_nat_irc,nf_nat_h323,nf_nat_ftp,nf_nat_amanda,iptable_nat
nf_nat_amanda           1144  0 
nf_nat_ftp              2031  0 
nf_nat_h323             5095  0 
nf_nat_irc              1366  0 
nf_nat_pptp             2034  0 
nf_nat_proto_gre        1245  1 nf_nat_pptp
nf_nat_sip              4934  0 
nf_nat_snmp_basic       7796  0 
nf_nat_tftp              966  0 
nf_tproxy_core          1549  1 xt_TPROXY,[permanent]
xt_CLASSIFY              925  0 
xt_comment               907  18 
xt_connlimit            2863  0 
xt_connmark             1123  0 
xt_CONNMARK             1267  0 
xt_conntrack            2407  12 
xt_dccp                 1915  0 
xt_dscp                 1611  0 
xt_DSCP                 1995  0 
xt_hashlimit            7707  0 
xt_helper               1227  0 
xt_iprange              1433  0 
xt_length               1164  0 
xt_limit                1782  0 
xt_mac                   979  0 
xt_mark                  917  0 
xt_MARK                  917  1 
xt_multiport            2267  4 
xt_NFLOG                1038  0 
xt_NFQUEUE              1989  0 
xt_owner                1063  0 
xt_physdev              1508  0 
xt_pkttype              1003  0 
xt_policy               2170  0 
xt_realm                 919  0 
xt_recent               5977  0 
xt_state                1303  0 
xt_tcpmss               1401  0 
xt_TCPMSS               2919  1 
xt_tcpudp               2319  38 
xt_time                 1723  0 
xt_TPROXY               1329  0 

Shorewall has detected the following iptables/netfilter capabilities:
   NAT: Available
   Packet Mangling: Available
   Multi-port Match: Available
   Extended Multi-port Match: Available
   Connection Tracking Match: Available
   Extended Connection Tracking Match Support: Available
   Packet Type Match: Available
   Policy Match: Available
   Physdev Match: Available
   Physdev-is-bridged Support: Available
   Packet length Match: Available
   IP range Match: Available
   Recent Match: Available
   Owner Match: Available
   Ipset Match: Not available
   CONNMARK Target: Available
   Extended CONNMARK Target: Available
   Connmark Match: Available
   Extended Connmark Match: Available
   Raw Table: Available
   IPP2P Match: Not available
   CLASSIFY Target: Available
   Extended REJECT: Available
   Repeat match: Available
   MARK Target: Available
   Extended MARK Target: Available
   Extended MARK Target 2: Available
   Mangle FORWARD Chain: Available
   Comments: Available
   Address Type Match: Available
   TCPMSS Match: Available
   Hashlimit Match: Available
   NFQUEUE Target: Available
   Realm Match: Available
   Helper Match: Available
   Connlimit Match: Available
   Time Match: Available
   Goto Support: Available
   LOGMARK Target: Not available
   IPMARK Target: Not available
   LOG Target: Available
   Persistent SNAT: Available
   TPROXY Target: Available
   FLOW Classifier: Available
   fwmark route mask: Available

Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address           Foreign Address         State       
PID/Program name
tcp        0      0 0.0.0.0:110             0.0.0.0:*               LISTEN      
1674/dovecot    
tcp        0      0 0.0.0.0:143             0.0.0.0:*               LISTEN      
1674/dovecot    
tcp        0      0 0.0.0.0:10000           0.0.0.0:*               LISTEN      
1793/perl       
tcp        0      0 0.0.0.0:22              0.0.0.0:*               LISTEN      
1735/sshd       
tcp        0      0 0.0.0.0:25              0.0.0.0:*               LISTEN      
1779/master     
tcp        0      0 0.0.0.0:700             0.0.0.0:*               LISTEN      
1735/sshd       
tcp        0      0 0.0.0.0:993             0.0.0.0:*               LISTEN      
1674/dovecot    
tcp        0      0 0.0.0.0:995             0.0.0.0:*               LISTEN      
1674/dovecot    
tcp        0      0 192.168.1.64:700        192.168.1.58:51764      ESTABLISHED 
3634/1          
tcp        0      0 192.168.0.220:22        192.168.0.51:60740      ESTABLISHED 
2807/0          
tcp6       0      0 :::80                   :::*                    LISTEN      
1568/apache2    
tcp6       0      0 :::22                   :::*                    LISTEN      
1735/sshd       
tcp6       0      0 :::700                  :::*                    LISTEN      
1735/sshd       
tcp6       0      0 :::445                  :::*                    LISTEN      
1552/smbd       
tcp6       0      0 :::139                  :::*                    LISTEN      
1552/smbd       
udp        0      0 192.168.0.255:137       0.0.0.0:*                           
1542/nmbd       
udp        0      0 192.168.0.220:137       0.0.0.0:*                           
1542/nmbd       
udp        0      0 192.168.1.255:137       0.0.0.0:*                           
1542/nmbd       
udp        0      0 192.168.1.64:137        0.0.0.0:*                           
1542/nmbd       
udp        0      0 0.0.0.0:137             0.0.0.0:*                           
1542/nmbd       
udp        0      0 192.168.0.255:138       0.0.0.0:*                           
1542/nmbd       
udp        0      0 192.168.0.220:138       0.0.0.0:*                           
1542/nmbd       
udp        0      0 192.168.1.255:138       0.0.0.0:*                           
1542/nmbd       
udp        0      0 192.168.1.64:138        0.0.0.0:*                           
1542/nmbd       
udp        0      0 0.0.0.0:138             0.0.0.0:*                           
1542/nmbd       
udp        0      0 0.0.0.0:10000           0.0.0.0:*                           
1793/perl       
udp        0      0 0.0.0.0:67              0.0.0.0:*                           
3412/dhcpd      
udp        0      0 0.0.0.0:68              0.0.0.0:*                           
1509/dhclient   
------------------------------------------------------------------------------
WhatsUp Gold - Download Free Network Management Software
The most intuitive, comprehensive, and cost-effective network 
management toolset available today.  Delivers lowest initial 
acquisition cost and overall TCO of any competing solution.
http://p.sf.net/sfu/whatsupgold-sd
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to