Dear shorewall users,
I have installed shorewall on ubuntu 10.10. i want to use it as a dhcp
server/gateway for our network. the computer have two network cards, one of
them connected to the WAN (eth4) and the other one is connected to the lan.
I have installed a dhcp server, which was distributing IP Addresses fine and
then I installed dnsmasq. now the computer is distributing IP addresses but
the clients cannot get a connection outside the box. I can ping the net from
within the gateway(machine that shorewall is installed on) but not from the
clients. the Shorewall seems to be running fine, "shorewall
start/restart/stop" works fine. the dhcp server is running, the dnsmasq is
running. But I don't have any idea why i cannot ping through this? your help
is very much appreciated.
best regards,
sayed jahed hussini
Shorewall 4.4.10.1 Dump at sjahed-TravelMate-6292 - Sun Sep 25 11:04:15 AFT 2011
Counters reset Sun Sep 25 10:48:00 AFT 2011
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
9 1572 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW
2573 2414K net2fw all -- eth4 * 0.0.0.0/0 0.0.0.0/0
6 1480 lan2fw all -- eth5 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:'
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
[goto]
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW
0 0 net2lan all -- eth4 eth5 0.0.0.0/0 0.0.0.0/0
0 0 lan2net all -- eth5 eth4 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:'
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
[goto]
Chain OUTPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
2543 581K fw2net all -- * eth4 0.0.0.0/0 0.0.0.0/0
6 1480 fw2lan all -- * eth5 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:OUTPUT:REJECT:'
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
[goto]
Chain Drop (2 references)
pkts bytes target prot opt in out source destination
4 176 all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:113 /* Auth */
4 176 dropBcast all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 3 code 4 /* Needed ICMP types */
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 11 /* Needed ICMP types */
4 176 dropInvalid all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,445 /* SMB */
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpts:137:139 /* SMB */
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:137 dpts:1024:65535 /* SMB */
2 96 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,139,445 /* SMB */
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:1900 /* UPnP */
2 80 dropNotSyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:53 /* Late DNS Replies */
Chain Reject (3 references)
pkts bytes target prot opt in out source destination
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:113 /* Auth */
0 0 dropBcast all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 3 code 4 /* Needed ICMP types */
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 11 /* Needed ICMP types */
0 0 dropInvalid all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,445 /* SMB */
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpts:137:139 /* SMB */
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:137 dpts:1024:65535 /* SMB */
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,139,445 /* SMB */
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:1900 /* UPnP */
0 0 dropNotSyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:53 /* Late DNS Replies */
Chain dropBcast (2 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
ADDRTYPE match dst-type BROADCAST
0 0 DROP all -- * * 0.0.0.0/0 224.0.0.0/4
Chain dropInvalid (2 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID
Chain dropNotSyn (2 references)
pkts bytes target prot opt in out source destination
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp flags:!0x17/0x02
Chain dynamic (2 references)
pkts bytes target prot opt in out source destination
Chain fw2lan (1 references)
pkts bytes target prot opt in out source destination
6 1480 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain fw2net (1 references)
pkts bytes target prot opt in out source destination
2402 572K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
141 8770 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain lan2fw (1 references)
pkts bytes target prot opt in out source destination
1 84 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
5 1396 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain lan2net (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain logdrop (0 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain logflags (5 references)
pkts bytes target prot opt in out source destination
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 4 level 6 prefix `Shorewall:logflags:DROP:'
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain logreject (0 references)
pkts bytes target prot opt in out source destination
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2fw (1 references)
pkts bytes target prot opt in out source destination
4 176 smurfs all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW
2517 2397K tcpflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
2569 2414K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
4 176 Drop all -- * * 0.0.0.0/0 0.0.0.0/0
2 80 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2lan (1 references)
pkts bytes target prot opt in out source destination
0 0 smurfs all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW
0 0 tcpflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 Drop all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain reject (10 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
ADDRTYPE match src-type BROADCAST
0 0 DROP all -- * * 224.0.0.0/4 0.0.0.0/0
0 0 DROP 2 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with tcp-reset
0 0 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-port-unreachable
0 0 REJECT icmp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-host-unreachable
0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-host-prohibited
Chain shorewall (0 references)
pkts bytes target prot opt in out source destination
Chain smurflog (2 references)
pkts bytes target prot opt in out source destination
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:'
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain smurfs (2 references)
pkts bytes target prot opt in out source destination
0 0 RETURN all -- * * 0.0.0.0 0.0.0.0/0
0 0 smurflog all -- * * 0.0.0.0/0 0.0.0.0/0
[goto] ADDRTYPE match src-type BROADCAST
0 0 smurflog all -- * * 224.0.0.0/4 0.0.0.0/0
[goto]
Chain tcpflags (2 references)
pkts bytes target prot opt in out source destination
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
[goto] tcp flags:0x3F/0x29
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
[goto] tcp flags:0x3F/0x00
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
[goto] tcp flags:0x06/0x06
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
[goto] tcp flags:0x03/0x03
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
[goto] tcp spt:0 flags:0x17/0x02
Log (/var/log/messages)
NAT Table
Chain PREROUTING (policy ACCEPT 9 packets, 1572 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 141 packets, 8770 bytes)
pkts bytes target prot opt in out source destination
Chain POSTROUTING (policy ACCEPT 141 packets, 8770 bytes)
pkts bytes target prot opt in out source destination
141 8770 eth4_masq all -- * eth4 0.0.0.0/0 0.0.0.0/0
Chain eth4_masq (1 references)
pkts bytes target prot opt in out source destination
0 0 MASQUERADE all -- * * 192.168.1.0/24 0.0.0.0/0
0 0 MASQUERADE all -- * * 169.254.0.0/16 0.0.0.0/0
Mangle Table
Chain PREROUTING (policy ACCEPT 2579 packets, 2415K bytes)
pkts bytes target prot opt in out source destination
2579 2415K tcpre all -- * * 0.0.0.0/0 0.0.0.0/0
Chain INPUT (policy ACCEPT 2579 packets, 2415K bytes)
pkts bytes target prot opt in out source destination
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 MARK all -- * * 0.0.0.0/0 0.0.0.0/0
MARK and 0x0
0 0 tcfor all -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 2549 packets, 583K bytes)
pkts bytes target prot opt in out source destination
2549 583K tcout all -- * * 0.0.0.0/0 0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 2549 packets, 583K bytes)
pkts bytes target prot opt in out source destination
2549 583K tcpost all -- * * 0.0.0.0/0 0.0.0.0/0
Chain tcfor (1 references)
pkts bytes target prot opt in out source destination
Chain tcout (1 references)
pkts bytes target prot opt in out source destination
Chain tcpost (1 references)
pkts bytes target prot opt in out source destination
Chain tcpre (1 references)
pkts bytes target prot opt in out source destination
Raw Table
Chain PREROUTING (policy ACCEPT 2579 packets, 2415K bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 2549 packets, 583K bytes)
pkts bytes target prot opt in out source destination
Conntrack Table (5 out of 54780)
tcp 6 431996 ESTABLISHED src=182.50.182.26 dst=74.125.39.18 sport=55527
dport=443 packets=47 bytes=35790 src=74.125.39.18 dst=182.50.182.26 sport=443
dport=55527 packets=48 bytes=14369 [ASSURED] mark=0 secmark=0 use=2
tcp 6 94 TIME_WAIT src=182.50.182.26 dst=74.125.39.18 sport=55528
dport=443 packets=30 bytes=10340 src=74.125.39.18 dst=182.50.182.26 sport=443
dport=55528 packets=29 bytes=7169 [ASSURED] mark=0 secmark=0 use=2
tcp 6 8 TIME_WAIT src=182.50.182.26 dst=74.125.39.99 sport=48792 dport=443
packets=16 bytes=6130 src=74.125.39.99 dst=182.50.182.26 sport=443 dport=48792
packets=8 bytes=2515 [ASSURED] mark=0 secmark=0 use=2
tcp 6 431974 ESTABLISHED src=182.50.182.26 dst=74.125.39.18 sport=55524
dport=443 packets=76 bytes=51019 src=74.125.39.18 dst=182.50.182.26 sport=443
dport=55524 packets=65 bytes=22024 [ASSURED] mark=0 secmark=0 use=2
tcp 6 8 TIME_WAIT src=182.50.182.26 dst=74.125.39.113 sport=60592 dport=80
packets=15 bytes=6870 src=74.125.39.113 dst=182.50.182.26 sport=80 dport=60592
packets=16 bytes=6537 [ASSURED] mark=0 secmark=0 use=2
IP Configuration
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN
inet 127.0.0.1/8 scope host lo
2: eth4: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP qlen 1000
inet 182.50.182.26/30 brd 182.50.182.27 scope global eth4
4: eth5: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP qlen 1000
inet 192.168.1.1/24 brd 192.168.1.255 scope global eth5
IP Stats
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
RX: bytes packets errors dropped overrun mcast
890 15 0 0 0 0
TX: bytes packets errors dropped carrier collsns
890 15 0 0 0 0
2: eth4: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP qlen 1000
link/ether 00:1b:21:58:6d:48 brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
4935963 5606 0 0 0 0
TX: bytes packets errors dropped carrier collsns
1068739 5582 0 0 0 0
3: eth3: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast state
DOWN qlen 1000
link/ether 6c:f0:49:25:e8:87 brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
0 0 0 0 0 0
TX: bytes packets errors dropped carrier collsns
0 0 0 0 0 0
4: eth5: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP qlen 1000
link/ether 00:1b:21:58:6d:49 brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
29446 253 0 0 0 34
TX: bytes packets errors dropped carrier collsns
10070 58 0 0 0 0
/proc
/proc/version = Linux version 2.6.35-30-generic (buildd@roseapple) (gcc
version 4.4.5 (Ubuntu/Linaro 4.4.4-14ubuntu5) ) #59-Ubuntu SMP Tue Aug 30
15:58:00 UTC 2011
/proc/sys/net/ipv4/ip_forward = 1
/proc/sys/net/ipv4/icmp_echo_ignore_all = 0
/proc/sys/net/ipv4/conf/all/proxy_arp = 0
/proc/sys/net/ipv4/conf/all/arp_filter = 0
/proc/sys/net/ipv4/conf/all/arp_ignore = 0
/proc/sys/net/ipv4/conf/all/rp_filter = 1
/proc/sys/net/ipv4/conf/all/log_martians = 0
/proc/sys/net/ipv4/conf/default/proxy_arp = 0
/proc/sys/net/ipv4/conf/default/arp_filter = 0
/proc/sys/net/ipv4/conf/default/arp_ignore = 0
/proc/sys/net/ipv4/conf/default/rp_filter = 1
/proc/sys/net/ipv4/conf/default/log_martians = 1
/proc/sys/net/ipv4/conf/eth3/proxy_arp = 0
/proc/sys/net/ipv4/conf/eth3/arp_filter = 0
/proc/sys/net/ipv4/conf/eth3/arp_ignore = 0
/proc/sys/net/ipv4/conf/eth3/rp_filter = 1
/proc/sys/net/ipv4/conf/eth3/log_martians = 1
/proc/sys/net/ipv4/conf/eth4/proxy_arp = 0
/proc/sys/net/ipv4/conf/eth4/arp_filter = 0
/proc/sys/net/ipv4/conf/eth4/arp_ignore = 0
/proc/sys/net/ipv4/conf/eth4/rp_filter = 1
/proc/sys/net/ipv4/conf/eth4/log_martians = 1
/proc/sys/net/ipv4/conf/eth5/proxy_arp = 0
/proc/sys/net/ipv4/conf/eth5/arp_filter = 0
/proc/sys/net/ipv4/conf/eth5/arp_ignore = 0
/proc/sys/net/ipv4/conf/eth5/rp_filter = 1
/proc/sys/net/ipv4/conf/eth5/log_martians = 1
/proc/sys/net/ipv4/conf/lo/proxy_arp = 0
/proc/sys/net/ipv4/conf/lo/arp_filter = 0
/proc/sys/net/ipv4/conf/lo/arp_ignore = 0
/proc/sys/net/ipv4/conf/lo/rp_filter = 1
/proc/sys/net/ipv4/conf/lo/log_martians = 1
Routing Rules
0: from all lookup local
32766: from all lookup main
32767: from all lookup default
Table default:
Table local:
local 192.168.1.1 dev eth5 proto kernel scope host src 192.168.1.1
broadcast 192.168.1.0 dev eth5 proto kernel scope link src 192.168.1.1
broadcast 127.255.255.255 dev lo proto kernel scope link src 127.0.0.1
local 182.50.182.26 dev eth4 proto kernel scope host src 182.50.182.26
broadcast 182.50.182.27 dev eth4 proto kernel scope link src 182.50.182.26
broadcast 192.168.1.255 dev eth5 proto kernel scope link src 192.168.1.1
broadcast 182.50.182.24 dev eth4 proto kernel scope link src 182.50.182.26
broadcast 127.0.0.0 dev lo proto kernel scope link src 127.0.0.1
local 127.0.0.1 dev lo proto kernel scope host src 127.0.0.1
local 127.0.0.0/8 dev lo proto kernel scope host src 127.0.0.1
Table main:
182.50.182.24/30 dev eth4 proto kernel scope link src 182.50.182.26
192.168.1.0/24 dev eth5 proto kernel scope link src 192.168.1.1
169.254.0.0/16 dev eth5 scope link metric 1000
default via 182.50.182.25 dev eth4 metric 100
ARP
? (182.50.182.25) at 00:09:0f:cb:8e:a9 [ether] on eth4
? (192.168.1.4) at 00:1b:24:c5:d0:8c [ether] on eth5
Modules
iptable_filter 1302 1
iptable_mangle 1371 1
iptable_nat 3752 1
iptable_raw 1130 0
ip_tables 10492 4
iptable_raw,iptable_nat,iptable_mangle,iptable_filter
ipt_addrtype 1611 3
ipt_ah 905 0
ipt_CLUSTERIP 5169 0
ipt_ecn 1101 0
ipt_ECN 1549 0
ipt_LOG 4490 5
ipt_MASQUERADE 1419 2
ipt_NETMAP 953 0
ipt_REDIRECT 929 0
ipt_REJECT 2004 4
ipt_ULOG 5246 0
nf_conntrack 63258 30
xt_connlimit,ipt_MASQUERADE,ipt_CLUSTERIP,nf_nat_tftp,nf_nat_snmp_basic,nf_nat_sip,nf_nat_pptp,nf_nat_irc,nf_nat_h323,nf_nat_ftp,nf_nat_amanda,nf_conntrack_amanda,nf_conntrack_sane,nf_conntrack_tftp,nf_conntrack_sip,nf_conntrack_proto_sctp,nf_conntrack_pptp,nf_conntrack_proto_gre,nf_conntrack_netlink,nf_conntrack_netbios_ns,nf_conntrack_irc,nf_conntrack_h323,nf_conntrack_ftp,xt_helper,xt_conntrack,xt_connmark,xt_state,iptable_nat,nf_nat,nf_conntrack_ipv4
nf_conntrack_amanda 2261 1 nf_nat_amanda
nf_conntrack_ftp 5361 1 nf_nat_ftp
nf_conntrack_h323 46894 1 nf_nat_h323
nf_conntrack_ipv4 10783 17 iptable_nat,nf_nat
nf_conntrack_irc 3348 1 nf_nat_irc
nf_conntrack_netbios_ns 1266 0
nf_conntrack_netlink 15266 0
nf_conntrack_pptp 4681 1 nf_nat_pptp
nf_conntrack_proto_gre 3901 1 nf_conntrack_pptp
nf_conntrack_proto_sctp 6308 0
nf_conntrack_sane 3091 0
nf_conntrack_sip 18703 1 nf_nat_sip
nf_conntrack_tftp 2905 1 nf_nat_tftp
nf_defrag_ipv4 1117 2 xt_TPROXY,nf_conntrack_ipv4
nf_nat 16289 12
ipt_REDIRECT,ipt_NETMAP,ipt_MASQUERADE,nf_nat_tftp,nf_nat_sip,nf_nat_pptp,nf_nat_proto_gre,nf_nat_irc,nf_nat_h323,nf_nat_ftp,nf_nat_amanda,iptable_nat
nf_nat_amanda 890 0
nf_nat_ftp 1398 0
nf_nat_h323 5121 0
nf_nat_irc 1168 0
nf_nat_pptp 1996 0
nf_nat_proto_gre 1271 1 nf_nat_pptp
nf_nat_sip 5574 0
nf_nat_snmp_basic 7568 0
nf_nat_tftp 728 0
nf_tproxy_core 1620 1 xt_TPROXY,[permanent]
xt_CLASSIFY 735 0
xt_comment 732 18
xt_connlimit 2920 0
xt_connmark 1607 0
xt_conntrack 2314 14
xt_dccp 1777 0
xt_dscp 1249 0
xt_DSCP 1657 0
xt_hashlimit 7078 0
xt_helper 1115 0
xt_iprange 1337 0
xt_length 916 0
xt_limit 1394 0
xt_mac 816 0
xt_mark 935 1
xt_multiport 1577 4
xt_NFLOG 885 0
xt_NFQUEUE 1743 0
xt_owner 918 0
xt_physdev 1487 0
xt_pkttype 860 0
xt_policy 2170 0
xt_realm 726 0
xt_recent 7872 0
xt_state 1014 0
xt_tcpmss 1177 0
xt_tcpudp 1927 16
xt_time 1785 0
xt_TPROXY 1177 0
Shorewall has detected the following iptables/netfilter capabilities:
NAT: Available
Packet Mangling: Available
Multi-port Match: Available
Extended Multi-port Match: Available
Connection Tracking Match: Available
Extended Connection Tracking Match Support: Available
Packet Type Match: Available
Policy Match: Available
Physdev Match: Available
Physdev-is-bridged Support: Available
Packet length Match: Available
IP range Match: Available
Recent Match: Available
Owner Match: Available
Ipset Match: Not available
CONNMARK Target: Available
Extended CONNMARK Target: Available
Connmark Match: Available
Extended Connmark Match: Available
Raw Table: Available
IPP2P Match: Not available
CLASSIFY Target: Available
Extended REJECT: Available
Repeat match: Available
MARK Target: Available
Extended MARK Target: Available
Extended MARK Target 2: Available
Mangle FORWARD Chain: Available
Comments: Available
Address Type Match: Available
TCPMSS Match: Available
Hashlimit Match: Available
NFQUEUE Target: Available
Realm Match: Available
Helper Match: Available
Connlimit Match: Available
Time Match: Available
Goto Support: Available
LOGMARK Target: Not available
IPMARK Target: Not available
LOG Target: Available
Persistent SNAT: Available
TPROXY Target: Available
FLOW Classifier: Available
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State
PID/Program name
tcp 0 0 0.0.0.0:53 0.0.0.0:* LISTEN
3678/dnsmasq
tcp 0 0 127.0.0.1:631 0.0.0.0:* LISTEN
1124/cupsd
tcp 0 0 182.50.182.26:55524 74.125.39.18:443 ESTABLISHED
1847/firefox-bin
tcp 0 0 182.50.182.26:55528 74.125.39.18:443 TIME_WAIT
-
tcp 0 0 182.50.182.26:55527 74.125.39.18:443 ESTABLISHED
1847/firefox-bin
tcp6 0 0 :::53 :::* LISTEN
3678/dnsmasq
tcp6 0 0 ::1:631 :::* LISTEN
1124/cupsd
udp 0 0 0.0.0.0:53 0.0.0.0:*
3678/dnsmasq
udp 0 0 0.0.0.0:67 0.0.0.0:*
3101/dhcpd3
udp 0 0 0.0.0.0:36530 0.0.0.0:*
870/avahi-daemon: r
udp 0 0 0.0.0.0:5353 0.0.0.0:*
870/avahi-daemon: r
udp6 0 0 :::53 :::*
3678/dnsmasq
udp6 0 0 :::56488 :::*
870/avahi-daemon: r
udp6 0 0 :::5353 :::*
870/avahi-daemon: r
Traffic Control
Device eth4:
qdisc mq 0: root
Sent 1068343 bytes 5576 pkt (dropped 0, overlimits 0 requeues 0)
backlog 0b 0p requeues 0
class mq :1 root
Sent 660910 bytes 3091 pkt (dropped 0, overlimits 0 requeues 0)
backlog 0b 0p requeues 0
class mq :2 root
Sent 407433 bytes 2485 pkt (dropped 0, overlimits 0 requeues 0)
backlog 0b 0p requeues 0
class mq :3 root
Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
backlog 0b 0p requeues 0
class mq :4 root
Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
backlog 0b 0p requeues 0
class mq :5 root
Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
backlog 0b 0p requeues 0
class mq :6 root
Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
backlog 0b 0p requeues 0
class mq :7 root
Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
backlog 0b 0p requeues 0
class mq :8 root
Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
backlog 0b 0p requeues 0
Device eth3:
qdisc pfifo_fast 0: root refcnt 2 bands 3 priomap 1 2 2 2 1 2 0 0 1 1 1 1 1 1
1 1
Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
backlog 0b 0p requeues 0
Device eth5:
qdisc mq 0: root
Sent 10070 bytes 58 pkt (dropped 0, overlimits 0 requeues 0)
backlog 0b 0p requeues 0
class mq :1 root
Sent 1228 bytes 8 pkt (dropped 0, overlimits 0 requeues 0)
backlog 0b 0p requeues 0
class mq :2 root
Sent 8842 bytes 50 pkt (dropped 0, overlimits 0 requeues 0)
backlog 0b 0p requeues 0
class mq :3 root
Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
backlog 0b 0p requeues 0
class mq :4 root
Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
backlog 0b 0p requeues 0
class mq :5 root
Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
backlog 0b 0p requeues 0
class mq :6 root
Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
backlog 0b 0p requeues 0
class mq :7 root
Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
backlog 0b 0p requeues 0
class mq :8 root
Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
backlog 0b 0p requeues 0
TC Filters
Device eth4:
Device eth3:
Device eth5:
------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security
threats, fraudulent activity, and more. Splunk takes this data and makes
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2dcopy2
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users