>
> Hello Team,
> I have implemented the two-interface Shorewall on our network. Previously
> it was working properly but suddenly its stop working. Whenever we tried to
> browse any site (blocked/allowed) , it say Connection timeout.
> I am attaching the shorewall-dump output and would like to request you to
> please help in this matter.
>
> --
> Best Regards,
> Yogesh Phatak.
> Email ID : [email protected]
> Cell : + 91 98233 00724
> http://picasaweb.google.com/yoogesh
>
> -----------------------------
> Before you start some work, always ask yourself three questions - Why am I
> doing it, What the results might be and Will I be successful. Only when you
> think deeply
> and find satisfactory answers to these questions, go ahead.
> -----------------------------
>
Shorewall 4.4.22.3 Dump at visionIBM.localdomain - Tue Oct 11 18:30:18 IST 2011
Counters reset Tue Oct 11 18:22:58 IST 2011
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT udp -- virbr0 * 0.0.0.0/0 0.0.0.0/0
udp dpt:53
0 0 ACCEPT tcp -- virbr0 * 0.0.0.0/0 0.0.0.0/0
tcp dpt:53
0 0 ACCEPT udp -- virbr0 * 0.0.0.0/0 0.0.0.0/0
udp dpt:67
0 0 ACCEPT tcp -- virbr0 * 0.0.0.0/0 0.0.0.0/0
tcp dpt:67
359 39201 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW
49 3101 net2fw all -- eth0 * 0.0.0.0/0 0.0.0.0/0
223 29004 loc2fw all -- eth1 * 0.0.0.0/0 0.0.0.0/0
4 200 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
93 7552 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
[goto]
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * virbr0 0.0.0.0/0
192.168.122.0/24 state RELATED,ESTABLISHED
0 0 ACCEPT all -- virbr0 * 192.168.122.0/24 0.0.0.0/0
0 0 ACCEPT all -- virbr0 virbr0 0.0.0.0/0 0.0.0.0/0
0 0 REJECT all -- * virbr0 0.0.0.0/0 0.0.0.0/0
reject-with icmp-port-unreachable
0 0 REJECT all -- virbr0 * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-port-unreachable
0 0 net2loc all -- eth0 eth1 0.0.0.0/0 0.0.0.0/0
0 0 loc2net all -- eth1 eth0 0.0.0.0/0 0.0.0.0/0
0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
[goto]
Chain OUTPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
85 6897 fw2net all -- * eth0 0.0.0.0/0 0.0.0.0/0
8 1597 fw2loc all -- * eth1 0.0.0.0/0 0.0.0.0/0
4 200 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0
11 3919 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
[goto]
Chain Broadcast (2 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
ADDRTYPE match dst-type BROADCAST
145 13996 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
ADDRTYPE match dst-type MULTICAST
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
ADDRTYPE match dst-type ANYCAST
0 0 DROP all -- * * 0.0.0.0/0 224.0.0.0/4
Chain Drop (2 references)
pkts bytes target prot opt in out source destination
41 2525 all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:113 /* Auth */
41 2525 Broadcast all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 3 code 4 /* Needed ICMP types */
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 11 /* Needed ICMP types */
0 0 Invalid all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,445 /* SMB */
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpts:137:139 /* SMB */
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:137 dpts:1024:65535 /* SMB */
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,139,445 /* SMB */
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:1900 /* UPnP */
0 0 NotSyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:53 /* Late DNS Replies */
Chain Invalid (2 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID
Chain NotSyn (2 references)
pkts bytes target prot opt in out source destination
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp flags:!0x17/0x02
Chain Reject (3 references)
pkts bytes target prot opt in out source destination
104 11471 all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:113 /* Auth */
104 11471 Broadcast all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 3 code 4 /* Needed ICMP types */
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 11 /* Needed ICMP types */
0 0 Invalid all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,445 /* SMB */
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpts:137:139 /* SMB */
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:137 dpts:1024:65535 /* SMB */
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,139,445 /* SMB */
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:1900 /* UPnP */
0 0 NotSyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:53 /* Late DNS Replies */
Chain dynamic (5 references)
pkts bytes target prot opt in out source destination
Chain fw2loc (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:22
8 1597 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain fw2net (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
78 5340 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:53
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:53
7 1557 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain loc2fw (1 references)
pkts bytes target prot opt in out source destination
223 29004 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:53
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:53
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:22
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:10000 /* Webmin */
223 29004 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain loc2net (1 references)
pkts bytes target prot opt in out source destination
0 0 sfilter all -- * eth1 0.0.0.0/0 0.0.0.0/0
[goto]
0 0 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:53
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:53
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:995
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:587
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:110
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:25
0 0 ACCEPT tcp -- * * 0.0.0.0/0
192.168.0.219 tcp dpt:80 /* Web */
0 0 ACCEPT tcp -- * * 0.0.0.0/0
192.168.0.219 tcp dpt:80 /* Web */
0 0 ACCEPT tcp -- * * 0.0.0.0/0
75.101.166.91 tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0
75.101.166.91 tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0
75.101.166.91 tcp dpt:443
0 0 ACCEPT tcp -- * * 0.0.0.0/0
202.87.40.98 tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:3389 /* RDP */
0 0 ACCEPT all -- * * 0.0.0.0/0
59.163.10.66
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:3389
0 0 ACCEPT tcp -- * * 0.0.0.0/0
50.56.91.160 tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0
50.56.91.160 tcp dpt:443
0 0 ACCEPT tcp -- * * 0.0.0.0/0 50.56.93.14
tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0
174.143.191.12 tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0
202.71.152.175 tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0
122.181.161.236 tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0
111.93.128.101 tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0
124.7.137.26 tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0
98.129.229.171 tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0
203.94.209.19 tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0
203.94.209.18 tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0 75.98.93.51
tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0
216.205.110.27 tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0 74.208.5.17
tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0 74.208.5.2
tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0 74.208.5.18
tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0 74.208.5.5
tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0
74.208.3.226 tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0
216.205.110.27 tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0
208.115.32.42 tcp dpt:80
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:loc2net:ACCEPT:'
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain logdrop (0 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain logreject (0 references)
pkts bytes target prot opt in out source destination
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2fw (1 references)
pkts bytes target prot opt in out source destination
41 2525 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW
8 576 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:22
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:10000
41 2525 Drop all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2loc (1 references)
pkts bytes target prot opt in out source destination
0 0 sfilter all -- * eth0 0.0.0.0/0 0.0.0.0/0
[goto]
0 0 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 Drop all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain reject (10 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
ADDRTYPE match src-type BROADCAST
0 0 DROP all -- * * 224.0.0.0/4 0.0.0.0/0
0 0 DROP 2 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with tcp-reset
0 0 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-port-unreachable
0 0 REJECT icmp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-host-unreachable
0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-host-prohibited
Chain sfilter (2 references)
pkts bytes target prot opt in out source destination
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:sfilter:DROP:'
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain shorewall (0 references)
pkts bytes target prot opt in out source destination
Log (/var/log/messages)
Oct 11 16:29:41 loc2net:ACCEPT:IN=eth1 OUT=eth0 SRC=192.168.0.27
DST=203.94.209.24 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=27808 DF PROTO=TCP
SPT=37755 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
Oct 11 16:29:47 loc2net:ACCEPT:IN=eth1 OUT=eth0 SRC=192.168.0.27
DST=203.94.209.24 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=27809 DF PROTO=TCP
SPT=37755 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
Oct 11 16:29:59 loc2net:ACCEPT:IN=eth1 OUT=eth0 SRC=192.168.0.27
DST=203.94.209.19 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=30269 DF PROTO=TCP
SPT=33765 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
Oct 11 16:30:02 loc2net:ACCEPT:IN=eth1 OUT=eth0 SRC=192.168.0.27
DST=203.94.209.19 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=30270 DF PROTO=TCP
SPT=33765 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
Oct 11 16:30:08 loc2net:ACCEPT:IN=eth1 OUT=eth0 SRC=192.168.0.27
DST=203.94.209.19 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=30271 DF PROTO=TCP
SPT=33765 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
Oct 11 16:35:45 loc2net:ACCEPT:IN=eth1 OUT=eth0 SRC=192.168.0.34
DST=203.94.209.24 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=37752 DF PROTO=TCP
SPT=36841 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
Oct 11 16:35:48 loc2net:ACCEPT:IN=eth1 OUT=eth0 SRC=192.168.0.34
DST=203.94.209.24 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=37753 DF PROTO=TCP
SPT=36841 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
Oct 11 16:35:54 loc2net:ACCEPT:IN=eth1 OUT=eth0 SRC=192.168.0.34
DST=203.94.209.24 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=37754 DF PROTO=TCP
SPT=36841 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
Oct 11 17:00:20 loc2net:ACCEPT:IN=eth1 OUT=eth0 SRC=192.168.0.27
DST=203.94.209.24 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=63979 DF PROTO=TCP
SPT=56832 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
Oct 11 17:00:23 loc2net:ACCEPT:IN=eth1 OUT=eth0 SRC=192.168.0.27
DST=203.94.209.24 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=63980 DF PROTO=TCP
SPT=56832 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
Oct 11 17:00:29 loc2net:ACCEPT:IN=eth1 OUT=eth0 SRC=192.168.0.27
DST=203.94.209.24 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=63981 DF PROTO=TCP
SPT=56832 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
Oct 11 17:06:27 loc2net:ACCEPT:IN=eth1 OUT=eth0 SRC=192.168.0.34
DST=203.94.209.24 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=18373 DF PROTO=TCP
SPT=51424 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
Oct 11 17:06:30 loc2net:ACCEPT:IN=eth1 OUT=eth0 SRC=192.168.0.34
DST=203.94.209.24 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=18374 DF PROTO=TCP
SPT=51424 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
Oct 11 17:06:36 loc2net:ACCEPT:IN=eth1 OUT=eth0 SRC=192.168.0.34
DST=203.94.209.24 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=18375 DF PROTO=TCP
SPT=51424 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
Oct 11 17:31:02 loc2net:ACCEPT:IN=eth1 OUT=eth0 SRC=192.168.0.27
DST=203.94.209.24 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=35681 DF PROTO=TCP
SPT=45275 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
Oct 11 17:31:05 loc2net:ACCEPT:IN=eth1 OUT=eth0 SRC=192.168.0.27
DST=203.94.209.24 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=35682 DF PROTO=TCP
SPT=45275 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
Oct 11 17:31:11 loc2net:ACCEPT:IN=eth1 OUT=eth0 SRC=192.168.0.27
DST=203.94.209.24 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=35683 DF PROTO=TCP
SPT=45275 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
Oct 11 18:01:43 loc2net:ACCEPT:IN=eth1 OUT=eth0 SRC=192.168.0.27
DST=203.94.209.24 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=17296 DF PROTO=TCP
SPT=38441 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
Oct 11 18:01:46 loc2net:ACCEPT:IN=eth1 OUT=eth0 SRC=192.168.0.27
DST=203.94.209.24 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=17297 DF PROTO=TCP
SPT=38441 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
Oct 11 18:01:52 loc2net:ACCEPT:IN=eth1 OUT=eth0 SRC=192.168.0.27
DST=203.94.209.24 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=17298 DF PROTO=TCP
SPT=38441 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
NAT Table
Chain PREROUTING (policy ACCEPT 184 packets, 18290 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 39 packets, 5883 bytes)
pkts bytes target prot opt in out source destination
Chain POSTROUTING (policy ACCEPT 2 packets, 120 bytes)
pkts bytes target prot opt in out source destination
0 0 MASQUERADE tcp -- * * 192.168.122.0/24
!192.168.122.0/24 masq ports: 1024-65535
0 0 MASQUERADE udp -- * * 192.168.122.0/24
!192.168.122.0/24 masq ports: 1024-65535
0 0 MASQUERADE all -- * * 192.168.122.0/24
!192.168.122.0/24
49 3321 eth0_masq all -- * eth0 0.0.0.0/0 0.0.0.0/0
Chain eth0_masq (1 references)
pkts bytes target prot opt in out source destination
49 3321 MASQUERADE all -- * * 192.168.1.0/24 0.0.0.0/0
Mangle Table
Chain PREROUTING (policy ACCEPT 393 packets, 44894 bytes)
pkts bytes target prot opt in out source destination
393 44894 tcpre all -- * * 0.0.0.0/0 0.0.0.0/0
Chain INPUT (policy ACCEPT 393 packets, 44894 bytes)
pkts bytes target prot opt in out source destination
393 44894 tcin all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 MARK all -- * * 0.0.0.0/0 0.0.0.0/0
MARK and 0xffffff00
0 0 tcfor all -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 130 packets, 14050 bytes)
pkts bytes target prot opt in out source destination
130 14050 tcout all -- * * 0.0.0.0/0 0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 133 packets, 13245 bytes)
pkts bytes target prot opt in out source destination
133 13245 tcpost all -- * * 0.0.0.0/0 0.0.0.0/0
Chain tcfor (1 references)
pkts bytes target prot opt in out source destination
Chain tcin (1 references)
pkts bytes target prot opt in out source destination
Chain tcout (1 references)
pkts bytes target prot opt in out source destination
Chain tcpost (1 references)
pkts bytes target prot opt in out source destination
Chain tcpre (1 references)
pkts bytes target prot opt in out source destination
Raw Table
Chain PREROUTING (policy ACCEPT 393 packets, 44894 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 130 packets, 14050 bytes)
pkts bytes target prot opt in out source destination
Conntrack Table (9 out of 65536)
ipv4 2 udp 17 17 src=192.168.0.2 dst=192.168.0.255 sport=59518
dport=111 packets=1 bytes=164 [UNREPLIED] src=192.168.0.255 dst=192.168.0.2
sport=111 dport=59518 packets=0 bytes=0 mark=0 secmark=0 zone=0 use=2
ipv4 2 udp 17 0 src=192.168.0.188 dst=192.168.0.255 sport=138
dport=138 packets=1 bytes=229 [UNREPLIED] src=192.168.0.255 dst=192.168.0.188
sport=138 dport=138 packets=0 bytes=0 mark=0 secmark=0 zone=0 use=2
ipv4 2 udp 17 5 src=192.168.0.56 dst=192.168.0.255 sport=137 dport=137
packets=3 bytes=234 [UNREPLIED] src=192.168.0.255 dst=192.168.0.56 sport=137
dport=137 packets=0 bytes=0 mark=0 secmark=0 zone=0 use=2
ipv4 2 unknown 2 158 src=192.168.1.2 dst=224.0.0.22 packets=2 bytes=80
[UNREPLIED] src=224.0.0.22 dst=192.168.1.2 packets=0 bytes=0 mark=0 secmark=0
zone=0 use=2
ipv4 2 udp 17 22 src=192.168.0.251 dst=192.168.0.255 sport=137
dport=137 packets=2 bytes=156 [UNREPLIED] src=192.168.0.255 dst=192.168.0.251
sport=137 dport=137 packets=0 bytes=0 mark=0 secmark=0 zone=0 use=2
ipv4 2 unknown 2 160 src=192.168.0.5 dst=224.0.0.22 packets=2 bytes=80
[UNREPLIED] src=224.0.0.22 dst=192.168.0.5 packets=0 bytes=0 mark=0 secmark=0
zone=0 use=2
ipv4 2 udp 17 22 src=192.168.0.250 dst=192.168.0.255 sport=137
dport=137 packets=2 bytes=156 [UNREPLIED] src=192.168.0.255 dst=192.168.0.250
sport=137 dport=137 packets=0 bytes=0 mark=0 secmark=0 zone=0 use=2
ipv4 2 udp 17 19 src=192.168.0.105 dst=192.168.0.255 sport=137
dport=137 packets=24 bytes=1872 [UNREPLIED] src=192.168.0.255 dst=192.168.0.105
sport=137 dport=137 packets=0 bytes=0 mark=0 secmark=0 zone=0 use=2
ipv4 2 udp 17 18 src=192.168.0.59 dst=192.168.0.255 sport=137
dport=137 packets=3 bytes=234 [UNREPLIED] src=192.168.0.255 dst=192.168.0.59
sport=137 dport=137 packets=0 bytes=0 mark=0 secmark=0 zone=0 use=2
IP Configuration
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN
inet 127.0.0.1/8 scope host lo
3: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP
qlen 1000
inet 192.168.1.2/24 brd 192.168.1.255 scope global eth0
4: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP
qlen 1000
inet 192.168.0.5/24 brd 192.168.0.255 scope global eth1
5: virbr0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state
UNKNOWN
inet 192.168.122.1/24 brd 192.168.122.255 scope global virbr0
IP Stats
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
RX: bytes packets errors dropped overrun mcast
6368 56 0 0 0 0
TX: bytes packets errors dropped carrier collsns
6368 56 0 0 0 0
2: usb0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state
UNKNOWN qlen 1000
link/ether 02:21:5e:67:8a:fd brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
11830 182 0 0 0 0
TX: bytes packets errors dropped carrier collsns
1836 10 0 0 0 0
3: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP
qlen 1000
link/ether 00:21:5e:67:8a:fa brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
13370 91 0 0 0 34
TX: bytes packets errors dropped carrier collsns
16649 157 0 0 0 0
4: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP
qlen 1000
link/ether 00:21:5e:67:8a:fb brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
183907 2608 0 0 0 16
TX: bytes packets errors dropped carrier collsns
6643 32 0 0 0 0
5: virbr0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state
UNKNOWN
link/ether 8a:f6:9e:43:df:b5 brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
0 0 0 0 0 0
TX: bytes packets errors dropped carrier collsns
0 0 0 0 0 0
Bridges
bridge name bridge id STP enabled interfaces
virbr0 8000.000000000000 yes
Per-IP Counters
iptaccount is not installed
/proc
/proc/version = Linux version 2.6.35.13-92.fc14.i686
([email protected]) (gcc version 4.5.1 20100924 (Red Hat
4.5.1-4) (GCC) ) #1 SMP Sat May 21 17:39:42 UTC 2011
/proc/sys/net/ipv4/ip_forward = 1
/proc/sys/net/ipv4/icmp_echo_ignore_all = 0
/proc/sys/net/ipv4/conf/all/proxy_arp = 0
/proc/sys/net/ipv4/conf/all/arp_filter = 0
/proc/sys/net/ipv4/conf/all/arp_ignore = 0
/proc/sys/net/ipv4/conf/all/rp_filter = 0
/proc/sys/net/ipv4/conf/all/log_martians = 0
/proc/sys/net/ipv4/conf/default/proxy_arp = 0
/proc/sys/net/ipv4/conf/default/arp_filter = 0
/proc/sys/net/ipv4/conf/default/arp_ignore = 0
/proc/sys/net/ipv4/conf/default/rp_filter = 0
/proc/sys/net/ipv4/conf/default/log_martians = 1
/proc/sys/net/ipv4/conf/eth0/proxy_arp = 0
/proc/sys/net/ipv4/conf/eth0/arp_filter = 0
/proc/sys/net/ipv4/conf/eth0/arp_ignore = 0
/proc/sys/net/ipv4/conf/eth0/rp_filter = 0
/proc/sys/net/ipv4/conf/eth0/log_martians = 1
/proc/sys/net/ipv4/conf/eth1/proxy_arp = 0
/proc/sys/net/ipv4/conf/eth1/arp_filter = 0
/proc/sys/net/ipv4/conf/eth1/arp_ignore = 0
/proc/sys/net/ipv4/conf/eth1/rp_filter = 0
/proc/sys/net/ipv4/conf/eth1/log_martians = 1
/proc/sys/net/ipv4/conf/lo/proxy_arp = 0
/proc/sys/net/ipv4/conf/lo/arp_filter = 0
/proc/sys/net/ipv4/conf/lo/arp_ignore = 0
/proc/sys/net/ipv4/conf/lo/rp_filter = 0
/proc/sys/net/ipv4/conf/lo/log_martians = 1
/proc/sys/net/ipv4/conf/usb0/proxy_arp = 0
/proc/sys/net/ipv4/conf/usb0/arp_filter = 0
/proc/sys/net/ipv4/conf/usb0/arp_ignore = 0
/proc/sys/net/ipv4/conf/usb0/rp_filter = 0
/proc/sys/net/ipv4/conf/usb0/log_martians = 1
/proc/sys/net/ipv4/conf/virbr0/proxy_arp = 0
/proc/sys/net/ipv4/conf/virbr0/arp_filter = 0
/proc/sys/net/ipv4/conf/virbr0/arp_ignore = 0
/proc/sys/net/ipv4/conf/virbr0/rp_filter = 0
/proc/sys/net/ipv4/conf/virbr0/log_martians = 1
Routing Rules
0: from all lookup local
32766: from all lookup main
32767: from all lookup default
Table default:
Table local:
broadcast 192.168.1.0 dev eth0 proto kernel scope link src 192.168.1.2
broadcast 192.168.0.255 dev eth1 proto kernel scope link src 192.168.0.5
broadcast 127.255.255.255 dev lo proto kernel scope link src 127.0.0.1
local 192.168.1.2 dev eth0 proto kernel scope host src 192.168.1.2
local 192.168.122.1 dev virbr0 proto kernel scope host src 192.168.122.1
broadcast 192.168.122.0 dev virbr0 proto kernel scope link src 192.168.122.1
broadcast 192.168.1.255 dev eth0 proto kernel scope link src 192.168.1.2
broadcast 192.168.0.0 dev eth1 proto kernel scope link src 192.168.0.5
local 192.168.0.5 dev eth1 proto kernel scope host src 192.168.0.5
broadcast 127.0.0.0 dev lo proto kernel scope link src 127.0.0.1
broadcast 192.168.122.255 dev virbr0 proto kernel scope link src
192.168.122.1
local 127.0.0.1 dev lo proto kernel scope host src 127.0.0.1
local 127.0.0.0/8 dev lo proto kernel scope host src 127.0.0.1
Table main:
192.168.1.2 dev eth1 proto static scope link
192.168.1.0/24 dev eth0 proto kernel scope link src 192.168.1.2 metric 1
192.168.0.0/24 dev eth1 proto kernel scope link src 192.168.0.5 metric 1
192.168.122.0/24 dev virbr0 proto kernel scope link src 192.168.122.1
default via 192.168.1.1 dev eth0 proto static
ARP
? (192.168.1.1) at 00:19:36:0d:13:f8 [ether] on eth0
Modules
iptable_mangle 1235 1
iptable_nat 3945 1
iptable_raw 1054 0
ipt_addrtype 1471 4
ipt_ah 1706 0
ipt_CLUSTERIP 5358 0
ipt_ecn 1045 0
ipt_ECN 1389 0
ipt_LOG 4243 2
ipt_MASQUERADE 1765 4
ipt_NETMAP 1290 0
ipt_REDIRECT 1282 0
ipt_ULOG 7765 0
nf_conntrack_amanda 2020 1 nf_nat_amanda
nf_conntrack_ftp 9047 1 nf_nat_ftp
nf_conntrack_h323 50922 1 nf_nat_h323
nf_conntrack_irc 3901 1 nf_nat_irc
nf_conntrack_netbios_ns 1126 0
nf_conntrack_netlink 13629 0
nf_conntrack_pptp 8896 1 nf_nat_pptp
nf_conntrack_proto_gre 4994 1 nf_conntrack_pptp
nf_conntrack_proto_sctp 8616 0
nf_conntrack_sane 4069 0
nf_conntrack_sip 16222 1 nf_nat_sip
nf_conntrack_tftp 3417 1 nf_nat_tftp
nf_nat 16298 12
ipt_REDIRECT,ipt_NETMAP,ipt_MASQUERADE,nf_nat_tftp,nf_nat_sip,nf_nat_pptp,nf_nat_proto_gre,nf_nat_irc,nf_nat_h323,nf_nat_ftp,nf_nat_amanda,iptable_nat
nf_nat_amanda 802 0
nf_nat_ftp 1663 0
nf_nat_h323 6802 0
nf_nat_irc 1320 0
nf_nat_pptp 3507 0
nf_nat_proto_gre 2040 1 nf_nat_pptp
nf_nat_sip 4443 0
nf_nat_snmp_basic 6627 0
nf_nat_tftp 680 0
nf_tproxy_core 1791 1 xt_TPROXY,[permanent]
xt_CLASSIFY 707 0
xt_comment 684 22
xt_connlimit 2556 0
xt_connmark 1480 0
xt_dccp 1557 0
xt_dscp 1278 0
xt_DSCP 1674 0
xt_hashlimit 5512 0
xt_helper 1011 0
xt_iprange 1715 0
xt_length 884 0
xt_limit 1254 0
xt_mac 764 0
xt_mark 879 1
xt_multiport 2048 4
xt_NFLOG 817 0
xt_NFQUEUE 1583 0
xt_owner 846 0
xt_physdev 1398 0
xt_pkttype 768 0
xt_policy 1922 0
xt_realm 710 0
xt_recent 6622 0
xt_tcpmss 1069 0
xt_time 1573 0
xt_TPROXY 1722 0
Shorewall has detected the following iptables/netfilter capabilities:
NAT: Available
Packet Mangling: Available
Multi-port Match: Available
Extended Multi-port Match: Available
Connection Tracking Match: Available
Extended Connection Tracking Match Support: Available
Packet Type Match: Available
Policy Match: Available
Physdev Match: Available
Physdev-is-bridged Support: Available
Packet length Match: Available
IP range Match: Available
Recent Match: Available
Owner Match: Available
CONNMARK Target: Available
Extended CONNMARK Target: Available
Connmark Match: Available
Extended Connmark Match: Available
Raw Table: Available
IPP2P Match: Not available
CLASSIFY Target: Available
Extended REJECT: Available
Repeat match: Available
MARK Target: Available
Extended MARK Target: Available
Extended MARK Target 2: Available
Mangle FORWARD Chain: Available
Comments: Available
Address Type Match: Available
TCPMSS Match: Available
Hashlimit Match: Available
NFQUEUE Target: Available
Realm Match: Available
Helper Match: Available
Connlimit Match: Available
Time Match: Available
Goto Support: Available
LOGMARK Target: Not available
IPMARK Target: Not available
LOG Target: Available
Persistent SNAT: Available
TPROXY Target: Available
FLOW Classifier: Available
fwmark route mask: Available
Mark in any table: Available
Header Match: Not available
ACCOUNT Target: Not available
AUDIT Target: Not available
ipset V5: Not available
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address
State PID/Program name
tcp 0 0 0.0.0.0:111 0.0.0.0:*
LISTEN 979/rpcbind
tcp 0 0 0.0.0.0:10000 0.0.0.0:*
LISTEN 2078/perl
tcp 0 0 192.168.122.1:53 0.0.0.0:*
LISTEN 2062/dnsmasq
tcp 0 0 192.168.0.5:53 0.0.0.0:*
LISTEN 1089/named
tcp 0 0 192.168.1.2:53 0.0.0.0:*
LISTEN 1089/named
tcp 0 0 127.0.0.1:53 0.0.0.0:*
LISTEN 1089/named
tcp 0 0 0.0.0.0:22 0.0.0.0:*
LISTEN 1891/sshd
tcp 0 0 127.0.0.1:25 0.0.0.0:*
LISTEN 1910/sendmail: acce
tcp 0 0 0.0.0.0:52953 0.0.0.0:*
LISTEN 1118/rpc.statd
tcp 0 0 127.0.0.1:953 0.0.0.0:*
LISTEN 1089/named
tcp 0 0 :::35503 :::*
LISTEN 1118/rpc.statd
tcp 0 0 :::111 :::*
LISTEN 979/rpcbind
tcp 0 0 :::80 :::*
LISTEN 1949/httpd
tcp 0 0 :::22 :::*
LISTEN 1891/sshd
tcp 0 0 ::1:953 :::*
LISTEN 1089/named
tcp 0 0 :::443 :::*
LISTEN 1949/httpd
udp 0 0 0.0.0.0:870 0.0.0.0:*
1118/rpc.statd
udp 0 0 192.168.122.1:53 0.0.0.0:*
2062/dnsmasq
udp 0 0 192.168.0.5:53 0.0.0.0:*
1089/named
udp 0 0 192.168.1.2:53 0.0.0.0:*
1089/named
udp 0 0 127.0.0.1:53 0.0.0.0:*
1089/named
udp 0 0 0.0.0.0:67 0.0.0.0:*
2062/dnsmasq
udp 0 0 0.0.0.0:57929 0.0.0.0:*
1118/rpc.statd
udp 0 0 0.0.0.0:111 0.0.0.0:*
979/rpcbind
udp 0 0 0.0.0.0:35515 0.0.0.0:*
1038/avahi-daemon:
udp 0 0 0.0.0.0:728 0.0.0.0:*
979/rpcbind
udp 0 0 0.0.0.0:5353 0.0.0.0:*
1038/avahi-daemon:
udp 0 0 0.0.0.0:783 0.0.0.0:*
901/portreserve
udp 0 0 0.0.0.0:10000 0.0.0.0:*
2078/perl
udp 0 0 :::111 :::*
979/rpcbind
udp 0 0 :::728 :::*
979/rpcbind
udp 0 0 :::37618 :::*
1118/rpc.statd
Traffic Control
Device usb0:
qdisc pfifo_fast 0: root refcnt 2 bands 3 priomap 1 2 2 2 1 2 0 0 1 1 1 1 1 1
1 1
Sent 1836 bytes 10 pkt (dropped 0, overlimits 0 requeues 0)
backlog 0b 0p requeues 0
Device eth0:
qdisc pfifo_fast 0: root refcnt 2 bands 3 priomap 1 2 2 2 1 2 0 0 1 1 1 1 1 1
1 1
Sent 16649 bytes 157 pkt (dropped 0, overlimits 0 requeues 0)
backlog 0b 0p requeues 0
Device eth1:
qdisc pfifo_fast 0: root refcnt 2 bands 3 priomap 1 2 2 2 1 2 0 0 1 1 1 1 1 1
1 1
Sent 6643 bytes 32 pkt (dropped 0, overlimits 0 requeues 0)
backlog 0b 0p requeues 0
TC Filters
Device usb0:
Device eth0:
Device eth1: ------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2d-oct
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users