On 1/30/16, Tom Eastep <teas...@shorewall.net> wrote:
> On 1/29/2016 10:58 AM, Zenny wrote:
>> Hi,
>>
>> I am using 3-interface shorewall and working very well. However, I
>> could not figure out how can the users in LOC zone access the websites
>> running in DMZ zone?
>>
>> Appending:
>>
>> Web(ACCEPT) loc dmz:192.168.10.111
>>
>> to rules didn'd do as expected. Instead, trying to access the websites
>> running in DMZ zone opens the login page of the modem in bridge mode.
>> However, one can access the site outside of the Net.
>>
>
> Please forward the output of 'shorewall dump' collected as described at
> http://www.shoreawll.net/support.htm#Guidelines.
Please find attached the dump output for your perusal.
Thanks again,
/z
>
> Thanks,
> -Tom
> --
> Tom Eastep \ When I die, I want to go like my Grandfather who
> Shoreline, \ died peacefully in his sleep. Not screaming like
> Washington, USA \ all of the passengers in his car
> http://shorewall.net \________________________________________________
>
> ------------------------------------------------------------------------------
> Site24x7 APM Insight: Get Deep Visibility into Application Performance
> APM + Mobile APM + RUM: Monitor 3 App instances at just $35/Month
> Monitor end-to-end web transactions and take corrective actions now
> Troubleshoot faster and improve end-user experience. Signup Now!
> http://pubads.g.doubleclick.net/gampad/clk?id=267308311&iu=/4140
> _______________________________________________
> Shorewall-users mailing list
> Shorewall-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/shorewall-users
>
Shorewall 4.5.18 Dump at gw - Sat Jan 30 08:41:24 CET 2016
Shorewall is running
State:Started (Fri Jan 29 19:09:39 CET 2016) from /etc/shorewall/
Counters reset Fri Jan 29 19:09:40 CET 2016
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
3364 658K net2fw all -- eth0 * 0.0.0.0/0 0.0.0.0/0
828 59403 loc2fw all -- eth1 * 0.0.0.0/0 0.0.0.0/0
506 20089 dmz2fw all -- eth2 * 0.0.0.0/0 0.0.0.0/0
1947 449K ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:'
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
[goto]
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
3365K 4912M net_frwd all -- eth0 * 0.0.0.0/0 0.0.0.0/0
951K 57M loc_frwd all -- eth1 * 0.0.0.0/0 0.0.0.0/0
16447 10M dmz_frwd all -- eth2 * 0.0.0.0/0 0.0.0.0/0
0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:'
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
[goto]
Chain OUTPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
2054 490K fw2net all -- * eth0 0.0.0.0/0 0.0.0.0/0
506 48472 fw2loc all -- * eth1 0.0.0.0/0 0.0.0.0/0
114 10661 fw2dmz all -- * eth2 0.0.0.0/0 0.0.0.0/0
1947 449K ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0
0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:OUTPUT:REJECT:'
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
[goto]
Chain Broadcast (2 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
ADDRTYPE match dst-type BROADCAST
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
ADDRTYPE match dst-type MULTICAST
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
ADDRTYPE match dst-type ANYCAST
0 0 DROP all -- * * 0.0.0.0/0 224.0.0.0/4
Chain Drop (2 references)
pkts bytes target prot opt in out source destination
1102 110K all -- * * 0.0.0.0/0 0.0.0.0/0
1102 110K Broadcast all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 3 code 4 /* Needed ICMP types */
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 11 /* Needed ICMP types */
192 7836 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,445 /* SMB */
1 78 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpts:137:139 /* SMB */
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:137 dpts:1024:65535 /* SMB */
9 448 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,139,445 /* SMB */
2 239 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:1900 /* UPnP */
7 665 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp flags:!0x17/0x02
131 15023 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:53 /* Late DNS Replies */
Chain Reject (6 references)
pkts bytes target prot opt in out source destination
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 Broadcast all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 3 code 4 /* Needed ICMP types */
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 11 /* Needed ICMP types */
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,445 /* SMB */
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpts:137:139 /* SMB */
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:137 dpts:1024:65535 /* SMB */
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,139,445 /* SMB */
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:1900 /* UPnP */
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp flags:!0x17/0x02
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:53 /* Late DNS Replies */
Chain dmz2fw (1 references)
pkts bytes target prot opt in out source destination
506 20089 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
506 20089 smurfs all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW,UNTRACKED
0 0 tcpflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 8 /* Ping */
506 20089 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain dmz2loc (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 8 /* Ping */
0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:dmz2loc:REJECT:'
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
[goto]
Chain dmz2net (1 references)
pkts bytes target prot opt in out source destination
15815 10M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
154 10553 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:53 /* DNS */
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:53 /* DNS */
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 8 /* Ping */
478 34704 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain dmz_frwd (1 references)
pkts bytes target prot opt in out source destination
16447 10M dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
632 45257 smurfs all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW,UNTRACKED
12555 9874K tcpflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
16447 10M dmz2net all -- * eth0 0.0.0.0/0 0.0.0.0/0
0 0 dmz2loc all -- * eth1 0.0.0.0/0 0.0.0.0/0
Chain dynamic (6 references)
pkts bytes target prot opt in out source destination
Chain fw2dmz (1 references)
pkts bytes target prot opt in out source destination
114 10661 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:fw2dmz:REJECT:'
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
[goto]
Chain fw2loc (1 references)
pkts bytes target prot opt in out source destination
506 48472 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:fw2loc:REJECT:'
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
[goto]
Chain fw2net (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpts:67:68
1428 450K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
524 33506 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:53 /* DNS */
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:53 /* DNS */
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
102 6120 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain loc2dmz (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:22 /* SSH */
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 8 /* Ping */
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain loc2fw (1 references)
pkts bytes target prot opt in out source destination
828 59403 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
1 60 smurfs all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW,UNTRACKED
828 59403 tcpflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
827 59343 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
1 60 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:22 /* SSH */
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 8 /* Ping */
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain loc2net (1 references)
pkts bytes target prot opt in out source destination
945K 57M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
6013 453K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain loc_frwd (1 references)
pkts bytes target prot opt in out source destination
951K 57M dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
6013 453K smurfs all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW,UNTRACKED
946K 57M tcpflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
951K 57M loc2net all -- * eth0 0.0.0.0/0 0.0.0.0/0
0 0 loc2dmz all -- * eth2 0.0.0.0/0 0.0.0.0/0
Chain logdrop (0 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain logflags (5 references)
pkts bytes target prot opt in out source destination
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 4 level 6 prefix `Shorewall:logflags:DROP:'
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain logreject (0 references)
pkts bytes target prot opt in out source destination
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2dmz (1 references)
pkts bytes target prot opt in out source destination
10834 1920K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0
192.168.7.200 tcp dpt:22
0 0 ~log2 all -- * * 192.168.7.0/24 0.0.0.0/0
[goto]
0 0 ~log2 all -- * * 192.168.9.0/24 0.0.0.0/0
[goto]
0 0 ~log2 all -- * * 192.168.10.0/24 0.0.0.0/0
[goto]
152 8888 ACCEPT tcp -- * * 0.0.0.0/0
192.168.7.108 tcp dpt:80
5 240 ACCEPT tcp -- * * 0.0.0.0/0
192.168.7.108 tcp dpt:443
0 0 ACCEPT tcp -- * * 0.0.0.0/0
192.168.7.108 tcp dpt:53
3314 251K ACCEPT udp -- * * 0.0.0.0/0
192.168.7.108 udp dpt:53
1 48 ACCEPT tcp -- * * 0.0.0.0/0
192.168.7.108 tcp dpt:110
0 0 ACCEPT tcp -- * * 0.0.0.0/0
192.168.7.108 tcp dpt:143
2 80 ACCEPT tcp -- * * 0.0.0.0/0
192.168.7.108 tcp dpt:25
0 0 ACCEPT tcp -- * * 0.0.0.0/0
192.168.7.108 tcp dpt:21
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2fw (1 references)
pkts bytes target prot opt in out source destination
3364 658K dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
1110 113K smurfs all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW,UNTRACKED
8 2736 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpts:67:68
2419 513K tcpflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
2254 545K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 DROP icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 8 /* Ping */
0 0 ~log0 all -- * * 192.168.7.0/24 0.0.0.0/0
[goto]
0 0 ~log0 all -- * * 192.168.9.0/24 0.0.0.0/0
[goto]
0 0 ~log0 all -- * * 192.168.10.0/24 0.0.0.0/0
[goto]
1102 110K Drop all -- * * 0.0.0.0/0 0.0.0.0/0
760 85921 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:net2fw:DROP:'
760 85921 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2loc (1 references)
pkts bytes target prot opt in out source destination
3350K 4910M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 ~log1 all -- * * 192.168.7.0/24 0.0.0.0/0
[goto]
0 0 ~log1 all -- * * 192.168.9.0/24 0.0.0.0/0
[goto]
0 0 ~log1 all -- * * 192.168.10.0/24 0.0.0.0/0
[goto]
0 0 Drop all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:net2loc:DROP:'
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain net_frwd (1 references)
pkts bytes target prot opt in out source destination
3365K 4912M dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
3474 260K smurfs all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW,UNTRACKED
3357K 4911M tcpflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
3350K 4910M net2loc all -- * eth1 0.0.0.0/0 0.0.0.0/0
14308 2180K net2dmz all -- * eth2 0.0.0.0/0 0.0.0.0/0
Chain reject (11 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
ADDRTYPE match src-type BROADCAST
0 0 DROP all -- * * 224.0.0.0/4 0.0.0.0/0
0 0 DROP 2 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with tcp-reset
0 0 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-port-unreachable
0 0 REJECT icmp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-host-unreachable
0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-host-prohibited
Chain shorewall (0 references)
pkts bytes target prot opt in out source destination
Chain smurflog (2 references)
pkts bytes target prot opt in out source destination
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:'
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain smurfs (6 references)
pkts bytes target prot opt in out source destination
398 15216 RETURN all -- * * 0.0.0.0 0.0.0.0/0
0 0 smurflog all -- * * 0.0.0.0/0 0.0.0.0/0
[goto] ADDRTYPE match src-type BROADCAST
0 0 smurflog all -- * * 224.0.0.0/4 0.0.0.0/0
[goto]
Chain tcpflags (6 references)
pkts bytes target prot opt in out source destination
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
[goto] tcp flags:0x3F/0x29
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
[goto] tcp flags:0x3F/0x00
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
[goto] tcp flags:0x06/0x06
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
[goto] tcp flags:0x03/0x03
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
[goto] tcp spt:0 flags:0x17/0x02
Chain ~log0 (3 references)
pkts bytes target prot opt in out source destination
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:net2fw:DROP:'
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain ~log1 (3 references)
pkts bytes target prot opt in out source destination
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:net2loc:DROP:'
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain ~log2 (3 references)
pkts bytes target prot opt in out source destination
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:net2dmz:DROP:'
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Log (/var/log/messages)
Jan 30 08:21:50 net2fw:DROP:IN=eth0 OUT= SRC=212.118.253.114 DST=192.168.1.200
LEN=44 TOS=0x00 PREC=0x00 TTL=1 ID=0 DF PROTO=UDP SPT=33936 DPT=33439 LEN=24
Jan 30 08:21:51 net2fw:DROP:IN=eth0 OUT= SRC=212.118.253.114 DST=192.168.1.200
LEN=44 TOS=0x00 PREC=0x00 TTL=2 ID=0 DF PROTO=UDP SPT=33936 DPT=33440 LEN=24
Jan 30 08:21:52 net2fw:DROP:IN=eth0 OUT= SRC=212.118.253.114 DST=192.168.1.200
LEN=44 TOS=0x00 PREC=0x00 TTL=3 ID=0 DF PROTO=UDP SPT=33936 DPT=33441 LEN=24
Jan 30 08:27:44 net2fw:DROP:IN=eth0 OUT= SRC=187.245.88.128 DST=192.168.1.200
LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=17037 DF PROTO=TCP SPT=33046 DPT=23
WINDOW=5840 RES=0x00 SYN URGP=0
Jan 30 08:27:47 net2fw:DROP:IN=eth0 OUT= SRC=187.245.88.128 DST=192.168.1.200
LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=17038 DF PROTO=TCP SPT=33046 DPT=23
WINDOW=5840 RES=0x00 SYN URGP=0
Jan 30 08:31:07 net2fw:DROP:IN=eth0 OUT= SRC=222.186.34.177 DST=192.168.1.200
LEN=40 TOS=0x00 PREC=0x00 TTL=106 ID=256 PROTO=TCP SPT=6000 DPT=9200
WINDOW=16384 RES=0x00 SYN URGP=0
Jan 30 08:35:41 net2fw:DROP:IN=eth0 OUT= SRC=115.230.124.164 DST=192.168.1.200
LEN=40 TOS=0x00 PREC=0x00 TTL=114 ID=256 PROTO=TCP SPT=64316 DPT=3128
WINDOW=15500 RES=0x00 SYN URGP=0
Jan 30 08:35:51 net2fw:DROP:IN=eth0 OUT= SRC=69.30.221.162 DST=192.168.1.200
LEN=436 TOS=0x00 PREC=0x00 TTL=54 ID=27251 DF PROTO=UDP SPT=5103 DPT=5060
LEN=416
Jan 30 08:38:01 net2fw:DROP:IN=eth0 OUT= SRC=212.118.253.117 DST=192.168.1.200
LEN=44 TOS=0x08 PREC=0x20 TTL=2 ID=0 DF PROTO=UDP SPT=34324 DPT=33449 LEN=24
Jan 30 08:38:01 net2fw:DROP:IN=eth0 OUT= SRC=212.118.253.117 DST=192.168.1.200
LEN=44 TOS=0x08 PREC=0x20 TTL=4 ID=0 DF PROTO=UDP SPT=34324 DPT=33451 LEN=24
Jan 30 08:38:01 net2fw:DROP:IN=eth0 OUT= SRC=212.118.253.117 DST=192.168.1.200
LEN=44 TOS=0x08 PREC=0x20 TTL=5 ID=0 DF PROTO=UDP SPT=34324 DPT=33452 LEN=24
Jan 30 08:38:02 net2fw:DROP:IN=eth0 OUT= SRC=212.118.253.113 DST=192.168.1.200
LEN=44 TOS=0x00 PREC=0x00 TTL=1 ID=0 DF PROTO=UDP SPT=34327 DPT=33439 LEN=24
Jan 30 08:38:03 net2fw:DROP:IN=eth0 OUT= SRC=212.118.253.113 DST=192.168.1.200
LEN=44 TOS=0x00 PREC=0x00 TTL=2 ID=0 DF PROTO=UDP SPT=34327 DPT=33440 LEN=24
Jan 30 08:38:04 net2fw:DROP:IN=eth0 OUT= SRC=212.118.253.113 DST=192.168.1.200
LEN=44 TOS=0x00 PREC=0x00 TTL=3 ID=0 DF PROTO=UDP SPT=34327 DPT=33441 LEN=24
Jan 30 08:38:06 net2fw:DROP:IN=eth0 OUT= SRC=212.118.253.115 DST=192.168.1.200
LEN=44 TOS=0x00 PREC=0x00 TTL=1 ID=0 DF PROTO=UDP SPT=34325 DPT=33440 LEN=24
Jan 30 08:38:07 net2fw:DROP:IN=eth0 OUT= SRC=212.118.253.115 DST=192.168.1.200
LEN=44 TOS=0x00 PREC=0x00 TTL=2 ID=0 DF PROTO=UDP SPT=34325 DPT=33441 LEN=24
Jan 30 08:38:08 net2fw:DROP:IN=eth0 OUT= SRC=212.118.253.115 DST=192.168.1.200
LEN=44 TOS=0x00 PREC=0x00 TTL=3 ID=0 DF PROTO=UDP SPT=34325 DPT=33442 LEN=24
Jan 30 08:38:11 net2fw:DROP:IN=eth0 OUT= SRC=212.118.253.114 DST=192.168.1.200
LEN=44 TOS=0x00 PREC=0x00 TTL=1 ID=0 DF PROTO=UDP SPT=34326 DPT=33439 LEN=24
Jan 30 08:38:11 net2fw:DROP:IN=eth0 OUT= SRC=212.118.253.114 DST=192.168.1.200
LEN=44 TOS=0x00 PREC=0x00 TTL=2 ID=0 DF PROTO=UDP SPT=34326 DPT=33440 LEN=24
Jan 30 08:38:13 net2fw:DROP:IN=eth0 OUT= SRC=212.118.253.114 DST=192.168.1.200
LEN=44 TOS=0x00 PREC=0x00 TTL=3 ID=0 DF PROTO=UDP SPT=34326 DPT=33441 LEN=24
NAT Table
Chain PREROUTING (policy ACCEPT 6664 packets, 540K bytes)
pkts bytes target prot opt in out source destination
4330 358K net_dnat all -- eth0 * 0.0.0.0/0 0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 3550 packets, 261K bytes)
pkts bytes target prot opt in out source destination
6278 468K eth0_masq all -- * eth0 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 762 packets, 47514 bytes)
pkts bytes target prot opt in out source destination
Chain eth0_masq (1 references)
pkts bytes target prot opt in out source destination
0 0 MASQUERADE all -- * * 10.0.0.0/8 0.0.0.0/0
0 0 MASQUERADE all -- * * 169.254.0.0/16 0.0.0.0/0
0 0 MASQUERADE all -- * * 172.16.0.0/12 0.0.0.0/0
6278 468K MASQUERADE all -- * * 192.168.0.0/16 0.0.0.0/0
0 0 MASQUERADE all -- * * 192.168.1.0/24 0.0.0.0/0
0 0 MASQUERADE all -- * * 192.168.2.0/24 0.0.0.0/0
0 0 MASQUERADE all -- * * 192.168.7.0/24 0.0.0.0/0
0 0 MASQUERADE all -- * * 192.168.9.0/24 0.0.0.0/0
0 0 MASQUERADE all -- * * 192.168.10.0/24 0.0.0.0/0
Chain net_dnat (1 references)
pkts bytes target prot opt in out source destination
0 0 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:1022 to:192.168.7.200:22
152 8888 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:80 to:192.168.7.108
5 240 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:443 to:192.168.7.108
0 0 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:53 to:192.168.7.108
3254 244K DNAT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:53 to:192.168.7.108
1 48 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:110 to:192.168.7.108
0 0 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:143 to:192.168.7.108
2 80 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:25 to:192.168.7.108
0 0 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:21 to:192.168.7.108
Mangle Table
Chain PREROUTING (policy ACCEPT 4340K packets, 4981M bytes)
pkts bytes target prot opt in out source destination
4340K 4981M tcpre all -- * * 0.0.0.0/0 0.0.0.0/0
Chain INPUT (policy ACCEPT 6645 packets, 1187K bytes)
pkts bytes target prot opt in out source destination
6645 1187K tcin all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy ACCEPT 4332K packets, 4979M bytes)
pkts bytes target prot opt in out source destination
4332K 4979M MARK all -- * * 0.0.0.0/0 0.0.0.0/0
MARK set 0x0
4332K 4979M tcfor all -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 4621 packets, 998K bytes)
pkts bytes target prot opt in out source destination
4621 998K tcout all -- * * 0.0.0.0/0 0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 4337K packets, 4980M bytes)
pkts bytes target prot opt in out source destination
4337K 4980M tcpost all -- * * 0.0.0.0/0 0.0.0.0/0
Chain tcfor (1 references)
pkts bytes target prot opt in out source destination
Chain tcin (1 references)
pkts bytes target prot opt in out source destination
Chain tcout (1 references)
pkts bytes target prot opt in out source destination
Chain tcpost (1 references)
pkts bytes target prot opt in out source destination
Chain tcpre (1 references)
pkts bytes target prot opt in out source destination
Raw Table
Chain PREROUTING (policy ACCEPT 4340K packets, 4981M bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 4621 packets, 998K bytes)
pkts bytes target prot opt in out source destination
Conntrack Table ( out of )
tcp 6 431999 ESTABLISHED src=192.168.9.1 dst=192.168.9.254 sport=39971
dport=22 packets=203 bytes=17223 src=192.168.9.254 dst=192.168.9.1 sport=22
dport=39971 packets=125 bytes=13992 [ASSURED] mark=0 secmark=0 use=1
tcp 6 431429 ESTABLISHED src=192.168.9.1 dst=52.0.252.79 sport=41352
dport=4244 packets=23 bytes=2209 src=52.0.252.79 dst=192.168.1.200 sport=4244
dport=41352 packets=14 bytes=2001 [ASSURED] mark=0 secmark=0 use=1
udp 17 13 src=192.168.9.1 dst=46.246.46.246 sport=52522 dport=53 packets=2
bytes=114 src=46.246.46.246 dst=192.168.1.200 sport=53 dport=52522 packets=2
bytes=158 [ASSURED] mark=0 secmark=0 use=1
tcp 6 431128 ESTABLISHED src=192.168.9.1 dst=173.252.90.197 sport=58434
dport=443 packets=22 bytes=1953 src=173.252.90.197 dst=192.168.1.200 sport=443
dport=58434 packets=16 bytes=4728 [ASSURED] mark=0 secmark=0 use=1
tcp 6 297312 ESTABLISHED src=192.168.9.1 dst=52.0.252.26 sport=51047
dport=4244 packets=11 bytes=1349 src=52.0.252.26 dst=192.168.1.200 sport=4244
dport=51047 packets=9 bytes=1345 [ASSURED] mark=0 secmark=0 use=1
tcp 6 431978 ESTABLISHED src=192.168.9.1 dst=66.220.156.13 sport=48027
dport=443 packets=36 bytes=3580 src=66.220.156.13 dst=192.168.1.200 sport=443
dport=48027 packets=34 bytes=6052 [ASSURED] mark=0 secmark=0 use=1
tcp 6 368121 ESTABLISHED src=192.168.9.1 dst=52.0.252.250 sport=41800
dport=4244 packets=10 bytes=850 src=52.0.252.250 dst=192.168.1.200 sport=4244
dport=41800 packets=9 bytes=1437 [ASSURED] mark=0 secmark=0 use=1
udp 17 84 src=192.168.9.1 dst=193.225.121.131 sport=123 dport=123
packets=29 bytes=2204 src=193.225.121.131 dst=192.168.1.200 sport=123 dport=123
packets=29 bytes=2204 [ASSURED] mark=0 secmark=0 use=1
tcp 6 430829 ESTABLISHED src=192.168.9.1 dst=52.16.230.206 sport=53892
dport=80 packets=16 bytes=1359 src=52.16.230.206 dst=192.168.1.200 sport=80
dport=53892 packets=12 bytes=2555 [ASSURED] mark=0 secmark=0 use=1
udp 17 74 src=192.168.9.1 dst=91.189.94.4 sport=123 dport=123 packets=29
bytes=2204 src=91.189.94.4 dst=192.168.1.200 sport=123 dport=123 packets=29
bytes=2204 [ASSURED] mark=0 secmark=0 use=1
udp 17 84 src=192.168.9.1 dst=5.200.6.34 sport=123 dport=123 packets=29
bytes=2204 src=5.200.6.34 dst=192.168.1.200 sport=123 dport=123 packets=29
bytes=2204 [ASSURED] mark=0 secmark=0 use=1
tcp 6 428046 ESTABLISHED src=192.168.9.1 dst=54.154.41.21 sport=42259
dport=80 packets=13 bytes=1117 src=54.154.41.21 dst=192.168.1.200 sport=80
dport=42259 packets=10 bytes=2369 [ASSURED] mark=0 secmark=0 use=1
tcp 6 87773 ESTABLISHED src=192.168.9.1 dst=74.125.205.188 sport=39369
dport=5228 packets=12 bytes=1219 src=74.125.205.188 dst=192.168.1.200
sport=5228 dport=39369 packets=10 bytes=5290 [ASSURED] mark=0 secmark=0 use=1
tcp 6 40 CLOSE_WAIT src=192.168.9.1 dst=52.7.42.3 sport=52457 dport=80
packets=14 bytes=1303 src=52.7.42.3 dst=192.168.1.200 sport=80 dport=52457
packets=13 bytes=13096 [ASSURED] mark=0 secmark=0 use=1
tcp 6 225741 ESTABLISHED src=192.168.9.1 dst=64.233.164.188 sport=49424
dport=5228 packets=12 bytes=1335 src=64.233.164.188 dst=192.168.1.200
sport=5228 dport=49424 packets=9 bytes=4925 [ASSURED] mark=0 secmark=0 use=1
unknown 2 545 src=0.0.0.0 dst=224.0.0.1 packets=6105 bytes=195360 [UNREPLIED]
src=224.0.0.1 dst=0.0.0.0 packets=0 bytes=0 mark=0 secmark=0 use=1
udp 17 126 src=192.168.9.1 dst=83.246.103.51 sport=123 dport=123
packets=30 bytes=2280 src=83.246.103.51 dst=192.168.1.200 sport=123 dport=123
packets=30 bytes=2280 [ASSURED] mark=0 secmark=0 use=1
tcp 6 198205 ESTABLISHED src=192.168.9.1 dst=64.233.161.188 sport=37006
dport=5228 packets=8 bytes=1467 src=64.233.161.188 dst=192.168.1.200 sport=5228
dport=37006 packets=9 bytes=887 [ASSURED] mark=0 secmark=0 use=1
udp 17 12 src=192.168.9.1 dst=46.246.46.246 sport=37137 dport=53 packets=2
bytes=126 src=46.246.46.246 dst=192.168.1.200 sport=53 dport=37137 packets=2
bytes=442 [ASSURED] mark=0 secmark=0 use=1
udp 17 10 src=192.168.9.1 dst=46.246.46.246 sport=62615 dport=53 packets=1
bytes=75 src=46.246.46.246 dst=192.168.1.200 sport=53 dport=62615 packets=1
bytes=378 mark=0 secmark=0 use=1
tcp 6 431129 ESTABLISHED src=192.168.9.1 dst=173.252.90.197 sport=55666
dport=443 packets=29 bytes=3169 src=173.252.90.197 dst=192.168.1.200 sport=443
dport=55666 packets=27 bytes=5411 [ASSURED] mark=0 secmark=0 use=1
tcp 6 213720 ESTABLISHED src=192.168.9.1 dst=74.125.205.188 sport=42689
dport=5228 packets=8 bytes=1272 src=74.125.205.188 dst=192.168.1.200 sport=5228
dport=42689 packets=8 bytes=835 [ASSURED] mark=0 secmark=0 use=1
tcp 6 171437 ESTABLISHED src=192.168.9.1 dst=173.194.222.188 sport=43357
dport=5228 packets=9 bytes=1447 src=173.194.222.188 dst=192.168.1.200
sport=5228 dport=43357 packets=9 bytes=887 [ASSURED] mark=0 secmark=0 use=1
tcp 6 31879 ESTABLISHED src=192.168.9.1 dst=64.233.162.188 sport=57569
dport=5228 packets=11 bytes=1621 src=64.233.162.188 dst=192.168.1.200
sport=5228 dport=57569 packets=9 bytes=4926 [ASSURED] mark=0 secmark=0 use=1
tcp 6 287218 ESTABLISHED src=192.168.9.1 dst=52.0.254.0 sport=58780
dport=4244 packets=16 bytes=1811 src=52.0.254.0 dst=192.168.1.200 sport=4244
dport=58780 packets=11 bytes=1601 [ASSURED] mark=0 secmark=0 use=1
udp 17 19 src=192.168.9.1 dst=194.132.32.32 sport=55827 dport=53 packets=2
bytes=124 src=194.132.32.32 dst=192.168.1.200 sport=53 dport=55827 packets=2
bytes=252 [ASSURED] mark=0 secmark=0 use=1
udp 17 1 src=192.168.9.1 dst=46.246.46.246 sport=38656 dport=53 packets=2
bytes=128 src=46.246.46.246 dst=192.168.1.200 sport=53 dport=38656 packets=2
bytes=274 [ASSURED] mark=0 secmark=0 use=1
tcp 6 34 TIME_WAIT src=192.168.9.1 dst=216.58.209.100 sport=42839 dport=80
packets=25 bytes=3128 src=216.58.209.100 dst=192.168.1.200 sport=80 dport=42839
packets=22 bytes=2789 [ASSURED] mark=0 secmark=0 use=1
tcp 6 165012 ESTABLISHED src=192.168.9.1 dst=204.11.109.66 sport=35281
dport=443 packets=11 bytes=1997 src=204.11.109.66 dst=192.168.1.200 sport=443
dport=35281 packets=9 bytes=6116 [ASSURED] mark=0 secmark=0 use=1
udp 17 14 src=192.168.9.1 dst=46.246.46.246 sport=45888 dport=53 packets=2
bytes=118 src=46.246.46.246 dst=192.168.1.200 sport=53 dport=45888 packets=2
bytes=292 [ASSURED] mark=0 secmark=0 use=1
tcp 6 431778 ESTABLISHED src=192.168.9.1 dst=64.233.162.188 sport=46398
dport=5228 packets=21 bytes=2477 src=64.233.162.188 dst=192.168.1.200
sport=5228 dport=46398 packets=18 bytes=1520 [ASSURED] mark=0 secmark=0 use=1
tcp 6 51 TIME_WAIT src=192.168.9.1 dst=130.239.18.176 sport=44886 dport=80
packets=15436 bytes=822874 src=130.239.18.176 dst=192.168.1.200 sport=80
dport=44886 packets=29055 bytes=43576310 [ASSURED] mark=0 secmark=0 use=1
tcp 6 178305 ESTABLISHED src=192.168.9.1 dst=64.233.165.188 sport=41297
dport=5228 packets=44 bytes=5352 src=64.233.165.188 dst=192.168.1.200
sport=5228 dport=41297 packets=45 bytes=7659 [ASSURED] mark=0 secmark=0 use=1
udp 17 145 src=192.168.9.1 dst=178.63.135.195 sport=123 dport=123
packets=30 bytes=2280 src=178.63.135.195 dst=192.168.1.200 sport=123 dport=123
packets=30 bytes=2280 [ASSURED] mark=0 secmark=0 use=1
udp 17 20 src=192.168.9.1 dst=46.246.46.246 sport=34931 dport=53 packets=2
bytes=124 src=46.246.46.246 dst=192.168.1.200 sport=53 dport=34931 packets=2
bytes=296 [ASSURED] mark=0 secmark=0 use=1
tcp 6 360372 ESTABLISHED src=192.168.9.1 dst=52.0.252.56 sport=52073
dport=4244 packets=28 bytes=3213 src=52.0.252.56 dst=192.168.1.200 sport=4244
dport=52073 packets=25 bytes=3873 [ASSURED] mark=0 secmark=0 use=1
tcp 6 368122 ESTABLISHED src=192.168.9.1 dst=64.233.161.188 sport=59147
dport=5228 packets=8 bytes=1393 src=64.233.161.188 dst=192.168.1.200 sport=5228
dport=59147 packets=8 bytes=835 [ASSURED] mark=0 secmark=0 use=1
udp 17 19 src=192.168.9.1 dst=194.132.32.32 sport=54229 dport=53 packets=2
bytes=134 src=194.132.32.32 dst=192.168.1.200 sport=53 dport=54229 packets=2
bytes=315 [ASSURED] mark=0 secmark=0 use=1
tcp 6 428649 ESTABLISHED src=192.168.9.1 dst=52.0.252.85 sport=41396
dport=4244 packets=11 bytes=1349 src=52.0.252.85 dst=192.168.1.200 sport=4244
dport=41396 packets=9 bytes=1345 [ASSURED] mark=0 secmark=0 use=1
udp 17 8 src=192.168.9.1 dst=46.246.46.246 sport=32356 dport=53 packets=1
bytes=64 src=46.246.46.246 dst=192.168.1.200 sport=53 dport=32356 packets=1
bytes=96 mark=0 secmark=0 use=1
tcp 6 164375 ESTABLISHED src=192.168.9.1 dst=199.16.157.105 sport=42328
dport=443 packets=17 bytes=4507 src=199.16.157.105 dst=192.168.1.200 sport=443
dport=42328 packets=12 bytes=1842 [ASSURED] mark=0 secmark=0 use=1
tcp 6 369034 ESTABLISHED src=192.168.9.1 dst=95.101.183.153 sport=44226
dport=80 packets=231 bytes=15754 src=95.101.183.153 dst=192.168.1.200 sport=80
dport=44226 packets=372 bytes=547070 [ASSURED] mark=0 secmark=0 use=1
udp 17 20 src=192.168.9.1 dst=46.246.46.246 sport=41941 dport=53 packets=4
bytes=256 src=46.246.46.246 dst=192.168.1.200 sport=53 dport=41941 packets=3
bytes=278 [ASSURED] mark=0 secmark=0 use=1
tcp 6 425428 ESTABLISHED src=192.168.9.1 dst=52.0.252.79 sport=41315
dport=4244 packets=26 bytes=3000 src=52.0.252.79 dst=192.168.1.200 sport=4244
dport=41315 packets=23 bytes=3170 [ASSURED] mark=0 secmark=0 use=1
tcp 6 51 TIME_WAIT src=192.168.9.1 dst=130.239.18.142 sport=49337 dport=80
packets=24663 bytes=1318818 src=130.239.18.142 dst=192.168.1.200 sport=80
dport=49337 packets=46242 bytes=69355515 [ASSURED] mark=0 secmark=0 use=1
tcp 6 367988 ESTABLISHED src=192.168.9.1 dst=183.131.1.93 sport=38068
dport=5228 packets=5 bytes=347 src=183.131.1.93 dst=192.168.1.200 sport=5228
dport=38068 packets=3 bytes=201 [ASSURED] mark=0 secmark=0 use=1
udp 17 13 src=192.168.9.1 dst=46.246.46.246 sport=59480 dport=53 packets=2
bytes=136 src=46.246.46.246 dst=192.168.1.200 sport=53 dport=59480 packets=2
bytes=345 [ASSURED] mark=0 secmark=0 use=1
tcp 6 114646 ESTABLISHED src=192.168.9.1 dst=119.37.197.93 sport=53178
dport=5224 packets=8 bytes=589 src=119.37.197.93 dst=192.168.1.200 sport=5224
dport=53178 packets=1 bytes=52 [ASSURED] mark=0 secmark=0 use=1
tcp 6 268870 ESTABLISHED src=192.168.9.1 dst=64.233.165.188 sport=60560
dport=5228 packets=8 bytes=1903 src=64.233.165.188 dst=192.168.1.200 sport=5228
dport=60560 packets=8 bytes=835 [ASSURED] mark=0 secmark=0 use=1
tcp 6 368073 ESTABLISHED src=192.168.9.1 dst=52.0.252.250 sport=41799
dport=4244 packets=11 bytes=1349 src=52.0.252.250 dst=192.168.1.200 sport=4244
dport=41799 packets=9 bytes=1345 [ASSURED] mark=0 secmark=0 use=1
tcp 6 431969 ESTABLISHED src=192.168.9.1 dst=192.30.252.91 sport=33773
dport=443 packets=31 bytes=3542 src=192.30.252.91 dst=192.168.1.200 sport=443
dport=33773 packets=47 bytes=6473 [ASSURED] mark=0 secmark=0 use=1
tcp 6 257588 ESTABLISHED src=192.168.9.1 dst=199.59.150.44 sport=40938
dport=443 packets=15 bytes=1731 src=199.59.150.44 dst=192.168.1.200 sport=443
dport=40938 packets=20 bytes=5555 [ASSURED] mark=0 secmark=0 use=1
tcp 6 431980 ESTABLISHED src=192.168.9.1 dst=54.192.98.200 sport=42388
dport=80 packets=25 bytes=1525 src=54.192.98.200 dst=192.168.1.200 sport=80
dport=42388 packets=25 bytes=34071 [ASSURED] mark=0 secmark=0 use=1
udp 17 1 src=192.168.9.1 dst=194.132.32.32 sport=41020 dport=53 packets=2
bytes=128 src=194.132.32.32 dst=192.168.1.200 sport=53 dport=41020 packets=2
bytes=274 [ASSURED] mark=0 secmark=0 use=1
tcp 6 89634 ESTABLISHED src=192.168.9.1 dst=74.125.205.188 sport=55011
dport=5228 packets=17 bytes=2240 src=74.125.205.188 dst=192.168.1.200
sport=5228 dport=55011 packets=15 bytes=1265 [ASSURED] mark=0 secmark=0 use=1
tcp 6 122301 ESTABLISHED src=192.168.9.1 dst=64.233.161.188 sport=35568
dport=5228 packets=11 bytes=1533 src=64.233.161.188 dst=192.168.1.200
sport=5228 dport=35568 packets=9 bytes=4926 [ASSURED] mark=0 secmark=0 use=1
tcp 6 425631 ESTABLISHED src=192.168.9.1 dst=64.233.162.188 sport=59401
dport=5228 packets=52 bytes=6320 src=64.233.162.188 dst=192.168.1.200
sport=5228 dport=59401 packets=42 bytes=7701 [ASSURED] mark=0 secmark=0 use=1
udp 17 14 src=192.168.9.1 dst=46.246.46.246 sport=54684 dport=53 packets=2
bytes=122 src=46.246.46.246 dst=192.168.1.200 sport=53 dport=54684 packets=2
bytes=303 [ASSURED] mark=0 secmark=0 use=1
udp 17 1 src=192.168.9.1 dst=46.246.46.246 sport=60147 dport=53 packets=2
bytes=128 src=46.246.46.246 dst=192.168.1.200 sport=53 dport=60147 packets=2
bytes=274 [ASSURED] mark=0 secmark=0 use=1
tcp 6 8 TIME_WAIT src=192.168.9.1 dst=216.58.209.110 sport=39023 dport=80
packets=24 bytes=3004 src=216.58.209.110 dst=192.168.1.200 sport=80 dport=39023
packets=19 bytes=3980 [ASSURED] mark=0 secmark=0 use=1
tcp 6 292441 ESTABLISHED src=192.168.9.1 dst=183.131.1.86 sport=36818
dport=5225 packets=4 bytes=287 src=183.131.1.86 dst=192.168.1.200 sport=5225
dport=36818 packets=3 bytes=201 [ASSURED] mark=0 secmark=0 use=1
tcp 6 174305 ESTABLISHED src=192.168.9.1 dst=64.233.164.188 sport=56573
dport=5228 packets=11 bytes=1931 src=64.233.164.188 dst=192.168.1.200
sport=5228 dport=56573 packets=10 bytes=939 [ASSURED] mark=0 secmark=0 use=1
tcp 6 95392 ESTABLISHED src=192.168.9.1 dst=183.131.1.73 sport=60162
dport=5224 packets=7 bytes=467 src=183.131.1.73 dst=192.168.1.200 sport=5224
dport=60162 packets=3 bytes=201 [ASSURED] mark=0 secmark=0 use=1
tcp 6 51 TIME_WAIT src=192.168.9.1 dst=91.189.95.83 sport=49139 dport=80
packets=41661 bytes=2216553 src=91.189.95.83 dst=192.168.1.200 sport=80
dport=49139 packets=79129 bytes=118653185 [ASSURED] mark=0 secmark=0 use=1
udp 17 1 src=192.168.9.1 dst=46.246.46.246 sport=47271 dport=53 packets=2
bytes=128 src=46.246.46.246 dst=192.168.1.200 sport=53 dport=47271 packets=2
bytes=274 [ASSURED] mark=0 secmark=0 use=1
tcp 6 368062 ESTABLISHED src=192.168.9.1 dst=173.194.222.188 sport=34371
dport=5228 packets=22 bytes=2685 src=173.194.222.188 dst=192.168.1.200
sport=5228 dport=34371 packets=21 bytes=1643 [ASSURED] mark=0 secmark=0 use=1
udp 17 1 src=192.168.9.1 dst=46.246.46.246 sport=48628 dport=53 packets=2
bytes=128 src=46.246.46.246 dst=192.168.1.200 sport=53 dport=48628 packets=2
bytes=274 [ASSURED] mark=0 secmark=0 use=1
IP Configuration
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue
inet 127.0.0.1/8 scope host lo
2: eth2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000
inet 192.168.7.254/24 brd 192.168.7.255 scope global eth2
3: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000
inet 192.168.1.200/24 brd 192.168.1.255 scope global eth0
4: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000
inet 192.168.9.254/24 brd 192.168.9.255 scope global eth1
IP Stats
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
RX: bytes packets errors dropped overrun mcast
6481981 29058 0 0 0 0
TX: bytes packets errors dropped carrier collsns
6481981 29058 0 0 0 0
2: eth2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:22:6b:bc:36:20 brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
1555393014 4338657 0 0 0 0
TX: bytes packets errors dropped carrier collsns
236363483 2849668 0 0 0 0
3: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:50:8b:48:8e:5f brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
1331177203 27546361 0 0 0 0
TX: bytes packets errors dropped carrier collsns
840315834 14143865 0 0 0 0
4: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:30:f1:10:9e:ae brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
1335776490 12096296 0 0 0 0
TX: bytes packets errors dropped carrier collsns
3118171803 26674466 0 0 0 0
5: sit0: <NOARP> mtu 1480 qdisc noop
link/sit 0.0.0.0 brd 0.0.0.0
RX: bytes packets errors dropped overrun mcast
0 0 0 0 0 0
TX: bytes packets errors dropped carrier collsns
0 0 0 0 0 0
Routing Rules
0: from all lookup 255
32766: from all lookup main
32767: from all lookup default
Table 255:
local 192.168.9.254 dev eth1 proto kernel scope host src 192.168.9.254
local 192.168.7.254 dev eth2 proto kernel scope host src 192.168.7.254
local 192.168.1.200 dev eth0 proto kernel scope host src 192.168.1.200
local 127.0.0.1 dev lo proto kernel scope host src 127.0.0.1
broadcast 192.168.9.255 dev eth1 proto kernel scope link src 192.168.9.254
broadcast 192.168.9.0 dev eth1 proto kernel scope link src 192.168.9.254
broadcast 192.168.7.255 dev eth2 proto kernel scope link src 192.168.7.254
broadcast 192.168.7.0 dev eth2 proto kernel scope link src 192.168.7.254
broadcast 192.168.1.255 dev eth0 proto kernel scope link src 192.168.1.200
broadcast 192.168.1.0 dev eth0 proto kernel scope link src 192.168.1.200
broadcast 127.255.255.255 dev lo proto kernel scope link src 127.0.0.1
broadcast 127.0.0.0 dev lo proto kernel scope link src 127.0.0.1
local 127.0.0.0/8 dev lo proto kernel scope host src 127.0.0.1
Table default:
Table main:
192.168.9.0/24 dev eth1 proto kernel scope link src 192.168.9.254
192.168.7.0/24 dev eth2 proto kernel scope link src 192.168.7.254
192.168.1.0/24 dev eth0 proto kernel scope link src 192.168.1.200
169.254.0.0/16 dev eth2 scope link
default via 192.168.1.1 dev eth0
Per-IP Counters
iptaccount is not installed
NF Accounting
No NF Accounting defined (nfacct not found)
/proc
/proc/version = Linux version 2.6.18-407.el5
(mockbu...@builder17.centos.org) (gcc version 4.1.2 20080704 (Red Hat
4.1.2-55)) #1 SMP Wed Nov 11 08:09:31 EST 2015
/proc/sys/net/ipv4/ip_forward = 1
/proc/sys/net/ipv4/icmp_echo_ignore_all = 0
/proc/sys/net/ipv4/conf/all/proxy_arp = 0
/proc/sys/net/ipv4/conf/all/arp_filter = 0
/proc/sys/net/ipv4/conf/all/arp_ignore = 0
/proc/sys/net/ipv4/conf/all/rp_filter = 1
/proc/sys/net/ipv4/conf/all/log_martians = 0
/proc/sys/net/ipv4/conf/default/proxy_arp = 0
/proc/sys/net/ipv4/conf/default/arp_filter = 0
/proc/sys/net/ipv4/conf/default/arp_ignore = 0
/proc/sys/net/ipv4/conf/default/rp_filter = 0
/proc/sys/net/ipv4/conf/default/log_martians = 1
/proc/sys/net/ipv4/conf/eth0/proxy_arp = 0
/proc/sys/net/ipv4/conf/eth0/arp_filter = 0
/proc/sys/net/ipv4/conf/eth0/arp_ignore = 0
/proc/sys/net/ipv4/conf/eth0/rp_filter = 1
/proc/sys/net/ipv4/conf/eth0/log_martians = 1
/proc/sys/net/ipv4/conf/eth1/proxy_arp = 0
/proc/sys/net/ipv4/conf/eth1/arp_filter = 0
/proc/sys/net/ipv4/conf/eth1/arp_ignore = 0
/proc/sys/net/ipv4/conf/eth1/rp_filter = 1
/proc/sys/net/ipv4/conf/eth1/log_martians = 1
/proc/sys/net/ipv4/conf/eth2/proxy_arp = 0
/proc/sys/net/ipv4/conf/eth2/arp_filter = 0
/proc/sys/net/ipv4/conf/eth2/arp_ignore = 0
/proc/sys/net/ipv4/conf/eth2/rp_filter = 1
/proc/sys/net/ipv4/conf/eth2/log_martians = 1
/proc/sys/net/ipv4/conf/lo/proxy_arp = 0
/proc/sys/net/ipv4/conf/lo/arp_filter = 0
/proc/sys/net/ipv4/conf/lo/arp_ignore = 0
/proc/sys/net/ipv4/conf/lo/rp_filter = 0
/proc/sys/net/ipv4/conf/lo/log_martians = 1
/proc/sys/net/ipv4/conf/sit0/proxy_arp = 0
/proc/sys/net/ipv4/conf/sit0/arp_filter = 0
/proc/sys/net/ipv4/conf/sit0/arp_ignore = 0
/proc/sys/net/ipv4/conf/sit0/rp_filter = 0
/proc/sys/net/ipv4/conf/sit0/log_martians = 1
ARP
? (192.168.7.200) at 00:16:35:0D:74:0E [ether] on eth2
? (192.168.9.1) at 00:90:A9:09:20:D0 [ether] on eth1
? (192.168.1.1) at 00:22:07:14:90:7F [ether] on eth0
? (192.168.7.108) at 00:16:35:0D:74:0E [ether] on eth2
Modules
ip_conntrack 53665 25
xt_connlimit,ipt_MASQUERADE,ip_nat_tftp,ip_nat_snmp_basic,ip_nat_sip,ip_nat_pptp,ip_nat_irc,ip_nat_h323,ip_nat_ftp,ip_nat_amanda,ip_conntrack_tftp,ip_conntrack_sip,ip_conntrack_pptp,ip_conntrack_netbios_ns,ip_conntrack_irc,ip_conntrack_h323,ip_conntrack_amanda,xt_helper,xt_conntrack,xt_CONNMARK,xt_connmark,xt_state,ip_conntrack_ftp,iptable_nat,ip_nat
ip_conntrack_amanda 8901 1 ip_nat_amanda
ip_conntrack_ftp 11569 1 ip_nat_ftp
ip_conntrack_h323 51293 1 ip_nat_h323
ip_conntrack_irc 10545 1 ip_nat_irc
ip_conntrack_netbios_ns 6976 0
ip_conntrack_pptp 15441 1 ip_nat_pptp
ip_conntrack_sip 11313 1 ip_nat_sip
ip_conntrack_tftp 8249 1 ip_nat_tftp
ip_nat 21229 12
ipt_SAME,ipt_REDIRECT,ipt_NETMAP,ipt_MASQUERADE,ip_nat_tftp,ip_nat_sip,ip_nat_pptp,ip_nat_irc,ip_nat_h323,ip_nat_ftp,ip_nat_amanda,iptable_nat
ip_nat_amanda 6465 0
ip_nat_ftp 7361 0
ip_nat_h323 11073 0
ip_nat_irc 6721 0
ip_nat_pptp 9797 0
ip_nat_sip 8129 0
ip_nat_snmp_basic 13253 0
ip_nat_tftp 5953 0
iptable_filter 7105 1
iptable_mangle 6849 1
iptable_nat 10949 1
iptable_raw 6209 0
ip_tables 17029 4
iptable_raw,iptable_mangle,iptable_nat,iptable_filter
ipt_addrtype 5953 5
ipt_ah 5953 0
ipt_CLUSTERIP 12357 0
ipt_dscp 5825 0
ipt_DSCP 6337 0
ipt_ecn 6337 0
ipt_ECN 7105 0
ipt_hashlimit 12745 0
ipt_iprange 5953 0
ipt_LOG 10049 13
ipt_MASQUERADE 7617 9
ipt_NETMAP 6081 0
ipt_owner 6081 0
ipt_recent 13009 0
ipt_REDIRECT 6081 0
ipt_REJECT 9537 4
ipt_SAME 6465 0
ipt_TCPMSS 8001 0
ipt_tos 5825 0
ipt_TOS 6337 0
ipt_ttl 5953 0
ipt_TTL 6337 0
ipt_ULOG 11717 0
xt_CLASSIFY 5953 0
xt_comment 5953 28
xt_connlimit 8265 0
xt_connmark 6209 0
xt_CONNMARK 6465 0
xt_conntrack 6593 20
xt_dccp 7365 0
xt_DSCP 6465 0
xt_dscp 6593 0
xt_helper 6593 0
xt_length 6081 0
xt_limit 6721 0
xt_mac 6081 0
xt_mark 5953 0
xt_MARK 6465 1
xt_multiport 7233 4
xt_NFQUEUE 6209 0
xt_physdev 6993 0
xt_pkttype 6081 0
xt_policy 7617 0
xt_realm 5825 0
xt_sctp 6849 0
xt_state 6209 0
xt_statistic 6465 0
xt_tcpmss 6337 0
xt_tcpudp 7105 41
Shorewall has detected the following iptables/netfilter capabilities:
ACCOUNT Target (ACCOUNT_TARGET): Not available
Address Type Match (ADDRTYPE): Available
Amanda Helper: Available
Arptables JF: Not available
AUDIT Target (AUDIT_TARGET): Not available
Basic Filter (BASIC_FILTER): Available
Capabilities Version (CAPVERSION): 40515
Checksum Target: Not available
CLASSIFY Target (CLASSIFY_TARGET): Available
Comments (COMMENTS): Available
Condition Match (CONDITION_MATCH): Not available
Connection Tracking Match (CONNTRACK_MATCH): Available
Connlimit Match (CONNLIMIT_MATCH): Available
Connmark Match (CONNMARK_MATCH): Available
CONNMARK Target (CONNMARK): Available
CT Target (CT_TARGET): Not available
DSCP Match (DSCP_MATCH): Available
DSCP Target (DSCP_TARGET): Available
Extended Connection Tracking Match Support (NEW_CONNTRACK_MATCH): Not
available
Extended Connmark Match (XCONNMARK_MATCH): Available
Extended CONNMARK Target (XCONNMARK): Available
Extended MARK Target 2 (EXMARK): Not available
Extended MARK Target (XMARK): Available
Extended Multi-port Match (XMULIPORT): Available
Extended REJECT (ENHANCED_REJECT): Available
FLOW Classifier (FLOW_FILTER): Not available
FTP-0 Helper: Not available
FTP Helper: Available
fwmark route mask (FWMARK_RT_MASK): Not available
Geo IP match: Not available
Goto Support (GOTO_TARGET): Available
H323 Helper: Available
Hashlimit Match (HASHLIMIT_MATCH): Available
Header Match (HEADER_MATCH): Not available
Helper Match (HELPER_MATCH): Available
IMQ Target (IMQ_TARGET): Not available
IPMARK Target (IPMARK_TARGET): Not available
IPP2P Match (IPP2P_MATCH): Not available
IP range Match(IPRANGE_MATCH): Available
ipset V5 (IPSET_V5): Not available
iptables -S (IPTABLES_S): Not available
IRC-0 Helper: Not available
IRC Helper: Available
Kernel Version (KERNELVERSION): 20618
LOGMARK Target (LOGMARK_TARGET): Not available
LOG Target (LOG_TARGET): Available
Mangle FORWARD Chain (MANGLE_FORWARD): Available
Mark in any table (MARK_ANYWHERE): Not available
MARK Target (MARK): Available
MASQUERADE Target: Available
Multi-port Match (MULTIPORT): Available
NAT (NAT_ENABLED): Available
Netbios_ns Helper: Not available
New tos Match: Not available
NFAcct match: Not available
NFLOG Target (NFLOG_TARGET): Not available
NFQUEUE Target (NFQUEUE_TARGET): Available
Old Hashlimit Match (OLD_HL_MATCH): Available
Owner Match (OWNER_MATCH): Available
Owner Name Match (OWNER_NAME_MATCH): Available
Packet length Match (LENGTH_MATCH): Available
Packet Mangling (MANGLE_ENABLED): Available
Packet Type Match (USEPKTTYPE): Available
Persistent SNAT (PERSISTENT_SNAT): Not available
Physdev-is-bridged Support (PHYSDEV_BRIDGE): Available
Physdev Match (PHYSDEV_MATCH): Available
Policy Match (POLICY_MATCH): Available
PPTP Helper: Available
Rawpost Table (RAWPOST_TABLE): Not available
Raw Table (RAW_TABLE): Available
Realm Match (REALM_MATCH): Available
Recent Match (RECENT_MATCH): Available
Repeat match (KLUDGEFREE): Not available
RPFilter match: Not available
SANE-0 Helper: Not available
SANE Helper: Available
SIP-0 Helper: Not available
SIP Helper: Available
SNMP Helper: Available
Statistic Match (STATISTIC_MATCH): Available
TCPMSS Match (TCPMSS_MATCH): Available
TFTP-0 Helper: Not available
TFTP Helper: Available
Time Match (TIME_MATCH): Not available
TPROXY Target (TPROXY_TARGET): Not available
UDPLITE Port Redirection: Not available
ULOG Target (ULOG_TARGET): Available
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address
State PID/Program name
tcp 0 0 0.0.0.0:22 0.0.0.0:*
LISTEN 3146/sshd
tcp 0 0 127.0.0.1:25 0.0.0.0:*
LISTEN 3184/sendmail
tcp 0 0 192.168.9.254:22 192.168.9.1:39971
ESTABLISHED 21375/sshd
tcp 0 0 :::22 :::*
LISTEN 3146/sshd
udp 0 0 0.0.0.0:67 0.0.0.0:*
3164/dhcpd
Traffic Control
Device eth2:
qdisc pfifo_fast 0: bands 3 priomap 1 2 2 2 1 2 0 0 1 1 1 1 1 1 1 1
Sent 236363483 bytes 2849668 pkt (dropped 0, overlimits 0 requeues 0)
rate 0bit 0pps backlog 0b 0p requeues 0
Device eth0:
qdisc pfifo_fast 0: bands 3 priomap 1 2 2 2 1 2 0 0 1 1 1 1 1 1 1 1
Sent 5135283130 bytes 14143865 pkt (dropped 0, overlimits 0 requeues 0)
rate 0bit 0pps backlog 0b 0p requeues 0
Device eth1:
qdisc pfifo_fast 0: bands 3 priomap 1 2 2 2 1 2 0 0 1 1 1 1 1 1 1 1
Sent 37477104501 bytes 26674466 pkt (dropped 0, overlimits 0 requeues 0)
rate 0bit 0pps backlog 0b 0p requeues 0
TC Filters
Device eth2:
Device eth0:
Device eth1:
------------------------------------------------------------------------------
Site24x7 APM Insight: Get Deep Visibility into Application Performance
APM + Mobile APM + RUM: Monitor 3 App instances at just $35/Month
Monitor end-to-end web transactions and take corrective actions now
Troubleshoot faster and improve end-user experience. Signup Now!
http://pubads.g.doubleclick.net/gampad/clk?id=267308311&iu=/4140
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users