I checked //etc/shorewall/rules/ again and confirmed that everything is ok.
But I modified //etc/shorewall/interfaces /as follows:
root@pc4-svp:/# cat /etc/shorewall/interfaces
#ZONE   INTERFACE       BROADCAST       OPTIONS
net UMB_IF - optional,sourceroute=0,routefilter=0,arp_ignore=1,proxyarp=0,physical=$UMB_IF,upnp,nosmurfs,tcpflags,dhcp net UMP_IF - optional,sourceroute=0,routefilter=0,arp_ignore=1,proxyarp=0,physical=$UMP_IF,upnp,nosmurfs,tcpflags loc INT_IF - dhcp,physical=$INT_IF,ignore=1,wait=5,routefilter,nets=10.0.0.0/24,routeback
vpn     TUN_IF+         -               physical=tun+,ignore=1
dmz DMZ_IF - dhcp,physical=$DMZ_IF,ignore=1,wait=5,routefilter,nets=10.1.0.0/24,routeback

Then I identified that another firewall service (PVE Firewall) is running.
I stopped this service, and now there are no DNS name resolution issues anymore.

However, now I have a weired issue that apt update fails to access IPv6 addresses on clients loc (= 10.0.0.0/24) and dmz (=10.1.0.0/24): Holen: 100 http://ftp.tu-chemnitz.de/pub/linux/debian/debian/ testing/main iputils-ping amd64 3:20150815-2 [53,6 kB] Holen: 101 http://ftp.tu-chemnitz.de/pub/linux/debian/debian/ testing/main libisc-export95 amd64 1:9.9.5.dfsg-12.1 [138 kB] Fehl http://ftp.tu-chemnitz.de/pub/linux/debian/debian/ unstable/main isc-dhcp-client amd64 4.3.3-9 Verbindung mit ftp.tu-chemnitz.de:80 kann nicht aufgebaut werden (2001:638:911:b0e:134:109:228:1). - connect (101: Das Netzwerk ist nicht erreichbar) [IP: 2001:638:911:b0e:134:109:228:1 80] Fehl http://ftp.tu-chemnitz.de/pub/linux/debian/debian/ unstable/main isc-dhcp-common amd64 4.3.3-9 Verbindung mit ftp.tu-chemnitz.de:80 kann nicht aufgebaut werden (2001:638:911:b0e:134:109:228:1). - connect (101: Das Netzwerk ist nicht erreichbar) [IP: 2001:638:911:b0e:134:109:228:1 80]

Holen: 201 http://ftp.tu-chemnitz.de/pub/linux/debian/debian/ testing/main iptables amd64 1.6.0-2 [291 kB] Holen: 202 http://ftp.tu-chemnitz.de/pub/linux/debian/debian/ testing/main iputils-ping amd64 3:20150815-2 [53,6 kB] Fehl http://repo.saltstack.com/apt/debian/8/amd64/latest/ jessie/main salt-minion all 2015.8.8+ds-2 Verbindung mit repo.saltstack.com:80 kann nicht aufgebaut werden (2604:a880:400:d0::2:e001). - connect (101: Das Netzwerk ist nicht erreichbar) [IP: 2604:a880:400:d0::2:e001 80] Fehl http://repo.saltstack.com/apt/debian/8/amd64/latest/ jessie/main salt-common all 2015.8.8+ds-2 Verbindung mit repo.saltstack.com:80 kann nicht aufgebaut werden (2604:a880:400:d0::2:e001). - connect (101: Das Netzwerk ist nicht erreichbar) [IP: 2604:a880:400:d0::2:e001 80]
33% [Verbindung mit ftp.tu-chemnitz.de (134.109.228.1)]^C


This makes no sense to me, but it's reproducable.

What is needed to troubleshoot this issue?
Dump is attached after /shorewall reset/ to this email.


Regards,
Thomas


Am 03.04.2016 um 17:27 schrieb Tom Eastep:
On 04/03/2016 01:58 AM, Thomas Schneider wrote:
OK.

In the guide " Configuration Files Tips and Hints" you advise against
usage of DNS Names.
I have resolved the DNS names and I understand this article to highlight
the risk if the provider changes things on their hand.
However, I don't know how to mitigate this risk with a restrictive
rule-set in dmz that should only allow access to the update servers.

I have now modified masq config file accordingly:
root@pc4-svp:/etc/shorewall# cat masq
#INTERFACE      SOURCE          ADDRESS
UMB_IF          10.0.0.0/24     217.8.50.86
UMB_IF          10.1.0.0/24     217.8.50.86

However, I believe I should then correct interfaces config file and set
proxyarp=0 for zone dmz.
Would you recommend to set the same options for zone dmz as configured
for zone loc (adjusting nets=10.1.0.0/24)?
root@pc4-svp:/etc/shorewall# cat interfaces
#ZONE   INTERFACE       BROADCAST       OPTIONS
net     UMB_IF          -
optional,sourceroute=0,routefilter=0,arp_ignore=1,proxyarp=0,physical=$UMB_IF,upnp,nosmurfs,tcpflags,dhcp
net     UMP_IF          -
optional,sourceroute=0,routefilter=0,arp_ignore=1,proxyarp=0,physical=$UMP_IF,upnp,nosmurfs,tcpflags
loc     INT_IF          -
dhcp,physical=$INT_IF,ignore=1,wait=5,routefilter,nets=10.0.0.0/24,routeback
vpn     TUN_IF+         -               physical=tun+,ignore=1
dmz     DMZ_IF          -
routeback,proxyarp=1,required,wait=30

After shorewall reset I have started apt update on a different client in
loc (= 10.0.0.0/24) and dmz (= 10.1.0.0/24) and collected the attached dump.

The dump still shows no DNS rules loc->net and dmz->net

By the way:
When creating dump file, I get this output indicating an issue with file
/proc/net/nf_conntrack:
root@pc4-svp:/home/thomas# shorewall dump > shorewall_dump.txt
grep: /proc/net/nf_conntrack: Datei oder Verzeichnis nicht gefunden
This file does neither exist on my Debian 8 server nor on my Debian Sid
notebook.

Install the conntrack package.

-Tom


------------------------------------------------------------------------------
Transform Data into Opportunity.
Accelerate data analysis in your applications with
Intel Data Analytics Acceleration Library.
Click to learn more.
http://pubads.g.doubleclick.net/gampad/clk?id=278785471&iu=/4140


_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Shorewall 5.0.7.2 Dump at pc4-svp - Mo 4. Apr 01:15:36 CEST 2016

Shorewall is running
State:Started (Mo 4. Apr 01:12:13 CEST 2016) from /etc/shorewall/ 
(/var/lib/shorewall/firewall compiled by Shorewall version 5.0.7.2)

Counters reset Mo 4. Apr 01:12:13 CEST 2016

Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
 2206  467K UMP_IF_in  all  --  vmbr2  *       0.0.0.0/0            0.0.0.0/0   
        
  311  108K UMB_IF_in  all  --  eth0   *       0.0.0.0/0            0.0.0.0/0   
        
 1062  222K INT_IF_in  all  --  vmbr0  *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 vpn-fw     all  --  tun+   *       0.0.0.0/0            0.0.0.0/0   
        
  340 75128 DMZ_IF_in  all  --  vmbr1  *       0.0.0.0/0            0.0.0.0/0   
        
  701  620K ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:INPUT:REJECT:"
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 UMP_IF_fwd  all  --  vmbr2  *       0.0.0.0/0            0.0.0.0/0  
         
46292   89M UMB_IF_fwd  all  --  eth0   *       0.0.0.0/0            0.0.0.0/0  
         
24480 1343K INT_IF_fwd  all  --  vmbr0  *       0.0.0.0/0            0.0.0.0/0  
         
    0     0 vpn_frwd   all  --  tun+   *       0.0.0.0/0            0.0.0.0/0   
        
  445 35484 DMZ_IF_fwd  all  --  vmbr1  *       0.0.0.0/0            0.0.0.0/0  
         
    2   120 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    2   120 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:FORWARD:REJECT:"
    2   120 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain OUTPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
 1736 1475K ACCEPT     all  --  *      vmbr2   0.0.0.0/0            0.0.0.0/0   
        
    5   356 ACCEPT     all  --  *      eth0    0.0.0.0/0            0.0.0.0/0   
        
 1005 55688 INT_IF_out  all  --  *      vmbr0   0.0.0.0/0            0.0.0.0/0  
         
    0     0 ACCEPT     all  --  *      tun+    0.0.0.0/0            0.0.0.0/0   
        
  354 18864 DMZ_IF_out  all  --  *      vmbr1   0.0.0.0/0            0.0.0.0/0  
         
  701  620K ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain Broadcast (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
   10  1416 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ADDRTYPE match dst-type BROADCAST
    1    36 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ADDRTYPE match dst-type MULTICAST
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ADDRTYPE match dst-type ANYCAST

Chain DMZ_IF_fwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
   46  2880 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
  421 33922 tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
  445 35484 dmz_frwd   all  --  *      *       10.1.0.0/24          0.0.0.0/0   
        

Chain DMZ_IF_in (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    3   228 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpts:67:68
  337 74900 tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     udp  --  *      *       0.0.0.0              0.0.0.0/0   
         udp dpts:67:68
  340 75128 dmz-fw     all  --  *      *       10.1.0.0/24          0.0.0.0/0   
        

Chain DMZ_IF_out (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpts:67:68
  354 18864 ACCEPT     all  --  *      *       0.0.0.0/0            10.1.0.0/24 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            
255.255.255.255     
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            224.0.0.0/4 
        

Chain Drop (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    7   400            all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    7   400 Broadcast  all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         icmptype 3 code 4 /* Needed ICMP types */
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         icmptype 11 /* Needed ICMP types */
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         multiport dports 135,445 /* SMB */
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpts:137:139 /* SMB */
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp spt:137 dpts:1024:65535 /* SMB */
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         multiport dports 135,139,445 /* SMB */
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:1900 /* UPnP */
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp flags:!0x17/0x02
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp spt:53 /* Late DNS Replies */

Chain INT_IF_fwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
   92  5286 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
24434 1340K tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
24480 1343K loc_frwd   all  --  *      *       10.0.0.0/24          0.0.0.0/0   
        

Chain INT_IF_in (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
   23  1428 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpts:67:68
 1059  222K tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     udp  --  *      *       0.0.0.0              0.0.0.0/0   
         udp dpts:67:68
 1062  222K ~comb1     all  --  *      *       10.0.0.0/24          0.0.0.0/0   
        

Chain INT_IF_out (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpts:67:68
 1005 55688 ACCEPT     all  --  *      *       0.0.0.0/0            10.0.0.0/24 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            
255.255.255.255     
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            224.0.0.0/4 
        

Chain Reject (9 references)
 pkts bytes target     prot opt in     out     source               destination 
        
   14  1632            all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
   14  1632 Broadcast  all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         icmptype 3 code 4 /* Needed ICMP types */
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         icmptype 11 /* Needed ICMP types */
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         multiport dports 135,445 /* SMB */
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpts:137:139 /* SMB */
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp spt:137 dpts:1024:65535 /* SMB */
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         multiport dports 135,139,445 /* SMB */
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:1900 /* UPnP */
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp flags:!0x17/0x02
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp spt:53 /* Late DNS Replies */

Chain UMB_IF_fwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 sfilter    all  --  *      eth0    0.0.0.0/0            0.0.0.0/0   
        [goto] 
    0     0 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
    0     0 smurfs     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
46250   89M tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
46292   89M net_frwd   all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain UMB_IF_in (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
  306  108K dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
  306  108K smurfs     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
  299  107K ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpts:67:68
    7   400 tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
   12  1048 net-fw     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain UMP_IF_fwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
    0     0 smurfs     all  --  *      *       192.168.178.0/24       0.0.0.0/0 
           ctstate INVALID,NEW,UNTRACKED
    0     0 smurfs     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
    0     0 tcpflags   tcp  --  *      *       192.168.178.0/24       0.0.0.0/0 
          
    0     0 tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 fb_frwd    all  --  *      *       192.168.178.0/24       0.0.0.0/0 
          
    0     0 net_frwd   all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain UMP_IF_in (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
   45  3396 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
   45  3396 smurfs     all  --  *      *       192.168.178.0/24       0.0.0.0/0 
           ctstate INVALID,NEW,UNTRACKED
   45  3396 smurfs     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
 2196  466K tcpflags   tcp  --  *      *       192.168.178.0/24       0.0.0.0/0 
          
 2196  466K tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
 2204  467K ~comb1     all  --  *      *       192.168.178.0/24       0.0.0.0/0 
          
    2   286 net-fw     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain all-all (7 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
    8  1224 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:all-all:REJECT:"
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain dmz-all (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain dmz-fw (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
  337 74900 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:22
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         multiport dports 4505,4506
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
    3   228 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain dmz-net (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
  399 32604 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
   20  1320 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:53 /* DNS */
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:53 /* DNS */
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
130.89.148.12        tcp dpt:80
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
195.20.242.89        tcp dpt:80
    7   420 ACCEPT     tcp  --  *      *       0.0.0.0/0            
87.230.23.19         tcp dpt:80
    1    60 ACCEPT     tcp  --  *      *       0.0.0.0/0            
198.199.77.106       tcp dpt:80
    1    60 ACCEPT     tcp  --  *      *       0.0.0.0/0            
134.109.228.1        tcp dpt:80
    7   420 ACCEPT     tcp  --  *      *       0.0.0.0/0            
212.211.132.250      tcp dpt:80
    7   420 ACCEPT     tcp  --  *      *       0.0.0.0/0            
129.143.116.113      tcp dpt:80
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
    1    60 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    1    60 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain dmz_frwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 dmz-all    all  --  *      vmbr2   0.0.0.0/0            
192.168.178.0/24      
  428 34431 dmz-net    all  --  *      eth0    0.0.0.0/0            0.0.0.0/0   
        
   15   933 dmz-net    all  --  *      vmbr2   0.0.0.0/0            0.0.0.0/0   
        
    0     0 dmz-all    all  --  *      tun+    0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     all  --  *      vmbr1   0.0.0.0/0            10.1.0.0/24 
        

Chain dynamic (10 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain fb-net (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         multiport dports 80,443 /* HTTP, HTTPS */
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     tcp  --  *      *       192.168.178.121        0.0.0.0/0 
           tcp dpt:5938
    0     0 ACCEPT     tcp  --  *      *       192.168.178.48         0.0.0.0/0 
           tcp dpt:5938
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain fb_frwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 fb-net     all  --  *      eth0    0.0.0.0/0            0.0.0.0/0   
        
    0     0 fb-net     all  --  *      vmbr2   0.0.0.0/0            0.0.0.0/0   
        
    0     0 all-all    all  --  *      tun+    0.0.0.0/0            0.0.0.0/0   
        
    0     0 ~comb0     all  --  *      vmbr1   0.0.0.0/0            10.1.0.0/24 
        
    0     0 ~comb0     all  --  *      vmbr1   0.0.0.0/0            224.0.0.0/4 
        

Chain loc-net (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
24388 1337K ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
   59  3308 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         multiport dports 80,443,143 /* HTTP, HTTPS, IMAP */
   33  1978 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:53 /* DNS */
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:53 /* DNS */
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain loc_frwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
24448 1341K loc-net    all  --  *      eth0    0.0.0.0/0            0.0.0.0/0   
        
   32  1852 loc-net    all  --  *      vmbr2   0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     all  --  *      vmbr0   0.0.0.0/0            10.0.0.0/24 
        
    0     0 all-all    all  --  *      tun+    0.0.0.0/0            0.0.0.0/0   
        
    0     0 ~comb0     all  --  *      vmbr1   0.0.0.0/0            10.1.0.0/24 
        
    0     0 ~comb0     all  --  *      vmbr1   0.0.0.0/0            224.0.0.0/4 
        

Chain logdrop (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain logflags (7 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 4 level 6 prefix "Shorewall:logflags:DROP:"
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain logreject (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain net-all (3 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
    7   400 Drop       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    7   400 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:net-all:DROP:"
    7   400 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain net-dmz (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
  595 1083K ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         multiport dports 143,25,80,443,465,587,993
    0     0 DROP       icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         icmptype 8 /* Ping */
    0     0 ACCEPT     tcp  --  eth0   *       0.0.0.0/0            10.1.0.4    
         tcp dpt:25 limit: avg 5/sec burst 10
    0     0 net-all    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain net-fw (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    7   934 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:22
    0     0 DROP       icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         icmptype 8 /* Ping */
    7   400 net-all    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain net_frwd (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ~comb2     all  --  *      vmbr2   0.0.0.0/0            
192.168.178.0/24      
    0     0 ACCEPT     all  --  *      eth0    0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     all  --  *      vmbr2   0.0.0.0/0            0.0.0.0/0   
        
45697   88M ~comb2     all  --  *      vmbr0   0.0.0.0/0            10.0.0.0/24 
        
    0     0 ~comb2     all  --  *      vmbr0   0.0.0.0/0            224.0.0.0/4 
        
    0     0 ~comb2     all  --  *      tun+    0.0.0.0/0            0.0.0.0/0   
        
  595 1083K net-dmz    all  --  *      vmbr1   0.0.0.0/0            10.1.0.0/24 
        
    0     0 net-dmz    all  --  *      vmbr1   0.0.0.0/0            224.0.0.0/4 
        

Chain reject (18 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ADDRTYPE match src-type BROADCAST
    0     0 DROP       all  --  *      *       224.0.0.0/4          0.0.0.0/0   
        
    0     0 DROP       2    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    3   180 REJECT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         reject-with tcp-reset
    0     0 REJECT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         reject-with icmp-port-unreachable
    0     0 REJECT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         reject-with icmp-host-unreachable
    0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         reject-with icmp-host-prohibited

Chain sfilter (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:sfilter:DROP:"
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain sha-lh-e1f33498bedb03fae1ee (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain sha-rh-5c3809318b9e43d6ceb5 (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain shorewall (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0            all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         recent: SET name: %CURRENTTIME side: source mask: 255.255.255.255

Chain smurflog (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:smurfs:DROP:"
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain smurfs (6 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 RETURN     all  --  *      *       0.0.0.0              0.0.0.0/0   
        
    0     0 smurflog   all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  ADDRTYPE match src-type BROADCAST
    0     0 smurflog   all  --  *      *       224.0.0.0/4          0.0.0.0/0   
        [goto] 

Chain tcpflags (12 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  tcp flags:0x3F/0x29
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  tcp flags:0x3F/0x00
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  tcp flags:0x06/0x06
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  tcp flags:0x05/0x05
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  tcp flags:0x03/0x03
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  tcp flags:0x19/0x09
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  tcp spt:0 flags:0x17/0x02

Chain vpn-dmz (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         multiport dports 143,25,80,443,465,587,993
    0     0 all-all    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain vpn-fw (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
    0     0 tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:22
    0     0 all-all    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain vpn_frwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 sfilter    all  --  *      tun+    0.0.0.0/0            0.0.0.0/0   
        [goto] 
    0     0 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
    0     0 tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 all-all    all  --  *      vmbr0   0.0.0.0/0            10.0.0.0/24 
        
    0     0 all-all    all  --  *      vmbr0   0.0.0.0/0            224.0.0.0/4 
        
    0     0 vpn-dmz    all  --  *      vmbr1   0.0.0.0/0            10.1.0.0/24 
        
    0     0 vpn-dmz    all  --  *      vmbr1   0.0.0.0/0            224.0.0.0/4 
        

Chain ~comb0 (4 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         multiport dports 143,25,80,443,465,587,993
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpts:2200:2299
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain ~comb1 (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
 3198  684K ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:2214
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:22
   40  2400 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:8006
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         multiport dports 443,5900:5999
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         icmptype 8 /* Ping */
   20  1200 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         multiport dports 4505,4506
    8  1224 all-all    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain ~comb2 (4 references)
 pkts bytes target     prot opt in     out     source               destination 
        
45697   88M ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID
    0     0 DROP       icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         icmptype 8 /* Ping */
    0     0 net-all    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Log (/var/log/messages)

Apr  4 00:06:52 FORWARD:REJECT:IN=vmbr1 OUT=vmbr0 SRC=10.1.0.4 DST=10.0.0.3 
LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=29423 DF PROTO=TCP SPT=53480 DPT=3306 
WINDOW=29200 RES=0x00 SYN URGP=0 
Apr  4 00:08:52 FORWARD:REJECT:IN=vmbr1 OUT=vmbr0 SRC=10.1.0.4 DST=10.0.0.3 
LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=31786 DF PROTO=TCP SPT=53500 DPT=3306 
WINDOW=29200 RES=0x00 SYN URGP=0 
Apr  4 00:10:52 FORWARD:REJECT:IN=vmbr1 OUT=vmbr0 SRC=10.1.0.4 DST=10.0.0.3 
LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=35035 DF PROTO=TCP SPT=53512 DPT=3306 
WINDOW=29200 RES=0x00 SYN URGP=0 
Apr  4 00:12:52 FORWARD:REJECT:IN=vmbr1 OUT=vmbr0 SRC=10.1.0.4 DST=10.0.0.3 
LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=13328 DF PROTO=TCP SPT=53528 DPT=3306 
WINDOW=29200 RES=0x00 SYN URGP=0 
Apr  4 00:12:59 net-all:DROP:IN=eth0 OUT= SRC=46.161.40.120 DST=217.8.50.86 
LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=49431 PROTO=TCP SPT=58689 DPT=3389 
WINDOW=1024 RES=0x00 SYN URGP=0 MARK=0x10000 
Apr  4 00:13:28 net-all:DROP:IN=eth0 OUT= SRC=158.255.2.12 DST=217.8.50.86 
LEN=437 TOS=0x00 PREC=0x00 TTL=52 ID=0 DF PROTO=UDP SPT=5060 DPT=5060 LEN=417 
MARK=0x10000 
Apr  4 00:16:52 FORWARD:REJECT:IN=vmbr1 OUT=vmbr0 SRC=10.1.0.4 DST=10.0.0.3 
LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=62383 DF PROTO=TCP SPT=53556 DPT=3306 
WINDOW=29200 RES=0x00 SYN URGP=0 
Apr  4 00:20:52 FORWARD:REJECT:IN=vmbr1 OUT=vmbr0 SRC=10.1.0.4 DST=10.0.0.3 
LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=46365 DF PROTO=TCP SPT=53622 DPT=3306 
WINDOW=29200 RES=0x00 SYN URGP=0 
Apr  4 00:21:25 net-all:DROP:IN=eth0 OUT= SRC=108.59.4.203 DST=217.8.50.86 
LEN=424 TOS=0x00 PREC=0x00 TTL=50 ID=0 DF PROTO=UDP SPT=5061 DPT=5060 LEN=404 
MARK=0x10000 
Apr  4 00:22:53 FORWARD:REJECT:IN=vmbr1 OUT=vmbr0 SRC=10.1.0.4 DST=10.0.0.3 
LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=56014 DF PROTO=TCP SPT=53640 DPT=3306 
WINDOW=29200 RES=0x00 SYN URGP=0 
Apr  4 00:35:53 FORWARD:REJECT:IN=vmbr1 OUT=vmbr0 SRC=10.1.0.4 DST=10.0.0.3 
LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=34284 DF PROTO=TCP SPT=53830 DPT=3306 
WINDOW=29200 RES=0x00 SYN URGP=0 
Apr  4 00:36:40 net-all:DROP:IN=eth0 OUT= SRC=191.251.59.38 DST=217.8.50.86 
LEN=52 TOS=0x00 PREC=0x00 TTL=44 ID=44679 DF PROTO=TCP SPT=50862 DPT=23 
WINDOW=14600 RES=0x00 SYN URGP=0 MARK=0x10000 
Apr  4 00:36:53 FORWARD:REJECT:IN=vmbr1 OUT=vmbr0 SRC=10.1.0.4 DST=10.0.0.3 
LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=22610 DF PROTO=TCP SPT=53848 DPT=3306 
WINDOW=29200 RES=0x00 SYN URGP=0 
Apr  4 00:44:45 net-all:DROP:IN=eth0 OUT= SRC=209.126.110.5 DST=217.8.50.86 
LEN=439 TOS=0x00 PREC=0x00 TTL=47 ID=0 DF PROTO=UDP SPT=5331 DPT=7080 LEN=419 
MARK=0x10000 
Apr  4 00:56:54 net-all:DROP:IN=eth0 OUT= SRC=183.60.48.25 DST=217.8.50.86 
LEN=40 TOS=0x00 PREC=0x00 TTL=48 ID=0 DF PROTO=TCP SPT=12210 DPT=23 WINDOW=8192 
RES=0x00 SYN URGP=0 MARK=0x10000 
Apr  4 00:58:13 FORWARD:REJECT:IN=vmbr1 OUT=vmbr0 SRC=10.1.0.4 DST=10.0.0.3 
LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=64023 DF PROTO=TCP SPT=50920 DPT=3306 
WINDOW=29200 RES=0x00 SYN URGP=0 
Apr  4 01:12:30 net-all:DROP:IN=eth0 OUT= SRC=112.5.144.36 DST=217.8.50.86 
LEN=60 TOS=0x00 PREC=0xE0 TTL=45 ID=44330 DF PROTO=TCP SPT=40353 DPT=23 
WINDOW=5840 RES=0x00 SYN URGP=0 MARK=0x10000 
Apr  4 01:12:32 net-all:DROP:IN=eth0 OUT= SRC=112.5.144.36 DST=217.8.50.86 
LEN=60 TOS=0x00 PREC=0xE0 TTL=45 ID=44332 DF PROTO=TCP SPT=40353 DPT=23 
WINDOW=5840 RES=0x00 SYN URGP=0 MARK=0x10000 
Apr  4 01:12:40 net-all:DROP:IN=eth0 OUT= SRC=111.248.60.167 DST=217.8.50.86 
LEN=40 TOS=0x00 PREC=0x00 TTL=110 ID=256 DF PROTO=TCP SPT=12200 DPT=29081 
WINDOW=8192 RES=0x00 SYN URGP=0 MARK=0x10000 
Apr  4 01:14:13 FORWARD:REJECT:IN=vmbr1 OUT=vmbr0 SRC=10.1.0.4 DST=10.0.0.3 
LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=5898 DF PROTO=TCP SPT=51294 DPT=3306 
WINDOW=29200 RES=0x00 SYN URGP=0 

NAT Table

Chain PREROUTING (policy ACCEPT 126 packets, 8142 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    7   400 UPnP       all  --  eth0   *       0.0.0.0/0            0.0.0.0/0   
        
   50  3596 UPnP       all  --  vmbr2  *       0.0.0.0/0            0.0.0.0/0   
        
   50  3596 RETURN     all  --  vmbr2  *       192.168.178.0/24       0.0.0.0/0 
          
    0     0 DNAT       tcp  --  eth0   *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:25 to:10.1.0.4
    0     0 net_dnat   all  --  vmbr2  *       0.0.0.0/0            0.0.0.0/0   
        

Chain INPUT (policy ACCEPT 60 packets, 3600 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain OUTPUT (policy ACCEPT 27 packets, 1840 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain POSTROUTING (policy ACCEPT 46 packets, 2921 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
   35  2161 UMB_IF_masq  all  --  *      eth0    0.0.0.0/0            0.0.0.0/0 
          

Chain UMB_IF_masq (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
   23  1366 SNAT       all  --  *      *       10.0.0.0/24          0.0.0.0/0   
         to:217.8.50.86
    7   439 SNAT       all  --  *      *       10.1.0.0/24          0.0.0.0/0   
         to:217.8.50.86

Chain UPnP (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain net_dnat (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DNAT       tcp  --  eth0   *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:25 to:10.1.0.4

Mangle Table

Chain PREROUTING (policy ACCEPT 75842 packets, 92M bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
75842   92M CONNMARK   all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         CONNMARK restore mask 0x30000
   42  3674 routemark  all  --  eth0   *       0.0.0.0/0            0.0.0.0/0   
         mark match 0x0/0x30000
   55  4110 routemark  all  --  vmbr2  *       0.0.0.0/0            0.0.0.0/0   
         mark match 0x0/0x30000

Chain INPUT (policy ACCEPT 4620 packets, 1493K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain FORWARD (policy ACCEPT 71217 packets, 90M bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
71217   90M MARK       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         MARK and 0xfffcffff

Chain OUTPUT (policy ACCEPT 3801 packets, 2170K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
 3801 2170K CONNMARK   all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         CONNMARK restore mask 0x30000

Chain POSTROUTING (policy ACCEPT 75021 packets, 93M bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain routemark (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
   42  3674 MARK       all  --  eth0   *       0.0.0.0/0            0.0.0.0/0   
         MARK xset 0x10000/0x30000
   55  4110 MARK       all  --  vmbr2  *       0.0.0.0/0            0.0.0.0/0   
         MARK xset 0x20000/0x30000
   97  7784 CONNMARK   all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         mark match ! 0x0/0x30000 CONNMARK save mask 0x30000

Raw Table

Chain PREROUTING (policy ACCEPT 75842 packets, 92M bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:10080 CT helper amanda
    0     0 CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:21 CT helper ftp
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:1719 CT helper RAS
    0     0 CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:1720 CT helper Q.931
    0     0 CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:6667 CT helper irc
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:137 CT helper netbios-ns
    0     0 CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:1723 CT helper pptp
    0     0 CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:6566 CT helper sane
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:5060 CT helper sip
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:161 CT helper snmp
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:69 CT helper tftp

Chain OUTPUT (policy ACCEPT 3801 packets, 2170K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:10080 CT helper amanda
    0     0 CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:21 CT helper ftp
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:1719 CT helper RAS
    0     0 CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:1720 CT helper Q.931
    0     0 CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:6667 CT helper irc
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:137 CT helper netbios-ns
    0     0 CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:1723 CT helper pptp
    0     0 CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:6566 CT helper sane
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:5060 CT helper sip
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:161 CT helper snmp
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:69 CT helper tftp

Conntrack Table (70 out of 262144)

tcp      6 42 TIME_WAIT src=127.0.0.1 dst=127.0.0.1 sport=57330 dport=85 
src=127.0.0.1 dst=127.0.0.1 sport=85 dport=57330 [ASSURED] mark=0 use=1
tcp      6 72 TIME_WAIT src=127.0.0.1 dst=127.0.0.1 sport=57364 dport=85 
src=127.0.0.1 dst=127.0.0.1 sport=85 dport=57364 [ASSURED] mark=0 use=1
tcp      6 431999 ESTABLISHED src=192.168.178.48 dst=192.168.178.14 sport=35588 
dport=2214 src=192.168.178.14 dst=192.168.178.48 sport=2214 dport=35588 
[ASSURED] mark=131072 use=1
tcp      6 32 TIME_WAIT src=10.0.0.3 dst=10.0.0.1 sport=39456 dport=4506 
src=10.0.0.1 dst=10.0.0.3 sport=4506 dport=39456 [ASSURED] mark=0 use=1
tcp      6 102 TIME_WAIT src=127.0.0.1 dst=127.0.0.1 sport=57376 dport=85 
src=127.0.0.1 dst=127.0.0.1 sport=85 dport=57376 [ASSURED] mark=0 use=1
tcp      6 99 TIME_WAIT src=192.168.178.48 dst=192.168.178.14 sport=55218 
dport=8006 src=192.168.178.14 dst=192.168.178.48 sport=8006 dport=55218 
[ASSURED] mark=131072 use=1
udp      17 81 src=10.1.0.4 dst=78.42.43.41 sport=49328 dport=53 
src=78.42.43.41 dst=217.8.50.86 sport=53 dport=49328 [ASSURED] mark=65536 use=1
tcp      6 44 TIME_WAIT src=192.168.178.48 dst=192.168.178.14 sport=55196 
dport=8006 src=192.168.178.14 dst=192.168.178.48 sport=8006 dport=55196 
[ASSURED] mark=131072 use=1
tcp      6 12 TIME_WAIT src=127.0.0.1 dst=127.0.0.1 sport=57328 dport=85 
src=127.0.0.1 dst=127.0.0.1 sport=85 dport=57328 [ASSURED] mark=0 use=1
tcp      6 22 TIME_WAIT src=10.0.0.3 dst=10.0.0.1 sport=39454 dport=4506 
src=10.0.0.1 dst=10.0.0.3 sport=4506 dport=39454 [ASSURED] mark=0 use=1
udp      17 0 src=10.1.0.1 dst=10.1.0.255 sport=123 dport=123 [UNREPLIED] 
src=10.1.0.255 dst=10.1.0.1 sport=123 dport=123 mark=0 use=1
tcp      6 92 TIME_WAIT src=10.0.0.3 dst=10.0.0.1 sport=39484 dport=4506 
src=10.0.0.1 dst=10.0.0.3 sport=4506 dport=39484 [ASSURED] mark=0 use=1
udp      17 119 src=10.0.0.3 dst=78.42.43.41 sport=36547 dport=53 
src=78.42.43.41 dst=217.8.50.86 sport=53 dport=36547 [ASSURED] mark=65536 use=1
tcp      6 12 TIME_WAIT src=127.0.0.1 dst=127.0.0.1 sport=57318 dport=85 
src=127.0.0.1 dst=127.0.0.1 sport=85 dport=57318 [ASSURED] mark=0 use=1
udp      17 129 src=10.0.0.3 dst=82.212.62.41 sport=51852 dport=53 
src=82.212.62.41 dst=217.8.50.86 sport=53 dport=51852 [ASSURED] mark=65536 use=1
tcp      6 9 TIME_WAIT src=192.168.178.48 dst=192.168.178.14 sport=55176 
dport=8006 src=192.168.178.14 dst=192.168.178.48 sport=8006 dport=55176 
[ASSURED] mark=131072 use=1
tcp      6 12 TIME_WAIT src=10.0.0.3 dst=10.0.0.1 sport=39442 dport=4506 
src=10.0.0.1 dst=10.0.0.3 sport=4506 dport=39442 [ASSURED] mark=0 use=1
tcp      6 99 SYN_SENT src=10.1.0.4 dst=129.143.116.113 sport=55096 dport=80 
[UNREPLIED] src=129.143.116.113 dst=10.1.0.4 sport=80 dport=55096 mark=0 use=1
tcp      6 90 SYN_SENT src=10.0.0.3 dst=129.143.116.113 sport=48666 dport=80 
[UNREPLIED] src=129.143.116.113 dst=10.0.0.3 sport=80 dport=48666 mark=0 use=2
udp      17 81 src=10.1.0.4 dst=82.212.62.41 sport=35152 dport=53 
src=82.212.62.41 dst=217.8.50.86 sport=53 dport=35152 [ASSURED] mark=65536 use=1
tcp      6 99 TIME_WAIT src=192.168.178.48 dst=192.168.178.14 sport=55214 
dport=8006 src=192.168.178.14 dst=192.168.178.48 sport=8006 dport=55214 
[ASSURED] mark=131072 use=1
tcp      6 14 TIME_WAIT src=192.168.178.48 dst=192.168.178.14 sport=55182 
dport=8006 src=192.168.178.14 dst=192.168.178.48 sport=8006 dport=55182 
[ASSURED] mark=131072 use=1
tcp      6 431999 ESTABLISHED src=127.0.0.1 dst=127.0.0.1 sport=57378 dport=85 
src=127.0.0.1 dst=127.0.0.1 sport=85 dport=57378 [ASSURED] mark=0 use=1
tcp      6 104 TIME_WAIT src=192.168.178.48 dst=192.168.178.14 sport=55208 
dport=8006 src=192.168.178.14 dst=192.168.178.48 sport=8006 dport=55208 
[ASSURED] mark=131072 use=1
tcp      6 44 TIME_WAIT src=192.168.178.48 dst=192.168.178.14 sport=55184 
dport=8006 src=192.168.178.14 dst=192.168.178.48 sport=8006 dport=55184 
[ASSURED] mark=131072 use=1
tcp      6 99 TIME_WAIT src=192.168.178.48 dst=192.168.178.14 sport=55216 
dport=8006 src=192.168.178.14 dst=192.168.178.48 sport=8006 dport=55216 
[ASSURED] mark=131072 use=1
udp      17 158 src=10.0.0.11 dst=82.212.62.41 sport=38400 dport=53 
src=82.212.62.41 dst=217.8.50.86 sport=53 dport=38400 [ASSURED] mark=65536 use=1
tcp      6 17 CLOSE_WAIT src=10.0.0.3 dst=198.199.77.106 sport=50762 dport=80 
src=198.199.77.106 dst=217.8.50.86 sport=80 dport=50762 [ASSURED] mark=65536 
use=1
tcp      6 62 TIME_WAIT src=10.0.0.3 dst=10.0.0.1 sport=39470 dport=4506 
src=10.0.0.1 dst=10.0.0.3 sport=4506 dport=39470 [ASSURED] mark=0 use=1
tcp      6 82 TIME_WAIT src=10.0.0.3 dst=10.0.0.1 sport=39482 dport=4506 
src=10.0.0.1 dst=10.0.0.3 sport=4506 dport=39482 [ASSURED] mark=0 use=1
tcp      6 69 TIME_WAIT src=192.168.178.48 dst=192.168.178.14 sport=55204 
dport=8006 src=192.168.178.14 dst=192.168.178.48 sport=8006 dport=55204 
[ASSURED] mark=131072 use=1
tcp      6 39 TIME_WAIT src=192.168.178.48 dst=192.168.178.14 sport=55190 
dport=8006 src=192.168.178.14 dst=192.168.178.48 sport=8006 dport=55190 
[ASSURED] mark=131072 use=1
tcp      6 39 TIME_WAIT src=192.168.178.48 dst=192.168.178.14 sport=55192 
dport=8006 src=192.168.178.14 dst=192.168.178.48 sport=8006 dport=55192 
[ASSURED] mark=131072 use=1
udp      17 96 src=10.1.0.4 dst=78.42.43.41 sport=56271 dport=53 
src=78.42.43.41 dst=217.8.50.86 sport=53 dport=56271 [ASSURED] mark=65536 use=1
tcp      6 69 TIME_WAIT src=192.168.178.48 dst=192.168.178.14 sport=55206 
dport=8006 src=192.168.178.14 dst=192.168.178.48 sport=8006 dport=55206 
[ASSURED] mark=131072 use=1
tcp      6 14 TIME_WAIT src=192.168.178.48 dst=192.168.178.14 sport=55168 
dport=8006 src=192.168.178.14 dst=192.168.178.48 sport=8006 dport=55168 
[ASSURED] mark=131072 use=1
tcp      6 112 TIME_WAIT src=10.0.0.3 dst=10.0.0.1 sport=39492 dport=4506 
src=10.0.0.1 dst=10.0.0.3 sport=4506 dport=39492 [ASSURED] mark=0 use=1
tcp      6 104 TIME_WAIT src=192.168.178.48 dst=192.168.178.14 sport=55220 
dport=8006 src=192.168.178.14 dst=192.168.178.48 sport=8006 dport=55220 
[ASSURED] mark=131072 use=1
udp      17 13 src=10.0.0.11 dst=82.212.62.41 sport=41264 dport=53 
src=82.212.62.41 dst=217.8.50.86 sport=53 dport=41264 [ASSURED] mark=65536 use=1
tcp      6 42 TIME_WAIT src=10.0.0.3 dst=10.0.0.1 sport=39464 dport=4506 
src=10.0.0.1 dst=10.0.0.3 sport=4506 dport=39464 [ASSURED] mark=0 use=1
udp      17 3 src=10.0.0.11 dst=78.42.43.41 sport=36786 dport=53 [UNREPLIED] 
src=78.42.43.41 dst=10.0.0.11 sport=53 dport=36786 mark=0 use=1
tcp      6 24 CLOSE_WAIT src=10.0.0.3 dst=134.109.228.1 sport=48862 dport=80 
src=134.109.228.1 dst=217.8.50.86 sport=80 dport=48862 [ASSURED] mark=65536 
use=1
udp      17 76 src=10.1.0.4 dst=78.42.43.41 sport=34874 dport=53 
src=78.42.43.41 dst=217.8.50.86 sport=53 dport=34874 [ASSURED] mark=65536 use=1
tcp      6 14 TIME_WAIT src=192.168.178.48 dst=192.168.178.14 sport=55180 
dport=8006 src=192.168.178.14 dst=192.168.178.48 sport=8006 dport=55180 
[ASSURED] mark=131072 use=1
tcp      6 102 TIME_WAIT src=10.0.0.3 dst=10.0.0.1 sport=39490 dport=4506 
src=10.0.0.1 dst=10.0.0.3 sport=4506 dport=39490 [ASSURED] mark=0 use=1
tcp      6 9 TIME_WAIT src=192.168.178.48 dst=192.168.178.14 sport=55174 
dport=8006 src=192.168.178.14 dst=192.168.178.48 sport=8006 dport=55174 
[ASSURED] mark=131072 use=1
tcp      6 431999 ESTABLISHED src=192.168.178.48 dst=192.168.178.14 sport=55224 
dport=8006 src=192.168.178.14 dst=192.168.178.48 sport=8006 dport=55224 
[ASSURED] mark=131072 use=1
tcp      6 72 TIME_WAIT src=127.0.0.1 dst=127.0.0.1 sport=57352 dport=85 
src=127.0.0.1 dst=127.0.0.1 sport=85 dport=57352 [ASSURED] mark=0 use=1
udp      17 29 src=10.120.192.1 dst=255.255.255.255 sport=67 dport=68 
[UNREPLIED] src=255.255.255.255 dst=10.120.192.1 sport=68 dport=67 mark=65536 
use=1
tcp      6 74 TIME_WAIT src=192.168.178.48 dst=192.168.178.14 sport=55212 
dport=8006 src=192.168.178.14 dst=192.168.178.48 sport=8006 dport=55212 
[ASSURED] mark=131072 use=1
tcp      6 84 SYN_SENT src=10.1.0.4 dst=87.230.23.19 sport=47408 dport=80 
[UNREPLIED] src=87.230.23.19 dst=10.1.0.4 sport=80 dport=47408 mark=0 use=1
tcp      6 84 SYN_SENT src=10.1.0.4 dst=212.211.132.250 sport=55856 dport=80 
[UNREPLIED] src=212.211.132.250 dst=10.1.0.4 sport=80 dport=55856 mark=0 use=1
tcp      6 102 TIME_WAIT src=127.0.0.1 dst=127.0.0.1 sport=57366 dport=85 
src=127.0.0.1 dst=127.0.0.1 sport=85 dport=57366 [ASSURED] mark=0 use=1
tcp      6 69 TIME_WAIT src=192.168.178.48 dst=192.168.178.14 sport=55202 
dport=8006 src=192.168.178.14 dst=192.168.178.48 sport=8006 dport=55202 
[ASSURED] mark=131072 use=1
tcp      6 9 TIME_WAIT src=192.168.178.48 dst=192.168.178.14 sport=55178 
dport=8006 src=192.168.178.14 dst=192.168.178.48 sport=8006 dport=55178 
[ASSURED] mark=131072 use=1
udp      17 123 src=10.0.0.11 dst=78.42.43.41 sport=56791 dport=53 
src=78.42.43.41 dst=217.8.50.86 sport=53 dport=56791 [ASSURED] mark=65536 use=1
tcp      6 74 TIME_WAIT src=192.168.178.48 dst=192.168.178.14 sport=55194 
dport=8006 src=192.168.178.14 dst=192.168.178.48 sport=8006 dport=55194 
[ASSURED] mark=131072 use=1
tcp      6 72 TIME_WAIT src=10.0.0.3 dst=10.0.0.1 sport=39480 dport=4506 
src=10.0.0.1 dst=10.0.0.3 sport=4506 dport=39480 [ASSURED] mark=0 use=1
tcp      6 39 TIME_WAIT src=192.168.178.48 dst=192.168.178.14 sport=55188 
dport=8006 src=192.168.178.14 dst=192.168.178.48 sport=8006 dport=55188 
[ASSURED] mark=131072 use=2
udp      17 93 src=10.0.0.11 dst=78.42.43.41 sport=39172 dport=53 
src=78.42.43.41 dst=217.8.50.86 sport=53 dport=39172 [ASSURED] mark=65536 use=1
tcp      6 2 TIME_WAIT src=10.0.0.3 dst=10.0.0.1 sport=39436 dport=4506 
src=10.0.0.1 dst=10.0.0.3 sport=4506 dport=39436 [ASSURED] mark=0 use=1
tcp      6 431999 ESTABLISHED src=10.1.0.1 dst=10.1.0.4 sport=47274 dport=2204 
src=10.1.0.4 dst=10.1.0.1 sport=2204 dport=47274 [ASSURED] mark=0 use=1
tcp      6 52 TIME_WAIT src=10.0.0.3 dst=10.0.0.1 sport=39466 dport=4506 
src=10.0.0.1 dst=10.0.0.3 sport=4506 dport=39466 [ASSURED] mark=0 use=1
udp      17 3 src=217.8.50.86 dst=129.70.132.34 sport=33792 dport=123 
src=129.70.132.34 dst=217.8.50.86 sport=123 dport=33792 mark=65536 use=1
udp      17 81 src=10.1.0.4 dst=78.42.43.41 sport=42643 dport=53 
src=78.42.43.41 dst=217.8.50.86 sport=53 dport=42643 [ASSURED] mark=65536 use=1
tcp      6 74 TIME_WAIT src=192.168.178.48 dst=192.168.178.14 sport=55210 
dport=8006 src=192.168.178.14 dst=192.168.178.48 sport=8006 dport=55210 
[ASSURED] mark=131072 use=1
tcp      6 431999 ESTABLISHED src=10.0.0.1 dst=10.0.0.3 sport=45058 dport=2203 
src=10.0.0.3 dst=10.0.0.1 sport=2203 dport=45058 [ASSURED] mark=0 use=1
tcp      6 44 TIME_WAIT src=192.168.178.48 dst=192.168.178.14 sport=55198 
dport=8006 src=192.168.178.14 dst=192.168.178.48 sport=8006 dport=55198 
[ASSURED] mark=131072 use=1
tcp      6 104 TIME_WAIT src=192.168.178.48 dst=192.168.178.14 sport=55222 
dport=8006 src=192.168.178.14 dst=192.168.178.48 sport=8006 dport=55222 
[ASSURED] mark=131072 use=1
udp      17 124 src=10.0.0.3 dst=78.42.43.41 sport=58250 dport=53 
src=78.42.43.41 dst=217.8.50.86 sport=53 dport=58250 [ASSURED] mark=65536 use=1

IP Configuration

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group 
default 
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP 
group default qlen 1000
    inet 217.8.50.86/26 brd 255.255.255.255 scope global eth0
       valid_lft forever preferred_lft forever
5: vmbr0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP 
group default 
    inet 10.0.0.1/24 brd 10.0.0.255 scope global vmbr0
       valid_lft forever preferred_lft forever
6: vmbr1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP 
group default 
    inet 10.1.0.1/24 brd 10.0.0.255 scope global vmbr1
       valid_lft forever preferred_lft forever
7: vmbr2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP 
group default 
    inet 192.168.178.14/24 brd 192.168.178.255 scope global vmbr2
       valid_lft forever preferred_lft forever

IP Stats

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode 
DEFAULT group default 
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    RX: bytes  packets  errors  dropped overrun mcast   
    4734622    5371     0       0       0       0       
    TX: bytes  packets  errors  dropped carrier collsns 
    4734622    5371     0       0       0       0       
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP 
mode DEFAULT group default qlen 1000
    link/ether 74:d4:35:1a:f6:0f brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    100541734  114667   0       0       0       0       
    TX: bytes  packets  errors  dropped carrier collsns 
    2017762    27092    0       0       0       0       
3: eth1: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast master 
vmbr1 state DOWN mode DEFAULT group default qlen 1000
    link/ether 00:15:17:91:9c:b8 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    0          0        0       0       0       0       
    TX: bytes  packets  errors  dropped carrier collsns 
    0          0        0       0       0       0       
4: eth2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast master 
vmbr2 state UP mode DEFAULT group default qlen 1000
    link/ether 00:15:17:91:9c:b9 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    3993887    15548    0       0       0       348     
    TX: bytes  packets  errors  dropped carrier collsns 
    9051660    12035    0       0       0       0       
5: vmbr0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP 
mode DEFAULT group default 
    link/ether fe:39:b5:b7:87:54 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    1990537    29273    0       0       0       0       
    TX: bytes  packets  errors  dropped carrier collsns 
    94338869   51338    0       0       0       0       
6: vmbr1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP 
mode DEFAULT group default 
    link/ether 00:15:17:91:9c:b8 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    234100     1641     0       0       0       0       
    TX: bytes  packets  errors  dropped carrier collsns 
    1201121    1708     0       0       0       0       
7: vmbr2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP 
mode DEFAULT group default 
    link/ether 00:15:17:91:9c:b9 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    3614933    15287    0       838     0       0       
    TX: bytes  packets  errors  dropped carrier collsns 
    8853334    10183    0       0       0       0       
8: tap121i0: <BROADCAST,MULTICAST,PROMISC,UP,LOWER_UP> mtu 1500 qdisc 
pfifo_fast master vmbr2 state UNKNOWN mode DEFAULT group default qlen 500
    link/ether 32:53:7d:72:f4:7b brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    56892      482      0       0       0       0       
    TX: bytes  packets  errors  dropped carrier collsns 
    186726     1426     0       0       0       0       
10: veth103i0@if9: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast 
master vmbr0 state UP mode DEFAULT group default qlen 1000
    link/ether fe:39:b5:b7:87:54 brd ff:ff:ff:ff:ff:ff link-netnsid 0
    RX: bytes  packets  errors  dropped overrun mcast   
    2390882    29113    0       0       0       0       
    TX: bytes  packets  errors  dropped carrier collsns 
    94326296   51215    0       0       0       0       
12: veth104i0@if11: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast 
master vmbr1 state UP mode DEFAULT group default qlen 1000
    link/ether fe:46:da:c2:ee:ef brd ff:ff:ff:ff:ff:ff link-netnsid 1
    RX: bytes  packets  errors  dropped overrun mcast   
    257074     1641     0       0       0       0       
    TX: bytes  packets  errors  dropped carrier collsns 
    1201769    1716     0       0       0       0       
14: veth111i0@if13: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast 
master vmbr0 state UP mode DEFAULT group default qlen 1000
    link/ether fe:a5:cd:9a:3c:85 brd ff:ff:ff:ff:ff:ff link-netnsid 2
    RX: bytes  packets  errors  dropped overrun mcast   
    9477       160      0       0       0       0       
    TX: bytes  packets  errors  dropped carrier collsns 
    15551      158      0       0       0       0       

Bridges

bridge name     bridge id               STP enabled     interfaces
vmbr0           8000.fe39b5b78754       no              veth103i0
                                                        veth111i0
vmbr1           8000.001517919cb8       no              eth1
                                                        veth104i0
vmbr2           8000.001517919cb9       no              eth2
                                                        tap121i0

Routing Rules

0:      from all lookup local 
999:    from all lookup main 
1000:   from 217.8.50.86 lookup um_business 
1000:   from 192.168.178.14 lookup um_private 
10000:  from all fwmark 0x10000/0x30000 lookup um_business 
10001:  from all fwmark 0x20000/0x30000 lookup um_private 
11000:  from 10.1.0.1 lookup um_business 
32765:  from all lookup balance 
32767:  from all lookup default 

Table balance:

default nexthop via 217.8.50.65 dev eth0 weight 2 nexthop via 192.168.178.1 dev 
vmbr2 weight 1

Table default:


Table local:

local 217.8.50.86 dev eth0 proto kernel scope host src 217.8.50.86
local 192.168.178.14 dev vmbr2 proto kernel scope host src 192.168.178.14
local 127.0.0.1 dev lo proto kernel scope host src 127.0.0.1
local 10.1.0.1 dev vmbr1 proto kernel scope host src 10.1.0.1
local 10.0.0.1 dev vmbr0 proto kernel scope host src 10.0.0.1
broadcast 217.8.50.64 dev eth0 proto kernel scope link src 217.8.50.86
broadcast 217.8.50.127 dev eth0 proto kernel scope link src 217.8.50.86
broadcast 192.168.178.255 dev vmbr2 proto kernel scope link src 192.168.178.14
broadcast 192.168.178.0 dev vmbr2 proto kernel scope link src 192.168.178.14
broadcast 127.255.255.255 dev lo proto kernel scope link src 127.0.0.1
broadcast 127.0.0.0 dev lo proto kernel scope link src 127.0.0.1
broadcast 10.1.0.255 dev vmbr1 proto kernel scope link src 10.1.0.1
broadcast 10.1.0.0 dev vmbr1 proto kernel scope link src 10.1.0.1
broadcast 10.0.0.255 dev vmbr1 proto kernel scope link src 10.1.0.1
broadcast 10.0.0.255 dev vmbr0 proto kernel scope link src 10.0.0.1
broadcast 10.0.0.0 dev vmbr0 proto kernel scope link src 10.0.0.1
local 127.0.0.0/8 dev lo proto kernel scope host src 127.0.0.1

Table main:

217.8.50.65 dev eth0 scope link src 217.8.50.86
192.168.178.1 dev vmbr2 scope link src 192.168.178.14
217.8.50.64/26 dev eth0 proto kernel scope link src 217.8.50.86
192.168.178.0/24 dev vmbr2 proto kernel scope link src 192.168.178.14
10.1.0.0/24 dev vmbr1 proto kernel scope link src 10.1.0.1
10.0.0.0/24 dev vmbr0 proto kernel scope link src 10.0.0.1
blackhole 192.168.0.0/16
blackhole 172.16.0.0/12
blackhole 10.0.0.0/8

Table um_business:

217.8.50.65 dev eth0 scope link src 217.8.50.86
default via 217.8.50.65 dev eth0 src 217.8.50.86

Table um_private:

192.168.178.1 dev vmbr2 scope link src 192.168.178.14
default via 192.168.178.1 dev vmbr2 src 192.168.178.14

Per-IP Counters

   iptaccount is not installed

NF Accounting



Events


/proc

   /proc/version = Linux version 4.2.8-1-pve (root@elsa) (gcc version 4.9.2 
(Debian 4.9.2-10) ) #1 SMP Sat Mar 19 10:44:29 CET 2016
   /proc/sys/net/ipv4/ip_forward = 1
   /proc/sys/net/ipv4/icmp_echo_ignore_all = 0
   /proc/sys/net/ipv4/conf/all/proxy_arp = 0
   /proc/sys/net/ipv4/conf/all/arp_filter = 0
   /proc/sys/net/ipv4/conf/all/arp_ignore = 0
   /proc/sys/net/ipv4/conf/all/rp_filter = 0
   /proc/sys/net/ipv4/conf/all/log_martians = 0
   /proc/sys/net/ipv4/conf/default/proxy_arp = 0
   /proc/sys/net/ipv4/conf/default/arp_filter = 0
   /proc/sys/net/ipv4/conf/default/arp_ignore = 0
   /proc/sys/net/ipv4/conf/default/rp_filter = 0
   /proc/sys/net/ipv4/conf/default/log_martians = 1
   /proc/sys/net/ipv4/conf/eth0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/eth0/arp_filter = 0
   /proc/sys/net/ipv4/conf/eth0/arp_ignore = 1
   /proc/sys/net/ipv4/conf/eth0/rp_filter = 0
   /proc/sys/net/ipv4/conf/eth0/log_martians = 1
   /proc/sys/net/ipv4/conf/eth1/proxy_arp = 0
   /proc/sys/net/ipv4/conf/eth1/arp_filter = 0
   /proc/sys/net/ipv4/conf/eth1/arp_ignore = 0
   /proc/sys/net/ipv4/conf/eth1/rp_filter = 0
   /proc/sys/net/ipv4/conf/eth1/log_martians = 1
   /proc/sys/net/ipv4/conf/eth2/proxy_arp = 0
   /proc/sys/net/ipv4/conf/eth2/arp_filter = 0
   /proc/sys/net/ipv4/conf/eth2/arp_ignore = 0
   /proc/sys/net/ipv4/conf/eth2/rp_filter = 0
   /proc/sys/net/ipv4/conf/eth2/log_martians = 1
   /proc/sys/net/ipv4/conf/lo/proxy_arp = 0
   /proc/sys/net/ipv4/conf/lo/arp_filter = 0
   /proc/sys/net/ipv4/conf/lo/arp_ignore = 0
   /proc/sys/net/ipv4/conf/lo/rp_filter = 0
   /proc/sys/net/ipv4/conf/lo/log_martians = 1
   /proc/sys/net/ipv4/conf/tap121i0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/tap121i0/arp_filter = 0
   /proc/sys/net/ipv4/conf/tap121i0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/tap121i0/rp_filter = 0
   /proc/sys/net/ipv4/conf/tap121i0/log_martians = 1
   /proc/sys/net/ipv4/conf/veth103i0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/veth103i0/arp_filter = 0
   /proc/sys/net/ipv4/conf/veth103i0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/veth103i0/rp_filter = 0
   /proc/sys/net/ipv4/conf/veth103i0/log_martians = 1
   /proc/sys/net/ipv4/conf/veth104i0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/veth104i0/arp_filter = 0
   /proc/sys/net/ipv4/conf/veth104i0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/veth104i0/rp_filter = 0
   /proc/sys/net/ipv4/conf/veth104i0/log_martians = 1
   /proc/sys/net/ipv4/conf/veth111i0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/veth111i0/arp_filter = 0
   /proc/sys/net/ipv4/conf/veth111i0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/veth111i0/rp_filter = 0
   /proc/sys/net/ipv4/conf/veth111i0/log_martians = 1
   /proc/sys/net/ipv4/conf/vmbr0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/vmbr0/arp_filter = 0
   /proc/sys/net/ipv4/conf/vmbr0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/vmbr0/rp_filter = 1
   /proc/sys/net/ipv4/conf/vmbr0/log_martians = 1
   /proc/sys/net/ipv4/conf/vmbr1/proxy_arp = 0
   /proc/sys/net/ipv4/conf/vmbr1/arp_filter = 0
   /proc/sys/net/ipv4/conf/vmbr1/arp_ignore = 0
   /proc/sys/net/ipv4/conf/vmbr1/rp_filter = 1
   /proc/sys/net/ipv4/conf/vmbr1/log_martians = 1
   /proc/sys/net/ipv4/conf/vmbr2/proxy_arp = 0
   /proc/sys/net/ipv4/conf/vmbr2/arp_filter = 0
   /proc/sys/net/ipv4/conf/vmbr2/arp_ignore = 1
   /proc/sys/net/ipv4/conf/vmbr2/rp_filter = 0
   /proc/sys/net/ipv4/conf/vmbr2/log_martians = 1

ARP

? (10.0.0.11) auf 36:36:38:63:63:39 [ether] auf vmbr0
? (192.168.178.48) auf 58:94:6b:a4:2a:cc [ether] auf vmbr2
? (10.0.0.3) auf 32:65:65:39:30:35 [ether] auf vmbr0
? (10.1.0.4) auf 66:62:62:66:65:62 [ether] auf vmbr1
? (217.8.50.65) auf 00:01:5c:23:8e:01 [ether] auf eth0
? (192.168.178.1) auf c8:0e:14:de:97:70 [ether] auf vmbr2

Modules

ip_set                 45056  2 ip_set_hash_ip,xt_set
ip_set_hash_ip         32768  0 
iptable_filter         16384  2 
iptable_mangle         16384  1 
iptable_nat            16384  1 
iptable_raw            16384  1 
ip_tables              28672  4 
iptable_filter,iptable_mangle,iptable_nat,iptable_raw
ipt_MASQUERADE         16384  0 
ipt_REJECT             16384  4 
ipt_rpfilter           16384  0 
nf_conntrack          106496  32 
nf_nat_ftp,nf_nat_irc,nf_nat_sip,nf_nat_amanda,xt_CT,nf_nat_snmp_basic,nf_conntrack_netbios_ns,nf_conntrack_proto_gre,xt_helper,nf_conntrack_proto_udplite,nf_nat,xt_connlimit,nf_nat_h323,nf_nat_ipv4,nf_nat_pptp,nf_nat_tftp,xt_conntrack,nf_conntrack_amanda,nf_nat_masquerade_ipv4,nf_conntrack_proto_sctp,nf_conntrack_netlink,nf_conntrack_broadcast,xt_connmark,nf_conntrack_ftp,nf_conntrack_irc,nf_conntrack_sip,nf_conntrack_h323,nf_conntrack_ipv4,nf_conntrack_pptp,nf_conntrack_sane,nf_conntrack_snmp,nf_conntrack_tftp
nf_conntrack_amanda    16384  3 nf_nat_amanda
nf_conntrack_broadcast    16384  2 nf_conntrack_netbios_ns,nf_conntrack_snmp
nf_conntrack_ftp       20480  3 nf_nat_ftp
nf_conntrack_h323      77824  5 nf_nat_h323
nf_conntrack_ipv4      20480  63 
nf_conntrack_irc       16384  3 nf_nat_irc
nf_conntrack_netbios_ns    16384  2 
nf_conntrack_netlink    36864  0 
nf_conntrack_pptp      20480  3 nf_nat_pptp
nf_conntrack_proto_gre    16384  1 nf_conntrack_pptp
nf_conntrack_proto_sctp    20480  0 
nf_conntrack_proto_udplite    16384  0 
nf_conntrack_sane      16384  2 
nf_conntrack_sip       28672  3 nf_nat_sip
nf_conntrack_snmp      16384  3 nf_nat_snmp_basic
nf_conntrack_tftp      16384  3 nf_nat_tftp
nf_defrag_ipv4         16384  2 xt_TPROXY,nf_conntrack_ipv4
nf_defrag_ipv6         36864  1 xt_TPROXY
nf_log_common          16384  1 nf_log_ipv4
nf_log_ipv4            16384  7 
nf_nat                 24576  11 
nf_nat_ftp,nf_nat_irc,nf_nat_sip,nf_nat_amanda,nf_nat_proto_gre,nf_nat_h323,nf_nat_ipv4,nf_nat_pptp,nf_nat_tftp,xt_nat,nf_nat_masquerade_ipv4
nf_nat_amanda          16384  0 
nf_nat_ftp             16384  0 
nf_nat_h323            20480  0 
nf_nat_ipv4            16384  1 iptable_nat
nf_nat_irc             16384  0 
nf_nat_masquerade_ipv4    16384  1 ipt_MASQUERADE
nf_nat_pptp            16384  0 
nf_nat_proto_gre       16384  1 nf_nat_pptp
nf_nat_sip             20480  0 
nf_nat_snmp_basic      20480  0 
nf_nat_tftp            16384  0 
nf_reject_ipv4         16384  1 ipt_REJECT
xt_addrtype            16384  5 
xt_AUDIT               16384  0 
xt_CHECKSUM            16384  0 
xt_CLASSIFY            16384  0 
xt_comment             16384  26 
xt_connlimit           16384  0 
xt_connmark            16384  3 
xt_conntrack           16384  37 
xt_CT                  16384  22 
xt_dscp                16384  0 
xt_DSCP                16384  0 
xt_hashlimit           20480  0 
xt_helper              16384  0 
xt_iprange             16384  0 
xt_length              16384  0 
xt_limit               16384  1 
xt_LOG                 16384  7 
xt_mark                16384  6 
xt_multiport           16384  17 
xt_nat                 16384  4 
xt_nfacct              16384  0 
xt_NFLOG               16384  0 
xt_NFQUEUE             16384  0 
xt_owner               16384  0 
xt_physdev             16384  0 
xt_pkttype             16384  0 
xt_policy              16384  0 
xt_realm               16384  0 
xt_recent              20480  1 
xt_set                 16384  0 
xt_statistic           16384  0 
xt_tcpmss              16384  0 
xt_TCPMSS              16384  0 
xt_tcpudp              16384  69 
xt_time                16384  0 
xt_TPROXY              20480  0 

Shorewall has detected the following iptables/netfilter capabilities:
   ACCOUNT Target (ACCOUNT_TARGET): Not available
   Address Type Match (ADDRTYPE): Available
   Amanda Helper: Available
   Arptables JF (ARPTABLESJF): Not available
   AUDIT Target (AUDIT_TARGET): Available
   Basic Ematch (BASIC_EMATCH): Available
   Basic Filter (BASIC_FILTER): Available
   Capabilities Version (CAPVERSION): 50004
   Checksum Target (CHECKSUM_TARGET): Available
   CLASSIFY Target (CLASSIFY_TARGET): Available
   Comments (COMMENTS): Available
   Condition Match (CONDITION_MATCH): Not available
   Connection Tracking Match (CONNTRACK_MATCH): Available
   Connlimit Match (CONNLIMIT_MATCH): Available
   Connmark Match (CONNMARK_MATCH): Available
   CONNMARK Target (CONNMARK): Available
   CT Target (CT_TARGET): Available
   DSCP Match (DSCP_MATCH): Available
   DSCP Target (DSCP_TARGET): Available
   Enhanced Multi-port Match (EMULIPORT): Available
   Extended Connection Tracking Match Support (NEW_CONNTRACK_MATCH): Available
   Extended Connmark Match (XCONNMARK_MATCH): Available
   Extended CONNMARK Target (XCONNMARK): Available
   Extended MARK Target 2 (EXMARK): Available
   Extended MARK Target (XMARK): Available
   Extended Multi-port Match (XMULIPORT): Available
   Extended REJECT (ENHANCED_REJECT): Available
   FLOW Classifier (FLOW_FILTER): Available
   FTP-0 Helper: Not available
   FTP Helper: Available
   fwmark route mask (FWMARK_RT_MASK): Available
   Geo IP Match (GEOIP_MATCH): Not available
   Goto Support (GOTO_TARGET): Available
   H323 Helper: Available
   Hashlimit Match (HASHLIMIT_MATCH): Available
   Header Match (HEADER_MATCH): Not available
   Helper Match (HELPER_MATCH): Available
   Iface Match (IFACE_MATCH): Not available
   IMQ Target (IMQ_TARGET): Not available
   IPMARK Target (IPMARK_TARGET): Not available
   IPP2P Match (IPP2P_MATCH): Not available
   IP range Match(IPRANGE_MATCH): Available
   Ipset Match Counters (IPSET_MATCH_COUNTERS): Available
   Ipset Match (IPSET_MATCH): Available
   Ipset Match Nomatch (IPSET_MATCH_NOMATCH): Available
   ipset V5 (IPSET_V5): Available
   iptables -S (IPTABLES_S): Available
   iptables --wait option (WAIT_OPTION): Available
   IRC-0 Helper: Not available
   IRC Helper: Available
   Kernel Version (KERNELVERSION): 40208
   LOGMARK Target (LOGMARK_TARGET): Not available
   LOG Target (LOG_TARGET): Available
   Mangle FORWARD Chain (MANGLE_FORWARD): Available
   Mark in the filter table (MARK_ANYWHERE): Available
   MARK Target (MARK): Available
   MASQUERADE Target (MASQUERADE_TGT): Available
   Multi-port Match (MULTIPORT): Available
   NAT (NAT_ENABLED): Available
   Netbios_ns Helper: Available
   New tos Match (NEW_TOS_MATCH): Available
   NFAcct Match: Available
   NFLOG Target (NFLOG_TARGET): Available
   NFQUEUE Target (NFQUEUE_TARGET): Available
   Owner Match (OWNER_MATCH): Available
   Owner Name Match (OWNER_NAME_MATCH): Available
   Packet length Match (LENGTH_MATCH): Available
   Packet Mangling (MANGLE_ENABLED): Available
   Packet Type Match (USEPKTTYPE): Available
   Persistent SNAT (PERSISTENT_SNAT): Available
   Physdev-is-bridged Support (PHYSDEV_BRIDGE): Available
   Physdev Match (PHYSDEV_MATCH): Available
   Policy Match (POLICY_MATCH): Available
   PPTP Helper: Available
   Rawpost Table (RAWPOST_TABLE): Not available
   Raw Table (RAW_TABLE): Available
   Realm Match (REALM_MATCH): Available
   Recent Match "--reap" option (REAP_OPTION): Available
   Recent Match (RECENT_MATCH): Available
   Repeat match (KLUDGEFREE): Available
   RPFilter Match (RPFILTER_MATCH): Available
   SANE-0 Helper: Not available
   SANE Helper: Available
   SIP-0 Helper: Not available
   SIP Helper: Available
   SNMP Helper: Available
   Statistic Match (STATISTIC_MATCH): Available
   TARPIT Target (TARPIT_TARGET): Not available
   TCPMSS Match (TCPMSS_MATCH): Available
   TCPMSS Target (TCPMSS_TARGET): Available
   TFTP-0 Helper: Not available
   TFTP Helper: Available
   Time Match (TIME_MATCH): Available
   TPROXY Target (TPROXY_TARGET): Available
   UDPLITE Port Redirection (UDPLITEREDIRECT): Not available
   ULOG Target (ULOG_TARGET): Not available

Netid  State      Recv-Q Send-Q Local Address:Port               Peer 
Address:Port              
udp    UNCONN     0      0         *:514                   *:*                  
 users:(("rsyslogd",pid=1289,fd=6))
udp    UNCONN     0      0         *:801                   *:*                  
 users:(("rpcbind",pid=1060,fd=7))
udp    UNCONN     0      0      127.0.0.1:890                   *:*             
      users:(("rpc.statd",pid=1138,fd=5))
udp    UNCONN     0      0         *:33792                 *:*                  
 users:(("systemd-timesyn",pid=493,fd=13))
udp    UNCONN     0      0         *:54955                 *:*                  
 users:(("rpc.statd",pid=1138,fd=8))
udp    UNCONN     0      0         *:7928                  *:*                  
 users:(("dhclient",pid=553,fd=20))
udp    UNCONN     0      0         *:68                    *:*                  
 users:(("dhclient",pid=553,fd=6))
udp    UNCONN     0      0         *:111                   *:*                  
 users:(("rpcbind",pid=1060,fd=6))
udp    UNCONN     0      0      192.168.178.14:123                   *:*        
           users:(("ntpd",pid=1290,fd=22))
udp    UNCONN     0      0      10.1.0.1:123                   *:*              
     users:(("ntpd",pid=1290,fd=21))
udp    UNCONN     0      0      10.0.0.1:123                   *:*              
     users:(("ntpd",pid=1290,fd=20))
udp    UNCONN     0      0      217.8.50.86:123                   *:*           
        users:(("ntpd",pid=1290,fd=19))
udp    UNCONN     0      0      127.0.0.1:123                   *:*             
      users:(("ntpd",pid=1290,fd=18))
udp    UNCONN     0      0         *:123                   *:*                  
 users:(("ntpd",pid=1290,fd=16))
tcp    LISTEN     0      128       *:3128                  *:*                  
 users:(("spiceproxy work",pid=1971,fd=6),("spiceproxy",pid=1970,fd=6))
tcp    LISTEN     0      100    10.0.0.1:4505                  *:*              
     users:(("salt-master",pid=2017,fd=14))
tcp    LISTEN     0      100    127.0.0.1:25                    *:*             
      users:(("master",pid=1614,fd=12))
tcp    LISTEN     0      100    10.0.0.1:4506                  *:*              
     users:(("salt-master",pid=2025,fd=22))
tcp    LISTEN     0      128       *:39652                 *:*                  
 users:(("rpc.statd",pid=1138,fd=9))
tcp    LISTEN     0      128       *:8006                  *:*                  
 users:(("pveproxy worker",pid=28154,fd=6),("pveproxy 
worker",pid=1889,fd=6),("pveproxy 
worker",pid=1888,fd=6),("pveproxy",pid=1886,fd=6))
tcp    LISTEN     0      128       *:2214                  *:*                  
 users:(("sshd",pid=1230,fd=3))
tcp    LISTEN     0      128       *:111                   *:*                  
 users:(("rpcbind",pid=1060,fd=8))
tcp    LISTEN     0      5      127.0.0.1:7634                  *:*             
      users:(("hddtemp",pid=1382,fd=0))
tcp    LISTEN     0      128    127.0.0.1:85                    *:*             
      users:(("pvedaemon worke",pid=1840,fd=6),("pvedaemon 
worke",pid=1839,fd=6),("pvedaemon 
worke",pid=1838,fd=6),("pvedaemon",pid=1837,fd=6))
tcp    TIME-WAIT  0      0      192.168.178.14:8006               
192.168.178.48:55210              
tcp    ESTAB      0      0      10.1.0.1:47274              10.1.0.4:2204       
         users:(("ssh",pid=22230,fd=3))
tcp    ESTAB      0      0      127.0.0.1:85                 127.0.0.1:57378    
           users:(("pvedaemon worke",pid=1838,fd=9))
tcp    ESTAB      0      0      192.168.178.14:8006               
192.168.178.48:55224               users:(("pveproxy worker",pid=1889,fd=14))
tcp    TIME-WAIT  0      0      192.168.178.14:8006               
192.168.178.48:55212              
tcp    TIME-WAIT  0      0      192.168.178.14:8006               
192.168.178.48:55194              
tcp    TIME-WAIT  0      0      127.0.0.1:57366              127.0.0.1:85       
          
tcp    TIME-WAIT  0      0      127.0.0.1:57352              127.0.0.1:85       
          
tcp    TIME-WAIT  0      0      192.168.178.14:8006               
192.168.178.48:55208              
tcp    TIME-WAIT  0      0      127.0.0.1:57364              127.0.0.1:85       
          
tcp    TIME-WAIT  0      0      192.168.178.14:8006               
192.168.178.48:55222              
tcp    ESTAB      0      0      127.0.0.1:57378              127.0.0.1:85       
           users:(("pveproxy worker",pid=1889,fd=17))
tcp    ESTAB      0      0      192.168.178.14:2214               
192.168.178.48:35588               
users:(("sshd",pid=1815,fd=3),("sshd",pid=1801,fd=3))
tcp    ESTAB      0      0      10.0.0.1:45058              10.0.0.3:2203       
         users:(("ssh",pid=22389,fd=3))
tcp    TIME-WAIT  0      0      127.0.0.1:57376              127.0.0.1:85       
          
tcp    TIME-WAIT  0      0      192.168.178.14:8006               
192.168.178.48:55220              

Traffic Control

Device eth0:
qdisc pfifo_fast 0: root refcnt 2 bands 3 priomap  1 2 2 2 1 2 0 0 1 1 1 1 1 1 
1 1
 Sent 1909136 bytes 27092 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 


Device eth1:
qdisc pfifo_fast 0: root refcnt 2 bands 3 priomap  1 2 2 2 1 2 0 0 1 1 1 1 1 1 
1 1
 Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 


Device eth2:
qdisc pfifo_fast 0: root refcnt 2 bands 3 priomap  1 2 2 2 1 2 0 0 1 1 1 1 1 1 
1 1
 Sent 9001372 bytes 12036 pkt (dropped 0, overlimits 0 requeues 1) 
 backlog 0b 0p requeues 1 


Device tap121i0:
qdisc pfifo_fast 0: root refcnt 2 bands 3 priomap  1 2 2 2 1 2 0 0 1 1 1 1 1 1 
1 1
 Sent 186726 bytes 1426 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 


Device veth103i0:
qdisc pfifo_fast 0: root refcnt 2 bands 3 priomap  1 2 2 2 1 2 0 0 1 1 1 1 1 1 
1 1
 Sent 95514362 bytes 69216 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 


Device veth104i0:
qdisc pfifo_fast 0: root refcnt 2 bands 3 priomap  1 2 2 2 1 2 0 0 1 1 1 1 1 1 
1 1
 Sent 1217345 bytes 1952 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 


Device veth111i0:
qdisc pfifo_fast 0: root refcnt 2 bands 3 priomap  1 2 2 2 1 2 0 0 1 1 1 1 1 1 
1 1
 Sent 15551 bytes 158 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 



TC Filters

Device eth0:

Device eth1:

Device eth2:

Device tap121i0:

Device veth103i0:

Device veth104i0:

Device veth111i0:

------------------------------------------------------------------------------
Transform Data into Opportunity.
Accelerate data analysis in your applications with
Intel Data Analytics Acceleration Library.
Click to learn more.
http://pubads.g.doubleclick.net/gampad/clk?id=278785471&iu=/4140
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to