> I have a remote location and acces via vpn without problems
> even i can conect a localmachine using dnat, for conect her
> but i wanna connect to router for acces to him but it dont work
>
> rules
> ?SECTION ALL
> ?SECTION ESTABLISHED
> ?SECTION RELATED
> ?SECTION INVALID
> ?SECTION UNTRACKED
> ?SECTION NEW
>
> Invalid(DROP) net all tcp
> DNS(ACCEPT) $FW net
> SSH(ACCEPT) loc $FW
> SSH(ACCEPT) vpn $FW
>
> Ping(ACCEPT) loc $FW
>
>
> Ping(DROP) net $FW
>
> ACCEPT $FW loc icmp
> ACCEPT $FW net icmp
> ACCEPT vpn all all
> DNS(ACCEPT) loc $FW
> SSH(ACCEPT) net $FW TCP
>
> DNAT vpn loc:10.1.3.2 tcp 6000 #this work
> DNAT vpn net:192.168.1.1 tcp 80 - &tun0 # this
not work
> (end of rules)
> from a remote localtion i get this
> nmap 10.0.8.4 # (vpn adress)
>
> Starting Nmap 7.12 ( https://nmap.org ) at 2016-04-21 10:18 CEST
> Nmap scan report for 10.0.8.4
> Host is up (0.17s latency).
> Not shown: 996 closed ports
> PORT STATE SERVICE
> 22/tcp open ssh
> 53/tcp open domain
> 80/tcp filtered http
> 6000/tcp open X11
>
> Nmap done: 1 IP address (1 host up) scanned in 13.33 seconds
>
>
> this is my shorewall dump
>
>
> Shorewall 5.0.4 Dump at figueres - Thu Apr 21 08:38:17 UTC 2016
>
> Shorewall is running
> State:Started (Thu Apr 21 08:16:32 UTC 2016) from /etc/shorewall/
(/var/lib/shorewall/firewall compiled by Shorewall version 5.0.4)
>
> Counters reset Thu Apr 21 08:16:32 UTC 2016
>
> Chain INPUT (policy DROP 0 packets, 0 bytes)
> pkts bytes target prot opt in out source
destination
> 35155 45M net-fw all -- wlan0 * 0.0.0.0/0
0.0.0.0/0
> 0 0 ~comb0 all -- eth0 * 0.0.0.0/0
0.0.0.0/0
> 4422 265K ~comb0 all -- tun0 * 0.0.0.0/0
0.0.0.0/0
> 1654 148K ACCEPT all -- lo * 0.0.0.0/0
0.0.0.0/0
> 0 0 Reject all -- * * 0.0.0.0/0
0.0.0.0/0
> 0 0 LOG all -- * * 0.0.0.0/0
0.0.0.0/0 LOG flags 0 level 6 prefix "Shorewall:INPUT:REJECT:"
> 0 0 reject all -- * * 0.0.0.0/0
0.0.0.0/0 [goto]
>
> Chain FORWARD (policy DROP 0 packets, 0 bytes)
> pkts bytes target prot opt in out source
destination
> 23 1316 TCPMSS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU
> 0 0 net_frwd all -- wlan0 * 0.0.0.0/0
0.0.0.0/0
> 4 176 loc_frwd all -- eth0 * 0.0.0.0/0
0.0.0.0/0
> 25 1380 vpn_frwd all -- tun0 * 0.0.0.0/0
0.0.0.0/0
> 0 0 Reject all -- * * 0.0.0.0/0
0.0.0.0/0
> 0 0 LOG all -- * * 0.0.0.0/0
0.0.0.0/0 LOG flags 0 level 6 prefix "Shorewall:FORWARD:REJECT:"
> 0 0 reject all -- * * 0.0.0.0/0
0.0.0.0/0 [goto]
>
> Chain OUTPUT (policy ACCEPT 13731 packets, 1423K bytes)
> pkts bytes target prot opt in out source
destination
>
> Chain Broadcast (2 references)
> pkts bytes target prot opt in out source
destination
> 4 974 DROP all -- * * 0.0.0.0/0
0.0.0.0/0 ADDRTYPE match dst-type BROADCAST
> 0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0 ADDRTYPE match dst-type MULTICAST
> 0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0 ADDRTYPE match dst-type ANYCAST
>
> Chain Drop (2 references)
> pkts bytes target prot opt in out source
destination
> 4 974 all -- * * 0.0.0.0/0
0.0.0.0/0
> 4 974 Broadcast all -- * * 0.0.0.0/0
0.0.0.0/0
> 0 0 ACCEPT icmp -- * * 0.0.0.0/0
0.0.0.0/0 icmptype 3 code 4 /* Needed ICMP types */
> 0 0 ACCEPT icmp -- * * 0.0.0.0/0
0.0.0.0/0 icmptype 11 /* Needed ICMP types */
> 0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0 ctstate INVALID
> 0 0 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0 multiport dports 135,445 /* SMB */
> 0 0 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpts:137:139 /* SMB */
> 0 0 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0 udp spt:137 dpts:1024:65535 /* SMB */
> 0 0 DROP tcp -- * * 0.0.0.0/0
0.0.0.0/0 multiport dports 135,139,445 /* SMB */
> 0 0 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:1900 /* UPnP */
> 0 0 DROP tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp flags:!0x17/0x02
> 0 0 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0 udp spt:53 /* Late DNS Replies */
>
> Chain Reject (2 references)
> pkts bytes target prot opt in out source
destination
> 0 0 all -- * * 0.0.0.0/0
0.0.0.0/0
> 0 0 Broadcast all -- * * 0.0.0.0/0
0.0.0.0/0
> 0 0 ACCEPT icmp -- * * 0.0.0.0/0
0.0.0.0/0 icmptype 3 code 4 /* Needed ICMP types */
> 0 0 ACCEPT icmp -- * * 0.0.0.0/0
0.0.0.0/0 icmptype 11 /* Needed ICMP types */
> 0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0 ctstate INVALID
> 0 0 reject udp -- * * 0.0.0.0/0
0.0.0.0/0 multiport dports 135,445 /* SMB */
> 0 0 reject udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpts:137:139 /* SMB */
> 0 0 reject udp -- * * 0.0.0.0/0
0.0.0.0/0 udp spt:137 dpts:1024:65535 /* SMB */
> 0 0 reject tcp -- * * 0.0.0.0/0
0.0.0.0/0 multiport dports 135,139,445 /* SMB */
> 0 0 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:1900 /* UPnP */
> 0 0 DROP tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp flags:!0x17/0x02
> 0 0 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0 udp spt:53 /* Late DNS Replies */
>
> Chain dynamic (5 references)
> pkts bytes target prot opt in out source
destination
>
> Chain loc_frwd (1 references)
> pkts bytes target prot opt in out source
destination
> 0 0 dynamic all -- * * 0.0.0.0/0
0.0.0.0/0 ctstate INVALID,NEW,UNTRACKED
> 0 0 smurfs all -- * * 0.0.0.0/0
0.0.0.0/0 ctstate INVALID,NEW,UNTRACKED
> 4 176 tcpflags tcp -- * * 0.0.0.0/0
0.0.0.0/0
> 0 0 ACCEPT all -- * wlan0 0.0.0.0/0
0.0.0.0/0
> 4 176 ACCEPT all -- * tun0 0.0.0.0/0
0.0.0.0/0
>
> Chain logdrop (0 references)
> pkts bytes target prot opt in out source
destination
> 0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0
>
> Chain logflags (7 references)
> pkts bytes target prot opt in out source
destination
> 0 0 LOG all -- * * 0.0.0.0/0
0.0.0.0/0 LOG flags 4 level 6 prefix "Shorewall:logflags:DROP:"
> 0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0
>
> Chain logreject (0 references)
> pkts bytes target prot opt in out source
destination
> 0 0 reject all -- * * 0.0.0.0/0
0.0.0.0/0
>
> Chain net-fw (1 references)
> pkts bytes target prot opt in out source
destination
> 16 1454 dynamic all -- * * 0.0.0.0/0
0.0.0.0/0 ctstate INVALID,NEW,UNTRACKED
> 16 1454 smurfs all -- * * 0.0.0.0/0
0.0.0.0/0 ctstate INVALID,NEW,UNTRACKED
> 0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpts:67:68
> 30582 45M tcpflags tcp -- * * 0.0.0.0/0
0.0.0.0/0
> 35139 45M ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 ctstate RELATED,ESTABLISHED
> 12 480 DROP tcp -- * * 0.0.0.0/0
0.0.0.0/0 ctstate INVALID
> 0 0 DROP icmp -- * * 0.0.0.0/0
0.0.0.0/0 icmptype 8 /* Ping */
> 0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:22 /* SSH */
> 4 974 Drop all -- * * 0.0.0.0/0
0.0.0.0/0
> 0 0 LOG all -- * * 0.0.0.0/0
0.0.0.0/0 LOG flags 0 level 6 prefix "Shorewall:net-fw:DROP:"
> 0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0
>
> Chain net-loc (1 references)
> pkts bytes target prot opt in out source
destination
> 0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 ctstate RELATED,ESTABLISHED
> 0 0 DROP tcp -- * * 0.0.0.0/0
0.0.0.0/0 ctstate INVALID
> 0 0 Drop all -- * * 0.0.0.0/0
0.0.0.0/0
> 0 0 LOG all -- * * 0.0.0.0/0
0.0.0.0/0 LOG flags 0 level 6 prefix "Shorewall:net-loc:DROP:"
> 0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0
>
> Chain net-vpn (1 references)
> pkts bytes target prot opt in out source
destination
> 0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 ctstate RELATED,ESTABLISHED
> 0 0 DROP tcp -- * * 0.0.0.0/0
0.0.0.0/0 ctstate INVALID
> 0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0
>
> Chain net_frwd (1 references)
> pkts bytes target prot opt in out source
destination
> 0 0 dynamic all -- * * 0.0.0.0/0
0.0.0.0/0 ctstate INVALID,NEW,UNTRACKED
> 0 0 smurfs all -- * * 0.0.0.0/0
0.0.0.0/0 ctstate INVALID,NEW,UNTRACKED
> 0 0 tcpflags tcp -- * * 0.0.0.0/0
0.0.0.0/0
> 0 0 net-loc all -- * eth0 0.0.0.0/0
0.0.0.0/0
> 0 0 net-vpn all -- * tun0 0.0.0.0/0
0.0.0.0/0
>
> Chain reject (7 references)
> pkts bytes target prot opt in out source
destination
> 0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0 ADDRTYPE match src-type BROADCAST
> 0 0 DROP all -- * * 224.0.0.0/4
0.0.0.0/0
> 0 0 DROP 2 -- * * 0.0.0.0/0
0.0.0.0/0
> 0 0 REJECT tcp -- * * 0.0.0.0/0
0.0.0.0/0 reject-with tcp-reset
> 0 0 REJECT udp -- * * 0.0.0.0/0
0.0.0.0/0 reject-with icmp-port-unreachable
> 0 0 REJECT icmp -- * * 0.0.0.0/0
0.0.0.0/0 reject-with icmp-host-unreachable
> 0 0 REJECT all -- * * 0.0.0.0/0
0.0.0.0/0 reject-with icmp-host-prohibited
>
> Chain sha-lh-5228655fddc23881908d (0 references)
> pkts bytes target prot opt in out source
destination
>
> Chain sha-rh-1b095798417d2c7f6fc5 (0 references)
> pkts bytes target prot opt in out source
destination
>
> Chain shorewall (0 references)
> pkts bytes target prot opt in out source
destination
> 0 0 all -- * * 0.0.0.0/0
0.0.0.0/0 recent: SET name: %CURRENTTIME side: source mask:
255.255.255.255
>
> Chain smurflog (2 references)
> pkts bytes target prot opt in out source
destination
> 0 0 LOG all -- * * 0.0.0.0/0
0.0.0.0/0 LOG flags 0 level 6 prefix "Shorewall:smurfs:DROP:"
> 0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0
>
> Chain smurfs (5 references)
> pkts bytes target prot opt in out source
destination
> 0 0 RETURN all -- * * 0.0.0.0
0.0.0.0/0
> 0 0 smurflog all -- * * 0.0.0.0/0
0.0.0.0/0 [goto] ADDRTYPE match src-type BROADCAST
> 0 0 smurflog all -- * * 224.0.0.0/4
0.0.0.0/0 [goto]
>
> Chain tcpflags (5 references)
> pkts bytes target prot opt in out source
destination
> 0 0 logflags tcp -- * * 0.0.0.0/0
0.0.0.0/0 [goto] tcp flags:0x3F/0x29
> 0 0 logflags tcp -- * * 0.0.0.0/0
0.0.0.0/0 [goto] tcp flags:0x3F/0x00
> 0 0 logflags tcp -- * * 0.0.0.0/0
0.0.0.0/0 [goto] tcp flags:0x06/0x06
> 0 0 logflags tcp -- * * 0.0.0.0/0
0.0.0.0/0 [goto] tcp flags:0x05/0x05
> 0 0 logflags tcp -- * * 0.0.0.0/0
0.0.0.0/0 [goto] tcp flags:0x03/0x03
> 0 0 logflags tcp -- * * 0.0.0.0/0
0.0.0.0/0 [goto] tcp flags:0x19/0x09
> 0 0 logflags tcp -- * * 0.0.0.0/0
0.0.0.0/0 [goto] tcp spt:0 flags:0x17/0x02
>
> Chain vpn_frwd (1 references)
> pkts bytes target prot opt in out source
destination
> 19 1140 dynamic all -- * * 0.0.0.0/0
0.0.0.0/0 ctstate INVALID,NEW,UNTRACKED
> 19 1140 smurfs all -- * * 0.0.0.0/0
0.0.0.0/0 ctstate INVALID,NEW,UNTRACKED
> 25 1380 tcpflags tcp -- * * 0.0.0.0/0
0.0.0.0/0
> 15 900 ACCEPT all -- * wlan0 0.0.0.0/0
0.0.0.0/0
> 10 480 ACCEPT all -- * eth0 0.0.0.0/0
0.0.0.0/0
>
> Chain ~comb0 (2 references)
> pkts bytes target prot opt in out source
destination
> 2198 132K dynamic all -- * * 0.0.0.0/0
0.0.0.0/0 ctstate INVALID,NEW,UNTRACKED
> 2198 132K smurfs all -- * * 0.0.0.0/0
0.0.0.0/0 ctstate INVALID,NEW,UNTRACKED
> 0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpts:67:68
> 4422 265K tcpflags tcp -- * * 0.0.0.0/0
0.0.0.0/0
> 4422 265K ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0
>
> Log (/var/log/shorewall)
>
>
> NAT Table
>
> Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)
> pkts bytes target prot opt in out source
destination
> 2214 133K vpn_dnat all -- tun0 * 0.0.0.0/0
0.0.0.0/0
>
> Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
> pkts bytes target prot opt in out source
destination
>
> Chain OUTPUT (policy ACCEPT 60 packets, 3853 bytes)
> pkts bytes target prot opt in out source
destination
>
> Chain POSTROUTING (policy ACCEPT 60 packets, 3853 bytes)
> pkts bytes target prot opt in out source
destination
> 0 0 MASQUERADE all -- * wlan0 10.1.3.0/24
0.0.0.0/0
>
> Chain vpn_dnat (1 references)
> pkts bytes target prot opt in out source
destination
> 4 240 DNAT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:6000 to:10.1.3.2
> 12 720 DNAT tcp -- * * 0.0.0.0/0
10.0.8.4 tcp dpt:80 to:192.168.1.1
>
> Mangle Table
>
> Chain PREROUTING (policy ACCEPT 17398 packets, 21M bytes)
> pkts bytes target prot opt in out source
destination
>
> Chain INPUT (policy ACCEPT 17398 packets, 21M bytes)
> pkts bytes target prot opt in out source
destination
>
> Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
> pkts bytes target prot opt in out source
destination
> 29 1556 MARK all -- * * 0.0.0.0/0
0.0.0.0/0 MARK and 0xffffff00
>
> Chain OUTPUT (policy ACCEPT 13787 packets, 1455K bytes)
> pkts bytes target prot opt in out source
destination
>
> Chain POSTROUTING (policy ACCEPT 13787 packets, 1455K bytes)
> pkts bytes target prot opt in out source
destination
>
> Raw Table
>
> Chain PREROUTING (policy ACCEPT 17380 packets, 21M bytes)
> pkts bytes target prot opt in out source
destination
> 0 0 CT udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:10080 CT helper amanda
> 2 120 CT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:21 CT helper ftp
> 0 0 CT udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:1719 CT helper RAS
> 2 120 CT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:1720 CT helper Q.931
> 2 120 CT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:6667 CT helper irc
> 0 0 CT udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:137 CT helper netbios-ns
> 2 120 CT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:1723 CT helper pptp
> 2 120 CT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:6566 CT helper sane
> 0 0 CT udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:5060 CT helper sip
> 0 0 CT udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:161 CT helper snmp
> 0 0 CT udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:69 CT helper tftp
>
> Chain OUTPUT (policy ACCEPT 13775 packets, 1451K bytes)
> pkts bytes target prot opt in out source
destination
> 0 0 CT udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:10080 CT helper amanda
> 0 0 CT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:21 CT helper ftp
> 0 0 CT udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:1719 CT helper RAS
> 0 0 CT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:1720 CT helper Q.931
> 0 0 CT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:6667 CT helper irc
> 0 0 CT udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:137 CT helper netbios-ns
> 0 0 CT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:1723 CT helper pptp
> 0 0 CT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:6566 CT helper sane
> 0 0 CT udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:5060 CT helper sip
> 0 0 CT udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:161 CT helper snmp
> 0 0 CT udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:69 CT helper tftp
>
> Conntrack Table (42 out of 59048)
>
> udp 17 34 src=192.168.1.128 dst=8.8.4.4 sport=51096 dport=53
src=8.8.4.4 dst=192.168.1.128 sport=53 dport=51096 [ASSURED] mark=0 use=2
> tcp 6 82115 ESTABLISHED src=10.0.8.5 dst=10.0.8.2 sport=53600
dport=22 src=10.0.8.2 dst=10.0.8.5 sport=22 dport=53600 [ASSURED] mark=0
use=2
> udp 17 35 src=192.168.1.128 dst=8.8.4.4 sport=46085 dport=53
src=8.8.4.4 dst=192.168.1.128 sport=53 dport=46085 [ASSURED] mark=0 use=2
> udp 17 34 src=192.168.1.128 dst=8.8.8.8 sport=52008 dport=53
src=8.8.8.8 dst=192.168.1.128 sport=53 dport=52008 [ASSURED] mark=0 use=2
> tcp 6 96 TIME_WAIT src=192.168.1.128 dst=107.6.170.212 sport=46058
dport=80 src=107.6.170.212 dst=192.168.1.128 sport=80 dport=46058 [ASSURED]
mark=0 use=2
> tcp 6 431976 ESTABLISHED src=10.0.8.2 dst=10.0.8.4 sport=50492
dport=22 src=10.0.8.4 dst=10.0.8.2 sport=22 dport=50492 [ASSURED] mark=0
use=2
> udp 17 35 src=192.168.1.128 dst=8.8.8.8 sport=50537 dport=53
src=8.8.8.8 dst=192.168.1.128 sport=53 dport=50537 [ASSURED] mark=0 use=2
> udp 17 34 src=192.168.1.128 dst=8.8.8.8 sport=57981 dport=53
src=8.8.8.8 dst=192.168.1.128 sport=53 dport=57981 [ASSURED] mark=0 use=2
> udp 17 56 src=192.168.1.128 dst=8.8.8.8 sport=39412 dport=53
src=8.8.8.8 dst=192.168.1.128 sport=53 dport=39412 [ASSURED] mark=0 use=2
> udp 17 34 src=192.168.1.128 dst=8.8.4.4 sport=57759 dport=53
src=8.8.4.4 dst=192.168.1.128 sport=53 dport=57759 [ASSURED] mark=0 use=2
> udp 17 156 src=192.168.1.128 dst=8.8.8.8 sport=45573 dport=53
src=8.8.8.8 dst=192.168.1.128 sport=53 dport=45573 [ASSURED] mark=0 use=2
> tcp 6 299 ESTABLISHED src=10.0.8.2 dst=10.0.8.4 sport=42786 dport=22
src=10.0.8.4 dst=10.0.8.2 sport=22 dport=42786 [ASSURED] mark=0 use=2
> udp 17 34 src=192.168.1.128 dst=8.8.8.8 sport=50023 dport=53
src=8.8.8.8 dst=192.168.1.128 sport=53 dport=50023 [ASSURED] mark=0 use=2
> udp 17 179 src=192.168.1.128 dst=83.58.186.174 sport=35976
dport=1194 src=83.58.186.174 dst=192.168.1.128 sport=1194 dport=35976
[ASSURED] mark=0 use=2
> udp 17 34 src=192.168.1.128 dst=8.8.4.4 sport=58363 dport=53
src=8.8.4.4 dst=192.168.1.128 sport=53 dport=58363 [ASSURED] mark=0 use=2
> udp 17 47 src=192.168.1.128 dst=8.8.8.8 sport=49717 dport=53
src=8.8.8.8 dst=192.168.1.128 sport=53 dport=49717 [ASSURED] mark=0 use=2
> udp 17 60 src=192.168.1.128 dst=8.8.8.8 sport=40745 dport=53
src=8.8.8.8 dst=192.168.1.128 sport=53 dport=40745 [ASSURED] mark=0 use=2
> udp 17 35 src=192.168.1.128 dst=8.8.8.8 sport=56320 dport=53
src=8.8.8.8 dst=192.168.1.128 sport=53 dport=56320 [ASSURED] mark=0 use=2
> udp 17 34 src=192.168.1.128 dst=8.8.8.8 sport=57200 dport=53
src=8.8.8.8 dst=192.168.1.128 sport=53 dport=57200 [ASSURED] mark=0 use=2
> udp 17 34 src=192.168.1.128 dst=8.8.8.8 sport=38250 dport=53
src=8.8.8.8 dst=192.168.1.128 sport=53 dport=38250 [ASSURED] mark=0 use=2
>
> IP Configuration
>
> 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group
default
> inet 127.0.0.1/8 scope host lo
> valid_lft forever preferred_lft forever
> 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state
UP group default qlen 1000
> inet 10.1.3.1/24 brd 10.1.3.255 scope global eth0
> valid_lft forever preferred_lft forever
> 3: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP
group default qlen 1000
> inet 192.168.1.128/24 brd 192.168.1.255 scope global wlan0
> valid_lft forever preferred_lft forever
> 14: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc
fq_codel state UNKNOWN group default qlen 100
> inet 10.0.8.4/24 brd 10.0.8.255 scope global tun0
> valid_lft forever preferred_lft forever
>
> IP Stats
>
> 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode
DEFAULT group default
> link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
> RX: bytes packets errors dropped overrun mcast
> 2088685 23936 0 0 0 0
> TX: bytes packets errors dropped carrier collsns
> 2088685 23936 0 0 0 0
> 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state
UP mode DEFAULT group default qlen 1000
> link/ether b8:27:eb:85:6d:c7 brd ff:ff:ff:ff:ff:ff
> RX: bytes packets errors dropped overrun mcast
> 1347876 17666 0 17533 0 0
> TX: bytes packets errors dropped carrier collsns
> 16669 238 0 0 0 0
> 3: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP
mode DORMANT group default qlen 1000
> link/ether 40:a5:ef:03:0c:09 brd ff:ff:ff:ff:ff:ff
> RX: bytes packets errors dropped overrun mcast
> 500782585 632015 0 1728480 0 0
> TX: bytes packets errors dropped carrier collsns
> 63799000 475756 0 1 0 0
> 14: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc
fq_codel state UNKNOWN mode DEFAULT group default qlen 100
> link/none
> RX: bytes packets errors dropped overrun mcast
> 2373469 37288 0 0 0 0
> TX: bytes packets errors dropped carrier collsns
> 3120873 33949 0 180 0 0
>
> Routing Rules
>
> 0: from all lookup local
> 32766: from all lookup main
> 32767: from all lookup default
>
> Table default:
>
>
> Table local:
>
> local 192.168.1.128 dev wlan0 proto kernel scope host src 192.168.1.128
> local 127.0.0.1 dev lo proto kernel scope host src 127.0.0.1
> local 10.1.3.1 dev eth0 proto kernel scope host src 10.1.3.1
> local 10.0.8.4 dev tun0 proto kernel scope host src 10.0.8.4
> broadcast 192.168.1.255 dev wlan0 proto kernel scope link src
192.168.1.128
> broadcast 192.168.1.0 dev wlan0 proto kernel scope link src 192.168.1.128
> broadcast 127.255.255.255 dev lo proto kernel scope link src 127.0.0.1
> broadcast 127.0.0.0 dev lo proto kernel scope link src 127.0.0.1
> broadcast 10.1.3.255 dev eth0 proto kernel scope link src 10.1.3.1
> broadcast 10.1.3.0 dev eth0 proto kernel scope link src 10.1.3.1
> broadcast 10.0.8.255 dev tun0 proto kernel scope link src 10.0.8.4
> broadcast 10.0.8.0 dev tun0 proto kernel scope link src 10.0.8.4
> local 127.0.0.0/8 dev lo proto kernel scope host src 127.0.0.1
>
> Table main:
>
> 192.168.1.0/24 dev wlan0 proto kernel scope link src 192.168.1.128 metric
303
> 10.1.3.0/24 dev eth0 proto kernel scope link src 10.1.3.1
> 10.1.1.0/24 via 10.0.8.1 dev tun0
> 10.0.8.0/24 dev tun0 proto kernel scope link src 10.0.8.4
> default via 192.168.1.1 dev wlan0 src 192.168.1.128 metric 303
>
> Per-IP Counters
>
> iptaccount is not installed
>
> NF Accounting
>
> No NF Accounting defined (nfacct not found)
>
> Events
>
>
> /proc
>
> /proc/version = Linux version 4.1.19-5-ARCH (builduser@leming) (gcc
version 5.3.0 (GCC) ) #1 SMP Tue Mar 15 19:59:28 MDT 2016
> /proc/sys/net/ipv4/ip_forward = 1
> /proc/sys/net/ipv4/icmp_echo_ignore_all = 0
> /proc/sys/net/ipv4/conf/all/proxy_arp = 0
> /proc/sys/net/ipv4/conf/all/arp_filter = 0
> /proc/sys/net/ipv4/conf/all/arp_ignore = 0
> /proc/sys/net/ipv4/conf/all/rp_filter = 0
> /proc/sys/net/ipv4/conf/all/log_martians = 0
> /proc/sys/net/ipv4/conf/default/proxy_arp = 0
> /proc/sys/net/ipv4/conf/default/arp_filter = 0
> /proc/sys/net/ipv4/conf/default/arp_ignore = 0
> /proc/sys/net/ipv4/conf/default/rp_filter = 0
> /proc/sys/net/ipv4/conf/default/log_martians = 1
> /proc/sys/net/ipv4/conf/eth0/proxy_arp = 0
> /proc/sys/net/ipv4/conf/eth0/arp_filter = 0
> /proc/sys/net/ipv4/conf/eth0/arp_ignore = 0
> /proc/sys/net/ipv4/conf/eth0/rp_filter = 1
> /proc/sys/net/ipv4/conf/eth0/log_martians = 1
> /proc/sys/net/ipv4/conf/lo/proxy_arp = 0
> /proc/sys/net/ipv4/conf/lo/arp_filter = 0
> /proc/sys/net/ipv4/conf/lo/arp_ignore = 0
> /proc/sys/net/ipv4/conf/lo/rp_filter = 0
> /proc/sys/net/ipv4/conf/lo/log_martians = 1
> /proc/sys/net/ipv4/conf/tun0/proxy_arp = 0
> /proc/sys/net/ipv4/conf/tun0/arp_filter = 0
> /proc/sys/net/ipv4/conf/tun0/arp_ignore = 0
> /proc/sys/net/ipv4/conf/tun0/rp_filter = 1
> /proc/sys/net/ipv4/conf/tun0/log_martians = 1
> /proc/sys/net/ipv4/conf/wlan0/proxy_arp = 0
> /proc/sys/net/ipv4/conf/wlan0/arp_filter = 0
> /proc/sys/net/ipv4/conf/wlan0/arp_ignore = 0
> /proc/sys/net/ipv4/conf/wlan0/rp_filter = 1
> /proc/sys/net/ipv4/conf/wlan0/log_martians = 1
>
> ARP
>
> ? (192.168.1.131) at cc:3a:61:69:75:4b [ether] on wlan0
> ? (192.168.1.1) at d8:b6:b7:02:90:aa [ether] on wlan0
> ? (10.1.3.2) at 00:50:c2:09:2f:19 [ether] on eth0
>
> Modules
>
> ip_tables 12167 4
iptable_filter,iptable_mangle,iptable_nat,iptable_raw
> ipt_MASQUERADE 1047 1
> ipt_REJECT 1395 4
> ipt_rpfilter 1776 0
> iptable_filter 1541 1
> iptable_mangle 1548 1
> iptable_nat 1632 1
> iptable_raw 1339 1
> nf_conntrack 99551 21
xt_CT,nf_conntrack_netbios_ns,nf_conntrack_proto_gre,xt_helper,nf_nat,xt_connlimit,nf_nat_ipv4,xt_conntrack,nf_conntrack_amanda,nf_nat_masquerade_ipv4,nf_conntrack_broadcast,xt_connmark,nf_conntrack_ftp,nf_conntrack_irc,nf_conntrack_sip,nf_conntrack_h323,nf_conntrack_ipv4,nf_conntrack_pptp,nf_conntrack_sane,nf_conntrack_snmp,nf_conntrack_tftp
> nf_conntrack_amanda 2736 2
> nf_conntrack_broadcast 1243 2
nf_conntrack_netbios_ns,nf_conntrack_snmp
> nf_conntrack_ftp 6757 2
> nf_conntrack_h323 45920 4
> nf_conntrack_ipv4 13517 41
> nf_conntrack_irc 4273 2
> nf_conntrack_netbios_ns 1206 2
> nf_conntrack_pptp 5153 2
> nf_conntrack_proto_gre 4393 1 nf_conntrack_pptp
> nf_conntrack_sane 3866 2
> nf_conntrack_sip 21331 2
> nf_conntrack_snmp 1588 2
> nf_conntrack_tftp 3732 2
> nf_defrag_ipv4 1597 2 xt_TPROXY,nf_conntrack_ipv4
> nf_defrag_ipv6 14975 1 xt_TPROXY
> nf_log_common 4109 1 nf_log_ipv4
> nf_log_ipv4 4566 6
> nf_nat 15211 3 nf_nat_ipv4,xt_nat,nf_nat_masquerade_ipv4
> nf_nat_ipv4 5473 1 iptable_nat
> nf_nat_masquerade_ipv4 2733 1 ipt_MASQUERADE
> nf_reject_ipv4 3031 1 ipt_REJECT
> xt_CHECKSUM 1177 0
> xt_CLASSIFY 954 0
> xt_CT 4047 22
> xt_DSCP 1872 0
> xt_LOG 1240 6
> xt_NFLOG 1052 0
> xt_NFQUEUE 2484 0
> xt_TCPMSS 3106 1
> xt_TPROXY 4709 0
> xt_addrtype 2691 5
> xt_comment 863 18
> xt_connlimit 5311 0
> xt_connmark 1670 0
> xt_conntrack 2947 18
> xt_dscp 1536 0
> xt_hashlimit 8186 0
> xt_helper 1270 0
> xt_iprange 1496 0
> xt_length 1119 0
> xt_mark 1082 1
> xt_multiport 1676 4
> xt_nat 1636 2
> xt_owner 1285 0
> xt_physdev 1752 0
> xt_pkttype 1003 0
> xt_policy 2540 0
> xt_realm 905 0
> xt_recent 8646 1
> xt_statistic 1274 0
> xt_tcpmss 1328 0
> xt_tcpudp 2130 45
> xt_time 2277 0
>
> Shorewall has detected the following iptables/netfilter capabilities:
> ACCOUNT Target (ACCOUNT_TARGET): Not available
> AUDIT Target (AUDIT_TARGET): Not available
> Address Type Match (ADDRTYPE): Available
> Amanda Helper: Available
> Arptables JF (ARPTABLESJF): Not available
> Basic Ematch (BASIC_EMATCH): Available
> Basic Filter (BASIC_FILTER): Available
> CLASSIFY Target (CLASSIFY_TARGET): Available
> CONNMARK Target (CONNMARK): Available
> CT Target (CT_TARGET): Available
> Capabilities Version (CAPVERSION): 50004
> Checksum Target (CHECKSUM_TARGET): Available
> Comments (COMMENTS): Available
> Condition Match (CONDITION_MATCH): Not available
> Connection Tracking Match (CONNTRACK_MATCH): Available
> Connlimit Match (CONNLIMIT_MATCH): Available
> Connmark Match (CONNMARK_MATCH): Available
> DSCP Match (DSCP_MATCH): Available
> DSCP Target (DSCP_TARGET): Available
> Enhanced Multi-port Match (EMULIPORT): Available
> Extended CONNMARK Target (XCONNMARK): Available
> Extended Connection Tracking Match Support (NEW_CONNTRACK_MATCH):
Available
> Extended Connmark Match (XCONNMARK_MATCH): Available
> Extended MARK Target (XMARK): Available
> Extended MARK Target 2 (EXMARK): Available
> Extended Multi-port Match (XMULIPORT): Available
> Extended REJECT (ENHANCED_REJECT): Available
> FLOW Classifier (FLOW_FILTER): Available
> FTP Helper: Available
> FTP-0 Helper: Not available
> Geo IP Match (GEOIP_MATCH): Not available
> Goto Support (GOTO_TARGET): Available
> H323 Helper: Available
> Hashlimit Match (HASHLIMIT_MATCH): Available
> Header Match (HEADER_MATCH): Not available
> Helper Match (HELPER_MATCH): Available
> IMQ Target (IMQ_TARGET): Not available
> IP range Match(IPRANGE_MATCH): Available
> IPMARK Target (IPMARK_TARGET): Not available
> IPP2P Match (IPP2P_MATCH): Not available
> IRC Helper: Available
> IRC-0 Helper: Not available
> Iface Match (IFACE_MATCH): Not available
> Kernel Version (KERNELVERSION): 40119
> LOG Target (LOG_TARGET): Available
> LOGMARK Target (LOGMARK_TARGET): Not available
> MARK Target (MARK): Available
> MASQUERADE Target (MASQUERADE_TGT): Available
> Mangle FORWARD Chain (MANGLE_FORWARD): Available
> Mark in the filter table (MARK_ANYWHERE): Available
> Multi-port Match (MULTIPORT): Available
> NAT (NAT_ENABLED): Available
> NFAcct Match: Not available
> NFLOG Target (NFLOG_TARGET): Available
> NFQUEUE Target (NFQUEUE_TARGET): Available
> Netbios_ns Helper: Available
> New tos Match (NEW_TOS_MATCH): Available
> Owner Match (OWNER_MATCH): Available
> Owner Name Match (OWNER_NAME_MATCH): Available
> PPTP Helper: Available
> Packet Mangling (MANGLE_ENABLED): Available
> Packet Type Match (USEPKTTYPE): Available
> Packet length Match (LENGTH_MATCH): Available
> Persistent SNAT (PERSISTENT_SNAT): Available
> Physdev Match (PHYSDEV_MATCH): Available
> Physdev-is-bridged Support (PHYSDEV_BRIDGE): Available
> Policy Match (POLICY_MATCH): Available
> RPFilter Match (RPFILTER_MATCH): Available
> Raw Table (RAW_TABLE): Available
> Rawpost Table (RAWPOST_TABLE): Not available
> Realm Match (REALM_MATCH): Available
> Recent Match "--reap" option (REAP_OPTION): Available
> Recent Match (RECENT_MATCH): Available
> Repeat match (KLUDGEFREE): Available
> SANE Helper: Available
> SANE-0 Helper: Not available
> SIP Helper: Available
> SIP-0 Helper: Not available
> SNMP Helper: Available
> Statistic Match (STATISTIC_MATCH): Available
> TARPIT Target (TARPIT_TARGET): Not available
> TCPMSS Match (TCPMSS_MATCH): Available
> TCPMSS Target (TCPMSS_TARGET): Available
> TFTP Helper: Available
> TFTP-0 Helper: Not available
> TPROXY Target (TPROXY_TARGET): Available
> Time Match (TIME_MATCH): Available
> UDPLITE Port Redirection (UDPLITEREDIRECT): Not available
> ULOG Target (ULOG_TARGET): Not available
> fwmark route mask (FWMARK_RT_MASK): Available
> ipset V5 (IPSET_V5): Not available
> iptables --wait option (WAIT_OPTION): Available
> iptables -S (IPTABLES_S): Available
>
> Netid State Recv-Q Send-Q Local Address:Port Peer
Address:Port
> tcp LISTEN 0 128 *:5355
*:* users:(("systemd-resolve",pid=320,fd=15))
> tcp LISTEN 0 5 *:53
*:* users:(("dnsmasq",pid=326,fd=7))
> tcp LISTEN 0 128 *:22
*:* users:(("sshd",pid=321,fd=3))
> tcp ESTAB 0 5748 10.0.8.4:22 10.0.8.2:42786
users:(("sshd",pid=9688,fd=3))
> tcp TIME-WAIT 0 0 192.168.1.128:46058
107.6.170.212:80
> tcp ESTAB 0 0 10.0.8.4:22 10.0.8.2:50492
users:(("sshd",pid=10821,fd=3))
>
> Traffic Control
>
> Device eth0:
> qdisc fq_codel 0: root refcnt 2 limit 10240p flows 1024 quantum 1526
target 5.0ms interval 100.0ms ecn
> Sent 14693 bytes 238 pkt (dropped 0, overlimits 0 requeues 0)
> backlog 0b 0p requeues 0
> maxpacket 0 drop_overlimit 0 new_flow_count 0 ecn_mark 0
> new_flows_len 0 old_flows_len 0
>
>
> Device wlan0:
> qdisc mq 0: root
> Sent 50503698 bytes 475803 pkt (dropped 0, overlimits 0 requeues 0)
> backlog 0b 0p requeues 0
> qdisc fq_codel 0: parent :1 limit 10240p flows 1024 quantum 1514 target
5.0ms interval 100.0ms ecn
> Sent 23934 bytes 176 pkt (dropped 0, overlimits 0 requeues 0)
> backlog 0b 0p requeues 0
> maxpacket 0 drop_overlimit 0 new_flow_count 0 ecn_mark 0
> new_flows_len 0 old_flows_len 0
> qdisc fq_codel 0: parent :2 limit 10240p flows 1024 quantum 1514 target
5.0ms interval 100.0ms ecn
> Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
> backlog 0b 0p requeues 0
> maxpacket 0 drop_overlimit 0 new_flow_count 0 ecn_mark 0
> new_flows_len 0 old_flows_len 0
> qdisc fq_codel 0: parent :3 limit 10240p flows 1024 quantum 1514 target
5.0ms interval 100.0ms ecn
> Sent 50479764 bytes 475627 pkt (dropped 0, overlimits 0 requeues 0)
> backlog 0b 0p requeues 0
> maxpacket 319 drop_overlimit 0 new_flow_count 7 ecn_mark 0
> new_flows_len 1 old_flows_len 0
> qdisc fq_codel 0: parent :4 limit 10240p flows 1024 quantum 1514 target
5.0ms interval 100.0ms ecn
> Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
> backlog 0b 0p requeues 0
> maxpacket 0 drop_overlimit 0 new_flow_count 0 ecn_mark 0
> new_flows_len 0 old_flows_len 0
>
> class mq :1 root
> Sent 23934 bytes 176 pkt (dropped 0, overlimits 0 requeues 0)
> backlog 0b 0p requeues 0
> class mq :2 root
> Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
> backlog 0b 0p requeues 0
> class mq :3 root
> Sent 50479764 bytes 475627 pkt (dropped 0, overlimits 0 requeues 0)
> backlog 0b 0p requeues 0
> class mq :4 root
> Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
> backlog 0b 0p requeues 0
> class fq_codel :3cc parent none
> (dropped 0, overlimits 0 requeues 0)
> backlog 0b 0p requeues 0
> deficit 1387 count 0 lastcount 0 ldelay 5us
>
> Device tun0:
> qdisc fq_codel 0: root refcnt 2 limit 10240p flows 1024 quantum 1500
target 5.0ms interval 100.0ms ecn
> Sent 3164781 bytes 34175 pkt (dropped 0, overlimits 0 requeues 0)
> backlog 0b 0p requeues 0
> maxpacket 0 drop_overlimit 0 new_flow_count 0 ecn_mark 0
> new_flows_len 0 old_flows_len 0
>
>
>
> TC Filters
>
> Device eth0:
>
> Device wlan0:
>
> Device tun0:
>
>
> --
> Eduard Vidal i Tulsà
------------------------------------------------------------------------------
Find and fix application performance issues faster with Applications Manager
Applications Manager provides deep performance insights into multiple tiers of
your business applications. It resolves application problems quickly and
reduces your MTTR. Get your free trial!
https://ad.doubleclick.net/ddm/clk/302982198;130105516;z
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users