> I have a remote location and acces via vpn without problems
> even i can conect a localmachine using dnat, for conect her
> but i wanna connect to router for acces to him but it dont work
>
> rules
> ?SECTION ALL
> ?SECTION ESTABLISHED
> ?SECTION RELATED
> ?SECTION INVALID
> ?SECTION UNTRACKED
> ?SECTION NEW
>
> Invalid(DROP)   net             all             tcp
> DNS(ACCEPT)     $FW             net
> SSH(ACCEPT)     loc             $FW
> SSH(ACCEPT)     vpn             $FW
>
> Ping(ACCEPT)    loc             $FW
>
>
> Ping(DROP)      net             $FW
>
> ACCEPT          $FW             loc             icmp
> ACCEPT          $FW             net             icmp
> ACCEPT          vpn             all     all
> DNS(ACCEPT)     loc              $FW
> SSH(ACCEPT)     net             $FW         TCP
>
> DNAT            vpn             loc:10.1.3.2 tcp 6000 #this work
> DNAT            vpn             net:192.168.1.1 tcp 80 - &tun0  # this
not work
> (end of rules)
> from a remote localtion i get this
> nmap 10.0.8.4 # (vpn adress)
>
> Starting Nmap 7.12 ( https://nmap.org ) at 2016-04-21 10:18 CEST
> Nmap scan report for 10.0.8.4
> Host is up (0.17s latency).
> Not shown: 996 closed ports
> PORT     STATE    SERVICE
> 22/tcp   open     ssh
> 53/tcp   open     domain
> 80/tcp   filtered http
> 6000/tcp open     X11
>
> Nmap done: 1 IP address (1 host up) scanned in 13.33 seconds
>
>
> this is my shorewall dump
>
>
> Shorewall 5.0.4 Dump at figueres - Thu Apr 21 08:38:17 UTC 2016
>
> Shorewall is running
> State:Started (Thu Apr 21 08:16:32 UTC 2016) from /etc/shorewall/
(/var/lib/shorewall/firewall compiled by Shorewall version 5.0.4)
>
> Counters reset Thu Apr 21 08:16:32 UTC 2016
>
> Chain INPUT (policy DROP 0 packets, 0 bytes)
>  pkts bytes target     prot opt in     out     source
destination
> 35155   45M net-fw     all  --  wlan0  *       0.0.0.0/0
0.0.0.0/0
>     0     0 ~comb0     all  --  eth0   *       0.0.0.0/0
0.0.0.0/0
>  4422  265K ~comb0     all  --  tun0   *       0.0.0.0/0
0.0.0.0/0
>  1654  148K ACCEPT     all  --  lo     *       0.0.0.0/0
0.0.0.0/0
>     0     0 Reject     all  --  *      *       0.0.0.0/0
0.0.0.0/0
>     0     0 LOG        all  --  *      *       0.0.0.0/0
0.0.0.0/0            LOG flags 0 level 6 prefix "Shorewall:INPUT:REJECT:"
>     0     0 reject     all  --  *      *       0.0.0.0/0
0.0.0.0/0           [goto]
>
> Chain FORWARD (policy DROP 0 packets, 0 bytes)
>  pkts bytes target     prot opt in     out     source
destination
>    23  1316 TCPMSS     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp flags:0x06/0x02 TCPMSS clamp to PMTU
>     0     0 net_frwd   all  --  wlan0  *       0.0.0.0/0
0.0.0.0/0
>     4   176 loc_frwd   all  --  eth0   *       0.0.0.0/0
0.0.0.0/0
>    25  1380 vpn_frwd   all  --  tun0   *       0.0.0.0/0
0.0.0.0/0
>     0     0 Reject     all  --  *      *       0.0.0.0/0
0.0.0.0/0
>     0     0 LOG        all  --  *      *       0.0.0.0/0
0.0.0.0/0            LOG flags 0 level 6 prefix "Shorewall:FORWARD:REJECT:"
>     0     0 reject     all  --  *      *       0.0.0.0/0
0.0.0.0/0           [goto]
>
> Chain OUTPUT (policy ACCEPT 13731 packets, 1423K bytes)
>  pkts bytes target     prot opt in     out     source
destination
>
> Chain Broadcast (2 references)
>  pkts bytes target     prot opt in     out     source
destination
>     4   974 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0            ADDRTYPE match dst-type BROADCAST
>     0     0 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0            ADDRTYPE match dst-type MULTICAST
>     0     0 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0            ADDRTYPE match dst-type ANYCAST
>
> Chain Drop (2 references)
>  pkts bytes target     prot opt in     out     source
destination
>     4   974            all  --  *      *       0.0.0.0/0
0.0.0.0/0
>     4   974 Broadcast  all  --  *      *       0.0.0.0/0
0.0.0.0/0
>     0     0 ACCEPT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0            icmptype 3 code 4 /* Needed ICMP types */
>     0     0 ACCEPT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0            icmptype 11 /* Needed ICMP types */
>     0     0 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate INVALID
>     0     0 DROP       udp  --  *      *       0.0.0.0/0
0.0.0.0/0            multiport dports 135,445 /* SMB */
>     0     0 DROP       udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpts:137:139 /* SMB */
>     0     0 DROP       udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp spt:137 dpts:1024:65535 /* SMB */
>     0     0 DROP       tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            multiport dports 135,139,445 /* SMB */
>     0     0 DROP       udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:1900 /* UPnP */
>     0     0 DROP       tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp flags:!0x17/0x02
>     0     0 DROP       udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp spt:53 /* Late DNS Replies */
>
> Chain Reject (2 references)
>  pkts bytes target     prot opt in     out     source
destination
>     0     0            all  --  *      *       0.0.0.0/0
0.0.0.0/0
>     0     0 Broadcast  all  --  *      *       0.0.0.0/0
0.0.0.0/0
>     0     0 ACCEPT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0            icmptype 3 code 4 /* Needed ICMP types */
>     0     0 ACCEPT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0            icmptype 11 /* Needed ICMP types */
>     0     0 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate INVALID
>     0     0 reject     udp  --  *      *       0.0.0.0/0
0.0.0.0/0            multiport dports 135,445 /* SMB */
>     0     0 reject     udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpts:137:139 /* SMB */
>     0     0 reject     udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp spt:137 dpts:1024:65535 /* SMB */
>     0     0 reject     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            multiport dports 135,139,445 /* SMB */
>     0     0 DROP       udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:1900 /* UPnP */
>     0     0 DROP       tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp flags:!0x17/0x02
>     0     0 DROP       udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp spt:53 /* Late DNS Replies */
>
> Chain dynamic (5 references)
>  pkts bytes target     prot opt in     out     source
destination
>
> Chain loc_frwd (1 references)
>  pkts bytes target     prot opt in     out     source
destination
>     0     0 dynamic    all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate INVALID,NEW,UNTRACKED
>     0     0 smurfs     all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate INVALID,NEW,UNTRACKED
>     4   176 tcpflags   tcp  --  *      *       0.0.0.0/0
0.0.0.0/0
>     0     0 ACCEPT     all  --  *      wlan0   0.0.0.0/0
0.0.0.0/0
>     4   176 ACCEPT     all  --  *      tun0    0.0.0.0/0
0.0.0.0/0
>
> Chain logdrop (0 references)
>  pkts bytes target     prot opt in     out     source
destination
>     0     0 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0
>
> Chain logflags (7 references)
>  pkts bytes target     prot opt in     out     source
destination
>     0     0 LOG        all  --  *      *       0.0.0.0/0
0.0.0.0/0            LOG flags 4 level 6 prefix "Shorewall:logflags:DROP:"
>     0     0 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0
>
> Chain logreject (0 references)
>  pkts bytes target     prot opt in     out     source
destination
>     0     0 reject     all  --  *      *       0.0.0.0/0
0.0.0.0/0
>
> Chain net-fw (1 references)
>  pkts bytes target     prot opt in     out     source
destination
>    16  1454 dynamic    all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate INVALID,NEW,UNTRACKED
>    16  1454 smurfs     all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate INVALID,NEW,UNTRACKED
>     0     0 ACCEPT     udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpts:67:68
> 30582   45M tcpflags   tcp  --  *      *       0.0.0.0/0
0.0.0.0/0
> 35139   45M ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate RELATED,ESTABLISHED
>    12   480 DROP       tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate INVALID
>     0     0 DROP       icmp --  *      *       0.0.0.0/0
0.0.0.0/0            icmptype 8 /* Ping */
>     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp dpt:22 /* SSH */
>     4   974 Drop       all  --  *      *       0.0.0.0/0
0.0.0.0/0
>     0     0 LOG        all  --  *      *       0.0.0.0/0
0.0.0.0/0            LOG flags 0 level 6 prefix "Shorewall:net-fw:DROP:"
>     0     0 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0
>
> Chain net-loc (1 references)
>  pkts bytes target     prot opt in     out     source
destination
>     0     0 ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate RELATED,ESTABLISHED
>     0     0 DROP       tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate INVALID
>     0     0 Drop       all  --  *      *       0.0.0.0/0
0.0.0.0/0
>     0     0 LOG        all  --  *      *       0.0.0.0/0
0.0.0.0/0            LOG flags 0 level 6 prefix "Shorewall:net-loc:DROP:"
>     0     0 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0
>
> Chain net-vpn (1 references)
>  pkts bytes target     prot opt in     out     source
destination
>     0     0 ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate RELATED,ESTABLISHED
>     0     0 DROP       tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate INVALID
>     0     0 ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0
>
> Chain net_frwd (1 references)
>  pkts bytes target     prot opt in     out     source
destination
>     0     0 dynamic    all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate INVALID,NEW,UNTRACKED
>     0     0 smurfs     all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate INVALID,NEW,UNTRACKED
>     0     0 tcpflags   tcp  --  *      *       0.0.0.0/0
0.0.0.0/0
>     0     0 net-loc    all  --  *      eth0    0.0.0.0/0
0.0.0.0/0
>     0     0 net-vpn    all  --  *      tun0    0.0.0.0/0
0.0.0.0/0
>
> Chain reject (7 references)
>  pkts bytes target     prot opt in     out     source
destination
>     0     0 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0            ADDRTYPE match src-type BROADCAST
>     0     0 DROP       all  --  *      *       224.0.0.0/4
0.0.0.0/0
>     0     0 DROP       2    --  *      *       0.0.0.0/0
0.0.0.0/0
>     0     0 REJECT     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            reject-with tcp-reset
>     0     0 REJECT     udp  --  *      *       0.0.0.0/0
0.0.0.0/0            reject-with icmp-port-unreachable
>     0     0 REJECT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0            reject-with icmp-host-unreachable
>     0     0 REJECT     all  --  *      *       0.0.0.0/0
0.0.0.0/0            reject-with icmp-host-prohibited
>
> Chain sha-lh-5228655fddc23881908d (0 references)
>  pkts bytes target     prot opt in     out     source
destination
>
> Chain sha-rh-1b095798417d2c7f6fc5 (0 references)
>  pkts bytes target     prot opt in     out     source
destination
>
> Chain shorewall (0 references)
>  pkts bytes target     prot opt in     out     source
destination
>     0     0            all  --  *      *       0.0.0.0/0
0.0.0.0/0            recent: SET name: %CURRENTTIME side: source mask:
255.255.255.255
>
> Chain smurflog (2 references)
>  pkts bytes target     prot opt in     out     source
destination
>     0     0 LOG        all  --  *      *       0.0.0.0/0
0.0.0.0/0            LOG flags 0 level 6 prefix "Shorewall:smurfs:DROP:"
>     0     0 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0
>
> Chain smurfs (5 references)
>  pkts bytes target     prot opt in     out     source
destination
>     0     0 RETURN     all  --  *      *       0.0.0.0
0.0.0.0/0
>     0     0 smurflog   all  --  *      *       0.0.0.0/0
0.0.0.0/0           [goto]  ADDRTYPE match src-type BROADCAST
>     0     0 smurflog   all  --  *      *       224.0.0.0/4
0.0.0.0/0           [goto]
>
> Chain tcpflags (5 references)
>  pkts bytes target     prot opt in     out     source
destination
>     0     0 logflags   tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           [goto]  tcp flags:0x3F/0x29
>     0     0 logflags   tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           [goto]  tcp flags:0x3F/0x00
>     0     0 logflags   tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           [goto]  tcp flags:0x06/0x06
>     0     0 logflags   tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           [goto]  tcp flags:0x05/0x05
>     0     0 logflags   tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           [goto]  tcp flags:0x03/0x03
>     0     0 logflags   tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           [goto]  tcp flags:0x19/0x09
>     0     0 logflags   tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           [goto]  tcp spt:0 flags:0x17/0x02
>
> Chain vpn_frwd (1 references)
>  pkts bytes target     prot opt in     out     source
destination
>    19  1140 dynamic    all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate INVALID,NEW,UNTRACKED
>    19  1140 smurfs     all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate INVALID,NEW,UNTRACKED
>    25  1380 tcpflags   tcp  --  *      *       0.0.0.0/0
0.0.0.0/0
>    15   900 ACCEPT     all  --  *      wlan0   0.0.0.0/0
0.0.0.0/0
>    10   480 ACCEPT     all  --  *      eth0    0.0.0.0/0
0.0.0.0/0
>
> Chain ~comb0 (2 references)
>  pkts bytes target     prot opt in     out     source
destination
>  2198  132K dynamic    all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate INVALID,NEW,UNTRACKED
>  2198  132K smurfs     all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate INVALID,NEW,UNTRACKED
>     0     0 ACCEPT     udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpts:67:68
>  4422  265K tcpflags   tcp  --  *      *       0.0.0.0/0
0.0.0.0/0
>  4422  265K ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0
>
> Log (/var/log/shorewall)
>
>
> NAT Table
>
> Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)
>  pkts bytes target     prot opt in     out     source
destination
>  2214  133K vpn_dnat   all  --  tun0   *       0.0.0.0/0
0.0.0.0/0
>
> Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
>  pkts bytes target     prot opt in     out     source
destination
>
> Chain OUTPUT (policy ACCEPT 60 packets, 3853 bytes)
>  pkts bytes target     prot opt in     out     source
destination
>
> Chain POSTROUTING (policy ACCEPT 60 packets, 3853 bytes)
>  pkts bytes target     prot opt in     out     source
destination
>     0     0 MASQUERADE  all  --  *      wlan0   10.1.3.0/24
0.0.0.0/0
>
> Chain vpn_dnat (1 references)
>  pkts bytes target     prot opt in     out     source
destination
>     4   240 DNAT       tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp dpt:6000 to:10.1.3.2
>    12   720 DNAT       tcp  --  *      *       0.0.0.0/0
10.0.8.4             tcp dpt:80 to:192.168.1.1
>
> Mangle Table
>
> Chain PREROUTING (policy ACCEPT 17398 packets, 21M bytes)
>  pkts bytes target     prot opt in     out     source
destination
>
> Chain INPUT (policy ACCEPT 17398 packets, 21M bytes)
>  pkts bytes target     prot opt in     out     source
destination
>
> Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
>  pkts bytes target     prot opt in     out     source
destination
>    29  1556 MARK       all  --  *      *       0.0.0.0/0
0.0.0.0/0            MARK and 0xffffff00
>
> Chain OUTPUT (policy ACCEPT 13787 packets, 1455K bytes)
>  pkts bytes target     prot opt in     out     source
destination
>
> Chain POSTROUTING (policy ACCEPT 13787 packets, 1455K bytes)
>  pkts bytes target     prot opt in     out     source
destination
>
> Raw Table
>
> Chain PREROUTING (policy ACCEPT 17380 packets, 21M bytes)
>  pkts bytes target     prot opt in     out     source
destination
>     0     0 CT         udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:10080 CT helper amanda
>     2   120 CT         tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp dpt:21 CT helper ftp
>     0     0 CT         udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:1719 CT helper RAS
>     2   120 CT         tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp dpt:1720 CT helper Q.931
>     2   120 CT         tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp dpt:6667 CT helper irc
>     0     0 CT         udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:137 CT helper netbios-ns
>     2   120 CT         tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp dpt:1723 CT helper pptp
>     2   120 CT         tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp dpt:6566 CT helper sane
>     0     0 CT         udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:5060 CT helper sip
>     0     0 CT         udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:161 CT helper snmp
>     0     0 CT         udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:69 CT helper tftp
>
> Chain OUTPUT (policy ACCEPT 13775 packets, 1451K bytes)
>  pkts bytes target     prot opt in     out     source
destination
>     0     0 CT         udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:10080 CT helper amanda
>     0     0 CT         tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp dpt:21 CT helper ftp
>     0     0 CT         udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:1719 CT helper RAS
>     0     0 CT         tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp dpt:1720 CT helper Q.931
>     0     0 CT         tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp dpt:6667 CT helper irc
>     0     0 CT         udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:137 CT helper netbios-ns
>     0     0 CT         tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp dpt:1723 CT helper pptp
>     0     0 CT         tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp dpt:6566 CT helper sane
>     0     0 CT         udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:5060 CT helper sip
>     0     0 CT         udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:161 CT helper snmp
>     0     0 CT         udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:69 CT helper tftp
>
> Conntrack Table (42 out of 59048)
>
> udp      17 34 src=192.168.1.128 dst=8.8.4.4 sport=51096 dport=53
src=8.8.4.4 dst=192.168.1.128 sport=53 dport=51096 [ASSURED] mark=0 use=2
> tcp      6 82115 ESTABLISHED src=10.0.8.5 dst=10.0.8.2 sport=53600
dport=22 src=10.0.8.2 dst=10.0.8.5 sport=22 dport=53600 [ASSURED] mark=0
use=2
> udp      17 35 src=192.168.1.128 dst=8.8.4.4 sport=46085 dport=53
src=8.8.4.4 dst=192.168.1.128 sport=53 dport=46085 [ASSURED] mark=0 use=2
> udp      17 34 src=192.168.1.128 dst=8.8.8.8 sport=52008 dport=53
src=8.8.8.8 dst=192.168.1.128 sport=53 dport=52008 [ASSURED] mark=0 use=2
> tcp      6 96 TIME_WAIT src=192.168.1.128 dst=107.6.170.212 sport=46058
dport=80 src=107.6.170.212 dst=192.168.1.128 sport=80 dport=46058 [ASSURED]
mark=0 use=2
> tcp      6 431976 ESTABLISHED src=10.0.8.2 dst=10.0.8.4 sport=50492
dport=22 src=10.0.8.4 dst=10.0.8.2 sport=22 dport=50492 [ASSURED] mark=0
use=2
> udp      17 35 src=192.168.1.128 dst=8.8.8.8 sport=50537 dport=53
src=8.8.8.8 dst=192.168.1.128 sport=53 dport=50537 [ASSURED] mark=0 use=2
> udp      17 34 src=192.168.1.128 dst=8.8.8.8 sport=57981 dport=53
src=8.8.8.8 dst=192.168.1.128 sport=53 dport=57981 [ASSURED] mark=0 use=2
> udp      17 56 src=192.168.1.128 dst=8.8.8.8 sport=39412 dport=53
src=8.8.8.8 dst=192.168.1.128 sport=53 dport=39412 [ASSURED] mark=0 use=2
> udp      17 34 src=192.168.1.128 dst=8.8.4.4 sport=57759 dport=53
src=8.8.4.4 dst=192.168.1.128 sport=53 dport=57759 [ASSURED] mark=0 use=2
> udp      17 156 src=192.168.1.128 dst=8.8.8.8 sport=45573 dport=53
src=8.8.8.8 dst=192.168.1.128 sport=53 dport=45573 [ASSURED] mark=0 use=2
> tcp      6 299 ESTABLISHED src=10.0.8.2 dst=10.0.8.4 sport=42786 dport=22
src=10.0.8.4 dst=10.0.8.2 sport=22 dport=42786 [ASSURED] mark=0 use=2
> udp      17 34 src=192.168.1.128 dst=8.8.8.8 sport=50023 dport=53
src=8.8.8.8 dst=192.168.1.128 sport=53 dport=50023 [ASSURED] mark=0 use=2
> udp      17 179 src=192.168.1.128 dst=83.58.186.174 sport=35976
dport=1194 src=83.58.186.174 dst=192.168.1.128 sport=1194 dport=35976
[ASSURED] mark=0 use=2
> udp      17 34 src=192.168.1.128 dst=8.8.4.4 sport=58363 dport=53
src=8.8.4.4 dst=192.168.1.128 sport=53 dport=58363 [ASSURED] mark=0 use=2
> udp      17 47 src=192.168.1.128 dst=8.8.8.8 sport=49717 dport=53
src=8.8.8.8 dst=192.168.1.128 sport=53 dport=49717 [ASSURED] mark=0 use=2
> udp      17 60 src=192.168.1.128 dst=8.8.8.8 sport=40745 dport=53
src=8.8.8.8 dst=192.168.1.128 sport=53 dport=40745 [ASSURED] mark=0 use=2
> udp      17 35 src=192.168.1.128 dst=8.8.8.8 sport=56320 dport=53
src=8.8.8.8 dst=192.168.1.128 sport=53 dport=56320 [ASSURED] mark=0 use=2
> udp      17 34 src=192.168.1.128 dst=8.8.8.8 sport=57200 dport=53
src=8.8.8.8 dst=192.168.1.128 sport=53 dport=57200 [ASSURED] mark=0 use=2
> udp      17 34 src=192.168.1.128 dst=8.8.8.8 sport=38250 dport=53
src=8.8.8.8 dst=192.168.1.128 sport=53 dport=38250 [ASSURED] mark=0 use=2
>
> IP Configuration
>
> 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group
default
>     inet 127.0.0.1/8 scope host lo
>        valid_lft forever preferred_lft forever
> 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state
UP group default qlen 1000
>     inet 10.1.3.1/24 brd 10.1.3.255 scope global eth0
>        valid_lft forever preferred_lft forever
> 3: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP
group default qlen 1000
>     inet 192.168.1.128/24 brd 192.168.1.255 scope global wlan0
>        valid_lft forever preferred_lft forever
> 14: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc
fq_codel state UNKNOWN group default qlen 100
>     inet 10.0.8.4/24 brd 10.0.8.255 scope global tun0
>        valid_lft forever preferred_lft forever
>
> IP Stats
>
> 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode
DEFAULT group default
>     link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
>     RX: bytes  packets  errors  dropped overrun mcast
>     2088685    23936    0       0       0       0
>     TX: bytes  packets  errors  dropped carrier collsns
>     2088685    23936    0       0       0       0
> 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state
UP mode DEFAULT group default qlen 1000
>     link/ether b8:27:eb:85:6d:c7 brd ff:ff:ff:ff:ff:ff
>     RX: bytes  packets  errors  dropped overrun mcast
>     1347876    17666    0       17533   0       0
>     TX: bytes  packets  errors  dropped carrier collsns
>     16669      238      0       0       0       0
> 3: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP
mode DORMANT group default qlen 1000
>     link/ether 40:a5:ef:03:0c:09 brd ff:ff:ff:ff:ff:ff
>     RX: bytes  packets  errors  dropped overrun mcast
>     500782585  632015   0       1728480 0       0
>     TX: bytes  packets  errors  dropped carrier collsns
>     63799000   475756   0       1       0       0
> 14: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc
fq_codel state UNKNOWN mode DEFAULT group default qlen 100
>     link/none
>     RX: bytes  packets  errors  dropped overrun mcast
>     2373469    37288    0       0       0       0
>     TX: bytes  packets  errors  dropped carrier collsns
>     3120873    33949    0       180     0       0
>
> Routing Rules
>
> 0:      from all lookup local
> 32766:  from all lookup main
> 32767:  from all lookup default
>
> Table default:
>
>
> Table local:
>
> local 192.168.1.128 dev wlan0 proto kernel scope host src 192.168.1.128
> local 127.0.0.1 dev lo proto kernel scope host src 127.0.0.1
> local 10.1.3.1 dev eth0 proto kernel scope host src 10.1.3.1
> local 10.0.8.4 dev tun0 proto kernel scope host src 10.0.8.4
> broadcast 192.168.1.255 dev wlan0 proto kernel scope link src
192.168.1.128
> broadcast 192.168.1.0 dev wlan0 proto kernel scope link src 192.168.1.128
> broadcast 127.255.255.255 dev lo proto kernel scope link src 127.0.0.1
> broadcast 127.0.0.0 dev lo proto kernel scope link src 127.0.0.1
> broadcast 10.1.3.255 dev eth0 proto kernel scope link src 10.1.3.1
> broadcast 10.1.3.0 dev eth0 proto kernel scope link src 10.1.3.1
> broadcast 10.0.8.255 dev tun0 proto kernel scope link src 10.0.8.4
> broadcast 10.0.8.0 dev tun0 proto kernel scope link src 10.0.8.4
> local 127.0.0.0/8 dev lo proto kernel scope host src 127.0.0.1
>
> Table main:
>
> 192.168.1.0/24 dev wlan0 proto kernel scope link src 192.168.1.128 metric
303
> 10.1.3.0/24 dev eth0 proto kernel scope link src 10.1.3.1
> 10.1.1.0/24 via 10.0.8.1 dev tun0
> 10.0.8.0/24 dev tun0 proto kernel scope link src 10.0.8.4
> default via 192.168.1.1 dev wlan0 src 192.168.1.128 metric 303
>
> Per-IP Counters
>
>    iptaccount is not installed
>
> NF Accounting
>
> No NF Accounting defined (nfacct not found)
>
> Events
>
>
> /proc
>
>    /proc/version = Linux version 4.1.19-5-ARCH (builduser@leming) (gcc
version 5.3.0 (GCC) ) #1 SMP Tue Mar 15 19:59:28 MDT 2016
>    /proc/sys/net/ipv4/ip_forward = 1
>    /proc/sys/net/ipv4/icmp_echo_ignore_all = 0
>    /proc/sys/net/ipv4/conf/all/proxy_arp = 0
>    /proc/sys/net/ipv4/conf/all/arp_filter = 0
>    /proc/sys/net/ipv4/conf/all/arp_ignore = 0
>    /proc/sys/net/ipv4/conf/all/rp_filter = 0
>    /proc/sys/net/ipv4/conf/all/log_martians = 0
>    /proc/sys/net/ipv4/conf/default/proxy_arp = 0
>    /proc/sys/net/ipv4/conf/default/arp_filter = 0
>    /proc/sys/net/ipv4/conf/default/arp_ignore = 0
>    /proc/sys/net/ipv4/conf/default/rp_filter = 0
>    /proc/sys/net/ipv4/conf/default/log_martians = 1
>    /proc/sys/net/ipv4/conf/eth0/proxy_arp = 0
>    /proc/sys/net/ipv4/conf/eth0/arp_filter = 0
>    /proc/sys/net/ipv4/conf/eth0/arp_ignore = 0
>    /proc/sys/net/ipv4/conf/eth0/rp_filter = 1
>    /proc/sys/net/ipv4/conf/eth0/log_martians = 1
>    /proc/sys/net/ipv4/conf/lo/proxy_arp = 0
>    /proc/sys/net/ipv4/conf/lo/arp_filter = 0
>    /proc/sys/net/ipv4/conf/lo/arp_ignore = 0
>    /proc/sys/net/ipv4/conf/lo/rp_filter = 0
>    /proc/sys/net/ipv4/conf/lo/log_martians = 1
>    /proc/sys/net/ipv4/conf/tun0/proxy_arp = 0
>    /proc/sys/net/ipv4/conf/tun0/arp_filter = 0
>    /proc/sys/net/ipv4/conf/tun0/arp_ignore = 0
>    /proc/sys/net/ipv4/conf/tun0/rp_filter = 1
>    /proc/sys/net/ipv4/conf/tun0/log_martians = 1
>    /proc/sys/net/ipv4/conf/wlan0/proxy_arp = 0
>    /proc/sys/net/ipv4/conf/wlan0/arp_filter = 0
>    /proc/sys/net/ipv4/conf/wlan0/arp_ignore = 0
>    /proc/sys/net/ipv4/conf/wlan0/rp_filter = 1
>    /proc/sys/net/ipv4/conf/wlan0/log_martians = 1
>
> ARP
>
> ? (192.168.1.131) at cc:3a:61:69:75:4b [ether] on wlan0
> ? (192.168.1.1) at d8:b6:b7:02:90:aa [ether] on wlan0
> ? (10.1.3.2) at 00:50:c2:09:2f:19 [ether] on eth0
>
> Modules
>
> ip_tables              12167  4
iptable_filter,iptable_mangle,iptable_nat,iptable_raw
> ipt_MASQUERADE          1047  1
> ipt_REJECT              1395  4
> ipt_rpfilter            1776  0
> iptable_filter          1541  1
> iptable_mangle          1548  1
> iptable_nat             1632  1
> iptable_raw             1339  1
> nf_conntrack           99551  21
xt_CT,nf_conntrack_netbios_ns,nf_conntrack_proto_gre,xt_helper,nf_nat,xt_connlimit,nf_nat_ipv4,xt_conntrack,nf_conntrack_amanda,nf_nat_masquerade_ipv4,nf_conntrack_broadcast,xt_connmark,nf_conntrack_ftp,nf_conntrack_irc,nf_conntrack_sip,nf_conntrack_h323,nf_conntrack_ipv4,nf_conntrack_pptp,nf_conntrack_sane,nf_conntrack_snmp,nf_conntrack_tftp
> nf_conntrack_amanda     2736  2
> nf_conntrack_broadcast     1243  2
nf_conntrack_netbios_ns,nf_conntrack_snmp
> nf_conntrack_ftp        6757  2
> nf_conntrack_h323      45920  4
> nf_conntrack_ipv4      13517  41
> nf_conntrack_irc        4273  2
> nf_conntrack_netbios_ns     1206  2
> nf_conntrack_pptp       5153  2
> nf_conntrack_proto_gre     4393  1 nf_conntrack_pptp
> nf_conntrack_sane       3866  2
> nf_conntrack_sip       21331  2
> nf_conntrack_snmp       1588  2
> nf_conntrack_tftp       3732  2
> nf_defrag_ipv4          1597  2 xt_TPROXY,nf_conntrack_ipv4
> nf_defrag_ipv6         14975  1 xt_TPROXY
> nf_log_common           4109  1 nf_log_ipv4
> nf_log_ipv4             4566  6
> nf_nat                 15211  3 nf_nat_ipv4,xt_nat,nf_nat_masquerade_ipv4
> nf_nat_ipv4             5473  1 iptable_nat
> nf_nat_masquerade_ipv4     2733  1 ipt_MASQUERADE
> nf_reject_ipv4          3031  1 ipt_REJECT
> xt_CHECKSUM             1177  0
> xt_CLASSIFY              954  0
> xt_CT                   4047  22
> xt_DSCP                 1872  0
> xt_LOG                  1240  6
> xt_NFLOG                1052  0
> xt_NFQUEUE              2484  0
> xt_TCPMSS               3106  1
> xt_TPROXY               4709  0
> xt_addrtype             2691  5
> xt_comment               863  18
> xt_connlimit            5311  0
> xt_connmark             1670  0
> xt_conntrack            2947  18
> xt_dscp                 1536  0
> xt_hashlimit            8186  0
> xt_helper               1270  0
> xt_iprange              1496  0
> xt_length               1119  0
> xt_mark                 1082  1
> xt_multiport            1676  4
> xt_nat                  1636  2
> xt_owner                1285  0
> xt_physdev              1752  0
> xt_pkttype              1003  0
> xt_policy               2540  0
> xt_realm                 905  0
> xt_recent               8646  1
> xt_statistic            1274  0
> xt_tcpmss               1328  0
> xt_tcpudp               2130  45
> xt_time                 2277  0
>
> Shorewall has detected the following iptables/netfilter capabilities:
>    ACCOUNT Target (ACCOUNT_TARGET): Not available
>    AUDIT Target (AUDIT_TARGET): Not available
>    Address Type Match (ADDRTYPE): Available
>    Amanda Helper: Available
>    Arptables JF (ARPTABLESJF): Not available
>    Basic Ematch (BASIC_EMATCH): Available
>    Basic Filter (BASIC_FILTER): Available
>    CLASSIFY Target (CLASSIFY_TARGET): Available
>    CONNMARK Target (CONNMARK): Available
>    CT Target (CT_TARGET): Available
>    Capabilities Version (CAPVERSION): 50004
>    Checksum Target (CHECKSUM_TARGET): Available
>    Comments (COMMENTS): Available
>    Condition Match (CONDITION_MATCH): Not available
>    Connection Tracking Match (CONNTRACK_MATCH): Available
>    Connlimit Match (CONNLIMIT_MATCH): Available
>    Connmark Match (CONNMARK_MATCH): Available
>    DSCP Match (DSCP_MATCH): Available
>    DSCP Target (DSCP_TARGET): Available
>    Enhanced Multi-port Match (EMULIPORT): Available
>    Extended CONNMARK Target (XCONNMARK): Available
>    Extended Connection Tracking Match Support (NEW_CONNTRACK_MATCH):
Available
>    Extended Connmark Match (XCONNMARK_MATCH): Available
>    Extended MARK Target (XMARK): Available
>    Extended MARK Target 2 (EXMARK): Available
>    Extended Multi-port Match (XMULIPORT): Available
>    Extended REJECT (ENHANCED_REJECT): Available
>    FLOW Classifier (FLOW_FILTER): Available
>    FTP Helper: Available
>    FTP-0 Helper: Not available
>    Geo IP Match (GEOIP_MATCH): Not available
>    Goto Support (GOTO_TARGET): Available
>    H323 Helper: Available
>    Hashlimit Match (HASHLIMIT_MATCH): Available
>    Header Match (HEADER_MATCH): Not available
>    Helper Match (HELPER_MATCH): Available
>    IMQ Target (IMQ_TARGET): Not available
>    IP range Match(IPRANGE_MATCH): Available
>    IPMARK Target (IPMARK_TARGET): Not available
>    IPP2P Match (IPP2P_MATCH): Not available
>    IRC Helper: Available
>    IRC-0 Helper: Not available
>    Iface Match (IFACE_MATCH): Not available
>    Kernel Version (KERNELVERSION): 40119
>    LOG Target (LOG_TARGET): Available
>    LOGMARK Target (LOGMARK_TARGET): Not available
>    MARK Target (MARK): Available
>    MASQUERADE Target (MASQUERADE_TGT): Available
>    Mangle FORWARD Chain (MANGLE_FORWARD): Available
>    Mark in the filter table (MARK_ANYWHERE): Available
>    Multi-port Match (MULTIPORT): Available
>    NAT (NAT_ENABLED): Available
>    NFAcct Match: Not available
>    NFLOG Target (NFLOG_TARGET): Available
>    NFQUEUE Target (NFQUEUE_TARGET): Available
>    Netbios_ns Helper: Available
>    New tos Match (NEW_TOS_MATCH): Available
>    Owner Match (OWNER_MATCH): Available
>    Owner Name Match (OWNER_NAME_MATCH): Available
>    PPTP Helper: Available
>    Packet Mangling (MANGLE_ENABLED): Available
>    Packet Type Match (USEPKTTYPE): Available
>    Packet length Match (LENGTH_MATCH): Available
>    Persistent SNAT (PERSISTENT_SNAT): Available
>    Physdev Match (PHYSDEV_MATCH): Available
>    Physdev-is-bridged Support (PHYSDEV_BRIDGE): Available
>    Policy Match (POLICY_MATCH): Available
>    RPFilter Match (RPFILTER_MATCH): Available
>    Raw Table (RAW_TABLE): Available
>    Rawpost Table (RAWPOST_TABLE): Not available
>    Realm Match (REALM_MATCH): Available
>    Recent Match "--reap" option (REAP_OPTION): Available
>    Recent Match (RECENT_MATCH): Available
>    Repeat match (KLUDGEFREE): Available
>    SANE Helper: Available
>    SANE-0 Helper: Not available
>    SIP Helper: Available
>    SIP-0 Helper: Not available
>    SNMP Helper: Available
>    Statistic Match (STATISTIC_MATCH): Available
>    TARPIT Target (TARPIT_TARGET): Not available
>    TCPMSS Match (TCPMSS_MATCH): Available
>    TCPMSS Target (TCPMSS_TARGET): Available
>    TFTP Helper: Available
>    TFTP-0 Helper: Not available
>    TPROXY Target (TPROXY_TARGET): Available
>    Time Match (TIME_MATCH): Available
>    UDPLITE Port Redirection (UDPLITEREDIRECT): Not available
>    ULOG Target (ULOG_TARGET): Not available
>    fwmark route mask (FWMARK_RT_MASK): Available
>    ipset V5 (IPSET_V5): Not available
>    iptables --wait option (WAIT_OPTION): Available
>    iptables -S (IPTABLES_S): Available
>
> Netid  State      Recv-Q Send-Q Local Address:Port               Peer
Address:Port
> tcp    LISTEN     0      128       *:5355
*:*                   users:(("systemd-resolve",pid=320,fd=15))
> tcp    LISTEN     0      5         *:53
*:*                   users:(("dnsmasq",pid=326,fd=7))
> tcp    LISTEN     0      128       *:22
*:*                   users:(("sshd",pid=321,fd=3))
> tcp    ESTAB      0      5748   10.0.8.4:22                 10.0.8.2:42786
users:(("sshd",pid=9688,fd=3))
> tcp    TIME-WAIT  0      0      192.168.1.128:46058
107.6.170.212:80
> tcp    ESTAB      0      0      10.0.8.4:22                 10.0.8.2:50492
users:(("sshd",pid=10821,fd=3))
>
> Traffic Control
>
> Device eth0:
> qdisc fq_codel 0: root refcnt 2 limit 10240p flows 1024 quantum 1526
target 5.0ms interval 100.0ms ecn
>  Sent 14693 bytes 238 pkt (dropped 0, overlimits 0 requeues 0)
>  backlog 0b 0p requeues 0
>   maxpacket 0 drop_overlimit 0 new_flow_count 0 ecn_mark 0
>   new_flows_len 0 old_flows_len 0
>
>
> Device wlan0:
> qdisc mq 0: root
>  Sent 50503698 bytes 475803 pkt (dropped 0, overlimits 0 requeues 0)
>  backlog 0b 0p requeues 0
> qdisc fq_codel 0: parent :1 limit 10240p flows 1024 quantum 1514 target
5.0ms interval 100.0ms ecn
>  Sent 23934 bytes 176 pkt (dropped 0, overlimits 0 requeues 0)
>  backlog 0b 0p requeues 0
>   maxpacket 0 drop_overlimit 0 new_flow_count 0 ecn_mark 0
>   new_flows_len 0 old_flows_len 0
> qdisc fq_codel 0: parent :2 limit 10240p flows 1024 quantum 1514 target
5.0ms interval 100.0ms ecn
>  Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
>  backlog 0b 0p requeues 0
>   maxpacket 0 drop_overlimit 0 new_flow_count 0 ecn_mark 0
>   new_flows_len 0 old_flows_len 0
> qdisc fq_codel 0: parent :3 limit 10240p flows 1024 quantum 1514 target
5.0ms interval 100.0ms ecn
>  Sent 50479764 bytes 475627 pkt (dropped 0, overlimits 0 requeues 0)
>  backlog 0b 0p requeues 0
>   maxpacket 319 drop_overlimit 0 new_flow_count 7 ecn_mark 0
>   new_flows_len 1 old_flows_len 0
> qdisc fq_codel 0: parent :4 limit 10240p flows 1024 quantum 1514 target
5.0ms interval 100.0ms ecn
>  Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
>  backlog 0b 0p requeues 0
>   maxpacket 0 drop_overlimit 0 new_flow_count 0 ecn_mark 0
>   new_flows_len 0 old_flows_len 0
>
> class mq :1 root
>  Sent 23934 bytes 176 pkt (dropped 0, overlimits 0 requeues 0)
>  backlog 0b 0p requeues 0
> class mq :2 root
>  Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
>  backlog 0b 0p requeues 0
> class mq :3 root
>  Sent 50479764 bytes 475627 pkt (dropped 0, overlimits 0 requeues 0)
>  backlog 0b 0p requeues 0
> class mq :4 root
>  Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
>  backlog 0b 0p requeues 0
> class fq_codel :3cc parent none
>  (dropped 0, overlimits 0 requeues 0)
>  backlog 0b 0p requeues 0
>   deficit 1387 count 0 lastcount 0 ldelay 5us
>
> Device tun0:
> qdisc fq_codel 0: root refcnt 2 limit 10240p flows 1024 quantum 1500
target 5.0ms interval 100.0ms ecn
>  Sent 3164781 bytes 34175 pkt (dropped 0, overlimits 0 requeues 0)
>  backlog 0b 0p requeues 0
>   maxpacket 0 drop_overlimit 0 new_flow_count 0 ecn_mark 0
>   new_flows_len 0 old_flows_len 0
>
>
>
> TC Filters
>
> Device eth0:
>
> Device wlan0:
>
> Device tun0:
>
>
> --
> Eduard Vidal i Tulsà
------------------------------------------------------------------------------
Find and fix application performance issues faster with Applications Manager
Applications Manager provides deep performance insights into multiple tiers of
your business applications. It resolves application problems quickly and
reduces your MTTR. Get your free trial!
https://ad.doubleclick.net/ddm/clk/302982198;130105516;z
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to