Hi list!

Today I'm writing here since me and my colleague are trying to implement
a solution as summarized here:
- Raspberry Pi (debian-like arm distro)
- Shorewall installed
- Softether vpn installed, with internal dhcp for vpn clients (vpn zone)
- LAN + Wireless in bridge (loc zone)
- UMTS/4g dongle connected on USB, detected as net interface
(net zone)

We now managed to reach the raspberry (aka shorewall host) via vpn but
it seems that forward chain is not working as expected, maybe for a
mis-configured file? (vpn clients cannot reach the loc zone)

192.168.8.1 is the private-side ip of the 4g dongle (net zone)
192.168.31.0/24 is the loc zone (eth0 bridged with wlan0)

Attached files are shorewall dump and softether config

The reason why we chose softether is that we need a cloud-vpn solution
since our provider doesn't provide as a public ip at the sim side but
they're connected with a private nat-ed ip on the router side, so an
openvpn server or similar listening on the wan ip cannot be a solution.

Many thanks for any of your hints!
(And please, be patient with my poor english :) )

Nice sunday,
Nick


-- 
+---------------------+
| Linux User  #554252 |
+---------------------+


# Software Configuration File
# ---------------------------
# 
# You may edit this file when the VPN Server / Client / Bridge program is not 
running.
# 
# In prior to edit this file manually by your text editor,
# shutdown the VPN Server / Client / Bridge background service.
# Otherwise, all changes will be lost.
# 
declare root
{
        uint ConfigRevision 312
        bool IPsecMessageDisplayed false
        string Region IT
        bool VgsMessageDisplayed false

        declare DDnsClient
        {
                bool Disabled false
                byte Key 
                string LocalHostname raspberrypi
                string ProxyHostName $
                uint ProxyPort 0
                uint ProxyType 0
                string ProxyUsername $
        }
        declare IPsec
        {
                bool EtherIP_IPsec true
                string IPsec_Secret 123456789
                string L2TP_DefaultHub VPN
                bool L2TP_IPsec true
                bool L2TP_Raw true

                declare EtherIP_IDSettingsList
                {
                }
        }
        declare ListenerList
        {
                declare Listener0
                {
                        bool DisableDos false
                        bool Enabled true
                        uint Port 443
                }
                declare Listener1
                {
                        bool DisableDos false
                        bool Enabled true
                        uint Port 992
                }
                declare Listener2
                {
                        bool DisableDos false
                        bool Enabled true
                        uint Port 1194
                }
                declare Listener3
                {
                        bool DisableDos false
                        bool Enabled true
                        uint Port 5555
                }
        }
        declare LocalBridgeList
        {
                bool DoNotDisableOffloading false

                declare LocalBridge0
                {
                        string DeviceName vpntap
                        string HubName VPN
                        bool LimitBroadcast false
                        bool MonitorMode false
                        bool NoPromiscuousMode false
                        string TapMacAddress 5E-C5-A2-3F-6A-7F
                        bool TapMode true
                }
        }
        declare ServerConfiguration
        {
                bool AcceptOnlyTls true
                uint64 AutoDeleteCheckDiskFreeSpaceMin 104857600
                uint AutoDeleteCheckIntervalSecs 300
                uint AutoSaveConfigSpan 300
                bool BackupConfigOnlyWhenModified true
                string CipherName AES128-SHA
                uint CurrentBuild 9678
                bool DisableCoreDumpOnUnix false
                bool DisableDeadLockCheck false
                bool DisableDosProction false
                bool DisableGetHostNameWhenAcceptTcp false
                bool DisableIntelAesAcceleration false
                bool DisableIPv6Listener false
                bool DisableNatTraversal false
                bool DisableOpenVPNServer false
                bool DisableSessionReconnect false
                bool DisableSSTPServer false
                bool DontBackupConfig false
                bool EnableVpnAzure true
                bool EnableVpnOverDns false
                bool EnableVpnOverIcmp false
                byte HashedPassword LuqtmTn4az6KYd95fc1reAED4EA=
                string KeepConnectHost keepalive.softether.org
                uint KeepConnectInterval 50
                uint KeepConnectPort 80
                uint KeepConnectProtocol 1
                uint64 LoggerMaxLogSize 1073741823
                uint MaxConcurrentDnsClientThreads 64
                uint MaxConnectionsPerIP 256
                uint MaxUnestablishedConnections 1000
                bool NoHighPriorityProcess false
                bool NoLinuxArpFilter false
                bool NoSendSignature false
                string OpenVPNDefaultClientOption 
dev-type$20tun,link-mtu$201500,tun-mtu$201500,cipher$20AES-128-CBC,auth$20SHA1,keysize$20128,key-method$202,tls-client
                string OpenVPN_UdpPortList 1194
                bool SaveDebugLog false
                byte ServerCert 
                byte ServerKey 
                uint ServerLogSwitchType 4
                uint ServerType 0
                bool StrictSyslogDatetimeFormat false
                bool Tls_Disable1_0 false
                bool Tls_Disable1_1 false
                bool Tls_Disable1_2 false
                bool UseKeepConnect true
                bool UseWebTimePage false
                bool UseWebUI false

                declare GlobalParams
                {
                        uint FIFO_BUDGET 1000000
                        uint HUB_ARP_SEND_INTERVAL 5000
                        uint IP_TABLE_EXPIRE_TIME 60000
                        uint IP_TABLE_EXPIRE_TIME_DHCP 300000
                        uint MAC_TABLE_EXPIRE_TIME 600000
                        uint MAX_BUFFERING_PACKET_SIZE 480000
                        uint MAX_HUB_LINKS 1024
                        uint MAX_IP_TABLES 65536
                        uint MAX_MAC_TABLES 65536
                        uint MAX_SEND_SOCKET_QUEUE_NUM 128
                        uint MAX_SEND_SOCKET_QUEUE_SIZE 320000
                        uint MAX_STORED_QUEUE_NUM 384
                        uint MEM_FIFO_REALLOC_MEM_SIZE 65536
                        uint MIN_SEND_SOCKET_QUEUE_SIZE 80000
                        uint QUEUE_BUDGET 1024
                        uint SELECT_TIME 256
                        uint SELECT_TIME_FOR_NAT 30
                        uint STORM_CHECK_SPAN 500
                        uint STORM_DISCARD_VALUE_END 1024
                        uint STORM_DISCARD_VALUE_START 3
                }
                declare ServerTraffic
                {
                        declare RecvTraffic
                        {
                                uint64 BroadcastBytes 1198903270
                                uint64 BroadcastCount 12531106
                                uint64 UnicastBytes 8759529998
                                uint64 UnicastCount 23067400
                        }
                        declare SendTraffic
                        {
                                uint64 BroadcastBytes 1956112175
                                uint64 BroadcastCount 17800378
                                uint64 UnicastBytes 8241748641
                                uint64 UnicastCount 19555968
                        }
                }
                declare SyslogSettings
                {
                        string HostName $
                        uint Port 0
                        uint SaveType 0
                }
        }
        declare VirtualHUB
        {
                declare VPN
                {
                        uint64 CreatedTime 1570234253123
                        byte HashedPassword 
                        uint64 LastCommTime 1601707654823
                        uint64 LastLoginTime 1601529500313
                        uint NumLogin 568
                        bool Online true
                        bool RadiusConvertAllMsChapv2AuthRequestToEap false
                        string RadiusRealm $
                        uint RadiusRetryInterval 0
                        uint RadiusServerPort 1812
                        string RadiusSuffixFilter $
                        bool RadiusUsePeapInsteadOfEap false
                        byte SecurePassword 
                        uint Type 0

                        declare AccessList
                        {
                        }
                        declare AdminOption
                        {
                                uint allow_hub_admin_change_option 0
                                uint deny_bridge 0
                                uint deny_change_user_password 0
                                uint deny_empty_password 0
                                uint deny_hub_admin_change_ext_option 0
                                uint deny_qos 0
                                uint deny_routing 0
                                uint max_accesslists 0
                                uint max_bitrates_download 0
                                uint max_bitrates_upload 0
                                uint max_groups 0
                                uint max_multilogins_per_user 0
                                uint max_sessions 0
                                uint max_sessions_bridge 0
                                uint max_sessions_client 0
                                uint max_sessions_client_bridge_apply 0
                                uint max_users 0
                                uint no_access_list_include_file 0
                                uint no_cascade 0
                                uint no_change_access_control_list 0
                                uint no_change_access_list 0
                                uint no_change_admin_password 0
                                uint no_change_cert_list 0
                                uint no_change_crl_list 0
                                uint no_change_groups 0
                                uint no_change_log_config 0
                                uint no_change_log_switch_type 0
                                uint no_change_msg 0
                                uint no_change_users 0
                                uint no_delay_jitter_packet_loss 0
                                uint no_delete_iptable 0
                                uint no_delete_mactable 0
                                uint no_disconnect_session 0
                                uint no_enum_session 0
                                uint no_offline 0
                                uint no_online 0
                                uint no_query_session 0
                                uint no_read_log_file 0
                                uint no_securenat 0
                                uint no_securenat_enabledhcp 0
                                uint no_securenat_enablenat 0
                        }
                        declare CascadeList
                        {
                        }
                        declare LogSetting
                        {
                                uint PacketLogSwitchType 4
                                uint PACKET_LOG_ARP 0
                                uint PACKET_LOG_DHCP 1
                                uint PACKET_LOG_ETHERNET 0
                                uint PACKET_LOG_ICMP 0
                                uint PACKET_LOG_IP 0
                                uint PACKET_LOG_TCP 0
                                uint PACKET_LOG_TCP_CONN 1
                                uint PACKET_LOG_UDP 0
                                bool SavePacketLog true
                                bool SaveSecurityLog true
                                uint SecurityLogSwitchType 4
                        }
                        declare Message
                        {
                        }
                        declare Option
                        {
                                uint AccessListIncludeFileCacheLifetime 30
                                uint AdjustTcpMssValue 0
                                bool ApplyIPv4AccessListOnArpPacket false
                                bool AssignVLanIdByRadiusAttribute false
                                bool BroadcastLimiterStrictMode false
                                uint BroadcastStormDetectionThreshold 0
                                uint ClientMinimumRequiredBuild 0
                                bool DenyAllRadiusLoginWithNoVlanAssign false
                                uint DetectDormantSessionInterval 0
                                bool DisableAdjustTcpMss false
                                bool DisableCheckMacOnLocalBridge false
                                bool DisableCorrectIpOffloadChecksum false
                                bool DisableHttpParsing false
                                bool DisableIPParsing false
                                bool DisableIpRawModeSecureNAT false
                                bool DisableKernelModeSecureNAT false
                                bool DisableUdpAcceleration false
                                bool DisableUdpFilterForLocalBridgeNic false
                                bool DisableUserModeSecureNAT false
                                bool DoNotSaveHeavySecurityLogs false
                                bool DropArpInPrivacyFilterMode true
                                bool DropBroadcastsInPrivacyFilterMode true
                                bool FilterBPDU false
                                bool FilterIPv4 false
                                bool FilterIPv6 false
                                bool FilterNonIP false
                                bool FilterOSPF false
                                bool FilterPPPoE false
                                uint FloodingSendQueueBufferQuota 33554432
                                bool ManageOnlyLocalUnicastIPv6 true
                                bool ManageOnlyPrivateIP true
                                uint MaxLoggedPacketsPerMinute 0
                                uint MaxSession 0
                                bool NoArpPolling false
                                bool NoDhcpPacketLogOutsideHub true
                                bool NoEnum false
                                bool NoIpTable false
                                bool NoIPv4PacketLog false
                                bool NoIPv6AddrPolling false
                                bool NoIPv6DefaultRouterInRAWhenIPv6 true
                                bool NoIPv6PacketLog false
                                bool NoLookBPDUBridgeId false
                                bool NoMacAddressLog true
                                bool NoManageVlanId false
                                bool NoPhysicalIPOnPacketLog false
                                bool NoSpinLockForPacketDelay false
                                bool RemoveDefGwOnDhcpForLocalhost true
                                uint RequiredClientId 0
                                uint SecureNAT_MaxDnsSessionsPerIp 0
                                uint SecureNAT_MaxIcmpSessionsPerIp 0
                                uint SecureNAT_MaxTcpSessionsPerIp 0
                                uint SecureNAT_MaxTcpSynSentPerIp 0
                                uint SecureNAT_MaxUdpSessionsPerIp 0
                                bool SecureNAT_RandomizeAssignIp false
                                bool SuppressClientUpdateNotification false
                                bool UseHubNameAsDhcpUserClassOption false
                                bool UseHubNameAsRadiusNasId false
                                string VlanTypeId 0x8100
                                bool YieldAfterStorePacket false
                        }
                        declare SecureNAT
                        {
                                bool Disabled false
                                bool SaveLog true

                                declare VirtualDhcpServer
                                {
                                        string DhcpDnsServerAddress 192.168.30.1
                                        string DhcpDnsServerAddress2 0.0.0.0
                                        string DhcpDomainName fritz.box
                                        bool DhcpEnabled true
                                        uint DhcpExpireTimeSpan 7200
                                        string DhcpGatewayAddress 192.168.30.1
                                        string DhcpLeaseIPEnd 192.168.30.200
                                        string DhcpLeaseIPStart 192.168.30.10
                                        string DhcpPushRoutes $
                                        string DhcpSubnetMask 255.255.255.0
                                }
                                declare VirtualHost
                                {
                                        string VirtualHostIp 192.168.30.1
                                        string VirtualHostIpSubnetMask 
255.255.255.0
                                        string VirtualHostMacAddress 
5E-65-B7-18-F7-F9
                                }
                                declare VirtualRouter
                                {
                                        bool NatEnabled true
                                        uint NatMtu 1500
                                        uint NatTcpTimeout 1800
                                        uint NatUdpTimeout 60
                                }
                        }
                        declare SecurityAccountDatabase
                        {
                                declare CertList
                                {
                                }
                                declare CrlList
                                {
                                }
                                declare GroupList
                                {
                                }
                                declare IPAccessControlList
                                {
                                }
                                declare UserList
                                {
                                        declare test
                                        {
                                                byte AuthNtLmSecureHash
                                                byte AuthPassword 
                                                uint AuthType 1
                                                uint64 CreatedTime 1572763805568
                                                uint64 ExpireTime 0
                                                uint64 LastLoginTime 
1601529500313
                                                string Note $
                                                uint NumLogin 547
                                                string RealName $
                                                uint64 UpdatedTime 1574086741004

                                                declare Traffic
                                                {
                                                        declare RecvTraffic
                                                        {
                                                                uint64 
BroadcastBytes 21248056
                                                                uint64 
BroadcastCount 316782
                                                                uint64 
UnicastBytes 5732038794
                                                                uint64 
UnicastCount 4791434
                                                        }
                                                        declare SendTraffic
                                                        {
                                                                uint64 
BroadcastBytes 2826670
                                                                uint64 
BroadcastCount 9093
                                                                uint64 
UnicastBytes 223368756
                                                                uint64 
UnicastCount 2823070
                                                        }
                                                }
                                        }
                                }
                        }
                        declare Traffic
                        {
                                declare RecvTraffic
                                {
                                        uint64 BroadcastBytes 1198903270
                                        uint64 BroadcastCount 12531106
                                        uint64 UnicastBytes 8759531352
                                        uint64 UnicastCount 23067401
                                }
                                declare SendTraffic
                                {
                                        uint64 BroadcastBytes 1956112175
                                        uint64 BroadcastCount 17800378
                                        uint64 UnicastBytes 8241749995
                                        uint64 UnicastCount 19555969
                                }
                        }
                }
        }
        declare VirtualLayer3SwitchList
        {
        }
}
Shorewall 5.0.15.6 Dump at raspberrypi - Sat  3 Oct 17:45:13 CEST 2020

Shorewall is running
State:Started Thu  1 Oct 16:17:15 CEST 2020 from /etc/shorewall/ 
(/var/lib/shorewall/firewall compiled Sun 27 Sep 15:40:58 CEST 2020 by 
Shorewall version 5.0.15.6)

Counters reset Thu  1 Oct 16:17:15 CEST 2020

Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
 355K   30M net-fw     all  --  eth1   *       0.0.0.0/0            0.0.0.0/0   
        
 868K 1234M ~comb2     all  --  eth0   *       0.0.0.0/0            0.0.0.0/0   
        
1925K   77M ~comb2     all  --  wlan0  *       0.0.0.0/0            0.0.0.0/0   
        
34288 2265K vpn-fw     all  --  tap_vpntap *       0.0.0.0/0            
0.0.0.0/0           
 322K   30M ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:INPUT:REJECT:"
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
 1484 77040 TCPMSS     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp flags:0x06/0x02 TCPMSS clamp to PMTU
66711   82M net_frwd   all  --  eth1   *       0.0.0.0/0            0.0.0.0/0   
        
62052   12M ~comb1     all  --  eth0   *       0.0.0.0/0            0.0.0.0/0   
        
36042 3863K ~comb1     all  --  wlan0  *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 vpn_frwd   all  --  tap_vpntap *       0.0.0.0/0            
0.0.0.0/0           
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:FORWARD:REJECT:"
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain OUTPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
3210K 9920M ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
 654K   44M fw-net     all  --  *      eth1    0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     all  --  *      eth0    0.0.0.0/0            0.0.0.0/0   
        
    3   712 ACCEPT     all  --  *      wlan0   0.0.0.0/0            0.0.0.0/0   
        
    8  1478 fw-vpn     all  --  *      tap_vpntap  0.0.0.0/0            
0.0.0.0/0           
    0     0 ACCEPT     all  --  *      lo      0.0.0.0/0            0.0.0.0/0   
        
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:OUTPUT:REJECT:"
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain Broadcast (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
34308 2269K DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ADDRTYPE match dst-type BROADCAST
    8  1478 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ADDRTYPE match dst-type MULTICAST
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ADDRTYPE match dst-type ANYCAST

Chain Drop (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0            all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         icmptype 3 code 4 /* Needed ICMP types */
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         icmptype 11 /* Needed ICMP types */
    0     0 Broadcast  all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         multiport dports 135,445 /* SMB */
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpts:137:139 /* SMB */
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp spt:137 dpts:1024:65535 /* SMB */
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         multiport dports 135,139,445 /* SMB */
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:1900 /* UPnP */
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp flags:!0x17/0x02
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp spt:53 /* Late DNS Replies */

Chain Reject (8 references)
 pkts bytes target     prot opt in     out     source               destination 
        
 356K   23M            all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         icmptype 3 code 4 /* Needed ICMP types */
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         icmptype 11 /* Needed ICMP types */
 356K   23M Broadcast  all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  multiport dports 135,445 /* SMB */
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  udp dpts:137:139 /* SMB */
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  udp spt:137 dpts:1024:65535 /* SMB */
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  multiport dports 135,139,445 /* SMB */
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:1900 /* UPnP */
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp flags:!0x17/0x02
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp spt:53 /* Late DNS Replies */

Chain dynamic (6 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain fw-net (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    5  1640 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpts:67:68
    2   120 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:443
 330K   23M ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:53 /* Regole base connettività internet */
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:53 /* Regole base connettività internet */
  167 12692 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:123 /* Regole base connettività internet */
  920 55200 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         multiport dports 80,443,143,993,587,465 /* Regole base connettività 
internet */
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpts:33434:33524 /* Networking e diagnostica */
    1    84 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         icmptype 8 /* Networking e diagnostica */
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:43 /* Networking e diagnostica */
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         icmptype 8 limit: avg 1/sec burst 5 /* Networking e diagnostica */
 322K   21M Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
 322K   21M LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:fw-net:REJECT:"
 322K   21M reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain fw-vpn (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpts:67:68
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         icmptype 8 /* Regole VPN */
    8  1478 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:fw-vpn:REJECT:"
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain loc-fw (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp spts:67:68 dpts:67:68 /* Regole base connettività internet */
  115  6892 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:21 /* Server FTP locale */
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp spt:20 /* Server FTP locale */
    1    52 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:22 /* Server SSH locale */
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         icmptype 8 /* Server SSH locale */
   53 10066 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:loc-fw:ACCEPT:"
   53 10066 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain loc-net (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
55428 3357K ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:53 /* Regole base connettività internet */
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:53 /* Regole base connettività internet */
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:123 /* Regole base connettività internet */
  743 38487 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         multiport dports 80,443 /* Regole base connettività internet */
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpts:33434:33524 /* Networking e diagnostica */
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         icmptype 8 /* Networking e diagnostica */
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:43 /* Networking e diagnostica */
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         icmptype 8 limit: avg 1/sec burst 5 /* Networking e diagnostica */
    5   260 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    5   260 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:loc-net:REJECT:"
    5   260 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain loc_frwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
56176 3396K loc-net    all  --  *      eth1    0.0.0.0/0            0.0.0.0/0   
        
   26  1352 ACCEPT     all  --  *      eth0    0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     all  --  *      wlan0   0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     all  --  *      tap_vpntap  0.0.0.0/0            
0.0.0.0/0            /* Regole VPN */

Chain logdrop (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain logflags (7 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 4 level 6 prefix "Shorewall:logflags:DROP:"
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain logreject (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain net-fw (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    2    80 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
 355K   30M ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
    2    80 smurfs     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpts:67:68
    2    80 tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:443
    2    80 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID
    0     0 Drop       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain net_frwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
66711   82M ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
    0     0 smurfs     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
    0     0 tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ~comb0     all  --  *      eth0    0.0.0.0/0            0.0.0.0/0   
        
    0     0 ~comb0     all  --  *      wlan0   0.0.0.0/0            0.0.0.0/0   
        
    0     0 ~comb0     all  --  *      tap_vpntap  0.0.0.0/0            
0.0.0.0/0           

Chain reject (13 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ADDRTYPE match src-type BROADCAST
    0     0 DROP       all  --  *      *       224.0.0.0/4          0.0.0.0/0   
        
    0     0 DROP       2    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    5   260 REJECT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         reject-with tcp-reset
 322K   21M REJECT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         reject-with icmp-port-unreachable
    0     0 REJECT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         reject-with icmp-host-unreachable
    0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         reject-with icmp-host-prohibited

Chain sha-lh-813265f80ae338cdf60c (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain sha-rh-9bf4339cf028549fd23e (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain shorewall (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0            all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         recent: SET name: %CURRENTTIME side: source mask: 255.255.255.255

Chain smurflog (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:smurfs:DROP:"
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain smurfs (6 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    4  1366 RETURN     all  --  *      *       0.0.0.0              0.0.0.0/0   
        
    0     0 smurflog   all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  ADDRTYPE match src-type BROADCAST
    0     0 smurflog   all  --  *      *       224.0.0.0/4          0.0.0.0/0   
        [goto] 

Chain tcpflags (6 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  tcp flags:0x3F/0x29
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  tcp flags:0x3F/0x00
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  tcp flags:0x06/0x06
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  tcp flags:0x05/0x05
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  tcp flags:0x03/0x03
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  tcp flags:0x19/0x09
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  tcp spt:0 flags:0x17/0x02

Chain vpn-fw (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
34284 2265K dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
    4   268 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
34284 2265K smurfs     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
    6  1971 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpts:67:68
    0     0 tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ~log0      tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  tcp dpt:22 /* Regole VPN */
    1    60 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         icmptype 8 /* Regole VPN */
34277 2263K Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:vpn-fw:REJECT:"
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain vpn-net (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:vpn-net:REJECT:"
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain vpn_frwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
    0     0 smurfs     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
    0     0 tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 vpn-net    all  --  *      eth1    0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     all  --  *      eth0    0.0.0.0/0            0.0.0.0/0   
         /* Regole VPN */
    0     0 ACCEPT     all  --  *      wlan0   0.0.0.0/0            0.0.0.0/0   
         /* Regole VPN */

Chain ~comb0 (3 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID
    0     0 Drop       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain ~comb1 (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
56202 3397K dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
41892   13M ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
56202 3397K smurfs     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
  774 40099 tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
56202 3397K loc_frwd   all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain ~comb2 (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
  179 20310 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
2793K 1311M ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
  179 20310 smurfs     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
   10  3300 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpts:67:68
  127  7516 tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
  169 17010 loc-fw     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain ~log0 (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         /* Regole VPN */ LOG flags 0 level 6 prefix "Shorewall:vpn-fw:ACCEPT:"
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         /* Regole VPN */

Log (/var/log/messages)

Oct  3 17:45:02 fw-net:REJECT:IN= OUT=eth1 SRC=192.168.8.100 DST=130.158.6.56 
LEN=65 TOS=0x00 PREC=0x00 TTL=64 ID=23259 DF PROTO=UDP SPT=37082 DPT=80 LEN=45 
Oct  3 17:45:03 fw-net:REJECT:IN= OUT=eth1 SRC=192.168.8.100 DST=130.158.6.56 
LEN=65 TOS=0x00 PREC=0x00 TTL=64 ID=23304 DF PROTO=UDP SPT=45043 DPT=80 LEN=45 
Oct  3 17:45:03 fw-net:REJECT:IN= OUT=eth1 SRC=192.168.8.100 DST=130.158.6.56 
LEN=65 TOS=0x00 PREC=0x00 TTL=64 ID=23346 DF PROTO=UDP SPT=53941 DPT=80 LEN=45 
Oct  3 17:45:04 fw-net:REJECT:IN= OUT=eth1 SRC=192.168.8.100 DST=130.158.6.56 
LEN=65 TOS=0x00 PREC=0x00 TTL=64 ID=23366 DF PROTO=UDP SPT=39826 DPT=80 LEN=45 
Oct  3 17:45:04 fw-net:REJECT:IN= OUT=eth1 SRC=192.168.8.100 DST=130.158.6.56 
LEN=65 TOS=0x00 PREC=0x00 TTL=64 ID=23413 DF PROTO=UDP SPT=58229 DPT=80 LEN=45 
Oct  3 17:45:05 fw-net:REJECT:IN= OUT=eth1 SRC=192.168.8.100 DST=130.158.6.56 
LEN=65 TOS=0x00 PREC=0x00 TTL=64 ID=23444 DF PROTO=UDP SPT=39378 DPT=80 LEN=45 
Oct  3 17:45:05 fw-net:REJECT:IN= OUT=eth1 SRC=192.168.8.100 DST=130.158.6.56 
LEN=65 TOS=0x00 PREC=0x00 TTL=64 ID=23459 DF PROTO=UDP SPT=32984 DPT=80 LEN=45 
Oct  3 17:45:06 fw-net:REJECT:IN= OUT=eth1 SRC=192.168.8.100 DST=130.158.6.56 
LEN=65 TOS=0x00 PREC=0x00 TTL=64 ID=23482 DF PROTO=UDP SPT=40920 DPT=80 LEN=45 
Oct  3 17:45:06 fw-net:REJECT:IN= OUT=eth1 SRC=192.168.8.100 DST=130.158.6.56 
LEN=65 TOS=0x00 PREC=0x00 TTL=64 ID=23516 DF PROTO=UDP SPT=38635 DPT=80 LEN=45 
Oct  3 17:45:07 fw-net:REJECT:IN= OUT=eth1 SRC=192.168.8.100 DST=130.158.6.56 
LEN=65 TOS=0x00 PREC=0x00 TTL=64 ID=23559 DF PROTO=UDP SPT=39480 DPT=80 LEN=45 
Oct  3 17:45:07 fw-net:REJECT:IN= OUT=eth1 SRC=192.168.8.100 DST=130.158.6.56 
LEN=65 TOS=0x00 PREC=0x00 TTL=64 ID=23602 DF PROTO=UDP SPT=50048 DPT=80 LEN=45 
Oct  3 17:45:08 fw-net:REJECT:IN= OUT=eth1 SRC=192.168.8.100 DST=130.158.6.56 
LEN=65 TOS=0x00 PREC=0x00 TTL=64 ID=23631 DF PROTO=UDP SPT=54907 DPT=80 LEN=45 
Oct  3 17:45:09 fw-net:REJECT:IN= OUT=eth1 SRC=192.168.8.100 DST=130.158.6.56 
LEN=65 TOS=0x00 PREC=0x00 TTL=64 ID=23647 DF PROTO=UDP SPT=33300 DPT=80 LEN=45 
Oct  3 17:45:09 fw-net:REJECT:IN= OUT=eth1 SRC=192.168.8.100 DST=130.158.6.56 
LEN=65 TOS=0x00 PREC=0x00 TTL=64 ID=23671 DF PROTO=UDP SPT=55262 DPT=80 LEN=45 
Oct  3 17:45:10 fw-net:REJECT:IN= OUT=eth1 SRC=192.168.8.100 DST=130.158.6.56 
LEN=65 TOS=0x00 PREC=0x00 TTL=64 ID=23718 DF PROTO=UDP SPT=33174 DPT=80 LEN=45 
Oct  3 17:45:10 fw-net:REJECT:IN= OUT=eth1 SRC=192.168.8.100 DST=130.158.6.56 
LEN=65 TOS=0x00 PREC=0x00 TTL=64 ID=23739 DF PROTO=UDP SPT=48189 DPT=80 LEN=45 
Oct  3 17:45:11 fw-net:REJECT:IN= OUT=eth1 SRC=192.168.8.100 DST=130.158.6.56 
LEN=65 TOS=0x00 PREC=0x00 TTL=64 ID=23741 DF PROTO=UDP SPT=37926 DPT=80 LEN=45 
Oct  3 17:45:11 fw-net:REJECT:IN= OUT=eth1 SRC=192.168.8.100 DST=130.158.6.56 
LEN=65 TOS=0x00 PREC=0x00 TTL=64 ID=23800 DF PROTO=UDP SPT=39836 DPT=80 LEN=45 
Oct  3 17:45:12 fw-net:REJECT:IN= OUT=eth1 SRC=192.168.8.100 DST=130.158.6.56 
LEN=65 TOS=0x00 PREC=0x00 TTL=64 ID=23830 DF PROTO=UDP SPT=44574 DPT=80 LEN=45 
Oct  3 17:45:12 fw-net:REJECT:IN= OUT=eth1 SRC=192.168.8.100 DST=130.158.6.56 
LEN=65 TOS=0x00 PREC=0x00 TTL=64 ID=23876 DF PROTO=UDP SPT=35643 DPT=80 LEN=45 

NAT Table

Chain PREROUTING (policy ACCEPT 1909 packets, 286K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain INPUT (policy ACCEPT 169 packets, 9153 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain OUTPUT (policy ACCEPT 4135 packets, 278K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain POSTROUTING (policy ACCEPT 2558 packets, 174K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
 1333 80389 MASQUERADE  all  --  *      eth1    192.168.31.0/24      0.0.0.0/0  
         

Mangle Table

Chain PREROUTING (policy ACCEPT 489K packets, 36M bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain INPUT (policy ACCEPT 462K packets, 19M bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain FORWARD (policy ACCEPT 26497 packets, 17M bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
 165K   98M MARK       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         MARK and 0xffffff00

Chain OUTPUT (policy ACCEPT 574K packets, 2326M bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain POSTROUTING (policy ACCEPT 598K packets, 2342M bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Raw Table

Chain PREROUTING (policy ACCEPT 489K packets, 36M bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:10080 CT helper amanda
 5002  295K CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:21 CT helper ftp
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:1719 CT helper RAS
    0     0 CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:1720 CT helper Q.931
    0     0 CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:6667 CT helper irc
    2   156 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:137 CT helper netbios-ns
    0     0 CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:1723 CT helper pptp
    0     0 CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:6566 CT helper sane
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:5060 CT helper sip
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:161 CT helper snmp
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:69 CT helper tftp

Chain OUTPUT (policy ACCEPT 574K packets, 2325M bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:10080 CT helper amanda
    0     0 CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:21 CT helper ftp
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:1719 CT helper RAS
    0     0 CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:1720 CT helper Q.931
    0     0 CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:6667 CT helper irc
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:137 CT helper netbios-ns
    0     0 CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:1723 CT helper pptp
    0     0 CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:6566 CT helper sane
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:5060 CT helper sip
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:161 CT helper snmp
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:69 CT helper tftp

Conntrack Table (131 out of 61440)

ipv4     2 udp      17 19 src=192.168.8.100 dst=192.168.8.1 sport=49824 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=49824 mark=0 zone=0 
use=2
ipv4     2 udp      17 21 src=192.168.32.103 dst=192.168.8.1 sport=50248 
dport=53 [UNREPLIED] src=192.168.8.1 dst=192.168.32.103 sport=53 dport=50248 
mark=0 zone=0 use=2
ipv4     2 udp      17 3 src=192.168.8.100 dst=192.168.8.1 sport=42472 dport=53 
src=192.168.8.1 dst=192.168.8.100 sport=53 dport=42472 mark=0 zone=0 use=2
ipv4     2 udp      17 2 src=192.168.8.100 dst=192.168.8.1 sport=52461 dport=53 
src=192.168.8.1 dst=192.168.8.100 sport=53 dport=52461 mark=0 zone=0 use=2
ipv4     2 udp      17 9 src=192.168.8.100 dst=192.168.8.1 sport=53393 dport=53 
src=192.168.8.1 dst=192.168.8.100 sport=53 dport=53393 mark=0 zone=0 use=2
ipv4     2 tcp      6 431530 ESTABLISHED src=192.168.31.106 dst=40.67.254.36 
sport=49888 dport=443 src=40.67.254.36 dst=192.168.8.100 sport=443 dport=49888 
[ASSURED] mark=0 zone=0 use=2
ipv4     2 udp      17 11 src=192.168.8.100 dst=192.168.8.1 sport=43031 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=43031 mark=0 zone=0 
use=2
ipv4     2 udp      17 13 src=192.168.8.100 dst=192.168.8.1 sport=50659 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=50659 mark=0 zone=0 
use=2
ipv4     2 udp      17 29 src=192.168.8.100 dst=192.168.8.1 sport=42554 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=42554 mark=0 zone=0 
use=2
ipv4     2 udp      17 29 src=192.168.8.100 dst=192.168.8.1 sport=48993 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=48993 mark=0 zone=0 
use=2
ipv4     2 udp      17 28 src=192.168.8.100 dst=192.168.8.1 sport=45445 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=45445 mark=0 zone=0 
use=2
ipv4     2 udp      17 8 src=192.168.8.100 dst=192.168.8.1 sport=53705 dport=53 
src=192.168.8.1 dst=192.168.8.100 sport=53 dport=53705 mark=0 zone=0 use=2
ipv4     2 udp      17 1 src=192.168.32.103 dst=192.168.8.1 sport=54139 
dport=53 [UNREPLIED] src=192.168.8.1 dst=192.168.32.103 sport=53 dport=54139 
mark=0 zone=0 use=2
ipv4     2 tcp      6 1 CLOSE src=192.168.31.106 dst=104.16.51.111 sport=51045 
dport=443 src=104.16.51.111 dst=192.168.8.100 sport=443 dport=51045 [ASSURED] 
mark=0 zone=0 use=2
ipv4     2 tcp      6 97 TIME_WAIT src=192.168.31.106 dst=216.58.206.66 
sport=51043 dport=443 src=216.58.206.66 dst=192.168.8.100 sport=443 dport=51043 
[ASSURED] mark=0 zone=0 use=2
ipv4     2 udp      17 9 src=192.168.31.106 dst=192.168.8.1 sport=65111 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=65111 mark=0 zone=0 
use=2
ipv4     2 tcp      6 114 TIME_WAIT src=192.168.31.106 dst=104.16.53.111 
sport=51079 dport=443 src=104.16.53.111 dst=192.168.8.100 sport=443 dport=51079 
[ASSURED] mark=0 zone=0 use=2
ipv4     2 udp      17 160 src=192.168.31.106 dst=192.168.8.1 sport=58553 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=58553 [ASSURED] 
mark=0 zone=0 use=2
ipv4     2 udp      17 24 src=192.168.8.100 dst=192.168.8.1 sport=38718 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=38718 mark=0 zone=0 
use=2
ipv4     2 tcp      6 431999 ESTABLISHED src=192.168.31.106 dst=192.168.32.20 
sport=50620 dport=22 src=192.168.32.20 dst=192.168.31.106 sport=22 dport=50620 
[ASSURED] mark=0 zone=0 use=2
ipv4     2 tcp      6 1 CLOSE src=192.168.31.106 dst=216.58.205.68 sport=51033 
dport=443 src=216.58.205.68 dst=192.168.8.100 sport=443 dport=51033 [ASSURED] 
mark=0 zone=0 use=2
ipv4     2 udp      17 17 src=192.168.8.100 dst=192.168.8.1 sport=54651 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=54651 mark=0 zone=0 
use=2
ipv4     2 udp      17 10 src=192.168.8.100 dst=192.168.8.1 sport=54242 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=54242 mark=0 zone=0 
use=2
ipv4     2 tcp      6 24 TIME_WAIT src=192.168.31.106 dst=52.155.169.137 
sport=51086 dport=443 src=52.155.169.137 dst=192.168.8.100 sport=443 
dport=51086 [ASSURED] mark=0 zone=0 use=2
ipv4     2 udp      17 12 src=192.168.8.100 dst=192.168.8.1 sport=59509 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=59509 mark=0 zone=0 
use=2
ipv4     2 tcp      6 37 TIME_WAIT src=192.168.8.100 dst=130.158.75.46 
sport=52038 dport=80 src=130.158.75.46 dst=192.168.8.100 sport=80 dport=52038 
[ASSURED] mark=0 zone=0 use=2
ipv4     2 udp      17 28 src=192.168.8.100 dst=192.168.8.1 sport=53742 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=53742 mark=0 zone=0 
use=2
ipv4     2 tcp      6 102877 ESTABLISHED src=192.168.31.106 dst=40.67.251.132 
sport=49869 dport=443 src=40.67.251.132 dst=192.168.8.100 sport=443 dport=49869 
[ASSURED] mark=0 zone=0 use=2
ipv4     2 udp      17 1 src=192.168.8.100 dst=192.168.8.1 sport=46920 dport=53 
src=192.168.8.1 dst=192.168.8.100 sport=53 dport=46920 mark=0 zone=0 use=2
ipv4     2 udp      17 5 src=192.168.8.100 dst=192.168.8.1 sport=53858 dport=53 
src=192.168.8.1 dst=192.168.8.100 sport=53 dport=53858 mark=0 zone=0 use=2
ipv4     2 udp      17 26 src=192.168.32.103 dst=192.168.8.1 sport=44442 
dport=53 [UNREPLIED] src=192.168.8.1 dst=192.168.32.103 sport=53 dport=44442 
mark=0 zone=0 use=2
ipv4     2 udp      17 26 src=192.168.8.100 dst=192.168.8.1 sport=52676 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=52676 mark=0 zone=0 
use=2
ipv4     2 udp      17 0 src=192.168.32.103 dst=192.168.8.1 sport=43305 
dport=53 [UNREPLIED] src=192.168.8.1 dst=192.168.32.103 sport=53 dport=43305 
mark=0 zone=0 use=2
ipv4     2 tcp      6 431995 ESTABLISHED src=192.168.31.106 dst=192.168.32.103 
sport=51088 dport=80 src=192.168.32.103 dst=192.168.31.106 sport=80 dport=51088 
[ASSURED] mark=0 zone=0 use=2
ipv4     2 udp      17 16 src=192.168.8.100 dst=192.168.8.1 sport=37253 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=37253 mark=0 zone=0 
use=2
ipv4     2 tcp      6 116 TIME_WAIT src=192.168.31.106 dst=104.18.70.113 
sport=51047 dport=443 src=104.18.70.113 dst=192.168.8.100 sport=443 dport=51047 
[ASSURED] mark=0 zone=0 use=2
ipv4     2 udp      17 21 src=192.168.8.100 dst=192.168.8.1 sport=57767 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=57767 mark=0 zone=0 
use=2
ipv4     2 udp      17 32 src=192.168.8.100 dst=192.168.8.1 sport=38273 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=38273 [ASSURED] 
mark=0 zone=0 use=2
ipv4     2 tcp      6 431987 ESTABLISHED src=192.168.8.100 dst=130.158.6.124 
sport=50760 dport=443 src=130.158.6.124 dst=192.168.8.100 sport=443 dport=50760 
[ASSURED] mark=0 zone=0 use=2
ipv4     2 udp      17 10 src=192.168.8.100 dst=192.168.8.1 sport=54156 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=54156 mark=0 zone=0 
use=2
ipv4     2 tcp      6 1 CLOSE src=192.168.31.106 dst=216.58.208.136 sport=51054 
dport=443 src=216.58.208.136 dst=192.168.8.100 sport=443 dport=51054 [ASSURED] 
mark=0 zone=0 use=2
ipv4     2 tcp      6 102412 ESTABLISHED src=192.168.31.100 dst=172.253.118.188 
sport=42338 dport=443 src=172.253.118.188 dst=192.168.8.100 sport=443 
dport=42338 [ASSURED] mark=0 zone=0 use=2
ipv4     2 tcp      6 96 TIME_WAIT src=192.168.31.106 dst=216.58.206.66 
sport=51041 dport=443 src=216.58.206.66 dst=192.168.8.100 sport=443 dport=51041 
[ASSURED] mark=0 zone=0 use=2
ipv4     2 tcp      6 431991 ESTABLISHED src=192.168.31.106 dst=192.168.32.103 
sport=51087 dport=80 src=192.168.32.103 dst=192.168.31.106 sport=80 dport=51087 
[ASSURED] mark=0 zone=0 use=2
ipv4     2 udp      17 83 src=192.168.31.106 dst=192.168.8.1 sport=51576 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=51576 [ASSURED] 
mark=0 zone=0 use=2
ipv4     2 udp      17 6 src=192.168.8.100 dst=192.168.8.1 sport=43858 dport=53 
src=192.168.8.1 dst=192.168.8.100 sport=53 dport=43858 mark=0 zone=0 use=2
ipv4     2 udp      17 16 src=192.168.32.103 dst=192.168.8.1 sport=41277 
dport=53 [UNREPLIED] src=192.168.8.1 dst=192.168.32.103 sport=53 dport=41277 
mark=0 zone=0 use=2
ipv4     2 udp      17 25 src=192.168.8.100 dst=192.168.8.1 sport=34897 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=34897 mark=0 zone=0 
use=2
ipv4     2 udp      17 12 src=192.168.8.100 dst=192.168.8.1 sport=34972 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=34972 mark=0 zone=0 
use=2
ipv4     2 tcp      6 108 TIME_WAIT src=192.168.31.106 dst=104.18.71.113 
sport=51056 dport=443 src=104.18.71.113 dst=192.168.8.100 sport=443 dport=51056 
[ASSURED] mark=0 zone=0 use=2
ipv4     2 tcp      6 431969 ESTABLISHED src=192.168.31.106 dst=2.22.32.162 
sport=51032 dport=443 src=2.22.32.162 dst=192.168.8.100 sport=443 dport=51032 
[ASSURED] mark=0 zone=0 use=2
ipv4     2 udp      17 6 src=192.168.8.100 dst=192.168.8.1 sport=39570 dport=53 
src=192.168.8.1 dst=192.168.8.100 sport=53 dport=39570 mark=0 zone=0 use=2
ipv4     2 udp      17 162 src=192.168.8.100 dst=130.158.6.116 sport=58776 
dport=5004 src=130.158.6.116 dst=192.168.8.100 sport=5004 dport=58776 [ASSURED] 
mark=0 zone=0 use=2
ipv4     2 udp      17 9 src=192.168.31.106 dst=192.168.8.1 sport=56328 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=56328 mark=0 zone=0 
use=2
ipv4     2 tcp      6 87 TIME_WAIT src=192.168.31.106 dst=192.168.32.20 
sport=51089 dport=26969 src=192.168.32.20 dst=192.168.31.106 sport=26969 
dport=51089 [ASSURED] mark=0 zone=0 use=2
ipv4     2 udp      17 8 src=192.168.8.100 dst=192.168.8.1 sport=37389 dport=53 
src=192.168.8.1 dst=192.168.8.100 sport=53 dport=37389 mark=0 zone=0 use=2
ipv4     2 udp      17 18 src=192.168.8.100 dst=192.168.8.1 sport=53207 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=53207 mark=0 zone=0 
use=2
ipv4     2 tcp      6 431980 ESTABLISHED src=192.168.31.106 dst=204.79.197.200 
sport=51090 dport=443 src=204.79.197.200 dst=192.168.8.100 sport=443 
dport=51090 [ASSURED] mark=0 zone=0 use=2
ipv4     2 udp      17 20 src=192.168.8.100 dst=192.168.8.1 sport=49860 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=49860 mark=0 zone=0 
use=2
ipv4     2 udp      17 11 src=192.168.8.100 dst=192.168.8.1 sport=60966 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=60966 mark=0 zone=0 
use=2
ipv4     2 udp      17 23 src=192.168.8.100 dst=192.168.8.1 sport=37572 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=37572 mark=0 zone=0 
use=2
ipv4     2 udp      17 2 src=192.168.8.100 dst=192.168.8.1 sport=42163 dport=53 
src=192.168.8.1 dst=192.168.8.100 sport=53 dport=42163 mark=0 zone=0 use=2
ipv4     2 udp      17 25 src=192.168.32.103 dst=192.168.8.1 sport=53573 
dport=53 [UNREPLIED] src=192.168.8.1 dst=192.168.32.103 sport=53 dport=53573 
mark=0 zone=0 use=2
ipv4     2 tcp      6 431980 ESTABLISHED src=192.168.31.106 dst=104.18.25.243 
sport=51091 dport=80 src=104.18.25.243 dst=192.168.8.100 sport=80 dport=51091 
[ASSURED] mark=0 zone=0 use=2
ipv4     2 tcp      6 0 CLOSE src=192.168.31.106 dst=216.58.205.67 sport=51076 
dport=443 src=216.58.205.67 dst=192.168.8.100 sport=443 dport=51076 [ASSURED] 
mark=0 zone=0 use=2
ipv4     2 udp      17 4 src=192.168.8.100 dst=192.168.8.1 sport=60733 dport=53 
src=192.168.8.1 dst=192.168.8.100 sport=53 dport=60733 mark=0 zone=0 use=2
ipv4     2 udp      17 5 src=192.168.8.100 dst=192.168.8.1 sport=47247 dport=53 
src=192.168.8.1 dst=192.168.8.100 sport=53 dport=47247 mark=0 zone=0 use=2
ipv4     2 udp      17 164 src=192.168.8.100 dst=192.168.8.1 sport=47998 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=47998 [ASSURED] 
mark=0 zone=0 use=2
ipv4     2 udp      17 5 src=192.168.32.103 dst=192.168.8.1 sport=44985 
dport=53 [UNREPLIED] src=192.168.8.1 dst=192.168.32.103 sport=53 dport=44985 
mark=0 zone=0 use=2
ipv4     2 udp      17 26 src=192.168.8.100 dst=192.168.8.1 sport=41592 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=41592 mark=0 zone=0 
use=2
ipv4     2 tcp      6 431947 ESTABLISHED src=192.168.31.106 dst=54.70.97.159 
sport=50667 dport=443 src=54.70.97.159 dst=192.168.8.100 sport=443 dport=50667 
[ASSURED] mark=0 zone=0 use=2
ipv4     2 udp      17 6 src=192.168.32.103 dst=192.168.8.1 sport=49965 
dport=53 [UNREPLIED] src=192.168.8.1 dst=192.168.32.103 sport=53 dport=49965 
mark=0 zone=0 use=2
ipv4     2 udp      17 13 src=192.168.8.100 dst=192.168.8.1 sport=44890 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=44890 mark=0 zone=0 
use=2
ipv4     2 udp      17 20 src=192.168.32.103 dst=192.168.8.1 sport=33960 
dport=53 [UNREPLIED] src=192.168.8.1 dst=192.168.32.103 sport=53 dport=33960 
mark=0 zone=0 use=2
ipv4     2 udp      17 22 src=192.168.8.100 dst=192.168.8.1 sport=54425 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=54425 mark=0 zone=0 
use=2
ipv4     2 tcp      6 103035 ESTABLISHED src=192.168.31.100 dst=108.177.97.188 
sport=54062 dport=443 src=108.177.97.188 dst=192.168.8.100 sport=443 
dport=54062 [ASSURED] mark=0 zone=0 use=2
ipv4     2 udp      17 24 src=192.168.8.100 dst=192.168.8.1 sport=48097 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=48097 mark=0 zone=0 
use=2
ipv4     2 udp      17 129 src=192.168.8.100 dst=193.204.114.232 sport=123 
dport=123 src=193.204.114.232 dst=192.168.8.100 sport=123 dport=123 [ASSURED] 
mark=0 zone=0 use=2
ipv4     2 udp      17 10 src=192.168.32.103 dst=192.168.8.1 sport=52736 
dport=53 [UNREPLIED] src=192.168.8.1 dst=192.168.32.103 sport=53 dport=52736 
mark=0 zone=0 use=2
ipv4     2 udp      17 7 src=192.168.8.100 dst=192.168.8.1 sport=37804 dport=53 
src=192.168.8.1 dst=192.168.8.100 sport=53 dport=37804 mark=0 zone=0 use=2
ipv4     2 udp      17 25 src=192.168.8.100 dst=192.168.8.1 sport=38887 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=38887 mark=0 zone=0 
use=2
ipv4     2 udp      17 20 src=192.168.8.100 dst=192.168.8.1 sport=45089 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=45089 mark=0 zone=0 
use=2
ipv4     2 udp      17 18 src=192.168.8.100 dst=192.168.8.1 sport=43435 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=43435 mark=0 zone=0 
use=2
ipv4     2 tcp      6 108 TIME_WAIT src=192.168.31.106 dst=216.58.208.138 
sport=51072 dport=443 src=216.58.208.138 dst=192.168.8.100 sport=443 
dport=51072 [ASSURED] mark=0 zone=0 use=2
ipv4     2 udp      17 22 src=192.168.8.100 dst=192.168.8.1 sport=53897 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=53897 mark=0 zone=0 
use=2
ipv4     2 udp      17 3 src=192.168.8.100 dst=192.168.8.1 sport=38992 dport=53 
src=192.168.8.1 dst=192.168.8.100 sport=53 dport=38992 mark=0 zone=0 use=2
ipv4     2 udp      17 17 src=192.168.8.100 dst=192.168.8.1 sport=34735 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=34735 mark=0 zone=0 
use=2
ipv4     2 tcp      6 431996 ESTABLISHED src=192.168.31.106 dst=192.168.32.20 
sport=49778 dport=21 src=192.168.32.20 dst=192.168.31.106 sport=21 dport=49778 
[ASSURED] mark=0 zone=0 use=3
ipv4     2 udp      17 15 src=192.168.8.100 dst=192.168.8.1 sport=56033 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=56033 mark=0 zone=0 
use=2
ipv4     2 udp      17 15 src=192.168.8.100 dst=192.168.8.1 sport=35471 
dport=53 src=192.168.8.1 dst=192.168.8.100 sport=53 dport=35471 mark=0 zone=0 
use=2
ipv4     2 tcp      6 108 TIME_WAIT src=192.168.31.106 dst=104.16.53.111 
sport=51053 dport=443 src=104.16.53.111 dst=192.168.8.100 sport=443 dport=51053 
[ASSURED] mark=0 zone=0 use=2

IP Configuration

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group 
default qlen 1000
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,PROMISC,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast 
state UP group default qlen 1000
    inet 192.168.32.20/24 brd 192.168.32.255 scope global eth0
       valid_lft forever preferred_lft forever
3: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP 
group default qlen 1000
    inet 192.168.31.20/24 brd 192.168.31.255 scope global wlan0
       valid_lft forever preferred_lft forever
4: eth1: <BROADCAST,MULTICAST,PROMISC,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast 
state UP group default qlen 1000
    inet 192.168.8.100/24 brd 192.168.8.255 scope global eth1
       valid_lft forever preferred_lft forever
16: tap_vpntap: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast 
state UNKNOWN group default qlen 1000
    inet 192.168.30.254/24 scope global tap_vpntap
       valid_lft forever preferred_lft forever

IP Stats

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode 
DEFAULT group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    RX: bytes  packets  errors  dropped overrun mcast   
    90367234   971591   0       0       0       0       
    TX: bytes  packets  errors  dropped carrier collsns 
    90367234   971591   0       0       0       0       
2: eth0: <BROADCAST,MULTICAST,PROMISC,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast 
state UP mode DEFAULT group default qlen 1000
    link/ether b8:27:eb:47:8a:54 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    11070505491 7958414  18      9       0       0       
    TX: bytes  packets  errors  dropped carrier collsns 
    310805711  3979956  0       0       0       0       
3: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP 
mode DEFAULT group default qlen 1000
    link/ether b8:27:eb:12:df:01 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    177940986  3990194  0       0       0       507     
    TX: bytes  packets  errors  dropped carrier collsns 
    3550477906 13583833 0       0       0       0       
4: eth1: <BROADCAST,MULTICAST,PROMISC,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast 
state UP mode DEFAULT group default qlen 1000
    link/ether 0c:5b:8f:27:9a:64 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    775780061  1896905  0       0       0       0       
    TX: bytes  packets  errors  dropped carrier collsns 
    284478605  1677162  0       0       0       0       
16: tap_vpntap: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast 
state UNKNOWN mode DEFAULT group default qlen 1000
    link/ether 5e:c5:a2:3f:6a:7f brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    7149819    103038   0       0       0       0       
    TX: bytes  packets  errors  dropped carrier collsns 
    7109602    85838    0       0       0       0       

Bridges

bridge name     bridge id               STP enabled     interfaces

Routing Rules

0:      from all lookup local 
32766:  from all lookup main 
32767:  from all lookup default 

Table default:


Table local:

local 192.168.8.100 dev eth1 proto kernel scope host src 192.168.8.100
local 192.168.32.20 dev eth0 proto kernel scope host src 192.168.32.20
local 192.168.31.20 dev wlan0 proto kernel scope host src 192.168.31.20
local 192.168.30.254 dev tap_vpntap proto kernel scope host src 192.168.30.254
local 127.0.0.1 dev lo proto kernel scope host src 127.0.0.1
broadcast 192.168.8.255 dev eth1 proto kernel scope link src 192.168.8.100
broadcast 192.168.8.0 dev eth1 proto kernel scope link src 192.168.8.100
broadcast 192.168.32.255 dev eth0 proto kernel scope link src 192.168.32.20
broadcast 192.168.32.0 dev eth0 proto kernel scope link src 192.168.32.20
broadcast 192.168.31.255 dev wlan0 proto kernel scope link src 192.168.31.20
broadcast 192.168.31.0 dev wlan0 proto kernel scope link src 192.168.31.20
broadcast 192.168.30.255 dev tap_vpntap proto kernel scope link src 
192.168.30.254
broadcast 192.168.30.0 dev tap_vpntap proto kernel scope link src 192.168.30.254
broadcast 127.255.255.255 dev lo proto kernel scope link src 127.0.0.1
broadcast 127.0.0.0 dev lo proto kernel scope link src 127.0.0.1
local 127.0.0.0/8 dev lo proto kernel scope host src 127.0.0.1

Table main:

192.168.8.0/24 dev eth1 proto kernel scope link src 192.168.8.100
192.168.32.0/24 dev eth0 proto kernel scope link src 192.168.32.20
192.168.31.0/24 dev wlan0 proto kernel scope link src 192.168.31.20
192.168.30.0/24 dev tap_vpntap proto kernel scope link src 192.168.30.254
default via 192.168.8.1 dev eth1

Per-IP Counters

   iptaccount is not installed

NF Accounting

No NF Accounting defined (nfacct not found)

Events


PFKEY SPD


PFKEY SAD


/proc

   /proc/version = Linux version 4.19.66-v7+ (dom@buildbot) (gcc version 4.9.3 
(crosstool-NG crosstool-ng-1.22.0-88-g8460611)) #1253 SMP Thu Aug 15 11:49:46 
BST 2019
   /proc/sys/net/ipv4/ip_forward = 1
   /proc/sys/net/ipv4/icmp_echo_ignore_all = 0
   /proc/sys/net/ipv4/conf/all/proxy_arp = 0
   /proc/sys/net/ipv4/conf/all/arp_filter = 1
   /proc/sys/net/ipv4/conf/all/arp_ignore = 0
   /proc/sys/net/ipv4/conf/all/rp_filter = 0
   /proc/sys/net/ipv4/conf/all/log_martians = 0
   /proc/sys/net/ipv4/conf/default/proxy_arp = 0
   /proc/sys/net/ipv4/conf/default/arp_filter = 0
   /proc/sys/net/ipv4/conf/default/arp_ignore = 0
   /proc/sys/net/ipv4/conf/default/rp_filter = 0
   /proc/sys/net/ipv4/conf/default/log_martians = 1
   /proc/sys/net/ipv4/conf/eth0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/eth0/arp_filter = 0
   /proc/sys/net/ipv4/conf/eth0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/eth0/rp_filter = 1
   /proc/sys/net/ipv4/conf/eth0/log_martians = 1
   /proc/sys/net/ipv4/conf/eth1/proxy_arp = 0
   /proc/sys/net/ipv4/conf/eth1/arp_filter = 0
   /proc/sys/net/ipv4/conf/eth1/arp_ignore = 0
   /proc/sys/net/ipv4/conf/eth1/rp_filter = 1
   /proc/sys/net/ipv4/conf/eth1/log_martians = 1
   /proc/sys/net/ipv4/conf/lo/proxy_arp = 0
   /proc/sys/net/ipv4/conf/lo/arp_filter = 0
   /proc/sys/net/ipv4/conf/lo/arp_ignore = 0
   /proc/sys/net/ipv4/conf/lo/rp_filter = 0
   /proc/sys/net/ipv4/conf/lo/log_martians = 1
   /proc/sys/net/ipv4/conf/tap_vpntap/proxy_arp = 0
   /proc/sys/net/ipv4/conf/tap_vpntap/arp_filter = 0
   /proc/sys/net/ipv4/conf/tap_vpntap/arp_ignore = 0
   /proc/sys/net/ipv4/conf/tap_vpntap/rp_filter = 1
   /proc/sys/net/ipv4/conf/tap_vpntap/log_martians = 1
   /proc/sys/net/ipv4/conf/wlan0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/wlan0/arp_filter = 0
   /proc/sys/net/ipv4/conf/wlan0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/wlan0/rp_filter = 1
   /proc/sys/net/ipv4/conf/wlan0/log_martians = 1

ARP

? (54.213.37.69) at <incomplete> on eth1
? (192.168.32.103) at ec:71:db:67:33:80 [ether] on eth0
? (91.228.166.14) at <incomplete> on eth0
? (216.58.208.170) at <incomplete> on eth1
? (104.83.142.13) at <incomplete> on eth1
? (20.190.3.175) at <incomplete> on eth1
? (38.90.226.13) at <incomplete> on eth1
? (34.218.161.49) at <incomplete> on eth1
? (192.168.31.100) at <incomplete> on wlan0
? (192.168.31.106) at 60:f2:62:0e:54:57 [ether] on wlan0
? (104.83.142.13) at <incomplete> on eth0
? (216.58.208.138) at <incomplete> on eth1
? (91.228.166.14) at <incomplete> on eth1
? (216.58.209.42) at <incomplete> on eth1
? (38.90.226.13) at <incomplete> on eth0
? (130.158.6.123) at <incomplete> on eth0
? (13.83.149.67) at <incomplete> on eth0
? (130.158.6.123) at <incomplete> on eth1
? (192.168.30.10) at <incomplete> on tap_vpntap
? (130.158.6.116) at <incomplete> on eth0
? (13.83.149.67) at <incomplete> on eth1
? (216.58.205.74) at <incomplete> on eth0
? (130.158.6.116) at <incomplete> on eth1
? (216.58.198.10) at <incomplete> on eth0
? (52.250.46.232) at <incomplete> on eth1
? (172.217.21.74) at <incomplete> on eth0
? (130.158.6.56) at <incomplete> on eth0
? (192.168.8.101) at <incomplete> on eth1
? (192.168.8.1) at 00:0d:87:8e:4b:ac [ether] on eth1
? (216.58.206.74) at <incomplete> on eth0

Modules

iptable_filter         16384  1
iptable_mangle         16384  1
iptable_nat            16384  1
iptable_raw            16384  1
ip_tables              24576  15 
iptable_mangle,iptable_filter,iptable_raw,iptable_nat
ipt_MASQUERADE         16384  1
ipt_REJECT             16384  4
ipt_rpfilter           16384  0
nf_conncount           20480  1 xt_connlimit
nf_conntrack          135168  31 
nf_nat_pptp,nf_conntrack_sip,nf_conntrack_snmp,nf_conncount,nf_conntrack_irc,xt_nat,nf_nat_h323,nf_conntrack_ftp,nf_nat_snmp_basic,nf_nat_sip,nf_conntrack_tftp,ipt_MASQUERADE,nf_nat_irc,xt_connmark,nf_conntrack_pptp,nf_conntrack_amanda,xt_helper,nf_conntrack_broadcast,nf_nat_ftp,nf_conntrack_sane,nf_nat_amanda,xt_connlimit,nf_conntrack_netlink,nf_conntrack_netbios_ns,nf_conntrack_proto_gre,xt_CT,nf_conntrack_h323,xt_conntrack,nf_nat_ipv4,nf_nat_tftp,nf_nat
nf_conntrack_amanda    16384  3 nf_nat_amanda
nf_conntrack_broadcast    16384  2 nf_conntrack_snmp,nf_conntrack_netbios_ns
nf_conntrack_ftp       16384  3 nf_nat_ftp
nf_conntrack_h323      57344  5 nf_nat_h323
nf_conntrack_irc       16384  3 nf_nat_irc
nf_conntrack_netbios_ns    16384  2
nf_conntrack_netlink    40960  0
nf_conntrack_pptp      16384  3 nf_nat_pptp
nf_conntrack_proto_gre    16384  1 nf_conntrack_pptp
nf_conntrack_sane      16384  2
nf_conntrack_sip       32768  3 nf_nat_sip
nf_conntrack_snmp      16384  3 nf_nat_snmp_basic
nf_conntrack_tftp      16384  3 nf_nat_tftp
nf_defrag_ipv4         16384  2 nf_conntrack,xt_TPROXY
nf_defrag_ipv6         20480  2 nf_conntrack,xt_TPROXY
nf_log_common          16384  1 nf_log_ipv4
nf_log_ipv4            16384  12
nf_nat                 36864  10 
nf_nat_pptp,nf_nat_proto_gre,xt_nat,nf_nat_h323,nf_nat_sip,nf_nat_irc,nf_nat_ftp,nf_nat_amanda,nf_nat_ipv4,nf_nat_tftp
nf_nat_amanda          16384  0
nf_nat_ftp             16384  0
nf_nat_h323            20480  0
nf_nat_ipv4            16384  2 ipt_MASQUERADE,iptable_nat
nf_nat_irc             16384  0
nf_nat_pptp            16384  0
nf_nat_proto_gre       16384  1 nf_nat_pptp
nf_nat_sip             20480  0
nf_nat_snmp_basic      16384  0
nf_nat_tftp            16384  0
nf_reject_ipv4         16384  1 ipt_REJECT
nf_tproxy_ipv4         16384  1 xt_TPROXY
nf_tproxy_ipv6         16384  1 xt_TPROXY
xt_addrtype            16384  5
xt_CHECKSUM            16384  0
xt_CLASSIFY            16384  0
xt_comment             16384  45
xt_connlimit           16384  0
xt_connmark            16384  0
xt_conntrack           16384  23
xt_CT                  16384  22
xt_dscp                16384  0
xt_DSCP                16384  0
xt_hashlimit           24576  0
xt_helper              16384  0
xt_iprange             16384  0
xt_length              16384  0
xt_limit               16384  2
xt_LOG                 16384  12
xt_mark                16384  1
xt_multiport           16384  6
xt_nat                 16384  0
xt_NFLOG               16384  0
xt_NFQUEUE             16384  0
xt_owner               16384  0
xt_physdev             16384  0
xt_pkttype             16384  0
xt_policy              16384  0
xt_realm               16384  0
xt_recent              20480  1
xt_statistic           16384  0
xt_tcpmss              16384  0
xt_TCPMSS              16384  1
xt_tcpudp              16384  62
xt_time                16384  0
xt_TPROXY              16384  0

Shorewall has detected the following iptables/netfilter capabilities:
   ACCOUNT Target (ACCOUNT_TARGET): Not available
   Address Type Match (ADDRTYPE): Available
   Amanda Helper: Available
   Arptables JF (ARPTABLESJF): Not available
   AUDIT Target (AUDIT_TARGET): Not available
   Basic Ematch (BASIC_EMATCH): Available
   Basic Filter (BASIC_FILTER): Available
   Capabilities Version (CAPVERSION): 50004
   Checksum Target (CHECKSUM_TARGET): Available
   CLASSIFY Target (CLASSIFY_TARGET): Available
   Comments (COMMENTS): Available
   Condition Match (CONDITION_MATCH): Not available
   Connection Tracking Match (CONNTRACK_MATCH): Available
   Connlimit Match (CONNLIMIT_MATCH): Available
   Connmark Match (CONNMARK_MATCH): Available
   CONNMARK Target (CONNMARK): Available
   CT Target (CT_TARGET): Available
   DSCP Match (DSCP_MATCH): Available
   DSCP Target (DSCP_TARGET): Available
   Enhanced Multi-port Match (EMULIPORT): Available
   Extended Connection Tracking Match Support (NEW_CONNTRACK_MATCH): Available
   Extended Connmark Match (XCONNMARK_MATCH): Available
   Extended CONNMARK Target (XCONNMARK): Available
   Extended MARK Target 2 (EXMARK): Available
   Extended MARK Target (XMARK): Available
   Extended Multi-port Match (XMULIPORT): Available
   Extended REJECT (ENHANCED_REJECT): Available
   FLOW Classifier (FLOW_FILTER): Available
   FTP-0 Helper: Not available
   FTP Helper: Available
   fwmark route mask (FWMARK_RT_MASK): Available
   Geo IP Match (GEOIP_MATCH): Not available
   Goto Support (GOTO_TARGET): Available
   H323 Helper: Available
   Hashlimit Match (HASHLIMIT_MATCH): Available
   Header Match (HEADER_MATCH): Not available
   Helper Match (HELPER_MATCH): Available
   Iface Match (IFACE_MATCH): Not available
   IMQ Target (IMQ_TARGET): Not available
   IPMARK Target (IPMARK_TARGET): Not available
   IPP2P Match (IPP2P_MATCH): Not available
   IP range Match(IPRANGE_MATCH): Available
   ipset V5 (IPSET_V5): Not available
   iptables -S (IPTABLES_S): Available
   iptables --wait option (WAIT_OPTION): Available
   IRC-0 Helper: Not available
   IRC Helper: Available
   Kernel Version (KERNELVERSION): 41966
   LOGMARK Target (LOGMARK_TARGET): Not available
   LOG Target (LOG_TARGET): Available
   Mangle FORWARD Chain (MANGLE_FORWARD): Available
   Mark in the filter table (MARK_ANYWHERE): Available
   MARK Target (MARK): Available
   MASQUERADE Target (MASQUERADE_TGT): Available
   Multi-port Match (MULTIPORT): Available
   NAT (NAT_ENABLED): Available
   Netbios_ns Helper: Available
   New tos Match (NEW_TOS_MATCH): Available
   NFAcct Match: Not available
   NFLOG Target (NFLOG_TARGET): Available
   NFQUEUE Target (NFQUEUE_TARGET): Available
   Owner Match (OWNER_MATCH): Available
   Owner Name Match (OWNER_NAME_MATCH): Available
   Packet length Match (LENGTH_MATCH): Available
   Packet Mangling (MANGLE_ENABLED): Available
   Packet Type Match (USEPKTTYPE): Available
   Persistent SNAT (PERSISTENT_SNAT): Available
   Physdev-is-bridged Support (PHYSDEV_BRIDGE): Available
   Physdev Match (PHYSDEV_MATCH): Available
   Policy Match (POLICY_MATCH): Available
   PPTP Helper: Available
   Rawpost Table (RAWPOST_TABLE): Not available
   Raw Table (RAW_TABLE): Available
   Realm Match (REALM_MATCH): Available
   Recent Match "--reap" option (REAP_OPTION): Available
   Recent Match (RECENT_MATCH): Available
   Repeat match (KLUDGEFREE): Available
   RPFilter Match (RPFILTER_MATCH): Available
   SANE-0 Helper: Not available
   SANE Helper: Available
   SIP-0 Helper: Not available
   SIP Helper: Available
   SNMP Helper: Available
   Statistic Match (STATISTIC_MATCH): Available
   TARPIT Target (TARPIT_TARGET): Not available
   TCPMSS Match (TCPMSS_MATCH): Available
   TCPMSS Target (TCPMSS_TARGET): Available
   TFTP-0 Helper: Not available
   TFTP Helper: Available
   Time Match (TIME_MATCH): Available
   TPROXY Target (TPROXY_TARGET): Available
   UDPLITE Port Redirection (UDPLITEREDIRECT): Not available
   ULOG Target (ULOG_TARGET): Not available

Netid  State      Recv-Q Send-Q Local Address:Port               Peer 
Address:Port              
tcp    LISTEN     0      128       *:992                   *:*                  
 users:(("vpnserver",pid=17682,fd=41))
tcp    LISTEN     0      128       *:1194                  *:*                  
 users:(("vpnserver",pid=17682,fd=43))
tcp    LISTEN     0      128       *:5555                  *:*                  
 users:(("vpnserver",pid=17682,fd=49))
tcp    LISTEN     0      32        *:21                    *:*                  
 users:(("vsftpd",pid=560,fd=3))
tcp    LISTEN     0      128       *:22                    *:*                  
 users:(("sshd",pid=641,fd=3))
tcp    LISTEN     0      128       *:443                   *:*                  
 users:(("vpnserver",pid=17682,fd=37))
tcp    ESTAB      0      0      192.168.32.20:22                 
192.168.31.106:50620               
users:(("sshd",pid=21986,fd=3),("sshd",pid=21971,fd=3))
tcp    ESTAB      0      0      192.168.8.100:50760              
130.158.6.124:443                 users:(("vpnserver",pid=17682,fd=53))
tcp    ESTAB      0      0      192.168.32.20:21                 
192.168.31.106:49778               
users:(("vsftpd",pid=21889,fd=2),("vsftpd",pid=21889,fd=1),("vsftpd",pid=21889,fd=0),("vsftpd",pid=21882,fd=2),("vsftpd",pid=21882,fd=1),("vsftpd",pid=21882,fd=0))
tcp    TIME-WAIT  0      0      192.168.32.20:26969              
192.168.31.106:51089              

Traffic Control

Device lo:
qdisc noqueue 0: root refcnt 2 
 Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 


Device eth0:
qdisc pfifo_fast 0: root refcnt 2 bands 3 priomap  1 2 2 2 1 2 0 0 1 1 1 1 1 1 
1 1
 Sent 263142223 bytes 3979956 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 


Device wlan0:
qdisc pfifo_fast 0: root refcnt 2 bands 3 priomap  1 2 2 2 1 2 0 0 1 1 1 1 1 1 
1 1
 Sent 20404334460 bytes 13583836 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 


Device eth1:
qdisc pfifo_fast 0: root refcnt 2 bands 3 priomap  1 2 2 2 1 2 0 0 1 1 1 1 1 1 
1 1
 Sent 284477045 bytes 1677169 pkt (dropped 0, overlimits 0 requeues 3) 
 backlog 0b 0p requeues 3 


Device tap_vpntap:
qdisc pfifo_fast 0: root refcnt 2 bands 3 priomap  1 2 2 2 1 2 0 0 1 1 1 1 1 1 
1 1
 Sent 7109602 bytes 85838 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 



TC Filters

Device lo:

Device eth0:

Device wlan0:

Device eth1:

Device tap_vpntap:

_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to