sudo iptables -t nat -v -n -L[sudo] password for casa:
Sorry, try again.
[sudo] password for casa:
Chain PREROUTING (policy ACCEPT 11 packets, 1932 bytes)
 pkts bytes target     prot opt in     out     source               destination

Chain INPUT (policy ACCEPT 9 packets, 1316 bytes)
 pkts bytes target     prot opt in     out     source               destination

Chain OUTPUT (policy ACCEPT 215 packets, 19063 bytes)
 pkts bytes target     prot opt in     out     source               destination

Chain POSTROUTING (policy ACCEPT 213 packets, 18889 bytes)
 pkts bytes target     prot opt in     out     source               destination
    0     0 MASQUERADE  tcp  --  *      *       192.168.122.0/24    
!192.168.122.0/24    masq ports: 1024-65535
    1   142 MASQUERADE  udp  --  *      *       192.168.122.0/24    
!192.168.122.0/24    masq ports: 1024-65535
    1    32 MASQUERADE  all  --  *      *       192.168.122.0/24    
!192.168.122.0/24
casa@pcfw2:~$ sudo shorewall safe-restart
Compiling...
Processing /etc/shorewall/shorewall.conf...
Loading Modules...
Compiling /etc/shorewall/zones...
Compiling /etc/shorewall/interfaces...
Determining Hosts in Zones...
Locating Action Files...
Compiling /etc/shorewall/policy...
Compiling policy actions...
Compiling /usr/share/shorewall/action.Reject for chain Reject...
Compiling /usr/share/shorewall/action.Drop for chain Drop...
Adding Anti-smurf Rules
Adding rules for DHCP
Compiling TCP Flags filtering...
Compiling Kernel Route Filtering...
Compiling Martian Logging...
Compiling /etc/shorewall/masq...
Compiling MAC Filtration -- Phase 1...
Compiling /etc/shorewall/rules...
Compiling MAC Filtration -- Phase 2...
Applying Policies...
Generating Rule Matrix...
Creating iptables-restore input...
Compiling iptables-restore input for chain mangle:...
Compiling /etc/shorewall/routestopped...
Shorewall configuration compiled to /var/lib/shorewall/.start
Starting...
Starting Shorewall....
done.
Do you want to accept the new firewall configuration? [y/n] y
New configuration has been accepted
casa@pcfw2:~$ sudo iptables -t nat -v -n -L
Chain PREROUTING (policy ACCEPT 1 packets, 350 bytes)
 pkts bytes target     prot opt in     out     source               destination

Chain INPUT (policy ACCEPT 1 packets, 350 bytes)
 pkts bytes target     prot opt in     out     source               destination

Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination

Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination
    0     0 eth1_masq  all  --  *      eth1    0.0.0.0/0            0.0.0.0/0

Chain eth1_masq (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 MASQUERADE  all  --  *      *       10.0.0.0/8           0.0.0.0/0
    0     0 MASQUERADE  all  --  *      *       169.254.0.0/16       0.0.0.0/0
    0     0 MASQUERADE  all  --  *      *       172.16.0.0/12        0.0.0.0/0
    0     0 MASQUERADE  all  --  *      *       192.168.0.0/16       0.0.0.0/0

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/823922

Title:
  virtualbox overwrite shorewall nat rules

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/823922/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to