Tom,

        I modified the configuration more to match the examples on your
website.  I must have missed the policy example on the previous
documentation, because I didn't have anything in there.

        Here is the output of shorewall status. I still can't get a Win2K
connection to even show anything that resembles an attempted connection.

Shorewall-1.3.10 Status at diablo - Thu Jan  2 14:45:28 UTC 2003

Counters reset Thu Jan  2 14:43:26 UTC 2003

Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     ah   --  lo     *       0.0.0.0/0           
0.0.0.0/0          
    0     0 eth0_in    ah   --  eth0   *       0.0.0.0/0           
0.0.0.0/0          
    3   234 eth1_in    ah   --  eth1   *       0.0.0.0/0           
0.0.0.0/0          
    0     0 ipsec0_in  ah   --  ipsec0 *       0.0.0.0/0           
0.0.0.0/0          
    0     0 ipsec1_in  ah   --  ipsec1 *       0.0.0.0/0           
0.0.0.0/0          
    0     0 ipsec2_in  ah   --  ipsec2 *       0.0.0.0/0           
0.0.0.0/0          
    0     0 common     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          
    0     0 LOG        ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:' 
    0     0 reject     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source              
destination         
  152  136K eth0_fwd   ah   --  eth0   *       0.0.0.0/0           
0.0.0.0/0          
  149 26207 eth1_fwd   ah   --  eth1   *       0.0.0.0/0           
0.0.0.0/0          
    0     0 ipsec0_fwd  ah   --  ipsec0 *       0.0.0.0/0           
0.0.0.0/0          
    0     0 ipsec1_fwd  ah   --  ipsec1 *       0.0.0.0/0           
0.0.0.0/0          
    0     0 ipsec2_fwd  ah   --  ipsec2 *       0.0.0.0/0           
0.0.0.0/0          
    0     0 common     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          
    0     0 LOG        ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          LOG flags 0 level 6 prefix
`Shorewall:FORWARD:REJECT:' 
    0     0 reject     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain OUTPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 DROP       icmp --  *      *       0.0.0.0/0           
0.0.0.0/0          state INVALID 
    0     0 ACCEPT     udp  --  *      eth0    0.0.0.0/0           
0.0.0.0/0          udp dpts:67:68 
    0     0 ACCEPT     ah   --  *      lo      0.0.0.0/0           
0.0.0.0/0          
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW,RELATED,ESTABLISHED 
    0     0 fw2net     ah   --  *      eth0    0.0.0.0/0           
0.0.0.0/0          
    0     0 all2all    ah   --  *      eth1    0.0.0.0/0           
0.0.0.0/0          
    0     0 fw2vpn1    ah   --  *      ipsec0  0.0.0.0/0           
0.0.0.0/0          
    0     0 fw2vpn2    ah   --  *      ipsec1  0.0.0.0/0           
0.0.0.0/0          
    0     0 fw2vpn3    ah   --  *      ipsec2  0.0.0.0/0           
0.0.0.0/0          
    0     0 common     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          
    0     0 LOG        ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          LOG flags 0 level 6 prefix `Shorewall:OUTPUT:REJECT:'
    0     0 reject     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain all2all (24 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
    3   234 common     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          
    0     0 LOG        ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          LOG flags 0 level 6 prefix
`Shorewall:all2all:REJECT:' 
    0     0 reject     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain common (5 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 icmpdef    icmp --  *      *       0.0.0.0/0           
0.0.0.0/0          
    0     0 DROP       tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state INVALID 
    3   234 REJECT     udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          udp dpts:137:139 reject-with icmp-port-unreachable 
    0     0 REJECT     udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          udp dpt:445 reject-with icmp-port-unreachable 
    0     0 reject     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp dpt:135 
    0     0 DROP       udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          udp dpt:1900 
    0     0 DROP       ah   --  *      *       0.0.0.0/0           
255.255.255.255    
    0     0 DROP       ah   --  *      *       0.0.0.0/0           
224.0.0.0/4        
    0     0 reject     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp dpt:113 
    0     0 DROP       udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          udp spt:53 state NEW 
    0     0 DROP       ah   --  *      *       0.0.0.0/0           
65.114.249.255     
    0     0 DROP       ah   --  *      *       0.0.0.0/0           
10.4.8.255         

Chain dynamic (10 references)
 pkts bytes target     prot opt in     out     source              
destination         

Chain eth0_fwd (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
  152  136K dynamic    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          
  152  136K rfc1918    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          
  152  136K net2all    ah   --  *      eth1    0.0.0.0/0           
0.0.0.0/0          
    0     0 net2all    ah   --  *      ipsec0  0.0.0.0/0           
0.0.0.0/0          
    0     0 net2all    ah   --  *      ipsec1  0.0.0.0/0           
0.0.0.0/0          
    0     0 net2all    ah   --  *      ipsec2  0.0.0.0/0           
0.0.0.0/0          

Chain eth0_in (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 dynamic    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          udp dpts:67:68 
    0     0 rfc1918    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0           
0.0.0.0/0          icmp type 8 
    0     0 net2fw     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain eth1_fwd (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
  149 26207 dynamic    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          
  149 26207 loc2net    ah   --  *      eth0    0.0.0.0/0           
0.0.0.0/0          
    0     0 loc2vpn1   ah   --  *      ipsec0  0.0.0.0/0           
0.0.0.0/0          
    0     0 loc2vpn2   ah   --  *      ipsec1  0.0.0.0/0           
0.0.0.0/0          
    0     0 loc2vpn3   ah   --  *      ipsec2  0.0.0.0/0           
0.0.0.0/0          

Chain eth1_in (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    3   234 dynamic    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0           
0.0.0.0/0          icmp type 8 
    3   234 loc2fw     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain fw2net (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
    0     0 ACCEPT     esp  --  *      *       0.0.0.0/0           
0.0.0.0/0          
    0     0 ACCEPT     51   --  *      *       0.0.0.0/0           
0.0.0.0/0          
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          udp spt:500 dpt:500 state NEW 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp dpt:53 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW udp dpt:53 
    0     0 all2all    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain fw2vpn1 (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          udp spt:500 dpt:500 state NEW 
    0     0 all2all    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain fw2vpn2 (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          udp spt:500 dpt:500 state NEW 
    0     0 all2all    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain fw2vpn3 (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          udp spt:500 dpt:500 state NEW 
    0     0 all2all    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain icmpdef (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0           
0.0.0.0/0          icmp type 8 

Chain ipsec0_fwd (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 dynamic    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          
    0     0 all2all    ah   --  *      eth0    0.0.0.0/0           
0.0.0.0/0          
    0     0 vpn12loc   ah   --  *      eth1    0.0.0.0/0           
0.0.0.0/0          
    0     0 all2all    ah   --  *      ipsec1  0.0.0.0/0           
0.0.0.0/0          
    0     0 all2all    ah   --  *      ipsec2  0.0.0.0/0           
0.0.0.0/0          

Chain ipsec0_in (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 dynamic    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0           
0.0.0.0/0          icmp type 8 
    0     0 vpn12fw    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain ipsec1_fwd (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 dynamic    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          
    0     0 all2all    ah   --  *      eth0    0.0.0.0/0           
0.0.0.0/0          
    0     0 vpn22loc   ah   --  *      eth1    0.0.0.0/0           
0.0.0.0/0          
    0     0 all2all    ah   --  *      ipsec0  0.0.0.0/0           
0.0.0.0/0          
    0     0 all2all    ah   --  *      ipsec2  0.0.0.0/0           
0.0.0.0/0          

Chain ipsec1_in (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 dynamic    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0           
0.0.0.0/0          icmp type 8 
    0     0 vpn22fw    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain ipsec2_fwd (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 dynamic    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          
    0     0 all2all    ah   --  *      eth0    0.0.0.0/0           
0.0.0.0/0          
    0     0 vpn32loc   ah   --  *      eth1    0.0.0.0/0           
0.0.0.0/0          
    0     0 all2all    ah   --  *      ipsec0  0.0.0.0/0           
0.0.0.0/0          
    0     0 all2all    ah   --  *      ipsec1  0.0.0.0/0           
0.0.0.0/0          

Chain ipsec2_in (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 dynamic    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0           
0.0.0.0/0          icmp type 8 
    0     0 vpn32fw    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain loc2fw (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp dpt:22 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW udp dpt:53 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp dpt:80 
    3   234 all2all    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain loc2net (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
  136 25561 ACCEPT     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
   13   646 ACCEPT     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain loc2vpn1 (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
    0     0 all2all    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain loc2vpn2 (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
    0     0 all2all    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain loc2vpn3 (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
    0     0 all2all    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain logdrop (27 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 LOG        ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          LOG flags 0 level 6 prefix `Shorewall:rfc1918:DROP:' 
    0     0 DROP       ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain net2all (5 references)
 pkts bytes target     prot opt in     out     source              
destination         
  152  136K ACCEPT     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
    0     0 common     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          
    0     0 LOG        ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          LOG flags 0 level 6 prefix `Shorewall:net2all:DROP:' 
    0     0 DROP       ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain net2fw (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
    0     0 ACCEPT     esp  --  *      *       0.0.0.0/0           
0.0.0.0/0          
    0     0 ACCEPT     51   --  *      *       0.0.0.0/0           
0.0.0.0/0          
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          udp spt:500 dpt:500 state NEW 
    0     0 net2all    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain newnotsyn (18 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 DROP       ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain reject (6 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 REJECT     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          reject-with tcp-reset 
    0     0 REJECT     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          reject-with icmp-port-unreachable 

Chain rfc1918 (2 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 RETURN     ah   --  *      *       255.255.255.255     
0.0.0.0/0          
    0     0 DROP       ah   --  *      *       169.254.0.0/16      
0.0.0.0/0          
    0     0 logdrop    ah   --  *      *       172.16.0.0/12       
0.0.0.0/0          
    0     0 logdrop    ah   --  *      *       192.0.2.0/24        
0.0.0.0/0          
    0     0 logdrop    ah   --  *      *       192.168.0.0/16      
0.0.0.0/0          
    0     0 logdrop    ah   --  *      *       0.0.0.0/7           
0.0.0.0/0          
    0     0 logdrop    ah   --  *      *       2.0.0.0/8           
0.0.0.0/0          
    0     0 logdrop    ah   --  *      *       5.0.0.0/8           
0.0.0.0/0          
    0     0 logdrop    ah   --  *      *       7.0.0.0/8           
0.0.0.0/0          
    0     0 logdrop    ah   --  *      *       10.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    ah   --  *      *       23.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    ah   --  *      *       27.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    ah   --  *      *       31.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    ah   --  *      *       36.0.0.0/7          
0.0.0.0/0          
    0     0 logdrop    ah   --  *      *       39.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    ah   --  *      *       41.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    ah   --  *      *       42.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    ah   --  *      *       58.0.0.0/7          
0.0.0.0/0          
    0     0 logdrop    ah   --  *      *       60.0.0.0/8          
0.0.0.0/0          
    0     0 logdrop    ah   --  *      *       70.0.0.0/7          
0.0.0.0/0          
    0     0 logdrop    ah   --  *      *       72.0.0.0/5          
0.0.0.0/0          
    0     0 logdrop    ah   --  *      *       82.0.0.0/7          
0.0.0.0/0          
    0     0 logdrop    ah   --  *      *       84.0.0.0/6          
0.0.0.0/0          
    0     0 logdrop    ah   --  *      *       88.0.0.0/5          
0.0.0.0/0          
    0     0 logdrop    ah   --  *      *       96.0.0.0/3          
0.0.0.0/0          
    0     0 logdrop    ah   --  *      *       127.0.0.0/8         
0.0.0.0/0          
    0     0 logdrop    ah   --  *      *       197.0.0.0/8         
0.0.0.0/0          
    0     0 logdrop    ah   --  *      *       222.0.0.0/7         
0.0.0.0/0          
    0     0 logdrop    ah   --  *      *       240.0.0.0/4         
0.0.0.0/0          

Chain shorewall (0 references)
 pkts bytes target     prot opt in     out     source              
destination         

Chain vpn12fw (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          udp spt:500 dpt:500 state NEW 
    0     0 all2all    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain vpn12loc (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
    0     0 all2all    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain vpn22fw (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          udp spt:500 dpt:500 state NEW 
    0     0 all2all    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain vpn22loc (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
    0     0 all2all    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain vpn32fw (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0           
0.0.0.0/0          udp spt:500 dpt:500 state NEW 
    0     0 all2all    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain vpn32loc (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 ACCEPT     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          state NEW tcp flags:!0x16/0x02 
    0     0 all2all    ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          


Chain PREROUTING (policy ACCEPT 29692 packets, 1784K bytes)
 pkts bytes target     prot opt in     out     source              
destination         

Chain POSTROUTING (policy ACCEPT 4 packets, 160 bytes)
 pkts bytes target     prot opt in     out     source              
destination         
   13   646 eth0_masq  ah   --  *      eth0    0.0.0.0/0           
0.0.0.0/0          

Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source              
destination         

Chain eth0_masq (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
   13   646 MASQUERADE  ah   --  *      *       10.4.8.0/24         
0.0.0.0/0          

Chain PREROUTING (policy ACCEPT 143K packets, 35M bytes)
 pkts bytes target     prot opt in     out     source              
destination         
  169  137K man1918    ah   --  eth0   *       0.0.0.0/0           
0.0.0.0/0          
  321  164K pretos     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain INPUT (policy ACCEPT 13632 packets, 602K bytes)
 pkts bytes target     prot opt in     out     source              
destination         

Chain FORWARD (policy ACCEPT 115K packets, 33M bytes)
 pkts bytes target     prot opt in     out     source              
destination         

Chain OUTPUT (policy ACCEPT 251 packets, 20326 bytes)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 outtos     ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain POSTROUTING (policy ACCEPT 115K packets, 33M bytes)
 pkts bytes target     prot opt in     out     source              
destination         

Chain logdrop (27 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 LOG        ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          LOG flags 0 level 6 prefix `Shorewall:man1918:DROP:' 
    0     0 DROP       ah   --  *      *       0.0.0.0/0           
0.0.0.0/0          

Chain man1918 (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 RETURN     ah   --  *      *       0.0.0.0/0           
255.255.255.255    
    0     0 DROP       ah   --  *      *       0.0.0.0/0           
169.254.0.0/16     
    0     0 logdrop    ah   --  *      *       0.0.0.0/0           
172.16.0.0/12      
    0     0 logdrop    ah   --  *      *       0.0.0.0/0           
192.0.2.0/24       
    0     0 logdrop    ah   --  *      *       0.0.0.0/0           
192.168.0.0/16     
    0     0 logdrop    ah   --  *      *       0.0.0.0/0           
0.0.0.0/7          
    0     0 logdrop    ah   --  *      *       0.0.0.0/0           
2.0.0.0/8          
    0     0 logdrop    ah   --  *      *       0.0.0.0/0           
5.0.0.0/8          
    0     0 logdrop    ah   --  *      *       0.0.0.0/0           
7.0.0.0/8          
    0     0 logdrop    ah   --  *      *       0.0.0.0/0           
10.0.0.0/8         
    0     0 logdrop    ah   --  *      *       0.0.0.0/0           
23.0.0.0/8         
    0     0 logdrop    ah   --  *      *       0.0.0.0/0           
27.0.0.0/8         
    0     0 logdrop    ah   --  *      *       0.0.0.0/0           
31.0.0.0/8         
    0     0 logdrop    ah   --  *      *       0.0.0.0/0           
36.0.0.0/7         
    0     0 logdrop    ah   --  *      *       0.0.0.0/0           
39.0.0.0/8         
    0     0 logdrop    ah   --  *      *       0.0.0.0/0           
41.0.0.0/8         
    0     0 logdrop    ah   --  *      *       0.0.0.0/0           
42.0.0.0/8         
    0     0 logdrop    ah   --  *      *       0.0.0.0/0           
58.0.0.0/7         
    0     0 logdrop    ah   --  *      *       0.0.0.0/0           
60.0.0.0/8         
    0     0 logdrop    ah   --  *      *       0.0.0.0/0           
70.0.0.0/7         
    0     0 logdrop    ah   --  *      *       0.0.0.0/0           
72.0.0.0/5         
    0     0 logdrop    ah   --  *      *       0.0.0.0/0           
82.0.0.0/7         
    0     0 logdrop    ah   --  *      *       0.0.0.0/0           
84.0.0.0/6         
    0     0 logdrop    ah   --  *      *       0.0.0.0/0           
88.0.0.0/5         
    0     0 logdrop    ah   --  *      *       0.0.0.0/0           
96.0.0.0/3         
    0     0 logdrop    ah   --  *      *       0.0.0.0/0           
127.0.0.0/8        
    0     0 logdrop    ah   --  *      *       0.0.0.0/0           
197.0.0.0/8        
    0     0 logdrop    ah   --  *      *       0.0.0.0/0           
222.0.0.0/7        
    0     0 logdrop    ah   --  *      *       0.0.0.0/0           
240.0.0.0/4        

Chain outtos (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp dpt:22 TOS set 0x10 
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp spt:22 TOS set 0x10 
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp dpt:21 TOS set 0x10 
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp spt:21 TOS set 0x10 
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp spt:20 TOS set 0x08 
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp dpt:20 TOS set 0x08 

Chain pretos (1 references)
 pkts bytes target     prot opt in     out     source              
destination         
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp dpt:22 TOS set 0x10 
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp spt:22 TOS set 0x10 
    3   120 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp dpt:21 TOS set 0x10 
    3   134 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp spt:21 TOS set 0x10 
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp spt:20 TOS set 0x08 
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0          tcp dpt:20 TOS set 0x08 

tcp      6 94 TIME_WAIT src=10.4.8.143 dst=209.197.104.111 sport=2907
dport=80 src=209.197.104.111 dst=65.114.249.131 sport=80 dport=2907
[ASSURED] use=1 
tcp      6 94 TIME_WAIT src=10.4.8.143 dst=216.208.64.13 sport=2901
dport=80 src=216.208.64.13 dst=65.114.249.131 sport=80 dport=2901
[ASSURED] use=1 
tcp      6 94 TIME_WAIT src=10.4.8.143 dst=64.12.152.18 sport=2897
dport=80 src=64.12.152.18 dst=65.114.249.131 sport=80 dport=2897
[ASSURED] use=1 
tcp      6 79 TIME_WAIT src=10.4.8.143 dst=66.39.116.193 sport=2903
dport=80 src=66.39.116.193 dst=65.114.249.131 sport=80 dport=2903
[ASSURED] use=1 
tcp      6 79 TIME_WAIT src=10.4.8.143 dst=209.197.104.111 sport=2906
dport=80 src=209.197.104.111 dst=65.114.249.131 sport=80 dport=2906
[ASSURED] use=1 
tcp      6 117 TIME_WAIT src=10.4.8.143 dst=66.39.116.193 sport=2905
dport=80 src=66.39.116.193 dst=65.114.249.131 sport=80 dport=2905
[ASSURED] use=1 
tcp      6 79 TIME_WAIT src=10.4.8.143 dst=209.68.36.74 sport=2904
dport=80 src=209.68.36.74 dst=65.114.249.131 sport=80 dport=2904
[ASSURED] use=1 
tcp      6 64 TIME_WAIT src=10.4.8.143 dst=207.200.91.216 sport=2898
dport=80 src=207.200.91.216 dst=65.114.249.131 sport=80 dport=2898
[ASSURED] use=1 
tcp      6 4 TIME_WAIT src=10.4.8.143 dst=209.197.104.111 sport=2896
dport=80 src=209.197.104.111 dst=65.114.249.131 sport=80 dport=2896
[ASSURED] use=1 
udp      17 27 src=10.4.8.143 dst=65.114.248.4 sport=2908 dport=53
[UNREPLIED] src=65.114.248.4 dst=65.114.249.131 sport=53 dport=2908
use=1 
udp      17 28 src=10.4.8.143 dst=65.114.248.5 sport=2908 dport=53
[UNREPLIED] src=65.114.248.5 dst=65.114.249.131 sport=53 dport=2908
use=1 
tcp      6 109 TIME_WAIT src=10.4.8.143 dst=216.208.64.13 sport=2902
dport=80 src=216.208.64.13 dst=65.114.249.131 sport=80 dport=2902
[ASSURED] use=1 
tcp      6 9 TIME_WAIT src=10.4.8.143 dst=129.128.5.191 sport=2862
dport=21 src=129.128.5.191 dst=65.114.249.131 sport=21 dport=2862
[ASSURED] use=1 


Thanks!

Steve


On Wed, 2003-01-01 at 16:51, Tom Eastep wrote:
> 
> 
> --On Wednesday, January 01, 2003 4:27 PM -0700 Steve Fink 
> <[EMAIL PROTECTED]> wrote:
> 
> > I tried to determine whether or not the ports were
> > open in Shorewall but an iptables -C INPUT -p udp -s 65.114.248.6/24 -d
> > 65.114.249.131:500, only gives me a "Will be implemented real soon ;)"
> 
> And it wouldn't have told you anything anyway since Shorewall is a little 
> smarter than to place ALL input rules in the INPUT chain where they have to 
> be executed sequentially. Nevertheless, from the "iptables -L -n -v" later 
> (In the future, please post the output of "shorewall status" -- it's much 
> more complete):
> 
> Chain net2fw (1 references)
>  pkts bytes target     prot opt in     out     source
> destination
>     0     0 ACCEPT     ah   --  *      *       0.0.0.0/0
> 0.0.0.0/0          state RELATED,ESTABLISHED
>     1    40 newnotsyn  tcp  --  *      *       0.0.0.0/0
> 0.0.0.0/0          state NEW tcp flags:!0x16/0x02
>     0     0 ACCEPT     esp  --  *      *       0.0.0.0/0
> 0.0.0.0/0
>     0     0 ACCEPT     51   --  *      *       0.0.0.0/0
> 0.0.0.0/0
>     0     0 ACCEPT     udp  --  *      *       0.0.0.0/0
> 0.0.0.0/0          udp spt:500 dpt:500 state NEW
>  6459  258K net2all    ah   --  *      *       0.0.0.0/0
> 0.0.0.0/0
> 
> So Protocols 50 and 51 are open as is UDP 500. If the remote host is behind 
> a NAT firewall however, you should have defined your tunnel type as 
> 'ipsecnat' so that Shorewall wouldn't insist on SPT=500.
> 
> Similarly:
> 
> Chain fw2net (1 references)
>  pkts bytes target     prot opt in     out     source
> destination
>     2    80 ACCEPT     ah   --  *      *       0.0.0.0/0
> 0.0.0.0/0          state RELATED,ESTABLISHED
>     0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0
> 0.0.0.0/0          state NEW tcp flags:!0x16/0x02
>     0     0 ACCEPT     esp  --  *      *       0.0.0.0/0
> 0.0.0.0/0
>     0     0 ACCEPT     51   --  *      *       0.0.0.0/0
> 0.0.0.0/0
>     0     0 ACCEPT     udp  --  *      *       0.0.0.0/0
> 0.0.0.0/0          udp spt:500 dpt:500 state NEW
>     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0
> 0.0.0.0/0          state NEW tcp dpt:53
>     0     0 ACCEPT     udp  --  *      *       0.0.0.0/0
> 0.0.0.0/0          state NEW udp dpt:53
>     0     0 all2all    ah   --  *      *       0.0.0.0/0
> 0.0.0.0/0
> 
> So UDP port 500 is open on output as are protocols 50 and 51.
> 
> I notice though that there are no gw2loc and loc2gw chains -- what kind of 
> tunnel are you trying to set up here? Host->Host? If you want Host->Subnet, 
> you need to set the gw->loc and loc->gw policies to ACCEPT.
> 
> -Tom
> --
> Tom Eastep    \ Shorewall - iptables made easy
> Shoreline,     \ http://shorewall.sf.net
> Washington USA  \ [EMAIL PROTECTED]
> 
> 
> 
> -------------------------------------------------------
> This sf.net email is sponsored by:ThinkGeek
> Welcome to geek heaven.
> http://thinkgeek.com/sf
> ------------------------------------------------------------------------
> leaf-user mailing list: [EMAIL PROTECTED]
> https://lists.sourceforge.net/lists/listinfo/leaf-user
> SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html
> 



-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to