to Tom:
you mix up the reply, see my first posting :)
it's the default example (192.168.1.x)
and RH FAQ info to Ray Olszewski
Linux firewall 2.4.20 #1 Sun May 11 18:53:34 CEST 2003
i586 unknown
1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd
00:00:00:00:00:00
inet 127.0.0.1/8 brd 127.255.255.255 scope host lo
2: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop
link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
3: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc
pfifo_fast qlen 100
link/ether 00:0b:2b:02:0d:6d brd ff:ff:ff:ff:ff:ff
inet 128.142.121.254/20 brd 129.142.127.255 scope
global eth0
4: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc
pfifo_fast qlen 100
link/ether 00:0b:2b:02:2a:43 brd ff:ff:ff:ff:ff:ff
inet 192.168.1.254/24 brd 192.168.1.255 scope
global eth1
5: eth2: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc
pfifo_fast qlen 100
link/ether 00:0b:2b:02:2a:4d brd ff:ff:ff:ff:ff:ff
inet 192.168.10.100/24 brd 192.168.10.255 scope
global eth2
192.168.1.0/24 dev eth1 proto kernel scope link src
192.168.1.254
192.168.10.0/24 dev eth2 proto kernel scope link
src 192.168.10.100
129.142.112.0/20 dev eth0 proto kernel scope link
src 128.142.121.254
default via 129.142.112.1 dev eth0
Shorewall-1.4.8 Status at firewall - Wed Dec 17
19:17:28 UTC 2003
Counters reset Wed Dec 17 17:33:30 UTC 2003
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- lo *
0.0.0.0/0 0.0.0.0/0
0 0 DROP !icmp -- * *
0.0.0.0/0 0.0.0.0/0 state INVALID
159 22494 eth0_in all -- eth0 *
0.0.0.0/0 0.0.0.0/0
139 11414 eth1_in all -- eth1 *
0.0.0.0/0 0.0.0.0/0
0 0 eth2_in all -- eth2 *
0.0.0.0/0 0.0.0.0/0
0 0 common all -- * *
0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * *
0.0.0.0/0 0.0.0.0/0 LOG flags 0
level 6 prefix `Shorewall:INPUT:REJECT:'
0 0 reject all -- * *
0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
0 0 DROP !icmp -- * *
0.0.0.0/0 0.0.0.0/0 state INVALID
1671 862K eth0_fwd all -- eth0 *
0.0.0.0/0 0.0.0.0/0
1942 322K eth1_fwd all -- eth1 *
0.0.0.0/0 0.0.0.0/0
0 0 eth2_fwd all -- eth2 *
0.0.0.0/0 0.0.0.0/0
0 0 common all -- * *
0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * *
0.0.0.0/0 0.0.0.0/0 LOG flags 0
level 6 prefix `Shorewall:FORWARD:REJECT:'
0 0 reject all -- * *
0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * lo
0.0.0.0/0 0.0.0.0/0
0 0 DROP !icmp -- * *
0.0.0.0/0 0.0.0.0/0 state INVALID
0 0 ACCEPT udp -- * eth0
0.0.0.0/0 0.0.0.0/0 udp dpts:67:68
146 9944 fw2net all -- * eth0
0.0.0.0/0 0.0.0.0/0
129 18328 fw2loc all -- * eth1
0.0.0.0/0 0.0.0.0/0
0 0 fw2dmz all -- * eth2
0.0.0.0/0 0.0.0.0/0
0 0 common all -- * *
0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * *
0.0.0.0/0 0.0.0.0/0 LOG flags 0
level 6 prefix `Shorewall:OUTPUT:REJECT:'
0 0 reject all -- * *
0.0.0.0/0 0.0.0.0/0
Chain all2all (7 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * *
0.0.0.0/0 0.0.0.0/0 state
RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * *
0.0.0.0/0 0.0.0.0/0 state NEW tcp
flags:!0x16/0x02
0 0 common all -- * *
0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * *
0.0.0.0/0 0.0.0.0/0 LOG flags 0
level 6 prefix `Shorewall:all2all:REJECT:'
0 0 reject all -- * *
0.0.0.0/0 0.0.0.0/0
Chain common (5 references)
pkts bytes target prot opt in out source
destination
0 0 icmpdef icmp -- * *
0.0.0.0/0 0.0.0.0/0
0 0 reject udp -- * *
0.0.0.0/0 0.0.0.0/0 udp dpt:135
18 1404 reject udp -- * *
0.0.0.0/0 0.0.0.0/0 udp
dpts:137:139
0 0 reject udp -- * *
0.0.0.0/0 0.0.0.0/0 udp dpt:445
0 0 reject tcp -- * *
0.0.0.0/0 0.0.0.0/0 tcp dpt:139
6 288 reject tcp -- * *
0.0.0.0/0 0.0.0.0/0 tcp dpt:445
93 4464 reject tcp -- * *
0.0.0.0/0 0.0.0.0/0 tcp dpt:135
0 0 DROP udp -- * *
0.0.0.0/0 0.0.0.0/0 udp dpt:1900
0 0 DROP all -- * *
0.0.0.0/0 255.255.255.255
0 0 DROP all -- * *
0.0.0.0/0 224.0.0.0/4
0 0 reject tcp -- * *
0.0.0.0/0 0.0.0.0/0 tcp dpt:113
0 0 DROP udp -- * *
0.0.0.0/0 0.0.0.0/0 udp spt:53
state NEW
0 0 DROP all -- * *
0.0.0.0/0 129.142.127.255
0 0 DROP all -- * *
0.0.0.0/0 192.168.1.255
0 0 DROP all -- * *
0.0.0.0/0 192.168.10.255
Chain dmz2fw (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * *
0.0.0.0/0 0.0.0.0/0 state
RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * *
0.0.0.0/0 0.0.0.0/0 state NEW tcp
flags:!0x16/0x02
0 0 ACCEPT icmp -- * *
0.0.0.0/0 0.0.0.0/0 icmp type 8
0 0 all2all all -- * *
0.0.0.0/0 0.0.0.0/0
Chain dmz2loc (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * *
0.0.0.0/0 0.0.0.0/0 state
RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * *
0.0.0.0/0 0.0.0.0/0 state NEW tcp
flags:!0x16/0x02
0 0 ACCEPT icmp -- * *
0.0.0.0/0 0.0.0.0/0 icmp type 8
0 0 all2all all -- * *
0.0.0.0/0 0.0.0.0/0
Chain dmz2net (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * *
0.0.0.0/0 0.0.0.0/0 state
RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * *
0.0.0.0/0 0.0.0.0/0 state NEW tcp
flags:!0x16/0x02
0 0 ACCEPT tcp -- * *
0.0.0.0/0 0.0.0.0/0 state NEW tcp
dpt:53
0 0 ACCEPT udp -- * *
0.0.0.0/0 0.0.0.0/0 state NEW udp
dpt:53
0 0 ACCEPT icmp -- * *
0.0.0.0/0 0.0.0.0/0 icmp type 8
0 0 ACCEPT all -- * *
0.0.0.0/0 0.0.0.0/0
Chain dynamic (6 references)
pkts bytes target prot opt in out source
destination
Chain eth0_fwd (1 references)
pkts bytes target prot opt in out source
destination
0 0 dynamic all -- * *
0.0.0.0/0 0.0.0.0/0 state NEW
0 0 rfc1918 all -- * *
0.0.0.0/0 0.0.0.0/0 state NEW
1671 862K net2loc all -- * eth1
0.0.0.0/0 0.0.0.0/0
0 0 net2dmz all -- * eth2
0.0.0.0/0 0.0.0.0/0
Chain eth0_in (1 references)
pkts bytes target prot opt in out source
destination
159 22494 dynamic all -- * *
0.0.0.0/0 0.0.0.0/0 state NEW
0 0 ACCEPT udp -- * *
0.0.0.0/0 0.0.0.0/0 udp dpts:67:68
159 22494 rfc1918 all -- * *
0.0.0.0/0 0.0.0.0/0 state NEW
158 22416 net2fw all -- * *
0.0.0.0/0 0.0.0.0/0
Chain eth1_fwd (1 references)
pkts bytes target prot opt in out source
destination
371 23842 dynamic all -- * *
0.0.0.0/0 0.0.0.0/0 state NEW
1942 322K loc2net all -- * eth0
0.0.0.0/0 0.0.0.0/0
0 0 loc2dmz all -- * eth2
0.0.0.0/0 0.0.0.0/0
Chain eth1_in (1 references)
pkts bytes target prot opt in out source
destination
12 720 dynamic all -- * *
0.0.0.0/0 0.0.0.0/0 state NEW
139 11414 loc2fw all -- * *
0.0.0.0/0 0.0.0.0/0
Chain eth2_fwd (1 references)
pkts bytes target prot opt in out source
destination
0 0 dynamic all -- * *
0.0.0.0/0 0.0.0.0/0 state NEW
0 0 dmz2net all -- * eth0
0.0.0.0/0 0.0.0.0/0
0 0 dmz2loc all -- * eth1
0.0.0.0/0 0.0.0.0/0
Chain eth2_in (1 references)
pkts bytes target prot opt in out source
destination
0 0 dynamic all -- * *
0.0.0.0/0 0.0.0.0/0 state NEW
0 0 dmz2fw all -- * *
0.0.0.0/0 0.0.0.0/0
Chain fw2dmz (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * *
0.0.0.0/0 0.0.0.0/0 state
RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * *
0.0.0.0/0 0.0.0.0/0 state NEW tcp
flags:!0x16/0x02
0 0 ACCEPT icmp -- * *
0.0.0.0/0 0.0.0.0/0 icmp type 8
0 0 all2all all -- * *
0.0.0.0/0 0.0.0.0/0
Chain fw2loc (1 references)
pkts bytes target prot opt in out source
destination
129 18328 ACCEPT all -- * *
0.0.0.0/0 0.0.0.0/0 state
RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * *
0.0.0.0/0 0.0.0.0/0 state NEW tcp
flags:!0x16/0x02
0 0 ACCEPT icmp -- * *
0.0.0.0/0 0.0.0.0/0 icmp type 8
0 0 all2all all -- * *
0.0.0.0/0 0.0.0.0/0
Chain fw2net (1 references)
pkts bytes target prot opt in out source
destination
146 9944 ACCEPT all -- * *
0.0.0.0/0 0.0.0.0/0 state
RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * *
0.0.0.0/0 0.0.0.0/0 state NEW tcp
flags:!0x16/0x02
0 0 ACCEPT tcp -- * *
0.0.0.0/0 0.0.0.0/0 state NEW tcp
dpt:53
0 0 ACCEPT udp -- * *
0.0.0.0/0 0.0.0.0/0 state NEW udp
dpt:53
0 0 all2all all -- * *
0.0.0.0/0 0.0.0.0/0
Chain icmpdef (1 references)
pkts bytes target prot opt in out source
destination
Chain loc2dmz (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * *
0.0.0.0/0 0.0.0.0/0 state
RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * *
0.0.0.0/0 0.0.0.0/0 state NEW tcp
flags:!0x16/0x02
0 0 ACCEPT tcp -- * *
0.0.0.0/0 0.0.0.0/0 state NEW tcp
dpt:22
0 0 ACCEPT icmp -- * *
0.0.0.0/0 0.0.0.0/0 icmp type 8
0 0 all2all all -- * *
0.0.0.0/0 0.0.0.0/0
Chain loc2fw (1 references)
pkts bytes target prot opt in out source
destination
127 10694 ACCEPT all -- * *
0.0.0.0/0 0.0.0.0/0 state
RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * *
0.0.0.0/0 0.0.0.0/0 state NEW tcp
flags:!0x16/0x02
0 0 ACCEPT tcp -- * *
0.0.0.0/0 0.0.0.0/0 state NEW tcp
dpt:22
0 0 ACCEPT udp -- * *
0.0.0.0/0 0.0.0.0/0 state NEW udp
dpt:53
12 720 ACCEPT tcp -- * *
0.0.0.0/0 0.0.0.0/0 state NEW tcp
dpt:80
0 0 ACCEPT icmp -- * *
0.0.0.0/0 0.0.0.0/0 icmp type 8
0 0 all2all all -- * *
0.0.0.0/0 0.0.0.0/0
Chain loc2net (1 references)
pkts bytes target prot opt in out source
destination
1571 298K ACCEPT all -- * *
0.0.0.0/0 0.0.0.0/0 state
RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * *
0.0.0.0/0 0.0.0.0/0 state NEW tcp
flags:!0x16/0x02
371 23842 ACCEPT all -- * *
0.0.0.0/0 0.0.0.0/0
Chain logdrop (60 references)
pkts bytes target prot opt in out source
destination
1 78 LOG all -- * *
0.0.0.0/0 0.0.0.0/0 LOG flags 0
level 6 prefix `Shorewall:logdrop:DROP:'
1 78 DROP all -- * *
0.0.0.0/0 0.0.0.0/0
Chain net2all (3 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * *
0.0.0.0/0 0.0.0.0/0 state
RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * *
0.0.0.0/0 0.0.0.0/0 state NEW tcp
flags:!0x16/0x02
120 6300 common all -- * *
0.0.0.0/0 0.0.0.0/0
3 144 LOG all -- * *
0.0.0.0/0 0.0.0.0/0 LOG flags 0
level 6 prefix `Shorewall:net2all:DROP:'
3 144 DROP all -- * *
0.0.0.0/0 0.0.0.0/0
Chain net2dmz (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * *
0.0.0.0/0 0.0.0.0/0 state
RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * *
0.0.0.0/0 0.0.0.0/0 state NEW tcp
flags:!0x16/0x02
0 0 ACCEPT icmp -- * *
0.0.0.0/0 0.0.0.0/0 icmp type 8
0 0 net2all all -- * *
0.0.0.0/0 0.0.0.0/0
Chain net2fw (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * *
0.0.0.0/0 0.0.0.0/0 state
RELATED,ESTABLISHED
9 12040 newnotsyn tcp -- * *
0.0.0.0/0 0.0.0.0/0 state NEW tcp
flags:!0x16/0x02
29 4076 ACCEPT icmp -- * *
0.0.0.0/0 0.0.0.0/0 icmp type 8
120 6300 net2all all -- * *
0.0.0.0/0 0.0.0.0/0
Chain net2loc (1 references)
pkts bytes target prot opt in out source
destination
1671 862K ACCEPT all -- * *
0.0.0.0/0 0.0.0.0/0 state
RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * *
0.0.0.0/0 0.0.0.0/0 state NEW tcp
flags:!0x16/0x02
0 0 ACCEPT icmp -- * *
0.0.0.0/0 0.0.0.0/0 icmp type 8
0 0 net2all all -- * *
0.0.0.0/0 0.0.0.0/0
Chain newnotsyn (14 references)
pkts bytes target prot opt in out source
destination
9 12040 LOG all -- * *
0.0.0.0/0 0.0.0.0/0 LOG flags 0
level 6 prefix `Shorewall:newnotsyn:DROP:'
9 12040 DROP all -- * *
0.0.0.0/0 0.0.0.0/0
Chain reject (11 references)
pkts bytes target prot opt in out source
destination
99 4752 REJECT tcp -- * *
0.0.0.0/0 0.0.0.0/0 reject-with
tcp-reset
18 1404 REJECT udp -- * *
0.0.0.0/0 0.0.0.0/0 reject-with
icmp-port-unreachable
0 0 REJECT icmp -- * *
0.0.0.0/0 0.0.0.0/0 reject-with
icmp-host-unreachable
0 0 REJECT all -- * *
0.0.0.0/0 0.0.0.0/0 reject-with
icmp-host-prohibited
Chain rfc1918 (2 references)
pkts bytes target prot opt in out source
destination
0 0 RETURN all -- * *
255.255.255.255 0.0.0.0/0
0 0 RETURN all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
255.255.255.255
0 0 DROP all -- * *
169.254.0.0/16 0.0.0.0/0
0 0 DROP all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
169.254.0.0/16
0 0 logdrop all -- * *
172.16.0.0/12 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
172.16.0.0/12
0 0 logdrop all -- * *
192.0.2.0/24 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
192.0.2.0/24
0 0 logdrop all -- * *
192.168.0.0/16 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
192.168.0.0/16
0 0 logdrop all -- * *
0.0.0.0/7 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
0.0.0.0/7
0 0 logdrop all -- * *
2.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
2.0.0.0/8
0 0 logdrop all -- * *
5.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
5.0.0.0/8
0 0 logdrop all -- * *
7.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
7.0.0.0/8
0 0 logdrop all -- * *
10.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
10.0.0.0/8
0 0 logdrop all -- * *
23.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
23.0.0.0/8
0 0 logdrop all -- * *
27.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
27.0.0.0/8
0 0 logdrop all -- * *
31.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
31.0.0.0/8
0 0 logdrop all -- * *
36.0.0.0/7 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
36.0.0.0/7
0 0 logdrop all -- * *
39.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
39.0.0.0/8
0 0 logdrop all -- * *
41.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
41.0.0.0/8
0 0 logdrop all -- * *
42.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
42.0.0.0/8
0 0 logdrop all -- * *
49.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
49.0.0.0/8
0 0 logdrop all -- * *
50.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
50.0.0.0/8
0 0 logdrop all -- * *
58.0.0.0/7 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
58.0.0.0/7
0 0 logdrop all -- * *
70.0.0.0/7 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
70.0.0.0/7
0 0 logdrop all -- * *
72.0.0.0/5 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
72.0.0.0/5
0 0 logdrop all -- * *
83.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
83.0.0.0/8
0 0 logdrop all -- * *
84.0.0.0/6 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
84.0.0.0/6
0 0 logdrop all -- * *
88.0.0.0/5 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
88.0.0.0/5
0 0 logdrop all -- * *
96.0.0.0/3 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
96.0.0.0/3
0 0 logdrop all -- * *
127.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
127.0.0.0/8
0 0 logdrop all -- * *
197.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
197.0.0.0/8
0 0 logdrop all -- * *
198.18.0.0/15 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
198.18.0.0/15
1 78 logdrop all -- * *
201.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
201.0.0.0/8
0 0 logdrop all -- * *
223.0.0.0/8 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
223.0.0.0/8
0 0 logdrop all -- * *
240.0.0.0/4 0.0.0.0/0
0 0 logdrop all -- * *
0.0.0.0/0 0.0.0.0/0 ctorigdst
240.0.0.0/4
Chain shorewall (0 references)
pkts bytes target prot opt in out source
destination
Dec 17 17:52:05 logdrop:DROP:IN=eth0 OUT=
SRC=201.128.9.200 DST=128.142.121.254 LEN=78 TOS=0x00
PREC=0x00 TTL=105 ID=42782 PROTO=UDP SPT=1029 DPT=137
LEN=58
Dec 17 18:06:16 net2all:DROP:IN=eth0 OUT=
SRC=82.45.233.187 DST=128.142.121.254 LEN=48 TOS=0x10
PREC=0x00 TTL=55 ID=55745 DF PROTO=TCP SPT=3914 DPT=21
WINDOW=65535 RES=0x00 SYN URGP=0
Dec 17 18:06:19 net2all:DROP:IN=eth0 OUT=
SRC=82.45.233.187 DST=128.142.121.254 LEN=48 TOS=0x10
PREC=0x00 TTL=55 ID=56060 DF PROTO=TCP SPT=3914 DPT=21
WINDOW=65535 RES=0x00 SYN URGP=0
Dec 17 18:06:25 net2all:DROP:IN=eth0 OUT=
SRC=82.45.233.187 DST=128.142.121.254 LEN=48 TOS=0x10
PREC=0x00 TTL=55 ID=56287 DF PROTO=TCP SPT=3914 DPT=21
WINDOW=65535 RES=0x00 SYN URGP=0
Dec 17 18:58:55 newnotsyn:DROP:IN=eth0 OUT=
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=36372 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 18:59:27 newnotsyn:DROP:IN=eth0 OUT=
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=17973 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 19:00:31 newnotsyn:DROP:IN=eth0 OUT=
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=54704 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 19:01:35 newnotsyn:DROP:IN=eth0 OUT=
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=16799 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 19:02:39 newnotsyn:DROP:IN=eth0 OUT=
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=47958 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 19:03:43 newnotsyn:DROP:IN=eth0 OUT=
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=17367 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 19:04:47 newnotsyn:DROP:IN=eth0 OUT=
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=43276 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 19:05:51 newnotsyn:DROP:IN=eth0 OUT=
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=1164 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 19:06:55 newnotsyn:DROP:IN=eth0 OUT=
SRC=66.163.175.154 DST=128.142.121.254 LEN=40 TOS=0x00
PREC=0x00 TTL=49 ID=34370 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK RST URGP=0
NAT Table
Chain PREROUTING (policy ACCEPT 500 packets, 44785
bytes)
pkts bytes target prot opt in out source
destination
Chain POSTROUTING (policy ACCEPT 100 packets, 4020
bytes)
pkts bytes target prot opt in out source
destination
425 24543 eth0_masq all -- * eth0
0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 1 packets, 60 bytes)
pkts bytes target prot opt in out source
destination
Chain eth0_masq (1 references)
pkts bytes target prot opt in out source
destination
326 20583 MASQUERADE all -- * *
192.168.1.0/24 0.0.0.0/0
0 0 MASQUERADE all -- * *
192.168.10.0/24 0.0.0.0/0
Mangle Table
Chain PREROUTING (policy ACCEPT 3916 packets, 1219K
bytes)
pkts bytes target prot opt in out source
destination
3911 1218K pretos all -- * *
0.0.0.0/0 0.0.0.0/0
Chain INPUT (policy ACCEPT 300 packets, 34008 bytes)
pkts bytes target prot opt in out source
destination
Chain FORWARD (policy ACCEPT 3613 packets, 1184K
bytes)
pkts bytes target prot opt in out source
destination
Chain OUTPUT (policy ACCEPT 277 packets, 28372 bytes)
pkts bytes target prot opt in out source
destination
275 28272 outtos all -- * *
0.0.0.0/0 0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 3890 packets, 1212K
bytes)
pkts bytes target prot opt in out source
destination
Chain outtos (1 references)
pkts bytes target prot opt in out source
destination
0 0 TOS tcp -- * *
0.0.0.0/0 0.0.0.0/0 tcp dpt:22 TOS
set 0x10
0 0 TOS tcp -- * *
0.0.0.0/0 0.0.0.0/0 tcp spt:22 TOS
set 0x10
0 0 TOS tcp -- * *
0.0.0.0/0 0.0.0.0/0 tcp dpt:21 TOS
set 0x10
0 0 TOS tcp -- * *
0.0.0.0/0 0.0.0.0/0 tcp spt:21 TOS
set 0x10
0 0 TOS tcp -- * *
0.0.0.0/0 0.0.0.0/0 tcp spt:20 TOS
set 0x08
0 0 TOS tcp -- * *
0.0.0.0/0 0.0.0.0/0 tcp dpt:20 TOS
set 0x08
Chain pretos (1 references)
pkts bytes target prot opt in out source
destination
0 0 TOS tcp -- * *
0.0.0.0/0 0.0.0.0/0 tcp dpt:22 TOS
set 0x10
0 0 TOS tcp -- * *
0.0.0.0/0 0.0.0.0/0 tcp spt:22 TOS
set 0x10
3 144 TOS tcp -- * *
0.0.0.0/0 0.0.0.0/0 tcp dpt:21 TOS
set 0x10
0 0 TOS tcp -- * *
0.0.0.0/0 0.0.0.0/0 tcp spt:21 TOS
set 0x10
0 0 TOS tcp -- * *
0.0.0.0/0 0.0.0.0/0 tcp spt:20 TOS
set 0x08
0 0 TOS tcp -- * *
0.0.0.0/0 0.0.0.0/0 tcp dpt:20 TOS
set 0x08
Chain PREROUTING (policy ACCEPT 501 packets, 44863
bytes)
pkts bytes target prot opt in out source
destination
Chain POSTROUTING (policy ACCEPT 100 packets, 4020
bytes)
pkts bytes target prot opt in out source
destination
425 24543 eth0_masq all -- * eth0
0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 1 packets, 60 bytes)
pkts bytes target prot opt in out source
destination
Chain eth0_masq (1 references)
pkts bytes target prot opt in out source
destination
326 20583 MASQUERADE all -- * *
192.168.1.0/24 0.0.0.0/0
0 0 MASQUERADE all -- * *
192.168.10.0/24 0.0.0.0/0
Dec 17 17:33:18 firewall syslogd 1.3-3#31.slink1:
restart.
Dec 17 17:33:18 firewall kernel: klogd
1.3-3#31.slink1, log source = /proc/kmsg started.
Dec 17 17:33:18 firewall kernel: No module symbols
loaded.
Dec 17 17:33:18 firewall kernel: BIOS-provided
physical RAM map:
Dec 17 17:33:18 firewall kernel: 32MB LOWMEM
available.
Dec 17 17:33:18 firewall kernel: Initializing CPU#0
Dec 17 17:33:18 firewall kernel: Memory: 30128k/32768k
available (948k kernel code, 2252k reserved, -1176k
data, 64k init, 0k highmem)
Dec 17 17:33:18 firewall kernel: Dentry cache hash
table entries: 4096 (order: 3, 32768 bytes)
Dec 17 17:33:18 firewall kernel: Inode cache hash
table entries: 2048 (order: 2, 16384 bytes)
Dec 17 17:33:18 firewall kernel: Intel Pentium with F0
0F bug - workaround enabled.
Dec 17 17:33:18 firewall kernel: Checking 'hlt'
instruction... OK.
Dec 17 17:33:18 firewall kernel: PCI: PCI BIOS
revision 2.10 entry at 0xfd83e, last bus=0
Dec 17 17:33:18 firewall kernel: PCI: Using
configuration type 1
Dec 17 17:33:18 firewall kernel: PCI: Probing PCI
hardware
Dec 17 17:33:18 firewall kernel: Limiting direct
PCI/PCI transfers.
Dec 17 17:33:18 firewall kernel: Activating ISA DMA
hang workarounds.
Dec 17 17:33:18 firewall kernel: Linux NET4.0 for
Linux 2.4
Dec 17 17:33:18 firewall kernel: Based upon Swansea
University Computer Society NET3.039
Dec 17 17:33:18 firewall kernel: Serial driver version
5.05c (2001-07-08) with MANY_PORTS SHARE_IRQ
DETECT_IRQ SERIAL_PCI enabled
Dec 17 17:33:18 firewall kernel: ttyS00 at 0x03f8 (irq
= 4) is a 16550A
Dec 17 17:33:18 firewall kernel: ttyS01 at 0x02f8 (irq
= 3) is a 16550A
Dec 17 17:33:18 firewall kernel: Real Time Clock
Driver v1.10e
Dec 17 17:33:18 firewall kernel: Software Watchdog
Timer: 0.05, timer margin: 60 sec
Dec 17 17:33:18 firewall kernel: Floppy drive(s): fd0
is 1.44M
Dec 17 17:33:18 firewall kernel: FDC 0 is a National
Semiconductor PC87306
Dec 17 17:33:18 firewall kernel: NET4: Linux TCP/IP
1.0 for NET4.0
Dec 17 17:33:18 firewall kernel: IP Protocols: ICMP,
UDP, TCP, IGMP
Dec 17 17:33:18 firewall kernel: IP: routing cache
hash table of 512 buckets, 4Kbytes
Dec 17 17:33:18 firewall kernel: TCP: Hash tables
configured (established 2048 bind 2048)
Dec 17 17:33:18 firewall kernel: NET4: Unix domain
sockets 1.0/SMP for Linux NET4.0.
Dec 17 17:33:18 firewall kernel: RAMDISK: Compressed
image found at block 0
Dec 17 17:33:18 firewall kernel: Freeing initrd
memory: 401k freed
Dec 17 17:33:18 firewall kernel: Freeing unused kernel
memory: 64k freed
Dec 17 17:33:19 firewall kernel: 8139too Fast Ethernet
driver 0.9.26
Dec 17 17:33:19 firewall kernel: eth0: RealTek RTL8139
Fast Ethernet at 0xc2813000, 00:0b:2b:02:0d:6d, IRQ 12
Dec 17 17:33:19 firewall kernel: eth1: RealTek RTL8139
Fast Ethernet at 0xc2815100, 00:0b:2b:02:2a:43, IRQ 11
Dec 17 17:33:19 firewall kernel: eth2: RealTek RTL8139
Fast Ethernet at 0xc2817200, 00:0b:2b:02:2a:4d, IRQ 14
Dec 17 17:33:20 firewall kernel: eth0: Setting 100mbps
full-duplex based on auto-negotiated partner ability
41e1.
Dec 17 17:33:21 firewall kernel: eth0: Setting 100mbps
full-duplex based on auto-negotiated partner ability
41e1.
Dec 17 17:33:21 firewall kernel: eth1: Setting 100mbps
full-duplex based on auto-negotiated partner ability
45e1.
Dec 17 17:33:21 firewall root: The /etc/shorewall/pump
script is called with arg up eth0 128.142.121.254
Dec 17 17:33:21 firewall kernel: eth2: Setting
half-duplex based on auto-negotiated partner ability
0000.
Dec 17 17:33:30 firewall root: Shorewall Started
Dec 17 17:52:05 firewall kernel:
Shorewall:logdrop:DROP:IN=eth0 OUT=
MAC=00:0b:2b:02:0d:6d:00:02:3b:02:69:f4:08:00
SRC=201.128.9.200 DST=128.142.121.254 LEN=78 TOS=0x00
PREC=0x00 TTL=105 ID=42782 PROTO=UDP SPT=1029 DPT=137
LEN=58
Dec 17 18:06:16 firewall kernel:
Shorewall:net2all:DROP:IN=eth0 OUT=
MAC=00:0b:2b:02:0d:6d:00:02:3b:02:69:f4:08:00
SRC=82.45.233.187 DST=128.142.121.254 LEN=48 TOS=0x10
PREC=0x00 TTL=55 ID=55745 DF PROTO=TCP SPT=3914 DPT=21
WINDOW=65535 RES=0x00 SYN URGP=0
Dec 17 18:06:19 firewall kernel:
Shorewall:net2all:DROP:IN=eth0 OUT=
MAC=00:0b:2b:02:0d:6d:00:02:3b:02:69:f4:08:00
SRC=82.45.233.187 DST=128.142.121.254 LEN=48 TOS=0x10
PREC=0x00 TTL=55 ID=56060 DF PROTO=TCP SPT=3914 DPT=21
WINDOW=65535 RES=0x00 SYN URGP=0
Dec 17 18:06:25 firewall kernel:
Shorewall:net2all:DROP:IN=eth0 OUT=
MAC=00:0b:2b:02:0d:6d:00:02:3b:02:69:f4:08:00
SRC=82.45.233.187 DST=128.142.121.254 LEN=48 TOS=0x10
PREC=0x00 TTL=55 ID=56287 DF PROTO=TCP SPT=3914 DPT=21
WINDOW=65535 RES=0x00 SYN URGP=0
Dec 17 18:58:55 firewall kernel:
Shorewall:newnotsyn:DROP:IN=eth0 OUT=
MAC=00:0b:2b:02:0d:6d:00:02:3b:02:69:f4:08:00
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=36372 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 18:59:27 firewall kernel:
Shorewall:newnotsyn:DROP:IN=eth0 OUT=
MAC=00:0b:2b:02:0d:6d:00:02:3b:02:69:f4:08:00
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=17973 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 19:00:31 firewall kernel:
Shorewall:newnotsyn:DROP:IN=eth0 OUT=
MAC=00:0b:2b:02:0d:6d:00:02:3b:02:69:f4:08:00
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=54704 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 19:01:35 firewall kernel:
Shorewall:newnotsyn:DROP:IN=eth0 OUT=
MAC=00:0b:2b:02:0d:6d:00:02:3b:02:69:f4:08:00
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=16799 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 19:02:39 firewall kernel:
Shorewall:newnotsyn:DROP:IN=eth0 OUT=
MAC=00:0b:2b:02:0d:6d:00:02:3b:02:69:f4:08:00
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=47958 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 19:03:43 firewall kernel:
Shorewall:newnotsyn:DROP:IN=eth0 OUT=
MAC=00:0b:2b:02:0d:6d:00:02:3b:02:69:f4:08:00
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=17367 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 19:04:47 firewall kernel:
Shorewall:newnotsyn:DROP:IN=eth0 OUT=
MAC=00:0b:2b:02:0d:6d:00:02:3b:02:69:f4:08:00
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=43276 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 19:05:51 firewall kernel:
Shorewall:newnotsyn:DROP:IN=eth0 OUT=
MAC=00:0b:2b:02:0d:6d:00:02:3b:02:69:f4:08:00
SRC=66.163.175.154 DST=128.142.121.254 LEN=1500
TOS=0x00 PREC=0x00 TTL=49 ID=1164 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK URGP=0
Dec 17 19:06:55 firewall kernel:
Shorewall:newnotsyn:DROP:IN=eth0 OUT=
MAC=00:0b:2b:02:0d:6d:00:02:3b:02:69:f4:08:00
SRC=66.163.175.154 DST=128.142.121.254 LEN=40 TOS=0x00
PREC=0x00 TTL=49 ID=34370 DF PROTO=TCP SPT=80
DPT=33017 WINDOW=33304 RES=0x00 ACK RST URGP=0
# /etc/network/interfaces -- configuration file for
LEAF network
# J. Nilo, April 2002
#
# Loopback interface.
auto lo
iface lo inet loopback
# Step 1: configure external interface
# uncomment/adjust one of the following 4
options
# Option 1.1 (default): eth0 / dynamic IP from
pump/dhclient
auto eth0
iface eth0 inet dhcp
# Step 2: configure internal interface
# Default: eth1 / fixed IP = 192.168.1.254
auto eth1
iface eth1 inet static
address 192.168.1.254
masklen 24
broadcast 192.168.1.255
# Step 3 (optionnal): configure DMZ
# Default: eth2 / fixed IP = 192.168.1.100
auto eth2
iface eth2 inet static
address 192.168.10.100
masklen 24
broadcast 192.168.10.255
Yahoo! Mail (http://dk.mail.yahoo.com) - Gratis: 6 MB lagerplads, spamfilter og
virusscan
-------------------------------------------------------
This SF.net email is sponsored by: IBM Linux Tutorials.
Become an expert in LINUX or just sharpen your skills. Sign up for IBM's
Free Linux Tutorials. Learn everything from the bash shell to sys admin.
Click now! http://ads.osdn.com/?ad_id=1278&alloc_id=3371&op=click
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html