Hi

[EMAIL PROTECTED] wrote:
> Hi Erich
> 
>> shorewall status _used_to_display_ the iptables with counters and active 
>> connections. But you can use the iptables command just as well.
> 
> Tried this one. But don't understand all the headers in it. I ran it 4 times.
> The first time just before I begane to test the pings (test1)
> The second time just after I pinged from my local pc to my server in dmz 
> (test2) This one failed ofcourse.
> The third time just before I begane to test the working ping(test3)
> The fourt time just after I pinged from my router to my server in dmz (test3) 
> This succeeded.

Let me try to comment a few lines, Test1 is probably of no much 
importance, so I skip it here.

You can use shorewall reset to reset the counters

...

> 
> Test2
> Chain INPUT (policy DROP 0 packets, 0 bytes)
>  pkts bytes target     prot opt in     out     source               
> destination         
>     0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0 
>           
>    46 13550 eth0_in    all  --  eth0   *       0.0.0.0/0            0.0.0.0/0 
>           
>  2444  164K eth1_in    all  --  eth1   *       0.0.0.0/0            0.0.0.0/0 
>           
>     0     0 eth2_in    all  --  eth2   *       0.0.0.0/0            0.0.0.0/0 
>           
>     0     0 tun_in     all  --  tun+   *       0.0.0.0/0            0.0.0.0/0 
>           
>     0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0 
>           
>     0     0 ULOG       all  --  *      *       0.0.0.0/0            0.0.0.0/0 
>           ULOG copy_range 0 nlgroup 1 prefix `Shorewall:INPUT:REJECT:' 
> queue_threshold 1 
>     0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0 
>           
> 

Here it starts bein interesting in your case, packets forwarded show up 
in the FORWARD chain, now I _believe your local network is on eth1, so 
eth1_fwd is the one to look at.

> Chain FORWARD (policy DROP 0 packets, 0 bytes)
>  pkts bytes target     prot opt in     out     source               
> destination         
>    26 24385 eth0_fwd   all  --  eth0   *       0.0.0.0/0            0.0.0.0/0 
>           
>    36  4607 eth1_fwd   all  --  eth1   *       0.0.0.0/0            0.0.0.0/0 
>           

We have only 36 packets to look at.

>     0     0 eth2_fwd   all  --  eth2   *       0.0.0.0/0            0.0.0.0/0 
>           

We would expect a number of packets here too, nut none are visible :-(

>     0     0 tun_fwd    all  --  tun+   *       0.0.0.0/0            0.0.0.0/0 
>           
>     0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0 
>           
>     0     0 ULOG       all  --  *      *       0.0.0.0/0            0.0.0.0/0 
>           ULOG copy_range 0 nlgroup 1 prefix `Shorewall:FORWARD:REJECT:' 
> queue_threshold 1 
>     0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0 
>           
> 
...

> 
> Chain eth1_fwd (1 references)
>  pkts bytes target     prot opt in     out     source               
> destination         
>    13   744 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0 
>           state INVALID,NEW 
>    26  4007 loc2net    all  --  *      eth0    0.0.0.0/0            0.0.0.0/0 
>           
>    10   600 loc2dmz    all  --  *      eth2    0.0.0.0/0            0.0.0.0/0 
>           

OK 10 packets from local to dmz let's go to that chain....


>     0     0 loc2vpn    all  --  *      tun+    0.0.0.0/0            0.0.0.0/0 
>           
> 
....

> 
> Chain loc2dmz (1 references)
>  pkts bytes target     prot opt in     out     source               
> destination         
>     0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0 
>           state RELATED,ESTABLISHED 
>    10   600 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0 
>           icmp type 8

It looks like 10 icmp requests have been accepted, now back to the 
FORWARD chain...

>     0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0 
>           
....

If you reset the counters before testing it is easier to read.
Try to minimize all other traffic durng your tests, it will become clear 
what is happening

If you want us to understand your test, please note _exactly_ what 
test1,2,3 is. Please conduct only one test at a time.

cheers

Erich

-------------------------------------------------------------------------
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get the chance to share your
opinions on IT & business topics through brief surveys-and earn cash
http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV
------------------------------------------------------------------------
leaf-user mailing list: leaf-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/leaf-user
Support Request -- http://leaf-project.org/

Reply via email to