have a centos server with 2 NICs hanging at 2 different gateways can ping gateway one gateway two not
tested from localhost (10.10.10.10 eth0) to 10.10.10.1

sorry my english is not the best...

i hope i made everything correct... if not please tell me what to do...
horewall 4.0.11 Dump at SerCen0210 - Thu Feb  4 23:53:44 CET 2010

   Shorewall-shell 4.0.11
   Shorewall-perl  4.0.11.1

Counters reset Thu Feb  4 23:48:43 CET 2010

Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
   84  6648 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0   
        
   11   956 eth0_in    all  --  eth0   *       0.0.0.0/0            0.0.0.0/0   
        
  210 36933 eth1_in    all  --  eth1   *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 Drop       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:INPUT:DROP:' 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 eth0_fwd   all  --  eth0   *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 eth1_fwd   all  --  eth1   *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 Drop       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:FORWARD:DROP:' 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain OUTPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
   84  6648 ACCEPT     all  --  *      lo      0.0.0.0/0            0.0.0.0/0   
        
    6   504 eth0_out   all  --  *      eth0    0.0.0.0/0            0.0.0.0/0   
        
  208 64953 eth1_out   all  --  *      eth1    0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 Drop       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:OUTPUT:DROP:' 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain Drop (5 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:113 
   11   956 dropBcast  all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 3 code 4 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 11 
    0     0 dropInvalid  all  --  *      *       0.0.0.0/0            0.0.0.0/0 
          
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,445 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:137:139 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:137 dpts:1024:65535 
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,139,445 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:1900 
    0     0 dropNotSyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0  
         
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:53 

Chain Reject (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:113 
    0     0 dropBcast  all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 3 code 4 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 11 
    0     0 dropInvalid  all  --  *      *       0.0.0.0/0            0.0.0.0/0 
          
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,445 
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:137:139 
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:137 dpts:1024:65535 
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,139,445 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:1900 
    0     0 dropNotSyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0  
         
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:53 

Chain dmz2fw (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 8 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 8 
   11   956 Drop       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain dmz2int (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 8 
    0     0 Drop       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain dropBcast (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
   10   920 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        PKTTYPE = broadcast 
    1    36 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        PKTTYPE = multicast 

Chain dropInvalid (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID 

Chain dropNotSyn (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp flags:!0x17/0x02 

Chain dynamic (4 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain eth0_fwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW 
    0     0 dmz2int    all  --  *      eth1    0.0.0.0/0            0.0.0.0/0   
        

Chain eth0_in (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
   11   956 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW 
   11   956 dmz2fw     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain eth0_out (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    6   504 fw2dmz     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain eth1_fwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW 
    0     0 int2dmz    all  --  *      eth0    0.0.0.0/0            0.0.0.0/0   
        

Chain eth1_in (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
   19  1580 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW 
  210 36933 int2fw     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain eth1_out (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
  208 64953 fw2int     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain fw2dmz (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    6   504 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 8 
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain fw2int (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
  178 62960 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 8 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        
   30  1993 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain int2dmz (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 8 
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain int2fw (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
  191 35353 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 8 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 8 
   19  1580 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain logdrop (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:logdrop:DROP:' 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain logreject (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:logreject:REJECT:' 
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain reject (7 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        PKTTYPE = broadcast 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        PKTTYPE = multicast 
    0     0 DROP       all  --  *      *       255.255.255.255      0.0.0.0/0   
        
    0     0 DROP       all  --  *      *       224.0.0.0/4          0.0.0.0/0   
        
    0     0 DROP       2    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 REJECT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with tcp-reset 
    0     0 REJECT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with icmp-port-unreachable 
    0     0 REJECT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with icmp-host-unreachable 
    0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with icmp-host-prohibited 

Chain shorewall (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain smurfs (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        all  --  *      *       192.168.30.255       0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:' 
    0     0 DROP       all  --  *      *       192.168.30.255       0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       255.255.255.255      0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:' 
    0     0 DROP       all  --  *      *       255.255.255.255      0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       224.0.0.0/4          0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:' 
    0     0 DROP       all  --  *      *       224.0.0.0/4          0.0.0.0/0   
        

Log (/var/log/messages)


NAT Table

Chain PREROUTING (policy ACCEPT 29 packets, 2500 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain POSTROUTING (policy ACCEPT 74 packets, 4925 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain OUTPUT (policy ACCEPT 74 packets, 4925 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Mangle Table

Chain PREROUTING (policy ACCEPT 306 packets, 44577 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
  306 44577 tcpre      all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain INPUT (policy ACCEPT 306 packets, 44577 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 tcfor      all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain OUTPUT (policy ACCEPT 5383 packets, 2552K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
  300 74629 tcout      all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain POSTROUTING (policy ACCEPT 300 packets, 74629 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
  300 74629 tcpost     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain tcfor (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain tcout (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain tcpost (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain tcpre (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Conntrack Table

tcp      6 431999 ESTABLISHED src=192.168.30.102 dst=192.168.30.10 sport=53259 
dport=10000 packets=14 bytes=2635 src=192.168.30.10 dst=192.168.30.102 
sport=10000 dport=53259 packets=17 bytes=10253 [ASSURED] mark=0 secmark=0 use=1
tcp      6 431962 ESTABLISHED src=192.168.30.102 dst=192.168.30.10 sport=53257 
dport=10000 packets=9 bytes=1914 src=192.168.30.10 dst=192.168.30.102 
sport=10000 dport=53257 packets=10 bytes=3481 [ASSURED] mark=0 secmark=0 use=1
icmp     1 22 src=10.10.10.10 dst=10.10.10.1 type=8 code=0 id=29186 packets=3 
bytes=252 [UNREPLIED] src=10.10.10.1 dst=10.10.10.10 type=0 code=0 id=29186 
packets=0 bytes=0 mark=0 secmark=0 use=1
tcp      6 431962 ESTABLISHED src=192.168.30.102 dst=192.168.30.10 sport=53256 
dport=10000 packets=13 bytes=3244 src=192.168.30.10 dst=192.168.30.102 
sport=10000 dport=53256 packets=15 bytes=9893 [ASSURED] mark=0 secmark=0 use=1
udp      17 6 src=192.168.30.10 dst=195.50.140.252 sport=60649 dport=53 
packets=1 bytes=73 src=195.50.140.252 dst=192.168.30.10 sport=53 dport=60649 
packets=1 bytes=148 mark=0 secmark=0 use=1
tcp      6 431962 ESTABLISHED src=192.168.30.102 dst=192.168.30.10 sport=53261 
dport=10000 packets=13 bytes=3260 src=192.168.30.10 dst=192.168.30.102 
sport=10000 dport=53261 packets=15 bytes=9285 [ASSURED] mark=0 secmark=0 use=1
tcp      6 431962 ESTABLISHED src=192.168.30.102 dst=192.168.30.10 sport=53260 
dport=10000 packets=9 bytes=1874 src=192.168.30.10 dst=192.168.30.102 
sport=10000 dport=53260 packets=8 bytes=2661 [ASSURED] mark=0 secmark=0 use=1
udp      17 9 src=192.168.30.57 dst=192.168.30.255 sport=138 dport=138 
packets=1 bytes=244 [UNREPLIED] src=192.168.30.255 dst=192.168.30.57 sport=138 
dport=138 packets=0 bytes=0 mark=0 secmark=0 use=1
udp      17 15 src=192.168.30.1 dst=192.168.30.255 sport=520 dport=520 
packets=1 bytes=92 [UNREPLIED] src=192.168.30.255 dst=192.168.30.1 sport=520 
dport=520 packets=0 bytes=0 mark=0 secmark=0 use=1
tcp      6 431992 ESTABLISHED src=192.168.30.102 dst=192.168.30.10 sport=53262 
dport=22 packets=49 bytes=4440 src=192.168.30.10 dst=192.168.30.102 sport=22 
dport=53262 packets=41 bytes=5444 [ASSURED] mark=0 secmark=0 use=1
tcp      6 431962 ESTABLISHED src=192.168.30.102 dst=192.168.30.10 sport=53258 
dport=10000 packets=10 bytes=1942 src=192.168.30.10 dst=192.168.30.102 
sport=10000 dport=53258 packets=9 bytes=3335 [ASSURED] mark=0 secmark=0 use=1

IP Configuration

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue 
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
    inet6 ::1/128 scope host 
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:16:17:a1:23:8d brd ff:ff:ff:ff:ff:ff
    inet 10.10.10.10/24 brd 10.10.10.255 scope global eth0
    inet6 fe80::216:17ff:fea1:238d/64 scope link 
       valid_lft forever preferred_lft forever
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:50:22:8b:a7:53 brd ff:ff:ff:ff:ff:ff
    inet 192.168.30.10/24 brd 192.168.30.255 scope global eth1
    inet6 fe80::250:22ff:fe8b:a753/64 scope link 
       valid_lft forever preferred_lft forever
4: sit0: <NOARP> mtu 1480 qdisc noop 
    link/sit 0.0.0.0 brd 0.0.0.0

IP Stats

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue 
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    RX: bytes  packets  errors  dropped overrun mcast   
    80833      1001     0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    80833      1001     0       0       0       0      
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:16:17:a1:23:8d brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    125178     1244     0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    94990      898      0       0       0       0      
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:50:22:8b:a7:53 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    255856328  263003   0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    20177403   147898   0       0       0       0      
4: sit0: <NOARP> mtu 1480 qdisc noop 
    link/sit 0.0.0.0 brd 0.0.0.0
    RX: bytes  packets  errors  dropped overrun mcast   
    0          0        0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    0          0        0       0       0       0      

PFKEY SPD

No SPD entries.

PFKEY SAD

No SAD entries.

/proc

   /proc/version = Linux version 2.6.18-164.11.1.el5 
([email protected]) (gcc version 4.1.2 20080704 (Red Hat 
4.1.2-46)) #1 SMP Wed Jan 20 07:39:04 EST 2010
   /proc/sys/net/ipv4/ip_forward = 1
   /proc/sys/net/ipv4/icmp_echo_ignore_all = 0
   /proc/sys/net/ipv4/conf/all/proxy_arp = 0
   /proc/sys/net/ipv4/conf/all/arp_filter = 0
   /proc/sys/net/ipv4/conf/all/arp_ignore = 0
   /proc/sys/net/ipv4/conf/all/rp_filter = 1
   /proc/sys/net/ipv4/conf/all/log_martians = 0
   /proc/sys/net/ipv4/conf/default/proxy_arp = 0
   /proc/sys/net/ipv4/conf/default/arp_filter = 0
   /proc/sys/net/ipv4/conf/default/arp_ignore = 0
   /proc/sys/net/ipv4/conf/default/rp_filter = 0
   /proc/sys/net/ipv4/conf/default/log_martians = 0
   /proc/sys/net/ipv4/conf/eth0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/eth0/arp_filter = 0
   /proc/sys/net/ipv4/conf/eth0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/eth0/rp_filter = 0
   /proc/sys/net/ipv4/conf/eth0/log_martians = 0
   /proc/sys/net/ipv4/conf/eth1/proxy_arp = 0
   /proc/sys/net/ipv4/conf/eth1/arp_filter = 0
   /proc/sys/net/ipv4/conf/eth1/arp_ignore = 0
   /proc/sys/net/ipv4/conf/eth1/rp_filter = 0
   /proc/sys/net/ipv4/conf/eth1/log_martians = 0
   /proc/sys/net/ipv4/conf/lo/proxy_arp = 0
   /proc/sys/net/ipv4/conf/lo/arp_filter = 0
   /proc/sys/net/ipv4/conf/lo/arp_ignore = 0
   /proc/sys/net/ipv4/conf/lo/rp_filter = 0
   /proc/sys/net/ipv4/conf/lo/log_martians = 0

Routing Rules

0:      from all lookup 255 
32766:  from all lookup main 
32767:  from all lookup default 

Table 255:

broadcast 127.255.255.255 dev lo  proto kernel  scope link  src 127.0.0.1 
broadcast 10.10.10.0 dev eth0  proto kernel  scope link  src 10.10.10.10 
local 192.168.30.10 dev eth1  proto kernel  scope host  src 192.168.30.10 
broadcast 192.168.30.255 dev eth1  proto kernel  scope link  src 192.168.30.10 
local 10.10.10.10 dev eth0  proto kernel  scope host  src 10.10.10.10 
broadcast 10.10.10.255 dev eth0  proto kernel  scope link  src 10.10.10.10 
broadcast 192.168.30.0 dev eth1  proto kernel  scope link  src 192.168.30.10 
broadcast 127.0.0.0 dev lo  proto kernel  scope link  src 127.0.0.1 
local 127.0.0.1 dev lo  proto kernel  scope host  src 127.0.0.1 
local 127.0.0.0/8 dev lo  proto kernel  scope host  src 127.0.0.1 

Table default:


Table main:

192.168.30.0/24 dev eth1  proto kernel  scope link  src 192.168.30.10 
10.10.10.0/24 dev eth0  proto kernel  scope link  src 10.10.10.10 
169.254.0.0/16 dev eth1  scope link 
default via 192.168.30.1 dev eth1 

ARP

? (192.168.30.1) at 00:23:F8:27:99:F0 [ether] on eth1
? (192.168.30.102) at 00:19:DB:CE:1C:7B [ether] on eth1
? (10.10.10.1) at 00:23:F8:27:99:F2 [ether] on eth0

Modules

ip_conntrack           53281  24 
ipt_MASQUERADE,ip_nat_tftp,ip_nat_snmp_basic,ip_nat_sip,ip_nat_pptp,ip_nat_irc,ip_nat_h323,ip_nat_ftp,ip_nat_amanda,ip_conntrack_tftp,ip_conntrack_sip,ip_conntrack_pptp,ip_conntrack_irc,ip_conntrack_h323,ip_conntrack_ftp,ip_conntrack_amanda,xt_helper,xt_conntrack,xt_CONNMARK,xt_connmark,xt_state,ip_conntrack_netbios_ns,iptable_nat,ip_nat
ip_conntrack_amanda     8901  1 ip_nat_amanda
ip_conntrack_ftp       11569  1 ip_nat_ftp
ip_conntrack_h323      51421  1 ip_nat_h323
ip_conntrack_irc       10545  1 ip_nat_irc
ip_conntrack_netbios_ns     6977  0 
ip_conntrack_pptp      15441  1 ip_nat_pptp
ip_conntrack_sip       11313  1 ip_nat_sip
ip_conntrack_tftp       8249  1 ip_nat_tftp
ip_nat                 21101  12 
ipt_SAME,ipt_REDIRECT,ipt_NETMAP,ipt_MASQUERADE,ip_nat_tftp,ip_nat_sip,ip_nat_pptp,ip_nat_irc,ip_nat_h323,ip_nat_ftp,ip_nat_amanda,iptable_nat
ip_nat_amanda           6465  0 
ip_nat_ftp              7361  0 
ip_nat_h323            11073  0 
ip_nat_irc              6721  0 
ip_nat_pptp             9797  0 
ip_nat_sip              8129  0 
ip_nat_snmp_basic      13253  0 
ip_nat_tftp             5953  0 
ip_tables              17029  4 
iptable_raw,iptable_filter,iptable_mangle,iptable_nat
ipt_CLUSTERIP          12357  0 
ipt_DSCP                6337  0 
ipt_ECN                 7105  0 
ipt_LOG                10049  8 
ipt_MASQUERADE          7617  0 
ipt_NETMAP              6081  0 
ipt_REDIRECT            6081  0 
ipt_REJECT              9665  4 
ipt_SAME                6465  0 
ipt_TCPMSS              8001  0 
ipt_TOS                 6337  0 
ipt_TTL                 6337  0 
ipt_ULOG               11717  0 
ipt_addrtype            5953  0 
ipt_ah                  5953  0 
ipt_dscp                5825  0 
ipt_ecn                 6337  0 
ipt_hashlimit          12617  0 
ipt_iprange             5953  0 
ipt_owner               6081  0 
ipt_recent             12497  0 
ipt_tos                 5825  0 
ipt_ttl                 5953  0 
iptable_filter          7105  1 
iptable_mangle          6849  1 
iptable_nat            11077  0 
iptable_raw             6209  0 
xt_CLASSIFY             5953  0 
xt_CONNMARK             6465  0 
xt_DSCP                 6465  0 
xt_MARK                 6465  0 
xt_NFQUEUE              6209  0 
xt_comment              5953  0 
xt_connmark             6209  0 
xt_conntrack            6593  0 
xt_dccp                 7365  0 
xt_helper               6593  0 
xt_length               6081  0 
xt_limit                6721  0 
xt_mac                  6081  0 
xt_mark                 5953  0 
xt_multiport            7233  4 
xt_physdev              6993  0 
xt_pkttype              6081  4 
xt_policy               7617  0 
xt_state                6209  14 
xt_tcpmss               6337  0 
xt_tcpudp               7105  11 

Shorewall has detected the following iptables/netfilter capabilities:
   NAT: Available
   Packet Mangling: Available
   Multi-port Match: Available
   Extended Multi-port Match: Available
   Connection Tracking Match: Available
   Packet Type Match: Available
   Policy Match: Available
   Physdev Match: Available
   Physdev-is-bridged Support: Available
   Packet length Match: Available
   IP range Match: Available
   Recent Match: Available
   Owner Match: Available
   Ipset Match: Not available
   CONNMARK Target: Available
   Extended CONNMARK Target: Available
   Connmark Match: Available
   Extended Connmark Match: Available
   Raw Table: Available
   IPP2P Match: Not available
   CLASSIFY Target: Available
   Extended REJECT: Available
   Repeat match: Not available
   MARK Target: Available
   Extended MARK Target: Available
   Mangle FORWARD Chain: Available
   Comments: Available
   Address Type Match: Available
   TCPMSS Match: Available
   Hashlimit Match: Available
   NFQUEUE Target: Available

Traffic Control

Device eth0:
qdisc pfifo_fast 0: bands 3 priomap  1 2 2 2 1 2 0 0 1 1 1 1 1 1 1 1
 Sent 94030 bytes 898 pkt (dropped 0, overlimits 0 requeues 0) 
 rate 0bit 0pps backlog 0b 0p requeues 0 

Device eth1:
qdisc pfifo_fast 0: bands 3 priomap  1 2 2 2 1 2 0 0 1 1 1 1 1 1 1 1
 Sent 20102829 bytes 147926 pkt (dropped 0, overlimits 0 requeues 0) 
 rate 0bit 0pps backlog 0b 0p requeues 0 


TC Filters

Device eth0:

Device eth1:

------------------------------------------------------------------------------
The Planet: dedicated and managed hosting, cloud storage, colocation
Stay online with enterprise data centers and the best network in the business
Choose flexible plans and management services without long-term contracts
Personal 24x7 support from experience hosting pros just a phone call away.
http://p.sf.net/sfu/theplanet-com
_______________________________________________
Shorewall-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-devel

Reply via email to