seem to have problems with my squeezebox rebuffering &
stuttering when playing music. I have homed the
problem to my firewall (shorewall) especially its
packet shaper.

When the packet shaper is disabled, but the firewall
running everything is fine. When i enable the internal
packet shaper my music starts stuttering and the
player keeps rebuffering.

I have created a TC class for the player giving it
full bandwidth and minimizing delay but it does not
seem to work.Let me know what i'm missing.


Here are my relevant rules and attached a dump of
shorewall config:

#Squeezebox
ACCEPT net:10.0.0.0/24 $FW tcp 9000
ACCEPT net:10.0.0.0/24 $FW tcp 3483
ACCEPT net:10.0.0.0/24 $FW udp 3483

I'm using Gentoo 2.6.21 and slimserver v6.5.3,
Shorewall 3.4.3.


Eric


       
____________________________________________________________________________________
Pinpoint customers who are looking for what you sell. 
http://searchmarketing.yahoo.com/
Shorewall 3.4.3 Dump at ndovu - Sat Aug 18 00:08:57 BST 2007

Counters reset Fri Aug 17 20:13:02 BST 2007

Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
 108K   51M ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0   
        
28365 2144K eth0_in    all  --  eth0   *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:' 
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 eth0_fwd   all  --  eth0   *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:' 
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain OUTPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
 108K   51M ACCEPT     all  --  *      lo      0.0.0.0/0            0.0.0.0/0   
        
30476   25M eth0_out   all  --  *      eth0    0.0.0.0/0            0.0.0.0/0   
        
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:OUTPUT:REJECT:' 
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain Drop (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:113 
   48  8587 dropBcast  all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 3 code 4 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 11 
    0     0 dropInvalid  all  --  *      *       0.0.0.0/0            0.0.0.0/0 
          
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,445 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:137:139 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:137 dpts:1024:65535 
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,139,445 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:1900 
    0     0 dropNotSyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0  
         
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:53 

Chain Reject (4 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:113 
    0     0 dropBcast  all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 3 code 4 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 11 
    0     0 dropInvalid  all  --  *      *       0.0.0.0/0            0.0.0.0/0 
          
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,445 
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:137:139 
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:137 dpts:1024:65535 
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,139,445 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:1900 
    0     0 dropNotSyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0  
         
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:53 

Chain all2all (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:all2all:REJECT:' 
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain dropBcast (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
   48  8587 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        PKTTYPE = broadcast 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        PKTTYPE = multicast 

Chain dropInvalid (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID 

Chain dropNotSyn (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp flags:!0x17/0x02 

Chain dynamic (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain eth0_fwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW 
    0     0 smurfs     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW 
    0     0 tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain eth0_in (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
 2645  902K dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW 
 2645  902K smurfs     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:67:68 
25713 1241K tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
28365 2144K net2fw     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain eth0_out (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:67:68 
30476   25M fw2net     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain fw2net (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
30416   25M ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        
   60  9327 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain logdrop (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:logdrop:DROP:' 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain logflags (5 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:logflags:DROP:' 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain logreject (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:logreject:REJECT:' 
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain net2all (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 Drop       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:net2all:DROP:' 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain net2fw (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
25720 1242K ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 reject     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 8 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 6969,7070 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpts:6881:6889 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 6969,7070 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:6881:6889 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:37655 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:37655 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            10.0.0.1    
        multiport dports 6969,7070 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            10.0.0.1    
        tcp dpts:6881:6889 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            10.0.0.1    
        multiport dports 6969,7070 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            10.0.0.1    
        udp dpts:6881:6889 
 2596  894K ACCEPT     udp  --  *      *       10.0.0.0/24          0.0.0.0/0   
        udp spt:1900 
    1    44 ACCEPT     tcp  --  *      *       10.0.0.0/24          0.0.0.0/0   
        tcp dpt:9000 
    0     0 ACCEPT     tcp  --  *      *       10.0.0.0/24          0.0.0.0/0   
        tcp dpt:3483 
    0     0 ACCEPT     udp  --  *      *       10.0.0.0/24          0.0.0.0/0   
        udp dpt:3483 
   48  8587 Drop       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:net2fw:DROP:' 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain reject (12 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        PKTTYPE = broadcast 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        PKTTYPE = multicast 
    0     0 DROP       all  --  *      *       255.255.255.255      0.0.0.0/0   
        
    0     0 DROP       all  --  *      *       224.0.0.0/4          0.0.0.0/0   
        
    0     0 REJECT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with tcp-reset 
    0     0 REJECT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with icmp-port-unreachable 
    0     0 REJECT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with icmp-host-unreachable 
    0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with icmp-host-prohibited 

Chain shorewall (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain smurfs (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        all  --  *      *       10.0.0.255           0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:' 
    0     0 DROP       all  --  *      *       10.0.0.255           0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       255.255.255.255      0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:' 
    0     0 DROP       all  --  *      *       255.255.255.255      0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       224.0.0.0/4          0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:' 
    0     0 DROP       all  --  *      *       224.0.0.0/4          0.0.0.0/0   
        

Chain tcpflags (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp flags:0x3F/0x29 
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp flags:0x3F/0x00 
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp flags:0x06/0x06 
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp flags:0x03/0x03 
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp spt:0 flags:0x17/0x02 

Log (/var/log/messages)

Jul 19 20:55:58 net2fw:DROP:IN=eth0 OUT= SRC=87.244.131.201 DST=10.0.0.1 LEN=91 
TOS=0x00 PREC=0x00 TTL=23 ID=26596 PROTO=UDP SPT=52982 DPT=37655 LEN=71 
Jul 19 20:57:12 net2fw:DROP:IN=eth0 OUT= SRC=121.50.200.68 DST=10.0.0.1 LEN=91 
TOS=0x00 PREC=0x20 TTL=110 ID=35479 PROTO=UDP SPT=43898 DPT=37655 LEN=71 
Jul 19 20:58:01 net2fw:DROP:IN=eth0 OUT= SRC=203.214.72.225 DST=10.0.0.1 LEN=70 
TOS=0x00 PREC=0x00 TTL=50 ID=0 DF PROTO=UDP SPT=63246 DPT=37655 LEN=50 
Jul 19 20:58:11 net2fw:DROP:IN=eth0 OUT= SRC=121.50.200.68 DST=10.0.0.1 LEN=91 
TOS=0x00 PREC=0x20 TTL=110 ID=36879 PROTO=UDP SPT=43898 DPT=37655 LEN=71 
Jul 19 20:58:46 net2fw:DROP:IN=eth0 OUT= SRC=217.211.142.141 DST=10.0.0.1 
LEN=91 TOS=0x00 PREC=0x00 TTL=108 ID=42779 PROTO=UDP SPT=39727 DPT=37655 LEN=71 
Jul 19 20:59:12 net2fw:DROP:IN=eth0 OUT= SRC=88.134.150.242 DST=10.0.0.1 LEN=91 
TOS=0x00 PREC=0x20 TTL=113 ID=28803 PROTO=UDP SPT=45359 DPT=37655 LEN=71 
Jul 19 20:59:30 net2fw:DROP:IN=eth0 OUT= SRC=80.219.35.5 DST=10.0.0.1 LEN=91 
TOS=0x00 PREC=0x20 TTL=112 ID=33414 PROTO=UDP SPT=24923 DPT=37655 LEN=71 
Jul 19 20:59:37 net2fw:DROP:IN=eth0 OUT= SRC=217.211.142.141 DST=10.0.0.1 
LEN=91 TOS=0x00 PREC=0x00 TTL=108 ID=47062 PROTO=UDP SPT=39727 DPT=37655 LEN=71 
Jul 19 20:59:38 net2fw:DROP:IN=eth0 OUT= SRC=88.134.150.242 DST=10.0.0.1 LEN=91 
TOS=0x00 PREC=0x20 TTL=113 ID=30156 PROTO=UDP SPT=45359 DPT=37655 LEN=71 
Jul 19 20:59:39 net2fw:DROP:IN=eth0 OUT= SRC=88.134.150.242 DST=10.0.0.1 LEN=91 
TOS=0x00 PREC=0x20 TTL=113 ID=30254 PROTO=UDP SPT=45359 DPT=37655 LEN=71 
Jul 19 20:59:56 net2fw:DROP:IN=eth0 OUT= SRC=217.211.142.141 DST=10.0.0.1 
LEN=91 TOS=0x00 PREC=0x00 TTL=108 ID=48546 PROTO=UDP SPT=39727 DPT=37655 LEN=71 
Jul 19 21:00:25 net2fw:DROP:IN=eth0 OUT= SRC=88.134.150.242 DST=10.0.0.1 LEN=91 
TOS=0x00 PREC=0x20 TTL=113 ID=32862 PROTO=UDP SPT=45359 DPT=37655 LEN=71 
Jul 19 21:19:29 net2fw:DROP:IN=eth0 OUT= SRC=10.0.0.1 DST=239.255.67.250 
LEN=170 TOS=0x00 PREC=0x00 TTL=4 ID=0 DF PROTO=UDP SPT=1026 DPT=16680 LEN=150 
Jul 19 21:49:29 net2fw:DROP:IN=eth0 OUT= SRC=10.0.0.1 DST=239.255.67.250 
LEN=170 TOS=0x00 PREC=0x00 TTL=4 ID=0 DF PROTO=UDP SPT=1026 DPT=16680 LEN=150 
Jul 19 22:19:29 net2fw:DROP:IN=eth0 OUT= SRC=10.0.0.1 DST=239.255.67.250 
LEN=170 TOS=0x00 PREC=0x00 TTL=4 ID=0 DF PROTO=UDP SPT=1026 DPT=16680 LEN=150 
Jul 19 22:49:29 net2fw:DROP:IN=eth0 OUT= SRC=10.0.0.1 DST=239.255.67.250 
LEN=170 TOS=0x00 PREC=0x00 TTL=4 ID=0 DF PROTO=UDP SPT=1026 DPT=16680 LEN=150 
Jul 19 23:08:19 net2fw:DROP:IN=eth0 OUT= SRC=10.0.0.1 DST=239.255.67.250 
LEN=170 TOS=0x00 PREC=0x00 TTL=4 ID=0 DF PROTO=UDP SPT=1026 DPT=16680 LEN=150 
Aug 10 12:20:43 net2fw:DROP:IN=eth0 OUT= SRC=10.0.0.1 DST=255.255.255.255 
LEN=180 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP SPT=1024 DPT=3865 LEN=160 
Aug 11 17:34:11 net2fw:DROP:IN=eth0 OUT= SRC=10.0.0.20 DST=10.0.0.1 LEN=254 
TOS=0x00 PREC=0x00 TTL=64 ID=85 PROTO=UDP SPT=59422 DPT=8008 LEN=234 
Aug 11 17:35:13 net2fw:DROP:IN=eth0 OUT= SRC=10.0.0.20 DST=10.0.0.1 LEN=254 
TOS=0x00 PREC=0x00 TTL=64 ID=213 PROTO=UDP SPT=58793 DPT=8008 LEN=234 

NAT Table

Chain PREROUTING (policy ACCEPT 237 packets, 71788 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
  237 71788 net_dnat   all  --  eth0   *       0.0.0.0/0            0.0.0.0/0   
        

Chain POSTROUTING (policy ACCEPT 950 packets, 57000 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
   59  9177 eth0_masq  all  --  *      eth0    0.0.0.0/0            0.0.0.0/0   
        

Chain OUTPUT (policy ACCEPT 1009 packets, 66177 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain eth0_masq (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
   59  9177 MASQUERADE  all  --  *      *       10.0.0.0/24          0.0.0.0/0  
         

Chain net_dnat (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DNAT       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 6969,7070 to:10.0.0.1 
    0     0 DNAT       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpts:6881:6889 to:10.0.0.1 
    0     0 DNAT       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 6969,7070 to:10.0.0.1 
    0     0 DNAT       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:6881:6889 to:10.0.0.1 

Mangle Table

Chain PREROUTING (policy ACCEPT 136K packets, 53M bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
 136K   53M tcpre      all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain INPUT (policy ACCEPT 136K packets, 53M bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 tcfor      all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain OUTPUT (policy ACCEPT 481K packets, 546M bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
 138K   76M tcout      all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain POSTROUTING (policy ACCEPT 138K packets, 76M bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
 138K   76M tcpost     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain tcfor (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain tcout (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain tcpost (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 MARK       icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 8 MARK set 0x2 
    0     0 MARK       icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 0 MARK set 0x2 
   88  9872 MARK       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 80 MARK set 0x2 
    8   512 MARK       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 53 MARK set 0x2 
 6744 1333K MARK       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 9000 MARK set 0x1 
    0     0 MARK       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        ipp2p v0.8.2 --ipp2p MARK set 0x3 
    0     0 CLASSIFY   all  --  *      eth0    0.0.0.0/0            0.0.0.0/0   
        MARK match 0x1/0xff CLASSIFY set 1:11 
   96 10384 CLASSIFY   all  --  *      eth0    0.0.0.0/0            0.0.0.0/0   
        MARK match 0x2/0xff CLASSIFY set 1:12 
    0     0 CLASSIFY   all  --  *      eth0    0.0.0.0/0            0.0.0.0/0   
        MARK match 0x3/0xff CLASSIFY set 1:13 

Chain tcpre (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Conntrack Table

tcp      6 46 TIME_WAIT src=127.0.0.1 dst=127.0.0.1 sport=58641 dport=9000 
packets=13 bytes=2567 src=127.0.0.1 dst=127.0.0.1 sport=9000 dport=58641 
packets=9 bytes=22501 [ASSURED] mark=0 use=1
tcp      6 87 TIME_WAIT src=127.0.0.1 dst=127.0.0.1 sport=58645 dport=9000 
packets=13 bytes=2567 src=127.0.0.1 dst=127.0.0.1 sport=9000 dport=58645 
packets=10 bytes=22553 [ASSURED] mark=0 use=1
tcp      6 59 ESTABLISHED src=10.0.0.34 dst=10.0.0.1 sport=55412 dport=9000 
packets=8172 bytes=333658 src=10.0.0.1 dst=10.0.0.34 sport=9000 dport=55412 
packets=9402 bytes=4271459 [ASSURED] mark=0 use=1
tcp      6 15 TIME_WAIT src=127.0.0.1 dst=127.0.0.1 sport=58638 dport=9000 
packets=12 bytes=2514 src=127.0.0.1 dst=127.0.0.1 sport=9000 dport=58638 
packets=10 bytes=22553 [ASSURED] mark=0 use=1
tcp      6 76 TIME_WAIT src=127.0.0.1 dst=127.0.0.1 sport=58644 dport=9000 
packets=12 bytes=2515 src=127.0.0.1 dst=127.0.0.1 sport=9000 dport=58644 
packets=10 bytes=22553 [ASSURED] mark=0 use=1
tcp      6 5 TIME_WAIT src=127.0.0.1 dst=127.0.0.1 sport=58637 dport=9000 
packets=12 bytes=2514 src=127.0.0.1 dst=127.0.0.1 sport=9000 dport=58637 
packets=10 bytes=22553 [ASSURED] mark=0 use=1
tcp      6 97 TIME_WAIT src=127.0.0.1 dst=127.0.0.1 sport=58646 dport=9000 
packets=13 bytes=2567 src=127.0.0.1 dst=127.0.0.1 sport=9000 dport=58646 
packets=10 bytes=22553 [ASSURED] mark=0 use=1
tcp      6 57 CLOSE_WAIT src=10.0.0.1 dst=212.58.226.33 sport=56714 dport=80 
packets=14 bytes=1509 src=212.58.226.33 dst=10.0.0.1 sport=80 dport=56714 
packets=13 bytes=14593 [ASSURED] mark=0 use=1
tcp      6 36 TIME_WAIT src=127.0.0.1 dst=127.0.0.1 sport=58640 dport=9000 
packets=13 bytes=2566 src=127.0.0.1 dst=127.0.0.1 sport=9000 dport=58640 
packets=10 bytes=22553 [ASSURED] mark=0 use=1
udp      17 26 src=10.0.0.254 dst=239.255.255.250 sport=1900 dport=1900 
packets=11 bytes=3787 [UNREPLIED] src=239.255.255.250 dst=10.0.0.254 sport=1900 
dport=1900 packets=0 bytes=0 mark=0 use=1
tcp      6 56 TIME_WAIT src=127.0.0.1 dst=127.0.0.1 sport=58642 dport=9000 
packets=12 bytes=2514 src=127.0.0.1 dst=127.0.0.1 sport=9000 dport=58642 
packets=10 bytes=22553 [ASSURED] mark=0 use=1
tcp      6 431989 ESTABLISHED src=10.0.0.1 dst=63.245.209.21 sport=55387 
dport=80 packets=4 bytes=769 src=63.245.209.21 dst=10.0.0.1 sport=80 
dport=55387 packets=2 bytes=725 [ASSURED] mark=0 use=1
tcp      6 66 TIME_WAIT src=127.0.0.1 dst=127.0.0.1 sport=58643 dport=9000 
packets=12 bytes=2514 src=127.0.0.1 dst=127.0.0.1 sport=9000 dport=58643 
packets=10 bytes=22553 [ASSURED] mark=0 use=1
tcp      6 107 TIME_WAIT src=127.0.0.1 dst=127.0.0.1 sport=58647 dport=9000 
packets=12 bytes=2515 src=127.0.0.1 dst=127.0.0.1 sport=9000 dport=58647 
packets=10 bytes=22553 [ASSURED] mark=0 use=1
tcp      6 117 TIME_WAIT src=127.0.0.1 dst=127.0.0.1 sport=58650 dport=9000 
packets=13 bytes=2566 src=127.0.0.1 dst=127.0.0.1 sport=9000 dport=58650 
packets=10 bytes=22553 [ASSURED] mark=0 use=1
udp      17 169 src=10.0.0.1 dst=10.0.0.254 sport=32770 dport=53 packets=2 
bytes=128 src=10.0.0.254 dst=10.0.0.1 sport=53 dport=32770 packets=2 bytes=249 
[ASSURED] mark=0 use=1
tcp      6 25 TIME_WAIT src=127.0.0.1 dst=127.0.0.1 sport=58639 dport=9000 
packets=12 bytes=2515 src=127.0.0.1 dst=127.0.0.1 sport=9000 dport=58639 
packets=10 bytes=22553 [ASSURED] mark=0 use=1

IP Configuration

1: lo: <LOOPBACK,UP,10000> mtu 16436 qdisc noqueue 
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 brd 127.255.255.255 scope host lo
2: eth0: <BROADCAST,MULTICAST,NOTRAILERS,UP,10000> mtu 1500 qdisc htb qlen 1000
    link/ether 00:11:d8:40:fe:b0 brd ff:ff:ff:ff:ff:ff
    inet 10.0.0.1/24 brd 10.0.0.255 scope global eth0

IP Stats

1: lo: <LOOPBACK,UP,10000> mtu 16436 qdisc noqueue 
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    RX: bytes  packets  errors  dropped overrun mcast   
    63522125   134954   0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    63522125   134954   0       0       0       0      
2: eth0: <BROADCAST,MULTICAST,NOTRAILERS,UP,10000> mtu 1500 qdisc htb qlen 1000
    link/ether 00:11:d8:40:fe:b0 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    24640878   246720   0       0       0       3625   
    TX: bytes  packets  errors  dropped carrier collsns 
    489020723  346931   0       0       0       0      

/proc

   /proc/version = Linux version 2.6.21-gentoo-r4y ([EMAIL PROTECTED]) (gcc 
version 4.1.1 (Gentoo 4.1.1)) #4 Tue Jul 31 22:25:24 BST 2007
   /proc/sys/net/ipv4/ip_forward = 1
   /proc/sys/net/ipv4/icmp_echo_ignore_all = 0
   /proc/sys/net/ipv4/conf/all/proxy_arp = 0
   /proc/sys/net/ipv4/conf/all/arp_filter = 0
   /proc/sys/net/ipv4/conf/all/arp_ignore = 0
   /proc/sys/net/ipv4/conf/all/rp_filter = 1
   /proc/sys/net/ipv4/conf/all/log_martians = 0
   /proc/sys/net/ipv4/conf/default/proxy_arp = 0
   /proc/sys/net/ipv4/conf/default/arp_filter = 0
   /proc/sys/net/ipv4/conf/default/arp_ignore = 0
   /proc/sys/net/ipv4/conf/default/rp_filter = 1
   /proc/sys/net/ipv4/conf/default/log_martians = 0
   /proc/sys/net/ipv4/conf/eth0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/eth0/arp_filter = 0
   /proc/sys/net/ipv4/conf/eth0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/eth0/rp_filter = 0
   /proc/sys/net/ipv4/conf/eth0/log_martians = 1
   /proc/sys/net/ipv4/conf/lo/proxy_arp = 0
   /proc/sys/net/ipv4/conf/lo/arp_filter = 0
   /proc/sys/net/ipv4/conf/lo/arp_ignore = 0
   /proc/sys/net/ipv4/conf/lo/rp_filter = 0
   /proc/sys/net/ipv4/conf/lo/log_martians = 0

Routing Rules

0:      from all lookup local 
32766:  from all lookup main 
32767:  from all lookup default 

Table default:


Table local:

broadcast 127.255.255.255 dev lo  proto kernel  scope link  src 127.0.0.1 
local 10.0.0.1 dev eth0  proto kernel  scope host  src 10.0.0.1 
broadcast 10.0.0.0 dev eth0  proto kernel  scope link  src 10.0.0.1 
broadcast 10.0.0.255 dev eth0  proto kernel  scope link  src 10.0.0.1 
broadcast 127.0.0.0 dev lo  proto kernel  scope link  src 127.0.0.1 
local 127.0.0.1 dev lo  proto kernel  scope host  src 127.0.0.1 
local 127.0.0.0/8 dev lo  proto kernel  scope host  src 127.0.0.1 

Table main:

10.0.0.0/24 dev eth0  scope link 
127.0.0.0/8 dev lo  scope link 
default via 10.0.0.254 dev eth0 

ARP

? (10.0.0.254) at 00:40:10:20:00:01 [ether] on eth0

Modules

ipt_ipp2p               7680  1 
iptable_mangle          2432  1 
ipt_ULOG                6404  0 
ipt_TTL                 2048  0 
ipt_ttl                 1792  0 
ipt_TOS                 2048  0 
ipt_tos                 1664  0 
ipt_SAME                2048  0 
ipt_REJECT              3584  4 
ipt_REDIRECT            1920  0 
ipt_recent              7576  0 
ipt_owner               1920  0 
ipt_NETMAP              1920  0 
ipt_MASQUERADE          2688  1 
ipt_LOG                 6016  12 
ipt_iprange             1792  0 
ipt_ECN                 2560  0 
ipt_ecn                 2048  0 
ipt_ah                  1792  0 
ipt_addrtype            1792  0 
iptable_nat             6020  1 
iptable_filter          2432  1 
ip_tables               9544  3 iptable_mangle,iptable_nat,iptable_filter

Shorewall has detected the following iptables/netfilter capabilities:
   NAT: Available
   Packet Mangling: Available
   Multi-port Match: Available
   Extended Multi-port Match: Available
   Connection Tracking Match: Available
   Packet Type Match: Available
   Policy Match: Available
   Physdev Match: Not available
   Packet length Match: Available
   IP range Match: Available
   Recent Match: Available
   Owner Match: Available
   Ipset Match: Not available
   CONNMARK Target: Available
   Extended CONNMARK Target: Available
   Connmark Match: Available
   Extended Connmark Match: Available
   Raw Table: Not available
   IPP2P Match: Available
   CLASSIFY Target: Available
   Extended REJECT: Available
   Repeat match: Not available
   MARK Target: Available
   Extended MARK Target: Available
   Mangle FORWARD Chain: Available
   Comments: Available
   Address Type Match: Available

Traffic Control

Device eth0:
qdisc htb 1: r2q 10 default 12 direct_packets_stat 0 ver 3.17
 Sent 25630117 bytes 30960 pkt (dropped 0, overlimits 8063 requeues 0) 
 rate 0bit 0pps backlog 0b 0p requeues 0 
qdisc ingress ffff: ---------------- 
 Sent 2285098 bytes 28602 pkt (dropped 0, overlimits 0 requeues 0) 
 rate 0bit 0pps backlog 0b 0p requeues 0 
qdisc sfq 11: parent 1:11 limit 128p quantum 1514b flows 128/1024 perturb 10sec 
 Sent 518184 bytes 9596 pkt (dropped 0, overlimits 0 requeues 0) 
 rate 0bit 0pps backlog 0b 0p requeues 0 
qdisc sfq 12: parent 1:12 limit 128p quantum 1514b flows 128/1024 perturb 10sec 
 Sent 25111933 bytes 21364 pkt (dropped 0, overlimits 0 requeues 0) 
 rate 0bit 0pps backlog 0b 0p requeues 0 
qdisc sfq 13: parent 1:13 limit 128p quantum 1514b flows 128/1024 perturb 10sec 
 Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0) 
 rate 0bit 0pps backlog 0b 0p requeues 0 
class htb 1:11 parent 1:1 leaf 11: prio 1 quantum 3000 rate 250000bit ceil 
250000bit burst 1624b/8 mpu 0b overhead 0b cburst 1624b/8 mpu 0b overhead 0b 
level 0 
 Sent 518184 bytes 9596 pkt (dropped 0, overlimits 0 requeues 0) 
 rate 0bit 0pps backlog 0b 0p requeues 0 
 lended: 9596 borrowed: 0 giants: 0
 tokens: 51676 ctokens: 51676

class htb 1:1 root rate 250000bit ceil 250000bit burst 1624b/8 mpu 0b overhead 
0b cburst 1624b/8 mpu 0b overhead 0b level 7 
 Sent 25630117 bytes 30960 pkt (dropped 0, overlimits 0 requeues 0) 
 rate 0bit 0pps backlog 0b 0p requeues 0 
 lended: 4135 borrowed: 0 giants: 0
 tokens: 51151 ctokens: 51151

class htb 1:13 parent 1:1 leaf 13: prio 3 quantum 1500 rate 6000bit ceil 
12000bit burst 1502b/8 mpu 0b overhead 0b cburst 1505b/8 mpu 0b overhead 0b 
level 0 
 Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0) 
 rate 0bit 0pps backlog 0b 0p requeues 0 
 lended: 0 borrowed: 0 giants: 0
 tokens: 2052096 ctokens: 1028096

class htb 1:12 parent 1:1 leaf 12: prio 2 quantum 1500 rate 25000bit ceil 
250000bit burst 1511b/8 mpu 0b overhead 0b cburst 1624b/8 mpu 0b overhead 0b 
level 0 
 Sent 25111933 bytes 21364 pkt (dropped 0, overlimits 0 requeues 0) 
 rate 672bit 0pps backlog 0b 0p requeues 0 
 lended: 17229 borrowed: 4135 giants: 0
 tokens: 474481 ctokens: 51151



TC Filters

Device eth0:
filter parent 1: protocol ip pref 10 u32 
filter parent 1: protocol ip pref 10 u32 fh 800: ht divisor 1 
filter parent 1: protocol ip pref 10 u32 fh 800::800 order 2048 key ht 800 bkt 
0 flowid 1:11  (rule hit 30376 success 9596)
  match 00060000/00ff0000 at 8 (success 30328 ) 
  match 05000000/0f00ffc0 at 0 (success 12311 ) 
  match 00100000/00ff0000 at 32 (success 9596 ) 
filter parent 1: protocol ip pref 10 u32 fh 800::801 order 2049 key ht 800 bkt 
0 flowid 1:11  (rule hit 20780 success 0)
  match 00100000/00100000 at 0 (success 0 ) 
filter parent 1: protocol ip pref 10 u32 fh 800::802 order 2050 key ht 800 bkt 
0 flowid 1:11  (rule hit 20780 success 0)
  match 00080000/00080000 at 0 (success 0 ) 

-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >>  http://get.splunk.com/
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to