Tom Eastep wrote:
Oscar Mas wrote:
Hi to all:
I've configured shorewall in a test environmet to work with traffic
shapping. I've read those two articles:
http://www.shorewall.net/traffic_shaping.htm
http://www.shorewall.net/kernel.htm#Kernel-2.6.16
and configured my shorewall to limit the bandwitch.
My firewall configuration is the following:
Internet -- (external ip 192.168.0.200) FW (lan ip 192.168.10.129)
--- (192.168.10.129) Client
Nowhere in this report do you tell us which interface eth1 is
(external or internel). You didn't think that was important?
Similarly, there is no output from 'shorewall show tc'.
The Support Guidelines
(http://www.shorewall.net/support.htm#Guidelines) clearly indicate
that Traffic Shaping problem reports should be accompanied by the
output of "shorewall dump". That output will give us a complete
picture of your setup and will allow us to answer your questions.
Excuse me, my eth0 is 192.168.0.200 (WAN), and eth1 is 192.168.10.129 (LAN).
This is my shorewall show tc:
Shorewall-3.2.6 Traffic Control at QoS - Mon Apr 21 18:44:40 CEST 2008
Device eth0:
qdisc pfifo_fast 0: root bands 3 priomap 1 2 2 2 1 2 0 0 1 1 1 1 1 1 1 1
Sent 593215 bytes 5694 pkt (dropped 0, overlimits 0 requeues 0)
rate 0bit 0pps backlog 0b 0p requeues 0
Device eth1:
qdisc htb 1: root r2q 10 default 11 direct_packets_stat 0 ver 3.17
Sent 424564 bytes 771 pkt (dropped 0, overlimits 506 requeues 0)
rate 0bit 0pps backlog 0b 0p requeues 0
qdisc ingress ffff: parent ffff:fff1 ----------------
Sent 1357902 bytes 11720 pkt (dropped 0, overlimits 0 requeues 0)
rate 0bit 0pps backlog 0b 0p requeues 0
qdisc sfq 11: parent 1:11 limit 127p quantum 1514b flows 127/1024
perturb 10sec
Sent 424564 bytes 771 pkt (dropped 0, overlimits 0 requeues 0)
rate 0bit 0pps backlog 0b 0p requeues 0
qdisc sfq 12: parent 1:12 limit 127p quantum 1514b flows 127/1024
perturb 10sec
Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
rate 0bit 0pps backlog 0b 0p requeues 0
class htb 1:11 parent 1:1 leaf 11: prio 1 quantum 1500 rate 80000bit
ceil 240000bit burst 1499b/8 mpu 0b overhead 0b cburst 1499b/8 mpu 0b
overhead 0b level 0
Sent 424564 bytes 771 pkt (dropped 0, overlimits 0 requeues 0)
rate 0bit 0pps backlog 0b 0p requeues 0
lended: 557 borrowed: 214 giants: 0
tokens: 142579 ctokens: 47527
class htb 1:1 root rate 640000bit ceil 640000bit burst 1499b/8 mpu 0b
overhead 0b cburst 1499b/8 mpu 0b overhead 0b level 7
Sent 424564 bytes 771 pkt (dropped 0, overlimits 0 requeues 0)
rate 0bit 0pps backlog 0b 0p requeues 0
lended: 214 borrowed: 0 giants: 0
tokens: 17823 ctokens: 17823
class htb 1:12 parent 1:1 leaf 12: prio 2 quantum 4800 rate 400000bit
ceil 640000bit burst 1499b/8 mpu 0b overhead 0b cburst 1499b/8 mpu 0b
overhead 0b level 0
Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
rate 0bit 0pps backlog 0b 0p requeues 0
lended: 0 borrowed: 0 giants: 0
tokens: 29296 ctokens: 18310
I attached my shorewall dump
Thanks for the reply
--
ilimit...
*Oscar Mas*
[EMAIL PROTECTED]
ÀREA SISTEMES
0034 937 333 375
VOLTA 1, PIS 5
08224 TERRASSA.BCN
Aquest enviament és confidencial i està destinat únicament a la persona a qui
s'ha enviat.
Pot contenir informació privada sotmesa al secret professional, la distribució
de la qual està prohibida per la legislació vigent.
QoS:~# shorewall dump
Shorewall-3.2.6 Dump at QoS - Mon Apr 21 18:46:51 CEST 2008
Counters reset Mon Apr 21 00:55:00 CEST 2008
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT 0 -- lo * 0.0.0.0/0 0.0.0.0/0
12256 1302K eth0_in 0 -- eth0 * 0.0.0.0/0 0.0.0.0/0
161 37301 eth1_in 0 -- eth1 * 0.0.0.0/0 0.0.0.0/0
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:INPUT:ACCEPT:'
0 0 ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
560 408K eth0_fwd 0 -- eth0 * 0.0.0.0/0 0.0.0.0/0
454 31378 eth1_fwd 0 -- eth1 * 0.0.0.0/0 0.0.0.0/0
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:FORWARD:ACCEPT:'
0 0 ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT 0 -- * lo 0.0.0.0/0 0.0.0.0/0
1094 154K all2all 0 -- * eth0 0.0.0.0/0 0.0.0.0/0
policy match dir out pol none
0 0 all2all 0 -- * eth1 0.0.0.0/0 0.0.0.0/0
policy match dir out pol none
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:OUTPUT:ACCEPT:'
0 0 ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain Drop (0 references)
pkts bytes target prot opt in out source destination
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:113
0 0 dropBcast 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 3 code 4
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 11
0 0 dropInvalid 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,445
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpts:137:139
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:137 dpts:1024:65535
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,139,445
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:1900
0 0 dropNotSyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:53
Chain Reject (0 references)
pkts bytes target prot opt in out source destination
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:113
0 0 dropBcast 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 3 code 4
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 11
0 0 dropInvalid 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,445
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpts:137:139
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:137 dpts:1024:65535
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,139,445
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:1900
0 0 dropNotSyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:53
Chain all2all (6 references)
pkts bytes target prot opt in out source destination
3486 693K ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
11039 1239K LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:all2all:ACCEPT:'
11039 1239K ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain dropBcast (2 references)
pkts bytes target prot opt in out source destination
0 0 DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0
PKTTYPE = broadcast
0 0 DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0
PKTTYPE = multicast
Chain dropInvalid (2 references)
pkts bytes target prot opt in out source destination
0 0 DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0
state INVALID
Chain dropNotSyn (2 references)
pkts bytes target prot opt in out source destination
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp flags:!0x17/0x02
Chain dynamic (4 references)
pkts bytes target prot opt in out source destination
Chain eth0_fwd (1 references)
pkts bytes target prot opt in out source destination
0 0 dynamic 0 -- * * 0.0.0.0/0 0.0.0.0/0
state INVALID,NEW
551 407K tcpflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
policy match dir in pol none
560 408K all2all 0 -- * eth1 0.0.0.0/0 0.0.0.0/0
policy match dir out pol none
Chain eth0_in (1 references)
pkts bytes target prot opt in out source destination
10828 1199K dynamic 0 -- * * 0.0.0.0/0 0.0.0.0/0
state INVALID,NEW
1390 98269 tcpflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
policy match dir in pol none
12256 1302K all2all 0 -- * * 0.0.0.0/0 0.0.0.0/0
policy match dir in pol none
Chain eth1_fwd (1 references)
pkts bytes target prot opt in out source destination
9 534 dynamic 0 -- * * 0.0.0.0/0 0.0.0.0/0
state INVALID,NEW
445 30622 tcpflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
policy match dir in pol none
454 31378 all2all 0 -- * eth0 0.0.0.0/0 0.0.0.0/0
policy match dir out pol none
Chain eth1_in (1 references)
pkts bytes target prot opt in out source destination
161 37301 dynamic 0 -- * * 0.0.0.0/0 0.0.0.0/0
state INVALID,NEW
0 0 tcpflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
policy match dir in pol none
161 37301 all2all 0 -- * * 0.0.0.0/0 0.0.0.0/0
policy match dir in pol none
Chain logdrop (0 references)
pkts bytes target prot opt in out source destination
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:logdrop:DROP:'
0 0 DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain logflags (5 references)
pkts bytes target prot opt in out source destination
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:logflags:DROP:'
0 0 DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain logreject (0 references)
pkts bytes target prot opt in out source destination
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:logreject:REJECT:'
0 0 reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain reject (7 references)
pkts bytes target prot opt in out source destination
0 0 DROP 0 -- * * 255.255.255.255 0.0.0.0/0
0 0 DROP 0 -- * * 224.0.0.0/4 0.0.0.0/0
0 0 DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0
PKTTYPE = broadcast
0 0 DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0
PKTTYPE = multicast
0 0 DROP 0 -- * * 255.255.255.255 0.0.0.0/0
0 0 DROP 0 -- * * 224.0.0.0/4 0.0.0.0/0
0 0 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with tcp-reset
0 0 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-port-unreachable
0 0 REJECT icmp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-host-unreachable
0 0 REJECT 0 -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-host-prohibited
Chain shorewall (0 references)
pkts bytes target prot opt in out source destination
Chain smurfs (0 references)
pkts bytes target prot opt in out source destination
0 0 LOG 0 -- * * 192.168.0.255 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:'
0 0 DROP 0 -- * * 192.168.0.255 0.0.0.0/0
0 0 LOG 0 -- * * 192.168.10.255 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:'
0 0 DROP 0 -- * * 192.168.10.255 0.0.0.0/0
0 0 LOG 0 -- * * 255.255.255.255 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:'
0 0 DROP 0 -- * * 255.255.255.255 0.0.0.0/0
0 0 LOG 0 -- * * 224.0.0.0/4 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:'
0 0 DROP 0 -- * * 224.0.0.0/4 0.0.0.0/0
Chain tcpflags (4 references)
pkts bytes target prot opt in out source destination
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp flags:0x3F/0x29
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp flags:0x3F/0x00
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp flags:0x06/0x06
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp flags:0x03/0x03
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp spt:0 flags:0x17/0x02
Log (/var/log/messages)
Apr 21 18:44:56 all2all:ACCEPT:IN=eth0 OUT= SRC=192.168.0.69 DST=192.168.0.255
LEN=166 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP SPT=631 DPT=631 LEN=146
Apr 21 18:44:57 all2all:ACCEPT:IN=eth0 OUT= SRC=192.168.0.1 DST=192.168.0.255
LEN=92 TOS=0x00 PREC=0x00 TTL=1 ID=48772 PROTO=UDP SPT=520 DPT=520 LEN=72
Apr 21 18:45:01 all2all:ACCEPT:IN=eth0 OUT= SRC=192.168.0.1 DST=224.0.0.1
LEN=28 TOS=0x00 PREC=0x00 TTL=1 ID=48773 PROTO=2
Apr 21 18:45:11 all2all:ACCEPT:IN=eth1 OUT= SRC=192.168.10.111
DST=192.168.10.255 LEN=235 TOS=0x00 PREC=0x00 TTL=128 ID=19371 PROTO=UDP
SPT=138 DPT=138 LEN=215
Apr 21 18:45:16 all2all:ACCEPT:IN=eth0 OUT= SRC=192.168.0.1 DST=224.0.0.1
LEN=28 TOS=0x00 PREC=0x00 TTL=1 ID=48774 PROTO=2
Apr 21 18:45:26 all2all:ACCEPT:IN=eth0 OUT= SRC=192.168.0.69 DST=192.168.0.255
LEN=233 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP SPT=631 DPT=631 LEN=213
Apr 21 18:45:27 all2all:ACCEPT:IN=eth0 OUT= SRC=192.168.0.1 DST=192.168.0.255
LEN=92 TOS=0x00 PREC=0x00 TTL=1 ID=48775 PROTO=UDP SPT=520 DPT=520 LEN=72
Apr 21 18:45:27 all2all:ACCEPT:IN=eth0 OUT= SRC=192.168.0.69 DST=192.168.0.255
LEN=166 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP SPT=631 DPT=631 LEN=146
Apr 21 18:45:31 all2all:ACCEPT:IN=eth0 OUT= SRC=192.168.0.1 DST=224.0.0.1
LEN=28 TOS=0x00 PREC=0x00 TTL=1 ID=48776 PROTO=2
Apr 21 18:45:46 all2all:ACCEPT:IN=eth0 OUT= SRC=192.168.0.1 DST=224.0.0.1
LEN=28 TOS=0x00 PREC=0x00 TTL=1 ID=48777 PROTO=2
Apr 21 18:45:57 all2all:ACCEPT:IN=eth0 OUT= SRC=192.168.0.1 DST=192.168.0.255
LEN=92 TOS=0x00 PREC=0x00 TTL=1 ID=48778 PROTO=UDP SPT=520 DPT=520 LEN=72
Apr 21 18:45:57 all2all:ACCEPT:IN=eth0 OUT= SRC=192.168.0.69 DST=192.168.0.255
LEN=233 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP SPT=631 DPT=631 LEN=213
Apr 21 18:45:58 all2all:ACCEPT:IN=eth0 OUT= SRC=192.168.0.69 DST=192.168.0.255
LEN=166 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP SPT=631 DPT=631 LEN=146
Apr 21 18:46:01 all2all:ACCEPT:IN=eth0 OUT= SRC=192.168.0.1 DST=224.0.0.1
LEN=28 TOS=0x00 PREC=0x00 TTL=1 ID=48779 PROTO=2
Apr 21 18:46:16 all2all:ACCEPT:IN=eth0 OUT= SRC=192.168.0.1 DST=224.0.0.1
LEN=28 TOS=0x00 PREC=0x00 TTL=1 ID=48780 PROTO=2
Apr 21 18:46:27 all2all:ACCEPT:IN=eth0 OUT= SRC=192.168.0.1 DST=192.168.0.255
LEN=92 TOS=0x00 PREC=0x00 TTL=1 ID=48781 PROTO=UDP SPT=520 DPT=520 LEN=72
Apr 21 18:46:28 all2all:ACCEPT:IN=eth0 OUT= SRC=192.168.0.69 DST=192.168.0.255
LEN=233 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP SPT=631 DPT=631 LEN=213
Apr 21 18:46:29 all2all:ACCEPT:IN=eth0 OUT= SRC=192.168.0.69 DST=192.168.0.255
LEN=166 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP SPT=631 DPT=631 LEN=146
Apr 21 18:46:31 all2all:ACCEPT:IN=eth0 OUT= SRC=192.168.0.1 DST=224.0.0.1
LEN=28 TOS=0x00 PREC=0x00 TTL=1 ID=48783 PROTO=2
Apr 21 18:46:46 all2all:ACCEPT:IN=eth0 OUT= SRC=192.168.0.1 DST=224.0.0.1
LEN=28 TOS=0x00 PREC=0x00 TTL=1 ID=48793 PROTO=2
NAT Table
Chain PREROUTING (policy ACCEPT 6833 packets, 987K bytes)
pkts bytes target prot opt in out source destination
Chain POSTROUTING (policy ACCEPT 40 packets, 2359 bytes)
pkts bytes target prot opt in out source destination
49 2893 eth0_masq 0 -- * eth0 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 40 packets, 2359 bytes)
pkts bytes target prot opt in out source destination
Chain eth0_masq (1 references)
pkts bytes target prot opt in out source destination
9 534 SNAT 0 -- * * 192.168.10.0/24 0.0.0.0/0
policy match dir out pol none to:192.168.0.200
Mangle Table
Chain PREROUTING (policy ACCEPT 24531 packets, 3021K bytes)
pkts bytes target prot opt in out source destination
24531 3021K tcpre 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain INPUT (policy ACCEPT 12531 packets, 1345K bytes)
pkts bytes target prot opt in out source destination
Chain FORWARD (policy ACCEPT 1014 packets, 439K bytes)
pkts bytes target prot opt in out source destination
1014 439K tcfor 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 2114 packets, 388K bytes)
pkts bytes target prot opt in out source destination
1261 185K tcout 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 2275 packets, 624K bytes)
pkts bytes target prot opt in out source destination
2275 624K tcpost 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain tcfor (1 references)
pkts bytes target prot opt in out source destination
Chain tcout (1 references)
pkts bytes target prot opt in out source destination
Chain tcpost (1 references)
pkts bytes target prot opt in out source destination
0 0 CLASSIFY 0 -- * eth1 0.0.0.0/0 0.0.0.0/0
MARK match 0x1/0xff CLASSIFY set 1:11
0 0 CLASSIFY 0 -- * eth1 0.0.0.0/0 0.0.0.0/0
MARK match 0x2/0xff CLASSIFY set 1:12
Chain tcpre (1 references)
pkts bytes target prot opt in out source destination
161 7656 MARK tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:80 MARK set 0x2
0 0 MARK tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:20 MARK set 0x2
0 0 MARK tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:21 MARK set 0x2
Conntrack Table
tcp 6 431994 ESTABLISHED src=192.168.10.111 dst=192.168.0.69 sport=1064
dport=139 packets=203 bytes=9828 src=192.168.0.69 dst=192.168.0.200 sport=139
dport=1064 packets=203 bytes=9660 [ASSURED] mark=0 secmark=0 use=1
udp 17 4 src=192.168.0.1 dst=192.168.0.255 sport=520 dport=520 packets=1
bytes=92 [UNREPLIED] src=192.168.0.255 dst=192.168.0.1 sport=520 dport=520
packets=0 bytes=0 mark=0 secmark=0 use=1
tcp 6 429748 ESTABLISHED src=192.168.0.69 dst=192.168.0.200 sport=58848
dport=22 packets=569 bytes=40251 src=192.168.0.200 dst=192.168.0.69 sport=22
dport=58848 packets=423 bytes=59339 [ASSURED] mark=0 secmark=0 use=1
tcp 6 431999 ESTABLISHED src=192.168.0.69 dst=192.168.0.200 sport=40557
dport=22 packets=305 bytes=19147 src=192.168.0.200 dst=192.168.0.69 sport=22
dport=40557 packets=340 bytes=55119 [ASSURED] mark=0 secmark=0 use=1
udp 17 6 src=192.168.0.69 dst=192.168.0.255 sport=631 dport=631 packets=3
bytes=565 [UNREPLIED] src=192.168.0.255 dst=192.168.0.69 sport=631 dport=631
packets=0 bytes=0 mark=0 secmark=0 use=1
unknown 2 593 src=192.168.0.1 dst=224.0.0.1 packets=8751 bytes=245028
[UNREPLIED] src=224.0.0.1 dst=192.168.0.1 packets=0 bytes=0 mark=0 secmark=0
use=1
IP Configuration
1: lo: <LOOPBACK,UP,10000> mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,10000> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:0c:29:7c:74:e0 brd ff:ff:ff:ff:ff:ff
inet 192.168.0.200/24 brd 192.168.0.255 scope global eth0
inet6 fe80::20c:29ff:fe7c:74e0/64 scope link
valid_lft forever preferred_lft forever
3: eth1: <BROADCAST,MULTICAST,UP,10000> mtu 1500 qdisc htb qlen 1000
link/ether 00:0c:29:7c:74:ea brd ff:ff:ff:ff:ff:ff
inet 192.168.10.129/24 brd 192.168.10.255 scope global eth1
inet6 fe80::20c:29ff:fe7c:74ea/64 scope link
valid_lft forever preferred_lft forever
IP Stats
1: lo: <LOOPBACK,UP,10000> mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
RX: bytes packets errors dropped overrun mcast
560 8 0 0 0 0
TX: bytes packets errors dropped carrier collsns
560 8 0 0 0 0
2: eth0: <BROADCAST,MULTICAST,UP,10000> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:0c:29:7c:74:e0 brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
9221218 19898 0 0 0 0
TX: bytes packets errors dropped carrier collsns
650845 6011 0 0 0 0
3: eth1: <BROADCAST,MULTICAST,UP,10000> mtu 1500 qdisc htb qlen 1000
link/ether 00:0c:29:7c:74:ea brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
1748771 15115 0 0 0 0
TX: bytes packets errors dropped carrier collsns
7445292 5469 0 0 0 0
/proc
/proc/version = Linux version 2.6.23-1-686 (Debian 2.6.23-1~mtu1) ([EMAIL
PROTECTED]) (gcc version 4.1.2 20061115 (prerelease) (Debian 4.1.1-21)) #1 SMP
Fri Oct 12 14:30:49 UTC 2007
/proc/sys/net/ipv4/ip_forward = 1
/proc/sys/net/ipv4/icmp_echo_ignore_all = 0
/proc/sys/net/ipv4/conf/all/proxy_arp = 0
/proc/sys/net/ipv4/conf/all/arp_filter = 0
/proc/sys/net/ipv4/conf/all/arp_ignore = 0
/proc/sys/net/ipv4/conf/all/rp_filter = 1
/proc/sys/net/ipv4/conf/all/log_martians = 0
/proc/sys/net/ipv4/conf/default/proxy_arp = 0
/proc/sys/net/ipv4/conf/default/arp_filter = 0
/proc/sys/net/ipv4/conf/default/arp_ignore = 0
/proc/sys/net/ipv4/conf/default/rp_filter = 1
/proc/sys/net/ipv4/conf/default/log_martians = 0
/proc/sys/net/ipv4/conf/eth0/proxy_arp = 0
/proc/sys/net/ipv4/conf/eth0/arp_filter = 0
/proc/sys/net/ipv4/conf/eth0/arp_ignore = 0
/proc/sys/net/ipv4/conf/eth0/rp_filter = 1
/proc/sys/net/ipv4/conf/eth0/log_martians = 0
/proc/sys/net/ipv4/conf/eth1/proxy_arp = 0
/proc/sys/net/ipv4/conf/eth1/arp_filter = 0
/proc/sys/net/ipv4/conf/eth1/arp_ignore = 0
/proc/sys/net/ipv4/conf/eth1/rp_filter = 1
/proc/sys/net/ipv4/conf/eth1/log_martians = 0
/proc/sys/net/ipv4/conf/lo/proxy_arp = 0
/proc/sys/net/ipv4/conf/lo/arp_filter = 0
/proc/sys/net/ipv4/conf/lo/arp_ignore = 0
/proc/sys/net/ipv4/conf/lo/rp_filter = 0
/proc/sys/net/ipv4/conf/lo/log_martians = 0
Routing Rules
0: from all lookup 255
32766: from all lookup main
32767: from all lookup default
Table 255:
broadcast 192.168.0.255 dev eth0 proto kernel scope link src 192.168.0.200
broadcast 127.255.255.255 dev lo proto kernel scope link src 127.0.0.1
broadcast 192.168.10.255 dev eth1 proto kernel scope link src 192.168.10.129
local 192.168.0.200 dev eth0 proto kernel scope host src 192.168.0.200
broadcast 192.168.0.0 dev eth0 proto kernel scope link src 192.168.0.200
broadcast 192.168.10.0 dev eth1 proto kernel scope link src 192.168.10.129
local 192.168.10.129 dev eth1 proto kernel scope host src 192.168.10.129
broadcast 127.0.0.0 dev lo proto kernel scope link src 127.0.0.1
local 127.0.0.1 dev lo proto kernel scope host src 127.0.0.1
local 127.0.0.0/8 dev lo proto kernel scope host src 127.0.0.1
Table default:
Table main:
192.168.0.0/24 dev eth0 proto kernel scope link src 192.168.0.200
192.168.10.0/24 dev eth1 proto kernel scope link src 192.168.10.129
default via 192.168.0.1 dev eth0
ARP
? (192.168.0.69) at 00:18:FE:7D:FB:3D [ether] on eth0
? (192.168.10.111) at 00:0C:29:92:F8:B8 [ether] on eth1
? (192.168.0.1) at 00:13:49:63:0C:93 [ether] on eth0
Modules
iptable_raw 2496 0
ipt_ULOG 8868 0
ipt_TTL 2432 0
ipt_ttl 2016 0
ipt_TOS 2368 0
ipt_tos 1760 0
ipt_SAME 2496 0
ipt_REJECT 4672 4
ipt_REDIRECT 2208 0
ipt_recent 9240 0
ipt_owner 2112 0
ipt_NETMAP 2176 0
ipt_MASQUERADE 3776 0
ipt_LOG 6208 11
ipt_iprange 1920 0
ipt_ECN 3040 0
ipt_ecn 2336 0
ipt_CLUSTERIP 8324 0
ipt_ah 2016 0
ipt_addrtype 1984 0
iptable_nat 7108 1
iptable_mangle 2912 1
iptable_filter 3104 1
ip_tables 13380 4
iptable_raw,iptable_nat,iptable_mangle,iptable_filter
Shorewall has detected the following iptables/netfilter capabilities:
NAT: Available
Packet Mangling: Available
Multi-port Match: Available
Extended Multi-port Match: Available
Connection Tracking Match: Available
Packet Type Match: Available
Policy Match: Available
Physdev Match: Available
Packet length Match: Available
IP range Match: Available
Recent Match: Available
Owner Match: Available
Ipset Match: Not available
CONNMARK Target: Available
Extended CONNMARK Target: Available
Connmark Match: Available
Extended Connmark Match: Available
Raw Table: Available
IPP2P Match: Not available
CLASSIFY Target: Available
Extended REJECT: Available
Repeat match: Available
MARK Target: Available
Extended MARK Target: Available
Mangle FORWARD Chain: Available
Traffic Control
Device eth0:
qdisc pfifo_fast 0: root bands 3 priomap 1 2 2 2 1 2 0 0 1 1 1 1 1 1 1 1
Sent 663079 bytes 6072 pkt (dropped 0, overlimits 0 requeues 0)
rate 0bit 0pps backlog 0b 0p requeues 0
Device eth1:
qdisc htb 1: root r2q 10 default 11 direct_packets_stat 0 ver 3.17
Sent 424664 bytes 773 pkt (dropped 0, overlimits 506 requeues 0)
rate 0bit 0pps backlog 0b 0p requeues 0
qdisc ingress ffff: parent ffff:fff1 ----------------
Sent 1360653 bytes 11745 pkt (dropped 0, overlimits 0 requeues 0)
rate 0bit 0pps backlog 0b 0p requeues 0
qdisc sfq 11: parent 1:11 limit 127p quantum 1514b flows 127/1024 perturb 10sec
Sent 424664 bytes 773 pkt (dropped 0, overlimits 0 requeues 0)
rate 0bit 0pps backlog 0b 0p requeues 0
qdisc sfq 12: parent 1:12 limit 127p quantum 1514b flows 127/1024 perturb 10sec
Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
rate 0bit 0pps backlog 0b 0p requeues 0
class htb 1:11 parent 1:1 leaf 11: prio 1 quantum 1500 rate 80000bit ceil
240000bit burst 1499b/8 mpu 0b overhead 0b cburst 1499b/8 mpu 0b overhead 0b
level 0
Sent 424664 bytes 773 pkt (dropped 0, overlimits 0 requeues 0)
rate 48bit 0pps backlog 0b 0p requeues 0
lended: 559 borrowed: 214 giants: 0
tokens: 137357 ctokens: 45951
class htb 1:1 root rate 640000bit ceil 640000bit burst 1499b/8 mpu 0b overhead
0b cburst 1499b/8 mpu 0b overhead 0b level 7
Sent 424664 bytes 773 pkt (dropped 0, overlimits 0 requeues 0)
rate 48bit 0pps backlog 0b 0p requeues 0
lended: 214 borrowed: 0 giants: 0
tokens: 17386 ctokens: 17386
class htb 1:12 parent 1:1 leaf 12: prio 2 quantum 4800 rate 400000bit ceil
640000bit burst 1499b/8 mpu 0b overhead 0b cburst 1499b/8 mpu 0b overhead 0b
level 0
Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
rate 0bit 0pps backlog 0b 0p requeues 0
lended: 0 borrowed: 0 giants: 0
tokens: 29296 ctokens: 18310
TC Filters
Device eth0:
Device eth1:
-------------------------------------------------------------------------
This SF.net email is sponsored by the 2008 JavaOne(SM) Conference
Don't miss this year's exciting event. There's still time to save $100.
Use priority code J8TL2D2.
http://ad.doubleclick.net/clk;198757673;13503038;p?http://java.sun.com/javaone
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users