Hi,

I am trying to make connections that go to the firewall (10.10.10.100
internal) on port TCP/5900 be redirected to an internal host (10.10.10.2)
but cannot get it to work, the firewall starts ok and shows no errors when
starting up and there are no log entries in the syslog to suggest that the
packets are being dropped, could you please advise? I have attached a copy
of the 'shorewall dump' command.

thanks,

-- 
David Rothera
Shorewall 4.0.15 Dump at Mickey - Mon May 11 11:25:09 BST 2009

   Shorewall-shell 4.0.15

Counters reset Mon May 11 11:08:10 BST 2009

Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
   26  2464 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0   
        
 3500  382K eth0_in    all  --  eth0   *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:' 
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 eth0_fwd   all  --  eth0   *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:' 
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain OUTPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
   26  2464 ACCEPT     all  --  *      lo      0.0.0.0/0            0.0.0.0/0   
        
 3135 1941K eth0_out   all  --  *      eth0    0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:OUTPUT:REJECT:' 
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain Drop (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:113 
   16   916 dropBcast  all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 3 code 4 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 11 
   16   916 dropInvalid  all  --  *      *       0.0.0.0/0            0.0.0.0/0 
          
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,445 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:137:139 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:137 dpts:1024:65535 
    6   352 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,139,445 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:1900 
    4   180 dropNotSyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0  
         
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:53 

Chain Reject (4 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:113 
    0     0 dropBcast  all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 3 code 4 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 11 
    0     0 dropInvalid  all  --  *      *       0.0.0.0/0            0.0.0.0/0 
          
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,445 
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:137:139 
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:137 dpts:1024:65535 
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,139,445 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:1900 
    0     0 dropNotSyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0  
         
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:53 

Chain all2all (3 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:all2all:REJECT:' 
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain dropBcast (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        PKTTYPE = broadcast 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        PKTTYPE = multicast 

Chain dropInvalid (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID 

Chain dropNotSyn (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp flags:!0x17/0x02 

Chain dynamic (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain eth0_fwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW 
    0     0 smurfs     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW 
    0     0 tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 net2loc    all  --  *      eth0    0.0.0.0/0            
10.10.10.0/24       
    0     0 loc2net    all  --  *      eth0    10.10.10.0/24        0.0.0.0/0   
        

Chain eth0_in (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
  601 97847 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW 
  601 97847 smurfs     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW 
    1   328 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:67:68 
 3102  295K tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
 3499  381K net2fw     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 loc2fw     all  --  *      *       10.10.10.0/24        0.0.0.0/0   
        

Chain eth0_out (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    1   328 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:67:68 
 3134 1940K fw2net     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 fw2loc     all  --  *      *       0.0.0.0/0            
10.10.10.0/24       

Chain fw2loc (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:10000 
    0     0 all2all    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain fw2net (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
 3086 1934K ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:10000 
    0     0 LOG        47   --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:fw2net:ACCEPT:' 
    0     0 ACCEPT     47   --  *      *       0.0.0.0/0            0.0.0.0/0   
        
   48  6212 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain loc2fw (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:10000 
    0     0 all2all    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain loc2net (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:10000 
    0     0 all2all    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain logdrop (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:logdrop:DROP:' 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain logflags (5 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:logflags:DROP:' 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain logreject (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:logreject:REJECT:' 
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain net2all (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 Drop       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:net2all:DROP:' 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain net2fw (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
 2899  284K ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:22 
   16   768 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:80 
    1    48 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:10000 
  207 13200 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:8081 
  359 82547 ACCEPT     all  --  *      *       10.10.10.0/24        0.0.0.0/0   
        
    0     0 LOG        47   --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:net2fw:ACCEPT:' 
    0     0 ACCEPT     47   --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:1723 LOG flags 0 level 5 prefix `Shorewall:net2fw:ACCEPT:' 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:1723 
    0     0 LOG        udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:53 LOG flags 0 level 6 prefix `Shorewall:net2fw:ACCEPT:' 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:53 
    0     0 LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:53 LOG flags 0 level 6 prefix `Shorewall:net2fw:ACCEPT:' 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:53 
    1    40 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:8000 
   16   916 Drop       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
   10   564 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:net2fw:DROP:' 
   10   564 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain net2loc (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            10.10.10.2  
        tcp dpt:5900 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:10000 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:8081 
    0     0 ACCEPT     all  --  *      *       10.10.10.0/24        0.0.0.0/0   
        
    0     0 net2all    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain reject (11 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        PKTTYPE = broadcast 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        PKTTYPE = multicast 
    0     0 DROP       all  --  *      *       255.255.255.255      0.0.0.0/0   
        
    0     0 DROP       all  --  *      *       224.0.0.0/4          0.0.0.0/0   
        
    0     0 DROP       2    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 REJECT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with tcp-reset 
    0     0 REJECT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with icmp-port-unreachable 
    0     0 REJECT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with icmp-host-unreachable 
    0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with icmp-host-prohibited 

Chain shorewall (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain smurfs (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        all  --  *      *       10.10.10.255         0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:' 
    0     0 DROP       all  --  *      *       10.10.10.255         0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       255.255.255.255      0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:' 
    0     0 DROP       all  --  *      *       255.255.255.255      0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       224.0.0.0/4          0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:' 
    0     0 DROP       all  --  *      *       224.0.0.0/4          0.0.0.0/0   
        

Chain tcpflags (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp flags:0x3F/0x29 
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp flags:0x3F/0x00 
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp flags:0x06/0x06 
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp flags:0x03/0x03 
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp spt:0 flags:0x17/0x02 

Log (/var/log/messages)

May 11 10:48:04 net2fw:DROP:IN=eth0 OUT= SRC=93.100.125.120 DST=10.10.10.100 
LEN=60 TOS=0x00 PREC=0x00 TTL=116 ID=14980 DF PROTO=TCP SPT=55891 DPT=63139 
WINDOW=5840 RES=0x00 SYN URGP=0 
May 11 10:48:15 net2fw:DROP:IN=eth0 OUT= SRC=82.39.140.240 DST=10.10.10.100 
LEN=64 TOS=0x00 PREC=0x00 TTL=54 ID=4269 PROTO=UDP SPT=18325 DPT=59012 LEN=44 
May 11 10:48:17 net2fw:DROP:IN=eth0 OUT= SRC=82.39.140.240 DST=10.10.10.100 
LEN=64 TOS=0x00 PREC=0x00 TTL=54 ID=29164 PROTO=UDP SPT=18325 DPT=59012 LEN=44 
May 11 10:48:21 net2fw:DROP:IN=eth0 OUT= SRC=82.39.140.240 DST=10.10.10.100 
LEN=64 TOS=0x00 PREC=0x00 TTL=54 ID=8337 PROTO=UDP SPT=18325 DPT=59012 LEN=44 
May 11 10:53:06 net2fw:DROP:IN=eth0 OUT= SRC=83.228.42.91 DST=10.10.10.100 
LEN=48 TOS=0x00 PREC=0x00 TTL=113 ID=24398 DF PROTO=TCP SPT=63360 DPT=8131 
WINDOW=65535 RES=0x00 SYN URGP=0 
May 11 10:53:09 net2fw:DROP:IN=eth0 OUT= SRC=83.228.42.91 DST=10.10.10.100 
LEN=48 TOS=0x00 PREC=0x00 TTL=113 ID=24401 DF PROTO=TCP SPT=63360 DPT=8131 
WINDOW=65535 RES=0x00 SYN URGP=0 
May 11 10:58:14 net2fw:DROP:IN=eth0 OUT= SRC=82.39.140.240 DST=10.10.10.100 
LEN=64 TOS=0x00 PREC=0x00 TTL=54 ID=31262 PROTO=UDP SPT=18325 DPT=59012 LEN=44 
May 11 10:58:16 net2fw:DROP:IN=eth0 OUT= SRC=82.39.140.240 DST=10.10.10.100 
LEN=64 TOS=0x00 PREC=0x00 TTL=54 ID=57862 PROTO=UDP SPT=18325 DPT=59012 LEN=44 
May 11 10:58:20 net2fw:DROP:IN=eth0 OUT= SRC=82.39.140.240 DST=10.10.10.100 
LEN=64 TOS=0x00 PREC=0x00 TTL=54 ID=6718 PROTO=UDP SPT=18325 DPT=59012 LEN=44 
May 11 11:05:46 net2fw:DROP:IN=eth0 OUT= SRC=125.65.165.139 DST=10.10.10.100 
LEN=40 TOS=0x00 PREC=0x00 TTL=113 ID=256 DF PROTO=TCP SPT=12200 DPT=3128 
WINDOW=8192 RES=0x00 SYN URGP=0 
May 11 11:08:12 net2fw:DROP:IN=eth0 OUT= SRC=125.65.165.139 DST=10.10.10.100 
LEN=40 TOS=0x00 PREC=0x00 TTL=113 ID=256 DF PROTO=TCP SPT=12200 DPT=8080 
WINDOW=8192 RES=0x00 SYN URGP=0 
May 11 11:11:36 net2fw:DROP:IN=eth0 OUT= SRC=82.39.140.240 DST=10.10.10.100 
LEN=64 TOS=0x00 PREC=0x00 TTL=54 ID=33192 PROTO=UDP SPT=18325 DPT=59012 LEN=44 
May 11 11:11:38 net2fw:DROP:IN=eth0 OUT= SRC=82.39.140.240 DST=10.10.10.100 
LEN=64 TOS=0x00 PREC=0x00 TTL=54 ID=28089 PROTO=UDP SPT=18325 DPT=59012 LEN=44 
May 11 11:11:42 net2fw:DROP:IN=eth0 OUT= SRC=82.39.140.240 DST=10.10.10.100 
LEN=64 TOS=0x00 PREC=0x00 TTL=54 ID=26600 PROTO=UDP SPT=18325 DPT=59012 LEN=44 
May 11 11:11:44 net2fw:DROP:IN=eth0 OUT= SRC=219.94.98.213 DST=10.10.10.100 
LEN=60 TOS=0x00 PREC=0x00 TTL=44 ID=9771 DF PROTO=TCP SPT=3114 DPT=23 
WINDOW=5840 RES=0x00 SYN URGP=0 
May 11 11:13:27 net2fw:DROP:IN=eth0 OUT= SRC=222.208.183.218 DST=10.10.10.100 
LEN=40 TOS=0x00 PREC=0x00 TTL=113 ID=256 DF PROTO=TCP SPT=12200 DPT=3128 
WINDOW=8192 RES=0x00 SYN URGP=0 
May 11 11:14:31 net2fw:DROP:IN=eth0 OUT= SRC=222.208.183.218 DST=10.10.10.100 
LEN=40 TOS=0x00 PREC=0x00 TTL=113 ID=256 DF PROTO=TCP SPT=12200 DPT=1080 
WINDOW=8192 RES=0x00 SYN URGP=0 
May 11 11:21:30 net2fw:DROP:IN=eth0 OUT= SRC=82.39.140.240 DST=10.10.10.100 
LEN=64 TOS=0x00 PREC=0x00 TTL=54 ID=45831 PROTO=UDP SPT=18325 DPT=59012 LEN=44 
May 11 11:21:32 net2fw:DROP:IN=eth0 OUT= SRC=82.39.140.240 DST=10.10.10.100 
LEN=64 TOS=0x00 PREC=0x00 TTL=54 ID=20262 PROTO=UDP SPT=18325 DPT=59012 LEN=44 
May 11 11:21:36 net2fw:DROP:IN=eth0 OUT= SRC=82.39.140.240 DST=10.10.10.100 
LEN=64 TOS=0x00 PREC=0x00 TTL=54 ID=15374 PROTO=UDP SPT=18325 DPT=59012 LEN=44 

NAT Table

Chain PREROUTING (policy ACCEPT 379 packets, 30900 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
  382 31044 net_dnat   all  --  eth0   *       0.0.0.0/0            0.0.0.0/0   
        

Chain POSTROUTING (policy ACCEPT 50 packets, 5753 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain OUTPUT (policy ACCEPT 50 packets, 5753 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain net_dnat (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    3   144 DNAT       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:5900 to:10.10.10.2 

Mangle Table

Chain PREROUTING (policy ACCEPT 3540 packets, 385K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
 3531  384K tcpre      all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain INPUT (policy ACCEPT 3537 packets, 385K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 tcfor      all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain OUTPUT (policy ACCEPT 6564K packets, 5116M bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
 3162 1943K tcout      all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain POSTROUTING (policy ACCEPT 3187 packets, 1948K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
 3170 1946K tcpost     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain tcfor (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain tcout (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain tcpost (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain tcpre (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Conntrack Table

tcp      6 112 TIME_WAIT src=10.10.10.2 dst=10.10.10.100 sport=57351 dport=8081 
packets=6 bytes=741 src=10.10.10.100 dst=10.10.10.2 sport=8081 dport=57351 
packets=5 bytes=709 [ASSURED] mark=0 secmark=0 use=1
tcp      6 67 TIME_WAIT src=10.10.10.2 dst=10.10.10.100 sport=57315 dport=8081 
packets=6 bytes=741 src=10.10.10.100 dst=10.10.10.2 sport=8081 dport=57315 
packets=5 bytes=709 [ASSURED] mark=0 secmark=0 use=1
tcp      6 37 TIME_WAIT src=10.10.10.2 dst=10.10.10.100 sport=57287 dport=8081 
packets=7 bytes=793 src=10.10.10.100 dst=10.10.10.2 sport=8081 dport=57287 
packets=6 bytes=761 [ASSURED] mark=0 secmark=0 use=1
tcp      6 47 TIME_WAIT src=10.10.10.2 dst=10.10.10.100 sport=57295 dport=8081 
packets=7 bytes=793 src=10.10.10.100 dst=10.10.10.2 sport=8081 dport=57295 
packets=6 bytes=761 [ASSURED] mark=0 secmark=0 use=1
tcp      6 17 TIME_WAIT src=10.10.10.2 dst=10.10.10.100 sport=57271 dport=8081 
packets=7 bytes=793 src=10.10.10.100 dst=10.10.10.2 sport=8081 dport=57271 
packets=6 bytes=761 [ASSURED] mark=0 secmark=0 use=1
tcp      6 299 ESTABLISHED src=10.10.10.2 dst=10.10.10.100 sport=24800 
dport=34941 packets=266449 bytes=15251034 src=10.10.10.100 dst=10.10.10.2 
sport=34941 dport=24800 packets=134308 bytes=8487159 [ASSURED] mark=0 secmark=0 
use=1
tcp      6 431976 ESTABLISHED src=10.10.10.2 dst=10.10.10.100 sport=59100 
dport=548 packets=42528 bytes=2512757 src=10.10.10.100 dst=10.10.10.2 sport=548 
dport=59100 packets=97182 bytes=120769495 [ASSURED] mark=0 secmark=0 use=1
udp      17 8 src=10.10.10.2 dst=224.0.0.251 sport=5353 dport=5353 packets=3895 
bytes=261846 [UNREPLIED] src=224.0.0.251 dst=10.10.10.2 sport=5353 dport=5353 
packets=0 bytes=0 mark=0 secmark=0 use=1
tcp      6 2 TIME_WAIT src=10.10.10.2 dst=10.10.10.100 sport=57259 dport=8081 
packets=7 bytes=793 src=10.10.10.100 dst=10.10.10.2 sport=8081 dport=57259 
packets=6 bytes=761 [ASSURED] mark=0 secmark=0 use=1
tcp      6 102 TIME_WAIT src=10.10.10.2 dst=10.10.10.100 sport=57343 dport=8081 
packets=7 bytes=793 src=10.10.10.100 dst=10.10.10.2 sport=8081 dport=57343 
packets=6 bytes=761 [ASSURED] mark=0 secmark=0 use=1
tcp      6 431905 ESTABLISHED src=10.10.10.4 dst=10.10.10.100 sport=61685 
dport=445 packets=101100 bytes=6736906 src=10.10.10.100 dst=10.10.10.4 
sport=445 dport=61685 packets=394994 bytes=554542595 [ASSURED] mark=0 secmark=0 
use=1
tcp      6 62 TIME_WAIT src=10.10.10.2 dst=10.10.10.100 sport=57311 dport=8081 
packets=6 bytes=741 src=10.10.10.100 dst=10.10.10.2 sport=8081 dport=57311 
packets=5 bytes=709 [ASSURED] mark=0 secmark=0 use=1
tcp      6 77 TIME_WAIT src=10.10.10.2 dst=10.10.10.100 sport=57323 dport=8081 
packets=7 bytes=793 src=10.10.10.100 dst=10.10.10.2 sport=8081 dport=57323 
packets=6 bytes=761 [ASSURED] mark=0 secmark=0 use=1
tcp      6 82 TIME_WAIT src=10.10.10.2 dst=10.10.10.100 sport=57327 dport=8081 
packets=7 bytes=793 src=10.10.10.100 dst=10.10.10.2 sport=8081 dport=57327 
packets=6 bytes=761 [ASSURED] mark=0 secmark=0 use=1
tcp      6 32 TIME_WAIT src=10.10.10.2 dst=10.10.10.100 sport=57283 dport=8081 
packets=7 bytes=793 src=10.10.10.100 dst=10.10.10.2 sport=8081 dport=57283 
packets=6 bytes=761 [ASSURED] mark=0 secmark=0 use=1
tcp      6 431940 ESTABLISHED src=10.10.10.100 dst=174.36.30.19 sport=33948 
dport=80 packets=2270 bytes=669507 src=174.36.30.19 dst=10.10.10.100 sport=80 
dport=33948 packets=4391 bytes=535496 [ASSURED] mark=0 secmark=0 use=1
tcp      6 117 TIME_WAIT src=10.10.10.2 dst=10.10.10.100 sport=57355 dport=8081 
packets=7 bytes=793 src=10.10.10.100 dst=10.10.10.2 sport=8081 dport=57355 
packets=6 bytes=761 [ASSURED] mark=0 secmark=0 use=1
tcp      6 42 TIME_WAIT src=10.10.10.2 dst=10.10.10.100 sport=57291 dport=8081 
packets=6 bytes=741 src=10.10.10.100 dst=10.10.10.2 sport=8081 dport=57291 
packets=5 bytes=709 [ASSURED] mark=0 secmark=0 use=1
udp      17 8 src=10.10.10.2 dst=10.10.10.255 sport=631 dport=631 packets=2 
bytes=342 [UNREPLIED] src=10.10.10.255 dst=10.10.10.2 sport=631 dport=631 
packets=0 bytes=0 mark=0 secmark=0 use=1
tcp      6 57 TIME_WAIT src=10.10.10.2 dst=10.10.10.100 sport=57303 dport=8081 
packets=6 bytes=741 src=10.10.10.100 dst=10.10.10.2 sport=8081 dport=57303 
packets=5 bytes=709 [ASSURED] mark=0 secmark=0 use=1
tcp      6 22 TIME_WAIT src=10.10.10.2 dst=10.10.10.100 sport=57275 dport=8081 
packets=7 bytes=793 src=10.10.10.100 dst=10.10.10.2 sport=8081 dport=57275 
packets=6 bytes=761 [ASSURED] mark=0 secmark=0 use=1
tcp      6 107 TIME_WAIT src=10.10.10.2 dst=10.10.10.100 sport=57347 dport=8081 
packets=7 bytes=793 src=10.10.10.100 dst=10.10.10.2 sport=8081 dport=57347 
packets=6 bytes=761 [ASSURED] mark=0 secmark=0 use=1
tcp      6 52 TIME_WAIT src=10.10.10.2 dst=10.10.10.100 sport=57299 dport=8081 
packets=7 bytes=793 src=10.10.10.100 dst=10.10.10.2 sport=8081 dport=57299 
packets=6 bytes=761 [ASSURED] mark=0 secmark=0 use=1
tcp      6 7 TIME_WAIT src=10.10.10.2 dst=10.10.10.100 sport=57263 dport=8081 
packets=6 bytes=741 src=10.10.10.100 dst=10.10.10.2 sport=8081 dport=57263 
packets=5 bytes=709 [ASSURED] mark=0 secmark=0 use=1
tcp      6 97 TIME_WAIT src=10.10.10.2 dst=10.10.10.100 sport=57339 dport=8081 
packets=6 bytes=741 src=10.10.10.100 dst=10.10.10.2 sport=8081 dport=57339 
packets=5 bytes=709 [ASSURED] mark=0 secmark=0 use=1
udp      17 9 src=10.10.10.2 dst=10.10.10.100 sport=55595 dport=53 packets=1 
bytes=58 src=10.10.10.100 dst=10.10.10.2 sport=53 dport=55595 packets=1 
bytes=133 mark=0 secmark=0 use=1
tcp      6 92 TIME_WAIT src=10.10.10.2 dst=10.10.10.100 sport=57335 dport=8081 
packets=7 bytes=793 src=10.10.10.100 dst=10.10.10.2 sport=8081 dport=57335 
packets=6 bytes=761 [ASSURED] mark=0 secmark=0 use=1
tcp      6 27 TIME_WAIT src=10.10.10.2 dst=10.10.10.100 sport=57279 dport=8081 
packets=7 bytes=793 src=10.10.10.100 dst=10.10.10.2 sport=8081 dport=57279 
packets=6 bytes=761 [ASSURED] mark=0 secmark=0 use=1
tcp      6 87 TIME_WAIT src=10.10.10.2 dst=10.10.10.100 sport=57331 dport=8081 
packets=7 bytes=793 src=10.10.10.100 dst=10.10.10.2 sport=8081 dport=57331 
packets=6 bytes=761 [ASSURED] mark=0 secmark=0 use=1
tcp      6 12 TIME_WAIT src=10.10.10.2 dst=10.10.10.100 sport=57267 dport=8081 
packets=7 bytes=793 src=10.10.10.100 dst=10.10.10.2 sport=8081 dport=57267 
packets=6 bytes=761 [ASSURED] mark=0 secmark=0 use=1
udp      17 166 src=10.10.10.1 dst=10.10.10.100 sport=2048 dport=137 
packets=3075 bytes=239850 src=10.10.10.100 dst=10.10.10.1 sport=137 dport=2048 
packets=3075 bytes=1089597 [ASSURED] mark=0 secmark=0 use=1
tcp      6 431999 ESTABLISHED src=213.146.130.30 dst=10.10.10.100 sport=13801 
dport=22 packets=2293 bytes=128720 src=10.10.10.100 dst=213.146.130.30 sport=22 
dport=13801 packets=2288 bytes=643983 [ASSURED] mark=0 secmark=0 use=1
tcp      6 72 TIME_WAIT src=10.10.10.2 dst=10.10.10.100 sport=57319 dport=8081 
packets=6 bytes=741 src=10.10.10.100 dst=10.10.10.2 sport=8081 dport=57319 
packets=5 bytes=709 [ASSURED] mark=0 secmark=0 use=1

IP Configuration

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN 
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
    inet6 ::1/128 scope host 
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state 
UNKNOWN qlen 1000
    link/ether 00:1d:92:fc:38:f9 brd ff:ff:ff:ff:ff:ff
    inet 10.10.10.100/24 brd 10.10.10.255 scope global eth0
    inet6 fe80::21d:92ff:fefc:38f9/64 scope link 
       valid_lft forever preferred_lft forever
3: pan0: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN 
    link/ether ea:38:5d:f9:02:a5 brd ff:ff:ff:ff:ff:ff

IP Stats

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN 
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    RX: bytes  packets  errors  dropped overrun mcast   
    8971654    34859    0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    8971654    34859    0       0       0       0      
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state 
UNKNOWN qlen 1000
    link/ether 00:1d:92:fc:38:f9 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    3668343245 15253328 0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    2053702832 12665866 0       0       0       0      
3: pan0: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN 
    link/ether ea:38:5d:f9:02:a5 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    0          0        0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    0          0        0       0       0       0      

/proc

   /proc/version = Linux version 2.6.28-11-generic (bui...@palmer) (gcc version 
4.3.3 (Ubuntu 4.3.3-5ubuntu4) ) #42-Ubuntu SMP Fri Apr 17 01:57:59 UTC 2009
   /proc/sys/net/ipv4/ip_forward = 0
   /proc/sys/net/ipv4/icmp_echo_ignore_all = 0
   /proc/sys/net/ipv4/conf/all/proxy_arp = 0
   /proc/sys/net/ipv4/conf/all/arp_filter = 0
   /proc/sys/net/ipv4/conf/all/arp_ignore = 0
   /proc/sys/net/ipv4/conf/all/rp_filter = 1
   /proc/sys/net/ipv4/conf/all/log_martians = 0
   /proc/sys/net/ipv4/conf/default/proxy_arp = 0
   /proc/sys/net/ipv4/conf/default/arp_filter = 0
   /proc/sys/net/ipv4/conf/default/arp_ignore = 0
   /proc/sys/net/ipv4/conf/default/rp_filter = 1
   /proc/sys/net/ipv4/conf/default/log_martians = 0
   /proc/sys/net/ipv4/conf/eth0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/eth0/arp_filter = 0
   /proc/sys/net/ipv4/conf/eth0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/eth0/rp_filter = 1
   /proc/sys/net/ipv4/conf/eth0/log_martians = 1
   /proc/sys/net/ipv4/conf/lo/proxy_arp = 0
   /proc/sys/net/ipv4/conf/lo/arp_filter = 0
   /proc/sys/net/ipv4/conf/lo/arp_ignore = 0
   /proc/sys/net/ipv4/conf/lo/rp_filter = 0
   /proc/sys/net/ipv4/conf/lo/log_martians = 0
   /proc/sys/net/ipv4/conf/pan0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/pan0/arp_filter = 0
   /proc/sys/net/ipv4/conf/pan0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/pan0/rp_filter = 1
   /proc/sys/net/ipv4/conf/pan0/log_martians = 0

Routing Rules

0:      from all lookup local 
32766:  from all lookup main 
32767:  from all lookup default 

Table default:


Table local:

broadcast 127.255.255.255 dev lo  proto kernel  scope link  src 127.0.0.1 
broadcast 10.10.10.0 dev eth0  proto kernel  scope link  src 10.10.10.100 
local 10.10.10.100 dev eth0  proto kernel  scope host  src 10.10.10.100 
broadcast 10.10.10.255 dev eth0  proto kernel  scope link  src 10.10.10.100 
broadcast 127.0.0.0 dev lo  proto kernel  scope link  src 127.0.0.1 
local 127.0.0.1 dev lo  proto kernel  scope host  src 127.0.0.1 
local 127.0.0.0/8 dev lo  proto kernel  scope host  src 127.0.0.1 

Table main:

10.10.10.0/24 dev eth0  proto kernel  scope link  src 10.10.10.100 
169.254.0.0/16 dev eth0  scope link  metric 1000 
default via 10.10.10.1 dev eth0  metric 100 

ARP

? (10.10.10.139) at 00:12:f0:a2:1e:89 [ether] on eth0
? (10.10.10.1) at 00:1f:33:f3:16:53 [ether] on eth0
? (10.10.10.4) at 00:1e:8c:54:53:8c [ether] on eth0
? (10.10.10.2) at 00:1e:c2:03:3e:eb [ether] on eth0

Modules

iptable_filter         10752  1 
iptable_mangle         10880  1 
iptable_nat            13700  1 
iptable_raw            10240  0 
ip_tables              19472  4 
iptable_raw,iptable_nat,iptable_mangle,iptable_filter
ipt_addrtype           10496  0 
ipt_ah                  9728  0 
ipt_CLUSTERIP          14852  0 
ipt_ECN                10496  0 
ipt_ecn                 9984  0 
ipt_LOG                13700  17 
ipt_MASQUERADE         10752  0 
ipt_NETMAP              9728  0 
ipt_REDIRECT            9728  0 
ipt_REJECT             11136  4 
ipt_ttl                 9728  0 
ipt_TTL                 9984  0 
ipt_ULOG               15140  0 
nf_conntrack           72008  29 
ipt_MASQUERADE,ipt_CLUSTERIP,nf_nat_tftp,nf_nat_snmp_basic,nf_nat_sip,nf_nat_pptp,nf_nat_irc,nf_nat_h323,nf_nat_ftp,nf_nat_amanda,nf_conntrack_amanda,nf_conntrack_tftp,nf_conntrack_sip,nf_conntrack_proto_sctp,nf_conntrack_pptp,nf_conntrack_proto_gre,nf_conntrack_netlink,nf_conntrack_netbios_ns,nf_conntrack_irc,nf_conntrack_h323,nf_conntrack_ftp,xt_helper,xt_conntrack,xt_CONNMARK,xt_connmark,xt_state,iptable_nat,nf_nat,nf_conntrack_ipv4
nf_conntrack_amanda    11904  1 nf_nat_amanda
nf_conntrack_ftp       15652  1 nf_nat_ftp
nf_conntrack_h323      56648  1 nf_nat_h323
nf_conntrack_ipv4      21388  19 iptable_nat,nf_nat
nf_conntrack_irc       13220  1 nf_nat_irc
nf_conntrack_netbios_ns    10496  0 
nf_conntrack_netlink    23936  0 
nf_conntrack_pptp      14212  1 nf_nat_pptp
nf_conntrack_proto_gre    13572  1 nf_conntrack_pptp
nf_conntrack_proto_sctp    16264  0 
nf_conntrack_sip       26260  1 nf_nat_sip
nf_conntrack_tftp      12308  1 nf_nat_tftp
nf_defrag_ipv4          9984  1 nf_conntrack_ipv4
nf_nat                 25876  12 
ipt_REDIRECT,ipt_NETMAP,ipt_MASQUERADE,nf_nat_tftp,nf_nat_sip,nf_nat_pptp,nf_nat_proto_gre,nf_nat_irc,nf_nat_h323,nf_nat_ftp,nf_nat_amanda,iptable_nat
nf_nat_amanda           9984  0 
nf_nat_ftp             10752  0 
nf_nat_h323            14336  0 
nf_nat_irc             10240  0 
nf_nat_pptp            11136  0 
nf_nat_proto_gre       10372  1 nf_nat_pptp
nf_nat_sip             14976  0 
nf_nat_snmp_basic      16904  0 
nf_nat_tftp             9600  0 
xt_CLASSIFY             9600  0 
xt_comment              9600  0 
xt_connmark            10240  0 
xt_CONNMARK            10880  0 
xt_conntrack           11648  0 
xt_dccp                11016  0 
xt_dscp                10496  0 
xt_DSCP                11264  0 
xt_hashlimit           18448  0 
xt_helper              10112  0 
xt_iprange             10496  0 
xt_length               9856  0 
xt_limit               10116  0 
xt_mac                  9600  0 
xt_MARK                10112  0 
xt_mark                 9856  0 
xt_multiport           11264  4 
xt_NFLOG                9728  0 
xt_NFQUEUE              9856  0 
xt_owner               10624  0 
xt_physdev             10384  0 
xt_pkttype              9728  4 
xt_policy              11008  0 
xt_recent              17308  0 
xt_state               10112  16 
xt_tcpmss              10112  0 
xt_tcpudp              11008  37 

Shorewall has detected the following iptables/netfilter capabilities:
   NAT: Available
   Packet Mangling: Available
   Multi-port Match: Available
   Extended Multi-port Match: Available
   Connection Tracking Match: Available
   New Connection Tracking Match Syntax: Available
   Packet Type Match: Available
   Policy Match: Available
   Physdev Match: Available
   Physdev-is-bridged Support: Available
   Packet length Match: Available
   IP range Match: Available
   Recent Match: Available
   Owner Match: Available
   Ipset Match: Not available
   CONNMARK Target: Available
   Extended CONNMARK Target: Available
   Connmark Match: Available
   Extended Connmark Match: Available
   Raw Table: Available
   IPP2P Match: Not available
   CLASSIFY Target: Available
   Extended REJECT: Available
   Repeat match: Available
   MARK Target: Available
   Extended MARK Target: Available
   Mangle FORWARD Chain: Available
   Comments: Available
   Address Type Match: Available
   TCPMSS Match: Available
   Hashlimit Match: Available
   NFQUEUE Target: Available

Traffic Control

Device eth0:
qdisc pfifo_fast 0: root bands 3 priomap  1 2 2 2 1 2 0 0 1 1 1 1 1 1 1 1
 Sent 10592021300 bytes 12665866 pkt (dropped 0, overlimits 0 requeues 0) 
 rate 0bit 0pps backlog 0b 0p requeues 0 


TC Filters

Device eth0:

------------------------------------------------------------------------------
The NEW KODAK i700 Series Scanners deliver under ANY circumstances! Your
production scanning environment may not be a perfect world - but thanks to
Kodak, there's a perfect scanner to get the job done! With the NEW KODAK i700
Series Scanner you'll get full speed at 300 dpi even with all image 
processing features enabled. http://p.sf.net/sfu/kodak-com
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to