Thanks. Here is the dump. -------------------------------------------------- From: "Tom Eastep" <teas...@shorewall.net> Sent: Sunday, August 01, 2010 7:28 AM To: <shorewall-users@lists.sourceforge.net> Subject: Re: [Shorewall-users] multiple external ip's not passing thru
------------------------------------------------------------------------------ The Palm PDK Hot Apps Program offers developers who use the Plug-In Development Kit to bring their C/C++ apps to Palm for a share of $1 Million in cash or HP Products. Visit us here for more details: http://p.sf.net/sfu/dev2dev-palm
_______________________________________________ Shorewall-users mailing list Shorewall-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/shorewall-users
______________________________________________________________________ This email has been scanned by the MessageLabs Email Security System.For more information please visit http://www.messagelabs.com/email ______________________________________________________________________
Shorewall 4.4.8.4 Dump at TempeFW - Sun Aug 1 08:02:34 MST 2010 Counters reset Sun Aug 1 01:17:18 MST 2010 Chain INPUT (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 9931 1022K dynamic all -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID,NEW 35965 54M net2fw all -- eth0 * 0.0.0.0/0 0.0.0.0/0 9518 940K loc2fw all -- eth2 * 0.0.0.0/0 0.0.0.0/0 385 87063 dmz2fw all -- eth1 * 0.0.0.0/0 0.0.0.0/0 0 0 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:' 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 [goto] Chain FORWARD (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 24665 1899K dynamic all -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID,NEW 50464 30M net_frwd all -- eth0 * 0.0.0.0/0 0.0.0.0/0 36974 3976K loc_frwd all -- eth2 * 0.0.0.0/0 0.0.0.0/0 15197 1886K dmz_frwd all -- eth1 * 0.0.0.0/0 0.0.0.0/0 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:' 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 [goto] Chain OUTPUT (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 18425 983K fw2net all -- * eth0 0.0.0.0/0 0.0.0.0/0 204 19640 fw2loc all -- * eth2 0.0.0.0/0 0.0.0.0/0 0 0 fw2dmz all -- * eth1 0.0.0.0/0 0.0.0.0/0 0 0 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:OUTPUT:REJECT:' 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 [goto] Chain Drop (3 references) pkts bytes target prot opt in out source destination 2408 132K all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:113 /* Auth */ 2408 132K dropBcast all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 3 code 4 /* Needed ICMP types */ 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 11 /* Needed ICMP types */ 2408 132K dropInvalid all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 multiport dports 135,445 /* SMB */ 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:137:139 /* SMB */ 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:137 dpts:1024:65535 /* SMB */ 216 10672 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 multiport dports 135,139,445 /* SMB */ 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:1900 /* UPnP */ 2151 118K dropNotSyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:53 /* Late DNS Replies */ Chain Reject (7 references) pkts bytes target prot opt in out source destination 0 0 all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:113 /* Auth */ 0 0 dropBcast all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 3 code 4 /* Needed ICMP types */ 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 11 /* Needed ICMP types */ 0 0 dropInvalid all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0 multiport dports 135,445 /* SMB */ 0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:137:139 /* SMB */ 0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:137 dpts:1024:65535 /* SMB */ 0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 multiport dports 135,139,445 /* SMB */ 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:1900 /* UPnP */ 0 0 dropNotSyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:53 /* Late DNS Replies */ Chain dmz2fw (1 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 385 87063 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:dmz2fw:REJECT:' 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 [goto] Chain dmz2loc (1 references) pkts bytes target prot opt in out source destination 628 48366 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 46 12374 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:dmz2loc:REJECT:' 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 [goto] Chain dmz2net (1 references) pkts bytes target prot opt in out source destination 12000 1663K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 2523 163K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 Chain dmz_frwd (1 references) pkts bytes target prot opt in out source destination 14523 1825K dmz2net all -- * eth0 0.0.0.0/0 0.0.0.0/0 674 60740 dmz2loc all -- * eth2 0.0.0.0/0 0.0.0.0/0 0 0 ACCEPT all -- * eth1 0.0.0.0/0 0.0.0.0/0 Chain dropBcast (2 references) pkts bytes target prot opt in out source destination 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type BROADCAST 0 0 DROP all -- * * 0.0.0.0/0 224.0.0.0/4 Chain dropInvalid (2 references) pkts bytes target prot opt in out source destination 30 1228 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID Chain dropNotSyn (2 references) pkts bytes target prot opt in out source destination 22 880 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:!0x17/0x02 Chain dynamic (2 references) pkts bytes target prot opt in out source destination Chain fw2dmz (1 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:fw2dmz:REJECT:' 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 [goto] Chain fw2loc (1 references) pkts bytes target prot opt in out source destination 204 19640 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 Chain fw2net (1 references) pkts bytes target prot opt in out source destination 18417 982K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 8 503 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 Chain loc2dmz (1 references) pkts bytes target prot opt in out source destination 660 68792 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 91 4372 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:loc2dmz:REJECT:' 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 [goto] Chain loc2fw (1 references) pkts bytes target prot opt in out source destination 155 14040 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 9363 926K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 Chain loc2net (1 references) pkts bytes target prot opt in out source destination 16944 2330K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 19279 1573K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 Chain loc_frwd (1 references) pkts bytes target prot opt in out source destination 36223 3903K loc2net all -- * eth0 0.0.0.0/0 0.0.0.0/0 751 73164 loc2dmz all -- * eth1 0.0.0.0/0 0.0.0.0/0 Chain logdrop (0 references) pkts bytes target prot opt in out source destination 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 Chain logreject (0 references) pkts bytes target prot opt in out source destination 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 Chain net2dmz (1 references) pkts bytes target prot opt in out source destination 17597 19M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 501 24716 ACCEPT tcp -- * * 0.0.0.0/0 204.74.77.82 tcp dpt:25 /* SMTP */ 0 0 ACCEPT tcp -- * * 0.0.0.0/0 204.74.77.93 tcp dpt:80 /* Web */ 0 0 ACCEPT tcp -- * * 0.0.0.0/0 204.74.77.93 tcp dpt:443 /* Web */ 0 0 ACCEPT tcp -- * * 0.0.0.0/0 204.74.77.94 tcp dpt:80 /* Web */ 0 0 ACCEPT tcp -- * * 0.0.0.0/0 204.74.77.94 tcp dpt:443 /* Web */ 0 0 ACCEPT tcp -- * * 0.0.0.0/0 204.74.77.72 tcp dpt:80 /* Web */ 0 0 ACCEPT tcp -- * * 0.0.0.0/0 204.74.77.72 tcp dpt:443 /* Web */ 0 0 ACCEPT tcp -- * * 0.0.0.0/0 204.74.77.160 tcp dpt:80 /* Web */ 0 0 ACCEPT tcp -- * * 0.0.0.0/0 204.74.77.160 tcp dpt:443 /* Web */ 2225 123K Drop all -- * * 0.0.0.0/0 0.0.0.0/0 2095 116K LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:net2dmz:DROP:' 2095 116K DROP all -- * * 0.0.0.0/0 0.0.0.0/0 Chain net2fw (1 references) pkts bytes target prot opt in out source destination 35782 54M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 183 9516 Drop all -- * * 0.0.0.0/0 0.0.0.0/0 45 3128 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:net2fw:DROP:' 45 3128 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 Chain net2loc (1 references) pkts bytes target prot opt in out source destination 30141 11M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 Drop all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:net2loc:DROP:' 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 Chain net_frwd (1 references) pkts bytes target prot opt in out source destination 30141 11M net2loc all -- * eth2 0.0.0.0/0 0.0.0.0/0 20323 19M net2dmz all -- * eth1 0.0.0.0/0 0.0.0.0/0 Chain reject (14 references) pkts bytes target prot opt in out source destination 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match src-type BROADCAST 0 0 DROP all -- * * 224.0.0.0/4 0.0.0.0/0 0 0 DROP 2 -- * * 0.0.0.0/0 0.0.0.0/0 0 0 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with tcp-reset 0 0 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable 0 0 REJECT icmp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-unreachable 0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited Chain shorewall (0 references) pkts bytes target prot opt in out source destination Log (/var/log/messages) Aug 1 06:39:16 net2fw:DROP:IN=eth0 OUT= SRC=58.53.128.61 DST=204.74.77.2 LEN=40 TOS=0x00 PREC=0x20 TTL=115 ID=256 DF PROTO=TCP SPT=12200 DPT=6588 WINDOW=8192 RES=0x00 SYN URGP=0 Aug 1 06:39:17 net2fw:DROP:IN=eth0 OUT= SRC=58.53.128.61 DST=204.74.77.2 LEN=40 TOS=0x00 PREC=0x00 TTL=115 ID=256 DF PROTO=TCP SPT=12200 DPT=80 WINDOW=8192 RES=0x00 SYN URGP=0 Aug 1 06:39:27 net2fw:DROP:IN=eth0 OUT= SRC=222.43.70.238 DST=204.74.77.2 LEN=40 TOS=0x00 PREC=0x00 TTL=105 ID=256 PROTO=TCP SPT=6000 DPT=1521 WINDOW=16384 RES=0x00 SYN URGP=0 Aug 1 07:05:23 net2fw:DROP:IN=eth0 OUT= SRC=61.160.212.10 DST=174.77.64.139 LEN=40 TOS=0x00 PREC=0x00 TTL=104 ID=45577 PROTO=TCP SPT=6000 DPT=1433 WINDOW=16384 RES=0x00 SYN URGP=0 Aug 1 07:05:42 net2fw:DROP:IN=eth0 OUT= SRC=114.80.200.116 DST=204.74.77.2 LEN=60 TOS=0x00 PREC=0x00 TTL=50 ID=2566 DF PROTO=TCP SPT=34835 DPT=25 WINDOW=5840 RES=0x00 SYN URGP=0 Aug 1 07:40:43 net2fw:DROP:IN=eth0 OUT= SRC=61.129.67.50 DST=204.74.77.2 LEN=40 TOS=0x00 PREC=0x00 TTL=109 ID=256 PROTO=TCP SPT=6000 DPT=1433 WINDOW=16384 RES=0x00 SYN URGP=0 Aug 1 07:41:18 net2fw:DROP:IN=eth0 OUT= SRC=216.245.223.222 DST=204.74.77.2 LEN=40 TOS=0x00 PREC=0x00 TTL=111 ID=19744 PROTO=TCP SPT=6000 DPT=1433 WINDOW=16384 RES=0x00 SYN URGP=0 Aug 1 07:47:30 net2fw:DROP:IN=eth0 OUT= SRC=219.142.86.76 DST=204.74.77.2 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=41419 DF PROTO=TCP SPT=3608 DPT=21 WINDOW=65535 RES=0x00 SYN URGP=0 Aug 1 07:47:33 net2fw:DROP:IN=eth0 OUT= SRC=219.142.86.76 DST=204.74.77.2 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=41682 DF PROTO=TCP SPT=3608 DPT=21 WINDOW=65535 RES=0x00 SYN URGP=0 Aug 1 07:50:43 net2fw:DROP:IN=eth0 OUT= SRC=125.65.165.184 DST=204.74.77.2 LEN=40 TOS=0x00 PREC=0x20 TTL=116 ID=27800 DF PROTO=TCP SPT=12200 DPT=8000 WINDOW=8192 RES=0x00 SYN URGP=0 Aug 1 07:50:44 net2fw:DROP:IN=eth0 OUT= SRC=125.65.165.184 DST=204.74.77.2 LEN=40 TOS=0x00 PREC=0x00 TTL=116 ID=44210 DF PROTO=TCP SPT=12200 DPT=1080 WINDOW=8192 RES=0x00 SYN URGP=0 NAT Table Chain PREROUTING (policy ACCEPT 10570 packets, 1008K bytes) pkts bytes target prot opt in out source destination Chain POSTROUTING (policy ACCEPT 1497 packets, 103K bytes) pkts bytes target prot opt in out source destination 5177 416K eth0_masq all -- * eth0 0.0.0.0/0 0.0.0.0/0 Chain OUTPUT (policy ACCEPT 8 packets, 503 bytes) pkts bytes target prot opt in out source destination Chain eth0_masq (1 references) pkts bytes target prot opt in out source destination 3992 340K MASQUERADE all -- * * 10.10.1.0/24 0.0.0.0/0 Mangle Table Chain PREROUTING (policy ACCEPT 150K packets, 91M bytes) pkts bytes target prot opt in out source destination 150K 91M tcpre all -- * * 0.0.0.0/0 0.0.0.0/0 Chain INPUT (policy ACCEPT 45868 packets, 55M bytes) pkts bytes target prot opt in out source destination Chain FORWARD (policy ACCEPT 103K packets, 36M bytes) pkts bytes target prot opt in out source destination 103K 36M MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK and 0x0 103K 36M tcfor all -- * * 0.0.0.0/0 0.0.0.0/0 Chain OUTPUT (policy ACCEPT 18629 packets, 1002K bytes) pkts bytes target prot opt in out source destination 18629 1002K tcout all -- * * 0.0.0.0/0 0.0.0.0/0 Chain POSTROUTING (policy ACCEPT 119K packets, 37M bytes) pkts bytes target prot opt in out source destination 119K 37M tcpost all -- * * 0.0.0.0/0 0.0.0.0/0 Chain tcfor (1 references) pkts bytes target prot opt in out source destination Chain tcout (1 references) pkts bytes target prot opt in out source destination Chain tcpost (1 references) pkts bytes target prot opt in out source destination Chain tcpre (1 references) pkts bytes target prot opt in out source destination Raw Table Chain PREROUTING (policy ACCEPT 150K packets, 91M bytes) pkts bytes target prot opt in out source destination Chain OUTPUT (policy ACCEPT 18629 packets, 1002K bytes) pkts bytes target prot opt in out source destination Conntrack Table (22 out of 65536) udp 17 27 src=10.10.1.52 dst=10.10.1.255 sport=137 dport=137 packets=7969 bytes=621582 [UNREPLIED] src=10.10.1.255 dst=10.10.1.52 sport=137 dport=137 packets=0 bytes=0 mark=0 secmark=0 use=2 tcp 6 86 SYN_SENT src=10.10.1.26 dst=204.74.76.105 sport=2087 dport=10051 packets=3 bytes=144 [UNREPLIED] src=204.74.76.105 dst=174.77.64.139 sport=10051 dport=2087 packets=0 bytes=0 mark=0 secmark=0 use=2 tcp 6 5 SYN_SENT src=10.10.1.26 dst=204.74.76.105 sport=2084 dport=10051 packets=3 bytes=144 [UNREPLIED] src=204.74.76.105 dst=174.77.64.139 sport=10051 dport=2084 packets=0 bytes=0 mark=0 secmark=0 use=2 tcp 6 400416 ESTABLISHED src=10.10.1.53 dst=205.188.248.161 sport=4223 dport=443 packets=1 bytes=50 [UNREPLIED] src=205.188.248.161 dst=174.77.64.139 sport=443 dport=4223 packets=0 bytes=0 mark=0 secmark=0 use=2 tcp 6 77 SYN_SENT src=204.74.77.82 dst=204.74.76.248 sport=41844 dport=6101 packets=6 bytes=360 [UNREPLIED] src=204.74.76.248 dst=204.74.77.82 sport=6101 dport=41844 packets=0 bytes=0 mark=0 secmark=0 use=2 udp 17 28 src=10.10.1.52 dst=206.117.26.11 sport=137 dport=137 packets=7969 bytes=621582 [UNREPLIED] src=206.117.26.11 dst=174.77.64.139 sport=137 dport=137 packets=0 bytes=0 mark=0 secmark=0 use=2 tcp 6 431994 ESTABLISHED src=10.10.1.52 dst=72.223.83.188 sport=50932 dport=3301 packets=561 bytes=45191 src=72.223.83.188 dst=174.77.64.139 sport=3301 dport=50932 packets=613 bytes=340270 [ASSURED] mark=0 secmark=0 use=2 tcp 6 59 SYN_SENT src=204.74.77.82 dst=204.74.76.105 sport=41855 dport=10051 packets=2 bytes=120 [UNREPLIED] src=204.74.76.105 dst=204.74.77.82 sport=10051 dport=41855 packets=0 bytes=0 mark=0 secmark=0 use=2 tcp 6 299 ESTABLISHED src=10.10.1.52 dst=10.10.1.1 sport=50776 dport=22 packets=1166 bytes=111524 src=10.10.1.1 dst=10.10.1.52 sport=22 dport=50776 packets=952 bytes=121907 [ASSURED] mark=0 secmark=0 use=2 tcp 6 119 SYN_SENT src=204.74.77.82 dst=204.74.76.105 sport=41874 dport=10051 packets=1 bytes=60 [UNREPLIED] src=204.74.76.105 dst=204.74.77.82 sport=10051 dport=41874 packets=0 bytes=0 mark=0 secmark=0 use=2 udp 17 12 src=10.10.1.52 dst=4.2.2.2 sport=57939 dport=53 packets=1 bytes=62 src=4.2.2.2 dst=174.77.64.139 sport=53 dport=57939 packets=1 bytes=127 mark=0 secmark=0 use=2 tcp 6 429290 ESTABLISHED src=10.10.1.52 dst=204.74.77.82 sport=50777 dport=22 packets=141 bytes=15896 src=204.74.77.82 dst=10.10.1.52 sport=22 dport=50777 packets=118 bytes=12143 [ASSURED] mark=0 secmark=0 use=2 tcp 6 61 SYN_SENT src=10.10.1.22 dst=204.74.76.105 sport=2322 dport=10051 packets=3 bytes=144 [UNREPLIED] src=204.74.76.105 dst=174.77.64.139 sport=10051 dport=2322 packets=0 bytes=0 mark=0 secmark=0 use=2 tcp 6 104 SYN_SENT src=10.10.1.21 dst=204.74.76.101 sport=721 dport=515 packets=1995 bytes=87780 [UNREPLIED] src=204.74.76.101 dst=174.77.64.139 sport=515 dport=721 packets=0 bytes=0 mark=0 secmark=0 use=2 udp 17 20 src=10.10.1.52 dst=204.74.76.101 sport=54345 dport=161 packets=3 bytes=318 [UNREPLIED] src=204.74.76.101 dst=174.77.64.139 sport=161 dport=54345 packets=0 bytes=0 mark=0 secmark=0 use=2 udp 17 20 src=10.10.1.52 dst=204.74.76.198 sport=54345 dport=161 packets=3 bytes=318 [UNREPLIED] src=204.74.76.198 dst=174.77.64.139 sport=161 dport=54345 packets=0 bytes=0 mark=0 secmark=0 use=2 udp 17 178 src=204.74.77.93 dst=10.10.1.21 sport=137 dport=137 packets=691 bytes=54024 src=10.10.1.21 dst=204.74.77.93 sport=137 dport=137 packets=679 bytes=61482 [ASSURED] mark=0 secmark=0 use=2 udp 17 12 src=10.10.1.52 dst=4.2.2.2 sport=60196 dport=53 packets=1 bytes=62 src=4.2.2.2 dst=174.77.64.139 sport=53 dport=60196 packets=1 bytes=78 mark=0 secmark=0 use=2 udp 17 3584 src=10.10.1.54 dst=204.74.78.80 sport=5060 dport=5060 packets=518 bytes=265272 src=204.74.78.80 dst=174.77.64.139 sport=5060 dport=1024 packets=569 bytes=294225 [ASSURED] mark=0 secmark=0 use=2 udp 17 1 src=10.10.1.21 dst=10.10.1.255 sport=138 dport=138 packets=1 bytes=326 [UNREPLIED] src=10.10.1.255 dst=10.10.1.21 sport=138 dport=138 packets=0 bytes=0 mark=0 secmark=0 use=2 tcp 6 431962 ESTABLISHED src=10.10.1.52 dst=65.200.212.211 sport=51581 dport=80 packets=8 bytes=930 src=65.200.212.211 dst=174.77.64.139 sport=80 dport=51581 packets=7 bytes=1238 [ASSURED] mark=0 secmark=0 use=2 udp 17 29 src=10.10.1.21 dst=204.74.76.65 sport=137 dport=137 packets=3 bytes=234 [UNREPLIED] src=204.74.76.65 dst=174.77.64.139 sport=137 dport=137 packets=0 bytes=0 mark=0 secmark=0 use=2 IP Configuration 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN inet 127.0.0.1/8 scope host lo 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 100 inet 174.77.64.139/29 brd 174.77.64.143 scope global eth0 3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000 inet 204.74.77.2/24 brd 204.74.77.255 scope global eth1 4: eth2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000 inet 10.10.1.1/24 brd 10.10.1.255 scope global eth2 IP Stats 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 RX: bytes packets errors dropped overrun mcast 340244 3047 0 0 0 0 TX: bytes packets errors dropped carrier collsns 340244 3047 0 0 0 0 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 100 link/ether 00:14:22:0f:7a:25 brd ff:ff:ff:ff:ff:ff RX: bytes packets errors dropped overrun mcast 95174999 182615 0 0 0 0 TX: bytes packets errors dropped carrier collsns 9953393 82551 0 0 0 0 3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000 link/ether 00:14:22:0f:7a:26 brd ff:ff:ff:ff:ff:ff RX: bytes packets errors dropped overrun mcast 3551654 32645 0 0 0 0 TX: bytes packets errors dropped carrier collsns 20067866 21639 0 0 0 0 4: eth2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000 link/ether 00:0a:5e:59:ec:00 brd ff:ff:ff:ff:ff:ff RX: bytes packets errors dropped overrun mcast 8003383 69965 0 0 0 0 TX: bytes packets errors dropped carrier collsns 13865146 39531 0 0 0 0 /proc /proc/version = Linux version 2.6.31-14-server (bui...@crested) (gcc version 4.4.1 (Ubuntu 4.4.1-4ubuntu8) ) #48-Ubuntu SMP Fri Oct 16 15:07:34 UTC 2009 /proc/sys/net/ipv4/ip_forward = 1 /proc/sys/net/ipv4/icmp_echo_ignore_all = 0 /proc/sys/net/ipv4/conf/all/proxy_arp = 0 /proc/sys/net/ipv4/conf/all/arp_filter = 0 /proc/sys/net/ipv4/conf/all/arp_ignore = 0 /proc/sys/net/ipv4/conf/all/rp_filter = 0 /proc/sys/net/ipv4/conf/all/log_martians = 0 /proc/sys/net/ipv4/conf/default/proxy_arp = 0 /proc/sys/net/ipv4/conf/default/arp_filter = 0 /proc/sys/net/ipv4/conf/default/arp_ignore = 0 /proc/sys/net/ipv4/conf/default/rp_filter = 0 /proc/sys/net/ipv4/conf/default/log_martians = 1 /proc/sys/net/ipv4/conf/eth0/proxy_arp = 0 /proc/sys/net/ipv4/conf/eth0/arp_filter = 0 /proc/sys/net/ipv4/conf/eth0/arp_ignore = 0 /proc/sys/net/ipv4/conf/eth0/rp_filter = 0 /proc/sys/net/ipv4/conf/eth0/log_martians = 1 /proc/sys/net/ipv4/conf/eth1/proxy_arp = 0 /proc/sys/net/ipv4/conf/eth1/arp_filter = 0 /proc/sys/net/ipv4/conf/eth1/arp_ignore = 0 /proc/sys/net/ipv4/conf/eth1/rp_filter = 0 /proc/sys/net/ipv4/conf/eth1/log_martians = 1 /proc/sys/net/ipv4/conf/eth2/proxy_arp = 0 /proc/sys/net/ipv4/conf/eth2/arp_filter = 0 /proc/sys/net/ipv4/conf/eth2/arp_ignore = 0 /proc/sys/net/ipv4/conf/eth2/rp_filter = 0 /proc/sys/net/ipv4/conf/eth2/log_martians = 1 /proc/sys/net/ipv4/conf/lo/proxy_arp = 0 /proc/sys/net/ipv4/conf/lo/arp_filter = 0 /proc/sys/net/ipv4/conf/lo/arp_ignore = 0 /proc/sys/net/ipv4/conf/lo/rp_filter = 0 /proc/sys/net/ipv4/conf/lo/log_martians = 1 Routing Rules 0: from all lookup local 32766: from all lookup main 32767: from all lookup default Table default: Table local: broadcast 174.77.64.143 dev eth0 proto kernel scope link src 174.77.64.139 broadcast 10.10.1.255 dev eth2 proto kernel scope link src 10.10.1.1 broadcast 127.255.255.255 dev lo proto kernel scope link src 127.0.0.1 local 174.77.64.139 dev eth0 proto kernel scope host src 174.77.64.139 broadcast 204.74.77.255 dev eth1 proto kernel scope link src 204.74.77.2 broadcast 174.77.64.136 dev eth0 proto kernel scope link src 174.77.64.139 local 10.10.1.1 dev eth2 proto kernel scope host src 10.10.1.1 broadcast 10.10.1.0 dev eth2 proto kernel scope link src 10.10.1.1 local 204.74.77.2 dev eth1 proto kernel scope host src 204.74.77.2 broadcast 204.74.77.0 dev eth1 proto kernel scope link src 204.74.77.2 broadcast 127.0.0.0 dev lo proto kernel scope link src 127.0.0.1 local 127.0.0.1 dev lo proto kernel scope host src 127.0.0.1 local 127.0.0.0/8 dev lo proto kernel scope host src 127.0.0.1 Table main: 204.74.77.93 dev eth1 scope link 204.74.77.82 dev eth1 scope link 174.77.64.136/29 dev eth0 proto kernel scope link src 174.77.64.139 10.10.1.0/24 dev eth2 proto kernel scope link src 10.10.1.1 204.74.77.0/24 dev eth1 proto kernel scope link src 204.74.77.2 default via 174.77.64.138 dev eth0 metric 100 ARP ? (10.10.1.52) at 00:23:8b:b4:8a:7d [ether] on eth2 ? (204.74.77.93) at 00:18:8b:4c:3f:d1 [ether] on eth1 ? (204.74.77.82) at 00:14:22:32:df:87 [ether] on eth1 ? (10.10.1.54) at 00:04:f2:02:71:3d [ether] on eth2 ? (10.10.1.25) at 00:04:5a:4e:57:dc [ether] on eth2 ? (174.77.64.138) at 00:08:a3:ed:21:81 [ether] on eth0 ? (10.10.1.21) at 00:90:27:1d:34:bb [ether] on eth2 ? (10.10.1.22) at 00:30:48:53:98:a4 [ether] on eth2 ? (10.10.1.53) at 00:19:d1:22:84:bf [ether] on eth2 ? (10.10.1.26) at 00:30:48:34:51:6e [ether] on eth2 Modules iptable_filter 3872 1 iptable_mangle 4192 1 iptable_nat 6656 1 iptable_raw 3008 0 ip_tables 21168 4 iptable_raw,iptable_nat,iptable_mangle,iptable_filter ipt_addrtype 2912 2 ipt_ah 1984 0 ipt_CLUSTERIP 8040 0 ipt_ecn 2272 0 ipt_ECN 2880 0 ipt_LOG 6404 10 ipt_MASQUERADE 2944 1 ipt_NETMAP 2048 0 ipt_REDIRECT 2016 0 ipt_REJECT 3584 4 ipt_ULOG 10312 0 nf_conntrack 80832 31 xt_connlimit,ipt_MASQUERADE,ipt_CLUSTERIP,nf_nat_tftp,nf_nat_snmp_basic,nf_n at_sip,nf_nat_pptp,nf_nat_irc,nf_nat_h323,nf_nat_ftp,nf_nat_amanda,nf_conntr ack_amanda,nf_conntrack_sane,nf_conntrack_tftp,nf_conntrack_sip,nf_conntrack _proto_sctp,nf_conntrack_pptp,nf_conntrack_proto_gre,nf_conntrack_netlink,nf _conntrack_netbios_ns,nf_conntrack_irc,nf_conntrack_h323,nf_conntrack_ftp,xt _helper,xt_conntrack,xt_CONNMARK,xt_connmark,xt_state,iptable_nat,nf_nat,nf_ conntrack_ipv4 nf_conntrack_amanda 4832 1 nf_nat_amanda nf_conntrack_ftp 9016 1 nf_nat_ftp nf_conntrack_h323 57744 1 nf_nat_h323 nf_conntrack_ipv4 16376 21 iptable_nat,nf_nat nf_conntrack_irc 6552 1 nf_nat_irc nf_conntrack_netbios_ns 2912 0 nf_conntrack_netlink 19840 0 nf_conntrack_pptp 7524 1 nf_nat_pptp nf_conntrack_proto_gre 6468 1 nf_conntrack_pptp nf_conntrack_proto_sctp 9484 0 nf_conntrack_sane 5796 0 nf_conntrack_sip 22068 1 nf_nat_sip nf_conntrack_tftp 5492 1 nf_nat_tftp nf_defrag_ipv4 2400 2 xt_TPROXY,nf_conntrack_ipv4 nf_nat 22164 12 ipt_REDIRECT,ipt_NETMAP,ipt_MASQUERADE,nf_nat_tftp,nf_nat_sip,nf_nat_pptp,nf _nat_proto_gre,nf_nat_irc,nf_nat_h323,nf_nat_ftp,nf_nat_amanda,iptable_nat nf_nat_amanda 2272 0 nf_nat_ftp 3584 0 nf_nat_h323 7456 0 nf_nat_irc 2688 0 nf_nat_pptp 3424 0 nf_nat_proto_gre 2788 1 nf_nat_pptp nf_nat_sip 7616 0 nf_nat_snmp_basic 10120 0 nf_nat_tftp 1888 0 nf_tproxy_core 3104 1 xt_TPROXY,[permanent] xt_CLASSIFY 1856 0 xt_comment 1824 27 xt_connlimit 4840 0 xt_connmark 2944 0 xt_CONNMARK 3488 0 xt_conntrack 5536 0 xt_dccp 3248 0 xt_dscp 2912 0 xt_DSCP 3744 0 xt_hashlimit 12032 0 xt_helper 2432 0 xt_iprange 2720 0 xt_length 2080 0 xt_limit 3236 0 xt_mac 1888 0 xt_mark 2464 0 xt_MARK 3072 1 xt_multiport 3552 4 xt_NFLOG 1984 0 xt_NFQUEUE 3232 0 xt_owner 3008 0 xt_physdev 2576 0 xt_pkttype 1952 0 xt_policy 3456 0 xt_realm 1792 0 xt_recent 10784 0 xt_state 2432 18 xt_tcpmss 2464 0 xt_tcpudp 3616 20 xt_time 3104 0 xt_TPROXY 2528 0 Shorewall has detected the following iptables/netfilter capabilities: NAT: Available Packet Mangling: Available Multi-port Match: Available Extended Multi-port Match: Available Connection Tracking Match: Available Extended Connection Tracking Match Support: Available Packet Type Match: Available Policy Match: Available Physdev Match: Available Physdev-is-bridged Support: Available Packet length Match: Available IP range Match: Available Recent Match: Available Owner Match: Available Ipset Match: Not available CONNMARK Target: Available Extended CONNMARK Target: Available Connmark Match: Available Extended Connmark Match: Available Raw Table: Available IPP2P Match: Not available CLASSIFY Target: Available Extended REJECT: Available Repeat match: Available MARK Target: Available Extended MARK Target: Available Extended MARK Target 2: Available Mangle FORWARD Chain: Available Comments: Available Address Type Match: Available TCPMSS Match: Available Hashlimit Match: Available NFQUEUE Target: Available Realm Match: Available Helper Match: Available Connlimit Match: Available Time Match: Available Goto Support: Available LOGMARK Target: Not available IPMARK Target: Not available LOG Target: Available Persistent SNAT: Available TPROXY Target: Available FLOW Classifier: Available Active Internet connections (servers and established) Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 5977/sshd tcp 0 0 10.10.1.1:22 10.10.1.52:50776 ESTABLISHED 6219/1 tcp6 0 0 :::22 :::* LISTEN 5977/sshd Traffic Control Device eth0: qdisc pfifo_fast 0: root bands 3 priomap 1 2 2 2 1 2 0 0 1 1 1 1 1 1 1 1 Sent 9953485 bytes 82552 pkt (dropped 0, overlimits 0 requeues 0) rate 0bit 0pps backlog 0b 0p requeues 0 Device eth1: qdisc pfifo_fast 0: root bands 3 priomap 1 2 2 2 1 2 0 0 1 1 1 1 1 1 1 1 Sent 20067866 bytes 21639 pkt (dropped 0, overlimits 0 requeues 0) rate 0bit 0pps backlog 0b 0p requeues 0 Device eth2: qdisc pfifo_fast 0: root bands 3 priomap 1 2 2 2 1 2 0 0 1 1 1 1 1 1 1 1 Sent 16489283 bytes 48489 pkt (dropped 0, overlimits 0 requeues 0) rate 0bit 0pps backlog 0b 0p requeues 0 TC Filters Device eth0: Device eth1: Device eth2:
------------------------------------------------------------------------------ The Palm PDK Hot Apps Program offers developers who use the Plug-In Development Kit to bring their C/C++ apps to Palm for a share of $1 Million in cash or HP Products. Visit us here for more details: http://p.sf.net/sfu/dev2dev-palm
_______________________________________________ Shorewall-users mailing list Shorewall-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/shorewall-users