Hey
First, apologies if this went out twice. I sent the original email from an odd
email configuration (essentially from an alias of what I signed up as). I
searched and noticed that my post did not appear and I did not get a bounce
back so I was confused. I waited a few days before resending. So apologies if
this goes out twice. I am not trying to spam.
I was hoping someone could help me with L2TP/IPSEC routing issues. I have a
fairly typical setup in which I have a server with eth0 (local traffic) and
eth1 (external/internet traffic). I also have a VPN with OpenSwan/xl2tpd/ppp. I
want users that log into the system to be able to use both eth0 and eth1. E.g.
local internal sites are available, as is the internet. Thus far, my success
has been either granting access to the local intranet, or the external
internet, but not actually both at the same time. Could someone help give me
some guidance. I have read the docs and previous mailing lists that I could
find on this first. Below is my configuration, and I have attached the
shorewall dump.
The below configuration allows users to access the local intranet. To enable
external internet access, I add a 'masq' file as seen below and two DNAT rules
(also shown below commented out), unfortunately this kills my local intranet
access when connected so its disabled for now. Can anyone point me in the right
direction for having both internal intranet and external internet working when
connected via my L2TP VPN?
Thanks for any hints or pointers (the dump is also attached)
# masq
#############################################################################################
#INTERFACE:DEST SOURCE ADDRESS PROTO PORT(S) IPSEC MARK USER/
# GROUP
#eth1 192.168.0.0/24 # uncomment for external network access
(kills internal local intranet access) - also uncomment rules for dnat
# HOSTS
###############################################################################
#ZONE HOST(S) OPTIONS
vpn eth1:0.0.0.0/0
# Interfaces
###############################################################################
#ZONE INTERFACE BROADCAST OPTIONS
loc eth0 detect tcpflags
net eth1 detect norfc1918,logmartians,nosmurfs,tcpflags
l2tp ppp+ detect routeback
# Policy
###############################################################################
#SOURCE DEST POLICY LOG LIMIT: CONNLIMIT:
# LEVEL BURST MASK
fw all ACCEPT
loc fw ACCEPT
loc net ACCEPT # policy for inbound L2TP Zone
# policy for inbound L2TP Zone
loc l2tp ACCEPT # allows local machines to connect (good for testing
purposes)
l2tp loc ACCEPT # allows for going back to local (yay for internet when VPN
connected)
l2tp net ACCEPT debug # allow connected people to get to internet
l2tp fw ACCEPT debug
net all DROP info
all all REJECT info
# Rules
####################################################################################################################################################################
#ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL RATE USER/ MARK
CONNLIMIT TIME HEADERS
# PORT PORT(S) DEST LIMIT GROUP
#SECTION ESTABLISHED
#SECTION RELATED
#SECTION NEW
ACCEPT net fw tcp ssh,ftp,sftp,www,https
ACCEPT loc fw tcp ssh,ftp,sftp,www,https
ACCEPT loc fw tcp 3000
ACCEPT loc fw udp 69
ACCEPT loc fw udp 514
# Prevent IPSEC bypass by hosts behind NAT Gateway
# and block 1701 to prevent tunnel from being open to internet
L2TP(REJECT) net $FW
REJECT $FW net udp - 1701
ACCEPT vpn fw udp 1701
ACCEPT l2tp fw tcp ssh,ftp,sftp,www,https
# uncomment below and masa file to enable external network access
#DNAT net vpn:206.214.243.203 udp 4500
#DNAT net vpn:206.214.243.203 udp 500
# Tunnels
###############################################################################
#TYPE ZONE GATEWAY GATEWAY
# ZONE
#ipsec net 0.0.0.0/0 vpn
ipsecnat net 0.0.0.0/0 vpn
# Zones
###############################################################################
#ZONE TYPE OPTIONS IN OUT
# OPTIONS OPTIONS
fw firewall
net ipv4
loc ipv4
l2tp ipv4
vpn ipsec
Here are some logs with the above configuration. Traffic appears to be going out
Oct 22 14:24:35 YYZUNIX kernel: [1832699.820268]
Shorewall:l2tp2net:ACCEPT:IN=ppp0 OUT=eth1 MAC= SRC=192.168.0.230
DST=74.125.142.108 LEN=64 TOS=0x00 PREC=0x00 TTL=63 ID=1218 DF PROTO=TCP
SPT=59275 DPT=993 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 22 14:24:35 YYZUNIX kernel: [1832699.820280]
Shorewall:l2tp2net:ACCEPT:IN=ppp0 OUT=eth1 MAC= SRC=192.168.0.230
DST=74.125.142.108 LEN=64 TOS=0x00 PREC=0x00 TTL=63 ID=6067 DF PROTO=TCP
SPT=59277 DPT=993 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 22 14:24:35 YYZUNIX kernel: [1832699.820292]
Shorewall:l2tp2net:ACCEPT:IN=ppp0 OUT=eth1 MAC= SRC=192.168.0.230
DST=74.125.142.108 LEN=64 TOS=0x00 PREC=0x00 TTL=63 ID=54514 DF PROTO=TCP
SPT=59276 DPT=993 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 22 14:24:35 YYZUNIX kernel: [1832699.920148]
Shorewall:l2tp2net:ACCEPT:IN=ppp0 OUT=eth1 MAC= SRC=192.168.0.230
DST=17.172.34.90 LEN=64 TOS=0x00 PREC=0x00 TTL=63 ID=27607 DF PROTO=TCP
SPT=59282 DPT=993 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 22 14:24:35 YYZUNIX kernel: [1832699.920162]
Shorewall:l2tp2net:ACCEPT:IN=ppp0 OUT=eth1 MAC= SRC=192.168.0.230
DST=17.172.232.114 LEN=64 TOS=0x00 PREC=0x00 TTL=63 ID=37034 DF PROTO=TCP
SPT=59281 DPT=5223 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 22 14:24:35 YYZUNIX kernel: [1832700.122307]
Shorewall:l2tp2net:ACCEPT:IN=ppp0 OUT=eth1 MAC= SRC=192.168.0.230
DST=17.172.34.34 LEN=64 TOS=0x00 PREC=0x00 TTL=63 ID=55267 DF PROTO=TCP
SPT=59285 DPT=993 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 22 14:24:35 YYZUNIX kernel: [1832700.122321]
Shorewall:l2tp2net:ACCEPT:IN=ppp0 OUT=eth1 MAC= SRC=192.168.0.230
DST=17.172.232.188 LEN=64 TOS=0x00 PREC=0x00 TTL=63 ID=28037 DF PROTO=TCP
SPT=59284 DPT=5223 WINDOW=65535 RES=0x00 SYN URGP=0
Oct 22 14:24:35 YYZUNIX xl2
Shorewall 4.4.26.1 Dump at YYZUNIX - Mon Oct 22 14:41:45 EDT 2012
Counters reset Mon Oct 22 14:21:59 EDT 2012
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
1574 180K dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW
3450 411K eth1_in all -- eth1 * 0.0.0.0/0 0.0.0.0/0
2452 272K loc2fw all -- eth0 * 0.0.0.0/0 0.0.0.0/0
policy match dir in pol none
137 18214 l2tp2fw all -- ppp+ * 0.0.0.0/0 0.0.0.0/0
policy match dir in pol none
206 42865 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix "Shorewall:INPUT:REJECT:"
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
[goto]
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 eth1_fwd all -- eth1 * 0.0.0.0/0 0.0.0.0/0
150 20081 loc_frwd all -- eth0 * 0.0.0.0/0 0.0.0.0/0
policy match dir in pol none
1016 69455 l2tp_frwd all -- ppp+ * 0.0.0.0/0 0.0.0.0/0
policy match dir in pol none
0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix "Shorewall:FORWARD:REJECT:"
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
[goto]
Chain OUTPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
1666 503K eth1_out all -- * eth1 0.0.0.0/0 0.0.0.0/0
1265 366K fw2loc all -- * eth0 0.0.0.0/0 0.0.0.0/0
policy match dir out pol none
72 22338 fw2l2tp all -- * ppp+ 0.0.0.0/0 0.0.0.0/0
policy match dir out pol none
206 42865 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain Broadcast (2 references)
pkts bytes target prot opt in out source destination
4 990 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
ADDRTYPE match dst-type BROADCAST
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
ADDRTYPE match dst-type MULTICAST
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
ADDRTYPE match dst-type ANYCAST
0 0 DROP all -- * * 0.0.0.0/0 224.0.0.0/4
Chain Drop (4 references)
pkts bytes target prot opt in out source destination
6 1086 all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:113 /* Auth */
6 1086 Broadcast all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmptype 3 code 4 /* Needed ICMP types */
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmptype 11 /* Needed ICMP types */
2 96 Invalid all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,445 /* SMB */
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpts:137:139 /* SMB */
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:137 dpts:1024:65535 /* SMB */
2 96 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,139,445 /* SMB */
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:1900 /* UPnP */
0 0 NotSyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:53 /* Late DNS Replies */
Chain Invalid (2 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID
Chain NotSyn (2 references)
pkts bytes target prot opt in out source destination
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcpflags:! 0x17/0x02
Chain Reject (8 references)
pkts bytes target prot opt in out source destination
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:113 /* Auth */
0 0 Broadcast all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmptype 3 code 4 /* Needed ICMP types */
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmptype 11 /* Needed ICMP types */
0 0 Invalid all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,445 /* SMB */
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpts:137:139 /* SMB */
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:137 dpts:1024:65535 /* SMB */
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,139,445 /* SMB */
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:1900 /* UPnP */
0 0 NotSyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:53 /* Late DNS Replies */
Chain dynamic (7 references)
pkts bytes target prot opt in out source destination
Chain eth1_fwd (1 references)
pkts bytes target prot opt in out source destination
0 0 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW
0 0 smurfs all -- * * 0.0.0.0/0 0.0.0.0/0
policy match dir in pol none ctstate INVALID,NEW
0 0 smurfs all -- * * 0.0.0.0/0 0.0.0.0/0
policy match dir in pol ipsec ctstate INVALID,NEW
0 0 tcpflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
policy match dir in pol none
0 0 tcpflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
policy match dir in pol ipsec
0 0 vpn_frwd all -- * * 0.0.0.0/0 0.0.0.0/0
[goto] policy match dir in pol ipsec
0 0 net_frwd all -- * * 0.0.0.0/0 0.0.0.0/0
policy match dir in pol none
Chain eth1_in (1 references)
pkts bytes target prot opt in out source destination
13 2262 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW
7 1614 smurfs all -- * * 0.0.0.0/0 0.0.0.0/0
policy match dir in pol none ctstate INVALID,NEW
6 648 smurfs all -- * * 0.0.0.0/0 0.0.0.0/0
policy match dir in pol ipsec ctstate INVALID,NEW
923 57594 tcpflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
policy match dir in pol none
0 0 tcpflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
policy match dir in pol ipsec
2227 275K net2fw all -- * * 0.0.0.0/0 0.0.0.0/0
policy match dir in pol none
1223 136K vpn2fw all -- * * 0.0.0.0/0 0.0.0.0/0
policy match dir in pol ipsec
Chain eth1_out (1 references)
pkts bytes target prot opt in out source destination
1379 449K fw2net all -- * * 0.0.0.0/0 0.0.0.0/0
policy match dir out pol none
287 54300 fw2vpn all -- * * 0.0.0.0/0 0.0.0.0/0
policy match dir out pol ipsec
Chain fw2l2tp (1 references)
pkts bytes target prot opt in out source destination
67 21288 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
5 1050 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain fw2loc (1 references)
pkts bytes target prot opt in out source destination
615 311K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
650 54905 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain fw2net (1 references)
pkts bytes target prot opt in out source destination
1315 444K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 ACCEPT esp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
ctstate NEW multiport dports 500,4500
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:1701 /* L2TP */
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:1701
64 5196 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain fw2vpn (1 references)
pkts bytes target prot opt in out source destination
287 54300 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
ctstate NEW multiport dports 500,4500
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain l2tp2fw (1 references)
pkts bytes target prot opt in out source destination
105 13843 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW
32 4371 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
4 256 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 22,21,115,80,443
101 13587 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 7 prefix "Shorewall:l2tp2fw:ACCEPT:"
101 13587 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain l2tp2loc (1 references)
pkts bytes target prot opt in out source destination
26 1941 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
186 13892 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain l2tp2net (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
804 53622 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 7 prefix "Shorewall:l2tp2net:ACCEPT:"
804 53622 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain l2tp2vpn (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix "Shorewall:l2tp2vpn:REJECT:"
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
[goto]
Chain l2tp_frwd (1 references)
pkts bytes target prot opt in out source destination
990 67514 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW
804 53622 l2tp2net all -- * eth1 0.0.0.0/0 0.0.0.0/0
policy match dir out pol none
212 15833 l2tp2loc all -- * eth0 0.0.0.0/0 0.0.0.0/0
policy match dir out pol none
0 0 ACCEPT all -- * ppp+ 0.0.0.0/0 0.0.0.0/0
policy match dir out pol none
0 0 l2tp2vpn all -- * eth1 0.0.0.0/0 0.0.0.0/0
policy match dir out pol ipsec
Chain loc2fw (1 references)
pkts bytes target prot opt in out source destination
1451 164K dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW
435 58347 tcpflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
policy match dir in pol none
1001 108K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
17 956 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 22,21,115,80,443
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:3000
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:69
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:514
1434 163K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain loc2l2tp (1 references)
pkts bytes target prot opt in out source destination
150 20081 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain loc2net (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain loc2vpn (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix "Shorewall:loc2vpn:REJECT:"
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
[goto]
Chain loc_frwd (1 references)
pkts bytes target prot opt in out source destination
0 0 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW
0 0 tcpflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
policy match dir in pol none
0 0 loc2net all -- * eth1 0.0.0.0/0 0.0.0.0/0
policy match dir out pol none
150 20081 loc2l2tp all -- * ppp+ 0.0.0.0/0 0.0.0.0/0
policy match dir out pol none
0 0 loc2vpn all -- * eth1 0.0.0.0/0 0.0.0.0/0
policy match dir out pol ipsec
Chain logdrop (0 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain logflags (5 references)
pkts bytes target prot opt in out source destination
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 4 level 6 prefix "Shorewall:logflags:DROP:"
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain logreject (0 references)
pkts bytes target prot opt in out source destination
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2fw (1 references)
pkts bytes target prot opt in out source destination
2220 273K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 ACCEPT esp -- * * 0.0.0.0/0 0.0.0.0/0
1 528 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
ctstate NEW multiport dports 500,4500
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 22,21,115,80,443
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:1701 /* L2TP */
6 1086 Drop all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix "Shorewall:net2fw:DROP:"
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2l2tp (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 22,21,80,443
0 0 Drop all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix "Shorewall:net2l2tp:DROP:"
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2loc (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 Drop all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix "Shorewall:net2loc:DROP:"
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2vpn (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 Drop all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix "Shorewall:net2vpn:DROP:"
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain net_frwd (1 references)
pkts bytes target prot opt in out source destination
0 0 net2loc all -- * eth0 0.0.0.0/0 0.0.0.0/0
policy match dir out pol none
0 0 net2l2tp all -- * ppp+ 0.0.0.0/0 0.0.0.0/0
policy match dir out pol none
0 0 net2vpn all -- * eth1 0.0.0.0/0 0.0.0.0/0
policy match dir out pol ipsec
Chain reject (18 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
ADDRTYPE match src-type BROADCAST
0 0 DROP all -- * * 224.0.0.0/4 0.0.0.0/0
0 0 DROP 2 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with tcp-reset
0 0 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-port-unreachable
0 0 REJECT icmp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-host-unreachable
0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-host-prohibited
Chain shorewall (0 references)
pkts bytes target prot opt in out source destination
Chain smurflog (2 references)
pkts bytes target prot opt in out source destination
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix "Shorewall:smurfs:DROP:"
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain smurfs (4 references)
pkts bytes target prot opt in out source destination
0 0 RETURN all -- * * 0.0.0.0 0.0.0.0/0
0 0 smurflog all -- * * 0.0.0.0/0 0.0.0.0/0
[goto] ADDRTYPE match src-type BROADCAST
0 0 smurflog all -- * * 224.0.0.0/4 0.0.0.0/0
[goto]
Chain tcpflags (6 references)
pkts bytes target prot opt in out source destination
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
[goto] tcpflags: 0x3F/0x29
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
[goto] tcpflags: 0x3F/0x00
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
[goto] tcpflags: 0x06/0x06
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
[goto] tcpflags: 0x03/0x03
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
[goto] tcp spt:0flags: 0x17/0x02
Chain vpn2fw (1 references)
pkts bytes target prot opt in out source destination
1217 136K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
ctstate NEW multiport dports 500,4500
6 648 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:1701
0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix "Shorewall:vpn2fw:REJECT:"
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
[goto]
Chain vpn2l2tp (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix "Shorewall:vpn2l2tp:REJECT:"
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
[goto]
Chain vpn2loc (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix "Shorewall:vpn2loc:REJECT:"
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
[goto]
Chain vpn2net (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix "Shorewall:vpn2net:REJECT:"
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
[goto]
Chain vpn_frwd (1 references)
pkts bytes target prot opt in out source destination
0 0 vpn2net all -- * eth1 0.0.0.0/0 0.0.0.0/0
policy match dir out pol none
0 0 vpn2loc all -- * eth0 0.0.0.0/0 0.0.0.0/0
policy match dir out pol none
0 0 vpn2l2tp all -- * ppp+ 0.0.0.0/0 0.0.0.0/0
policy match dir out pol none
Log (/var/log/messages)
NAT Table
Chain PREROUTING (policy ACCEPT 901 packets, 83855 bytes)
pkts bytes target prot opt in out source destination
Chain INPUT (policy ACCEPT 301 packets, 44287 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 711 packets, 59037 bytes)
pkts bytes target prot opt in out source destination
Chain POSTROUTING (policy ACCEPT 1065 packets, 84228 bytes)
pkts bytes target prot opt in out source destination
Mangle Table
Chain PREROUTING (policy ACCEPT 7655 packets, 848K bytes)
pkts bytes target prot opt in out source destination
7655 848K tcpre all -- * * 0.0.0.0/0 0.0.0.0/0
Chain INPUT (policy ACCEPT 6245 packets, 744K bytes)
pkts bytes target prot opt in out source destination
6245 744K tcin all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy ACCEPT 1166 packets, 89536 bytes)
pkts bytes target prot opt in out source destination
1166 89536 MARK all -- * * 0.0.0.0/0 0.0.0.0/0
MARK and 0xffffff00
1166 89536 tcfor all -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 3217 packets, 940K bytes)
pkts bytes target prot opt in out source destination
3217 940K tcout all -- * * 0.0.0.0/0 0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 4391 packets, 1032K bytes)
pkts bytes target prot opt in out source destination
4391 1032K tcpost all -- * * 0.0.0.0/0 0.0.0.0/0
Chain tcfor (1 references)
pkts bytes target prot opt in out source destination
Chain tcin (1 references)
pkts bytes target prot opt in out source destination
Chain tcout (1 references)
pkts bytes target prot opt in out source destination
Chain tcpost (1 references)
pkts bytes target prot opt in out source destination
Chain tcpre (1 references)
pkts bytes target prot opt in out source destination
Raw Table
Chain PREROUTING (policy ACCEPT 7655 packets, 848K bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 3217 packets, 940K bytes)
pkts bytes target prot opt in out source destination
Conntrack Table (18 out of 65536)
udp 17 19 src=192.168.0.7 dst=255.255.255.255 sport=68 dport=67
[UNREPLIED] src=255.255.255.255 dst=192.168.0.7 sport=67 dport=68 mark=0 use=2
udp 17 18 src=192.168.0.51 dst=192.168.0.255 sport=138 dport=138
[UNREPLIED] src=192.168.0.255 dst=192.168.0.51 sport=138 dport=138 mark=0 use=2
udp 17 28 src=192.168.0.31 dst=255.255.255.255 sport=17500 dport=17500
[UNREPLIED] src=255.255.255.255 dst=192.168.0.31 sport=17500 dport=17500 mark=0
use=2
tcp 6 430813 ESTABLISHED src=99.234.121.64 dst=206.214.243.203 sport=58101
dport=22 src=206.214.243.203 dst=99.234.121.64 sport=22 dport=58101 [ASSURED]
mark=0 use=2
udp 17 28 src=192.168.0.31 dst=192.168.0.255 sport=17500 dport=17500
[UNREPLIED] src=192.168.0.255 dst=192.168.0.31 sport=17500 dport=17500 mark=0
use=2
tcp 6 299 ESTABLISHED src=99.234.121.64 dst=206.214.243.203 sport=55197
dport=22 src=206.214.243.203 dst=99.234.121.64 sport=22 dport=55197 [ASSURED]
mark=0 use=2
udp 17 19 src=192.168.0.151 dst=255.255.255.255 sport=67 dport=68
[UNREPLIED] src=255.255.255.255 dst=192.168.0.151 sport=68 dport=67 mark=0 use=2
udp 17 29 src=192.168.0.17 dst=255.255.255.255 sport=6553 dport=6553
[UNREPLIED] src=255.255.255.255 dst=192.168.0.17 sport=6553 dport=6553 mark=0
use=2
udp 17 18 src=192.168.0.159 dst=192.168.0.51 sport=137 dport=137
[UNREPLIED] src=192.168.0.51 dst=192.168.0.159 sport=137 dport=137 mark=0 use=2
tcp 6 430841 ESTABLISHED src=99.234.121.64 dst=206.214.243.203 sport=53961
dport=22 src=206.214.243.203 dst=99.234.121.64 sport=22 dport=53961 [ASSURED]
mark=0 use=2
tcp 6 16 TIME_WAIT src=192.168.0.159 dst=192.168.0.1 sport=43138 dport=23
src=192.168.0.1 dst=192.168.0.159 sport=23 dport=43138 [ASSURED] mark=0 use=2
udp 17 164 src=127.0.0.1 dst=127.0.0.1 sport=36107 dport=36107
src=127.0.0.1 dst=127.0.0.1 sport=36107 dport=36107 [ASSURED] mark=0 use=2
udp 17 21 src=192.168.0.7 dst=192.168.0.255 sport=137 dport=137
[UNREPLIED] src=192.168.0.255 dst=192.168.0.7 sport=137 dport=137 mark=0 use=2
udp 17 18 src=192.168.0.51 dst=192.168.0.255 sport=137 dport=137
[UNREPLIED] src=192.168.0.255 dst=192.168.0.51 sport=137 dport=137 mark=0 use=2
udp 17 12 src=192.168.0.8 dst=192.168.0.255 sport=137 dport=137
[UNREPLIED] src=192.168.0.255 dst=192.168.0.8 sport=137 dport=137 mark=0 use=2
udp 17 19 src=192.168.0.20 dst=192.168.0.255 sport=137 dport=137
[UNREPLIED] src=192.168.0.255 dst=192.168.0.20 sport=137 dport=137 mark=0 use=2
tcp 6 429805 ESTABLISHED src=99.234.121.64 dst=206.214.243.203 sport=55180
dport=22 src=206.214.243.203 dst=99.234.121.64 sport=22 dport=55180 [ASSURED]
mark=0 use=2
udp 17 23 src=192.168.0.8 dst=192.168.0.255 sport=17500 dport=17500
[UNREPLIED] src=192.168.0.255 dst=192.168.0.8 sport=17500 dport=17500 mark=0
use=2
IP Configuration
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN
inet 127.0.0.1/8 scope host lo
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP
qlen 1000
inet 192.168.0.159/24 brd 192.168.0.255 scope global eth0
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP
qlen 1000
inet 206.214.243.203/29 brd 206.214.243.207 scope global eth1
IP Stats
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
RX: bytes packets errors dropped overrun mcast
61726333 256700 0 0 0 0
TX: bytes packets errors dropped carrier collsns
61726333 256700 0 0 0 0
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP
qlen 1000
link/ether 00:25:64:d7:42:d8 brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
806886205 6577743 0 1100131 0 0
TX: bytes packets errors dropped carrier collsns
1620504922 2666422 0 0 0 0
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP
qlen 1000
link/ether 00:1b:21:68:56:a8 brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
434296138 918155 0 0 0 0
TX: bytes packets errors dropped carrier collsns
124492438 948361 0 0 0 0
Per-IP Counters
iptaccount is not installed
/proc
/proc/version = Linux version 3.2.0-31-generic (buildd@allspice) (gcc
version 4.6.3 (Ubuntu/Linaro 4.6.3-1ubuntu5) ) #50-Ubuntu SMP Fri Sep 7
16:16:45 UTC 2012
/proc/sys/net/ipv4/ip_forward = 1
/proc/sys/net/ipv4/icmp_echo_ignore_all = 0
/proc/sys/net/ipv4/conf/all/proxy_arp = 0
/proc/sys/net/ipv4/conf/all/arp_filter = 0
/proc/sys/net/ipv4/conf/all/arp_ignore = 0
/proc/sys/net/ipv4/conf/all/rp_filter = 1
/proc/sys/net/ipv4/conf/all/log_martians = 0
/proc/sys/net/ipv4/conf/default/proxy_arp = 0
/proc/sys/net/ipv4/conf/default/arp_filter = 0
/proc/sys/net/ipv4/conf/default/arp_ignore = 0
/proc/sys/net/ipv4/conf/default/rp_filter = 1
/proc/sys/net/ipv4/conf/default/log_martians = 1
/proc/sys/net/ipv4/conf/eth0/proxy_arp = 0
/proc/sys/net/ipv4/conf/eth0/arp_filter = 0
/proc/sys/net/ipv4/conf/eth0/arp_ignore = 0
/proc/sys/net/ipv4/conf/eth0/rp_filter = 1
/proc/sys/net/ipv4/conf/eth0/log_martians = 1
/proc/sys/net/ipv4/conf/eth1/proxy_arp = 0
/proc/sys/net/ipv4/conf/eth1/arp_filter = 0
/proc/sys/net/ipv4/conf/eth1/arp_ignore = 0
/proc/sys/net/ipv4/conf/eth1/rp_filter = 1
/proc/sys/net/ipv4/conf/eth1/log_martians = 1
/proc/sys/net/ipv4/conf/lo/proxy_arp = 0
/proc/sys/net/ipv4/conf/lo/arp_filter = 0
/proc/sys/net/ipv4/conf/lo/arp_ignore = 0
/proc/sys/net/ipv4/conf/lo/rp_filter = 1
/proc/sys/net/ipv4/conf/lo/log_martians = 1
Routing Rules
0: from all lookup local
32766: from all lookup main
32767: from all lookup default
Table :
Command line is not complete. Try option "help"
ARP
? (206.214.243.201) at 00:04:28:6d:3c:08 [ether] on eth1
? (192.168.0.1) at 00:1b:c0:c7:b7:0b [ether] on eth0
? (192.168.0.23) at 70:5a:b6:e9:a7:f7 [ether] on eth0
? (192.168.0.35) at 00:15:5d:00:0d:03 [ether] on eth0
? (192.168.0.30) at 10:40:f3:a1:45:60 [ether] on eth0
? (192.168.0.202) at 00:15:c5:d2:ec:ad [ether] on eth0
? (192.168.0.51) at 70:aa:b2:7e:d8:03 [ether] on eth0
? (192.168.0.151) at 00:25:64:d7:75:08 [ether] on eth0
Modules
ip_set 30578 1 xt_set
iptable_filter 12810 1
iptable_mangle 12734 1
iptable_nat 13229 0
iptable_raw 12678 0
ip_tables 27473 4
iptable_raw,iptable_nat,iptable_mangle,iptable_filter
ipt_ah 12525 0
ipt_CLUSTERIP 13312 0
ipt_ECN 12529 0
ipt_ecn 12529 0
ipt_LOG 12919 16
ipt_MASQUERADE 12759 0
ipt_NETMAP 12541 0
ipt_REDIRECT 12549 0
ipt_REJECT 12576 4
ipt_ULOG 17439 0
nf_conntrack 81926 32
xt_connlimit,ipt_MASQUERADE,ipt_CLUSTERIP,nf_nat_tftp,nf_nat_snmp_basic,nf_conntrack_snmp,nf_nat_sip,nf_nat_pptp,nf_nat_irc,nf_nat_h323,nf_nat_ftp,nf_nat_amanda,nf_conntrack_amanda,nf_conntrack_sane,nf_conntrack_tftp,nf_conntrack_sip,nf_conntrack_proto_sctp,nf_conntrack_pptp,nf_conntrack_proto_gre,nf_conntrack_netlink,nf_conntrack_netbios_ns,nf_conntrack_broadcast,nf_conntrack_irc,nf_conntrack_h323,nf_conntrack_ftp,xt_helper,xt_conntrack,xt_connmark,xt_state,iptable_nat,nf_nat,nf_conntrack_ipv4
nf_conntrack_amanda 13084 1 nf_nat_amanda
nf_conntrack_broadcast 12589 2 nf_conntrack_snmp,nf_conntrack_netbios_ns
nf_conntrack_ftp 13452 1 nf_nat_ftp
nf_conntrack_h323 62913 1 nf_nat_h323
nf_conntrack_ipv4 19716 39 iptable_nat,nf_nat
nf_conntrack_irc 13383 1 nf_nat_irc
nf_conntrack_netbios_ns 12665 0
nf_conntrack_netlink 26609 0
nf_conntrack_pptp 13830 1 nf_nat_pptp
nf_conntrack_proto_gre 13656 1 nf_conntrack_pptp
nf_conntrack_proto_sctp 13295 0
nf_conntrack_sane 12856 0
nf_conntrack_sip 29730 1 nf_nat_sip
nf_conntrack_snmp 12857 1 nf_nat_snmp_basic
nf_conntrack_tftp 12953 1 nf_nat_tftp
nf_defrag_ipv4 12729 2 xt_TPROXY,nf_conntrack_ipv4
nf_defrag_ipv6 13368 1 xt_TPROXY
nf_nat 25891 12
ipt_REDIRECT,ipt_NETMAP,ipt_MASQUERADE,nf_nat_tftp,nf_nat_sip,nf_nat_pptp,nf_nat_proto_gre,nf_nat_irc,nf_nat_h323,nf_nat_ftp,nf_nat_amanda,iptable_nat
nf_nat_amanda 12491 0
nf_nat_ftp 12704 0
nf_nat_h323 17002 0
nf_nat_irc 12643 0
nf_nat_pptp 12629 0
nf_nat_proto_gre 12767 1 nf_nat_pptp
nf_nat_sip 17086 0
nf_nat_snmp_basic 17599 0
nf_nat_tftp 12489 0
nf_tproxy_core 12610 1 xt_TPROXY,[permanent]
xt_addrtype 12713 5
xt_AUDIT 12721 0
xt_CLASSIFY 12507 0
xt_comment 12504 20
xt_connlimit 12671 0
xt_connmark 12755 0
xt_conntrack 12760 36
xt_dccp 12606 0
xt_dscp 12597 0
xt_DSCP 12629 0
xt_hashlimit 17780 0
xt_helper 12583 0
xt_iprange 12541 0
xt_length 12536 0
xt_limit 12711 0
xt_mac 12492 0
xt_mark 12563 1
xt_multiport 12597 12
xt_NFLOG 12537 0
xt_NFQUEUE 12726 0
xt_owner 12498 0
xt_physdev 12587 0
xt_pkttype 12504 0
xt_policy 12670 35
xt_realm 12498 0
xt_recent 18437 0
xt_set 13099 0
xt_state 12578 0
xt_tcpmss 12501 0
xt_tcpudp 12603 23
xt_time 12704 0
xt_TPROXY 12853 0
Shorewall has detected the following iptables/netfilter capabilities:
NAT: Available
Packet Mangling: Available
Multi-port Match: Available
Extended Multi-port Match: Available
Connection Tracking Match: Available
Extended Connection Tracking Match Support: Available
Packet Type Match: Available
Policy Match: Available
Physdev Match: Available
Physdev-is-bridged Support: Available
Packet length Match: Available
IP range Match: Available
Recent Match: Available
Owner Match: Available
CONNMARK Target: Available
Extended CONNMARK Target: Available
Connmark Match: Available
Extended Connmark Match: Available
Raw Table: Available
Rawpost Table: Not available
IPP2P Match: Not available
CLASSIFY Target: Available
Extended REJECT: Available
Repeat match: Available
MARK Target: Available
Extended MARK Target: Available
Extended MARK Target 2: Available
Mangle FORWARD Chain: Available
Comments: Available
Address Type Match: Available
TCPMSS Match: Available
Hashlimit Match: Available
NFQUEUE Target: Available
Realm Match: Available
Helper Match: Available
Connlimit Match: Available
Time Match: Available
Goto Support: Available
LOGMARK Target: Not available
IPMARK Target: Not available
LOG Target: Available
ULOG Target: Available
NFLOG Target: Available
Persistent SNAT: Available
TPROXY Target: Available
FLOW Classifier: Available
fwmark route mask: Available
Mark in any table: Available
Header Match: Not available
ACCOUNT Target: Not available
AUDIT Target: Available
ipset V5: Not available
Condition Match: Not available
iptables -S: Available
Basic Filter: Available
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State
PID/Program name
tcp 0 0 127.0.0.1:59530 0.0.0.0:* LISTEN
31464/gitlabhq
tcp 0 0 127.0.0.1:3306 0.0.0.0:* LISTEN
1428/mysqld
tcp 0 0 0.0.0.0:9418 0.0.0.0:* LISTEN
1432/git-daemon
tcp 0 0 0.0.0.0:139 0.0.0.0:* LISTEN
26808/smbd
tcp 0 0 127.0.0.1:6379 0.0.0.0:* LISTEN
2066/redis-server
tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN
3098/apache2
tcp 0 0 0.0.0.0:21 0.0.0.0:* LISTEN
891/vsftpd
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN
957/sshd
tcp 0 0 127.0.0.1:5432 0.0.0.0:* LISTEN
4715/postgres
tcp 0 0 0.0.0.0:25 0.0.0.0:* LISTEN
4645/master
tcp 0 0 0.0.0.0:445 0.0.0.0:* LISTEN
26808/smbd
tcp 0 0 206.214.243.203:22 99.234.121.64:58101 ESTABLISHED
12256/sshd: bslack
tcp 0 0 206.214.243.203:22 99.234.121.64:53961 ESTABLISHED
7905/sshd: bslack [
tcp 0 2992 206.214.243.203:22 99.234.121.64:55197 ESTABLISHED
9611/sshd: bslack [
tcp 0 0 206.214.243.203:22 99.234.121.64:55180 ESTABLISHED
9572/sshd: bslack [
tcp 1 0 127.0.0.1:33159 127.0.0.1:6379 CLOSE_WAIT
31464/gitlabhq
tcp6 0 0 :::9418 :::* LISTEN
1432/git-daemon
tcp6 0 0 :::22 :::* LISTEN
957/sshd
tcp6 0 0 :::25 :::* LISTEN
4645/master
udp 0 0 192.168.0.255:137 0.0.0.0:*
26846/nmbd
udp 0 0 192.168.0.159:137 0.0.0.0:*
26846/nmbd
udp 0 0 206.214.243.207:137 0.0.0.0:*
26846/nmbd
udp 0 0 206.214.243.203:137 0.0.0.0:*
26846/nmbd
udp 0 0 0.0.0.0:137 0.0.0.0:*
26846/nmbd
udp 0 0 192.168.0.255:138 0.0.0.0:*
26846/nmbd
udp 0 0 192.168.0.159:138 0.0.0.0:*
26846/nmbd
udp 0 0 206.214.243.207:138 0.0.0.0:*
26846/nmbd
udp 0 0 206.214.243.203:138 0.0.0.0:*
26846/nmbd
udp 0 0 0.0.0.0:138 0.0.0.0:*
26846/nmbd
udp 0 0 127.0.0.1:4500 0.0.0.0:*
28463/pluto
udp 0 0 192.168.0.159:4500 0.0.0.0:*
28463/pluto
udp 0 0 206.214.243.203:4500 0.0.0.0:*
28463/pluto
udp 0 0 127.0.0.1:500 0.0.0.0:*
28463/pluto
udp 0 0 192.168.0.159:500 0.0.0.0:*
28463/pluto
udp 0 0 206.214.243.203:500 0.0.0.0:*
28463/pluto
udp 0 0 0.0.0.0:514 0.0.0.0:*
12440/rsyslogd
udp 0 0 127.0.0.1:36107 127.0.0.1:36107 ESTABLISHED
4715/postgres
udp 0 0 0.0.0.0:1701 0.0.0.0:*
11038/xl2tpd
udp6 0 0 ::1:500 :::*
28463/pluto
udp6 0 0 :::514 :::*
12440/rsyslogd
Traffic Control
Device eth0:
qdisc pfifo_fast 0: root refcnt 2 bands 3 priomap 1 2 2 2 1 2 0 0 1 1 1 1 1 1
1 1
Sent 1620504922 bytes 2666422 pkt (dropped 0, overlimits 0 requeues 10543)
backlog 0b 0p requeues 10543
Device eth1:
qdisc pfifo_fast 0: root refcnt 2 bands 3 priomap 1 2 2 2 1 2 0 0 1 1 1 1 1 1
1 1
Sent 120620578 bytes 948406 pkt (dropped 0, overlimits 0 requeues 0)
backlog 0b 0p requeues 0
TC Filters
Device eth0:
Device eth1:------------------------------------------------------------------------------
Everyone hates slow websites. So do we.
Make your web apps faster with AppDynamics
Download AppDynamics Lite for free today:
http://p.sf.net/sfu/appdyn_sfd2d_oct
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users