Hi Tom -

Thanks for the greased-lightning response again, and here's the dump.

Many thanks - Philip

On 10/01/2017 21:05, Tom Eastep wrote:
> On 01/10/2017 12:50 PM, Philip Le Riche wrote:
> > I'm afraid I'm still struggling with this, though I made a minor
> > breakthrough when I realised I hadn't added a masq rule for the
> > raw interface, and the ppp0 not useable problem has gone away. (It
> > seems I have to connect it with shorewall clear then start
> > shorewall.) Anyway, my home test setup now seems to be working like
> > the school firewall.
>
> > (To recap, Raspberry Pis on zone pinet are accessed by PCs in zone
> > schl using ssh and vnc, and access the Internet via schl and the
> > school gateway. Traceroute traffic (only) from Pis and the firewall
> > is to be routed to a 3rd zone containing a mobile data dongle to
> > give unfiltered Internet access.)
>
> > Traceroute is now routed correctly from the Pis, but on the
> > firewall traceroute reports Send: Operation not permitted. (I have
> > the same rules with pinet and $FW as source to allow traceroute.)
> > Also, web access from both the Pis and the firewall is now broken.
> > However a PC on schl can still access a Pi.
>
> > My providers file is now: #NAME    NUMBER    MARK    DUPLICATE
> > INTERFACE    GATEWAY    OPTIONS raw    1    1    -        ppp0
> > - school    2    -    -        eno1        192.168.1.1 primary
>
> > If I add option fallback to provider raw, that fixes web from both
> > the Pis and the firewall but breaks traceroute. (I didn't think it
> > was a good idea but tried it anyway.)
>
> > I've read providers(5) and Multiple Internet Connections several
> > times and spent a good few hours trying to get it to work but there
> > seems to be something that I still haven't correctly understood.
> > Any help would be greatly appreciated.
>
> > For reference, my other relevant shorewall files are: mangle:
> > #ACTION    SOURCE    DEST    PROTO    PORT(S)    SOURCE    USER
> > TEST #                    PORT(S) MARK(1)    enx00e04c534458    -
> > udp    33434:33523    -    -    - MARK(1) enx00e04c534458    -
> > 253    -    -    -    - MARK(1)    $FW    -    udp    33434:33523
> > -    -    - MARK(1) $FW    -    253    -    -    -    -
>
> > rtrules: #SOURCE    DEST    PROVIDER    PRIORITY    MARK
> > enx00e04c534458    -    raw        11000        1 lo    -    raw
> > 11000        1
>
> > zones: fw    firewall schl    ipv4 pinet    ipv4 inet    ipv4
>
> > interfaces: schl    eno1
> > tcpflags,nosmurfs,routefilter,logmartians,sourceroute=0 pinet
> > enx00e04c534458 tcpflags,nosmurfs,routefilter,logmartians inet
> > ppp0
> > tcpflags,nosmurfs,routefilter,logmartians,sourceroute=0,optional
>
> Philip,
>
> Please:
>
> a) Set fallback on the raw provider.
> b) Shorewall reload
> c) Try a traceroute from a Pi
> d) 'shorewall dump > dump'
> e) Send me the 'dump' file.
>
> Thanks,
> -Tom
>
> >
------------------------------------------------------------------------------
> Developer Access Program for Intel Xeon Phi Processors > Access to
Intel Xeon Phi processor-based developer platforms. > With one year of
Intel Parallel Studio XE. > Training and support from Colfax. > Order
your platform today. http://sdm.link/xeonphi >
_______________________________________________ > Shorewall-users
mailing list > Shorewall-users@lists.sourceforge.net >
https://lists.sourceforge.net/lists/listinfo/shorewall-users >


Shorewall 5.0.4 Dump at Philip-Desktop - Tue 10 Jan 21:48:24 GMT 2017

Shorewall is running
State:Started (Tue 10 Jan 21:47:05 GMT 2017) from /etc/shorewall/ 
(/var/lib/shorewall/firewall compiled by Shorewall version 5.0.4)

Counters reset Tue 10 Jan 21:47:05 GMT 2017

Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
   65  4500 schl-fw    all  --  eno1   *       0.0.0.0/0            0.0.0.0/0   
        
   36  3680 pinet-fw   all  --  enx00e04c534458 *       0.0.0.0/0            
0.0.0.0/0           
    0     0 inet-fw    all  --  ppp0   *       0.0.0.0/0            0.0.0.0/0   
        
    5   404 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:INPUT:REJECT:"
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 TCPMSS     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp flags:0x06/0x02 TCPMSS clamp to PMTU
    6   612 schl_frwd  all  --  eno1   *       0.0.0.0/0            0.0.0.0/0   
        
   55  3374 pinet_frwd  all  --  enx00e04c534458 *       0.0.0.0/0            
0.0.0.0/0           
    0     0 inet_frwd  all  --  ppp0   *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:FORWARD:REJECT:"
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain OUTPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
   83  6192 fw-schl    all  --  *      eno1    0.0.0.0/0            0.0.0.0/0   
        
   64  4348 ACCEPT     all  --  *      enx00e04c534458  0.0.0.0/0            
0.0.0.0/0           
    0     0 fw-inet    all  --  *      ppp0    0.0.0.0/0            0.0.0.0/0   
        
    5   404 ACCEPT     all  --  *      lo      0.0.0.0/0            0.0.0.0/0   
        
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:OUTPUT:REJECT:"
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain Broadcast (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
   18  1776 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ADDRTYPE match dst-type BROADCAST
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ADDRTYPE match dst-type MULTICAST
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ADDRTYPE match dst-type ANYCAST

Chain Drop (7 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    6   840            all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    6   840 Broadcast  all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         icmptype 3 code 4 /* Needed ICMP types */
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         icmptype 11 /* Needed ICMP types */
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         multiport dports 135,445 /* SMB */
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpts:137:139 /* SMB */
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp spt:137 dpts:1024:65535 /* SMB */
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         multiport dports 135,139,445 /* SMB */
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:1900 /* UPnP */
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp flags:!0x17/0x02
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp spt:53 /* Late DNS Replies */

Chain Reject (6 references)
 pkts bytes target     prot opt in     out     source               destination 
        
   13   996            all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
   13   996 Broadcast  all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         icmptype 3 code 4 /* Needed ICMP types */
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         icmptype 11 /* Needed ICMP types */
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         multiport dports 135,445 /* SMB */
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpts:137:139 /* SMB */
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp spt:137 dpts:1024:65535 /* SMB */
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         multiport dports 135,139,445 /* SMB */
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:1900 /* UPnP */
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp flags:!0x17/0x02
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp spt:53 /* Late DNS Replies */

Chain dynamic (6 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain fw-inet (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpts:33434:33523
    0     0 ACCEPT     253  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:fw-inet:REJECT:"
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain fw-schl (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
   65  4901 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         multiport dports 80,443 /* Web */
    5   295 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:53
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:53
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:123
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         icmptype 8 /* Ping */
   13   996 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    1    60 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:fw-schl:REJECT:"
    1    60 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain inet-fw (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
    0     0 smurfs     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
    0     0 tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
    0     0 Drop       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain inet_frwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
    0     0 smurfs     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
    0     0 tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ~comb0     all  --  *      eno1    0.0.0.0/0            0.0.0.0/0   
        
    0     0 ~comb0     all  --  *      enx00e04c534458  0.0.0.0/0            
0.0.0.0/0           

Chain logdrop (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain logflags (7 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 4 level 6 prefix "Shorewall:logflags:DROP:"
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain logreject (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain pinet-fw (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
    0     0 smurfs     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
   36  3680 tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
   36  3680 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         multiport dports 135,445 /* SMBBI */
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpts:137:139 /* SMBBI */
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp spt:137 dpts:1024:65535 /* SMBBI */
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         multiport dports 135,139,445 /* SMBBI */
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         icmptype 8 /* Ping */
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:pinet-fw:REJECT:"
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto] 

Chain pinet-inet (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
   48  2880 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpts:33434:33523
    0     0 ACCEPT     253  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 Drop       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain pinet-schl (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         multiport dports 80,443 /* Web */
    4   304 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:123
    3   190 ACCEPT     udp  --  *      *       0.0.0.0/0            192.168.1.1 
         ctorigdst 192.168.2.254 udp dpt:53
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            192.168.1.1 
         ctorigdst 192.168.2.254 tcp dpt:53
    0     0 Drop       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain pinet_frwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
   55  3374 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
   55  3374 smurfs     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
    0     0 tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    7   494 pinet-schl  all  --  *      eno1    0.0.0.0/0            0.0.0.0/0  
         
   48  2880 pinet-inet  all  --  *      ppp0    0.0.0.0/0            0.0.0.0/0  
         

Chain reject (11 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ADDRTYPE match src-type BROADCAST
    0     0 DROP       all  --  *      *       224.0.0.0/4          0.0.0.0/0   
        
    0     0 DROP       2    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 REJECT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         reject-with tcp-reset
    1    60 REJECT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         reject-with icmp-port-unreachable
    0     0 REJECT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         reject-with icmp-host-unreachable
    0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         reject-with icmp-host-prohibited

Chain schl-fw (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    6   840 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
    6   840 smurfs     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
   50  2930 tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
   59  3660 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         multiport dports 22,80
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
         icmptype 8 /* Ping */
    6   840 Drop       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:schl-fw:DROP:"
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain schl-inet (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
    0     0 Drop       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:schl-inet:DROP:"
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain schl-pinet (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    6   612 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            192.168.2.1 
         ctorigdst 192.168.1.31 multiport dports 5900:5909,22,80,8080:8081 /* 
Pi */
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            192.168.2.2 
         ctorigdst 192.168.1.32 multiport dports 5900:5909,22,80,8080:8081 /* 
Pi */
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            192.168.2.3 
         ctorigdst 192.168.1.33 multiport dports 5900:5909,22,80,8080:8081 /* 
Pi */
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            192.168.2.4 
         ctorigdst 192.168.1.34 multiport dports 5900:5909,22,80,8080:8081 /* 
Pi */
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            192.168.2.5 
         ctorigdst 192.168.1.35 multiport dports 5900:5909,22,80,8080:8081 /* 
Pi */
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            192.168.2.6 
         ctorigdst 192.168.1.36 multiport dports 5900:5909,22,80,8080:8081 /* 
Pi */
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            192.168.2.7 
         ctorigdst 192.168.1.37 multiport dports 5900:5909,22,80,8080:8081 /* 
Pi */
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            192.168.2.8 
         ctorigdst 192.168.1.38 multiport dports 5900:5909,22,80,8080:8081 /* 
Pi */
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            192.168.2.9 
         ctorigdst 192.168.1.39 multiport dports 5900:5909,22,80,8080:8081 /* 
Pi */
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
192.168.2.10         ctorigdst 192.168.1.40 multiport dports 
5900:5909,22,80,8080:8081 /* Pi */
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
192.168.2.11         ctorigdst 192.168.1.41 multiport dports 
5900:5909,22,80,8080:8081 /* Pi */
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
192.168.2.12         ctorigdst 192.168.1.42 multiport dports 
5900:5909,22,80,8080:8081 /* Pi */
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
192.168.2.13         ctorigdst 192.168.1.43 multiport dports 
5900:5909,22,80,8080:8081 /* Pi */
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
192.168.2.14         ctorigdst 192.168.1.44 multiport dports 
5900:5909,22,80,8080:8081 /* Pi */
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
192.168.2.15         ctorigdst 192.168.1.45 multiport dports 
5900:5909,22,80,8080:8081 /* Pi */
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
192.168.2.16         ctorigdst 192.168.1.46 multiport dports 
5900:5909,22,80,8080:8081 /* Pi */
    0     0 Drop       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:schl-pinet:DROP:"
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain schl_frwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
    0     0 smurfs     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate INVALID,NEW,UNTRACKED
    0     0 tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    6   612 schl-pinet  all  --  *      enx00e04c534458  0.0.0.0/0            
0.0.0.0/0           
    0     0 schl-inet  all  --  *      ppp0    0.0.0.0/0            0.0.0.0/0   
        

Chain sha-lh-75d25428073b55a933dd (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain sha-rh-e2a18a37ef42a594e8aa (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain shorewall (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0            all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         recent: SET name: %CURRENTTIME side: source mask: 255.255.255.255

Chain smurflog (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         LOG flags 0 level 6 prefix "Shorewall:smurfs:DROP:"
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain smurfs (6 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 RETURN     all  --  *      *       0.0.0.0              0.0.0.0/0   
        
    0     0 smurflog   all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  ADDRTYPE match src-type BROADCAST
    0     0 smurflog   all  --  *      *       224.0.0.0/4          0.0.0.0/0   
        [goto] 

Chain tcpflags (6 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  tcp flags:0x3F/0x29
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  tcp flags:0x3F/0x00
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  tcp flags:0x06/0x06
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  tcp flags:0x05/0x05
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  tcp flags:0x03/0x03
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  tcp flags:0x19/0x09
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        [goto]  tcp spt:0 flags:0x17/0x02

Chain ~comb0 (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         ctstate RELATED,ESTABLISHED
    0     0 Drop       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Log (/var/log/messages)

Jan 10 21:47:47 Philip-Desktop vmunix: Shorewall:fw-schl:REJECT:IN= OUT=eno1 
SRC=192.168.1.2 DST=191.239.213.197 LEN=60 TOS=0x00 PREC=0x00 TTL=1 ID=47188 
PROTO=UDP SPT=43813 DPT=33434 LEN=40 MARK=0x1 

NAT Table

Chain PREROUTING (policy ACCEPT 61 packets, 4204 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    6   840 schl_dnat  all  --  eno1   *       0.0.0.0/0            0.0.0.0/0   
        
   57  3495 pinet_dnat  all  --  enx00e04c534458 *       0.0.0.0/0            
0.0.0.0/0           

Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain OUTPUT (policy ACCEPT 18 packets, 1291 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain POSTROUTING (policy ACCEPT 5 packets, 295 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    6   435 SNAT       all  --  *      eno1    192.168.2.0/24       0.0.0.0/0   
         to:192.168.1.2
   48  2880 ppp0_masq  all  --  *      ppp0    0.0.0.0/0            0.0.0.0/0   
        

Chain pinet_dnat (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    2   131 DNAT       udp  --  *      *       0.0.0.0/0            
192.168.2.254        udp dpt:53 to:192.168.1.1
    0     0 DNAT       tcp  --  *      *       0.0.0.0/0            
192.168.2.254        tcp dpt:53 to:192.168.1.1

Chain ppp0_masq (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
   48  2880 SNAT       all  --  *      *       192.168.2.0/24       0.0.0.0/0   
         to:10.172.8.122

Chain schl_dnat (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DNAT       tcp  --  *      *       0.0.0.0/0            
192.168.1.31         multiport dports 5900:5909,22,80,8080:8081 /* Pi */ 
to:192.168.2.1
    0     0 DNAT       tcp  --  *      *       0.0.0.0/0            
192.168.1.32         multiport dports 5900:5909,22,80,8080:8081 /* Pi */ 
to:192.168.2.2
    0     0 DNAT       tcp  --  *      *       0.0.0.0/0            
192.168.1.33         multiport dports 5900:5909,22,80,8080:8081 /* Pi */ 
to:192.168.2.3
    0     0 DNAT       tcp  --  *      *       0.0.0.0/0            
192.168.1.34         multiport dports 5900:5909,22,80,8080:8081 /* Pi */ 
to:192.168.2.4
    0     0 DNAT       tcp  --  *      *       0.0.0.0/0            
192.168.1.35         multiport dports 5900:5909,22,80,8080:8081 /* Pi */ 
to:192.168.2.5
    0     0 DNAT       tcp  --  *      *       0.0.0.0/0            
192.168.1.36         multiport dports 5900:5909,22,80,8080:8081 /* Pi */ 
to:192.168.2.6
    0     0 DNAT       tcp  --  *      *       0.0.0.0/0            
192.168.1.37         multiport dports 5900:5909,22,80,8080:8081 /* Pi */ 
to:192.168.2.7
    0     0 DNAT       tcp  --  *      *       0.0.0.0/0            
192.168.1.38         multiport dports 5900:5909,22,80,8080:8081 /* Pi */ 
to:192.168.2.8
    0     0 DNAT       tcp  --  *      *       0.0.0.0/0            
192.168.1.39         multiport dports 5900:5909,22,80,8080:8081 /* Pi */ 
to:192.168.2.9
    0     0 DNAT       tcp  --  *      *       0.0.0.0/0            
192.168.1.40         multiport dports 5900:5909,22,80,8080:8081 /* Pi */ 
to:192.168.2.10
    0     0 DNAT       tcp  --  *      *       0.0.0.0/0            
192.168.1.41         multiport dports 5900:5909,22,80,8080:8081 /* Pi */ 
to:192.168.2.11
    0     0 DNAT       tcp  --  *      *       0.0.0.0/0            
192.168.1.42         multiport dports 5900:5909,22,80,8080:8081 /* Pi */ 
to:192.168.2.12
    0     0 DNAT       tcp  --  *      *       0.0.0.0/0            
192.168.1.43         multiport dports 5900:5909,22,80,8080:8081 /* Pi */ 
to:192.168.2.13
    0     0 DNAT       tcp  --  *      *       0.0.0.0/0            
192.168.1.44         multiport dports 5900:5909,22,80,8080:8081 /* Pi */ 
to:192.168.2.14
    0     0 DNAT       tcp  --  *      *       0.0.0.0/0            
192.168.1.45         multiport dports 5900:5909,22,80,8080:8081 /* Pi */ 
to:192.168.2.15
    0     0 DNAT       tcp  --  *      *       0.0.0.0/0            
192.168.1.46         multiport dports 5900:5909,22,80,8080:8081 /* Pi */ 
to:192.168.2.16

Mangle Table

Chain PREROUTING (policy ACCEPT 190 packets, 14822 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
  190 14822 CONNMARK   all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         CONNMARK restore mask 0xff
   20  2072 routemark  all  --  ppp0   *       0.0.0.0/0            0.0.0.0/0   
         mark match 0x0/0xff
   13  1536 routemark  all  --  eno1   *       0.0.0.0/0            0.0.0.0/0   
         mark match 0x0/0xff
   99  7638 tcpre      all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         mark match 0x0/0xff

Chain INPUT (policy ACCEPT 106 packets, 8584 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain FORWARD (policy ACCEPT 61 packets, 3986 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
   61  3986 MARK       all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         MARK and 0xffffff00

Chain OUTPUT (policy ACCEPT 152 packets, 10944 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
  152 10944 CONNMARK   all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         CONNMARK restore mask 0xff
   87  6043 tcout      all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         mark match 0x0/0xff

Chain POSTROUTING (policy ACCEPT 200 packets, 13934 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain routemark (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
   20  2072 MARK       all  --  ppp0   *       0.0.0.0/0            0.0.0.0/0   
         MARK xset 0x1/0xff
   13  1536 MARK       all  --  eno1   *       0.0.0.0/0            0.0.0.0/0   
         MARK xset 0x2/0xff
   33  3608 CONNMARK   all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         mark match ! 0x0/0xff CONNMARK save mask 0xff

Chain tcout (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    1    60 MARK       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpts:33434:33523 MARK set 0x1
    0     0 MARK       253  --  *      *       0.0.0.0/0            0.0.0.0/0   
         MARK set 0x1

Chain tcpre (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
   51  3060 MARK       udp  --  enx00e04c534458 *       0.0.0.0/0            
0.0.0.0/0            udp dpts:33434:33523 MARK set 0x1
    0     0 MARK       253  --  enx00e04c534458 *       0.0.0.0/0            
0.0.0.0/0            MARK set 0x1

Raw Table

Chain PREROUTING (policy ACCEPT 190 packets, 14822 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:10080 CT helper amanda
    0     0 CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:21 CT helper ftp
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:1719 CT helper RAS
    0     0 CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:1720 CT helper Q.931
    0     0 CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:6667 CT helper irc
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:137 CT helper netbios-ns
    0     0 CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:1723 CT helper pptp
    0     0 CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:6566 CT helper sane
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:5060 CT helper sip
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:161 CT helper snmp
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:69 CT helper tftp

Chain OUTPUT (policy ACCEPT 152 packets, 10944 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:10080 CT helper amanda
    0     0 CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:21 CT helper ftp
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:1719 CT helper RAS
    0     0 CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:1720 CT helper Q.931
    0     0 CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:6667 CT helper irc
   12   936 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:137 CT helper netbios-ns
    0     0 CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:1723 CT helper pptp
    0     0 CT         tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         tcp dpt:6566 CT helper sane
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:5060 CT helper sip
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:161 CT helper snmp
    0     0 CT         udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
         udp dpt:69 CT helper tftp

Conntrack Table (21 out of 262144)


IP Configuration

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group 
default qlen 1
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
2: eno1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP 
group default qlen 1000
    inet 192.168.1.2/24 brd 192.168.1.255 scope global eno1
       valid_lft forever preferred_lft forever
    inet 192.168.1.30/24 brd 192.168.1.255 scope global secondary eno1
       valid_lft forever preferred_lft forever
    inet 192.168.1.31/24 brd 192.168.1.255 scope global secondary eno1
       valid_lft forever preferred_lft forever
    inet 192.168.1.32/24 brd 192.168.1.255 scope global secondary eno1
       valid_lft forever preferred_lft forever
    inet 192.168.1.33/24 brd 192.168.1.255 scope global secondary eno1
       valid_lft forever preferred_lft forever
    inet 192.168.1.34/24 brd 192.168.1.255 scope global secondary eno1
       valid_lft forever preferred_lft forever
    inet 192.168.1.35/24 brd 192.168.1.255 scope global secondary eno1
       valid_lft forever preferred_lft forever
    inet 192.168.1.36/24 brd 192.168.1.255 scope global secondary eno1
       valid_lft forever preferred_lft forever
    inet 192.168.1.37/24 brd 192.168.1.255 scope global secondary eno1
       valid_lft forever preferred_lft forever
    inet 192.168.1.38/24 brd 192.168.1.255 scope global secondary eno1
       valid_lft forever preferred_lft forever
    inet 192.168.1.39/24 brd 192.168.1.255 scope global secondary eno1
       valid_lft forever preferred_lft forever
    inet 192.168.1.40/24 brd 192.168.1.255 scope global secondary eno1
       valid_lft forever preferred_lft forever
3: enx00e04c534458: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast 
state UP group default qlen 1000
    inet 192.168.2.254/24 brd 192.168.2.255 scope global enx00e04c534458
       valid_lft forever preferred_lft forever
5: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast 
state UNKNOWN group default qlen 3
    inet 10.172.8.122/32 brd 10.172.8.122 scope global ppp0
       valid_lft forever preferred_lft forever

IP Stats

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode 
DEFAULT group default qlen 1
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    RX: bytes  packets  errors  dropped overrun mcast   
    103883     1117     0       0       0       0       
    TX: bytes  packets  errors  dropped carrier collsns 
    103883     1117     0       0       0       0       
2: eno1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP 
mode DEFAULT group default qlen 1000
    link/ether 00:22:4d:55:6e:84 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    4781458    6397     0       1       0       45      
    TX: bytes  packets  errors  dropped carrier collsns 
    612836     5986     0       0       0       0       
3: enx00e04c534458: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast 
state UP mode DEFAULT group default qlen 1000
    link/ether 00:e0:4c:53:44:58 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    45218      475      0       0       0       0       
    TX: bytes  packets  errors  dropped carrier collsns 
    59234      580      0       0       0       0       
5: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast 
state UNKNOWN mode DEFAULT group default qlen 3
    link/ppp 
    RX: bytes  packets  errors  dropped overrun mcast   
    3834       47       0       0       0       0       
    TX: bytes  packets  errors  dropped carrier collsns 
    5301       103      0       0       0       0       

Routing Rules

0:      from all lookup local 
999:    from all lookup main 
10000:  from all fwmark 0x1/0xff lookup raw 
10001:  from all fwmark 0x2/0xff lookup school 
11000:  from all fwmark 0x1/0xff iif enx00e04c534458 lookup raw 
11000:  from all fwmark 0x1/0xff iif lo lookup raw 
20000:  from 10.172.8.122 lookup raw 
20000:  from 192.168.1.2 lookup school 
20000:  from 192.168.1.30 lookup school 
20000:  from 192.168.1.31 lookup school 
20000:  from 192.168.1.32 lookup school 
20000:  from 192.168.1.33 lookup school 
20000:  from 192.168.1.34 lookup school 
20000:  from 192.168.1.35 lookup school 
20000:  from 192.168.1.36 lookup school 
20000:  from 192.168.1.37 lookup school 
20000:  from 192.168.1.38 lookup school 
20000:  from 192.168.1.39 lookup school 
20000:  from 192.168.1.40 lookup school 
32765:  from all lookup balance 
32767:  from all lookup default 

Table balance:

default via 192.168.1.1 dev eno1

Table default:

default dev ppp0 scope link metric 1

Table local:

local 192.168.2.254 dev enx00e04c534458 proto kernel scope host src 
192.168.2.254
local 192.168.1.40 dev eno1 proto kernel scope host src 192.168.1.2
local 192.168.1.39 dev eno1 proto kernel scope host src 192.168.1.2
local 192.168.1.38 dev eno1 proto kernel scope host src 192.168.1.2
local 192.168.1.37 dev eno1 proto kernel scope host src 192.168.1.2
local 192.168.1.36 dev eno1 proto kernel scope host src 192.168.1.2
local 192.168.1.35 dev eno1 proto kernel scope host src 192.168.1.2
local 192.168.1.34 dev eno1 proto kernel scope host src 192.168.1.2
local 192.168.1.33 dev eno1 proto kernel scope host src 192.168.1.2
local 192.168.1.32 dev eno1 proto kernel scope host src 192.168.1.2
local 192.168.1.31 dev eno1 proto kernel scope host src 192.168.1.2
local 192.168.1.30 dev eno1 proto kernel scope host src 192.168.1.2
local 192.168.1.2 dev eno1 proto kernel scope host src 192.168.1.2
local 127.0.0.1 dev lo proto kernel scope host src 127.0.0.1
local 10.172.8.122 dev ppp0 proto kernel scope host src 10.172.8.122
broadcast 192.168.2.255 dev enx00e04c534458 proto kernel scope link src 
192.168.2.254
broadcast 192.168.2.0 dev enx00e04c534458 proto kernel scope link src 
192.168.2.254
broadcast 192.168.1.255 dev eno1 proto kernel scope link src 192.168.1.2
broadcast 192.168.1.0 dev eno1 proto kernel scope link src 192.168.1.2
broadcast 127.255.255.255 dev lo proto kernel scope link src 127.0.0.1
broadcast 127.0.0.0 dev lo proto kernel scope link src 127.0.0.1
broadcast 10.172.8.122 dev ppp0 proto kernel scope link src 10.172.8.122
local 127.0.0.0/8 dev lo proto kernel scope host src 127.0.0.1

Table main:

192.168.1.1 dev eno1 scope link src 192.168.1.2
192.168.2.0/24 dev enx00e04c534458 proto kernel scope link src 192.168.2.254 
metric 100
192.168.1.0/24 dev eno1 proto kernel scope link src 192.168.1.2 metric 100
169.254.0.0/16 dev eno1 scope link metric 1000

Table raw:

default dev ppp0 scope link

Table school:

192.168.1.1 dev eno1 scope link src 192.168.1.2
default via 192.168.1.1 dev eno1 src 192.168.1.2

Per-IP Counters

   iptaccount is not installed

NF Accounting

No NF Accounting defined (nfacct not found)

Events


/proc

   /proc/version = Linux version 4.4.0-34-generic (buildd@lgw01-20) (gcc 
version 5.3.1 20160413 (Ubuntu 5.3.1-14ubuntu2.1) ) #53-Ubuntu SMP Wed Jul 27 
16:06:39 UTC 2016
   /proc/sys/net/ipv4/ip_forward = 1
   /proc/sys/net/ipv4/icmp_echo_ignore_all = 0
   /proc/sys/net/ipv4/conf/all/proxy_arp = 0
   /proc/sys/net/ipv4/conf/all/arp_filter = 0
   /proc/sys/net/ipv4/conf/all/arp_ignore = 0
   /proc/sys/net/ipv4/conf/all/rp_filter = 0
   /proc/sys/net/ipv4/conf/all/log_martians = 0
   /proc/sys/net/ipv4/conf/default/proxy_arp = 0
   /proc/sys/net/ipv4/conf/default/arp_filter = 0
   /proc/sys/net/ipv4/conf/default/arp_ignore = 0
   /proc/sys/net/ipv4/conf/default/rp_filter = 0
   /proc/sys/net/ipv4/conf/default/log_martians = 1
   /proc/sys/net/ipv4/conf/eno1/proxy_arp = 0
   /proc/sys/net/ipv4/conf/eno1/arp_filter = 0
   /proc/sys/net/ipv4/conf/eno1/arp_ignore = 0
   /proc/sys/net/ipv4/conf/eno1/rp_filter = 1
   /proc/sys/net/ipv4/conf/eno1/log_martians = 1
   /proc/sys/net/ipv4/conf/enx00e04c534458/proxy_arp = 0
   /proc/sys/net/ipv4/conf/enx00e04c534458/arp_filter = 0
   /proc/sys/net/ipv4/conf/enx00e04c534458/arp_ignore = 0
   /proc/sys/net/ipv4/conf/enx00e04c534458/rp_filter = 1
   /proc/sys/net/ipv4/conf/enx00e04c534458/log_martians = 1
   /proc/sys/net/ipv4/conf/lo/proxy_arp = 0
   /proc/sys/net/ipv4/conf/lo/arp_filter = 0
   /proc/sys/net/ipv4/conf/lo/arp_ignore = 0
   /proc/sys/net/ipv4/conf/lo/rp_filter = 0
   /proc/sys/net/ipv4/conf/lo/log_martians = 1
   /proc/sys/net/ipv4/conf/ppp0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/ppp0/arp_filter = 0
   /proc/sys/net/ipv4/conf/ppp0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/ppp0/rp_filter = 1
   /proc/sys/net/ipv4/conf/ppp0/log_martians = 1

ARP

? (192.168.1.1) at 00:24:a5:bd:a2:68 [ether] on eno1
? (192.168.1.104) at d8:49:2f:88:2b:d5 [ether] on eno1
? (192.168.2.3) at b8:27:eb:38:33:c2 [ether] on enx00e04c534458

Modules

iptable_filter         16384  1
iptable_mangle         16384  1
iptable_nat            16384  1
iptable_raw            16384  1
ip_tables              24576  4 
iptable_filter,iptable_mangle,iptable_nat,iptable_raw
ipt_REJECT             16384  4
nf_conntrack          106496  29 
nf_nat_ftp,nf_nat_irc,nf_nat_sip,nf_nat_amanda,xt_CT,nf_nat_snmp_basic,nf_conntrack_netbios_ns,nf_conntrack_proto_gre,nf_conntrack_proto_udplite,nf_nat,nf_nat_h323,nf_nat_ipv4,nf_nat_pptp,nf_nat_tftp,xt_conntrack,nf_conntrack_amanda,nf_conntrack_proto_sctp,nf_conntrack_netlink,nf_conntrack_broadcast,xt_connmark,nf_conntrack_ftp,nf_conntrack_irc,nf_conntrack_sip,nf_conntrack_h323,nf_conntrack_ipv4,nf_conntrack_pptp,nf_conntrack_sane,nf_conntrack_snmp,nf_conntrack_tftp
nf_conntrack_amanda    16384  3 nf_nat_amanda
nf_conntrack_broadcast    16384  2 nf_conntrack_netbios_ns,nf_conntrack_snmp
nf_conntrack_ftp       20480  3 nf_nat_ftp
nf_conntrack_h323      77824  5 nf_nat_h323
nf_conntrack_ipv4      16384  68
nf_conntrack_irc       16384  3 nf_nat_irc
nf_conntrack_netbios_ns    16384  2
nf_conntrack_netlink    40960  0
nf_conntrack_pptp      20480  3 nf_nat_pptp
nf_conntrack_proto_gre    16384  1 nf_conntrack_pptp
nf_conntrack_proto_sctp    20480  0
nf_conntrack_proto_udplite    16384  0
nf_conntrack_sane      16384  2
nf_conntrack_sip       28672  3 nf_nat_sip
nf_conntrack_snmp      16384  3 nf_nat_snmp_basic
nf_conntrack_tftp      16384  3 nf_nat_tftp
nf_defrag_ipv4         16384  1 nf_conntrack_ipv4
nf_log_common          16384  1 nf_log_ipv4
nf_log_ipv4            16384  11
nf_nat                 24576  10 
nf_nat_ftp,nf_nat_irc,nf_nat_sip,nf_nat_amanda,nf_nat_proto_gre,nf_nat_h323,nf_nat_ipv4,nf_nat_pptp,nf_nat_tftp,xt_nat
nf_nat_amanda          16384  0
nf_nat_ftp             16384  0
nf_nat_h323            20480  0
nf_nat_ipv4            16384  1 iptable_nat
nf_nat_irc             16384  0
nf_nat_pptp            16384  0
nf_nat_proto_gre       16384  1 nf_nat_pptp
nf_nat_sip             20480  0
nf_nat_snmp_basic      20480  0
nf_nat_tftp            16384  0
nf_reject_ipv4         16384  1 ipt_REJECT
xt_addrtype            16384  5
xt_comment             16384  57
xt_connmark            16384  3
xt_conntrack           16384  42
xt_CT                  16384  22
xt_LOG                 16384  11
xt_mark                16384  12
xt_multiport           16384  41
xt_nat                 16384  20
xt_NFLOG               16384  0
xt_recent              20480  1
xt_TCPMSS              16384  1
xt_tcpudp              16384  54

Shorewall has detected the following iptables/netfilter capabilities:
   ACCOUNT Target (ACCOUNT_TARGET): Not available
   Address Type Match (ADDRTYPE): Available
   Amanda Helper: Available
   Arptables JF (ARPTABLESJF): Not available
   AUDIT Target (AUDIT_TARGET): Available
   Basic Ematch (BASIC_EMATCH): Available
   Basic Filter (BASIC_FILTER): Available
   Capabilities Version (CAPVERSION): 50004
   Checksum Target (CHECKSUM_TARGET): Available
   CLASSIFY Target (CLASSIFY_TARGET): Available
   Comments (COMMENTS): Available
   Condition Match (CONDITION_MATCH): Not available
   Connection Tracking Match (CONNTRACK_MATCH): Available
   Connlimit Match (CONNLIMIT_MATCH): Available
   Connmark Match (CONNMARK_MATCH): Available
   CONNMARK Target (CONNMARK): Available
   CT Target (CT_TARGET): Available
   DSCP Match (DSCP_MATCH): Available
   DSCP Target (DSCP_TARGET): Available
   Enhanced Multi-port Match (EMULIPORT): Available
   Extended Connection Tracking Match Support (NEW_CONNTRACK_MATCH): Available
   Extended Connmark Match (XCONNMARK_MATCH): Available
   Extended CONNMARK Target (XCONNMARK): Available
   Extended MARK Target 2 (EXMARK): Available
   Extended MARK Target (XMARK): Available
   Extended Multi-port Match (XMULIPORT): Available
   Extended REJECT (ENHANCED_REJECT): Available
   FLOW Classifier (FLOW_FILTER): Available
   FTP-0 Helper: Not available
   FTP Helper: Available
   fwmark route mask (FWMARK_RT_MASK): Available
   Geo IP Match (GEOIP_MATCH): Not available
   Goto Support (GOTO_TARGET): Available
   H323 Helper: Available
   Hashlimit Match (HASHLIMIT_MATCH): Available
   Header Match (HEADER_MATCH): Not available
   Helper Match (HELPER_MATCH): Available
   Iface Match (IFACE_MATCH): Not available
   IMQ Target (IMQ_TARGET): Not available
   IPMARK Target (IPMARK_TARGET): Not available
   IPP2P Match (IPP2P_MATCH): Not available
   IP range Match(IPRANGE_MATCH): Available
   ipset V5 (IPSET_V5): Not available
   iptables -S (IPTABLES_S): Available
   iptables --wait option (WAIT_OPTION): Available
   IRC-0 Helper: Not available
   IRC Helper: Available
   Kernel Version (KERNELVERSION): 40400
   LOGMARK Target (LOGMARK_TARGET): Not available
   LOG Target (LOG_TARGET): Available
   Mangle FORWARD Chain (MANGLE_FORWARD): Available
   Mark in the filter table (MARK_ANYWHERE): Available
   MARK Target (MARK): Available
   MASQUERADE Target (MASQUERADE_TGT): Available
   Multi-port Match (MULTIPORT): Available
   NAT (NAT_ENABLED): Available
   Netbios_ns Helper: Available
   New tos Match (NEW_TOS_MATCH): Available
   NFAcct Match: Not available
   NFLOG Target (NFLOG_TARGET): Available
   NFQUEUE Target (NFQUEUE_TARGET): Available
   Owner Match (OWNER_MATCH): Available
   Owner Name Match (OWNER_NAME_MATCH): Available
   Packet length Match (LENGTH_MATCH): Available
   Packet Mangling (MANGLE_ENABLED): Available
   Packet Type Match (USEPKTTYPE): Available
   Persistent SNAT (PERSISTENT_SNAT): Available
   Physdev-is-bridged Support (PHYSDEV_BRIDGE): Available
   Physdev Match (PHYSDEV_MATCH): Available
   Policy Match (POLICY_MATCH): Available
   PPTP Helper: Available
   Rawpost Table (RAWPOST_TABLE): Not available
   Raw Table (RAW_TABLE): Available
   Realm Match (REALM_MATCH): Available
   Recent Match "--reap" option (REAP_OPTION): Available
   Recent Match (RECENT_MATCH): Available
   Repeat match (KLUDGEFREE): Available
   RPFilter Match (RPFILTER_MATCH): Available
   SANE-0 Helper: Not available
   SANE Helper: Available
   SIP-0 Helper: Not available
   SIP Helper: Available
   SNMP Helper: Available
   Statistic Match (STATISTIC_MATCH): Available
   TARPIT Target (TARPIT_TARGET): Not available
   TCPMSS Match (TCPMSS_MATCH): Available
   TCPMSS Target (TCPMSS_TARGET): Available
   TFTP-0 Helper: Not available
   TFTP Helper: Available
   Time Match (TIME_MATCH): Available
   TPROXY Target (TPROXY_TARGET): Available
   UDPLITE Port Redirection (UDPLITEREDIRECT): Not available
   ULOG Target (ULOG_TARGET): Not available

Netid  State      Recv-Q Send-Q Local Address:Port               Peer 
Address:Port              
udp    UNCONN     0      0         *:5353                  *:*                  
 users:(("avahi-daemon",pid=796,fd=12))
udp    UNCONN     0      0         *:7970                  *:*                  
 users:(("dhcpd",pid=3313,fd=20))
udp    UNCONN     0      0      127.0.1.1:53                    *:*             
      users:(("dnsmasq",pid=1127,fd=4))
udp    UNCONN     0      0         *:67                    *:*                  
 users:(("dhcpd",pid=3313,fd=7))
udp    UNCONN     0      0      10.172.8.122:123                   *:*          
         users:(("ntpd",pid=4056,fd=32))
udp    UNCONN     0      0      192.168.2.254:123                   *:*         
          users:(("ntpd",pid=4056,fd=31))
udp    UNCONN     0      0      192.168.1.40:123                   *:*          
         users:(("ntpd",pid=4056,fd=30))
udp    UNCONN     0      0      192.168.1.39:123                   *:*          
         users:(("ntpd",pid=4056,fd=29))
udp    UNCONN     0      0      192.168.1.38:123                   *:*          
         users:(("ntpd",pid=4056,fd=28))
udp    UNCONN     0      0      192.168.1.37:123                   *:*          
         users:(("ntpd",pid=4056,fd=27))
udp    UNCONN     0      0      192.168.1.36:123                   *:*          
         users:(("ntpd",pid=4056,fd=26))
udp    UNCONN     0      0      192.168.1.35:123                   *:*          
         users:(("ntpd",pid=4056,fd=25))
udp    UNCONN     0      0      192.168.1.34:123                   *:*          
         users:(("ntpd",pid=4056,fd=24))
udp    UNCONN     0      0      192.168.1.33:123                   *:*          
         users:(("ntpd",pid=4056,fd=23))
udp    UNCONN     0      0      192.168.1.32:123                   *:*          
         users:(("ntpd",pid=4056,fd=22))
udp    UNCONN     0      0      192.168.1.31:123                   *:*          
         users:(("ntpd",pid=4056,fd=21))
udp    UNCONN     0      0      192.168.1.30:123                   *:*          
         users:(("ntpd",pid=4056,fd=20))
udp    UNCONN     0      0      192.168.1.2:123                   *:*           
        users:(("ntpd",pid=4056,fd=19))
udp    UNCONN     0      0      127.0.0.1:123                   *:*             
      users:(("ntpd",pid=4056,fd=18))
udp    UNCONN     0      0         *:123                   *:*                  
 users:(("ntpd",pid=4056,fd=17))
udp    UNCONN     0      0      192.168.2.255:137                   *:*         
          users:(("nmbd",pid=2037,fd=68))
udp    UNCONN     0      0      192.168.2.254:137                   *:*         
          users:(("nmbd",pid=2037,fd=67))
udp    UNCONN     0      0      192.168.1.255:137                   *:*         
          users:(("nmbd",pid=2037,fd=63))
udp    UNCONN     0      0      192.168.1.2:137                   *:*           
        users:(("nmbd",pid=2037,fd=62))
udp    UNCONN     0      0      192.168.1.255:137                   *:*         
          users:(("nmbd",pid=2037,fd=59))
udp    UNCONN     0      0      192.168.1.30:137                   *:*          
         users:(("nmbd",pid=2037,fd=58))
udp    UNCONN     0      0      192.168.1.255:137                   *:*         
          users:(("nmbd",pid=2037,fd=55))
udp    UNCONN     0      0      192.168.1.31:137                   *:*          
         users:(("nmbd",pid=2037,fd=54))
udp    UNCONN     0      0      192.168.1.255:137                   *:*         
          users:(("nmbd",pid=2037,fd=51))
udp    UNCONN     0      0      192.168.1.32:137                   *:*          
         users:(("nmbd",pid=2037,fd=50))
udp    UNCONN     0      0      192.168.1.255:137                   *:*         
          users:(("nmbd",pid=2037,fd=47))
udp    UNCONN     0      0      192.168.1.33:137                   *:*          
         users:(("nmbd",pid=2037,fd=46))
udp    UNCONN     0      0      192.168.1.255:137                   *:*         
          users:(("nmbd",pid=2037,fd=43))
udp    UNCONN     0      0      192.168.1.34:137                   *:*          
         users:(("nmbd",pid=2037,fd=42))
udp    UNCONN     0      0      192.168.1.255:137                   *:*         
          users:(("nmbd",pid=2037,fd=39))
udp    UNCONN     0      0      192.168.1.35:137                   *:*          
         users:(("nmbd",pid=2037,fd=38))
udp    UNCONN     0      0      192.168.1.255:137                   *:*         
          users:(("nmbd",pid=2037,fd=35))
udp    UNCONN     0      0      192.168.1.36:137                   *:*          
         users:(("nmbd",pid=2037,fd=34))
udp    UNCONN     0      0      192.168.1.255:137                   *:*         
          users:(("nmbd",pid=2037,fd=31))
udp    UNCONN     0      0      192.168.1.37:137                   *:*          
         users:(("nmbd",pid=2037,fd=30))
udp    UNCONN     0      0      192.168.1.255:137                   *:*         
          users:(("nmbd",pid=2037,fd=27))
udp    UNCONN     0      0      192.168.1.38:137                   *:*          
         users:(("nmbd",pid=2037,fd=26))
udp    UNCONN     0      0      192.168.1.255:137                   *:*         
          users:(("nmbd",pid=2037,fd=23))
udp    UNCONN     0      0      192.168.1.39:137                   *:*          
         users:(("nmbd",pid=2037,fd=22))
udp    UNCONN     0      0      192.168.1.255:137                   *:*         
          users:(("nmbd",pid=2037,fd=19))
udp    UNCONN     0      0      192.168.1.40:137                   *:*          
         users:(("nmbd",pid=2037,fd=18))
udp    UNCONN     0      0         *:137                   *:*                  
 users:(("nmbd",pid=2037,fd=16))
udp    UNCONN     0      0      192.168.2.255:138                   *:*         
          users:(("nmbd",pid=2037,fd=70))
udp    UNCONN     0      0      192.168.2.254:138                   *:*         
          users:(("nmbd",pid=2037,fd=69))
udp    UNCONN     0      0      192.168.1.255:138                   *:*         
          users:(("nmbd",pid=2037,fd=65))
udp    UNCONN     0      0      192.168.1.2:138                   *:*           
        users:(("nmbd",pid=2037,fd=64))
udp    UNCONN     0      0      192.168.1.255:138                   *:*         
          users:(("nmbd",pid=2037,fd=61))
udp    UNCONN     0      0      192.168.1.30:138                   *:*          
         users:(("nmbd",pid=2037,fd=60))
udp    UNCONN     0      0      192.168.1.255:138                   *:*         
          users:(("nmbd",pid=2037,fd=57))
udp    UNCONN     0      0      192.168.1.31:138                   *:*          
         users:(("nmbd",pid=2037,fd=56))
udp    UNCONN     0      0      192.168.1.255:138                   *:*         
          users:(("nmbd",pid=2037,fd=53))
udp    UNCONN     0      0      192.168.1.32:138                   *:*          
         users:(("nmbd",pid=2037,fd=52))
udp    UNCONN     0      0      192.168.1.255:138                   *:*         
          users:(("nmbd",pid=2037,fd=49))
udp    UNCONN     0      0      192.168.1.33:138                   *:*          
         users:(("nmbd",pid=2037,fd=48))
udp    UNCONN     0      0      192.168.1.255:138                   *:*         
          users:(("nmbd",pid=2037,fd=45))
udp    UNCONN     0      0      192.168.1.34:138                   *:*          
         users:(("nmbd",pid=2037,fd=44))
udp    UNCONN     0      0      192.168.1.255:138                   *:*         
          users:(("nmbd",pid=2037,fd=41))
udp    UNCONN     0      0      192.168.1.35:138                   *:*          
         users:(("nmbd",pid=2037,fd=40))
udp    UNCONN     0      0      192.168.1.255:138                   *:*         
          users:(("nmbd",pid=2037,fd=37))
udp    UNCONN     0      0      192.168.1.36:138                   *:*          
         users:(("nmbd",pid=2037,fd=36))
udp    UNCONN     0      0      192.168.1.255:138                   *:*         
          users:(("nmbd",pid=2037,fd=33))
udp    UNCONN     0      0      192.168.1.37:138                   *:*          
         users:(("nmbd",pid=2037,fd=32))
udp    UNCONN     0      0      192.168.1.255:138                   *:*         
          users:(("nmbd",pid=2037,fd=29))
udp    UNCONN     0      0      192.168.1.38:138                   *:*          
         users:(("nmbd",pid=2037,fd=28))
udp    UNCONN     0      0      192.168.1.255:138                   *:*         
          users:(("nmbd",pid=2037,fd=25))
udp    UNCONN     0      0      192.168.1.39:138                   *:*          
         users:(("nmbd",pid=2037,fd=24))
udp    UNCONN     0      0      192.168.1.255:138                   *:*         
          users:(("nmbd",pid=2037,fd=21))
udp    UNCONN     0      0      192.168.1.40:138                   *:*          
         users:(("nmbd",pid=2037,fd=20))
udp    UNCONN     0      0         *:138                   *:*                  
 users:(("nmbd",pid=2037,fd=17))
udp    UNCONN     0      0         *:49519                 *:*                  
 users:(("avahi-daemon",pid=796,fd=14))
udp    UNCONN     0      0         *:631                   *:*                  
 users:(("cups-browsed",pid=928,fd=8))
tcp    LISTEN     0      50        *:139                   *:*                  
 users:(("smbd",pid=2060,fd=37))
tcp    LISTEN     0      5      127.0.1.1:53                    *:*             
      users:(("dnsmasq",pid=1127,fd=5))
tcp    LISTEN     0      128       *:22                    *:*                  
 users:(("sshd",pid=1048,fd=3))
tcp    LISTEN     0      50        *:445                   *:*                  
 users:(("smbd",pid=2060,fd=36))
tcp    ESTAB      0      0      192.168.2.254:52300              192.168.2.3:22 
                 users:(("ssh",pid=3341,fd=3))
tcp    ESTAB      16     0      127.0.0.1:57976              127.0.1.1:139      
           users:(("gvfsd-smb-brows",pid=3566,fd=13))
tcp    ESTAB      0      0      127.0.1.1:139                127.0.0.1:57976    
           users:(("smbd",pid=3586,fd=38))
tcp    ESTAB      0      0      127.0.1.1:139                127.0.0.1:57978    
           users:(("smbd",pid=3592,fd=38))
tcp    ESTAB      16     0      127.0.0.1:57978              127.0.1.1:139      
           users:(("gvfsd-smb-brows",pid=3566,fd=15))

Traffic Control

Device lo:
qdisc noqueue 0: root refcnt 2 
 Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 


Device eno1:
qdisc pfifo_fast 0: root refcnt 2 bands 3 priomap  1 2 2 2 1 2 0 0 1 1 1 1 1 1 
1 1
 Sent 584835 bytes 5986 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 


Device enx00e04c534458:
qdisc pfifo_fast 0: root refcnt 2 bands 3 priomap  1 2 2 2 1 2 0 0 1 1 1 1 1 1 
1 1
 Sent 57992 bytes 580 pkt (dropped 0, overlimits 0 requeues 1) 
 backlog 0b 0p requeues 1 


Device ppp0:
qdisc pfifo_fast 0: root refcnt 2 bands 3 priomap  1 2 2 2 1 2 0 0 1 1 1 1 1 1 
1 1
 Sent 4740 bytes 79 pkt (dropped 0, overlimits 0 requeues 0) 
 backlog 0b 0p requeues 0 



TC Filters

Device lo:

Device eno1:

Device enx00e04c534458:

Device ppp0:

------------------------------------------------------------------------------
Developer Access Program for Intel Xeon Phi Processors
Access to Intel Xeon Phi processor-based developer platforms.
With one year of Intel Parallel Studio XE.
Training and support from Colfax.
Order your platform today. http://sdm.link/xeonphi
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to