Hi Roberto,
here is the output:

[BEGIN]

Shorewall 5.0.4 Dump at firewall.local - Do 11. Mai 21:15:07 CEST 2017

Shorewall is running
State:Started (Mi 10. Mai 22:51:44 CEST 2017) from /etc/shorewall/
(/var/lib/shorewall/firewall compiled by Shorewall version 5.0.4)

Counters reset Mi 10. Mai 22:51:44 CEST 2017

Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination
10315 5139K net-fw     all  --  eth1   *       0.0.0.0/0            0.0.0.0/0
11466 1102K loc-fw     all  --  eth0   *       0.0.0.0/0            0.0.0.0/0
  294 48707 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 LOG        all  --  *      *       0.0.0.0/0
0.0.0.0/0            LOG flags 0 level 6 prefix
"Shorewall:INPUT:REJECT:"
    0     0 reject     all  --  *      *       0.0.0.0/0
0.0.0.0/0           [goto]

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination
37120 8452K net_frwd   all  --  eth1   *       0.0.0.0/0            0.0.0.0/0
34460 5107K loc_frwd   all  --  eth0   *       0.0.0.0/0            0.0.0.0/0
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 LOG        all  --  *      *       0.0.0.0/0
0.0.0.0/0            LOG flags 0 level 6 prefix
"Shorewall:FORWARD:REJECT:"
    0     0 reject     all  --  *      *       0.0.0.0/0
0.0.0.0/0           [goto]

Chain OUTPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination
10464  779K fw-net     all  --  *      eth1    0.0.0.0/0            0.0.0.0/0
 8939 2999K fw-loc     all  --  *      eth0    0.0.0.0/0            0.0.0.0/0
  294 48707 ACCEPT     all  --  *      lo      0.0.0.0/0            0.0.0.0/0
    0     0 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 LOG        all  --  *      *       0.0.0.0/0
0.0.0.0/0            LOG flags 0 level 6 prefix
"Shorewall:OUTPUT:REJECT:"
    0     0 reject     all  --  *      *       0.0.0.0/0
0.0.0.0/0           [goto]

Chain Broadcast (2 references)
 pkts bytes target     prot opt in     out     source               destination
 1367  416K DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0            ADDRTYPE match dst-type BROADCAST
  647 23308 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0            ADDRTYPE match dst-type MULTICAST
    0     0 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0            ADDRTYPE match dst-type ANYCAST

Chain Drop (2 references)
 pkts bytes target     prot opt in     out     source               destination
    2  1070            all  --  *      *       0.0.0.0/0            0.0.0.0/0
    2  1070 Broadcast  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0            icmptype 3 code 4 /* Needed ICMP types */
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0            icmptype 11 /* Needed ICMP types */
    0     0 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate INVALID
    0     0 DROP       udp  --  *      *       0.0.0.0/0
0.0.0.0/0            multiport dports 135,445 /* SMB */
    0     0 DROP       udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpts:137:139 /* SMB */
    0     0 DROP       udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp spt:137 dpts:1024:65535 /* SMB */
    0     0 DROP       tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            multiport dports 135,139,445 /* SMB */
    0     0 DROP       udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:1900 /* UPnP */
    2  1070 DROP       tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp flags:!0x17/0x02
    0     0 DROP       udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp spt:53 /* Late DNS Replies */

Chain Reject (6 references)
 pkts bytes target     prot opt in     out     source               destination
 2201  476K            all  --  *      *       0.0.0.0/0            0.0.0.0/0
 2201  476K Broadcast  all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0            icmptype 3 code 4 /* Needed ICMP types */
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0            icmptype 11 /* Needed ICMP types */
   13  4628 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate INVALID
    0     0 reject     udp  --  *      *       0.0.0.0/0
0.0.0.0/0            multiport dports 135,445 /* SMB */
    0     0 reject     udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpts:137:139 /* SMB */
    0     0 reject     udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp spt:137 dpts:1024:65535 /* SMB */
    0     0 reject     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            multiport dports 135,139,445 /* SMB */
    0     0 DROP       udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:1900 /* UPnP */
    0     0 DROP       tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp flags:!0x17/0x02
    0     0 DROP       udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp spt:53 /* Late DNS Replies */

Chain dynamic (4 references)
 pkts bytes target     prot opt in     out     source               destination

Chain fw-loc (1 references)
 pkts bytes target     prot opt in     out     source               destination
 8881 2983K ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate RELATED,ESTABLISHED
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:123 /* NTP */
    9   432 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0
   49 16072 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0
   49 16072 LOG        all  --  *      *       0.0.0.0/0
0.0.0.0/0            LOG flags 0 level 6 prefix
"Shorewall:fw-loc:REJECT:"
   49 16072 reject     all  --  *      *       0.0.0.0/0
0.0.0.0/0           [goto]

Chain fw-net (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpts:67:68
  124 15080 ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate RELATED,ESTABLISHED
10228  757K ACCEPT     udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:53 /* DNS */
    3   180 ACCEPT     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp dpt:53 /* DNS */
   30  2280 ACCEPT     udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:123 /* NTP */
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0
   79  4740 Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0
   79  4740 LOG        all  --  *      *       0.0.0.0/0
0.0.0.0/0            LOG flags 0 level 6 prefix
"Shorewall:fw-net:REJECT:"
   79  4740 reject     all  --  *      *       0.0.0.0/0
0.0.0.0/0           [goto]

Chain loc-fw (1 references)
 pkts bytes target     prot opt in     out     source               destination
 8418  871K dynamic    all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate INVALID,NEW,UNTRACKED
 8418  871K smurfs     all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate INVALID,NEW,UNTRACKED
 2599  194K tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0
 3048  231K ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate RELATED,ESTABLISHED
 6208  407K ACCEPT     udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:53 /* DNS */
  110  6608 ACCEPT     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp dpt:53 /* DNS */
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:123 /* NTP */
    1    64 ACCEPT     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp dpt:22 /* SSH */
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0            icmptype 8 /* Ping */
 2073  455K Reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0
   46 11338 LOG        all  --  *      *       0.0.0.0/0
0.0.0.0/0            LOG flags 0 level 6 prefix
"Shorewall:loc-fw:REJECT:"
   46 11338 reject     all  --  *      *       0.0.0.0/0
0.0.0.0/0           [goto]

Chain loc-net (1 references)
 pkts bytes target     prot opt in     out     source               destination
11685 3316K ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate RELATED,ESTABLISHED
21402 1627K ACCEPT     udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:123 /* NTP */
 1373  164K ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain loc_frwd (1 references)
 pkts bytes target     prot opt in     out     source               destination
22775 1791K dynamic    all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate INVALID,NEW,UNTRACKED
22775 1791K smurfs     all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate INVALID,NEW,UNTRACKED
12488 3369K tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0
34460 5107K loc-net    all  --  *      eth1    0.0.0.0/0            0.0.0.0/0

Chain logdrop (0 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain logflags (7 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 LOG        all  --  *      *       0.0.0.0/0
0.0.0.0/0            LOG flags 4 level 6 prefix
"Shorewall:logflags:DROP:"
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain logreject (0 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain net-fw (1 references)
 pkts bytes target     prot opt in     out     source               destination
   43 11409 dynamic    all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate INVALID,NEW,UNTRACKED
   43 11409 smurfs     all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate INVALID,NEW,UNTRACKED
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpts:67:68
   60 16633 tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0
10272 5128K ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate RELATED,ESTABLISHED
   41 10339 DROP       tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate INVALID
    0     0 DROP       icmp --  *      *       0.0.0.0/0
0.0.0.0/0            icmptype 8 /* Ping */
    2  1070 Drop       all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 LOG        all  --  *      *       0.0.0.0/0
0.0.0.0/0            LOG flags 0 level 6 prefix
"Shorewall:net-fw:DROP:"
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain net-loc (1 references)
 pkts bytes target     prot opt in     out     source               destination
37120 8452K ACCEPT     all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate RELATED,ESTABLISHED
    0     0 DROP       tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate INVALID
    0     0 Drop       all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 LOG        all  --  *      *       0.0.0.0/0
0.0.0.0/0            LOG flags 0 level 6 prefix
"Shorewall:net-loc:DROP:"
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain net_frwd (1 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 dynamic    all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate INVALID,NEW,UNTRACKED
    0     0 smurfs     all  --  *      *       0.0.0.0/0
0.0.0.0/0            ctstate INVALID,NEW,UNTRACKED
15148 7222K tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0
37120 8452K net-loc    all  --  *      eth0    0.0.0.0/0            0.0.0.0/0

Chain reject (11 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0            ADDRTYPE match src-type BROADCAST
    0     0 DROP       all  --  *      *       224.0.0.0/4          0.0.0.0/0
    0     0 DROP       2    --  *      *       0.0.0.0/0            0.0.0.0/0
  100  6000 REJECT     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            reject-with tcp-reset
   74 26150 REJECT     udp  --  *      *       0.0.0.0/0
0.0.0.0/0            reject-with icmp-port-unreachable
    0     0 REJECT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0            reject-with icmp-host-unreachable
    0     0 REJECT     all  --  *      *       0.0.0.0/0
0.0.0.0/0            reject-with icmp-host-prohibited

Chain sha-lh-56f47107bc14542ec8d0 (0 references)
 pkts bytes target     prot opt in     out     source               destination

Chain sha-rh-3bcc28f05bfb8988e4cb (0 references)
 pkts bytes target     prot opt in     out     source               destination

Chain shorewall (0 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0            all  --  *      *       0.0.0.0/0
0.0.0.0/0            recent: SET name: %CURRENTTIME side: source mask:
255.255.255.255

Chain smurflog (2 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 LOG        all  --  *      *       0.0.0.0/0
0.0.0.0/0            LOG flags 0 level 6 prefix
"Shorewall:smurfs:DROP:"
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain smurfs (4 references)
 pkts bytes target     prot opt in     out     source               destination
 1038  352K RETURN     all  --  *      *       0.0.0.0              0.0.0.0/0
    0     0 smurflog   all  --  *      *       0.0.0.0/0
0.0.0.0/0           [goto]  ADDRTYPE match src-type BROADCAST
    0     0 smurflog   all  --  *      *       224.0.0.0/4
0.0.0.0/0           [goto]

Chain tcpflags (4 references)
 pkts bytes target     prot opt in     out     source               destination
    0     0 logflags   tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           [goto]  tcp flags:0x3F/0x29
    0     0 logflags   tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           [goto]  tcp flags:0x3F/0x00
    0     0 logflags   tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           [goto]  tcp flags:0x06/0x06
    0     0 logflags   tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           [goto]  tcp flags:0x05/0x05
    0     0 logflags   tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           [goto]  tcp flags:0x03/0x03
    0     0 logflags   tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           [goto]  tcp flags:0x19/0x09
    0     0 logflags   tcp  --  *      *       0.0.0.0/0
0.0.0.0/0           [goto]  tcp spt:0 flags:0x17/0x02

Log (/var/log/syslog)

May 11 18:33:00 fw-net:REJECT:IN= OUT=eth1 SRC=192.168.10.2
DST=54.230.202.47 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=44427 DF
PROTO=TCP SPT=50849 DPT=443 WINDOW=14600 RES=0x00 SYN URGP=0
May 11 18:33:00 fw-net:REJECT:IN= OUT=eth1 SRC=192.168.10.2
DST=54.230.202.243 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=52383 DF
PROTO=TCP SPT=43606 DPT=443 WINDOW=14600 RES=0x00 SYN URGP=0
May 11 18:33:00 fw-net:REJECT:IN= OUT=eth1 SRC=192.168.10.2
DST=54.230.202.143 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=14278 DF
PROTO=TCP SPT=48615 DPT=443 WINDOW=14600 RES=0x00 SYN URGP=0
May 11 19:39:53 loc-fw:REJECT:IN=eth0 OUT= SRC=192.168.0.200
DST=192.168.0.1 LEN=308 TOS=0x00 PREC=0x00 TTL=64 ID=45542 DF
PROTO=UDP SPT=68 DPT=67 LEN=288
May 11 19:39:53 fw-loc:REJECT:IN= OUT=eth0 SRC=192.168.0.1
DST=192.168.0.200 LEN=328 TOS=0x00 PREC=0x00 TTL=64 ID=41322 DF
PROTO=UDP SPT=67 DPT=68 LEN=308
May 11 20:40:01 loc-fw:REJECT:IN=eth0 OUT= SRC=192.168.0.2
DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=48281 DF PROTO=TCP
SPT=34740 DPT=80 WINDOW=14600 RES=0x00 SYN URGP=0
May 11 20:46:13 loc-fw:REJECT:IN=eth0 OUT= SRC=192.168.0.2
DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=22982 DF PROTO=TCP
SPT=39418 DPT=80 WINDOW=14600 RES=0x00 SYN URGP=0
May 11 20:50:16 loc-fw:REJECT:IN=eth0 OUT= SRC=192.168.0.2
DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=12329 DF PROTO=TCP
SPT=52565 DPT=80 WINDOW=14600 RES=0x00 SYN URGP=0
May 11 20:56:11 loc-fw:REJECT:IN=eth0 OUT= SRC=192.168.0.2
DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=50098 DF PROTO=TCP
SPT=55808 DPT=80 WINDOW=14600 RES=0x00 SYN URGP=0
May 11 20:59:21 loc-fw:REJECT:IN=eth0 OUT= SRC=192.168.0.29
DST=192.168.0.1 LEN=358 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP
SPT=68 DPT=67 LEN=338
May 11 20:59:24 loc-fw:REJECT:IN=eth0 OUT= SRC=192.168.0.29
DST=192.168.0.1 LEN=337 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP
SPT=68 DPT=67 LEN=317
May 11 20:59:33 loc-fw:REJECT:IN=eth0 OUT= SRC=192.168.0.29
DST=192.168.0.1 LEN=337 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP
SPT=68 DPT=67 LEN=317
May 11 20:59:48 loc-fw:REJECT:IN=eth0 OUT= SRC=192.168.0.29
DST=192.168.0.1 LEN=337 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP
SPT=68 DPT=67 LEN=317
May 11 21:05:16 loc-fw:REJECT:IN=eth0 OUT= SRC=192.168.0.2
DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=10238 DF PROTO=TCP
SPT=52080 DPT=80 WINDOW=14600 RES=0x00 SYN URGP=0
May 11 21:07:08 fw-net:REJECT:IN= OUT=eth1 SRC=192.168.10.2
DST=216.34.181.97 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=35699 DF
PROTO=TCP SPT=55846 DPT=80 WINDOW=14600 RES=0x00 SYN URGP=0
May 11 21:07:12 fw-net:REJECT:IN= OUT=eth1 SRC=192.168.10.2
DST=216.34.181.97 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=4015 DF
PROTO=TCP SPT=55847 DPT=80 WINDOW=14600 RES=0x00 SYN URGP=0
May 11 21:08:32 fw-net:REJECT:IN= OUT=eth1 SRC=192.168.10.2
DST=216.34.181.97 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=12115 DF
PROTO=TCP SPT=55848 DPT=80 WINDOW=14600 RES=0x00 SYN URGP=0
May 11 21:11:16 loc-fw:REJECT:IN=eth0 OUT= SRC=192.168.0.2
DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=31011 DF PROTO=TCP
SPT=60185 DPT=80 WINDOW=14600 RES=0x00 SYN URGP=0
May 11 21:12:07 fw-net:REJECT:IN= OUT=eth1 SRC=192.168.10.2
DST=216.34.181.97 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=8334 DF
PROTO=TCP SPT=55849 DPT=80 WINDOW=14600 RES=0x00 SYN URGP=0
May 11 21:14:14 fw-net:REJECT:IN= OUT=eth1 SRC=192.168.10.2
DST=216.34.181.97 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=63123 DF
PROTO=TCP SPT=55850 DPT=80 WINDOW=14600 RES=0x00 SYN URGP=0

NAT Table

Chain PREROUTING (policy ACCEPT 42 packets, 2873 bytes)
 pkts bytes target     prot opt in     out     source               destination

Chain INPUT (policy ACCEPT 35 packets, 2405 bytes)
 pkts bytes target     prot opt in     out     source               destination

Chain OUTPUT (policy ACCEPT 58 packets, 4302 bytes)
 pkts bytes target     prot opt in     out     source               destination

Chain POSTROUTING (policy ACCEPT 58 packets, 4282 bytes)
 pkts bytes target     prot opt in     out     source               destination
32392 2446K eth1_masq  all  --  *      eth1    0.0.0.0/0            0.0.0.0/0

Chain eth1_masq (1 references)
 pkts bytes target     prot opt in     out     source               destination
22131 1687K MASQUERADE  all  --  *      *       192.168.0.0/24      0.0.0.0/0

Mangle Table

Chain PREROUTING (policy ACCEPT 182 packets, 35439 bytes)
 pkts bytes target     prot opt in     out     source               destination
93657   20M tcpre      all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain INPUT (policy ACCEPT 182 packets, 35439 bytes)
 pkts bytes target     prot opt in     out     source               destination
22075 6290K tcin       all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination
71580   14M MARK       all  --  *      *       0.0.0.0/0
0.0.0.0/0            MARK and 0xffffff00
71580   14M tcfor      all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain OUTPUT (policy ACCEPT 153 packets, 33729 bytes)
 pkts bytes target     prot opt in     out     source               destination
19697 3827K tcout      all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain POSTROUTING (policy ACCEPT 152 packets, 33669 bytes)
 pkts bytes target     prot opt in     out     source               destination
91149   17M tcpost     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain tcfor (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain tcin (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain tcout (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain tcpost (1 references)
 pkts bytes target     prot opt in     out     source               destination

Chain tcpre (1 references)
 pkts bytes target     prot opt in     out     source               destination

Raw Table

Chain PREROUTING (policy ACCEPT 182 packets, 35439 bytes)
 pkts bytes target     prot opt in     out     source               destination
    0     0 CT         udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:10080 CT helper amanda
    0     0 CT         tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp dpt:21 CT helper ftp
    0     0 CT         udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:1719 CT helper RAS
    0     0 CT         tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp dpt:1720 CT helper Q.931
    0     0 CT         tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp dpt:6667 CT helper irc
   46  4146 CT         udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:137 CT helper netbios-ns
    0     0 CT         tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp dpt:1723 CT helper pptp
    0     0 CT         tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp dpt:6566 CT helper sane
    0     0 CT         udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:5060 CT helper sip
    0     0 CT         udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:161 CT helper snmp
    0     0 CT         udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:69 CT helper tftp

Chain OUTPUT (policy ACCEPT 153 packets, 33729 bytes)
 pkts bytes target     prot opt in     out     source               destination
    0     0 CT         udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:10080 CT helper amanda
    0     0 CT         tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp dpt:21 CT helper ftp
    0     0 CT         udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:1719 CT helper RAS
    0     0 CT         tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp dpt:1720 CT helper Q.931
    0     0 CT         tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp dpt:6667 CT helper irc
    0     0 CT         udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:137 CT helper netbios-ns
    0     0 CT         tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp dpt:1723 CT helper pptp
    0     0 CT         tcp  --  *      *       0.0.0.0/0
0.0.0.0/0            tcp dpt:6566 CT helper sane
    0     0 CT         udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:5060 CT helper sip
    0     0 CT         udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:161 CT helper snmp
    0     0 CT         udp  --  *      *       0.0.0.0/0
0.0.0.0/0            udp dpt:69 CT helper tftp

Conntrack Table (64 out of 65536)

udp      17 25 src=192.168.10.2 dst=192.168.10.1 sport=56640 dport=53
src=192.168.10.1 dst=192.168.10.2 sport=53 dport=56640 mark=0 use=2
tcp      6 379466 ESTABLISHED src=192.168.0.100 dst=80.241.60.199
sport=57425 dport=143 src=80.241.60.199 dst=192.168.10.2 sport=143
dport=57425 [ASSURED] mark=0 use=2
tcp      6 344554 ESTABLISHED src=192.168.0.27 dst=176.32.99.148
sport=53014 dport=443 src=176.32.99.148 dst=192.168.10.2 sport=443
dport=53014 [ASSURED] mark=0 use=2
udp      17 175 src=192.168.0.25 dst=192.168.0.1 sport=55525 dport=53
src=192.168.0.1 dst=192.168.0.25 sport=53 dport=55525 [ASSURED] mark=0
use=2
udp      17 25 src=192.168.10.2 dst=192.168.10.1 sport=43081 dport=53
src=192.168.10.1 dst=192.168.10.2 sport=53 dport=43081 mark=0 use=2
udp      17 25 src=192.168.10.2 dst=192.168.10.1 sport=47967 dport=53
src=192.168.10.1 dst=192.168.10.2 sport=53 dport=47967 mark=0 use=2
udp      17 25 src=192.168.0.25 dst=192.168.0.1 sport=59015 dport=53
src=192.168.0.1 dst=192.168.0.25 sport=53 dport=59015 mark=0 use=2
udp      17 11 src=192.168.0.25 dst=192.168.0.1 sport=54470 dport=53
src=192.168.0.1 dst=192.168.0.25 sport=53 dport=54470 [ASSURED] mark=0
use=2
tcp      6 431999 ESTABLISHED src=192.168.0.25 dst=192.168.0.1
sport=62858 dport=22 src=192.168.0.1 dst=192.168.0.25 sport=22
dport=62858 [ASSURED] mark=0 use=2
udp      17 25 src=192.168.10.2 dst=192.168.10.1 sport=35438 dport=53
src=192.168.10.1 dst=192.168.10.2 sport=53 dport=35438 mark=0 use=2
tcp      6 347110 ESTABLISHED src=192.168.0.29 dst=54.229.136.60
sport=53085 dport=443 src=54.229.136.60 dst=192.168.10.2 sport=443
dport=53085 [ASSURED] mark=0 use=2
tcp      6 347195 ESTABLISHED src=192.168.0.29 dst=74.125.30.188
sport=34775 dport=443 src=74.125.30.188 dst=192.168.10.2 sport=443
dport=34775 [ASSURED] mark=0 use=2
udp      17 25 src=192.168.10.2 dst=192.168.10.1 sport=37442 dport=53
src=192.168.10.1 dst=192.168.10.2 sport=53 dport=37442 mark=0 use=2
tcp      6 344125 ESTABLISHED src=192.168.0.27 dst=205.251.243.55
sport=53757 dport=443 src=205.251.243.55 dst=192.168.10.2 sport=443
dport=53757 [ASSURED] mark=0 use=2
tcp      6 431035 ESTABLISHED src=192.168.0.34 dst=74.125.28.188
sport=36703 dport=443 src=74.125.28.188 dst=192.168.10.2 sport=443
dport=36703 [ASSURED] mark=0 use=2
udp      17 15 src=192.168.0.25 dst=192.168.0.1 sport=54457 dport=53
src=192.168.0.1 dst=192.168.0.25 sport=53 dport=54457 mark=0 use=2
udp      17 15 src=192.168.10.2 dst=192.168.10.1 sport=49804 dport=53
src=192.168.10.1 dst=192.168.10.2 sport=53 dport=49804 mark=0 use=2
udp      17 25 src=192.168.10.2 dst=192.168.10.1 sport=50744 dport=53
src=192.168.10.1 dst=192.168.10.2 sport=53 dport=50744 mark=0 use=2
tcp      6 431443 ESTABLISHED src=192.168.0.34 dst=52.17.53.193
sport=38222 dport=80 src=52.17.53.193 dst=192.168.10.2 sport=80
dport=38222 [ASSURED] mark=0 use=2
udp      17 25 src=192.168.10.2 dst=192.168.10.1 sport=49265 dport=53
src=192.168.10.1 dst=192.168.10.2 sport=53 dport=49265 mark=0 use=2
tcp      6 347110 ESTABLISHED src=192.168.0.29 dst=54.229.136.60
sport=53580 dport=443 src=54.229.136.60 dst=192.168.10.2 sport=443
dport=53580 [ASSURED] mark=0 use=2
udp      17 25 src=192.168.10.2 dst=192.168.10.1 sport=46188 dport=53
src=192.168.10.1 dst=192.168.10.2 sport=53 dport=46188 mark=0 use=2
udp      17 25 src=192.168.10.2 dst=192.168.10.1 sport=48070 dport=53
src=192.168.10.1 dst=192.168.10.2 sport=53 dport=48070 mark=0 use=2
udp      17 25 src=192.168.0.25 dst=192.168.0.1 sport=64830 dport=53
src=192.168.0.1 dst=192.168.0.25 sport=53 dport=64830 mark=0 use=2
tcp      6 347110 ESTABLISHED src=192.168.0.29 dst=54.229.136.60
sport=49771 dport=443 src=54.229.136.60 dst=192.168.10.2 sport=443
dport=49771 [ASSURED] mark=0 use=2
udp      17 25 src=192.168.10.2 dst=192.168.10.1 sport=33822 dport=53
src=192.168.10.1 dst=192.168.10.2 sport=53 dport=33822 mark=0 use=2
tcp      6 347110 ESTABLISHED src=192.168.0.29 dst=54.229.136.60
sport=48582 dport=443 src=54.229.136.60 dst=192.168.10.2 sport=443
dport=48582 [ASSURED] mark=0 use=2
tcp      6 337954 ESTABLISHED src=192.168.0.100 dst=17.252.92.9
sport=55771 dport=443 src=17.252.92.9 dst=192.168.10.2 sport=443
dport=55771 [ASSURED] mark=0 use=2
udp      17 175 src=192.168.0.25 dst=192.168.0.1 sport=59133 dport=53
src=192.168.0.1 dst=192.168.0.25 sport=53 dport=59133 [ASSURED] mark=0
use=2
tcp      6 384794 ESTABLISHED src=192.168.0.25 dst=17.252.28.72
sport=59406 dport=443 src=17.252.28.72 dst=192.168.10.2 sport=443
dport=59406 [ASSURED] mark=0 use=2
udp      17 15 src=192.168.10.2 dst=192.168.10.1 sport=43775 dport=53
src=192.168.10.1 dst=192.168.10.2 sport=53 dport=43775 mark=0 use=2
udp      17 25 src=192.168.10.2 dst=192.168.10.1 sport=40223 dport=53
src=192.168.10.1 dst=192.168.10.2 sport=53 dport=40223 mark=0 use=2
udp      17 25 src=192.168.10.2 dst=192.168.10.1 sport=47970 dport=53
src=192.168.10.1 dst=192.168.10.2 sport=53 dport=47970 mark=0 use=2
udp      17 25 src=192.168.0.25 dst=192.168.0.1 sport=59175 dport=53
src=192.168.0.1 dst=192.168.0.25 sport=53 dport=59175 mark=0 use=2
udp      17 25 src=192.168.0.25 dst=192.168.0.1 sport=53310 dport=53
src=192.168.0.1 dst=192.168.0.25 sport=53 dport=53310 mark=0 use=2
udp      17 25 src=192.168.10.2 dst=192.168.10.1 sport=43720 dport=53
src=192.168.10.1 dst=192.168.10.2 sport=53 dport=43720 mark=0 use=2
udp      17 17 src=192.168.0.200 dst=192.168.0.1 sport=51744 dport=53
src=192.168.0.1 dst=192.168.0.200 sport=53 dport=51744 mark=0 use=2
udp      17 25 src=192.168.10.2 dst=192.168.10.1 sport=44149 dport=53
src=192.168.10.1 dst=192.168.10.2 sport=53 dport=44149 mark=0 use=2
udp      17 25 src=192.168.10.2 dst=192.168.10.1 sport=54570 dport=53
src=192.168.10.1 dst=192.168.10.2 sport=53 dport=54570 mark=0 use=2
udp      17 15 src=192.168.0.25 dst=192.168.0.1 sport=50224 dport=53
src=192.168.0.1 dst=192.168.0.25 sport=53 dport=50224 mark=0 use=2
tcp      6 344641 ESTABLISHED src=192.168.0.24 dst=151.101.114.2
sport=53153 dport=443 src=151.101.114.2 dst=192.168.10.2 sport=443
dport=53153 [ASSURED] mark=0 use=2

IP Configuration

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN
group default
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast
state UP group default qlen 1000
    inet 192.168.0.1/24 brd 192.168.0.255 scope global eth0
       valid_lft forever preferred_lft forever
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast
state UP group default qlen 1000
    inet 192.168.10.2/24 brd 192.168.10.255 scope global eth1
       valid_lft forever preferred_lft forever
4: docker0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue
state DOWN group default
    inet 172.17.0.1/16 scope global docker0
       valid_lft forever preferred_lft forever

IP Stats

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN
mode DEFAULT group default
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    RX: bytes  packets  errors  dropped overrun mcast
    233080     1424     0       0       0       0
    TX: bytes  packets  errors  dropped carrier collsns
    233080     1424     0       0       0       0
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast
state UP mode DEFAULT group default qlen 1000
    link/ether 00:1e:06:30:75:12 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast
    60866237   658062   0       0       0       0
    TX: bytes  packets  errors  dropped carrier collsns
    350004207  663857   0       0       0       0
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast
state UP mode DEFAULT group default qlen 1000
    link/ether 00:24:9b:0c:e9:8a brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast
    500457337  800710   0       0       0       0
    TX: bytes  packets  errors  dropped carrier collsns
    60194874   612778   0       0       0       0
4: docker0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue
state DOWN mode DEFAULT group default
    link/ether 02:42:81:b2:45:34 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast
    0          0        0       0       0       0
    TX: bytes  packets  errors  dropped carrier collsns
    0          0        0       0       0       0

Routing Rules

0: from all lookup local
32766: from all lookup main
32767: from all lookup default

Table default:


Table local:

local 192.168.0.1 dev eth0 proto kernel scope host src 192.168.0.1
local 192.168.10.2 dev eth1 proto kernel scope host src 192.168.10.2
local 172.17.0.1 dev docker0 proto kernel scope host src 172.17.0.1
local 127.0.0.1 dev lo proto kernel scope host src 127.0.0.1
broadcast 192.168.0.255 dev eth0 proto kernel scope link src 192.168.0.1
broadcast 192.168.0.0 dev eth0 proto kernel scope link src 192.168.0.1
broadcast 192.168.10.255 dev eth1 proto kernel scope link src 192.168.10.2
broadcast 192.168.10.0 dev eth1 proto kernel scope link src 192.168.10.2
broadcast 172.17.255.255 dev docker0 proto kernel scope link src 172.17.0.1
broadcast 172.17.0.0 dev docker0 proto kernel scope link src 172.17.0.1
broadcast 127.255.255.255 dev lo proto kernel scope link src 127.0.0.1
broadcast 127.0.0.0 dev lo proto kernel scope link src 127.0.0.1
local 127.0.0.0/8 dev lo proto kernel scope host src 127.0.0.1

Table main:

192.168.0.0/24 dev eth0 proto kernel scope link src 192.168.0.1
192.168.10.0/24 dev eth1 proto kernel scope link src 192.168.10.2
172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.0.1
default via 192.168.10.1 dev eth1 onlink

Per-IP Counters

   iptaccount is not installed

NF Accounting

No NF Accounting defined (nfacct not found)

Events


/proc

   /proc/version = Linux version 3.10.105-138
(root@1604_builder_armhf) (gcc version 4.9.4 (Ubuntu/Linaro
4.9.4-2ubuntu1~16.04) ) #1 SMP PREEMPT Fri Apr 7 12:40:29 UTC 2017
   /proc/sys/net/ipv4/ip_forward = 1
   /proc/sys/net/ipv4/icmp_echo_ignore_all = 0
   /proc/sys/net/ipv4/conf/all/proxy_arp = 0
   /proc/sys/net/ipv4/conf/all/arp_filter = 0
   /proc/sys/net/ipv4/conf/all/arp_ignore = 0
   /proc/sys/net/ipv4/conf/all/rp_filter = 1
   /proc/sys/net/ipv4/conf/all/log_martians = 0
   /proc/sys/net/ipv4/conf/default/proxy_arp = 0
   /proc/sys/net/ipv4/conf/default/arp_filter = 0
   /proc/sys/net/ipv4/conf/default/arp_ignore = 0
   /proc/sys/net/ipv4/conf/default/rp_filter = 1
   /proc/sys/net/ipv4/conf/default/log_martians = 1
   /proc/sys/net/ipv4/conf/docker0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/docker0/arp_filter = 0
   /proc/sys/net/ipv4/conf/docker0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/docker0/rp_filter = 1
   /proc/sys/net/ipv4/conf/docker0/log_martians = 1
   /proc/sys/net/ipv4/conf/eth0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/eth0/arp_filter = 0
   /proc/sys/net/ipv4/conf/eth0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/eth0/rp_filter = 1
   /proc/sys/net/ipv4/conf/eth0/log_martians = 1
   /proc/sys/net/ipv4/conf/eth1/proxy_arp = 0
   /proc/sys/net/ipv4/conf/eth1/arp_filter = 0
   /proc/sys/net/ipv4/conf/eth1/arp_ignore = 0
   /proc/sys/net/ipv4/conf/eth1/rp_filter = 1
   /proc/sys/net/ipv4/conf/eth1/log_martians = 1
   /proc/sys/net/ipv4/conf/lo/proxy_arp = 0
   /proc/sys/net/ipv4/conf/lo/arp_filter = 0
   /proc/sys/net/ipv4/conf/lo/arp_ignore = 0
   /proc/sys/net/ipv4/conf/lo/rp_filter = 1
   /proc/sys/net/ipv4/conf/lo/log_martians = 1

ARP

[truncated]

Modules

iptable_filter          1523  1
iptable_mangle          1482  1
iptable_nat             2561  1
iptable_raw             1321  1
ip_tables              11686  4
iptable_filter,iptable_mangle,iptable_nat,iptable_raw
ipt_MASQUERADE          1870  1
ipt_REJECT              2798  4
ipt_rpfilter            1879  0
ipt_ULOG                4721  0
nf_conntrack           86475  33
nf_nat_ftp,nf_nat_irc,nf_nat_sip,nf_nat_amanda,xt_CT,nf_nat_snmp_basic,nf_conntrack_netbios_ns,nf_conntrack_proto_gre,xt_helper,ipt_MASQUERADE,nf_conntrack_proto_udplite,nf_nat,xt_connlimit,nf_nat_h323,nf_nat_ipv4,nf_nat_pptp,nf_nat_tftp,xt_conntrack,nf_conntrack_amanda,nf_conntrack_proto_sctp,nf_conntrack_netlink,nf_conntrack_broadcast,xt_connmark,nf_conntrack_ftp,nf_conntrack_irc,nf_conntrack_sip,iptable_nat,nf_conntrack_h323,nf_conntrack_ipv4,nf_conntrack_pptp,nf_conntrack_sane,nf_conntrack_snmp,nf_conntrack_tftp
nf_conntrack_amanda     2674  3 nf_nat_amanda
nf_conntrack_broadcast     1397  2 nf_conntrack_netbios_ns,nf_conntrack_snmp
nf_conntrack_ftp        6623  3 nf_nat_ftp
nf_conntrack_h323      45873  5 nf_nat_h323
nf_conntrack_ipv4      14361  41
nf_conntrack_irc        4234  3 nf_nat_irc
nf_conntrack_netbios_ns     1144  2
nf_conntrack_netlink    27860  0
nf_conntrack_pptp       5024  3 nf_nat_pptp
nf_conntrack_proto_gre     6920  1 nf_conntrack_pptp
nf_conntrack_proto_sctp     8718  0
nf_conntrack_proto_udplite     5089  0
nf_conntrack_sane       3896  2
nf_conntrack_sip       22593  3 nf_nat_sip
nf_conntrack_snmp       1456  3 nf_nat_snmp_basic
nf_conntrack_tftp       3619  3 nf_nat_tftp
nf_defrag_ipv4          1244  2 xt_TPROXY,nf_conntrack_ipv4
nf_defrag_ipv6         43339  1 xt_TPROXY
nf_nat                 16245  12
nf_nat_ftp,nf_nat_irc,nf_nat_sip,nf_nat_amanda,ipt_MASQUERADE,nf_nat_proto_gre,nf_nat_h323,nf_nat_ipv4,nf_nat_pptp,nf_nat_tftp,xt_nat,iptable_nat
nf_nat_amanda           1150  0
nf_nat_ftp              1875  0
nf_nat_h323             6238  0
nf_nat_ipv4             3756  1 iptable_nat
nf_nat_irc              1528  0
nf_nat_pptp             2182  0
nf_nat_proto_gre        1365  1 nf_nat_pptp
nf_nat_sip              8879  0
nf_nat_snmp_basic       8034  0
nf_nat_tftp              894  0
nf_tproxy_core          1106  1 xt_TPROXY
xt_addrtype             2747  5
xt_CHECKSUM             1127  0
xt_CLASSIFY              896  0
xt_comment               805  27
xt_connlimit            3275  0
xt_connmark             1680  0
xt_conntrack            2993  18
xt_CT                   4238  22
xt_dscp                 1494  0
xt_DSCP                 1818  0
xt_hashlimit            9612  0
xt_helper               1236  0
xt_iprange              1438  0
xt_length               1061  0
xt_LOG                 13089  10
xt_mark                 1032  1
xt_multiport            1630  4
xt_nat                  1638  0
xt_NFLOG                1006  0
xt_NFQUEUE              2298  0
xt_owner                1239  0
xt_physdev              1809  0
xt_pkttype               929  0
xt_realm                1011  0
xt_recent              10468  1
xt_statistic            1186  0
xt_tcpmss               1250  0
xt_TCPMSS               3570  0
xt_time                 2225  0
xt_TPROXY               4601  0

Shorewall has detected the following iptables/netfilter capabilities:
   ACCOUNT Target (ACCOUNT_TARGET): Not available
   Address Type Match (ADDRTYPE): Available
   Amanda Helper: Available
   Arptables JF (ARPTABLESJF): Not available
   AUDIT Target (AUDIT_TARGET): Not available
   Basic Ematch (BASIC_EMATCH): Available
   Basic Filter (BASIC_FILTER): Available
   Capabilities Version (CAPVERSION): 50004
   Checksum Target (CHECKSUM_TARGET): Available
   CLASSIFY Target (CLASSIFY_TARGET): Available
   Comments (COMMENTS): Available
   Condition Match (CONDITION_MATCH): Not available
   Connection Tracking Match (CONNTRACK_MATCH): Available
   Connlimit Match (CONNLIMIT_MATCH): Available
   Connmark Match (CONNMARK_MATCH): Available
   CONNMARK Target (CONNMARK): Available
   CT Target (CT_TARGET): Available
   DSCP Match (DSCP_MATCH): Available
   DSCP Target (DSCP_TARGET): Available
   Enhanced Multi-port Match (EMULIPORT): Available
   Extended Connection Tracking Match Support (NEW_CONNTRACK_MATCH): Available
   Extended Connmark Match (XCONNMARK_MATCH): Available
   Extended CONNMARK Target (XCONNMARK): Available
   Extended MARK Target 2 (EXMARK): Available
   Extended MARK Target (XMARK): Available
   Extended Multi-port Match (XMULIPORT): Available
   Extended REJECT (ENHANCED_REJECT): Available
   FLOW Classifier (FLOW_FILTER): Available
   FTP-0 Helper: Not available
   FTP Helper: Available
   fwmark route mask (FWMARK_RT_MASK): Available
   Geo IP Match (GEOIP_MATCH): Not available
   Goto Support (GOTO_TARGET): Available
   H323 Helper: Available
   Hashlimit Match (HASHLIMIT_MATCH): Available
   Header Match (HEADER_MATCH): Not available
   Helper Match (HELPER_MATCH): Available
   Iface Match (IFACE_MATCH): Not available
   IMQ Target (IMQ_TARGET): Not available
   IPMARK Target (IPMARK_TARGET): Not available
   IPP2P Match (IPP2P_MATCH): Not available
   IP range Match(IPRANGE_MATCH): Available
   ipset V5 (IPSET_V5): Not available
   iptables -S (IPTABLES_S): Available
   iptables --wait option (WAIT_OPTION): Available
   IRC-0 Helper: Not available
   IRC Helper: Available
   Kernel Version (KERNELVERSION): 310105
   LOGMARK Target (LOGMARK_TARGET): Not available
   LOG Target (LOG_TARGET): Available
   Mangle FORWARD Chain (MANGLE_FORWARD): Available
   Mark in the filter table (MARK_ANYWHERE): Available
   MARK Target (MARK): Available
   MASQUERADE Target (MASQUERADE_TGT): Available
   Multi-port Match (MULTIPORT): Available
   NAT (NAT_ENABLED): Available
   Netbios_ns Helper: Available
   New tos Match (NEW_TOS_MATCH): Available
   NFAcct Match: Not available
   NFLOG Target (NFLOG_TARGET): Available
   NFQUEUE Target (NFQUEUE_TARGET): Available
   Owner Match (OWNER_MATCH): Available
   Owner Name Match (OWNER_NAME_MATCH): Available
   Packet length Match (LENGTH_MATCH): Available
   Packet Mangling (MANGLE_ENABLED): Available
   Packet Type Match (USEPKTTYPE): Available
   Persistent SNAT (PERSISTENT_SNAT): Available
   Physdev-is-bridged Support (PHYSDEV_BRIDGE): Available
   Physdev Match (PHYSDEV_MATCH): Available
   Policy Match (POLICY_MATCH): Available
   PPTP Helper: Available
   Rawpost Table (RAWPOST_TABLE): Not available
   Raw Table (RAW_TABLE): Available
   Realm Match (REALM_MATCH): Available
   Recent Match "--reap" option (REAP_OPTION): Available
   Recent Match (RECENT_MATCH): Available
   Repeat match (KLUDGEFREE): Available
   RPFilter Match (RPFILTER_MATCH): Available
   SANE-0 Helper: Not available
   SANE Helper: Available
   SIP-0 Helper: Not available
   SIP Helper: Available
   SNMP Helper: Available
   Statistic Match (STATISTIC_MATCH): Available
   TARPIT Target (TARPIT_TARGET): Not available
   TCPMSS Match (TCPMSS_MATCH): Available
   TCPMSS Target (TCPMSS_TARGET): Available
   TFTP-0 Helper: Not available
   TFTP Helper: Available
   Time Match (TIME_MATCH): Available
   TPROXY Target (TPROXY_TARGET): Available
   UDPLITE Port Redirection (UDPLITEREDIRECT): Not available
   ULOG Target (ULOG_TARGET): Available

Netid  State      Recv-Q Send-Q Local Address:Port               Peer
Address:Port
tcp    LISTEN     0      10     172.17.0.1:53                    *:*
                users:(("named",pid=7400,fd=25))
tcp    LISTEN     0      10     192.168.10.2:53                    *:*
                  users:(("named",pid=7400,fd=24))
tcp    LISTEN     0      10     192.168.0.1:53                    *:*
                 users:(("named",pid=7400,fd=23))
tcp    LISTEN     0      10     127.0.0.1:53                    *:*
               users:(("named",pid=7400,fd=22))
tcp    LISTEN     0      128    192.168.0.1:22                    *:*
                 users:(("sshd",pid=730,fd=3))
tcp    LISTEN     0      128    127.0.0.1:8118                  *:*
               users:(("privoxy",pid=542,fd=4))
tcp    LISTEN     0      128    127.0.0.1:953                   *:*
               users:(("named",pid=7400,fd=26))
tcp    ESTAB      0      0      192.168.0.1:22
192.168.0.25:62858               users:(("sshd",pid=20016,fd=3))

Traffic Control

Device eth0:
qdisc pfifo_fast 0: root refcnt 2 bands 3 priomap  1 2 2 2 1 2 0 0 1 1
1 1 1 1 1 1
 Sent 350020377 bytes 664102 pkt (dropped 0, overlimits 0 requeues 4)
 backlog 0b 0p requeues 4


Device eth1:
qdisc pfifo_fast 0: root refcnt 2 bands 3 priomap  1 2 2 2 1 2 0 0 1 1
1 1 1 1 1 1
 Sent 55292650 bytes 612778 pkt (dropped 0, overlimits 0 requeues 0)
 backlog 0b 0p requeues 0



TC Filters

Device eth0:

Device eth1:

[END]

Regards

Sven

2017-05-11 16:09 GMT+02:00 Roberto C. Sánchez <robe...@connexer.com>:
> On Thu, May 11, 2017 at 03:29:06PM +0200, Sven Kobow wrote:
>>    Hi,
>>    I have setup my shorewall firewall as demonstrated in the two interface
>>    sample. So far it is working okay. I only have the problem that it is not
>>    possible to do NTP requests to public NTP servers and I can see that these
>>    requests are rejected by shorewall as there are log entries.
>>    I tried adding rules allowing all NTP traffic from local net to anywhere
>>    and from FW to net or anywhere. But I could not get things working.
>>    When the client is resolving the name of the NTP server to a ipv6 address
>>    request are successfull. Using ipv4 addresses or disabling ipv6 on the
>>    client results in contant failures.
>>    Did anybody experience such a behavior as well?
>>    Thanks
>
> Sven,
>
> I have not encountered anything like this.  Can you send the output of
> 'shorewall dump' (run as root)?
>
> Regards,
>
> -Roberto
>
> --
> Roberto C. Sánchez
> http://people.connexer.com/~roberto
> http://www.connexer.com
>
> ------------------------------------------------------------------------------
> Check out the vibrant tech community on one of the world's most
> engaging tech sites, Slashdot.org! http://sdm.link/slashdot
> _______________________________________________
> Shorewall-users mailing list
> Shorewall-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/shorewall-users

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to